View Full Version : Command Service and Virtumonde
Capital12
2008-02-11, 09:03
can't get rid of command service and virtumonde infections. Here are the logs:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 2:01:54 AM, on 2/11/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\IPSSVC.EXE
C:\Program Files\Aspen Touch Solutions\Drivers\Touchscreen\UTCServiceApp.exe
C:\WINDOWS\VXNlcg\command.exe
C:\pdirect\bin\foodtecappserver.exe
c:\oracle\bin\oracle.exe
c:\oracle\bin\tnslsnr.exe
C:\NtResKit\SrvAny.exe
C:\Program Files\Active-Charge\Active-Charge.exe
C:\WINDOWS\system32\r_server.exe
C:\ntreskit\TimeServ.exe
C:\Program Files\ThinkVantage\SystemUpdate\UCLauncherService.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ICO.EXE
C:\WINDOWS\system32\838082878387868.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\FSRremoS.EXE
C:\WINDOWS\system32\Pelmiced.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\LogMeIn\x86\LogMeIn.exe
C:\Program Files\LogMeIn\x86\RaMaint.exe
C:\Program Files\LogMeIn\x86\LogMeInSystray.exe
C:\Program Files\LogMeIn\x86\LogMeIn.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
F3 - REG:win.ini: load=C:\WINDOWS\system32\awtst.exe
O1 - Hosts: 205.1.1.1 DBSERVER
O1 - Hosts: 205.1.1.2 TERM_A
O4 - HKLM\..\Run: [Mouse Suite 98 Daemon] ICO.EXE
O4 - HKLM\..\Run: [LogMeIn GUI] "C:\Program Files\LogMeIn\x86\LogMeInSystray.exe"
O4 - HKLM\..\Run: [FBF8FAFFFBFFFE060] 838082878387868.exe
O4 - HKLM\..\Run: [5c9d790d] rundll32.exe "C:\WINDOWS\system32\tfxtecpx.dll",b
O4 - HKLM\..\RunOnce: [Spybot - Search & Destroy] "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe" /autocheck
O4 - HKLM\..\RunOnce: [SpybotDeletingA4203] command /c del "C:\WINDOWS\system32\awtst.dll_old"
O4 - HKLM\..\RunOnce: [SpybotDeletingC2363] cmd /c del "C:\WINDOWS\system32\awtst.dll_old"
O4 - HKLM\..\RunOnce: [SpybotSnD] "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe" /autocheck
O4 - HKUS\S-1-5-21-2821431653-2996998366-2724477760-1007\..\RunOnce: [configmsi] cmd /c "rmdir /q C:\config.msi" (User 'LogMeInRemoteUser')
O4 - HKUS\S-1-5-21-2821431653-2996998366-2724477760-1007\..\RunOnce: [supportdir] cmd /c "rmdir /q /s "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\{BF90215F-2D7B-4C84-8A24-A03BC41B95DD}"" (User 'LogMeInRemoteUser')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\IBM\Java142\jre\bin\NPJPI142.dll
O9 - Extra 'Tools' menuitem: IBM Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\IBM\Java142\jre\bin\NPJPI142.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O11 - Options group: [JAVA_IBM] Java (IBM)
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} (Performance Viewer Activex Control) - https://secure.logmein.com/activex/ractrl.cab?lmi=100
O17 - HKLM\System\CCS\Services\Tcpip\..\{5A752C58-F30D-4CC8-ABCE-5DDA2856F45C}: NameServer = 205.1.1.100,167.206.3.137,167.206.3.136,167.206.3.203
O23 - Service: AspenTouch Service - Aspen Touch Solutions, Inc. - C:\Program Files\Aspen Touch Solutions\Drivers\Touchscreen\UTCServiceApp.exe
O23 - Service: Command Service (cmdService) - Unknown owner - C:\WINDOWS\VXNlcg\command.exe
O23 - Service: FoodTec App (FoodTecApp) - Unknown owner - C:\pdirect\bin\foodtecapp (file missing)
O23 - Service: FoodTec AppServer (FoodTecAppServer) - Unknown owner - C:\pdirect\bin\foodtecappserver (file missing)
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: IPS Core Service (IPSSVC) - Lenovo Ltd. - C:\WINDOWS\system32\IPSSVC.EXE
O23 - Service: LogMeIn Maintenance Service (LMIMaint) - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\RaMaint.exe
O23 - Service: LogMeIn - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\LogMeIn.exe
O23 - Service: Oracle Service (OracleServiceXE) - Oracle Corporation - c:\oracle\bin\oracle.exe
O23 - Service: Oracle Listener (OracleXETNSListener) - Unknown owner - c:\oracle\bin\tnslsnr.exe
O23 - Service: PCCharge - Unknown owner - C:\NtResKit\SrvAny.exe
O23 - Service: Remote Administrator Service (r_server) - Unknown owner - C:\WINDOWS\system32\r_server.exe
O23 - Service: Time Service (TimeServ) - Unknown owner - C:\ntreskit\TimeServ (file missing)
O23 - Service: ThinkVantage System Update (UCLauncherService) - Unknown owner - C:\Program Files\ThinkVantage\SystemUpdate\UCLauncherService.exe
--
End of file - 5648 bytes
Capital12
2008-02-11, 09:07
KASPERSKY ONLINE SCANNER REPORT
Monday, February 11, 2008 1:59:43 AM
Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 11/02/2008
Kaspersky Anti-Virus database records: 556232
-------------------------------------------------------------------------------
Scan Settings:
Scan using the following antivirus database: extended
Scan Archives: true
Scan Mail Bases: true
Scan Target - My Computer:
A:\
C:\
D:\
Scan Statistics:
Total number of scanned objects: 65733
Number of viruses found: 34
Number of infected objects: 285
Number of suspicious objects: 2
Duration of the scan process: 02:21:06
Infected Object Name / Virus Name / Last Action
C:\db\pdir\bdump\xe_arc1_2240.trc Object is locked skipped
C:\db\pdir\CTL1.CTL Object is locked skipped
C:\db\pdir\CTL2.CTL Object is locked skipped
C:\db\pdir\INDEX1.DBF Object is locked skipped
C:\db\pdir\LOG1.LOG Object is locked skipped
C:\db\pdir\LOG2.LOG Object is locked skipped
C:\db\pdir\LOG3.LOG Object is locked skipped
C:\db\pdir\SYSAUX.DBF Object is locked skipped
C:\db\pdir\SYSTEM.DBF Object is locked skipped
C:\db\pdir\TEMP.DBF Object is locked skipped
C:\db\pdir\UNDO.DBF Object is locked skipped
C:\db\pdir\USR1.DBF Object is locked skipped
C:\db\pdir\USR2.DBF Object is locked skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\!update.exe Infected: Trojan-Downloader.Win32.PurityScan.fk skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX101.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX107.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX10E.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX114.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX11B.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX121.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX123.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX126.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX128.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX12E.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX135.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX13B.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX142.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX148.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX14F.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX155.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX15C.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX162.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX169.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX16F.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX176.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX17C.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX183.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX189.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX190.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX196.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX19D.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX1A3.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX1AA.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX1B0.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX1B7.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX1BD.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX1C4.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX1CA.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX1D1.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX1D7.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX1DE.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX1E4.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX1EB.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX1F1.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX1FB.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCX201.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCXA3.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCXA6.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCXA8.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCXAC.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCXB3.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCXB9.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCXC0.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCXC6.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCXCD.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCXD3.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCXDA.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCXE0.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCXE7.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCXED.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCXF4.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\RCXFA.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\2VIJ6X6V\hctp[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\8FMB4D8R\4db3e14be68297b54dc897edcc80680f[1].zip/b147.exe Infected: Trojan-Downloader.Win32.Agent.fjn skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\8FMB4D8R\4db3e14be68297b54dc897edcc80680f[1].zip ZIP: infected - 1 skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\8FMB4D8R\8154ff2675af1b6e0677560871425153[1].zip/b138.exe Infected: Trojan-Downloader.Win32.Agent.cbx skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\8FMB4D8R\8154ff2675af1b6e0677560871425153[1].zip ZIP: infected - 1 skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\8FMB4D8R\wtrec.prod.v10006.11dec2007.exe[1].c516a643c558a4d4daa4efafd47eff15 Infected: Trojan-Downloader.Win32.Agent.hcm skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\AHS769M1\ptch[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\E5CJY9GT\26453da423d82a5fc6fae941d05f1151[1].zip/b116.exe Infected: Trojan-Downloader.Win32.Agent.ezc skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\E5CJY9GT\26453da423d82a5fc6fae941d05f1151[1].zip ZIP: infected - 1 skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\E5CJY9GT\718f466754402ac597de014577627f96[1].zip/b104.exe/stream/data0002 Infected: Trojan-Downloader.Win32.Small.buy skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\E5CJY9GT\718f466754402ac597de014577627f96[1].zip/b104.exe/stream/data0004 Infected: not-a-virus:AdWare.Win32.Mostofate.u skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\E5CJY9GT\718f466754402ac597de014577627f96[1].zip/b104.exe/stream Infected: not-a-virus:AdWare.Win32.Mostofate.u skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\E5CJY9GT\718f466754402ac597de014577627f96[1].zip/b104.exe Infected: not-a-virus:AdWare.Win32.Mostofate.u skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\E5CJY9GT\718f466754402ac597de014577627f96[1].zip ZIP: infected - 4 skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\KX05EV4X\ptch[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\QFGLY9E9\c1f5cc94a30f082054f3a00e6655462d[1].zip/b103.exe Infected: not-a-virus:AdWare.Win32.Rond.d skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\QFGLY9E9\c1f5cc94a30f082054f3a00e6655462d[1].zip ZIP: infected - 1 skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\S1KFON8J\hctp[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\UZE981C3\!update-4495[1].0000 Infected: Trojan-Downloader.Win32.PurityScan.fk skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\UZE981C3\installer[1].exe/file1 Infected: not-a-virus:AdWare.Win32.CommAd.a skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\UZE981C3\installer[1].exe/file2 Infected: not-a-virus:AdWare.Win32.CommAd.a skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\UZE981C3\installer[1].exe/file4 Infected: not-a-virus:Monitor.Win32.NetMon.a skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\UZE981C3\installer[1].exe Inno: infected - 3 skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\UZE981C3\wintouch.prod.v10015.11dec2007.exe[1].4ccc08fb3ce7ead370a0f9da32f020e7 Infected: Trojan-Downloader.Win32.Agent.hcn skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\TMP91.tmp Infected: Trojan-Downloader.Win32.Agent.idv skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\TMP96.tmp Infected: Trojan-Downloader.Win32.PurityScan.fj skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\TMP99.tmp Infected: Trojan-Downloader.Win32.Agent.hcn skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\TMPA0.tmp Infected: Trojan-Downloader.Win32.Agent.hcm skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\TMPA3.tmp Infected: Trojan-Downloader.Win32.TSUpdate.n skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\TMPA4.tmp Infected: Trojan-Downloader.Win32.Agent.idv skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\TMPA7.tmp Infected: Trojan-Downloader.Win32.TSUpdate.n skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\TMPA9.tmp Infected: Trojan-Downloader.Win32.Agent.idv skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\TMPAD.tmp Infected: Trojan-Downloader.Win32.Agent.idv skipped
C:\Documents and Settings\Administrator\Local Settings\Temp\UE.exe Infected: not-a-virus:AdWare.Win32.PurityScan.gr skipped
Capital12
2008-02-11, 09:09
C:\Documents and Settings\Administrator.DBSERVER\Local Settings\Temp\aknyujff.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Administrator.DBSERVER\Local Settings\Temp\bdfixvgp.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Administrator.DBSERVER\Local Settings\Temp\dcyexpnb.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Administrator.DBSERVER\Local Settings\Temp\ofthpanv.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Administrator.DBSERVER\Local Settings\Temp\qconncfh.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Administrator.DBSERVER\Local Settings\Temp\RCXAB.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator.DBSERVER\Local Settings\Temp\rmtdwefo.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Administrator.DBSERVER\Local Settings\Temp\Temporary Internet Files\Content.IE5\F1VN0502\hctp[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Administrator.DBSERVER\Local Settings\Temp\Temporary Internet Files\Content.IE5\F1VN0502\hctp[2] Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Administrator.DBSERVER\Local Settings\Temp\Temporary Internet Files\Content.IE5\F1VN0502\ptch[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Administrator.DBSERVER\Local Settings\Temp\Temporary Internet Files\Content.IE5\HQSPGX3Q\ptch[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Administrator.DBSERVER\Local Settings\Temp\xuupvvxp.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Administrator.DBSERVER\Local Settings\Temp\yhuqebrb.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\Administrator.DBSERVER.000\Local Settings\Temp\RCX180.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator.DBSERVER.000\Local Settings\Temp\RCX184.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator.DBSERVER.000\Local Settings\Temp\RCX188.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator.DBSERVER.000\Local Settings\Temp\RCX18C.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator.DBSERVER.000\Local Settings\Temp\RCX190.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\History\History.IE5\MSHist012008021020080211\index.dat Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\Temp\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\Temp\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\Temp\hsperfdata_Administrator\312 Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\Temp\RCX18B.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\Temp\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\Temp\~DF9AA6.tmp Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC.zip/MTE3MTk6ODoxNg.exe Suspicious: Password-protected-EXE skipped
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC.zip ZIP: suspicious - 1 skipped
C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\LogMeInRemoteUser\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LogMeInRemoteUser\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LogMeInRemoteUser\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LogMeInRemoteUser\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\User\Local Settings\Temp\!update.exe Infected: Trojan-Downloader.Win32.PurityScan.fk skipped
C:\Documents and Settings\User\Local Settings\Temp\ismtpa9.exe/stream/data0001 Infected: not-a-virus:AdWare.Win32.Agent.adm skipped
C:\Documents and Settings\User\Local Settings\Temp\ismtpa9.exe/stream Infected: not-a-virus:AdWare.Win32.Agent.adm skipped
C:\Documents and Settings\User\Local Settings\Temp\ismtpa9.exe NSIS: infected - 2 skipped
C:\Documents and Settings\User\Local Settings\Temp\RCX10E.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\User\Local Settings\Temp\RCX114.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\User\Local Settings\Temp\RCX16A.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\User\Local Settings\Temp\RCX9.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\User\Local Settings\Temp\RCX9A.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\User\Local Settings\Temp\RCX9F.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\User\Local Settings\Temp\RCXA.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\User\Local Settings\Temp\RCXA2.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\User\Local Settings\Temp\RCXAA.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\User\Local Settings\Temp\RCXAF.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\User\Local Settings\Temp\RCXB.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\User\Local Settings\Temp\RCXD.tmp Infected: Virus.Win32.Trats.d skipped
C:\Documents and Settings\User\Local Settings\Temp\TMP108.tmp Infected: not-a-virus:AdWare.Win32.Agent.adm skipped
C:\Documents and Settings\User\Local Settings\Temp\TMP10B.tmp Infected: Trojan-Downloader.Win32.Adload.pr skipped
C:\Documents and Settings\User\Local Settings\Temp\TMP111.tmp Infected: Trojan-Downloader.Win32.Agent.idv skipped
C:\Documents and Settings\User\Local Settings\Temp\TMP4.tmp Infected: Trojan-Downloader.Win32.PurityScan.fn skipped
C:\Documents and Settings\User\Local Settings\Temp\TMPA.tmp Infected: Trojan-Downloader.Win32.Agent.idv skipped
