View Full Version : Help - Infected with Virtumonde, Smitfraud, etc
storeyline
2008-07-25, 00:22
I need your help! My computer is infected with these viruses (Virtumonde, Smitfraud) those are just the ones I know about and I have no idea what to do. I've tried to download McAfee security center but my computer won't allow it. Your help will be greatly appreciated.
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 2:00:31 AM, on 7/23/2008
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\lxdccoms.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Binn\sqlservr.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\ctfmon.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\drivers\spools.exe
C:\WINDOWS\System32\ctfmon.exe
C:\WINDOWS\System32\taskmgr.exe
C:\WINDOWS\System32\rundll32.exe
C:\WINDOWS\system32\drivers\spools.exe
C:\WINDOWS\System32\rundll32.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\System32\dwwin.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\WINDOWS\System32\wbem\wmiprvse.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/customize/ie/defaults/sb/sbcydsl/*http://www.yahoo.com/search/ie.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://red.clientapps.yahoo.com/customize/ie/defaults/sp/sbcydsl/*http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://red.clientapps.yahoo.com/customize/ie/defaults/su/sbcydsl/*http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/customize/ie/defaults/sb/sbcydsl/*http://www.yahoo.com/search/ie.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://red.clientapps.yahoo.com/customize/ie/defaults/sp/sbcydsl/*http://www.yahoo.com
O2 - BHO: AVG Safe Search - {1C1B8A44-61FE-411E-8F33-813A4E2E2984} - C:\WINDOWS\System32\AVIRAS~1.DLL
O2 - BHO: (no name) - {2BF98F47-2AFF-43D3-8D9E-EC84BCDC3F5B} - (no file)
O2 - BHO: (no name) - {2F8BF994-F0EA-4A73-B6BA-EF93DBE16B63} - C:\WINDOWS\System32\nnnkIbbY.dll (file missing)
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {5A3AFBB4-3119-49FE-9DA8-407FE5F7211C} - C:\WINDOWS\System32\wvUnNecY.dll (file missing)
O2 - BHO: (no name) - {680DBEE8-B862-4B3B-9A3B-3F6DD618BA25} - C:\WINDOWS\System32\mlJBSlLc.dll (file missing)
O2 - BHO: {598346fe-7fe5-e33b-0974-23b0c83932a6} - {6a23938c-0b32-4790-b33e-5ef7ef643895} - C:\WINDOWS\System32\adnpuc.dll
O2 - BHO: scriptproxy - {6D0386B3-FD72-488E-9740-90355AE21735} - C:\WINDOWS\System32\diga32.dll
O2 - BHO: (no name) - {6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C} - C:\WINDOWS\system32\iifcDWol.dll
O2 - BHO: (no name) - {74C466E9-2FC5-43D7-8560-FE4362A2A30E} - C:\WINDOWS\System32\rqRIyWqP.dll (file missing)
O2 - BHO: (no name) - {9E2C792A-1249-49BC-B1E3-27E1C7061905} - C:\WINDOWS\System32\iiffGWMe.dll (file missing)
O2 - BHO: (no name) - {A7DAFB2E-E95B-4F23-B681-90C8040E5A96} - C:\WINDOWS\System32\qoMdBSmN.dll (file missing)
O2 - BHO: (no name) - {E135EFEB-9E21-4EF4-8E24-2EDD98F6C87F} - C:\WINDOWS\System32\opnnnmkk.dll (file missing)
O3 - Toolbar: Lexmark Toolbar - {1017A80C-6F09-4548-A84D-EDD6AC9525F0} - C:\Program Files\Lexmark Toolbar\toolband.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [ntuser] C:\WINDOWS\system32\drivers\spools.exe
O4 - HKLM\..\Run: [C:\WINDOWS\system32\kdolk.exe] C:\WINDOWS\system32\kdolk.exe
O4 - HKLM\..\Run: [C:\WINDOWS\System32\kddgq.exe] C:\WINDOWS\System32\kddgq.exe
O4 - HKLM\..\Run: [6c129041] rundll32.exe "C:\WINDOWS\System32\xrhdovjk.dll",b
O4 - HKLM\..\Run: [BM6f21a3dd] Rundll32.exe "C:\WINDOWS\System32\kyjheqcs.dll",s
O4 - HKLM\..\Run: [autoload] C:\Documents and Settings\Admin.ANGIES\cftmon.exe
