PDA

View Full Version : Infected with virtumonde, need removal help



MrBugger
2008-04-28, 12:11
I believe I have the Virtumonde or similar malware infection. After rebooting and a bit of time, Spybot detects Virtumonde again, removes it (or at least some of it) but it returns shortly thereafter. I am also getting .dll errors on regular startup now following a previous run of Spybot removing Virtumonde.

Need help to remove step by step...

Aktion taken:
Uppdated virus program
Uppdated Spy bot

Logs:

-------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER REPORT
Monday, April 28, 2008 11:57:38 AM
Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 28/04/2008
Kaspersky Anti-Virus database records: 728524
-------------------------------------------------------------------------------

Scan Settings:
Scan using the following antivirus database: extended
Scan Archives: true
Scan Mail Bases: true

Scan Target - My Computer:
C:\
D:\
E:\
F:\
G:\
H:\
I:\
J:\
K:\

Scan Statistics:
Total number of scanned objects: 83770
Number of viruses found: 8
Number of infected objects: 34
Number of suspicious objects: 0
Duration of the scan process: 01:03:26

Infected Object Name / Virus Name / Last Action
C:\Documents and Settings\Johan Ohlsson\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\Lokala inställningar\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\Lokala inställningar\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\Lokala inställningar\Temporary Internet Files\AntiPhishing\B3BB5BBA-E7D5-40AB-A041-A5B1C0B26C8F.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\Lokala inställningar\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\Lokala inställningar\Tidigare\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\ntuser.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\NTUSER.DAT.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Lokala inställningar\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LocalService\Lokala inställningar\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Lokala inställningar\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Lokala inställningar\Tidigare\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Lokala inställningar\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Lokala inställningar\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\cache.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\chandir.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\chandir.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\chn.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\chn.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\D0000000.FCS Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\inuse.txt Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\L0000004.FCS Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\main.log Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_die.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_die.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_dnd.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_dnd.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_ext.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_ext.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_rcv.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_rcv.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\storydb.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\storydb.idx Object is locked skipped
C:\Program\F-Secure\Common\policy.ipf Object is locked skipped
C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP71\A0013384.exe Infected: Trojan-Downloader.Win32.Homles.bj skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP71\A0013400.exe Infected: Trojan-Downloader.Win32.Homles.bj skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP71\A0013482.exe/data.rar/setupa.exe Infected: Packed.Win32.Monder.gen skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP71\A0013482.exe/data.rar Infected: Packed.Win32.Monder.gen skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP71\A0013482.exe RarSFX: infected - 2 skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP71\A0013511.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.qqw skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013658.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013659.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.pjw skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013660.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.pjw skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013661.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013664.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013666.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013667.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013668.exe Infected: Trojan-Downloader.Win32.Homles.bj skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013669.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013676.exe Infected: Trojan-Downloader.Win32.Homles.bj skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013677.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013678.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP73\A0013686.exe Infected: Trojan-Downloader.Win32.Homles.bj skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP73\A0013704.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.qqw skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP74\change.log Object is locked skipped
C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
C:\WINDOWS\fsgk32.log Object is locked skipped
C:\WINDOWS\fssm32.log Object is locked skipped
C:\WINDOWS\SchedLgU.Txt Object is locked skipped
C:\WINDOWS\SoftwareDistribution\EventCache\{8B850A3D-EC9F-4C31-BD43-E747CE0169E0}.bin Object is locked skipped
C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\WINDOWS\system32\CatRoot2\edb.log Object is locked skipped
C:\WINDOWS\system32\CatRoot2\tmp.edb Object is locked skipped
C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\default Object is locked skipped
C:\WINDOWS\system32\config\default.LOG Object is locked skipped
C:\WINDOWS\system32\config\Internet.evt Object is locked skipped
C:\WINDOWS\system32\config\SAM Object is locked skipped
C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SECURITY Object is locked skipped
C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
C:\WINDOWS\system32\config\software Object is locked skipped
C:\WINDOWS\system32\config\software.LOG Object is locked skipped
C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\system Object is locked skipped
C:\WINDOWS\system32\config\system.LOG Object is locked skipped
C:\WINDOWS\system32\h323log.txt Object is locked skipped
C:\WINDOWS\system32\hgGwTmmN.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\WINDOWS\system32\ljJDTMcY.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\WINDOWS\system32\tuvVLbCu.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped
C:\WINDOWS\Temp\Perflib_Perfdata_e7c.dat Object is locked skipped
C:\WINDOWS\WindowsUpdate.log Object is locked skipped
C:\WINDOWS\{00000002-00000000-0000000B-00001102-00000004-20051102}.CDF Object is locked skipped
D:\Eget\Bigfish Games - Virtual Villagers + Crack\Virtual Villagers 2 +crack.rar/vv.rar/Virtual Villagers + keygen/Click Here To Start Install.exe Infected: Trojan.Win32.Small.tp skipped
D:\Eget\Bigfish Games - Virtual Villagers + Crack\Virtual Villagers 2 +crack.rar/vv.rar Infected: Trojan.Win32.Small.tp skipped
D:\Eget\Bigfish Games - Virtual Villagers + Crack\Virtual Villagers 2 +crack.rar/Click Here To Start Game Install.exe Infected: Trojan-Spy.Win32.BZub.brl skipped
D:\Eget\Bigfish Games - Virtual Villagers + Crack\Virtual Villagers 2 +crack.rar/Click Here To Start Program Install.exe Infected: Trojan-Spy.Win32.BZub.brl skipped
D:\Eget\Bigfish Games - Virtual Villagers + Crack\Virtual Villagers 2 +crack.rar RAR: infected - 4 skipped
D:\Eget\Bigfish Games - Virtual Villagers + Crack\Virtual Villagers full +crack.rar/vv.rar/Virtual Villagers + keygen/Click Here To Start Install.exe Infected: Trojan.Win32.Small.tp skipped
D:\Eget\Bigfish Games - Virtual Villagers + Crack\Virtual Villagers full +crack.rar/vv.rar Infected: Trojan.Win32.Small.tp skipped
D:\Eget\Bigfish Games - Virtual Villagers + Crack\Virtual Villagers full +crack.rar/Click Here To Start Game Install.exe Infected: Trojan-Spy.Win32.BZub.brl skipped
D:\Eget\Bigfish Games - Virtual Villagers + Crack\Virtual Villagers full +crack.rar RAR: infected - 3 skipped
D:\Eget\EA Games gamesxposed\WW%20Lobby%20Spammer.zip/WW Lobby Spammer/LobbySpammer.exe Infected: SpamTool.Win32.Delf.c skipped
D:\Eget\EA Games gamesxposed\WW%20Lobby%20Spammer.zip ZIP: infected - 1 skipped
D:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped

Scan process completed.

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:01:03, on 2008-04-28
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16640)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program\F-Secure\BackWeb\7681197\Program\SERVIC~1.EXE
C:\Program\Belkin\Bluetooth Software\bin\btwdins.exe
C:\Program\F-Secure\Anti-Virus\fsgk32st.exe
C:\Program\F-Secure\Anti-Virus\FSGK32.EXE
C:\Program\F-Secure\Anti-Virus\fssm32.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program\F-Secure\BackWeb\7681197\Program\BackWeb-7681197.exe
C:\Program\F-Secure\Common\FSMA32.EXE
C:\Program\F-Secure\Common\FSMB32.EXE
C:\Program\F-Secure\Common\FCH32.EXE
C:\Program\F-Secure\Common\FNRB32.EXE
C:\Program\F-Secure\Common\FAMEH32.EXE
C:\Program\F-Secure\Common\FIH32.EXE
C:\Program\F-Secure\Anti-Virus\fsav32.exe
C:\WINDOWS\Explorer.EXE
C:\Program\F-Secure\Common\FSM32.EXE
C:\Program\D-Tools\daemon.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\WINDOWS\CTHELPER.EXE
C:\Program\A4Tech\Mouse\Amoumain.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program\Windows Live\Messenger\MsnMsgr.Exe
C:\Program\Messenger\msmsgs.exe
C:\Program\Spybot - Search & Destroy\TeaTimer.exe
C:\Program\Belkin\Bluetooth Software\BTTray.exe
C:\Program\Internet Explorer\iexplore.exe
C:\Program\Delade filer\Microsoft Shared\Windows Live\WLLoginProxy.exe
C:\Program\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.aftonbladet.se/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Länkar
O4 - HKLM\..\Run: [F-Secure Manager] "C:\Program\F-Secure\Common\FSM32.EXE" /splash
O4 - HKLM\..\Run: [DAEMON Tools-1033] "C:\Program\D-Tools\daemon.exe" -lang 1033
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [CTHelper] CTHELPER.EXE
O4 - HKLM\..\Run: [CTxfiHlp] CTXFIHLP.EXE
O4 - HKLM\..\Run: [WheelMouse] C:\Program\A4Tech\Mouse\Amoumain.exe
O4 - HKLM\..\Run: [BluetoothAuthenticationAgent] rundll32.exe bthprops.cpl,,BluetoothAuthenticationAgent
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [BM33521d95] Rundll32.exe "C:\WINDOWS\system32\auhkfggy.dll",s
O4 - HKLM\..\Run: [30612e09] rundll32.exe "C:\WINDOWS\system32\kofgyalw.dll",b
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program\Windows Live\Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [MSMSGS] "C:\Program\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'LOKAL TJÄNST')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: BTTray.lnk = ?
O4 - Global Startup: Microsoft Office.lnk = C:\Program\Microsoft Office\Office\OSA9.EXE
O8 - Extra context menu item: Send To &Bluetooth - C:\Program\Belkin\Bluetooth Software\btsendto_ie_ctx.htm
O9 - Extra button: @btrez.dll,-4015 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program\Belkin\Bluetooth Software\btsendto_ie.htm
O9 - Extra 'Tools' menuitem: @btrez.dll,-4017 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program\Belkin\Bluetooth Software\btsendto_ie.htm
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1201972184296
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1201972341656
O16 - DPF: {CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7} (get_atlcom Class) - http://www.adobe.com/products/acrobat/nos/gp.cab
O23 - Service: F-Secure BackWeb (BackWeb Client - 7681197) - Unknown owner - C:\Program\F-Secure\BackWeb\7681197\Program\SERVIC~1.EXE
O23 - Service: Bluetooth Service (btwdins) - WIDCOMM, Inc. - C:\Program\Belkin\Bluetooth Software\bin\btwdins.exe
O23 - Service: F-Secure BackWeb LAN Access - Unknown owner - C:\Program\F-Secure\BackWeb\7681197\Program\fsbwlan.exe
O23 - Service: F-Secure Gatekeeper Handler Starter - F-Secure Corp. - C:\Program\F-Secure\Anti-Virus\fsgk32st.exe
O23 - Service: F-Secure Network Request Broker - F-Secure Corporation - C:\Program\F-Secure\Common\FNRB32.EXE
O23 - Service: F-Secure Authentication Agent (FSAA) - F-Secure Corporation. All Rights Reserved. - C:\Program\F-Secure\Common\FSAA.EXE
O23 - Service: F-Secure Management Agent (FSMA) - F-Secure Corporation - C:\Program\F-Secure\Common\FSMA32.EXE
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