C:\Documents and Settings\User\Local Settings\Temporary Internet Files\Content.IE5\8RX5HLTT\hctp[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\User\Local Settings\Temporary Internet Files\Content.IE5\8RX5HLTT\ptch[2] Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\User\Local Settings\Temporary Internet Files\Content.IE5\QLVC5C36\CA5TOPS9 Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\User\Local Settings\Temporary Internet Files\Content.IE5\RHNLS83H\!update-4495[1].0000 Infected: Trojan-Downloader.Win32.PurityScan.fk skipped
C:\Documents and Settings\User\Local Settings\Temporary Internet Files\Content.IE5\RMCR31GT\a8f5a020e4b833865a1034489887c8b9[1].zip/b122.exe Infected: Trojan-Downloader.Win32.Agent.hvj skipped
C:\Documents and Settings\User\Local Settings\Temporary Internet Files\Content.IE5\RMCR31GT\a8f5a020e4b833865a1034489887c8b9[1].zip ZIP: infected - 1 skipped
C:\Documents and Settings\User\Local Settings\Temporary Internet Files\Content.IE5\T0SVQ6AV\ptch[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\Documents and Settings\User\Local Settings\Temporary Internet Files\Content.IE5\TZUAD5B5\17PHolmes[1].cmt Infected: Trojan-Downloader.Win32.Agent.idv skipped
C:\Documents and Settings\User\Local Settings\Temporary Internet Files\Content.IE5\TZUAD5B5\hctp[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\DRIVERS\Radmin_2.1\RADMIN21.EXE/AdmDll.dll Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.20 skipped
C:\DRIVERS\Radmin_2.1\RADMIN21.EXE/raddrv.dll Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.20 skipped
C:\DRIVERS\Radmin_2.1\RADMIN21.EXE/radmin.exe Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.21 skipped
C:\DRIVERS\Radmin_2.1\RADMIN21.EXE/r_server.exe Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.21 skipped
C:\DRIVERS\Radmin_2.1\RADMIN21.EXE Gentee: infected - 4 skipped
C:\DRIVERS\RemoteAdmin\RADMIN21.EXE/AdmDll.dll Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.20 skipped
C:\DRIVERS\RemoteAdmin\RADMIN21.EXE/raddrv.dll Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.20 skipped
C:\DRIVERS\RemoteAdmin\RADMIN21.EXE/radmin.exe Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.21 skipped
C:\DRIVERS\RemoteAdmin\RADMIN21.EXE/r_server.exe Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.21 skipped
C:\DRIVERS\RemoteAdmin\RADMIN21.EXE Gentee: infected - 4 skipped
C:\ntreskit\PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\ntreskit\PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\oracle\database\hc_xe.dat Object is locked skipped
C:\oracle\NETWORK\log\listener.log Object is locked skipped
C:\pdirect_5.3.95\full\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\pdirect_5.3.95\full\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_5.3.95\full\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_5.3.95\full\reskit_tar.gz GZIP: infected - 3 skipped
C:\pdirect_5.3.95\java\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\pdirect_5.3.95\java\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_5.3.95\java\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_5.3.95\java\reskit_tar.gz GZIP: infected - 3 skipped
C:\pdirect_5.3.95\normal\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\pdirect_5.3.95\normal\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_5.3.95\normal\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_5.3.95\normal\reskit_tar.gz GZIP: infected - 3 skipped
C:\pdirect_5.3.95\small\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\pdirect_5.3.95\small\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_5.3.95\small\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_5.3.95\small\reskit_tar.gz GZIP: infected - 3 skipped
C:\pdirect_6.0.38\full\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\pdirect_6.0.38\full\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_6.0.38\full\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_6.0.38\full\reskit_tar.gz GZIP: infected - 3 skipped
C:\Program Files\Active-Charge\CrReader.PCC Object is locked skipped
C:\Program Files\Active-Charge\ISDNCFG.PCC Object is locked skipped
C:\Program Files\Common Files\qwur\qwura.exe Infected: Trojan-Downloader.Win32.TSUpdate.l skipped
C:\Program Files\Common Files\qwur\qwurl.exe Infected: Trojan-Downloader.Win32.TSUpdate.r skipped
C:\Program Files\Common Files\qwur\qwurm .exe Infected: Trojan-Downloader.Win32.TSUpdate.n skipped
C:\Program Files\Common Files\qwur\qwurm.exe Infected: Virus.Win32.Trats.d skipped
C:\Program Files\Common Files\qwur\qwurp.exe Infected: Trojan-Downloader.Win32.TSUpdate.f skipped
C:\Program Files\Dot1XCfg\Dot1XCfg .exe Infected: Trojan-Downloader.Win32.Adload.pr skipped
C:\Program Files\Dot1XCfg\Dot1XCfg.exe Infected: Virus.Win32.Trats.d skipped
C:\Program Files\LogMeIn\x86\update\4-00-680.bak\x86\LogMeInSystray.exe Infected: Virus.Win32.Trats.d skipped
C:\Program Files\Radmin\radmin.exe Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.22 skipped
C:\Program Files\Radmin\r_server.exe Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.22 skipped
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe Infected: Virus.Win32.Trats.d skipped
C:\Program Files\Temporary\kernInst.exe Infected: Trojan.Win32.Agent.edq skipped
C:\release\pdirect\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\release\pdirect\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect\reskit_tar.gz GZIP: infected - 3 skipped
C:\release\pdirect_6.0.45\normal\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\release\pdirect_6.0.45\normal\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.0.45\normal\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.0.45\normal\reskit_tar.gz GZIP: infected - 3 skipped
C:\release\pdirect_6.5.0\normal\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\release\pdirect_6.5.0\normal\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.5.0\normal\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.5.0\normal\reskit_tar.gz GZIP: infected - 3 skipped
C:\release\pdirect_6.5.10\java\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\release\pdirect_6.5.10\java\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.5.10\java\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.5.10\java\reskit_tar.gz GZIP: infected - 3 skipped
C:\release\pdirect_6.5.11\normal\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\release\pdirect_6.5.11\normal\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.5.11\normal\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.5.11\normal\reskit_tar.gz GZIP: infected - 3 skipped
C:\release\pdirect_6.5.5\normal\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\release\pdirect_6.5.5\normal\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.5.5\normal\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.5.5\normal\reskit_tar.gz GZIP: infected - 3 skipped
C:\run\appserver\log.txt Object is locked skipped
C:\stage\release\pdirect_6.5.26\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\stage\release\pdirect_6.5.26\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.5.26\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.5.26\normal_tar.gz/packed/normal/reskit_tar.gz Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.5.26\normal_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.5.26\normal_tar.gz GZIP: infected - 5 skipped
C:\stage\release\pdirect_6.6.15\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\stage\release\pdirect_6.6.15\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.15\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.15\normal_tar.gz/packed/normal/reskit_tar.gz Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.15\normal_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.15\normal_tar.gz GZIP: infected - 5 skipped
C:\stage\release\pdirect_6.6.22\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\stage\release\pdirect_6.6.22\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.22\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.22\normal_tar.gz/packed/normal/reskit_tar.gz Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.22\normal_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.22\normal_tar.gz GZIP: infected - 5 skipped
Capital12
2008-02-11, 09:09
C:\stage\release\pdirect_6.6.25\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\stage\release\pdirect_6.6.25\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.25\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.25\normal_tar.gz/packed/normal/reskit_tar.gz Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.25\normal_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.25\normal_tar.gz GZIP: infected - 5 skipped
C:\tmp\NtResKit\PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\tmp\NtResKit\PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\WINDOWS\b103.exe Infected: not-a-virus:AdWare.Win32.Rond.d skipped
C:\WINDOWS\b104.exe/stream/data0002 Infected: Trojan-Downloader.Win32.Small.buy skipped
C:\WINDOWS\b104.exe/stream/data0004 Infected: not-a-virus:AdWare.Win32.Mostofate.u skipped
C:\WINDOWS\b104.exe/stream Infected: not-a-virus:AdWare.Win32.Mostofate.u skipped
C:\WINDOWS\b104.exe NSIS: infected - 3 skipped
C:\WINDOWS\b116.exe Infected: Trojan-Downloader.Win32.Agent.ezc skipped
C:\WINDOWS\b122.exe Infected: Trojan-Downloader.Win32.Agent.hvj skipped
C:\WINDOWS\b138.exe Infected: Trojan-Downloader.Win32.Agent.cbx skipped
C:\WINDOWS\b147.exe Infected: Trojan-Downloader.Win32.Agent.fjn skipped
C:\WINDOWS\CSC\00000001 Object is locked skipped
C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
C:\WINDOWS\mrofinu72.exe Infected: Virus.Win32.Trats.d skipped
C:\WINDOWS\mrofinu72.exe.tmp Infected: Virus.Win32.Trats.d skipped
C:\WINDOWS\SchedLgU.Txt Object is locked skipped
C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\WINDOWS\system32\838082878387868.exe Infected: Trojan-Downloader.Win32.VB.chy skipped
C:\WINDOWS\system32\awtst.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\awtst.exe Infected: Virus.Win32.Trats.d skipped
C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\DEFAULT Object is locked skipped
C:\WINDOWS\system32\config\default.LOG Object is locked skipped
C:\WINDOWS\system32\config\SAM Object is locked skipped
C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SECURITY Object is locked skipped
C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
C:\WINDOWS\system32\config\SOFTWARE Object is locked skipped
C:\WINDOWS\system32\config\software.LOG Object is locked skipped
C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SYSTEM Object is locked skipped
C:\WINDOWS\system32\config\system.LOG Object is locked skipped
C:\WINDOWS\system32\dqrfueed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\dxxmqjkk.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\ghnzkc.dll Infected: not-a-virus:AdWare.Win32.PurityScan.gv skipped
C:\WINDOWS\system32\ghpqxelp.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\h323log.txt Object is locked skipped
C:\WINDOWS\system32\iyagnmbc.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\L50B4.tmp/data0002 Infected: Trojan.Win32.Scapur.k skipped
C:\WINDOWS\system32\L50B4.tmp NSIS: infected - 1 skipped
C:\WINDOWS\system32\laeaecld.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\mjoakxep.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\nvokgtmw.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\owlrgevr.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\pjbynbhv.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\psvjuhuv.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\RCX10.tmp Infected: Virus.Win32.Trats.d skipped
C:\WINDOWS\system32\RCX191.tmp Infected: Virus.Win32.Trats.d skipped
C:\WINDOWS\system32\RCX94.tmp Infected: Virus.Win32.Trats.d skipped
C:\WINDOWS\system32\RCXA.tmp Infected: Virus.Win32.Trats.d skipped
C:\WINDOWS\system32\RCXA3.tmp Infected: Virus.Win32.Trats.d skipped
C:\WINDOWS\system32\RCXA8.tmp Infected: Virus.Win32.Trats.d skipped
C:\WINDOWS\system32\RCXB0.tmp Infected: Virus.Win32.Trats.d skipped
C:\WINDOWS\system32\RCXC.tmp Infected: Virus.Win32.Trats.d skipped
C:\WINDOWS\system32\RCXD.tmp Infected: Virus.Win32.Trats.d skipped
C:\WINDOWS\system32\RCXE.tmp Infected: Virus.Win32.Trats.d skipped
C:\WINDOWS\system32\RCXF.tmp Infected: Virus.Win32.Trats.d skipped
C:\WINDOWS\system32\rdmclomq.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\r_server.exe Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.22 skipped
C:\WINDOWS\system32\tfxtecpx.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped
C:\WINDOWS\system32\wcgiupcg.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\xmrhxygt.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\ynrqeuao.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\system32\yswrwdpr.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\WINDOWS\Temp\JET67.tmp Object is locked skipped
C:\WINDOWS\Temp\RMSA6.tmp Object is locked skipped
C:\WINDOWS\Temp\RMSA7.tmp Object is locked skipped
C:\WINDOWS\Temp\~DF20CC.tmp Object is locked skipped
C:\WINDOWS\VXNlcg\asappsrv.dll Infected: not-a-virus:AdWare.Win32.CommAd.a skipped
C:\WINDOWS\VXNlcg\command.exe Infected: not-a-virus:AdWare.Win32.CommAd.a skipped
C:\WINDOWS\WindowsUpdate.log Object is locked skipped
C:\WINDOWS\Аdobe\arpa .exe Infected: Trojan-Downloader.Win32.PurityScan.fn skipped
C:\WINDOWS\Аdobe\arpa.exe Infected: Virus.Win32.Trats.d skipped
Scan process completed.
Hi Capital12
Rename HijackThis.exe to Capital12.exe and post back a fresh HijackThis log, please :)
Capital12
2008-02-15, 16:53
Thank you for the response Shaba, Here is the logfile as requested.
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 9:51:15 AM, on 2/15/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\IPSSVC.EXE
C:\Program Files\Aspen Touch Solutions\Drivers\Touchscreen\UTCServiceApp.exe
C:\WINDOWS\VXNlcg\command.exe
C:\Program Files\LogMeIn\x86\RaMaint.exe
C:\Program Files\LogMeIn\x86\LogMeIn.exe
c:\oracle\bin\oracle.exe
c:\oracle\bin\tnslsnr.exe
C:\NtResKit\SrvAny.exe
C:\Program Files\Active-Charge\Active-Charge.exe
C:\WINDOWS\system32\r_server.exe
C:\ntreskit\TimeServ.exe
C:\Program Files\ThinkVantage\SystemUpdate\UCLauncherService.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ICO.EXE
C:\Program Files\LogMeIn\x86\LogMeInSystray.exe
C:\WINDOWS\system32\FSRremoS.EXE
C:\WINDOWS\system32\838082878387868.exe
C:\WINDOWS\system32\Pelmiced.exe
C:\Program Files\LogMeIn\x86\LogMeInSystray .exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\rundll32.exe
C:\pdirect\bin\foodtecappserver.exe
C:\pdirect\bin\foodtecapp.exe
C:\Program Files\LogMeIn\x86\LogMeIn.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\Program Files\Trend Micro\HijackThis\Capital12.exe
F3 - REG:win.ini: load=C:\WINDOWS\system32\awtst.exe
O1 - Hosts: 205.1.1.1 DBSERVER
O1 - Hosts: 205.1.1.2 TERM_A
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {173EEACC-5B22-5FFF-0461-2800BFB98F9B} - C:\WINDOWS\system32\ghnzkc.dll
O2 - BHO: {05836987-1891-939b-b0f4-2940ec018432} - {234810ce-0492-4f0b-b939-198178963850} - C:\WINDOWS\system32\dbxlyhli.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {CD971A0D-1B0E-4053-A1DC-0651A5B2E648} - C:\WINDOWS\system32\awtst.dll
O2 - BHO: (no name) - {EB8286AA-49F7-4534-B9BA-25F4020E28A8} - (no file)
O4 - HKCU\..\Run: [5c9d790d] rundll32.exe "C:\WINDOWS\system32\ujshkodu.dll",b
O4 - HKUS\S-1-5-21-2821431653-2996998366-2724477760-1007\..\RunOnce: [configmsi] cmd /c "rmdir /q C:\config.msi" (User 'LogMeInRemoteUser')
O4 - HKUS\S-1-5-21-2821431653-2996998366-2724477760-1007\..\RunOnce: [supportdir] cmd /c "rmdir /q /s "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\{BF90215F-2D7B-4C84-8A24-A03BC41B95DD}"" (User 'LogMeInRemoteUser')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\IBM\Java142\jre\bin\NPJPI142.dll
O9 - Extra 'Tools' menuitem: IBM Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\IBM\Java142\jre\bin\NPJPI142.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O11 - Options group: [JAVA_IBM] Java (IBM)
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} (Performance Viewer Activex Control) - https://secure.logmein.com/activex/ractrl.cab?lmi=100
O17 - HKLM\System\CCS\Services\Tcpip\..\{5A752C58-F30D-4CC8-ABCE-5DDA2856F45C}: NameServer = 205.1.1.100,167.206.3.137,167.206.3.136,167.206.3.203
O23 - Service: AspenTouch Service - Aspen Touch Solutions, Inc. - C:\Program Files\Aspen Touch Solutions\Drivers\Touchscreen\UTCServiceApp.exe
O23 - Service: Command Service (cmdService) - Unknown owner - C:\WINDOWS\VXNlcg\command.exe
O23 - Service: FoodTec App (FoodTecApp) - Unknown owner - C:\pdirect\bin\foodtecapp (file missing)
O23 - Service: FoodTec AppServer (FoodTecAppServer) - Unknown owner - C:\pdirect\bin\foodtecappserver (file missing)
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: IPS Core Service (IPSSVC) - Lenovo Ltd. - C:\WINDOWS\system32\IPSSVC.EXE
O23 - Service: LogMeIn Maintenance Service (LMIMaint) - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\RaMaint.exe
O23 - Service: LogMeIn - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\LogMeIn.exe
O23 - Service: Oracle Service (OracleServiceXE) - Oracle Corporation - c:\oracle\bin\oracle.exe
O23 - Service: Oracle Listener (OracleXETNSListener) - Unknown owner - c:\oracle\bin\tnslsnr.exe
O23 - Service: PCCharge - Unknown owner - C:\NtResKit\SrvAny.exe
O23 - Service: Remote Administrator Service (r_server) - Unknown owner - C:\WINDOWS\system32\r_server.exe
O23 - Service: Time Service (TimeServ) - Unknown owner - C:\ntreskit\TimeServ (file missing)
O23 - Service: ThinkVantage System Update (UCLauncherService) - Unknown owner - C:\Program Files\ThinkVantage\SystemUpdate\UCLauncherService.exe
--
End of file - 5744 bytes
Hi
1. Download combofix from any of these links and save it to Desktop:
Link 1 (http://download.bleepingcomputer.com/sUBs/ComboFix.exe)
Link 2 (http://www.forospyware.com/sUBs/ComboFix.exe)
Link 3 (http://subs.geekstogo.com/ComboFix.exe)
**Note: It is important that it is saved directly to your desktop**
2. Double click combofix.exe & follow the prompts.
3. When finished, it shall produce a log for you (C:\ComboFix.txt). Post that log in your next reply
Note:
Do not mouseclick combofix's window whilst it's running. That may cause it to stall
Combofix should never take more that 20 minutes including the reboot if malware is detected.