O4 - HKLM\..\RunOnce: [Spybot - Search & Destroy] "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe" /autocheck
O4 - HKLM\..\RunOnce: [SpybotDeletingA2607] command /c del "C:\WINDOWS\system32\mlJBSlLc.dll_old"
O4 - HKLM\..\RunOnce: [SpybotDeletingC2887] cmd /c del "C:\WINDOWS\system32\iifcDWol.dll"
O4 - HKLM\..\RunOnce: [SpybotDeletingA542] command /c del "C:\WINDOWS\system32\iifcDWol.dll"
O4 - HKLM\..\RunOnce: [SpybotDeletingA5051] command /c del "C:\WINDOWS\system32\kyjheqcs.dll_old"
O4 - HKLM\..\RunOnce: [SpybotDeletingC7712] cmd /c del "C:\WINDOWS\system32\kyjheqcs.dll_old"
O4 - HKLM\..\RunOnce: [SpybotSnD] "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe" /autocheck
O4 - HKCU\..\Run: [ntuser] C:\WINDOWS\system32\drivers\spools.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [autoload] C:\Documents and Settings\Admin.ANGIES\cftmon.exe
O4 - HKCU\..\RunOnce: [SpybotDeletingB9380] command /c del "C:\WINDOWS\system32\mlJBSlLc.dll_old"
O4 - HKCU\..\RunOnce: [SpybotDeletingD4642] cmd /c del "C:\WINDOWS\system32\mlJBSlLc.dll_old"
O4 - HKCU\..\RunOnce: [SpybotDeletingB6749] command /c del "C:\WINDOWS\system32\iifcDWol.dll"
O4 - HKCU\..\RunOnce: [SpybotDeletingD3800] cmd /c del "C:\WINDOWS\system32\iifcDWol.dll"
O4 - HKCU\..\RunOnce: [SpybotDeletingB1935] command /c del "C:\WINDOWS\system32\kyjheqcs.dll_old"
O4 - HKCU\..\RunOnce: [SpybotDeletingD3328] cmd /c del "C:\WINDOWS\system32\kyjheqcs.dll_old"
O4 - HKUS\S-1-5-21-790525478-920026266-1708537768-1003\..\Run: [ntuser] C:\WINDOWS\system32\drivers\spools.exe (User 'angela storey')
O4 - HKUS\S-1-5-21-790525478-920026266-1708537768-1003\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe (User 'angela storey')
O4 - HKUS\S-1-5-21-790525478-920026266-1708537768-1003\..\Run: [autoload] C:\Documents and Settings\angela storey\cftmon.exe (User 'angela storey')
O4 - HKUS\S-1-5-18\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'Default user')
O4 - S-1-5-21-790525478-920026266-1708537768-1003 Startup: LimeWire On Startup.lnk = C:\Program Files\LimeWire\LimeWire.exe (User 'angela storey')
O4 - S-1-5-21-790525478-920026266-1708537768-1003 User Startup: LimeWire On Startup.lnk = C:\Program Files\LimeWire\LimeWire.exe (User 'angela storey')
O4 - Global Startup: PowerReg Scheduler.exe
O4 - Global Startup: SBC Self Support Tool.lnk = C:\Program Files\SBC Self Support Tool\bin\matcli.exe
O9 - Extra button: AT&T Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\PROGRA~1\YAHOO!\COMMON\yiesrvc.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm (file missing)
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm (file missing)
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O15 - Trusted Zone: http://*.mcafee.com
O17 - HKLM\System\CCS\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CCS\Services\Tcpip\..\{3ECE3F59-2495-49E1-9F9C-DD73ACCF6C6E}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 208.67.220.220 208.67.222.222
O17 - HKLM\System\CS1\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS2\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 208.67.220.220 208.67.222.222
O20 - Winlogon Notify: iifcDWol - C:\WINDOWS\SYSTEM32\iifcDWol.dll
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: lxdcCATSCustConnectService - Lexmark International, Inc. - C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxdcserv.exe
O23 - Service: lxdc_device - - C:\WINDOWS\System32\lxdccoms.exe
O23 - Service: Task Scheduler (Schedule) - Unknown owner - C:\WINDOWS\system32\drivers\spools.exe
--
End of file - 9537 bytes
Thank you...for your reply. What do I do next?