--
End of file - 6954 bytes

Rorschach112
2008-04-28, 14:08
Hello

You have got Vundo from downloading cracks


Please download the OTMoveIt2 by OldTimer (http://download.bleepingcomputer.com/oldtimer/OTMoveIt2.exe).

Save it to your desktop.
Please double-click OTMoveIt2.exe to run it.
Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):



[kill explorer]
C:\WINDOWS\system32\hgGwTmmN.dll
C:\WINDOWS\system32\ljJDTMcY.dll
C:\WINDOWS\system32\tuvVLbCu.dll
D:\Eget\Bigfish Games - Virtual Villagers + Crack\Virtual Villagers 2 +crack.rar
purity
[start explorer]


Return to OTMoveIt2, right click in the "Paste List of Files/Folders to Move" window (under the light Yellow bar) and choose Paste.
Click the red Moveit! button.
A log of files and folders moved will be created in the c:\_OTMoveIt\MovedFiles folder in the form of Date and Time (mmddyyyy_hhmmss.log). Please open this log in Notepad and post its contents in your next reply.
Close OTMoveIt2
If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.



Please visit this webpage for instructions for downloading and running ComboFix:

http://www.bleepingcomputer.com/combofix/how-to-use-combofix

This includes installing the Windows XP Recovery Console in case you have not installed it yet.

for more information on the Windows XP Recovery Console read http://support.microsoft.com/kb/314058. once you install the Recovery Console, when you reboot your computer, right after reboot, you'll see the option for the Recovery Console now as well. Don't select Recovery Console as we don't need it. By default, your main OS is selected there. The screen stays for 2 seconds and then it proceeds to load Windows. that is normal.

Post the log from ComboFix when you've accomplished that, along with a new HijackThis log.

MrBugger
2008-04-28, 14:25
Many thanks for your help, sorry for having a shared family computer

I manually deleted the files from eget before i dit the OTMoveIt2
Anyway here is the logfile you requested:

Explorer killed successfully
DllUnregisterServer procedure not found in C:\WINDOWS\system32\hgGwTmmN.dll
C:\WINDOWS\system32\hgGwTmmN.dll NOT unregistered.
File move failed. C:\WINDOWS\system32\hgGwTmmN.dll scheduled to be moved on reboot.
DllUnregisterServer procedure not found in C:\WINDOWS\system32\ljJDTMcY.dll
C:\WINDOWS\system32\ljJDTMcY.dll NOT unregistered.
C:\WINDOWS\system32\ljJDTMcY.dll moved successfully.
DllUnregisterServer procedure not found in C:\WINDOWS\system32\tuvVLbCu.dll
C:\WINDOWS\system32\tuvVLbCu.dll NOT unregistered.
C:\WINDOWS\system32\tuvVLbCu.dll moved successfully.
File/Folder D:\Eget\Bigfish Games - Virtual Villagers + Crack\Virtual Villagers 2 +crack.rar not found.
< purity >
Explorer started successfully

OTMoveIt2 by OldTimer - Version 1.0.4.1 log created on 04282008_141416

Files moved on Reboot...
DllUnregisterServer procedure not found in C:\WINDOWS\system32\hgGwTmmN.dll
C:\WINDOWS\system32\hgGwTmmN.dll NOT unregistered.
File move failed. C:\WINDOWS\system32\hgGwTmmN.dll scheduled to be moved on reboot.

Waiting for the next step...

MrBugger
2008-04-28, 15:07
Requested logs:

ComboFix 08-04-27.1 - Johan Ohlsson 2008-04-28 14:53:50.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1053.18.1625 [GMT 2:00]
Running from: C:\Documents and Settings\Johan Ohlsson\Skrivbord\ComboFix.exe
* Created a new restore point

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\WINDOWS\cookies.ini
C:\WINDOWS\pskt.ini
C:\WINDOWS\system32\auhkfggy.dll
C:\WINDOWS\system32\braluvsd.ini
C:\WINDOWS\system32\bxycjnaq.ini
C:\WINDOWS\system32\ehctlwgq.ini
C:\WINDOWS\system32\fccbaASk.dll
C:\WINDOWS\system32\hgGwTmmN.dll
C:\WINDOWS\system32\KknUBcdd.ini
C:\WINDOWS\system32\KknUBcdd.ini2
C:\WINDOWS\system32\kofgyalw.dll
C:\WINDOWS\system32\kSAabccf.ini
C:\WINDOWS\system32\kSAabccf.ini2
C:\WINDOWS\system32\ltxcmqmp.ini
C:\WINDOWS\system32\lwbkbcdh.ini
C:\WINDOWS\system32\mlRtDJlm.ini2
C:\WINDOWS\system32\MVxyaGgh.ini
C:\WINDOWS\system32\MVxyaGgh.ini2
C:\WINDOWS\system32\rpwvpdnh.dll
C:\WINDOWS\system32\UBISBIOq.ini
C:\WINDOWS\system32\UBISBIOq.ini2
C:\WINDOWS\system32\vFhggMoq.ini
C:\WINDOWS\system32\vFhggMoq.ini2
C:\WINDOWS\system32\WHQrBJjl.ini
C:\WINDOWS\system32\WHQrBJjl.ini2
C:\WINDOWS\system32\wlaygfok.ini

.
((((((((((((((((((((((((( Files Created from 2008-03-28 to 2008-04-28 )))))))))))))))))))))))))))))))
.

2008-04-28 14:53 . 2008-04-28 14:53 1,024 --ah----- C:\WINDOWS\system32\config\systemprofile\ntuser.dat.LOG
2008-04-28 14:14 . 2008-04-28 14:14 <KAT> d-------- C:\_OTMoveIt
2008-04-28 12:00 . 2008-04-28 12:00 <KAT> d-------- C:\Program\Trend Micro
2008-04-28 10:43 . 2008-04-28 10:43 <KAT> d-------- C:\WINDOWS\system32\Kaspersky Lab
2008-04-28 10:43 . 2008-04-28 10:43 <KAT> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
2008-04-27 17:55 . 2008-04-28 00:12 1,251 --a------ C:\WINDOWS\wininit.ini
2008-04-27 15:24 . 2008-04-27 17:27 109,738 --a------ C:\WINDOWS\BM33521d95.xml
2008-04-26 16:54 . 2008-04-26 16:54 <KAT> d-------- C:\Documents and Settings\All Users\Application Data\Apple Computer
2008-04-26 16:53 . 2008-04-26 16:53 <KAT> d-------- C:\Program\River Past
2008-04-26 16:53 . 2008-04-26 16:53 <KAT> d-------- C:\Documents and Settings\Johan Ohlsson\Application Data\River Past G5
2008-04-26 16:53 . 2008-04-27 19:53 <KAT> d-------- C:\Documents and Settings\All Users\Application Data\River Past G5
2008-04-13 10:08 . 2008-04-13 10:08 <KAT> d-------- C:\Program\XCC
2008-04-07 19:08 . 2008-04-09 19:23 <KAT> d-------- C:\WINDOWS\system32\Adobe