If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
If that happened we want to know, and also what process you had to end.
If you have problems with Combofix usage, see here (http://www.bleepingcomputer.com/combofix/how-to-use-combofix)
Post:
- a fresh HijackThis log
- combofix report
Capital12
2008-02-16, 08:42
Hi Shaba, After reboot, i get a windows error popup saying "cannot find c:\windows\system32\awtst.exe. i click ok.... then get the same thing saying for desktop. is this something to be concerned about?
Here are the logs:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 1:32:24 AM, on 2/16/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\IPSSVC.EXE
C:\Program Files\Aspen Touch Solutions\Drivers\Touchscreen\UTCServiceApp.exe
C:\Program Files\LogMeIn\x86\RaMaint.exe
C:\Program Files\LogMeIn\x86\LogMeIn.exe
c:\oracle\bin\oracle.exe
c:\oracle\bin\tnslsnr.exe
C:\NtResKit\SrvAny.exe
C:\Program Files\Active-Charge\Active-Charge.exe
C:\WINDOWS\system32\r_server.exe
C:\Program Files\ThinkVantage\SystemUpdate\UCLauncherService.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ICO.EXE
C:\WINDOWS\system32\FSRremoS.EXE
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\WINDOWS\system32\Pelmiced.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\Trend Micro\HijackThis\Capital12.exe
O1 - Hosts: 205.1.1.1 DBSERVER
O1 - Hosts: 205.1.1.2 TERM_A
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O4 - HKLM\..\Run: [Mouse Suite 98 Daemon] ICO.EXE
O4 - HKLM\..\Run: [FBF8FAFFFBFFFE060] 838082878387868.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\IBM\Java142\jre\bin\NPJPI142.dll
O9 - Extra 'Tools' menuitem: IBM Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\IBM\Java142\jre\bin\NPJPI142.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O11 - Options group: [JAVA_IBM] Java (IBM)
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} (Performance Viewer Activex Control) - https://secure.logmein.com/activex/ractrl.cab?lmi=100
O17 - HKLM\System\CCS\Services\Tcpip\..\{5A752C58-F30D-4CC8-ABCE-5DDA2856F45C}: NameServer = 205.1.1.100,167.206.3.137,167.206.3.136,167.206.3.203
O23 - Service: AspenTouch Service - Aspen Touch Solutions, Inc. - C:\Program Files\Aspen Touch Solutions\Drivers\Touchscreen\UTCServiceApp.exe
O23 - Service: FoodTec App (FoodTecApp) - Unknown owner - C:\pdirect\bin\foodtecapp (file missing)
O23 - Service: FoodTec AppServer (FoodTecAppServer) - Unknown owner - C:\pdirect\bin\foodtecappserver (file missing)
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: IPS Core Service (IPSSVC) - Lenovo Ltd. - C:\WINDOWS\system32\IPSSVC.EXE
O23 - Service: LogMeIn Maintenance Service (LMIMaint) - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\RaMaint.exe
O23 - Service: LogMeIn - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\LogMeIn.exe
O23 - Service: Oracle Service (OracleServiceXE) - Oracle Corporation - c:\oracle\bin\oracle.exe
O23 - Service: Oracle Listener (OracleXETNSListener) - Unknown owner - c:\oracle\bin\tnslsnr.exe
O23 - Service: PCCharge - Unknown owner - C:\NtResKit\SrvAny.exe
O23 - Service: Remote Administrator Service (r_server) - Unknown owner - C:\WINDOWS\system32\r_server.exe
O23 - Service: Time Service (TimeServ) - Unknown owner - C:\ntreskit\TimeServ (file missing)
O23 - Service: ThinkVantage System Update (UCLauncherService) - Unknown owner - C:\Program Files\ThinkVantage\SystemUpdate\UCLauncherService.exe
--
End of file - 4407 bytes
Capital12
2008-02-16, 08:44
ComboFix 08-02-14.2 - Administrator 2008-02-16 1:20:39.4 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.514 [GMT -5:00]
Running from: C:\Documents and Settings\Administrator.DBSERVER.001\Desktop\ComboFix.exe
WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
---- Previous Run -------
.
C:\Documents and Settings\User\Start Menu\Programs\Internet Speed Monitor
C:\Documents and Settings\User\Start Menu\Programs\Internet Speed Monitor\Check Now.lnk
C:\Documents and Settings\User\Start Menu\Programs\Internet Speed Monitor\Uninstall.lnk
C:\Program Files\Common Files\qwur
C:\Program Files\Common Files\qwur\qwura.exe
C:\Program Files\Common Files\qwur\qwura.lck
C:\Program Files\Common Files\qwur\qwurd\class-barrel
C:\Program Files\Common Files\qwur\qwurd\qwurc.dll
C:\Program Files\Common Files\qwur\qwurd\vocabulary
C:\Program Files\Common Files\qwur\qwurh
C:\Program Files\Common Files\qwur\qwurl.exe
C:\Program Files\Common Files\qwur\qwurl.lck
C:\Program Files\Common Files\qwur\qwurm .exe
C:\Program Files\Common Files\qwur\qwurm.exe
C:\Program Files\Common Files\qwur\qwurm.lck
C:\Program Files\Common Files\qwur\qwurp.exe
C:\Program Files\Common Files\scurit~1
C:\Program Files\Common Files\scurit~1\?xplorer.exe
C:\Program Files\Dot1XCfg\Dot1XCfg.exe
C:\Program Files\LogMeIn\x86\LogMeInSystray.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Temporary
C:\Program Files\Temporary\kernInst.exe
C:\WINDOWS\b103.exe
C:\WINDOWS\b104.exe
C:\WINDOWS\b116.exe
C:\WINDOWS\b122.exe
C:\WINDOWS\b138.exe
C:\WINDOWS\b147.exe
C:\WINDOWS\b149.exe
C:\WINDOWS\cookies.ini
C:\WINDOWS\dobe~1
C:\WINDOWS\dobe~1\?dobe\
C:\WINDOWS\dobe~1\arpa .exe
C:\WINDOWS\dobe~1\arpa.exe
C:\WINDOWS\mrofinu72.exe
C:\WINDOWS\qwur
C:\WINDOWS\qwur\qwur.dat
C:\WINDOWS\qwur\wu
C:\WINDOWS\smante~1
C:\WINDOWS\system32\838082878387868.exe
C:\WINDOWS\system32\awtst.dll
C:\WINDOWS\system32\awtst.exe
C:\WINDOWS\system32\cbmngayi.ini
C:\WINDOWS\system32\ckwobidw.ini
C:\WINDOWS\system32\dbxlyhli.dll
C:\WINDOWS\system32\dlceaeal.ini
C:\WINDOWS\system32\dqrfueed.dll
C:\WINDOWS\system32\dxxmqjkk.dll
C:\WINDOWS\system32\galdkvtf.dll
C:\WINDOWS\system32\ghnzkc.dll
C:\WINDOWS\system32\ghpqxelp.dll
C:\WINDOWS\system32\gqppsjva.dll
C:\WINDOWS\system32\iyagnmbc.dll
C:\WINDOWS\system32\mcrh.tmp
C:\WINDOWS\system32\mjoakxep.dll
C:\WINDOWS\system32\mpthvbht.dll
C:\WINDOWS\system32\nhcsbtmx.ini
C:\WINDOWS\system32\nvokgtmw.dll
C:\WINDOWS\system32\owlrgevr.dll
C:\WINDOWS\system32\oxpkywqv.dll
C:\WINDOWS\system32\pexkaojm.ini
C:\WINDOWS\system32\phsmryvw.dll
C:\WINDOWS\system32\pjbynbhv.dll
C:\WINDOWS\system32\plexqphg.ini
C:\WINDOWS\system32\qidxkwiw.dll
C:\WINDOWS\system32\RCX10.tmp
C:\WINDOWS\system32\RCX94.tmp
C:\WINDOWS\system32\RCXA.tmp
C:\WINDOWS\system32\RCXA3.tmp
C:\WINDOWS\system32\RCXA8.tmp
C:\WINDOWS\system32\RCXB0.tmp
C:\WINDOWS\system32\RCXC.tmp
C:\WINDOWS\system32\RCXD.tmp
C:\WINDOWS\system32\RCXE.tmp
C:\WINDOWS\system32\RCXF.tmp
C:\WINDOWS\system32\rdmclomq.dll
C:\WINDOWS\system32\rvegrlwo.ini
C:\WINDOWS\system32\tfxtecpx.dll
C:\WINDOWS\system32\tgyxhrmx.ini
C:\WINDOWS\system32\thbvhtpm.ini
C:\WINDOWS\system32\tstwa.ini
C:\WINDOWS\system32\tstwa.ini2
C:\WINDOWS\system32\udokhsju.ini
C:\WINDOWS\system32\uidxwdua.dll
C:\WINDOWS\system32\ujshkodu.dll
C:\WINDOWS\system32\vdugoagu.dll
C:\WINDOWS\system32\vuhujvsp.ini
C:\WINDOWS\system32\wcgiupcg.dll
C:\WINDOWS\system32\wdibowkc.dll
C:\WINDOWS\system32\wvyrmshp.ini
C:\WINDOWS\system32\xmrhxygt.dll
C:\WINDOWS\system32\xmtbschn.dll
C:\WINDOWS\system32\xoosmxvy.dll
C:\WINDOWS\system32\xpcetxft.ini
C:\WINDOWS\system32\ymbols~1
C:\WINDOWS\system32\ynrqeuao.dll
C:\WINDOWS\system32\yswrwdpr.dll
C:\WINDOWS\VXNlcg\
C:\WINDOWS\VXNlcg\\asappsrv.dll
C:\WINDOWS\VXNlcg\\command.exe
C:\WINDOWS\VXNlcg\\prh5w0.vbs
C:\WINDOWS\VXNlcg\command.exe
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\LEGACY_CMDSERVICE
-------\LEGACY_NETWORK_MONITOR
-------\cmdService
((((((((((((((((((((((((( Files Created from 2008-01-16 to 2008-02-16 )))))))))))))))))))))))))))))))
.
2008-02-16 00:26 . 2008-02-16 00:26 388,608 --a------ C:\WINDOWS\system32\kmd .exe
2008-02-14 23:05 . 2008-02-16 00:14 6,112 --a------ C:\WINDOWS\BM5fae4a91.xml
2008-02-14 23:05 . 2008-02-16 00:33 21 --a------ C:\WINDOWS\pskt.ini
2008-02-13 22:54 . 2008-02-13 22:54 340,992 --a------ C:\WINDOWS\system32\RCX11F.tmp
2008-02-10 19:41 . 2006-02-02 10:07 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.001\Application Data\ThinkVantage
2008-02-10 19:41 . 2006-01-18 12:34 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.001\Application Data\Symantec
2008-02-10 19:41 . 2006-01-18 12:30 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.001\Application Data\IBM
2008-02-10 10:30 . 2008-02-10 10:30 340,992 --a------ C:\WINDOWS\system32\RCX191.tmp
2008-02-10 09:09 . 2006-02-02 10:07 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.000\Application Data\ThinkVantage
2008-02-10 09:09 . 2006-01-18 12:34 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.000\Application Data\Symantec
2008-02-10 09:09 . 2006-01-18 12:30 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.000\Application Data\IBM
2008-02-09 22:54 . 2008-02-09 22:54 <DIR> d-------- C:\Program Files\Trend Micro
2008-02-09 22:34 . 2008-02-09 22:34 <DIR> d-------- C:\WINDOWS\system32\Kaspersky Lab
2008-02-09 22:34 . 2008-02-09 22:34 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
2008-02-06 21:34 . 2006-02-02 10:07 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER\Application Data\ThinkVantage
2008-02-06 21:34 . 2006-01-18 12:34 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER\Application Data\Symantec
2008-02-06 21:34 . 2006-01-18 12:30 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER\Application Data\IBM
2008-02-05 23:52 . 2004-08-04 08:00 221,184 --a------ C:\WINDOWS\system32\wmpns.dll
2008-02-05 22:49 . 2008-02-13 22:53 1,416 --a------ C:\WINDOWS\wininit.ini
2008-02-05 21:49 . 2008-02-16 00:37 <DIR> d-------- C:\Program Files\Spybot - Search & Destroy
2008-02-05 21:49 . 2008-02-05 22:14 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2008-02-05 16:23 . 2008-02-05 16:23 90,688 --a------ C:\WINDOWS\system32\laeaecld.dll
2008-02-05 16:20 . 2008-02-05 16:20 90,688 --a------ C:\WINDOWS\system32\psvjuhuv.dll
2008-02-05 04:54 . 2008-02-05 04:54 <DIR> d-------- C:\WINDOWS\system32\949193989498979
2008-02-03 16:12 . 2008-02-16 00:37 <DIR> d-------- C:\Program Files\Dot1XCfg
2008-02-03 16:08 . 2008-02-05 23:57 378,880 --a------ C:\WINDOWS\mrofinu72.exe.tmp
2008-02-03 16:08 . 2008-02-03 16:08 270,698 --a------ C:\WINDOWS\system32\L6814.tmp
2008-02-03 16:08 . 2008-02-03 16:08 181,965 --a------ C:\WINDOWS\system32\L50B4.tmp
2008-01-29 21:58 . 2006-02-02 10:07 <DIR> d-------- C:\Documents and Settings\LogMeInRemoteUser\Application Data\ThinkVantage
2008-01-29 21:58 . 2006-01-18 12:34 <DIR> d-------- C:\Documents and Settings\LogMeInRemoteUser\Application Data\Symantec
2008-01-29 21:58 . 2006-01-18 12:30 <DIR> d-------- C:\Documents and Settings\LogMeInRemoteUser\Application Data\IBM
2008-01-29 21:43 . 2008-02-16 00:07 <DIR> d-------- C:\Program Files\LogMeIn
2008-01-29 21:43 . 2007-11-15 18:46 87,352 --a------ C:\WINDOWS\system32\LMIinit.dll.000.bak
2008-01-29 21:43 . 2007-11-15 18:46 87,352 --a------ C:\WINDOWS\system32\LMIinit.dll
2008-01-29 21:43 . 2007-11-15 18:46 83,288 --a------ C:\WINDOWS\system32\LMIRfsClientNP.dll.000.bak
2008-01-29 21:43 . 2007-11-15 18:46 83,288 --a------ C:\WINDOWS\system32\LMIRfsClientNP.dll
2008-01-29 21:43 . 2007-08-03 15:09 46,112 --a------ C:\WINDOWS\system32\drivers\LMIRfsDriver.sys
2008-01-29 21:43 . 2007-11-15 18:46 21,496 --a------ C:\WINDOWS\system32\LMIport.dll
2008-01-29 21:43 . 2008-01-29 21:43 1,024 --a------ C:\.rnd
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-02-16 06:14 --------- d-----w C:\Program Files\Active-Charge
2007-10-05 18:48 0 ----a-w C:\Documents and Settings\Administrator\GoToAssist_phone__317_en.exe
2006-07-26 03:13 50,036 ----a-r C:\WINDOWS\inf\DS2490.sys
2003-06-19 16:05 286,773 ----a-w C:\Program Files\msvcrt.dll
2003-06-19 16:05 1,015,859 ----a-w C:\Program Files\mfc42.dll
1998-05-15 05:00 73,184 ----a-w C:\Program Files\Common Files\dao2535.tlb
1998-04-27 05:00 570,128 ----a-w C:\Program Files\Common Files\Dao350.dll
.