----------------------------------
Edit.
Thank you...for your reply. What do I do next?
Don't bump, read stickies? :fear:
New topic closed yesterday: http://forums.spybot.info/showthread.php?t=31575
Post here if still waiting for help in the Malware Forum, (AFTER) FOUR days (http://forums.spybot.info/showthread.php?t=1137)
Hi
Your system is heavily infected :sick:
Disable Spybot's TeaTimer
Run Spybot-S&D in Advanced Mode
If it is not already set to do this, go to the Mode menu
select
Advanced Mode
On the left hand side, click on Tools
Then click on the Resident icon in the list
Uncheck
Resident TeaTimer
and OK any prompts.
Restart your computer
You may want to print out these instructions for reference, since you
will have to restart your computer during the fix.
Please download FixWareout from one of these sites:
http://downloads.subratam.org/Fixwareout.exe
http://www.bleepingcomputer.com/files/lonny/Fixwareout.exe
Save it to your desktop and run it. Click Next, then Install, then make
sure Run fixit is checked and click Finish. The fix will
begin; follow the prompts. You will be asked to reboot your computer;
please do so. Your system may take longer than usual to load; this is
normal.
At the end of the fix, you may need to restart your computer again.
Finally, please post the contents of the logfile C:\fixwareout\report.txt
Then we'll continue.
A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine by running ComboFix. This tool is not a toy and not for everyday use.
1. Download combofix from any of these links and save it to Desktop:
Link 1 (http://download.bleepingcomputer.com/sUBs/ComboFix.exe)
Link 2 (http://www.forospyware.com/sUBs/ComboFix.exe)
Link 3 (http://subs.geekstogo.com/ComboFix.exe)
**Note: It is important that it is saved directly to your desktop**
2. Double click combofix.exe & follow the prompts.
3. When finished, it shall produce a log for you (C:\ComboFix.txt). Post that log & a fresh hjt log in your next reply
Note:
Do not mouseclick combofix's window whilst it's running. That may cause it to stall
Combofix should never take more that 20 minutes including the reboot if malware is detected.
If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
If that happened we want to know, and also what process you had to end.
If you have problems with Combofix usage, see here (http://www.bleepingcomputer.com/combofix/how-to-use-combofix)
storeyline
2008-07-29, 05:58
I really appreciate your help, thank you. I hope that I did everything correctly up to this point. Here are the reports that you instructed me to send.
ComboFix 08-07-28.4 - Admin 2008-07-27 7:14:49.1 - FAT32x86
Microsoft Windows XP Professional 5.1.2600.1.1252.1.1033.18.177 [GMT -7:00]
Running from: C:\Documents and Settings\Admin.ANGIES\Desktop\ComboFix.exe
* Created a new restore point
WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
C:\Documents and Settings\Admin.ANGIES\Application Data\macromedia\Flash Player\#SharedObjects\84688G7A\interclick.com
C:\Documents and Settings\Admin.ANGIES\Application Data\macromedia\Flash Player\#SharedObjects\84688G7A\interclick.com\ud.sol