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-03-23 16:13 --------- d-----w C:\Program\QuickTime
2008-03-23 16:13 --------- d-----w C:\Program\ImTOO
2008-03-23 16:08 --------- d-----w C:\Documents and Settings\Johan Ohlsson\Application Data\vlc
2008-03-23 16:04 --------- d-----w C:\Program\VideoLAN
2008-03-02 10:01 --------- d-----w C:\Program\Delade filer\Adobe
2008-02-02 17:40 81,920 ------r C:\WINDOWS\bwUnin-6.1.4.55-7681197L.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{07B047CC-F8B3-4706-ABEA-6F8B11E697D5}]
C:\WINDOWS\system32\qoMgghFv.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{0E2BA948-4B90-421C-BA7F-B7732728375E}]
C:\WINDOWS\system32\hgGayxVM.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{61CAFAE9-2C57-4C98-9918-EE41BEBC6E19}]
C:\WINDOWS\system32\ddcBUnkK.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{7721AF65-7B37-498C-AE43-A18F68C55397}]
C:\WINDOWS\system32\qOIBSIBU.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{998A83C7-E099-4C91-9B70-90BE77A89E5E}]
C:\WINDOWS\system32\ljJBrQHW.dll

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-04 02:34 15360]
"MsnMsgr"="C:\Program\Windows Live\Messenger\MsnMsgr.exe" [2007-10-18 12:35 5724184]
"MSMSGS"="C:\Program\Messenger\msmsgs.exe" [2004-10-13 18:24 1694208]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"F-Secure Manager"="C:\Program\F-Secure\Common\FSM32.exe" [2002-12-05 17:24 106571]
"DAEMON Tools-1033"="C:\Program\D-Tools\daemon.exe" [2004-08-22 18:05 81920]
"NvCplDaemon"="C:\WINDOWS\system32\NvCpl.dll" [2007-12-05 02:41 8523776]
"nwiz"="nwiz.exe" [2007-12-05 02:41 1626112 C:\WINDOWS\system32\nwiz.exe]
"NvMediaCenter"="C:\WINDOWS\system32\NvMcTray.dll" [2007-12-05 02:41 81920]
"CTHelper"="CTHELPER.EXE" [2006-08-11 15:56 17920 C:\WINDOWS\CTHELPER.EXE]
"CTxfiHlp"="CTXFIHLP.EXE" [2006-08-11 15:56 18944 C:\WINDOWS\system32\CTXFIHLP.EXE]
"WheelMouse"="C:\Program\A4Tech\Mouse\Amoumain.exe" [2006-02-17 11:14 163840]
"BluetoothAuthenticationAgent"="bthprops.cpl" [2004-08-04 02:34 110592 C:\WINDOWS\system32\bthprops.cpl]
"Adobe Reader Speed Launcher"="C:\Program\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 23:16 39792]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="C:\WINDOWS\System32\CTFMON.EXE" [2004-08-04 02:34 15360]

C:\Documents and Settings\All Users\Start-meny\Program\Autostart\
BTTray.lnk - C:\Program\Belkin\Bluetooth Software\BTTray.exe [2003-09-16 19:14:28 499779]
Microsoft Office.lnk - C:\Program\Microsoft Office\Office\OSA9.EXE [2000-01-21 03:15:56 65588]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\hgGwTmmN]
hgGwTmmN.dll

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"C:\\WINDOWS\\system32\\sessmgr.exe"=
"D:\\Mohaa\\MOHAA.exe"=
"D:\\Westwood\\RA2\\patchget.dat"=
"C:\\Program\\Windows Live\\Messenger\\msnmsgr.exe"=
"C:\\Program\\Windows Live\\Messenger\\livecall.exe"=
"D:\\Westwood\\RA2\\game.exe"=
"D:\\Westwood\\RA2\\mph.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"1234:UDP"= 1234:UDP:1234
"1235:UDP"= 1235:UDP:1235
"1236:UDP"= 1236:UDP:1236
"1237:UDP"= 1237:UDP:1237
"7000:TCP"= 7000:TCP:7000
"7001:TCP"= 7001:TCP:7001
"7002:TCP"= 7002:TCP:7002
"3840:TCP"= 3840:TCP:3840
"4005:TCP"= 4005:TCP:4005
"4808:TCP"= 4808:TCP:4808
"4810:TCP"= 4810:TCP:4810
"4995:TCP"= 4995:TCP:4995

R2 BackWeb Client - 7681197;F-Secure BackWeb;C:\Program\F-Secure\BackWeb\7681197\Program\SERVIC~1.EXE [2008-02-02 19:40]
R2 F-Secure Filter;F-Secure File System Filter;C:\Program\F-Secure\Anti-Virus\Win2K\FSfilter.sys [2002-04-23 14:23]
R2 F-Secure Gatekeeper;F-Secure Gatekeeper;C:\Program\F-Secure\Anti-Virus\Win2K\FSgk.sys [2002-12-03 09:36]
R2 F-Secure Recognizer;F-Secure File System Recognizer;C:\Program\F-Secure\Anti-Virus\Win2K\FSrec.sys [2002-04-23 14:23]
R2 FSpm;F-Secure Policy Manager;C:\Program\F-Secure\Common\FSPM.SYS [2002-12-05 17:24]

.
**************************************************************************

catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-04-28 14:57:57
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
------------------------ Other Running Processes ------------------------
.
C:\Program\Belkin\Bluetooth Software\bin\btwdins.exe
C:\Program\F-Secure\Anti-Virus\fsgk32st.exe
C:\Program\F-Secure\Anti-Virus\fsgk32.exe
C:\Program\F-Secure\Anti-Virus\fssm32.exe
C:\Program\F-Secure\BackWeb\7681197\Program\backWeb-7681197.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program\F-Secure\Common\FSMA32.exe
C:\Program\F-Secure\Common\FSMB32.exe
C:\Program\F-Secure\Common\fch32.exe
C:\Program\F-Secure\Common\FAMEH32.exe
C:\Program\F-Secure\Common\FNRB32.exe
C:\Program\F-Secure\Common\FIH32.exe
C:\Program\F-Secure\Anti-Virus\fsav32.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\rundll32.exe
.
**************************************************************************
.
Completion time: 2008-04-28 14:59:09 - machine was rebooted
ComboFix-quarantined-files.txt 2008-04-28 12:59:05