<pre>
----a-w 61,440 2008-02-16 05:23:54 C:\Program Files\Dot1XCfg\Dot1XCfg .exe
----a-w 63,048 2008-02-16 05:26:48 C:\Program Files\LogMeIn\x86\LogMeInSystray .exe
----a-w 2,097,488 2008-02-06 05:03:54 C:\Program Files\Spybot - Search & Destroy\TeaTimer .exe
----a-w 388,608 2008-02-16 05:26:51 C:\WINDOWS\system32\kmd .exe
</pre>
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Mouse Suite 98 Daemon"="ICO.EXE" [2005-04-13 17:34 49152 C:\WINDOWS\system32\ico.exe]
"FBF8FAFFFBFFFE060"="838082878387868.exe" []
C:\Documents and Settings\User\Start Menu\Programs\Startup\
Pizza Director.lnk - C:\ntreskit\SC.EXE [2006-04-07 11:23:23 54032]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LMIinit]
LMIinit.dll 2007-11-15 18:46 87352 C:\WINDOWS\system32\LMIinit.dll
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AMSG]
--a------ 2005-10-05 20:26 487424 C:\Program Files\ThinkVantage\AMSG\Amsg.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\cssauth]
C:\Program Files\IBM ThinkVantage\Client Security Solution\cssauth.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DiskeeperSystray]
C:\Program Files\Diskeeper Corporation\Diskeeper\DkIcon.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HotKeysCmds]
--a------ 2005-06-08 13:59 77824 C:\WINDOWS\system32\hkcmd.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IgfxTray]
--a------ 2005-06-08 14:02 94208 C:\WINDOWS\system32\igfxtray.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LPManager]
--a------ 2005-09-08 04:01 102400 C:\PROGRA~1\THINKV~1\PrdCtr\LPMGR.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Mouse Suite 98 Daemon]
--a------ 2005-04-13 17:34 49152 C:\WINDOWS\system32\ico.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PDService.exe]
C:\Program Files\IBM ThinkVantage\SafeGuard PrivateDisk\pdservice.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Persistence]
--a------ 2005-06-08 14:03 114688 C:\WINDOWS\system32\igfxpers.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMAX]
--a------ 2005-05-06 18:06 716800 C:\Program Files\Analog Devices\SoundMAX\Smax4.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMAXPnP]
--a------ 2005-05-20 12:11 925696 C:\Program Files\Analog Devices\Core\smax4pnp.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\suScheduler]
--a------ 2005-08-01 20:32 40960 C:\Program Files\ThinkVantage\SystemUpdate\UCLauncher.exe
R2 AspenTouch Service;AspenTouch Service;C:\Program Files\Aspen Touch Solutions\Drivers\Touchscreen\UTCServiceApp.exe [2004-10-19 13:05]
R2 FoodTecAppServer;FoodTec AppServer;C:\pdirect\bin\foodtecappserver []
R2 LMIInfo;LogMeIn Kernel Information Provider;C:\Program Files\LogMeIn\x86\RaInfo.sys [2007-08-03 15:09]
R2 LMIRfsDriver;LogMeIn Remote File System Driver;C:\WINDOWS\system32\drivers\LMIRfsDriver.sys [2007-08-03 15:09]
R2 OracleServiceXE;Oracle Service;c:\oracle\bin\oracle.exe XE []
R2 OracleXETNSListener;Oracle Listener;c:\oracle\bin\tnslsnr.exe [2006-02-01 23:49]
R2 PCCharge;PCCharge;C:\NtResKit\SrvAny.exe [2006-04-07 11:23]
R2 r_server;Remote Administrator Service;"C:\WINDOWS\system32\r_server.exe" [2005-06-21 15:16]
R2 TimeServ;Time Service;C:\ntreskit\TimeServ []
R3 pelmouse;Mouse Suite Driver;C:\WINDOWS\system32\DRIVERS\pelmouse.sys [2003-01-10 16:55]
R3 pelusblf;USB Mouse Low Filter Driver;C:\WINDOWS\system32\DRIVERS\pelusblf.sys [2003-02-11 16:25]
R3 TPM12;NSC Integrated Trusted Platform Module 1.2;C:\WINDOWS\system32\DRIVERS\nsctpm12.sys [2005-04-21 18:28]
R3 utcrs232;Aspen Resistive RS232 Touch Controller;C:\WINDOWS\system32\DRIVERS\UtcRs232.sys [2004-07-20 08:03]
S2 FoodTecApp;FoodTec App;C:\pdirect\bin\foodtecapp []
S3 MagEpNt;MagEpNt;C:\WINDOWS\system32\drivers\MagEpNt.sys [1997-06-12 10:53]
.
Contents of the 'Scheduled Tasks' folder
"2008-02-15 09:04:00 C:\WINDOWS\Tasks\nightly.job"
- c:\pdirect\bin\nightly.cmd
.
**************************************************************************
catchme 0.3.1344 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-02-16 01:22:22
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
.
Completion time: 2008-02-16 1:23:20
ComboFix-quarantined-files.txt 2008-02-16 06:22:51
Hi
No, that is only a infection leftover.
Have you installed this?
O23 - Service: Remote Administrator Service (r_server) - Unknown owner - C:\WINDOWS\system32\r_server.exe
Capital12
2008-02-16, 16:21
Yes. its good.
Hi
Thanks for the info.
Open notepad and copy/paste the text in the quotebox below into it:
RenV::
----a-w 63,048 2008-02-16 05:26:48 C:\Program Files\LogMeIn\x86\LogMeInSystray .exe
----a-w 2,097,488 2008-02-06 05:03:54 C:\Program Files\Spybot - Search & Destroy\TeaTimer .exe
----a-w 388,608 2008-02-16 05:26:51 C:\WINDOWS\system32\kmd .exe
File::
C:\WINDOWS\system32\RCX11F.tmp
C:\WINDOWS\system32\RCX191.tmp
C:\WINDOWS\system32\laeaecld.dll
C:\WINDOWS\system32\psvjuhuv.dll
C:\WINDOWS\system32\L6814.tmp
C:\WINDOWS\system32\L50B4.tmp
Folder::
C:\Program Files\Dot1XCfg
C:\WINDOWS\system32\949193989498979
Registry::
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"FBF8FAFFFBFFFE060"=-
Save this as "CFScript"
Then drag the CFScript into ComboFix.exe as you see in the screenshot below.
http://users.pandora.be/bluepatchy/miekiemoes/images/CFScript.gif
This will start ComboFix again. After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply together with a new HijackThis log.
Combofix should never take more that 20 minutes including the reboot if malware is detected.
If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
If that happened we want to know, and also what process you had to end.
Capital12
2008-02-16, 21:30
Not Sure if i did it correctly but here are the 2 logs:
ComboFix 08-02-14.2 - Administrator 2008-02-16 1:20:39.4 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.514 [GMT -5:00]
Running from: C:\Documents and Settings\Administrator.DBSERVER.001\Desktop\ComboFix.exe
WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
---- Previous Run -------
.
C:\Documents and Settings\User\Start Menu\Programs\Internet Speed Monitor
C:\Documents and Settings\User\Start Menu\Programs\Internet Speed Monitor\Check Now.lnk
C:\Documents and Settings\User\Start Menu\Programs\Internet Speed Monitor\Uninstall.lnk
C:\Program Files\Common Files\qwur
C:\Program Files\Common Files\qwur\qwura.exe
C:\Program Files\Common Files\qwur\qwura.lck
C:\Program Files\Common Files\qwur\qwurd\class-barrel
C:\Program Files\Common Files\qwur\qwurd\qwurc.dll
C:\Program Files\Common Files\qwur\qwurd\vocabulary
C:\Program Files\Common Files\qwur\qwurh
C:\Program Files\Common Files\qwur\qwurl.exe
C:\Program Files\Common Files\qwur\qwurl.lck
C:\Program Files\Common Files\qwur\qwurm .exe
C:\Program Files\Common Files\qwur\qwurm.exe
C:\Program Files\Common Files\qwur\qwurm.lck
C:\Program Files\Common Files\qwur\qwurp.exe
C:\Program Files\Common Files\scurit~1
C:\Program Files\Common Files\scurit~1\?xplorer.exe
C:\Program Files\Dot1XCfg\Dot1XCfg.exe
C:\Program Files\LogMeIn\x86\LogMeInSystray.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Temporary
C:\Program Files\Temporary\kernInst.exe
C:\WINDOWS\b103.exe
C:\WINDOWS\b104.exe
C:\WINDOWS\b116.exe
C:\WINDOWS\b122.exe
C:\WINDOWS\b138.exe
C:\WINDOWS\b147.exe
C:\WINDOWS\b149.exe
C:\WINDOWS\cookies.ini
C:\WINDOWS\dobe~1
C:\WINDOWS\dobe~1\?dobe\
C:\WINDOWS\dobe~1\arpa .exe
C:\WINDOWS\dobe~1\arpa.exe
C:\WINDOWS\mrofinu72.exe
C:\WINDOWS\qwur
C:\WINDOWS\qwur\qwur.dat
C:\WINDOWS\qwur\wu
C:\WINDOWS\smante~1
C:\WINDOWS\system32\838082878387868.exe
C:\WINDOWS\system32\awtst.dll
C:\WINDOWS\system32\awtst.exe
C:\WINDOWS\system32\cbmngayi.ini
C:\WINDOWS\system32\ckwobidw.ini
C:\WINDOWS\system32\dbxlyhli.dll
C:\WINDOWS\system32\dlceaeal.ini
C:\WINDOWS\system32\dqrfueed.dll
C:\WINDOWS\system32\dxxmqjkk.dll
C:\WINDOWS\system32\galdkvtf.dll
C:\WINDOWS\system32\ghnzkc.dll
C:\WINDOWS\system32\ghpqxelp.dll
C:\WINDOWS\system32\gqppsjva.dll
C:\WINDOWS\system32\iyagnmbc.dll
C:\WINDOWS\system32\mcrh.tmp
C:\WINDOWS\system32\mjoakxep.dll
C:\WINDOWS\system32\mpthvbht.dll
C:\WINDOWS\system32\nhcsbtmx.ini
C:\WINDOWS\system32\nvokgtmw.dll
C:\WINDOWS\system32\owlrgevr.dll
C:\WINDOWS\system32\oxpkywqv.dll
C:\WINDOWS\system32\pexkaojm.ini
C:\WINDOWS\system32\phsmryvw.dll
C:\WINDOWS\system32\pjbynbhv.dll
C:\WINDOWS\system32\plexqphg.ini
C:\WINDOWS\system32\qidxkwiw.dll
C:\WINDOWS\system32\RCX10.tmp
C:\WINDOWS\system32\RCX94.tmp
C:\WINDOWS\system32\RCXA.tmp
C:\WINDOWS\system32\RCXA3.tmp
C:\WINDOWS\system32\RCXA8.tmp
C:\WINDOWS\system32\RCXB0.tmp
C:\WINDOWS\system32\RCXC.tmp
C:\WINDOWS\system32\RCXD.tmp
C:\WINDOWS\system32\RCXE.tmp
C:\WINDOWS\system32\RCXF.tmp
C:\WINDOWS\system32\rdmclomq.dll
C:\WINDOWS\system32\rvegrlwo.ini
C:\WINDOWS\system32\tfxtecpx.dll
C:\WINDOWS\system32\tgyxhrmx.ini
C:\WINDOWS\system32\thbvhtpm.ini
C:\WINDOWS\system32\tstwa.ini
C:\WINDOWS\system32\tstwa.ini2
C:\WINDOWS\system32\udokhsju.ini
C:\WINDOWS\system32\uidxwdua.dll
C:\WINDOWS\system32\ujshkodu.dll
C:\WINDOWS\system32\vdugoagu.dll
C:\WINDOWS\system32\vuhujvsp.ini
C:\WINDOWS\system32\wcgiupcg.dll
C:\WINDOWS\system32\wdibowkc.dll
C:\WINDOWS\system32\wvyrmshp.ini
C:\WINDOWS\system32\xmrhxygt.dll
C:\WINDOWS\system32\xmtbschn.dll
C:\WINDOWS\system32\xoosmxvy.dll
C:\WINDOWS\system32\xpcetxft.ini
C:\WINDOWS\system32\ymbols~1
C:\WINDOWS\system32\ynrqeuao.dll
C:\WINDOWS\system32\yswrwdpr.dll
C:\WINDOWS\VXNlcg\
C:\WINDOWS\VXNlcg\\asappsrv.dll
C:\WINDOWS\VXNlcg\\command.exe
C:\WINDOWS\VXNlcg\\prh5w0.vbs
C:\WINDOWS\VXNlcg\command.exe
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\LEGACY_CMDSERVICE
-------\LEGACY_NETWORK_MONITOR
-------\cmdService
((((((((((((((((((((((((( Files Created from 2008-01-16 to 2008-02-16 )))))))))))))))))))))))))))))))
.
2008-02-16 00:26 . 2008-02-16 00:26 388,608 --a------ C:\WINDOWS\system32\kmd .exe
2008-02-14 23:05 . 2008-02-16 00:14 6,112 --a------ C:\WINDOWS\BM5fae4a91.xml
2008-02-14 23:05 . 2008-02-16 00:33 21 --a------ C:\WINDOWS\pskt.ini
2008-02-13 22:54 . 2008-02-13 22:54 340,992 --a------ C:\WINDOWS\system32\RCX11F.tmp
2008-02-10 19:41 . 2006-02-02 10:07 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.001\Application Data\ThinkVantage
2008-02-10 19:41 . 2006-01-18 12:34 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.001\Application Data\Symantec
2008-02-10 19:41 . 2006-01-18 12:30 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.001\Application Data\IBM
2008-02-10 10:30 . 2008-02-10 10:30 340,992 --a------ C:\WINDOWS\system32\RCX191.tmp
2008-02-10 09:09 . 2006-02-02 10:07 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.000\Application Data\ThinkVantage
2008-02-10 09:09 . 2006-01-18 12:34 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.000\Application Data\Symantec
2008-02-10 09:09 . 2006-01-18 12:30 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.000\Application Data\IBM
2008-02-09 22:54 . 2008-02-09 22:54 <DIR> d-------- C:\Program Files\Trend Micro
2008-02-09 22:34 . 2008-02-09 22:34 <DIR> d-------- C:\WINDOWS\system32\Kaspersky Lab
2008-02-09 22:34 . 2008-02-09 22:34 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
2008-02-06 21:34 . 2006-02-02 10:07 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER\Application Data\ThinkVantage
2008-02-06 21:34 . 2006-01-18 12:34 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER\Application Data\Symantec
2008-02-06 21:34 . 2006-01-18 12:30 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER\Application Data\IBM
2008-02-05 23:52 . 2004-08-04 08:00 221,184 --a------ C:\WINDOWS\system32\wmpns.dll
2008-02-05 22:49 . 2008-02-13 22:53 1,416 --a------ C:\WINDOWS\wininit.ini
2008-02-05 21:49 . 2008-02-16 00:37 <DIR> d-------- C:\Program Files\Spybot - Search & Destroy
2008-02-05 21:49 . 2008-02-05 22:14 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2008-02-05 16:23 . 2008-02-05 16:23 90,688 --a------ C:\WINDOWS\system32\laeaecld.dll
2008-02-05 16:20 . 2008-02-05 16:20 90,688 --a------ C:\WINDOWS\system32\psvjuhuv.dll
2008-02-05 04:54 . 2008-02-05 04:54 <DIR> d-------- C:\WINDOWS\system32\949193989498979
2008-02-03 16:12 . 2008-02-16 00:37 <DIR> d-------- C:\Program Files\Dot1XCfg
2008-02-03 16:08 . 2008-02-05 23:57 378,880 --a------ C:\WINDOWS\mrofinu72.exe.tmp
2008-02-03 16:08 . 2008-02-03 16:08 270,698 --a------ C:\WINDOWS\system32\L6814.tmp
2008-02-03 16:08 . 2008-02-03 16:08 181,965 --a------ C:\WINDOWS\system32\L50B4.tmp
2008-01-29 21:58 . 2006-02-02 10:07 <DIR> d-------- C:\Documents and Settings\LogMeInRemoteUser\Application Data\ThinkVantage
2008-01-29 21:58 . 2006-01-18 12:34 <DIR> d-------- C:\Documents and Settings\LogMeInRemoteUser\Application Data\Symantec
2008-01-29 21:58 . 2006-01-18 12:30 <DIR> d-------- C:\Documents and Settings\LogMeInRemoteUser\Application Data\IBM
2008-01-29 21:43 . 2008-02-16 00:07 <DIR> d-------- C:\Program Files\LogMeIn
2008-01-29 21:43 . 2007-11-15 18:46 87,352 --a------ C:\WINDOWS\system32\LMIinit.dll.000.bak
2008-01-29 21:43 . 2007-11-15 18:46 87,352 --a------ C:\WINDOWS\system32\LMIinit.dll
2008-01-29 21:43 . 2007-11-15 18:46 83,288 --a------ C:\WINDOWS\system32\LMIRfsClientNP.dll.000.bak
2008-01-29 21:43 . 2007-11-15 18:46 83,288 --a------ C:\WINDOWS\system32\LMIRfsClientNP.dll
2008-01-29 21:43 . 2007-08-03 15:09 46,112 --a------ C:\WINDOWS\system32\drivers\LMIRfsDriver.sys
2008-01-29 21:43 . 2007-11-15 18:46 21,496 --a------ C:\WINDOWS\system32\LMIport.dll
2008-01-29 21:43 . 2008-01-29 21:43 1,024 --a------ C:\.rnd
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-02-16 06:14 --------- d-----w C:\Program Files\Active-Charge
2007-10-05 18:48 0 ----a-w C:\Documents and Settings\Administrator\GoToAssist_phone__317_en.exe
2006-07-26 03:13 50,036 ----a-r C:\WINDOWS\inf\DS2490.sys
2003-06-19 16:05 286,773 ----a-w C:\Program Files\msvcrt.dll
2003-06-19 16:05 1,015,859 ----a-w C:\Program Files\mfc42.dll
1998-05-15 05:00 73,184 ----a-w C:\Program Files\Common Files\dao2535.tlb
1998-04-27 05:00 570,128 ----a-w C:\Program Files\Common Files\Dao350.dll
.