C:\Documents and Settings\Admin.ANGIES\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com
C:\Documents and Settings\Admin.ANGIES\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com\settings.sol
C:\Program Files\Antispyware 2008
C:\Program Files\Antispyware 2008\Antispyware-2008.exe
C:\Program Files\Antispyware 2008\vscan.tsi
C:\Program Files\Antispyware 2008\zlib.dll
C:\WINDOWS\BM6f21a3dd.txt
C:\WINDOWS\Downloaded Program Files\setup.inf
C:\WINDOWS\pskt.ini
C:\WINDOWS\system32\adnpuc.dll
C:\WINDOWS\system32\awtttrsR.dll
C:\WINDOWS\system32\byXOeEUm.dll
C:\WINDOWS\system32\cLlSBJlm.ini
C:\WINDOWS\system32\cLlSBJlm.ini2
C:\WINDOWS\system32\ddcYsTnN.dll
C:\WINDOWS\system32\drivers\msliksurserv.sys
C:\WINDOWS\system32\drivers\spools.exe
C:\WINDOWS\system32\eezfnc.dll
C:\WINDOWS\system32\EhhiSvut.ini
C:\WINDOWS\system32\EhhiSvut.ini2
C:\WINDOWS\system32\eMWGffii.ini
C:\WINDOWS\system32\eMWGffii.ini2
C:\WINDOWS\system32\fleolcgk.ini
C:\WINDOWS\system32\ieupdates.exe.tmp
C:\WINDOWS\system32\iifcDWol.dll
C:\WINDOWS\system32\IklRCJlm.ini
C:\WINDOWS\system32\IklRCJlm.ini2
C:\WINDOWS\system32\juuswa.dll
C:\WINDOWS\system32\kjvodhrx.ini
C:\WINDOWS\system32\kkmnnnpo.ini
C:\WINDOWS\system32\kkmnnnpo.ini2
C:\WINDOWS\system32\klnhwybw.dll
C:\WINDOWS\system32\kmhtqxcp.dll
C:\WINDOWS\system32\latahiab.dll
C:\WINDOWS\system32\lhgmvbhp.dll
C:\WINDOWS\system32\mavmxofn.ini
C:\WINDOWS\system32\mcrh.tmp
C:\WINDOWS\system32\mlJCRlkI.dll
C:\WINDOWS\system32\mqovwy.dll
C:\WINDOWS\system32\msliksurcredo.dll
C:\WINDOWS\system32\msliksurdns.dll
C:\WINDOWS\system32\nfoxmvam.dll
C:\WINDOWS\system32\NmSBdMoq.ini
C:\WINDOWS\system32\NmSBdMoq.ini2
C:\WINDOWS\system32\omjblhfr.dll
C:\WINDOWS\system32\osspyiti.dll
C:\WINDOWS\system32\pfpgvhgu.ini
C:\WINDOWS\system32\phbvmghl.ini
C:\WINDOWS\system32\PqWyIRqr.ini
C:\WINDOWS\system32\PqWyIRqr.ini2
C:\WINDOWS\system32\qoMcaxUm.dll
C:\WINDOWS\system32\rlalmi.dll
C:\WINDOWS\system32\xrhdovjk.dll
C:\WINDOWS\system32\YbbIknnn.ini
C:\WINDOWS\system32\YbbIknnn.ini2
C:\WINDOWS\system32\YceNnUvw.ini
C:\WINDOWS\system32\YceNnUvw.ini2
C:\WINDOWS\system32\ykuxpwub.dll
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\Service_msliksurserv
((((((((((((((((((((((((( Files Created from 2008-06-28 to 2008-07-28 )))))))))))))))))))))))))))))))
.
2008-07-27 06:51 . 2008-07-27 06:51 <DIR> d-------- C:\fixwareout
2008-07-27 06:45 . 2008-07-07 07:26 7,680 --a------ C:\Documents and Settings\Admin.ANGIES\cftmon.exe
2008-07-27 06:44 . 2008-07-07 07:26 7,680 --a------ C:\Documents and Settings\LocalService\cftmon.exe
2008-07-27 06:44 . 2008-07-27 06:44 526 --a------ C:\Antispyware-2008.lnk
2008-07-23 12:39 . 2008-07-23 12:39 18,944 --a------ C:\WINDOWS\system32\sofie.dll
2008-07-23 02:00 . 2008-07-23 02:00 <DIR> d-------- C:\Program Files\Trend Micro
2008-07-23 00:23 . 2008-07-23 00:23 <DIR> d-------- C:\Documents and Settings\Admin.ANGIES\Application Data\McAfee
2008-07-22 23:04 . 2008-07-22 23:04 <DIR> d-------- C:\Documents and Settings\Admin.ANGIES\Application Data\ArcSoft
2008-07-22 22:20 . 2008-07-22 22:20 <DIR> d-------- C:\Program Files\JL2005A