Pre-Run: 240,861,708,288 byte ledigt
Post-Run: 240,804,904,960 byte ledigt

162 --- E O F --- 2008-04-09 08:26:52

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 15:01:16, on 2008-04-28
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16640)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program\F-Secure\BackWeb\7681197\Program\SERVIC~1.EXE
C:\Program\Belkin\Bluetooth Software\bin\btwdins.exe
C:\Program\F-Secure\Anti-Virus\fsgk32st.exe
C:\Program\F-Secure\Anti-Virus\FSGK32.EXE
C:\Program\F-Secure\Anti-Virus\fssm32.exe
C:\Program\F-Secure\BackWeb\7681197\Program\BackWeb-7681197.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program\F-Secure\Common\FSMA32.EXE
C:\Program\F-Secure\Common\FSMB32.EXE
C:\Program\F-Secure\Common\FCH32.EXE
C:\Program\F-Secure\Common\FAMEH32.EXE
C:\Program\F-Secure\Common\FNRB32.EXE
C:\Program\F-Secure\Common\FIH32.EXE
C:\Program\F-Secure\Anti-Virus\fsav32.exe
C:\Program\F-Secure\Common\FSM32.EXE
C:\Program\D-Tools\daemon.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\WINDOWS\CTHELPER.EXE
C:\Program\A4Tech\Mouse\Amoumain.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program\Adobe\Reader 8.0\Reader\Reader_sl.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program\Windows Live\Messenger\MsnMsgr.Exe
C:\Program\Messenger\msmsgs.exe
C:\Program\Belkin\Bluetooth Software\BTTray.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\explorer.exe
C:\Program\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.aftonbladet.se/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Länkar
O2 - BHO: (no name) - {07B047CC-F8B3-4706-ABEA-6F8B11E697D5} - C:\WINDOWS\system32\qoMgghFv.dll (file missing)
O2 - BHO: (no name) - {0E2BA948-4B90-421C-BA7F-B7732728375E} - C:\WINDOWS\system32\hgGayxVM.dll (file missing)
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {61CAFAE9-2C57-4C98-9918-EE41BEBC6E19} - C:\WINDOWS\system32\ddcBUnkK.dll (file missing)
O2 - BHO: (no name) - {7721AF65-7B37-498C-AE43-A18F68C55397} - C:\WINDOWS\system32\qOIBSIBU.dll (file missing)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program\Delade filer\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: (no name) - {998A83C7-E099-4C91-9B70-90BE77A89E5E} - C:\WINDOWS\system32\ljJBrQHW.dll (file missing)
O4 - HKLM\..\Run: [F-Secure Manager] "C:\Program\F-Secure\Common\FSM32.EXE" /splash
O4 - HKLM\..\Run: [DAEMON Tools-1033] "C:\Program\D-Tools\daemon.exe" -lang 1033
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [CTHelper] CTHELPER.EXE
O4 - HKLM\..\Run: [CTxfiHlp] CTXFIHLP.EXE
O4 - HKLM\..\Run: [WheelMouse] C:\Program\A4Tech\Mouse\Amoumain.exe
O4 - HKLM\..\Run: [BluetoothAuthenticationAgent] rundll32.exe bthprops.cpl,,BluetoothAuthenticationAgent
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program\Windows Live\Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [MSMSGS] "C:\Program\Messenger\msmsgs.exe" /background
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'LOKAL TJÄNST')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: BTTray.lnk = ?
O4 - Global Startup: Microsoft Office.lnk = C:\Program\Microsoft Office\Office\OSA9.EXE
O8 - Extra context menu item: Send To &Bluetooth - C:\Program\Belkin\Bluetooth Software\btsendto_ie_ctx.htm
O9 - Extra button: @btrez.dll,-4015 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program\Belkin\Bluetooth Software\btsendto_ie.htm
O9 - Extra 'Tools' menuitem: @btrez.dll,-4017 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program\Belkin\Bluetooth Software\btsendto_ie.htm
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1201972184296
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1201972341656
O16 - DPF: {CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7} (get_atlcom Class) - http://www.adobe.com/products/acrobat/nos/gp.cab
O20 - Winlogon Notify: hgGwTmmN - hgGwTmmN.dll (file missing)
O23 - Service: F-Secure BackWeb (BackWeb Client - 7681197) - Unknown owner - C:\Program\F-Secure\BackWeb\7681197\Program\SERVIC~1.EXE
O23 - Service: Bluetooth Service (btwdins) - WIDCOMM, Inc. - C:\Program\Belkin\Bluetooth Software\bin\btwdins.exe
O23 - Service: F-Secure BackWeb LAN Access - Unknown owner - C:\Program\F-Secure\BackWeb\7681197\Program\fsbwlan.exe
O23 - Service: F-Secure Gatekeeper Handler Starter - F-Secure Corp. - C:\Program\F-Secure\Anti-Virus\fsgk32st.exe
O23 - Service: F-Secure Network Request Broker - F-Secure Corporation - C:\Program\F-Secure\Common\FNRB32.EXE
O23 - Service: F-Secure Authentication Agent (FSAA) - F-Secure Corporation. All Rights Reserved. - C:\Program\F-Secure\Common\FSAA.EXE
O23 - Service: F-Secure Management Agent (FSMA) - F-Secure Corporation - C:\Program\F-Secure\Common\FSMA32.EXE
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

--
End of file - 7367 bytes

Rorschach112
2008-04-28, 22:59
Hello

1. Please re-open HiJackThis and choose do a system scan only. Check the boxes next to ONLY the entries listed below(if present):

O2 - BHO: (no name) - {07B047CC-F8B3-4706-ABEA-6F8B11E697D5} - C:\WINDOWS\system32\qoMgghFv.dll (file missing)
O2 - BHO: (no name) - {0E2BA948-4B90-421C-BA7F-B7732728375E} - C:\WINDOWS\system32\hgGayxVM.dll (file missing)
O2 - BHO: (no name) - {61CAFAE9-2C57-4C98-9918-EE41BEBC6E19} - C:\WINDOWS\system32\ddcBUnkK.dll (file missing)
O2 - BHO: (no name) - {7721AF65-7B37-498C-AE43-A18F68C55397} - C:\WINDOWS\system32\qOIBSIBU.dll (file missing)
O2 - BHO: (no name) - {998A83C7-E099-4C91-9B70-90BE77A89E5E} - C:\WINDOWS\system32\ljJBrQHW.dll (file missing)
O20 - Winlogon Notify: hgGwTmmN - hgGwTmmN.dll (file missing)


2. Now close all windows other than HiJackThis, including browsers, so that nothing other than HijackThis is open, then click Fix Checked. A box will pop up asking you if you wish to fix the selected items. Please choose YES. Once it has fixed them, please exit/close HijackThis.




1. Close any open browsers.

2. Open notepad and copy/paste the text in the quotebox below into it:


File::
C:\WINDOWS\BM33521d95.xml

DirLook::
D:\Eget

Registry::

Driver::



Save this as CFScript.txt, in the same location as ComboFix.exe


http://i266.photobucket.com/albums/ii277/sUBs_/Combo-Do.gif

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at "C:\ComboFix.txt"

Note:
Do not mouseclick combofix's window whilst it's running. That may cause it to stall



Reboot and post a new HijackThis log

MrBugger
2008-04-29, 00:19
Hi,

Once again thanks for helping me out.
Requested actions taken. Noticed i've been disconnected from internet since infected...

New HijackThis log after reboot:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 00:11:36, on 2008-04-29
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16640)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program\F-Secure\BackWeb\7681197\Program\SERVIC~1.EXE
C:\Program\Belkin\Bluetooth Software\bin\btwdins.exe
C:\Program\F-Secure\Anti-Virus\fsgk32st.exe
C:\Program\F-Secure\Anti-Virus\FSGK32.EXE
C:\Program\F-Secure\Anti-Virus\fssm32.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program\F-Secure\BackWeb\7681197\Program\BackWeb-7681197.exe
C:\WINDOWS\Explorer.EXE
C:\Program\F-Secure\Common\FSMA32.EXE
C:\Program\F-Secure\Common\FSMB32.EXE
C:\Program\F-Secure\Common\FCH32.EXE
C:\Program\F-Secure\Common\FAMEH32.EXE
C:\Program\F-Secure\Common\FNRB32.EXE
C:\Program\F-Secure\Common\FIH32.EXE
C:\Program\F-Secure\Anti-Virus\fsav32.exe
C:\Program\F-Secure\Common\FSM32.EXE
C:\Program\D-Tools\daemon.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\WINDOWS\CTHELPER.EXE
C:\Program\A4Tech\Mouse\Amoumain.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program\Adobe\Reader 8.0\Reader\Reader_sl.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program\Windows Live\Messenger\MsnMsgr.Exe
C:\Program\Messenger\msmsgs.exe
C:\Program\Belkin\Bluetooth Software\BTTray.exe
C:\Program\Microsoft Office\Office\WINWORD.EXE
C:\WINDOWS\msagent\AgentSvr.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.aftonbladet.se/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Länkar
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program\SPYBOT~1\SDHelper.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program\Delade filer\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [F-Secure Manager] "C:\Program\F-Secure\Common\FSM32.EXE" /splash
O4 - HKLM\..\Run: [DAEMON Tools-1033] "C:\Program\D-Tools\daemon.exe" -lang 1033
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [CTHelper] CTHELPER.EXE
O4 - HKLM\..\Run: [CTxfiHlp] CTXFIHLP.EXE
O4 - HKLM\..\Run: [WheelMouse] C:\Program\A4Tech\Mouse\Amoumain.exe
O4 - HKLM\..\Run: [BluetoothAuthenticationAgent] rundll32.exe bthprops.cpl,,BluetoothAuthenticationAgent
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program\Windows Live\Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [MSMSGS] "C:\Program\Messenger\msmsgs.exe" /background
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'LOKAL TJÄNST')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: BTTray.lnk = ?
O4 - Global Startup: Microsoft Office.lnk = C:\Program\Microsoft Office\Office\OSA9.EXE
O8 - Extra context menu item: Send To &Bluetooth - C:\Program\Belkin\Bluetooth Software\btsendto_ie_ctx.htm
O9 - Extra button: @btrez.dll,-4015 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program\Belkin\Bluetooth Software\btsendto_ie.htm
O9 - Extra 'Tools' menuitem: @btrez.dll,-4017 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program\Belkin\Bluetooth Software\btsendto_ie.htm
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1201972184296
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1201972341656
O16 - DPF: {CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7} (get_atlcom Class) - http://www.adobe.com/products/acrobat/nos/gp.cab
O23 - Service: F-Secure BackWeb (BackWeb Client - 7681197) - Unknown owner - C:\Program\F-Secure\BackWeb\7681197\Program\SERVIC~1.EXE
O23 - Service: Bluetooth Service (btwdins) - WIDCOMM, Inc. - C:\Program\Belkin\Bluetooth Software\bin\btwdins.exe
O23 - Service: F-Secure BackWeb LAN Access - Unknown owner - C:\Program\F-Secure\BackWeb\7681197\Program\fsbwlan.exe
O23 - Service: F-Secure Gatekeeper Handler Starter - F-Secure Corp. - C:\Program\F-Secure\Anti-Virus\fsgk32st.exe
O23 - Service: F-Secure Network Request Broker - F-Secure Corporation - C:\Program\F-Secure\Common\FNRB32.EXE
O23 - Service: F-Secure Authentication Agent (FSAA) - F-Secure Corporation. All Rights Reserved. - C:\Program\F-Secure\Common\FSAA.EXE
O23 - Service: F-Secure Management Agent (FSMA) - F-Secure Corporation - C:\Program\F-Secure\Common\FSMA32.EXE
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

--
End of file - 6825 bytes

Rorschach112
2008-04-29, 01:16
Can you post the ComboFix log

And do this


Please download Malwarebytes' Anti-Malware from Here (http://www.besttechie.net/tools/mbam-setup.exe) or Here (http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html)

Double Click mbam-setup.exe to install the application.
Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
If an update is found, it will download and install the latest version.
Once the program has loaded, select "Perform Full Scan", then click Scan. Check all the boxes and click Start Scan
The scan may take some time to finish,so please be patient.
When the scan is complete, click OK, then Show Results to view the results.
Make sure that everything is checked, and click Remove Selected.
When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
Copy&Paste the entire report in your next reply.

Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

MrBugger
2008-04-29, 21:21
Hi,

Once again thanks for helping me out.
Requested actions taken.

Malwarebytes' Anti-Malware Log:

Malwarebytes' Anti-Malware 1.11
Databasversion: 697

Skanningstyp: Fullständig skanning (C:\|D:\|)
Antal skannade objekt: 116565
Förfluten tid: 44 minute(s), 2 second(s)

Infekterade minnesprocesser: 0
Infekterade minnesmoduler: 0
Infekterade registernycklar: 3
Infekterade registervärden: 0
Infekterade registerdataposter: 0
Infekterade mappar: 0
Infekterade filer: 12

Infekterade minnesprocesser:
(Inga illasinnade poster hittades)

Infekterade minnesmoduler:
(Inga illasinnade poster hittades)

Infekterade registernycklar:
HKEY_CURRENT_USER\Software\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.

Infekterade registervärden:
(Inga illasinnade poster hittades)

Infekterade registerdataposter:
(Inga illasinnade poster hittades)

Infekterade mappar:
(Inga illasinnade poster hittades)

Infekterade filer:
C:\QooBox\Quarantine\C\WINDOWS\system32\fccbaASk.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP71\A0013384.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP71\A0013400.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP71\A0013511.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013659.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013660.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013668.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013676.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP73\A0013686.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP73\A0013704.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP73\A0013744.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP75\A0014003.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

ComboFix log:

ComboFix 08-04-27.1 - Johan Ohlsson 2008-04-29 0:06:10.3 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1053.18.1661 [GMT 2:00]
Running from: C:\Documents and Settings\Johan Ohlsson\Skrivbord\ComboFix.exe
Command switches used :: C:\Documents and Settings\Johan Ohlsson\Skrivbord\CFScript.txt
* Created a new restore point

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!

FILE ::
C:\WINDOWS\BM33521d95.xml
.

((((((((((((((((((((((((( Files Created from 2008-03-28 to 2008-04-28 )))))))))))))))))))))))))))))))
.

2008-04-28 14:59 . 2008-04-28 14:59 <KAT> d-------- C:\WINDOWS\system32\config\systemprofile\Lokala instõllningar
2008-04-28 14:59 . 2008-04-28 14:59 <KAT> d-------- C:\Documents and Settings\NetworkService\Lokala instõllningar
2008-04-28 14:59 . 2008-04-28 14:59 <KAT> d-------- C:\Documents and Settings\LocalService\Lokala instõllningar
2008-04-28 14:59 . 2008-04-28 14:59 <KAT> d-------- C:\Documents and Settings\Johan Ohlsson\Lokala instõllningar
2008-04-28 14:53 . 2008-04-28 14:53 1,024 --ah----- C:\WINDOWS\system32\config\systemprofile\ntuser.dat.LOG
2008-04-28 14:14 . 2008-04-28 14:14 <KAT> d-------- C:\_OTMoveIt
2008-04-28 12:00 . 2008-04-28 12:00 <KAT> d-------- C:\Program\Trend Micro
2008-04-28 10:43 . 2008-04-28 10:43 <KAT> d-------- C:\WINDOWS\system32\Kaspersky Lab
2008-04-28 10:43 . 2008-04-28 10:43 <KAT> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
2008-04-27 17:55 . 2008-04-28 00:12 1,251 --a------ C:\WINDOWS\wininit.ini
2008-04-26 16:54 . 2008-04-26 16:54 <KAT> d-------- C:\Documents and Settings\All Users\Application Data\Apple Computer
2008-04-26 16:53 . 2008-04-26 16:53 <KAT> d-------- C:\Program\River Past
2008-04-26 16:53 . 2008-04-26 16:53 <KAT> d-------- C:\Documents and Settings\Johan Ohlsson\Application Data\River Past G5
2008-04-26 16:53 . 2008-04-27 19:53 <KAT> d-------- C:\Documents and Settings\All Users\Application Data\River Past G5
2008-04-13 10:08 . 2008-04-13 10:08 <KAT> d-------- C:\Program\XCC
2008-04-07 19:08 . 2008-04-09 19:23 <KAT> d-------- C:\WINDOWS\system32\Adobe

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-03-23 16:13 --------- d-----w C:\Program\QuickTime
2008-03-23 16:13 --------- d-----w C:\Program\ImTOO
2008-03-23 16:08 --------- d-----w C:\Documents and Settings\Johan Ohlsson\Application Data\vlc
2008-03-23 16:04 --------- d-----w C:\Program\VideoLAN
2008-03-20 08:10 1,845,248 ----a-w C:\WINDOWS\system32\win32k.sys
2008-03-02 10:01 --------- d-----w C:\Program\Delade filer\Adobe
2008-03-01 13:02 826,368 ----a-w C:\WINDOWS\system32\wininet.dll
2008-02-20 06:51 282,624 ----a-w C:\WINDOWS\system32\gdi32.dll
2008-02-20 05:38 45,568 ----a-w C:\WINDOWS\system32\dnsrslvr.dll
2008-02-02 20:17 86,016 ----a-w C:\WINDOWS\system32\OpenAL32.dll
2008-02-02 20:17 409,600 ----a-w C:\WINDOWS\system32\wrap_oal.dll
2008-02-02 17:40 81,920 ------r C:\WINDOWS\bwUnin-6.1.4.55-7681197L.exe
2008-02-02 17:01 558,142 ----a-w C:\WINDOWS\java\Packages\9B5RFHR7.ZIP
2008-02-02 17:01 155,995 ----a-w C:\WINDOWS\java\Packages\XFZD7V7D.ZIP
.

(((((((((((((((((((((((((((((((((((((((((((( Look )))))))))))))))))))))))))))))))))))))))))))))))))))))))))
.