<pre>
----a-w 61,440 2008-02-16 05:23:54 C:\Program Files\Dot1XCfg\Dot1XCfg .exe
----a-w 63,048 2008-02-16 05:26:48 C:\Program Files\LogMeIn\x86\LogMeInSystray .exe
----a-w 2,097,488 2008-02-06 05:03:54 C:\Program Files\Spybot - Search & Destroy\TeaTimer .exe
----a-w 388,608 2008-02-16 05:26:51 C:\WINDOWS\system32\kmd .exe
</pre>
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Mouse Suite 98 Daemon"="ICO.EXE" [2005-04-13 17:34 49152 C:\WINDOWS\system32\ico.exe]
"FBF8FAFFFBFFFE060"="838082878387868.exe" []
C:\Documents and Settings\User\Start Menu\Programs\Startup\
Pizza Director.lnk - C:\ntreskit\SC.EXE [2006-04-07 11:23:23 54032]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LMIinit]
LMIinit.dll 2007-11-15 18:46 87352 C:\WINDOWS\system32\LMIinit.dll
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AMSG]
--a------ 2005-10-05 20:26 487424 C:\Program Files\ThinkVantage\AMSG\Amsg.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\cssauth]
C:\Program Files\IBM ThinkVantage\Client Security Solution\cssauth.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DiskeeperSystray]
C:\Program Files\Diskeeper Corporation\Diskeeper\DkIcon.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HotKeysCmds]
--a------ 2005-06-08 13:59 77824 C:\WINDOWS\system32\hkcmd.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IgfxTray]
--a------ 2005-06-08 14:02 94208 C:\WINDOWS\system32\igfxtray.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LPManager]
--a------ 2005-09-08 04:01 102400 C:\PROGRA~1\THINKV~1\PrdCtr\LPMGR.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Mouse Suite 98 Daemon]
--a------ 2005-04-13 17:34 49152 C:\WINDOWS\system32\ico.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PDService.exe]
C:\Program Files\IBM ThinkVantage\SafeGuard PrivateDisk\pdservice.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Persistence]
--a------ 2005-06-08 14:03 114688 C:\WINDOWS\system32\igfxpers.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMAX]
--a------ 2005-05-06 18:06 716800 C:\Program Files\Analog Devices\SoundMAX\Smax4.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMAXPnP]
--a------ 2005-05-20 12:11 925696 C:\Program Files\Analog Devices\Core\smax4pnp.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\suScheduler]
--a------ 2005-08-01 20:32 40960 C:\Program Files\ThinkVantage\SystemUpdate\UCLauncher.exe
R2 AspenTouch Service;AspenTouch Service;C:\Program Files\Aspen Touch Solutions\Drivers\Touchscreen\UTCServiceApp.exe [2004-10-19 13:05]
R2 FoodTecAppServer;FoodTec AppServer;C:\pdirect\bin\foodtecappserver []
R2 LMIInfo;LogMeIn Kernel Information Provider;C:\Program Files\LogMeIn\x86\RaInfo.sys [2007-08-03 15:09]
R2 LMIRfsDriver;LogMeIn Remote File System Driver;C:\WINDOWS\system32\drivers\LMIRfsDriver.sys [2007-08-03 15:09]
R2 OracleServiceXE;Oracle Service;c:\oracle\bin\oracle.exe XE []
R2 OracleXETNSListener;Oracle Listener;c:\oracle\bin\tnslsnr.exe [2006-02-01 23:49]
R2 PCCharge;PCCharge;C:\NtResKit\SrvAny.exe [2006-04-07 11:23]
R2 r_server;Remote Administrator Service;"C:\WINDOWS\system32\r_server.exe" [2005-06-21 15:16]
R2 TimeServ;Time Service;C:\ntreskit\TimeServ []
R3 pelmouse;Mouse Suite Driver;C:\WINDOWS\system32\DRIVERS\pelmouse.sys [2003-01-10 16:55]
R3 pelusblf;USB Mouse Low Filter Driver;C:\WINDOWS\system32\DRIVERS\pelusblf.sys [2003-02-11 16:25]
R3 TPM12;NSC Integrated Trusted Platform Module 1.2;C:\WINDOWS\system32\DRIVERS\nsctpm12.sys [2005-04-21 18:28]
R3 utcrs232;Aspen Resistive RS232 Touch Controller;C:\WINDOWS\system32\DRIVERS\UtcRs232.sys [2004-07-20 08:03]
S2 FoodTecApp;FoodTec App;C:\pdirect\bin\foodtecapp []
S3 MagEpNt;MagEpNt;C:\WINDOWS\system32\drivers\MagEpNt.sys [1997-06-12 10:53]
.
Contents of the 'Scheduled Tasks' folder
"2008-02-15 09:04:00 C:\WINDOWS\Tasks\nightly.job"
- c:\pdirect\bin\nightly.cmd
.
**************************************************************************
catchme 0.3.1344 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-02-16 01:22:22
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
.
Completion time: 2008-02-16 1:23:20
ComboFix-quarantined-files.txt 2008-02-16 06:22:51
Capital12
2008-02-16, 21:31
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 14:31, on 2008-02-16
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\IPSSVC.EXE
C:\Program Files\Aspen Touch Solutions\Drivers\Touchscreen\UTCServiceApp.exe
C:\Program Files\LogMeIn\x86\RaMaint.exe
C:\Program Files\LogMeIn\x86\LogMeIn.exe
c:\oracle\bin\oracle.exe
c:\oracle\bin\tnslsnr.exe
C:\NtResKit\SrvAny.exe
C:\Program Files\Active-Charge\Active-Charge.exe
C:\WINDOWS\system32\r_server.exe
C:\Program Files\ThinkVantage\SystemUpdate\UCLauncherService.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ICO.EXE
C:\WINDOWS\system32\FSRremoS.EXE
C:\WINDOWS\system32\Pelmiced.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Trend Micro\HijackThis\Capital12.exe
O1 - Hosts: 205.1.1.1 DBSERVER
O1 - Hosts: 205.1.1.2 TERM_A
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O4 - HKLM\..\Run: [Mouse Suite 98 Daemon] ICO.EXE
O4 - HKLM\..\Run: [FBF8FAFFFBFFFE060] 838082878387868.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\IBM\Java142\jre\bin\NPJPI142.dll
O9 - Extra 'Tools' menuitem: IBM Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\IBM\Java142\jre\bin\NPJPI142.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O11 - Options group: [JAVA_IBM] Java (IBM)
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} (Performance Viewer Activex Control) - https://secure.logmein.com/activex/ractrl.cab?lmi=100
O17 - HKLM\System\CCS\Services\Tcpip\..\{5A752C58-F30D-4CC8-ABCE-5DDA2856F45C}: NameServer = 205.1.1.100,167.206.3.137,167.206.3.136,167.206.3.203
O23 - Service: AspenTouch Service - Aspen Touch Solutions, Inc. - C:\Program Files\Aspen Touch Solutions\Drivers\Touchscreen\UTCServiceApp.exe
O23 - Service: FoodTec App (FoodTecApp) - Unknown owner - C:\pdirect\bin\foodtecapp (file missing)
O23 - Service: FoodTec AppServer (FoodTecAppServer) - Unknown owner - C:\pdirect\bin\foodtecappserver (file missing)
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: IPS Core Service (IPSSVC) - Lenovo Ltd. - C:\WINDOWS\system32\IPSSVC.EXE
O23 - Service: LogMeIn Maintenance Service (LMIMaint) - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\RaMaint.exe
O23 - Service: LogMeIn - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\LogMeIn.exe
O23 - Service: Oracle Service (OracleServiceXE) - Oracle Corporation - c:\oracle\bin\oracle.exe
O23 - Service: Oracle Listener (OracleXETNSListener) - Unknown owner - c:\oracle\bin\tnslsnr.exe
O23 - Service: PCCharge - Unknown owner - C:\NtResKit\SrvAny.exe
O23 - Service: Remote Administrator Service (r_server) - Unknown owner - C:\WINDOWS\system32\r_server.exe
O23 - Service: Time Service (TimeServ) - Unknown owner - C:\ntreskit\TimeServ (file missing)
O23 - Service: ThinkVantage System Update (UCLauncherService) - Unknown owner - C:\Program Files\ThinkVantage\SystemUpdate\UCLauncherService.exe
--
End of file - 4329 bytes
Hi
Unfortunately you didn't.
You are not supposed to doubleclick combofix.exe in order to run it.
You are supposed to create cfscript as instructed above and drag & drop it into combofix.
Please follow my previous instructions word by word
and you should have no problems doing it right :)
Capital12
2008-02-18, 04:54
Ok Shaba, I apologize. i think i did it right this time. Here are the logs as requested: I am still receiving that windows error msg after bootup that i stated before. A million thanks. The computer is running better now.
ComboFix 08-02-14.2 - Administrator 2008-02-17 21:28:53.5 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.440 [GMT -5:00]
Running from: C:\Documents and Settings\Administrator.DBSERVER.001\Desktop\ComboFix.exe
WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.
((((((((((((((((((((((((( Files Created from 2008-01-18 to 2008-02-18 )))))))))))))))))))))))))))))))
.
2008-02-14 23:05 . 2008-02-16 00:14 6,112 --a------ C:\WINDOWS\BM5fae4a91.xml
2008-02-14 23:05 . 2008-02-16 00:33 21 --a------ C:\WINDOWS\pskt.ini
2008-02-13 22:54 . 2008-02-13 22:54 340,992 --a------ C:\WINDOWS\system32\RCX11F.tmp
2008-02-10 19:41 . 2006-02-02 10:07 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.001\Application Data\ThinkVantage
2008-02-10 19:41 . 2006-01-18 12:34 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.001\Application Data\Symantec
2008-02-10 19:41 . 2006-01-18 12:30 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.001\Application Data\IBM
2008-02-10 10:30 . 2008-02-10 10:30 340,992 --a------ C:\WINDOWS\system32\RCX191.tmp
2008-02-10 09:09 . 2006-02-02 10:07 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.000\Application Data\ThinkVantage
2008-02-10 09:09 . 2006-01-18 12:34 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.000\Application Data\Symantec
2008-02-10 09:09 . 2006-01-18 12:30 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.000\Application Data\IBM
2008-02-09 22:54 . 2008-02-09 22:54 <DIR> d-------- C:\Program Files\Trend Micro
2008-02-09 22:34 . 2008-02-09 22:34 <DIR> d-------- C:\WINDOWS\system32\Kaspersky Lab
2008-02-09 22:34 . 2008-02-09 22:34 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
2008-02-06 21:34 . 2006-02-02 10:07 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER\Application Data\ThinkVantage
2008-02-06 21:34 . 2006-01-18 12:34 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER\Application Data\Symantec
2008-02-06 21:34 . 2006-01-18 12:30 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER\Application Data\IBM
2008-02-05 23:52 . 2004-08-04 08:00 221,184 --a------ C:\WINDOWS\system32\wmpns.dll
2008-02-05 22:49 . 2008-02-13 22:53 1,416 --a------ C:\WINDOWS\wininit.ini
2008-02-05 21:49 . 2008-02-16 14:12 <DIR> d-------- C:\Program Files\Spybot - Search & Destroy
2008-02-05 21:49 . 2008-02-05 22:14 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2008-02-05 16:23 . 2008-02-05 16:23 90,688 --a------ C:\WINDOWS\system32\laeaecld.dll
2008-02-05 16:20 . 2008-02-05 16:20 90,688 --a------ C:\WINDOWS\system32\psvjuhuv.dll
2008-02-05 04:54 . 2008-02-05 04:54 <DIR> d-------- C:\WINDOWS\system32\949193989498979
2008-02-03 16:12 . 2008-02-16 00:37 <DIR> d-------- C:\Program Files\Dot1XCfg
2008-02-03 16:08 . 2008-02-05 23:57 378,880 --a------ C:\WINDOWS\mrofinu72.exe.tmp
2008-02-03 16:08 . 2008-02-03 16:08 270,698 --a------ C:\WINDOWS\system32\L6814.tmp
2008-02-03 16:08 . 2008-02-03 16:08 181,965 --a------ C:\WINDOWS\system32\L50B4.tmp
2008-01-29 21:58 . 2006-02-02 10:07 <DIR> d-------- C:\Documents and Settings\LogMeInRemoteUser\Application Data\ThinkVantage
2008-01-29 21:58 . 2006-01-18 12:34 <DIR> d-------- C:\Documents and Settings\LogMeInRemoteUser\Application Data\Symantec
2008-01-29 21:58 . 2006-01-18 12:30 <DIR> d-------- C:\Documents and Settings\LogMeInRemoteUser\Application Data\IBM
2008-01-29 21:43 . 2008-02-17 21:28 <DIR> d-------- C:\Program Files\LogMeIn
2008-01-29 21:43 . 2007-11-15 18:46 87,352 --a------ C:\WINDOWS\system32\LMIinit.dll.000.bak
2008-01-29 21:43 . 2007-11-15 18:46 87,352 --a------ C:\WINDOWS\system32\LMIinit.dll
2008-01-29 21:43 . 2007-11-15 18:46 83,288 --a------ C:\WINDOWS\system32\LMIRfsClientNP.dll.000.bak
2008-01-29 21:43 . 2007-11-15 18:46 83,288 --a------ C:\WINDOWS\system32\LMIRfsClientNP.dll
2008-01-29 21:43 . 2007-08-03 15:09 46,112 --a------ C:\WINDOWS\system32\drivers\LMIRfsDriver.sys
2008-01-29 21:43 . 2007-11-15 18:46 21,496 --a------ C:\WINDOWS\system32\LMIport.dll
2008-01-29 21:43 . 2008-01-29 21:43 1,024 --a------ C:\.rnd
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-02-18 02:16 --------- d-----w C:\Program Files\Active-Charge
2007-10-05 18:48 0 ----a-w C:\Documents and Settings\Administrator\GoToAssist_phone__317_en.exe
2006-07-26 03:13 50,036 ----a-r C:\WINDOWS\inf\DS2490.sys
2003-06-19 16:05 286,773 ----a-w C:\Program Files\msvcrt.dll
2003-06-19 16:05 1,015,859 ----a-w C:\Program Files\mfc42.dll
1998-05-15 05:00 73,184 ----a-w C:\Program Files\Common Files\dao2535.tlb
1998-04-27 05:00 570,128 ----a-w C:\Program Files\Common Files\Dao350.dll
.
<pre>
----a-w 61,440 2008-02-16 05:23:54 C:\Program Files\Dot1XCfg\Dot1XCfg .exe
</pre>
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Mouse Suite 98 Daemon"="ICO.EXE" [2005-04-13 17:34 49152 C:\WINDOWS\system32\ico.exe]
"FBF8FAFFFBFFFE060"="838082878387868.exe" []
C:\Documents and Settings\User\Start Menu\Programs\Startup\
Pizza Director.lnk - C:\ntreskit\SC.EXE [2006-04-07 11:23:23 54032]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LMIinit]
LMIinit.dll 2007-11-15 18:46 87352 C:\WINDOWS\system32\LMIinit.dll
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AMSG]
--a------ 2005-10-05 20:26 487424 C:\Program Files\ThinkVantage\AMSG\Amsg.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\cssauth]
C:\Program Files\IBM ThinkVantage\Client Security Solution\cssauth.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DiskeeperSystray]
C:\Program Files\Diskeeper Corporation\Diskeeper\DkIcon.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HotKeysCmds]
--a------ 2005-06-08 13:59 77824 C:\WINDOWS\system32\hkcmd.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IgfxTray]
--a------ 2005-06-08 14:02 94208 C:\WINDOWS\system32\igfxtray.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LPManager]
--a------ 2005-09-08 04:01 102400 C:\PROGRA~1\THINKV~1\PrdCtr\LPMGR.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Mouse Suite 98 Daemon]
--a------ 2005-04-13 17:34 49152 C:\WINDOWS\system32\ico.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PDService.exe]
C:\Program Files\IBM ThinkVantage\SafeGuard PrivateDisk\pdservice.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Persistence]
--a------ 2005-06-08 14:03 114688 C:\WINDOWS\system32\igfxpers.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMAX]
--a------ 2005-05-06 18:06 716800 C:\Program Files\Analog Devices\SoundMAX\Smax4.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMAXPnP]
--a------ 2005-05-20 12:11 925696 C:\Program Files\Analog Devices\Core\smax4pnp.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\suScheduler]
--a------ 2005-08-01 20:32 40960 C:\Program Files\ThinkVantage\SystemUpdate\UCLauncher.exe
R2 AspenTouch Service;AspenTouch Service;C:\Program Files\Aspen Touch Solutions\Drivers\Touchscreen\UTCServiceApp.exe [2004-10-19 13:05]
R2 FoodTecAppServer;FoodTec AppServer;C:\pdirect\bin\foodtecappserver []
R2 LMIInfo;LogMeIn Kernel Information Provider;C:\Program Files\LogMeIn\x86\RaInfo.sys [2007-08-03 15:09]
R2 LMIRfsDriver;LogMeIn Remote File System Driver;C:\WINDOWS\system32\drivers\LMIRfsDriver.sys [2007-08-03 15:09]
R2 OracleServiceXE;Oracle Service;c:\oracle\bin\oracle.exe XE []
R2 OracleXETNSListener;Oracle Listener;c:\oracle\bin\tnslsnr.exe [2006-02-01 23:49]
R2 PCCharge;PCCharge;C:\NtResKit\SrvAny.exe [2006-04-07 11:23]
R2 r_server;Remote Administrator Service;"C:\WINDOWS\system32\r_server.exe" [2005-06-21 15:16]
R2 TimeServ;Time Service;C:\ntreskit\TimeServ []
R3 pelmouse;Mouse Suite Driver;C:\WINDOWS\system32\DRIVERS\pelmouse.sys [2003-01-10 16:55]
R3 pelusblf;USB Mouse Low Filter Driver;C:\WINDOWS\system32\DRIVERS\pelusblf.sys [2003-02-11 16:25]
R3 TPM12;NSC Integrated Trusted Platform Module 1.2;C:\WINDOWS\system32\DRIVERS\nsctpm12.sys [2005-04-21 18:28]
R3 utcrs232;Aspen Resistive RS232 Touch Controller;C:\WINDOWS\system32\DRIVERS\UtcRs232.sys [2004-07-20 08:03]
S2 FoodTecApp;FoodTec App;C:\pdirect\bin\foodtecapp []
S3 MagEpNt;MagEpNt;C:\WINDOWS\system32\drivers\MagEpNt.sys [1997-06-12 10:53]
.