2008-07-22 22:18 . 2008-07-22 22:18 361 --a------ C:\WINDOWS\videomvp.ini
2008-07-22 22:17 . 2008-07-22 22:17 <DIR> d-------- C:\Program Files\ArcSoft
2008-07-22 22:17 . 1998-07-21 20:29 21 --a------ C:\WINDOWS\CS_SETUP.ini
2008-07-14 06:19 . 2008-07-14 06:19 26,624 --a------ C:\WINDOWS\system32\avirasafe.dll
2008-07-11 08:46 . 2008-07-27 06:41 2,488 --a------ C:\WINDOWS\wininit.ini
2008-07-11 06:59 . 2008-07-11 06:59 <DIR> d-------- C:\Program Files\Spybot - Search & Destroy
2008-07-11 06:59 . 2008-07-11 06:59 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2008-07-11 06:57 . 2008-07-11 06:57 <DIR> d-------- C:\Documents and Settings\Admin.ANGIES
2008-07-11 06:49 . 2008-07-11 06:49 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
2008-07-10 07:57 . 2008-07-10 07:57 <DIR> d-------- C:\Program Files\CCleaner
2008-07-10 07:40 . 2008-07-10 07:40 <DIR> d-------- C:\Program Files\Common Files\Motive
2008-07-10 07:40 . 2008-07-10 07:40 <DIR> d-------- C:\Program Files\Common Files\Java
2008-07-10 06:50 . 2008-07-10 06:50 <DIR> d---s---- C:\Documents and Settings\Admin
2008-07-10 06:41 . 2008-07-10 06:41 <DIR> d-------- C:\WINDOWS\system32\NtmsData
2008-07-09 03:07 . 2008-07-27 07:12 111,492 --a------ C:\WINDOWS\BM6f21a3dd.xml
2008-07-08 02:54 . 2008-07-08 02:54 <DIR> d--hs---- C:\FOUND.006
2008-07-07 07:31 . 2008-07-07 07:31 26,624 --a------ C:\WINDOWS\system32\avg_sr.dll
2008-07-07 07:30 . 2008-07-07 07:30 25,088 --a------ C:\WINDOWS\system32\diga32.dll
2008-07-04 03:36 . 2008-07-04 03:36 8,192 --a------ C:\30gp67.exe
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-04-09 08:32 744 ----a-w C:\Documents and Settings\angela storey\Application Data\filterclsid.dat
2007-12-06 08:54 774,144 ----a-w C:\Program Files\RngInterstitial.dll
2006-09-23 06:27 67,184 ----a-w C:\Documents and Settings\angela storey\Application Data\GDIPFONTCACHEV1.DAT
2006-05-01 06:35 36,864 ----a-w C:\Program Files\Spelling words.doc
2006-03-01 05:31 25,088 ----a-w C:\Program Files\Prophecy 06-09-05 Stockton.doc
2001-09-10 16:00 139,264 ----a-w C:\WINDOWS\inf\i386\Rtscan.dll
2001-09-10 15:10 61,440 ----a-w C:\WINDOWS\inf\i386\onetUSD.dll
2001-08-18 01:43 32,768 ----a-w C:\WINDOWS\inf\i386\Wiamicro.dll
2001-08-04 01:29 13,824 ----a-w C:\WINDOWS\inf\i386\usbscan.sys
2001-06-29 15:10 163,840 ----a-w C:\WINDOWS\inf\i386\viceo.dll
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{A4D16645-4149-41FB-B670-E06072E540C1}]
2008-07-23 12:39 18944 --a------ C:\WINDOWS\System32\sofie.dll
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="C:\WINDOWS\System32\ctfmon.exe" [2002-08-29 12:00 13312]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"MySpaceIM"="C:\Program Files\MySpace\IM\MySpaceIM.exe" [2007-12-06 23:33 8720384]
C:\Documents and Settings\angela storey\Start Menu\Programs\Startup\
LimeWire On Startup.lnk - C:\Program Files\LimeWire\LimeWire.exe [2007-12-03 13:35:53 147456]
C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
PowerReg Scheduler.exe [2006-02-18 15:46:34 256000]
SBC Self Support Tool.lnk - C:\Program Files\SBC Self Support Tool\bin\matcli.exe [2007-10-28 16:25:02 217088]