---- Directory of D:\Eget ----

2007-01-04 19:25 695633 --a------ D:\Eget\Innebandy\Regelhandboken202006.pdf
2005-08-14 10:47 18432 --a------ D:\Eget\FTP\Nätverk.xls
2004-10-28 11:57 39040 --a------ D:\Eget\Dotcom\wsttcp.ZIP
2004-10-12 19:46 16212 --a------ D:\Eget\Eyetest\elefant_synvilla.gif
2004-10-12 19:41 29273 --a------ D:\Eget\Eyetest\blkspots.jpg
2004-10-12 19:41 24097 --a------ D:\Eget\Eyetest\eyetest.jpg
2004-09-15 08:49 6024844 --a------ D:\Eget\D-Link\DWL-G810_QIG_EU13.pdf
2004-09-15 08:49 1142952 --a------ D:\Eget\D-Link\DWL-G810 Manual.pdf
2004-08-25 08:57 4372012 --a------ D:\Eget\Navman\UserManual(Svenska).pdf
2004-05-25 08:48 65536 --a------ D:\Eget\VPN\Admin_Sve.exe
2004-05-25 08:48 41984 --a------ D:\Eget\VPN\Profilinstallation.doc
2004-05-25 08:43 21 --a------ D:\Eget\VPN\Länk.txt
2004-05-25 08:42 266752 --a------ D:\Eget\VPN\VPN_SafeWord_Gold_3000.doc
2004-05-02 17:46 533 --a------ D:\Eget\Dotcom\VPN Dialer.lnk
2004-04-14 19:36 33 --a------ D:\Eget\Tele2 Login\settings.ini
2004-04-13 21:55 7297 --a------ D:\Eget\Tele2 Login\Tele2.zip
2004-04-13 21:46 28672 --a------ D:\Eget\Tele2 Login\T2Loggin.exe
2004-04-13 21:11 28672 --a------ D:\Eget\Tele2 Login\adsllogin.exe
2004-04-13 18:15 33 --a------ D:\Eget\Tele2 Login\Login Debug\settings.ini
2004-04-13 17:14 28672 --a------ D:\Eget\Tele2 Login\Login Debug\adsllogin.exe
2004-01-26 19:19 20992 --a------ D:\Eget\FTP\Info ohlsson.mine.nu.doc
2004-01-04 18:25 229380 --a------ D:\Eget\Spelmanualer\thesims-walkthrough01.txt
2004-01-02 15:27 32768 --a------ D:\Eget\WGI\Aktivera ditt Pay2 Kort.doc
2004-01-02 15:26 28160 --a------ D:\Eget\WGI\Aktivera din Pay2 e-Wallet.doc
2004-01-02 15:25 22528 --a------ D:\Eget\WGI\Så ansöker du PAY2(1).doc
2004-01-02 14:52 70 --a------ D:\Eget\Ports Zero Hour.txt
2004-01-02 14:44 499194 --a------ D:\Eget\Ports.bmp
2003-12-30 16:08 415 --a------ D:\Eget\Dotcom\alf2.r4w.lnk
2003-12-29 09:56 40448 --a------ D:\Eget\TPTester\TPTest 031229 NetGear Tele2.doc
2003-12-28 20:18 39424 --a------ D:\Eget\TPTester\TPTest 031228 NetGear Tele2.doc
2003-12-28 20:07 126976 --a------ D:\Eget\Bredbandstest\V3.0.5\tp305swe.exe
2003-08-10 14:37 735744 --a------ D:\Eget\Spelmanualer\Rollercoaster.doc
2002-11-06 11:56 0 --a------ D:\Eget\Dotcom\NETPERF\netperf.log
2001-12-03 18:31 19456 --a------ D:\Eget\Dotcom\NETPERF\Readme-RH.doc
2001-10-31 17:37 205929 --a------ D:\Eget\Dotcom\NETPERF\NETPERF.ZIP
2001-01-20 17:37 26020 --a------ D:\Eget\FTP\22.interface.html
2001-01-20 17:34 19951 --a------ D:\Eget\FTP\31.setupuser.html
2000-11-09 15:35 13759 --a------ D:\Eget\FTP\pix\servermultiip.gif
2000-09-19 12:42 1273 --a------ D:\Eget\FTP\11.installation.html
2000-09-08 13:08 24551 --a------ D:\Eget\FTP\pix\user_ratio.gif
2000-09-08 13:05 49959 --a------ D:\Eget\FTP\pix\tutor2.gif
2000-09-08 13:02 19603 --a------ D:\Eget\FTP\pix\eventsmanager.gif
2000-09-08 12:32 11394 --a------ D:\Eget\FTP\pix\serverfreefiles.gif
2000-09-08 12:30 13038 --a------ D:\Eget\FTP\pix\serverlogfile.gif
2000-09-08 12:30 12895 --a------ D:\Eget\FTP\pix\serverlogscreen.gif
2000-09-08 12:29 15052 --a------ D:\Eget\FTP\pix\serverlogadvanced.gif
2000-09-08 12:28 16438 --a------ D:\Eget\FTP\pix\servervisual.gif
2000-09-08 12:28 14353 --a------ D:\Eget\FTP\pix\serverlogsetup.gif
2000-09-08 12:16 11832 --a------ D:\Eget\FTP\pix\serverdynip.gif
2000-09-08 12:15 10692 --a------ D:\Eget\FTP\pix\serverscheduler.gif
2000-09-08 12:13 11527 --a------ D:\Eget\FTP\pix\serverstatgen.gif
2000-09-08 12:11 10019 --a------ D:\Eget\FTP\pix\servercache.gif
2000-09-08 12:09 14742 --a------ D:\Eget\FTP\pix\serveradvanced.gif
2000-09-08 12:08 15212 --a------ D:\Eget\FTP\pix\serveroptions.gif
2000-09-08 12:05 6016 --a------ D:\Eget\FTP\pix\servergeneral.gif
2000-09-08 12:00 27403 --a------ D:\Eget\FTP\pix\setupmain.gif
2000-09-07 17:13 2915 --a------ D:\Eget\FTP\41.ftpcommands.html
2000-09-07 16:17 4243 --a------ D:\Eget\FTP\menu.html
2000-07-24 13:34 6099 --a------ D:\Eget\FTP\33.linksfile.html
2000-07-24 13:33 38390 --a------ D:\Eget\FTP\pix\vd3.gif
2000-07-24 13:32 33935 --a------ D:\Eget\FTP\pix\vd2.gif
2000-07-24 13:28 33582 --a------ D:\Eget\FTP\pix\vd1.gif
2000-07-24 11:18 6224 --a------ D:\Eget\FTP\pix\ipaccess.gif
2000-07-24 11:18 2220 --a------ D:\Eget\FTP\35.ipaccess.html
2000-07-24 11:12 3790 --a------ D:\Eget\FTP\pix\infomenu2.gif
2000-07-24 11:10 10235 --a------ D:\Eget\FTP\pix\stat.gif
2000-07-24 11:05 1059 --a------ D:\Eget\FTP\21.briefdescription.html
2000-07-24 11:04 1063 --a------ D:\Eget\FTP\00.legal.html
2000-06-16 15:04 0 --a------ D:\Eget\Dotcom\NETPERF\readme.txt
2000-06-11 17:57 25263 --a------ D:\Eget\FTP\pix\serveractivity.gif
2000-06-11 10:44 995 --a------ D:\Eget\FTP\42.commandline.html
2000-06-11 10:44 9525 --a------ D:\Eget\FTP\pix\hitometer.gif
2000-06-11 10:44 9328 --a------ D:\Eget\FTP\pix\service.gif
2000-06-11 10:44 9295 --a------ D:\Eget\FTP\pix\tutor4_1.gif
2000-06-11 10:44 9266 --a------ D:\Eget\FTP\pix\tutor5_1.gif
2000-06-11 10:44 8962 --a------ D:\Eget\FTP\pix\g6ftpserver_logo.jpg
2000-06-11 10:44 891 --a------ D:\Eget\FTP\pix\33_copy.gif
2000-06-11 10:44 772 --a------ D:\Eget\FTP\accueil.html
2000-06-11 10:44 767 --a------ D:\Eget\FTP\12.uninstall.html
2000-06-11 10:44 7227 --a------ D:\Eget\FTP\pix\user_links.gif
2000-06-11 10:44 6366 --a------ D:\Eget\FTP\pix\sendmessage.gif
2000-06-11 10:44 6121 --a------ D:\Eget\FTP\pix\user_misc.gif
2000-06-11 10:44 605 --a------ D:\Eget\FTP\g6.css
2000-06-11 10:44 5752 --a------ D:\Eget\FTP\51.registration.html
2000-06-11 10:44 5180 --a------ D:\Eget\FTP\pix\userban.gif
2000-06-11 10:44 3903 --a------ D:\Eget\FTP\34.spyuser.html
2000-06-11 10:44 37803 --a------ D:\Eget\FTP\pix\tutor3.gif
2000-06-11 10:44 31621 --a------ D:\Eget\FTP\pix\tutor1.gif
2000-06-11 10:44 3122 --a------ D:\Eget\FTP\pix\g6ftpserver_logo_90x41.gif
2000-06-11 10:44 307 --a------ D:\Eget\FTP\pix\06_event.gif
2000-06-11 10:44 30414 --a------ D:\Eget\FTP\pix\user_setup.gif
2000-06-11 10:44 3004 --a------ D:\Eget\FTP\pix\tutor4.gif
2000-06-11 10:44 2917 --a------ D:\Eget\FTP\pix\tutor5.gif
2000-06-11 10:44 28820 --a------ D:\Eget\FTP\pix\linksfile.gif
2000-06-11 10:44 2776 --a------ D:\Eget\FTP\44.service.html
2000-06-11 10:44 27004 --a------ D:\Eget\FTP\pix\group.gif
2000-06-11 10:44 248 --a------ D:\Eget\FTP\index.html
2000-06-11 10:44 2205 --a------ D:\Eget\FTP\30.tutorial.html
2000-06-11 10:44 2144 --a------ D:\Eget\FTP\pix\ipsetting.gif
2000-06-11 10:44 2137 --a------ D:\Eget\FTP\pix\links.gif
2000-06-11 10:44 2093 --a------ D:\Eget\FTP\45.technical.html
2000-06-11 10:44 202 --a------ D:\Eget\FTP\pix\17_setup.gif
2000-06-11 10:44 1953 --a------ D:\Eget\FTP\43.performance.html
2000-06-11 10:44 19361 --a------ D:\Eget\FTP\pix\interface1.gif
2000-06-11 10:44 1758 --a------ D:\Eget\FTP\52.bug.html
2000-06-11 10:44 166 --a------ D:\Eget\FTP\pix\28_userbannedlist.gif
2000-06-11 10:44 159 --a------ D:\Eget\FTP\pix\21_group.gif
2000-06-11 10:44 158 --a------ D:\Eget\FTP\pix\27_userlist.gif
2000-06-11 10:44 154 --a------ D:\Eget\FTP\pix\26_refresh.gif
2000-06-11 10:44 151 --a------ D:\Eget\FTP\pix\19_user.gif
2000-06-11 10:44 148 --a------ D:\Eget\FTP\pix\25_logtoscreen.gif
2000-06-11 10:44 148 --a------ D:\Eget\FTP\pix\07_free_files.gif
2000-06-11 10:44 147 --a------ D:\Eget\FTP\pix\20_alwaysontop.gif
2000-06-11 10:44 145 --a------ D:\Eget\FTP\pix\11_loupe.gif
2000-06-11 10:44 144 --a------ D:\Eget\FTP\pix\24_kick.gif
2000-06-11 10:44 14363 --a------ D:\Eget\FTP\pix\ipaccess.jpg
2000-06-11 10:44 141 --a------ D:\Eget\FTP\pix\10_logging.gif
2000-06-11 10:44 139 --a------ D:\Eget\FTP\pix\08_info.gif
2000-06-11 10:44 139 --a------ D:\Eget\FTP\pix\05_door_closed.gif
2000-06-11 10:44 136 --a------ D:\Eget\FTP\pix\18_stat.gif
2000-06-11 10:44 136 --a------ D:\Eget\FTP\pix\09_log.gif
2000-06-11 10:44 131 --a------ D:\Eget\FTP\pix\16_quit.gif
2000-06-11 10:44 131 --a------ D:\Eget\FTP\pix\04_clear_new.gif
2000-06-11 10:44 131 --a------ D:\Eget\FTP\pix\02_online.gif
2000-06-11 10:44 130 --a------ D:\Eget\FTP\pix\32_ip.gif
2000-06-11 10:44 122 --a------ D:\Eget\FTP\pix\29_grid.gif
2000-06-11 10:44 120 --a------ D:\Eget\FTP\pix\13_pause.gif
2000-06-11 10:44 118 --a------ D:\Eget\FTP\pix\03_wordwrap.gif
2000-06-11 10:44 114 --a------ D:\Eget\FTP\pix\15_pointint.gif
2000-02-04 17:14 52224 --a------ D:\Eget\Dotcom\NETPERF\Netperf.ppt
2000-02-04 16:09 33 --a------ D:\Eget\Dotcom\NETPERF\NETSERV.BAT
1999-02-11 16:36 209568 --a------ D:\Eget\Dotcom\NETPERF\netserver.exe
1999-02-11 16:36 207496 --a------ D:\Eget\Dotcom\NETPERF\netperf.exe
1998-02-27 12:42 509440 --a------ D:\Eget\Dotcom\WFTPD.EXE