Contents of the 'Scheduled Tasks' folder
"2008-02-17 09:01:18 C:\WINDOWS\Tasks\nightly.job"
- c:\pdirect\bin\nightly.cmd
.
**************************************************************************
catchme 0.3.1344 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-02-17 21:30:31
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
.
Completion time: 2008-02-17 21:31:31
ComboFix-quarantined-files.txt 2008-02-18 02:31:03
ComboFix2.txt 2008-02-16 06:23:20
Capital12
2008-02-18, 04:57
Also, Does this look suspicious at all to you?
O4 - HKLM\..\Run: [FBF8FAFFFBFFFE060] 838082878387868.exe
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 9:54:40 PM, on 2/17/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\IPSSVC.EXE
C:\Program Files\Aspen Touch Solutions\Drivers\Touchscreen\UTCServiceApp.exe
C:\Program Files\LogMeIn\x86\RaMaint.exe
C:\Program Files\LogMeIn\x86\LogMeIn.exe
c:\oracle\bin\oracle.exe
c:\oracle\bin\tnslsnr.exe
C:\NtResKit\SrvAny.exe
C:\Program Files\Active-Charge\Active-Charge.exe
C:\WINDOWS\system32\r_server.exe
C:\Program Files\ThinkVantage\SystemUpdate\UCLauncherService.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ICO.EXE
C:\WINDOWS\system32\FSRremoS.EXE
C:\WINDOWS\system32\Pelmiced.exe
C:\Program Files\internet explorer\iexplore.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\Trend Micro\HijackThis\Capital12.exe
O1 - Hosts: 205.1.1.1 DBSERVER
O1 - Hosts: 205.1.1.2 TERM_A
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O4 - HKLM\..\Run: [Mouse Suite 98 Daemon] ICO.EXE
O4 - HKLM\..\Run: [FBF8FAFFFBFFFE060] 838082878387868.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\IBM\Java142\jre\bin\NPJPI142.dll
O9 - Extra 'Tools' menuitem: IBM Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\IBM\Java142\jre\bin\NPJPI142.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O11 - Options group: [JAVA_IBM] Java (IBM)
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} (Performance Viewer Activex Control) - https://secure.logmein.com/activex/ractrl.cab?lmi=100
O17 - HKLM\System\CCS\Services\Tcpip\..\{5A752C58-F30D-4CC8-ABCE-5DDA2856F45C}: NameServer = 205.1.1.100,167.206.3.137,167.206.3.136,167.206.3.203
O23 - Service: AspenTouch Service - Aspen Touch Solutions, Inc. - C:\Program Files\Aspen Touch Solutions\Drivers\Touchscreen\UTCServiceApp.exe
O23 - Service: FoodTec App (FoodTecApp) - Unknown owner - C:\pdirect\bin\foodtecapp (file missing)
O23 - Service: FoodTec AppServer (FoodTecAppServer) - Unknown owner - C:\pdirect\bin\foodtecappserver (file missing)
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: IPS Core Service (IPSSVC) - Lenovo Ltd. - C:\WINDOWS\system32\IPSSVC.EXE
O23 - Service: LogMeIn Maintenance Service (LMIMaint) - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\RaMaint.exe
O23 - Service: LogMeIn - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\LogMeIn.exe
O23 - Service: Oracle Service (OracleServiceXE) - Oracle Corporation - c:\oracle\bin\oracle.exe
O23 - Service: Oracle Listener (OracleXETNSListener) - Unknown owner - c:\oracle\bin\tnslsnr.exe
O23 - Service: PCCharge - Unknown owner - C:\NtResKit\SrvAny.exe
O23 - Service: Remote Administrator Service (r_server) - Unknown owner - C:\WINDOWS\system32\r_server.exe
O23 - Service: Time Service (TimeServ) - Unknown owner - C:\ntreskit\TimeServ (file missing)
O23 - Service: ThinkVantage System Update (UCLauncherService) - Unknown owner - C:\Program Files\ThinkVantage\SystemUpdate\UCLauncherService.exe
--
End of file - 4366 bytes
Hi
Yes, that is infection leftover.
Still not right.
But we try something else.
Open HijackThis, click do a system scan only and checkmark this:
O4 - HKLM\..\Run: [FBF8FAFFFBFFFE060] 838082878387868.exe
Close all windows including browser and press fix checked.
Reboot.
Please download the OTMoveIt2 by OldTimer (http://download.bleepingcomputer.com/oldtimer/OTMoveIt2.exe).
Save it to your desktop.
Please double-click OTMoveIt2.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):
C:\WINDOWS\system32\RCX11F.tmp
C:\WINDOWS\system32\RCX191.tmp
C:\WINDOWS\system32\laeaecld.dll
C:\WINDOWS\system32\psvjuhuv.dll
C:\WINDOWS\system32\L6814.tmp
C:\WINDOWS\system32\L50B4.tmp
C:\Program Files\Dot1XCfg
C:\WINDOWS\system32\949193989498979
Return to OTMoveIt2, right click in the "Paste Standard List of Files/Folders to Move" window (under the light blue bar) and choose Paste.
Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):
Click the red Moveit! button.
Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
Close OTMoveIt2
Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTMoveIt\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.
Re-run combofix.
Post:
- a fresh HijackThis log
- combofix report
- otmoveit2 log
Capital12
2008-02-19, 04:38
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 9:38:14 PM, on 2/18/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\IPSSVC.EXE
C:\Program Files\Aspen Touch Solutions\Drivers\Touchscreen\UTCServiceApp.exe
C:\Program Files\LogMeIn\x86\RaMaint.exe
C:\Program Files\LogMeIn\x86\LogMeIn.exe
c:\oracle\bin\oracle.exe
c:\oracle\bin\tnslsnr.exe
C:\NtResKit\SrvAny.exe
C:\Program Files\Active-Charge\Active-Charge.exe
C:\WINDOWS\system32\r_server.exe
C:\Program Files\ThinkVantage\SystemUpdate\UCLauncherService.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ICO.EXE
C:\WINDOWS\system32\FSRremoS.EXE
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\WINDOWS\system32\Pelmiced.exe
C:\Program Files\internet explorer\iexplore.exe
C:\WINDOWS\system32\notepad.exe
C:\Program Files\Trend Micro\HijackThis\Capital12.exe
O1 - Hosts: 205.1.1.1 DBSERVER
O1 - Hosts: 205.1.1.2 TERM_A
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O4 - HKLM\..\Run: [Mouse Suite 98 Daemon] ICO.EXE
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\IBM\Java142\jre\bin\NPJPI142.dll
O9 - Extra 'Tools' menuitem: IBM Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\IBM\Java142\jre\bin\NPJPI142.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O11 - Options group: [JAVA_IBM] Java (IBM)
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} (Performance Viewer Activex Control) - https://secure.logmein.com/activex/ractrl.cab?lmi=100
O17 - HKLM\System\CCS\Services\Tcpip\..\{5A752C58-F30D-4CC8-ABCE-5DDA2856F45C}: NameServer = 205.1.1.100,167.206.3.137,167.206.3.136,167.206.3.203
O23 - Service: AspenTouch Service - Aspen Touch Solutions, Inc. - C:\Program Files\Aspen Touch Solutions\Drivers\Touchscreen\UTCServiceApp.exe
O23 - Service: FoodTec App (FoodTecApp) - Unknown owner - C:\pdirect\bin\foodtecapp (file missing)
O23 - Service: FoodTec AppServer (FoodTecAppServer) - Unknown owner - C:\pdirect\bin\foodtecappserver (file missing)
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: IPS Core Service (IPSSVC) - Lenovo Ltd. - C:\WINDOWS\system32\IPSSVC.EXE
O23 - Service: LogMeIn Maintenance Service (LMIMaint) - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\RaMaint.exe
O23 - Service: LogMeIn - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\LogMeIn.exe
O23 - Service: Oracle Service (OracleServiceXE) - Oracle Corporation - c:\oracle\bin\oracle.exe
O23 - Service: Oracle Listener (OracleXETNSListener) - Unknown owner - c:\oracle\bin\tnslsnr.exe
O23 - Service: PCCharge - Unknown owner - C:\NtResKit\SrvAny.exe
O23 - Service: Remote Administrator Service (r_server) - Unknown owner - C:\WINDOWS\system32\r_server.exe
O23 - Service: Time Service (TimeServ) - Unknown owner - C:\ntreskit\TimeServ (file missing)
O23 - Service: ThinkVantage System Update (UCLauncherService) - Unknown owner - C:\Program Files\ThinkVantage\SystemUpdate\UCLauncherService.exe
--
End of file - 4364 bytes
Capital12
2008-02-19, 04:40
File/Folder xcode] not found.
C:\WINDOWS\system32\RCX11F.tmp moved successfully.
C:\WINDOWS\system32\RCX191.tmp moved successfully.
DllUnregisterServer procedure not found in C:\WINDOWS\system32\laeaecld.dll
C:\WINDOWS\system32\laeaecld.dll NOT unregistered.
C:\WINDOWS\system32\laeaecld.dll moved successfully.
DllUnregisterServer procedure not found in C:\WINDOWS\system32\psvjuhuv.dll
C:\WINDOWS\system32\psvjuhuv.dll NOT unregistered.
C:\WINDOWS\system32\psvjuhuv.dll moved successfully.
C:\WINDOWS\system32\L6814.tmp moved successfully.
C:\WINDOWS\system32\L50B4.tmp moved successfully.
C:\Program Files\Dot1XCfg moved successfully.
C:\WINDOWS\system32\949193989498979 moved successfully.
File/Folder [/xcode] not found.
OTMoveIt2 v1.0.20 log created on 02182008_212216
ComboFix 08-02-14.2 - Administrator 2008-02-18 21:24:35.6 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.523 [GMT -5:00]
Running from: C:\Documents and Settings\Administrator.DBSERVER.001\Desktop\ComboFix.exe
WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.
((((((((((((((((((((((((( Files Created from 2008-01-19 to 2008-02-19 )))))))))))))))))))))))))))))))
.
2008-02-18 21:22 . 2008-02-18 21:22 <DIR> d-------- C:\_OTMoveIt
2008-02-14 23:05 . 2008-02-16 00:14 6,112 --a------ C:\WINDOWS\BM5fae4a91.xml
2008-02-14 23:05 . 2008-02-16 00:33 21 --a------ C:\WINDOWS\pskt.ini
2008-02-10 19:41 . 2006-02-02 10:07 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.001\Application Data\ThinkVantage
2008-02-10 19:41 . 2006-01-18 12:34 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.001\Application Data\Symantec
2008-02-10 19:41 . 2006-01-18 12:30 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.001\Application Data\IBM
2008-02-10 09:09 . 2006-02-02 10:07 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.000\Application Data\ThinkVantage
2008-02-10 09:09 . 2006-01-18 12:34 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.000\Application Data\Symantec
2008-02-10 09:09 . 2006-01-18 12:30 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER.000\Application Data\IBM
2008-02-09 22:54 . 2008-02-09 22:54 <DIR> d-------- C:\Program Files\Trend Micro
2008-02-09 22:34 . 2008-02-09 22:34 <DIR> d-------- C:\WINDOWS\system32\Kaspersky Lab
2008-02-09 22:34 . 2008-02-09 22:34 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
2008-02-06 21:34 . 2006-02-02 10:07 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER\Application Data\ThinkVantage
2008-02-06 21:34 . 2006-01-18 12:34 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER\Application Data\Symantec
2008-02-06 21:34 . 2006-01-18 12:30 <DIR> d-------- C:\Documents and Settings\Administrator.DBSERVER\Application Data\IBM
2008-02-05 23:52 . 2004-08-04 08:00 221,184 --a------ C:\WINDOWS\system32\wmpns.dll
2008-02-05 22:49 . 2008-02-13 22:53 1,416 --a------ C:\WINDOWS\wininit.ini
2008-02-05 21:49 . 2008-02-16 14:12 <DIR> d-------- C:\Program Files\Spybot - Search & Destroy
2008-02-05 21:49 . 2008-02-05 22:14 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2008-02-03 16:08 . 2008-02-05 23:57 378,880 --a------ C:\WINDOWS\mrofinu72.exe.tmp
2008-01-29 21:58 . 2006-02-02 10:07 <DIR> d-------- C:\Documents and Settings\LogMeInRemoteUser\Application Data\ThinkVantage
2008-01-29 21:58 . 2006-01-18 12:34 <DIR> d-------- C:\Documents and Settings\LogMeInRemoteUser\Application Data\Symantec
2008-01-29 21:58 . 2006-01-18 12:30 <DIR> d-------- C:\Documents and Settings\LogMeInRemoteUser\Application Data\IBM
2008-01-29 21:43 . 2008-02-18 21:08 <DIR> d-------- C:\Program Files\LogMeIn
2008-01-29 21:43 . 2007-11-15 18:46 87,352 --a------ C:\WINDOWS\system32\LMIinit.dll.000.bak
2008-01-29 21:43 . 2007-11-15 18:46 87,352 --a------ C:\WINDOWS\system32\LMIinit.dll
2008-01-29 21:43 . 2007-11-15 18:46 83,288 --a------ C:\WINDOWS\system32\LMIRfsClientNP.dll.000.bak
2008-01-29 21:43 . 2007-11-15 18:46 83,288 --a------ C:\WINDOWS\system32\LMIRfsClientNP.dll
2008-01-29 21:43 . 2007-08-03 15:09 46,112 --a------ C:\WINDOWS\system32\drivers\LMIRfsDriver.sys
2008-01-29 21:43 . 2007-11-15 18:46 21,496 --a------ C:\WINDOWS\system32\LMIport.dll
2008-01-29 21:43 . 2008-01-29 21:43 1,024 --a------ C:\.rnd
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-02-19 02:10 --------- d-----w C:\Program Files\Active-Charge
2007-10-05 18:48 0 ----a-w C:\Documents and Settings\Administrator\GoToAssist_phone__317_en.exe
2006-07-26 03:13 50,036 ----a-r C:\WINDOWS\inf\DS2490.sys
2003-06-19 16:05 286,773 ----a-w C:\Program Files\msvcrt.dll
2003-06-19 16:05 1,015,859 ----a-w C:\Program Files\mfc42.dll
1998-05-15 05:00 73,184 ----a-w C:\Program Files\Common Files\dao2535.tlb
1998-04-27 05:00 570,128 ----a-w C:\Program Files\Common Files\Dao350.dll
.