R1 ATMhelpr;ATMhelpr;C:\WINDOWS\System32\drivers\ATMhelpr.sys [1997-06-17 04:00]
R2 lxdc_device;lxdc_device;C:\WINDOWS\System32\lxdccoms.exe [2007-05-25 02:38]
R2 ppsio2;PPDevice;C:\WINDOWS\System32\drivers\ppsio2.sys [1999-06-30 02:49]
S2 Ca533av;VCamNow Video Capture;C:\WINDOWS\System32\Drivers\Ca533av.sys [2002-10-21 11:37]
S2 lxdcCATSCustConnectService;lxdcCATSCustConnectService;C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxdcserv.exe [2007-05-25 02:38]
S2 UMAXPCLS;Print Port Scanner Driver;C:\WINDOWS\System32\DRIVERS\umaxpcls.sys [2001-08-17 13:58]
S3 01e1F;01e1F;C:\WINDOWS\System32\01e1F.sys []
S3 0c57;0c57;C:\WINDOWS\System32\0c57.sys []
S3 1401E;1401E;C:\WINDOWS\System32\1401E.sys []
S3 18818;18818;C:\WINDOWS\System32\18818.sys []
S3 1d716;1d716;C:\WINDOWS\System32\1d716.sys []
S3 2a34;2a34;C:\WINDOWS\System32\2a34.sys []
S3 30f2;30f2;C:\WINDOWS\System32\30f2.sys []
S3 34314;34314;C:\WINDOWS\System32\34314.sys []
S3 41d1C;41d1C;C:\WINDOWS\System32\41d1C.sys []
S3 46c1A;46c1A;C:\WINDOWS\System32\46c1A.sys []
S3 5dbA;5dbA;C:\WINDOWS\System32\5dbA.sys []
S3 60fE;60fE;C:\WINDOWS\System32\60fE.sys []
S3 6ea3;6ea3;C:\WINDOWS\System32\6ea3.sys []
S3 74917;74917;C:\WINDOWS\System32\74917.sys []
S3 75813;75813;C:\WINDOWS\System32\75813.sys []
S3 76b10;76b10;C:\WINDOWS\System32\76b10.sys []
S3 7c9B;7c9B;C:\WINDOWS\System32\7c9B.sys []
S3 8ae6;8ae6;C:\WINDOWS\System32\8ae6.sys []
S3 a531B;a531B;C:\WINDOWS\System32\a531B.sys []
S3 a8bC;a8bC;C:\WINDOWS\System32\a8bC.sys []
S3 a9a12;a9a12;C:\WINDOWS\System32\a9a12.sys []
S3 b81F;b81F;C:\WINDOWS\System32\b81F.sys []
S3 c7e8;c7e8;C:\WINDOWS\System32\c7e8.sys []
S3 f5b20;f5b20;C:\WINDOWS\System32\f5b20.sys []
S3 USBCamera;VCamNow Digital Camera;C:\WINDOWS\System32\Drivers\Bulk533.sys [2002-11-22 09:25]
*Newly Created Service* - ALG
*Newly Created Service* - IPNAT
.
Contents of the 'Scheduled Tasks' folder
2007-04-24 C:\WINDOWS\Tasks\Accessibility Wizard.job
- C:\WINDOWS\system32\accwiz.exe [2002-08-29 05:00]
2008-07-02 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job
- C:\Program Files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 14:57]
.
- - - - ORPHANS REMOVED - - - -
BHO-{2F8BF994-F0EA-4A73-B6BA-EF93DBE16B63} - C:\WINDOWS\System32\nnnkIbbY.dll
BHO-{5A3AFBB4-3119-49FE-9DA8-407FE5F7211C} - C:\WINDOWS\System32\wvUnNecY.dll
BHO-{680DBEE8-B862-4B3B-9A3B-3F6DD618BA25} - C:\WINDOWS\System32\mlJBSlLc.dll
BHO-{74C466E9-2FC5-43D7-8560-FE4362A2A30E} - C:\WINDOWS\System32\rqRIyWqP.dll
BHO-{9E2C792A-1249-49BC-B1E3-27E1C7061905} - C:\WINDOWS\System32\iiffGWMe.dll
BHO-{A7DAFB2E-E95B-4F23-B681-90C8040E5A96} - C:\WINDOWS\System32\qoMdBSmN.dll
BHO-{E135EFEB-9E21-4EF4-8E24-2EDD98F6C87F} - C:\WINDOWS\System32\opnnnmkk.dll
HKLM-Run-C:\WINDOWS\system32\kdolk.exe - C:\WINDOWS\system32\kdolk.exe
HKLM-Run-C:\WINDOWS\System32\kddgq.exe - C:\WINDOWS\System32\kddgq.exe
HKLM-Run-BM6f21a3dd - C:\WINDOWS\System32\osspyiti.dll
HKLM-Run-6c129041 - C:\WINDOWS\System32\lhgmvbhp.dll
HKU-Default-Run-Antispyware-2008.exe - C:\Program Files\Antispyware 2008\Antispyware-2008.exe
.