((((((((((((((((((((((((((((( snapshot@2008-04-28_14.58.53.39 )))))))))))))))))))))))))))))))))))))))))
.
- 2008-04-28 12:57:22 2,048 --s-a-w C:\WINDOWS\bootstat.dat
+ 2008-04-28 21:31:15 2,048 --s-a-w C:\WINDOWS\bootstat.dat
- 2008-04-28 12:21:57 39,992 ----a-w C:\WINDOWS\system32\perfc009.dat
+ 2008-04-28 21:35:32 39,992 ----a-w C:\WINDOWS\system32\perfc009.dat
- 2008-04-28 12:21:57 47,784 ----a-w C:\WINDOWS\system32\perfc01D.dat
+ 2008-04-28 21:35:32 47,784 ----a-w C:\WINDOWS\system32\perfc01D.dat
- 2008-04-28 12:21:57 311,604 ----a-w C:\WINDOWS\system32\perfh009.dat
+ 2008-04-28 21:35:32 311,604 ----a-w C:\WINDOWS\system32\perfh009.dat
- 2008-04-28 12:21:57 315,006 ----a-w C:\WINDOWS\system32\perfh01D.dat
+ 2008-04-28 21:35:32 315,006 ----a-w C:\WINDOWS\system32\perfh01D.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-04 02:34 15360]
"MsnMsgr"="C:\Program\Windows Live\Messenger\MsnMsgr.exe" [2007-10-18 12:35 5724184]
"MSMSGS"="C:\Program\Messenger\msmsgs.exe" [2004-10-13 18:24 1694208]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"F-Secure Manager"="C:\Program\F-Secure\Common\FSM32.exe" [2002-12-05 17:24 106571]
"DAEMON Tools-1033"="C:\Program\D-Tools\daemon.exe" [2004-08-22 18:05 81920]
"NvCplDaemon"="C:\WINDOWS\system32\NvCpl.dll" [2007-12-05 02:41 8523776]
"nwiz"="nwiz.exe" [2007-12-05 02:41 1626112 C:\WINDOWS\system32\nwiz.exe]
"NvMediaCenter"="C:\WINDOWS\system32\NvMcTray.dll" [2007-12-05 02:41 81920]
"CTHelper"="CTHELPER.EXE" [2006-08-11 15:56 17920 C:\WINDOWS\CTHELPER.EXE]
"CTxfiHlp"="CTXFIHLP.EXE" [2006-08-11 15:56 18944 C:\WINDOWS\system32\CTXFIHLP.EXE]
"WheelMouse"="C:\Program\A4Tech\Mouse\Amoumain.exe" [2006-02-17 11:14 163840]
"BluetoothAuthenticationAgent"="bthprops.cpl" [2004-08-04 02:34 110592 C:\WINDOWS\system32\bthprops.cpl]
"Adobe Reader Speed Launcher"="C:\Program\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 23:16 39792]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="C:\WINDOWS\System32\CTFMON.EXE" [2004-08-04 02:34 15360]

C:\Documents and Settings\All Users\Start-meny\Program\Autostart\
BTTray.lnk - C:\Program\Belkin\Bluetooth Software\BTTray.exe [2003-09-16 19:14:28 499779]
Microsoft Office.lnk - C:\Program\Microsoft Office\Office\OSA9.EXE [2000-01-21 03:15:56 65588]

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"C:\\WINDOWS\\system32\\sessmgr.exe"=
"D:\\Mohaa\\MOHAA.exe"=
"D:\\Westwood\\RA2\\patchget.dat"=
"C:\\Program\\Windows Live\\Messenger\\msnmsgr.exe"=
"C:\\Program\\Windows Live\\Messenger\\livecall.exe"=
"D:\\Westwood\\RA2\\game.exe"=
"D:\\Westwood\\RA2\\mph.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"1234:UDP"= 1234:UDP:1234
"1235:UDP"= 1235:UDP:1235
"1236:UDP"= 1236:UDP:1236
"1237:UDP"= 1237:UDP:1237
"7000:TCP"= 7000:TCP:7000
"7001:TCP"= 7001:TCP:7001
"7002:TCP"= 7002:TCP:7002
"3840:TCP"= 3840:TCP:3840
"4005:TCP"= 4005:TCP:4005
"4808:TCP"= 4808:TCP:4808
"4810:TCP"= 4810:TCP:4810
"4995:TCP"= 4995:TCP:4995

R2 BackWeb Client - 7681197;F-Secure BackWeb;C:\Program\F-Secure\BackWeb\7681197\Program\SERVIC~1.EXE [2008-02-02 19:40]
R2 F-Secure Filter;F-Secure File System Filter;C:\Program\F-Secure\Anti-Virus\Win2K\FSfilter.sys [2002-04-23 14:23]
R2 F-Secure Gatekeeper;F-Secure Gatekeeper;C:\Program\F-Secure\Anti-Virus\Win2K\FSgk.sys [2002-12-03 09:36]
R2 F-Secure Recognizer;F-Secure File System Recognizer;C:\Program\F-Secure\Anti-Virus\Win2K\FSrec.sys [2002-04-23 14:23]
R2 FSpm;F-Secure Policy Manager;C:\Program\F-Secure\Common\FSPM.SYS [2002-12-05 17:24]

*Newly Created Service* - CATCHME
.
**************************************************************************

catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-04-29 00:06:54
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
Completion time: 2008-04-29 0:07:17
ComboFix-quarantined-files.txt 2008-04-28 22:07:15
ComboFix2.txt 2008-04-28 21:55:37
ComboFix3.txt 2008-04-28 12:59:10

Pre-Run: 240,772,825,088 byte ledigt
Post-Run: 240,761,077,760 byte ledigt

268 --- E O F --- 2008-04-09 08:26:52

Rorschach112
2008-04-30, 00:21
Your logs are clean ! We need to do a few things

Follow these steps to uninstall Combofix and tools used in the removal of malware

Click START then RUN
Now type Combofix /u in the runbox and click OK. Note the space between the X and the U, it needs to be there.
http://i189.photobucket.com/albums/z176/EPL47/CF_Cleanup.png




Below I have included a number of recommendations for how to protect your computer against malware infections.

* Keep Windows updated by regularly checking their website at :
http://windowsupdate.microsoft.com/
This will ensure your computer has always the latest security updates available installed on your computer.

* To reduce re-infection for malware in the future, I strongly recommend installing these free programs:
SpywareBlaster (http://www.javacoolsoftware.com/sbdownload.html) protects against bad ActiveX
IE-SPYAD (http://www.spywarewarrior.com/uiuc/res/ie-spyad.exe) puts over 5000 sites in your restricted zone so you'll be protected when you visit innocent-looking sites that aren't actually innocent at all
Have a look at this tutorial for IE-Spyad here (http://www.bleepingcomputer.com/tutorials/tutorial53.html)

* SpywareGuard (http://www.javacoolsoftware.com/sgdownload.html) offers realtime protection from spyware installation attempts.

Make Internet Explorer more secure

Click Start > Run
Type Inetcpl.cpl & click OK
Click on the Security tab
Click Reset all zones to default level
Make sure the Internet Zone is selected & Click Custom level
In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to "Prompt", and ("Initialize and Script ActiveX controls not marked as safe") to "Disable".
Next Click OK, then Apply button and then OK to exit the Internet Properties page.