<pre>
----a-w 61,440 2008-02-16 05:23:54 C:\_OTMoveIt\MovedFiles\02182008_212216\Program Files\Dot1XCfg\Dot1XCfg .exe
</pre>
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Mouse Suite 98 Daemon"="ICO.EXE" [2005-04-13 17:34 49152 C:\WINDOWS\system32\ico.exe]
C:\Documents and Settings\User\Start Menu\Programs\Startup\
Pizza Director.lnk - C:\ntreskit\SC.EXE [2006-04-07 11:23:23 54032]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LMIinit]
LMIinit.dll 2007-11-15 18:46 87352 C:\WINDOWS\system32\LMIinit.dll
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AMSG]
--a------ 2005-10-05 20:26 487424 C:\Program Files\ThinkVantage\AMSG\Amsg.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\cssauth]
C:\Program Files\IBM ThinkVantage\Client Security Solution\cssauth.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DiskeeperSystray]
C:\Program Files\Diskeeper Corporation\Diskeeper\DkIcon.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HotKeysCmds]
--a------ 2005-06-08 13:59 77824 C:\WINDOWS\system32\hkcmd.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IgfxTray]
--a------ 2005-06-08 14:02 94208 C:\WINDOWS\system32\igfxtray.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LPManager]
--a------ 2005-09-08 04:01 102400 C:\PROGRA~1\THINKV~1\PrdCtr\LPMGR.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Mouse Suite 98 Daemon]
--a------ 2005-04-13 17:34 49152 C:\WINDOWS\system32\ico.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PDService.exe]
C:\Program Files\IBM ThinkVantage\SafeGuard PrivateDisk\pdservice.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Persistence]
--a------ 2005-06-08 14:03 114688 C:\WINDOWS\system32\igfxpers.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMAX]
--a------ 2005-05-06 18:06 716800 C:\Program Files\Analog Devices\SoundMAX\Smax4.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMAXPnP]
--a------ 2005-05-20 12:11 925696 C:\Program Files\Analog Devices\Core\smax4pnp.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\suScheduler]
--a------ 2005-08-01 20:32 40960 C:\Program Files\ThinkVantage\SystemUpdate\UCLauncher.exe
R2 AspenTouch Service;AspenTouch Service;C:\Program Files\Aspen Touch Solutions\Drivers\Touchscreen\UTCServiceApp.exe [2004-10-19 13:05]
R2 FoodTecAppServer;FoodTec AppServer;C:\pdirect\bin\foodtecappserver []
R2 LMIInfo;LogMeIn Kernel Information Provider;C:\Program Files\LogMeIn\x86\RaInfo.sys [2007-08-03 15:09]
R2 LMIRfsDriver;LogMeIn Remote File System Driver;C:\WINDOWS\system32\drivers\LMIRfsDriver.sys [2007-08-03 15:09]
R2 OracleServiceXE;Oracle Service;c:\oracle\bin\oracle.exe XE []
R2 OracleXETNSListener;Oracle Listener;c:\oracle\bin\tnslsnr.exe [2006-02-01 23:49]
R2 PCCharge;PCCharge;C:\NtResKit\SrvAny.exe [2006-04-07 11:23]
R2 r_server;Remote Administrator Service;"C:\WINDOWS\system32\r_server.exe" [2005-06-21 15:16]
R2 TimeServ;Time Service;C:\ntreskit\TimeServ []
R3 pelmouse;Mouse Suite Driver;C:\WINDOWS\system32\DRIVERS\pelmouse.sys [2003-01-10 16:55]
R3 pelusblf;USB Mouse Low Filter Driver;C:\WINDOWS\system32\DRIVERS\pelusblf.sys [2003-02-11 16:25]
R3 TPM12;NSC Integrated Trusted Platform Module 1.2;C:\WINDOWS\system32\DRIVERS\nsctpm12.sys [2005-04-21 18:28]
R3 utcrs232;Aspen Resistive RS232 Touch Controller;C:\WINDOWS\system32\DRIVERS\UtcRs232.sys [2004-07-20 08:03]
S2 FoodTecApp;FoodTec App;C:\pdirect\bin\foodtecapp []
S3 MagEpNt;MagEpNt;C:\WINDOWS\system32\drivers\MagEpNt.sys [1997-06-12 10:53]
.
Contents of the 'Scheduled Tasks' folder
"2008-02-18 09:00:35 C:\WINDOWS\Tasks\nightly.job"
- c:\pdirect\bin\nightly.cmd
.
**************************************************************************
catchme 0.3.1344 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-02-18 21:26:16
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
.
Completion time: 2008-02-18 21:27:08
ComboFix-quarantined-files.txt 2008-02-19 02:26:47
ComboFix2.txt 2008-02-18 02:31:32
ComboFix3.txt 2008-02-16 06:23:20
Hi
Please download ATF Cleaner by Atribune (http://www.atribune.org/ccount/click.php?id=1) and save
it to desktop.
Double-click ATF-Cleaner.exe to run the program.
Under Main choose: Select All
Click the Empty Selected button.
If you use Firefox browser
Click Firefox at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browser
Click Opera at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
Click Exit to close ATF-Cleaner.
Re-scan with kaspersky.
Post:
- a fresh HijackThis log
- kaspersky report
Capital12
2008-02-19, 19:25
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:23:24 PM, on 2/19/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\IPSSVC.EXE
C:\Program Files\Aspen Touch Solutions\Drivers\Touchscreen\UTCServiceApp.exe
C:\Program Files\LogMeIn\x86\RaMaint.exe
C:\Program Files\LogMeIn\x86\LogMeIn.exe
c:\oracle\bin\oracle.exe
c:\oracle\bin\tnslsnr.exe
C:\NtResKit\SrvAny.exe
C:\Program Files\Active-Charge\Active-Charge.exe
C:\WINDOWS\system32\r_server.exe
C:\Program Files\ThinkVantage\SystemUpdate\UCLauncherService.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ICO.EXE
C:\WINDOWS\system32\FSRremoS.EXE
C:\WINDOWS\system32\Pelmiced.exe
C:\Program Files\internet explorer\iexplore.exe
C:\Program Files\LogMeIn\x86\LogMeIn.exe
C:\Program Files\Trend Micro\HijackThis\Capital12.exe
O1 - Hosts: 205.1.1.1 DBSERVER
O1 - Hosts: 205.1.1.2 TERM_A
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O4 - HKLM\..\Run: [Mouse Suite 98 Daemon] ICO.EXE
O4 - HKUS\S-1-5-21-2821431653-2996998366-2724477760-1007\..\RunOnce: [configmsi] cmd /c "rmdir /q C:\config.msi" (User 'LogMeInRemoteUser')
O4 - HKUS\S-1-5-21-2821431653-2996998366-2724477760-1007\..\RunOnce: [supportdir] cmd /c "rmdir /q /s "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\{BF90215F-2D7B-4C84-8A24-A03BC41B95DD}"" (User 'LogMeInRemoteUser')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\IBM\Java142\jre\bin\NPJPI142.dll
O9 - Extra 'Tools' menuitem: IBM Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\IBM\Java142\jre\bin\NPJPI142.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O11 - Options group: [JAVA_IBM] Java (IBM)
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} (Performance Viewer Activex Control) - https://secure.logmein.com/activex/ractrl.cab?lmi=100
O17 - HKLM\System\CCS\Services\Tcpip\..\{5A752C58-F30D-4CC8-ABCE-5DDA2856F45C}: NameServer = 205.1.1.100,167.206.3.137,167.206.3.136,167.206.3.203
O23 - Service: AspenTouch Service - Aspen Touch Solutions, Inc. - C:\Program Files\Aspen Touch Solutions\Drivers\Touchscreen\UTCServiceApp.exe
O23 - Service: FoodTec App (FoodTecApp) - Unknown owner - C:\pdirect\bin\foodtecapp (file missing)
O23 - Service: FoodTec AppServer (FoodTecAppServer) - Unknown owner - C:\pdirect\bin\foodtecappserver (file missing)
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: IPS Core Service (IPSSVC) - Lenovo Ltd. - C:\WINDOWS\system32\IPSSVC.EXE
O23 - Service: LogMeIn Maintenance Service (LMIMaint) - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\RaMaint.exe
O23 - Service: LogMeIn - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\LogMeIn.exe
O23 - Service: Oracle Service (OracleServiceXE) - Oracle Corporation - c:\oracle\bin\oracle.exe
O23 - Service: Oracle Listener (OracleXETNSListener) - Unknown owner - c:\oracle\bin\tnslsnr.exe
O23 - Service: PCCharge - Unknown owner - C:\NtResKit\SrvAny.exe
O23 - Service: Remote Administrator Service (r_server) - Unknown owner - C:\WINDOWS\system32\r_server.exe
O23 - Service: Time Service (TimeServ) - Unknown owner - C:\ntreskit\TimeServ (file missing)
O23 - Service: ThinkVantage System Update (UCLauncherService) - Unknown owner - C:\Program Files\ThinkVantage\SystemUpdate\UCLauncherService.exe
--
End of file - 4665 bytes
Capital12
2008-02-19, 19:31
-------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER REPORT
Tuesday, February 19, 2008 12:22:52 PM
Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 19/02/2008
Kaspersky Anti-Virus database records: 573113
-------------------------------------------------------------------------------
Scan Settings:
Scan using the following antivirus database: extended
Scan Archives: true
Scan Mail Bases: true
Scan Target - My Computer:
A:\
C:\
D:\
Scan Statistics:
Total number of scanned objects: 45166
Number of viruses found: 31
Number of infected objects: 241
Number of suspicious objects: 2
Duration of the scan process: 01:53:55
Infected Object Name / Virus Name / Last Action
C:\db\pdir\bdump\xe_arc0_2688.trc Object is locked skipped
C:\db\pdir\bdump\xe_arc1_2692.trc Object is locked skipped
C:\db\pdir\CTL1.CTL Object is locked skipped
C:\db\pdir\CTL2.CTL Object is locked skipped
C:\db\pdir\INDEX1.DBF Object is locked skipped
C:\db\pdir\LOG1.LOG Object is locked skipped
C:\db\pdir\LOG2.LOG Object is locked skipped
C:\db\pdir\LOG3.LOG Object is locked skipped
C:\db\pdir\SYSAUX.DBF Object is locked skipped
C:\db\pdir\SYSTEM.DBF Object is locked skipped
C:\db\pdir\TEMP.DBF Object is locked skipped
C:\db\pdir\UNDO.DBF Object is locked skipped
C:\db\pdir\USR1.DBF Object is locked skipped
C:\db\pdir\USR2.DBF Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\Temp\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\Temp\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\Temp\History\History.IE5\MSHist012008021920080220\index.dat Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\Temp\hsperfdata_Administrator\3232 Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\Temp\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\Administrator.DBSERVER.001\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC.zip/MTE3MTk6ODoxNg.exe Suspicious: Password-protected-EXE skipped
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC.zip ZIP: suspicious - 1 skipped
C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\LogMeInRemoteUser\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LogMeInRemoteUser\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LogMeInRemoteUser\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LogMeInRemoteUser\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
C:\DRIVERS\Radmin_2.1\RADMIN21.EXE/AdmDll.dll Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.20 skipped
C:\DRIVERS\Radmin_2.1\RADMIN21.EXE/raddrv.dll Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.20 skipped
C:\DRIVERS\Radmin_2.1\RADMIN21.EXE/radmin.exe Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.21 skipped
C:\DRIVERS\Radmin_2.1\RADMIN21.EXE/r_server.exe Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.21 skipped
C:\DRIVERS\Radmin_2.1\RADMIN21.EXE Gentee: infected - 4 skipped
C:\DRIVERS\RemoteAdmin\RADMIN21.EXE/AdmDll.dll Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.20 skipped
C:\DRIVERS\RemoteAdmin\RADMIN21.EXE/raddrv.dll Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.20 skipped
C:\DRIVERS\RemoteAdmin\RADMIN21.EXE/radmin.exe Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.21 skipped
C:\DRIVERS\RemoteAdmin\RADMIN21.EXE/r_server.exe Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.21 skipped
C:\DRIVERS\RemoteAdmin\RADMIN21.EXE Gentee: infected - 4 skipped
C:\ntreskit\PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\ntreskit\PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\oracle\database\hc_xe.dat Object is locked skipped
C:\oracle\NETWORK\log\listener.log Object is locked skipped
C:\pdirect_5.3.95\full\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\pdirect_5.3.95\full\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_5.3.95\full\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_5.3.95\full\reskit_tar.gz GZIP: infected - 3 skipped
C:\pdirect_5.3.95\java\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\pdirect_5.3.95\java\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_5.3.95\java\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_5.3.95\java\reskit_tar.gz GZIP: infected - 3 skipped
C:\pdirect_5.3.95\normal\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\pdirect_5.3.95\normal\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_5.3.95\normal\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_5.3.95\normal\reskit_tar.gz GZIP: infected - 3 skipped
C:\pdirect_5.3.95\small\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\pdirect_5.3.95\small\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_5.3.95\small\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_5.3.95\small\reskit_tar.gz GZIP: infected - 3 skipped
C:\pdirect_6.0.38\full\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\pdirect_6.0.38\full\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_6.0.38\full\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\pdirect_6.0.38\full\reskit_tar.gz GZIP: infected - 3 skipped
C:\Program Files\Active-Charge\CrReader.PCC Object is locked skipped
C:\Program Files\Active-Charge\ISDNCFG.PCC Object is locked skipped
C:\Program Files\LogMeIn\x86\update\4-00-680.bak\x86\LogMeInSystray.exe Infected: Virus.Win32.Trats.d skipped
C:\Program Files\Radmin\radmin.exe Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.22 skipped
C:\Program Files\Radmin\r_server.exe Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.22 skipped
C:\QooBox\Quarantine\C\Program Files\Common Files\qwur\qwura.exe.vir Infected: Trojan-Downloader.Win32.TSUpdate.l skipped
C:\QooBox\Quarantine\C\Program Files\Common Files\qwur\qwurl.exe.vir Infected: Trojan-Downloader.Win32.TSUpdate.r skipped
C:\QooBox\Quarantine\C\Program Files\Common Files\qwur\qwurm .exe.vir Infected: Trojan-Downloader.Win32.TSUpdate.n skipped
C:\QooBox\Quarantine\C\Program Files\Common Files\qwur\qwurm.exe.vir Infected: Virus.Win32.Trats.d skipped
C:\QooBox\Quarantine\C\Program Files\Common Files\qwur\qwurp.exe.vir Infected: Trojan-Downloader.Win32.TSUpdate.f skipped
C:\QooBox\Quarantine\C\Program Files\Common Files\SCURIT~1\еxplorer.exe.vir Infected: not-a-virus:AdWare.Win32.PurityScan.gw skipped
C:\QooBox\Quarantine\C\Program Files\Dot1XCfg\Dot1XCfg.exe.vir Infected: Virus.Win32.Trats.d skipped
C:\QooBox\Quarantine\C\Program Files\LogMeIn\x86\LogMeInSystray.exe.vir Infected: Virus.Win32.Trats.d skipped
C:\QooBox\Quarantine\C\Program Files\Spybot - Search & Destroy\TeaTimer.exe.vir Infected: Virus.Win32.Trats.d skipped
C:\QooBox\Quarantine\C\Program Files\Temporary\kernInst.exe.vir Infected: Trojan.Win32.Agent.edq skipped
C:\QooBox\Quarantine\C\WINDOWS\b103.exe.vir Infected: not-a-virus:AdWare.Win32.Rond.d skipped
C:\QooBox\Quarantine\C\WINDOWS\b104.exe.vir/stream/data0002 Infected: Trojan-Downloader.Win32.Small.buy skipped
C:\QooBox\Quarantine\C\WINDOWS\b104.exe.vir/stream/data0004 Infected: not-a-virus:AdWare.Win32.Mostofate.u skipped
C:\QooBox\Quarantine\C\WINDOWS\b104.exe.vir/stream Infected: not-a-virus:AdWare.Win32.Mostofate.u skipped
C:\QooBox\Quarantine\C\WINDOWS\b104.exe.vir NSIS: infected - 3 skipped
C:\QooBox\Quarantine\C\WINDOWS\b116.exe.vir Infected: Trojan-Downloader.Win32.Agent.ezc skipped
C:\QooBox\Quarantine\C\WINDOWS\b122.exe.vir Infected: Trojan-Downloader.Win32.Agent.hvj skipped
C:\QooBox\Quarantine\C\WINDOWS\b138.exe.vir Infected: Trojan-Downloader.Win32.Agent.cbx skipped
C:\QooBox\Quarantine\C\WINDOWS\b147.exe.vir Infected: Trojan-Downloader.Win32.Agent.fjn skipped
C:\QooBox\Quarantine\C\WINDOWS\DOBE~1\arpa .exe.vir Infected: Trojan-Downloader.Win32.PurityScan.fn skipped
C:\QooBox\Quarantine\C\WINDOWS\DOBE~1\arpa.exe.vir Infected: Virus.Win32.Trats.d skipped
C:\QooBox\Quarantine\C\WINDOWS\mrofinu72.exe.vir Infected: Virus.Win32.Trats.d skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\838082878387868.exe.vir Infected: Trojan-Downloader.Win32.VB.chy skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\awtst.exe.vir Infected: Virus.Win32.Trats.d skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\dbxlyhli.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\dqrfueed.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\dxxmqjkk.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\galdkvtf.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\ghnzkc.dll.vir Infected: not-a-virus:AdWare.Win32.PurityScan.gv skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\ghpqxelp.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\gqppsjva.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\iyagnmbc.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\mjoakxep.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\mpthvbht.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\nvokgtmw.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\owlrgevr.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\oxpkywqv.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\phsmryvw.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\pjbynbhv.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\qidxkwiw.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\RCX10.tmp.vir Infected: Virus.Win32.Trats.d skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\RCX94.tmp.vir Infected: Virus.Win32.Trats.d skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\RCXA.tmp.vir Infected: Virus.Win32.Trats.d skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\RCXA3.tmp.vir Infected: Virus.Win32.Trats.d skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\RCXA8.tmp.vir Infected: Virus.Win32.Trats.d skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\RCXB0.tmp.vir Infected: Virus.Win32.Trats.d skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\RCXC.tmp.vir Infected: Virus.Win32.Trats.d skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\RCXD.tmp.vir Infected: Virus.Win32.Trats.d skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\RCXE.tmp.vir Infected: Virus.Win32.Trats.d skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\RCXF.tmp.vir Infected: Virus.Win32.Trats.d skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\rdmclomq.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\tfxtecpx.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\uidxwdua.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\ujshkodu.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\vdugoagu.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\wcgiupcg.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\wdibowkc.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\xmrhxygt.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\xmtbschn.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\xoosmxvy.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\ynrqeuao.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\yswrwdpr.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\VXNlcg\asappsrv.dll.vir Infected: not-a-virus:AdWare.Win32.CommAd.a skipped
C:\QooBox\Quarantine\C\WINDOWS\VXNlcg\command.exe.vir Infected: not-a-virus:AdWare.Win32.CommAd.a skipped
C:\QooBox\Quarantine\catchme2008-02-16_ 12219.59.zip/awtst.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\QooBox\Quarantine\catchme2008-02-16_ 12219.59.zip ZIP: infected - 1 skipped
C:\release\pdirect\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\release\pdirect\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect\reskit_tar.gz GZIP: infected - 3 skipped
C:\release\pdirect_6.0.45\normal\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\release\pdirect_6.0.45\normal\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.0.45\normal\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.0.45\normal\reskit_tar.gz GZIP: infected - 3 skipped
C:\release\pdirect_6.5.0\normal\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\release\pdirect_6.5.0\normal\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.5.0\normal\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.5.0\normal\reskit_tar.gz GZIP: infected - 3 skipped