------- Supplementary Scan -------
.
R0 -: HKLM-Main,Search Bar = hxxp://red.clientapps.yahoo.com/customize/ie/defaults/sb/sbcydsl/*http://www.yahoo.com/search/ie.html
O9 -: {c95fe080-8f5d-11d2-a20b-00aa003c157a} - %SystemRoot%\web\related.htm
O17 -: HKLM\CCS\Interface\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
O17 -: HKLM\CCS\Interface\{3ECE3F59-2495-49E1-9F9C-DD73ACCF6C6E}: NameServer = 208.67.220.220,208.67.222.222
O16 -: DirectAnimation Java Classes - file://C:\WINDOWS\Java\classes\dajava.cab
C:\WINDOWS\Downloaded Program Files\DirectAnimation Java Classes.osd
O16 -: Microsoft XML Parser for Java - file://C:\WINDOWS\Java\classes\xmldso.cab
C:\WINDOWS\Downloaded Program Files\Microsoft XML Parser for Java.osd
**************************************************************************
catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-07-28 07:36:38
Windows 5.1.2600 Service Pack 1 FAT NTAPI
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
PROCESS: C:\WINDOWS\system32\lsass.exe
-> C:\Program Files\Google\Google Desktop Search\GoogleDesktopNetwork1.dll
PROCESS: C:\WINDOWS\explorer.exe
-> C:\PROGRA~1\Google\GOOGLE~1\GOOGLE~2.DLL
.
------------------------ Other Running Processes ------------------------
.
C:\WINDOWS\SYSTEM32\RUNDLL32.EXE
C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\VS7DEBUG\MDM.EXE
C:\PROGRAM FILES\MICROSOFT SQL SERVER\MSSQL$MICROSOFTBCM\BINN\SQLSERVR.EXE
.
**************************************************************************
.
Completion time: 2008-07-28 7:38:40 - machine was rebooted
ComboFix-quarantined-files.txt 2008-07-28 14:38:36
Pre-Run: 9,767,124,992 bytes free
Post-Run: 9,699,983,360 bytes free
225 --- E O F --- 2007-11-01 08:39:36
Fresh HJT Report
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 7:41:48 AM, on 7/28/2008
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\lxdccoms.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Binn\sqlservr.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\ctfmon.exe
C:\WINDOWS\System32\wuauclt.exe
C:\WINDOWS\System32\wuauclt.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\notepad.exe
C:\WINDOWS\system32\msiexec.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/customize/ie/defaults/sb/sbcydsl/*http://www.yahoo.com/search/ie.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: BHO.toolbar3 - {A4D16645-4149-41FB-B670-E06072E540C1} - C:\WINDOWS\System32\sofie.dll
O3 - Toolbar: Lexmark Toolbar - {1017A80C-6F09-4548-A84D-EDD6AC9525F0} - C:\Program Files\Lexmark Toolbar\toolband.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [C:\WINDOWS\system32\kdolk.exe] C:\WINDOWS\system32\kdolk.exe
O4 - HKLM\..\Run: [C:\WINDOWS\System32\kddgq.exe] C:\WINDOWS\System32\kddgq.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - HKUS\S-1-5-18\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'Default user')
O4 - Global Startup: PowerReg Scheduler.exe
O4 - Global Startup: SBC Self Support Tool.lnk = C:\Program Files\SBC Self Support Tool\bin\matcli.exe
O9 - Extra button: AT&T Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\PROGRA~1\YAHOO!\COMMON\yiesrvc.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm (file missing)
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm (file missing)
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O15 - Trusted Zone: http://*.mcafee.com
O17 - HKLM\System\CCS\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CCS\Services\Tcpip\..\{3ECE3F59-2495-49E1-9F9C-DD73ACCF6C6E}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS1\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS2\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: lxdcCATSCustConnectService - Lexmark International, Inc. - C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxdcserv.exe
O23 - Service: lxdc_device - - C:\WINDOWS\System32\lxdccoms.exe
--
End of file - 4726 bytes
Hi
Could you post Fixwareout report too, please? :)
storeyline
2008-07-30, 01:20
Here's the report for you.