* MVPS Hosts file (http://mvps.org/winhelp2002/hosts.htm) replaces your current HOSTS file with one containing well known ad sites and other bad sites. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer, meaning it will be difficult to infect yourself in the future.

* Please consider using an alternate browser. Mozilla's Firefox browser is fantastic; it is much more
secure than Internet Explorer, immune to almost all known browser hijackers, and also has the best built-in pop up
blocker (as an added benefit!) that I have ever seen. If you are interested, Firefox may be downloaded from
Here (http://www.mozilla.org/products/firefox/)

* Take a good look at the following suggestions for malware prevention by reading Tony Klein’s article 'How Did I Get Infected In The First Place'
Here (http://forums.spywareinfo.com/index.php?showtopic=60955)

Thank you for your patience, and performing all of the procedures requested.

MrBugger
2008-04-30, 18:48
Hi,

I'am a bit worried about Kaspersky showing more viruses?

-------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER REPORT
Wednesday, April 30, 2008 6:46:23 PM
Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 30/04/2008
Kaspersky Anti-Virus database records: 733227
-------------------------------------------------------------------------------

Scan Settings:
Scan using the following antivirus database: extended
Scan Archives: true
Scan Mail Bases: true

Scan Target - My Computer:
C:\
D:\
E:\
F:\
G:\
H:\
I:\
J:\
K:\

Scan Statistics:
Total number of scanned objects: 84550
Number of viruses found: 3
Number of infected objects: 23
Number of suspicious objects: 0
Duration of the scan process: 01:01:20

Infected Object Name / Virus Name / Last Action
C:\Documents and Settings\Johan Ohlsson\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\Lokala inställningar\Application Data\Microsoft\Feeds Cache\index.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\Lokala inställningar\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\Lokala inställningar\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\Lokala inställningar\Temporary Internet Files\AntiPhishing\B3BB5BBA-E7D5-40AB-A041-A5B1C0B26C8F.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\Lokala inställningar\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\Lokala inställningar\Tidigare\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\Lokala inställningar\Tidigare\History.IE5\MSHist012008043020080501\index.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\ntuser.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\NTUSER.DAT.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Lokala inställningar\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LocalService\Lokala inställningar\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Lokala inställningar\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Lokala inställningar\Tidigare\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Lokala inställningar\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Lokala inställningar\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\cache.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\chandir.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\chandir.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\chn.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\chn.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\D0000000.FCS Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\inuse.txt Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\L0000004.FCS Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\main.log Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_die.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_die.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_dnd.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_dnd.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_ext.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_ext.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_rcv.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_rcv.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\storydb.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\storydb.idx Object is locked skipped
C:\Program\F-Secure\Common\policy.ipf Object is locked skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\auhkfggy.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.qrt skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\hgGwTmmN.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\kofgyalw.dll.vir Infected: Packed.Win32.Monder.gen skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\rpwvpdnh.dll.vir Infected: Packed.Win32.Monder.gen skipped
C:\QooBox\Quarantine\catchme2008-04-28_145607,96.zip/fccbaASk.dll Infected: Packed.Win32.Monder.gen skipped
C:\QooBox\Quarantine\catchme2008-04-28_145607,96.zip ZIP: infected - 1 skipped
C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP71\A0013482.exe/data.rar/setupa.exe Infected: Packed.Win32.Monder.gen skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP71\A0013482.exe/data.rar Infected: Packed.Win32.Monder.gen skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP71\A0013482.exe RarSFX: infected - 2 skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013658.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013661.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013664.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013666.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013667.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013669.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013677.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP72\A0013678.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP75\A0013982.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.qrt skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP75\A0013983.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP75\A0013984.dll Infected: Packed.Win32.Monder.gen skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP75\A0013985.dll Infected: Packed.Win32.Monder.gen skipped
C:\System Volume Information\_restore{D85A3496-07E2-41DC-9C85-87A53BFABD01}\RP77\change.log Object is locked skipped
C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
C:\WINDOWS\fsgk32.log Object is locked skipped
C:\WINDOWS\fssm32.log Object is locked skipped
C:\WINDOWS\SchedLgU.Txt Object is locked skipped
C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\default Object is locked skipped
C:\WINDOWS\system32\config\default.LOG Object is locked skipped
C:\WINDOWS\system32\config\Internet.evt Object is locked skipped
C:\WINDOWS\system32\config\SAM Object is locked skipped
C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SECURITY Object is locked skipped
C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
C:\WINDOWS\system32\config\software Object is locked skipped
C:\WINDOWS\system32\config\software.LOG Object is locked skipped
C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\system Object is locked skipped
C:\WINDOWS\system32\config\system.LOG Object is locked skipped
C:\WINDOWS\system32\h323log.txt Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped
C:\WINDOWS\WindowsUpdate.log Object is locked skipped
C:\WINDOWS\{00000002-00000000-0000000B-00001102-00000004-20051102}.CDF Object is locked skipped
C:\_OTMoveIt\MovedFiles\04282008_141416\WINDOWS\system32\ljJDTMcY.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
C:\_OTMoveIt\MovedFiles\04282008_141416\WINDOWS\system32\tuvVLbCu.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.nnp skipped
D:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped

Scan process completed.

Rorschach112
2008-04-30, 20:36
You don't need to worry, those are the pieces of malware that we have quarantined

If you follow the steps in my previous post they will be gone

Let me know how that goes

MrBugger
2008-04-30, 22:38
Hi,

You were so right again =)

Is Kaspersky the best way to check if my computer is okay?

-------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER REPORT
Wednesday, April 30, 2008 10:36:25 PM
Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 30/04/2008
Kaspersky Anti-Virus database records: 733438
-------------------------------------------------------------------------------

Scan Settings:
Scan using the following antivirus database: extended
Scan Archives: true
Scan Mail Bases: true

Scan Target - My Computer:
C:\
D:\
E:\
F:\
G:\
H:\
I:\
J:\
K:\

Scan Statistics:
Total number of scanned objects: 69660
Number of viruses found: 0
Number of infected objects: 0
Number of suspicious objects: 0
Duration of the scan process: 00:45:58

Infected Object Name / Virus Name / Last Action
C:\Documents and Settings\Johan Ohlsson\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\Lokala inställningar\Application Data\Microsoft\Feeds Cache\index.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\Lokala inställningar\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\Lokala inställningar\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\Lokala inställningar\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\Lokala inställningar\Tidigare\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\Lokala inställningar\Tidigare\History.IE5\MSHist012008043020080501\index.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\ntuser.dat Object is locked skipped
C:\Documents and Settings\Johan Ohlsson\NTUSER.DAT.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Lokala inställningar\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LocalService\Lokala inställningar\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Lokala inställningar\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Lokala inställningar\Tidigare\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Lokala inställningar\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Lokala inställningar\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\cache.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\chandir.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\chandir.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\chn.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\chn.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\D0000000.FCS Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\inuse.txt Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\L0000004.FCS Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\main.log Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_die.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_die.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_dnd.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_dnd.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_ext.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_ext.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_rcv.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\prs_rcv.idx Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\storydb.dat Object is locked skipped
C:\Program\F-Secure\BackWeb\7681197\Users\Default\Data\storydb.idx Object is locked skipped
C:\Program\F-Secure\Common\policy.ipf Object is locked skipped
C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
C:\WINDOWS\fsgk32.log Object is locked skipped
C:\WINDOWS\fssm32.log Object is locked skipped
C:\WINDOWS\SchedLgU.Txt Object is locked skipped
C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\default Object is locked skipped
C:\WINDOWS\system32\config\default.LOG Object is locked skipped
C:\WINDOWS\system32\config\Internet.evt Object is locked skipped
C:\WINDOWS\system32\config\SAM Object is locked skipped
C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SECURITY Object is locked skipped
C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
C:\WINDOWS\system32\config\software Object is locked skipped
C:\WINDOWS\system32\config\software.LOG Object is locked skipped
C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\system Object is locked skipped
C:\WINDOWS\system32\config\system.LOG Object is locked skipped
C:\WINDOWS\system32\h323log.txt Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped
C:\WINDOWS\WindowsUpdate.log Object is locked skipped
C:\WINDOWS\{00000002-00000000-0000000B-00001102-00000004-20051102}.CDF Object is locked skipped
D:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped

Scan process completed.

Rorschach112
2008-04-30, 22:52
Yeah I would say it is, a very good scanner

Any questions ? We are all done here :)

MrBugger
2008-04-30, 23:25
No, i am very pleased with the help from you

Keep the good work up guys

Best regards

Rorschach112
2008-04-30, 23:28
Since this issue appears to be resolved ... this Topic has been closed. Glad I could help.

Note: If it has been five days or more since your last post, and the helper assisting you posted a response to that post to which you did not reply, your topic will not be reopened. At that point, if you still require help, please start a new topic and include a fresh HijackThis log and a link to your previous thread.

If it has been less than five days since your last response and you need the thread re-opened, please send me or your helper a private message (pm). A valid, working link to the closed topic is required.