C:\release\pdirect_6.5.10\java\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\release\pdirect_6.5.10\java\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.5.10\java\reskit_tar.gz/packed Infected: not-a-
Capital12
2008-02-19, 19:33
not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.5.10\java\reskit_tar.gz GZIP: infected - 3 skipped
C:\release\pdirect_6.5.11\normal\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\release\pdirect_6.5.11\normal\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.5.11\normal\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.5.11\normal\reskit_tar.gz GZIP: infected - 3 skipped
C:\release\pdirect_6.5.5\normal\reskit_tar.gz/packed/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\release\pdirect_6.5.5\normal\reskit_tar.gz/packed/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.5.5\normal\reskit_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\release\pdirect_6.5.5\normal\reskit_tar.gz GZIP: infected - 3 skipped
C:\run\appserver\log.txt Object is locked skipped
C:\stage\release\pdirect_6.5.26\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\stage\release\pdirect_6.5.26\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.5.26\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.5.26\normal_tar.gz/packed/normal/reskit_tar.gz Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.5.26\normal_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.5.26\normal_tar.gz GZIP: infected - 5 skipped
C:\stage\release\pdirect_6.6.15\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\stage\release\pdirect_6.6.15\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.15\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.15\normal_tar.gz/packed/normal/reskit_tar.gz Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.15\normal_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.15\normal_tar.gz GZIP: infected - 5 skipped
C:\stage\release\pdirect_6.6.22\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\stage\release\pdirect_6.6.22\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.22\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.22\normal_tar.gz/packed/normal/reskit_tar.gz Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.22\normal_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.22\normal_tar.gz GZIP: infected - 5 skipped
C:\stage\release\pdirect_6.6.25\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar/NtResKit/PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\stage\release\pdirect_6.6.25\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar/NtResKit/PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.25\normal_tar.gz/packed/normal/reskit_tar.gz/reskit_tar Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.25\normal_tar.gz/packed/normal/reskit_tar.gz Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.25\normal_tar.gz/packed Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\stage\release\pdirect_6.6.25\normal_tar.gz GZIP: infected - 5 skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP2\A0000007.exe Infected: Virus.Win32.Trats.d skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000010.exe Infected: not-a-virus:AdWare.Win32.PurityScan.gw skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000011.exe Infected: Trojan.Win32.Agent.edq skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000012.exe Infected: Trojan-Downloader.Win32.PurityScan.fn skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000013.exe Infected: Virus.Win32.Trats.d skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000015.exe Infected: Virus.Win32.Trats.d skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000016.exe Infected: not-a-virus:AdWare.Win32.Rond.d skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000017.exe/stream/data0002 Infected: Trojan-Downloader.Win32.Small.buy skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000017.exe/stream/data0004 Infected: not-a-virus:AdWare.Win32.Mostofate.u skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000017.exe/stream Infected: not-a-virus:AdWare.Win32.Mostofate.u skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000017.exe NSIS: infected - 3 skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000018.exe Infected: Trojan-Downloader.Win32.Agent.ezc skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000019.exe Infected: Trojan-Downloader.Win32.Agent.hvj skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000020.exe Infected: Trojan-Downloader.Win32.Agent.cbx skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000021.exe Infected: Trojan-Downloader.Win32.Agent.fjn skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000023.dll Infected: not-a-virus:AdWare.Win32.PurityScan.gv skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000024.exe Infected: Trojan-Downloader.Win32.VB.chy skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000025.exe Infected: Virus.Win32.Trats.d skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000026.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000027.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000028.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000029.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000030.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000031.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000032.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000033.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000034.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000035.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000036.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000037.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000038.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000039.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000040.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000041.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000042.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000043.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000044.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000045.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000046.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000047.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000048.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000049.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000050.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000064.exe Infected: not-a-virus:AdWare.Win32.CommAd.a skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000067.exe Infected: Trojan-Downloader.Win32.TSUpdate.l skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000069.exe Infected: Trojan-Downloader.Win32.TSUpdate.r skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000071.exe Infected: Trojan-Downloader.Win32.TSUpdate.n skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000072.exe Infected: Virus.Win32.Trats.d skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000074.exe Infected: Trojan-Downloader.Win32.TSUpdate.f skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000076.dll Infected: not-a-virus:AdWare.Win32.CommAd.a skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000143.exe Infected: Trojan-Downloader.Win32.Adload.pr skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000144.exe Infected: Virus.Win32.Trats.d skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP3\A0000145.exe Infected: Virus.Win32.Trats.d skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP4\A0000154.exe Infected: Virus.Win32.Trats.d skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP4\A0000155.exe Infected: Virus.Win32.Trats.d skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP4\A0000156.exe Infected: Virus.Win32.Trats.d skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000200.exe Infected: Virus.Win32.Trats.d skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000201.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000202.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000203.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000205.exe Infected: Virus.Win32.Trats.d skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000206.exe Infected: Virus.Win32.Trats.d skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000207.exe Infected: Virus.Win32.Trats.d skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000212.exe Infected: Trojan-Downloader.Win32.PurityScan.fk skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000231.exe/file1 Infected: not-a-virus:AdWare.Win32.CommAd.a skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000231.exe/file2 Infected: not-a-virus:AdWare.Win32.CommAd.a skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000231.exe/file4 Infected: not-a-virus:Monitor.Win32.NetMon.a skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000231.exe Inno: infected - 3 skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000233.exe Infected: not-a-virus:AdWare.Win32.PurityScan.gr skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000235.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000236.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000237.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000239.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000240.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000241.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000248.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000249.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP5\A0000273.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\System Volume Information\_restore{5D527826-05BD-4A83-8416-28ACDDA14001}\RP8\change.log Object is locked skipped
C:\tmp\NtResKit\PsExec.exe Infected: not-a-virus:RiskTool.Win32.PsExec.153 skipped
C:\tmp\NtResKit\PsShutdown.exe Infected: not-a-virus:RiskTool.Win32.PsShutdown.232 skipped
C:\WINDOWS\CSC\00000001 Object is locked skipped
C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
C:\WINDOWS\mrofinu72.exe.tmp Infected: Virus.Win32.Trats.d skipped
C:\WINDOWS\SchedLgU.Txt Object is locked skipped
C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\DEFAULT Object is locked skipped
C:\WINDOWS\system32\config\default.LOG Object is locked skipped
C:\WINDOWS\system32\config\SAM Object is locked skipped
C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SECURITY Object is locked skipped
C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
C:\WINDOWS\system32\config\SOFTWARE Object is locked skipped
C:\WINDOWS\system32\config\software.LOG Object is locked skipped
C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SYSTEM Object is locked skipped
C:\WINDOWS\system32\config\system.LOG Object is locked skipped
C:\WINDOWS\system32\h323log.txt Object is locked skipped
C:\WINDOWS\system32\r_server.exe Infected: not-a-virus:RemoteAdmin.Win32.RAdmin.22 skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped
C:\WINDOWS\Temp\JET1.tmp Object is locked skipped
C:\WINDOWS\Temp\RMS2.tmp Object is locked skipped
C:\WINDOWS\Temp\RMS3.tmp Object is locked skipped
C:\WINDOWS\Temp\~DF87C6.tmp Object is locked skipped
C:\WINDOWS\WindowsUpdate.log Object is locked skipped
C:\_OTMoveIt\MovedFiles\02182008_212216\Program Files\Dot1XCfg\Dot1XCfg .exe Infected: Trojan-Downloader.Win32.Adload.pr skipped
C:\_OTMoveIt\MovedFiles\02182008_212216\WINDOWS\system32\L50B4.tmp/data0002 Infected: Trojan.Win32.Scapur.k skipped
C:\_OTMoveIt\MovedFiles\02182008_212216\WINDOWS\system32\L50B4.tmp NSIS: infected - 1 skipped
C:\_OTMoveIt\MovedFiles\02182008_212216\WINDOWS\system32\L6814.tmp/stream/data0004 Infected: not-a-virus:AdWare.Win32.Agent.aev skipped
C:\_OTMoveIt\MovedFiles\02182008_212216\WINDOWS\system32\L6814.tmp/stream Infected: not-a-virus:AdWare.Win32.Agent.aev skipped
C:\_OTMoveIt\MovedFiles\02182008_212216\WINDOWS\system32\L6814.tmp NSIS: infected - 2 skipped
C:\_OTMoveIt\MovedFiles\02182008_212216\WINDOWS\system32\laeaecld.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\_OTMoveIt\MovedFiles\02182008_212216\WINDOWS\system32\psvjuhuv.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
C:\_OTMoveIt\MovedFiles\02182008_212216\WINDOWS\system32\RCX11F.tmp Infected: Virus.Win32.Trats.d skipped
C:\_OTMoveIt\MovedFiles\02182008_212216\WINDOWS\system32\RCX191.tmp Infected: Virus.Win32.Trats.d skipped
Scan process completed.
Hi
Delete this file:
C:\Program Files\LogMeIn\x86\update\4-00-680.bak\x86\LogMeInSystray.exe
Empty these folders:
C:\QooBox\Quarantine
C:\_OTMoveIt\MovedFiles
Empty Recycle Bin.
All other viruses are in system restore and inactive.
I give you later instructions how to empty it.
Other than that, any problems left?
Capital12
2008-02-19, 22:11
deleted requested files. Computer running great now.
Hi
Then you're clean!
Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
Looking over your log, it seems you don't have any evidence of an anti-virus software.
Anti-virus software are programs that detect, cleanse, and erase harmful virus files on a computer, Web server, or network. Unchecked, virus files can unintentionally be forwarded to others, including trading partners and thereby spreading infection. Because new viruses regularly emerge, anti-virus software should be updated frequently. Anti-virus software can scan the computer memory and disk drives for malicious code. They can alert the user if a virus is present, and will clean, delete (or quarantine) infected files or directories. Please download a free anti-virus software from one these excellent vendors NOW:
1) Antivir PersonalEdition Classic (http://www.free-av.com/)- Free anti-virus software for Windows. Detects and removes more than 50,000 viruses. Free support.
2) avast! 4 Home Edition (http://www.avast.com/eng/avast_4_home.html) - Anti-virus program for Windows. The home edition is freeware for noncommercial users.
3) AVG Anti-Virus Free Edition (http://free.grisoft.com/doc/1) - Free edition of the AVG anti-virus program for Windows.
It is strongly recommended that you run only one antivirus program at a time. Having more than one antivirus program active in memory uses additional resources and can result in program conflicts and false virus alerts. If you choose to install more than one antivirus program on your computer, then only one of them should be active in memory at a time.
Looking over your log, it seems you don't have any evidence of a third party firewall.
As the term conveys, a firewall is an extra layer of security installed onto computers, which restricts access to systems from the outside world. Firewalls protect against hackers and malicious intruders. I want you to download a free firewall NOW from one of these excellent vendors:
1) Comodo (http://www.personalfirewall.comodo.com/)
2) Online Armor (http://www.tallemu.com/online_armor_free.html)
3) Sunbelt/Kerio (http://www.sunbelt-software.com/Kerio-Download.cfm)
4) Agnitum (http://www.agnitum.com/products/outpostfree/download.php)
5) ZoneAlarm (http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp?dc=12bms&ctry=US&lang=en&lid=nav_za) (uncheck ZoneAlarm Spy Blocker during installation if you choose this one)
If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.
Next we remove all used tools.
Please download OTMoveIt2 (http://download.bleepingcomputer.com/oldtimer/OTMoveIt2.exe) and save it to desktop.
Double-click OTMoveIt2.exe.
Click the CleanUp! button.
Select Yes when the "Begin cleanup Process?" prompt appears.
If you are prompted to Reboot during the cleanup, select Yes.
The tool will delete itself once it finishes, if not delete it by yourself.
Note: If you receive a warning from your firewall or other security programs regarding OTMoveIt2 attempting to contact the internet, please allow it to do so.
Disable and Enable System Restore. - If you are using Windows XP then you should disable and re-enable system restore to make sure there are no infected files found in a restore point.
You can find instructions on how to enable and re-enable system restore here:
Windows XP System Restore Guide (http://www.bleepingcomputer.com/forums/tutorial56.html)
Re-enable system restore with instructions from tutorial above
Make your Internet Explorer more secure - This can be done by following these simple instructions:
From within Internet Explorer click on the Tools menu and then click on Options.
Click once on the Security tab
Click once on the Internet icon so it becomes highlighted.
Click once on the Custom Level button.
Change the Download signed ActiveX controls to Prompt
Change the Download unsigned ActiveX controls to Disable
Change the Initialize and script ActiveX controls not marked as safe to Disable
Change the Installation of desktop items to Prompt
Change the Launching programs and files in an IFRAME to Prompt
Change the Navigate sub-frames across different domains to Prompt
When all these settings have been made, click on the OK button.
If it prompts you as to whether or not you want to save the settings, press the Yes button.
Next press the Apply button and then the OK to exit the Internet Properties page.
Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.
Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com (http://www.windowsupdate.com) regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.
Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.
A tutorial on installing & using this product can be found here:
Using SpywareBlaster to protect your computer from Spyware and Malware (http://www.bleepingcomputer.com/tutorials/tutorial49.html)
Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.
Here are some additional utilities that will enhance your safety
MVPS Hosts file (http://mvps.org/winhelp2002/hosts.htm) <= The MVPS Hosts file replaces your current HOSTS file with one containing well know ad sites etc. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer
Google Toolbar (http://toolbar.google.com/) <= Get the free google toolbar to help stop pop up windows.
Comodo BOCLEAN (http://www.comodo.com/boclean/boclean.html) <= Stop identity thieves from getting personal information. Instantly detects well over 1,000,000 unique, variant and repack malware in total. And it's free.
Winpatrol (http://www.winpatrol.com/) <= Download and install the free version of Winpatrol. a tutorial for this product is located here:
Using Winpatrol to protect your computer from malicious software (http://www.winpatrol.com/features.html)
Stand Up and Be Counted ---> Malware Complaints (http://www.malwarecomplaints.info/index.php) <--- where you can make difference!
The site offers people who have been (or are) victims of malware the opportunity to document their story and, in that way, launch a complaint against the malware and the makers of the malware.
Also, please read this great article by Tony Klein So How Did I Get Infected In First Place (http://castlecops.com/postlite7736-.html)
Happy surfing and stay clean! :bigthumb:
Since this issue appears to be resolved ... this Topic has been closed. Glad I could help.
Note: If it has been five days or more since your last post, and the helper assisting you posted a response to that post to which you did not reply, your topic will not be reopened. At that point, if you still require help, please start a new topic and include a fresh HijackThis log and a link to your previous thread.
If it has been less than five days since your last response and you need the thread re-opened, please send me or your helper a private message (pm). A valid, working link to the closed topic is required.