Username "Admin" - 07/27/2008 6:52:08 [Fixwareout edited 9/01/2007
~~~~~ Prerun check
Successfully flushed the DNS Resolver Cache.
System was rebooted successfully.
~~~~~ Postrun check
HKLM\SOFTWARE\~\Winlogon\ "System"=""
....
....
~~~~~ Misc files.
....
~~~~~ Checking for older varients.
....
~~~~~ Current runs (hklm hkcu "run" Keys Only)
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ntuser"="C:\\WINDOWS\\system32\\drivers\\spools.exe"
"C:\\WINDOWS\\system32\\kdolk.exe"="C:\\WINDOWS\\system32\\kdolk.exe"
"C:\\WINDOWS\\System32\\kddgq.exe"="C:\\WINDOWS\\System32\\kddgq.exe"
"6c129041"="rundll32.exe \"C:\\WINDOWS\\System32\\xrhdovjk.dll\",b"
"autoload"="C:\\Documents and Settings\\Admin.ANGIES\\cftmon.exe"
"BM6f21a3dd"="Rundll32.exe \"C:\\WINDOWS\\System32\\osspyiti.dll\",s"
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ntuser"="C:\\WINDOWS\\system32\\drivers\\spools.exe"
"ctfmon.exe"="C:\\WINDOWS\\System32\\ctfmon.exe"
"autoload"="C:\\Documents and Settings\\Admin.ANGIES\\cftmon.exe"
....
Hosts file was reset, If you use a custom hosts file please replace it...
~~~~~ End report ~~~~~
Hi
Upload following files to http://virusscan.jotti.org and post back the results:
C:\WINDOWS\videomvp.ini
C:\30gp67.exe
Start hjt, do a system scan, check (if found):
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/cust...search/ie.html
O4 - HKLM\..\Run: [C:\WINDOWS\system32\kdolk.exe] C:\WINDOWS\system32\kdolk.exe
O4 - HKLM\..\Run: [C:\WINDOWS\System32\kddgq.exe] C:\WINDOWS\System32\kddgq.exe
O4 - Global Startup: PowerReg Scheduler.exe
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm (file missing)
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm (file missing)
O17 - HKLM\System\CCS\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222 <--if not your internet service provider's address
O17 - HKLM\System\CCS\Services\Tcpip\..\{3ECE3F59-2495-49E1-9F9C-DD73ACCF6C6E}: NameServer = 208.67.220.220,208.67.222.222 <--if not your internet service provider's address
O17 - HKLM\System\CS1\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222 <--if not your internet service provider's address
O17 - HKLM\System\CS2\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222 <--if not your internet service provider's address
Close browsers and other windows. Click fix checked.
Open notepad and copy/paste the text in the quotebox below into it:
Driver::
01e1F
0c57
1401E
18818
1d716
2a34
30f2
34314
41d1C
46c1A
5dbA
60fE
6ea3
74917
75813
76b10
7c9B
8ae6
a531B
a8bC
a9a12
b81F
c7e8
f5b20
File::
C:\Documents and Settings\Admin.ANGIES\cftmon.exe
C:\Documents and Settings\LocalService\cftmon.exe
C:\Antispyware-2008.lnk
C:\WINDOWS\system32\sofie.dll
C:\WINDOWS\system32\avirasafe.dll
C:\WINDOWS\BM6f21a3dd.xml
C:\WINDOWS\system32\avg_sr.dll
C:\WINDOWS\system32\diga32.dll
C:\WINDOWS\System32\01e1F.sys
C:\WINDOWS\System32\0c57.sys
C:\WINDOWS\System32\1401E.sys
C:\WINDOWS\System32\18818.sys
C:\WINDOWS\System32\1d716.sys
C:\WINDOWS\System32\2a34.sys
C:\WINDOWS\System32\30f2.sys
C:\WINDOWS\System32\34314.sys
C:\WINDOWS\System32\41d1C.sys
C:\WINDOWS\System32\46c1A.sys
C:\WINDOWS\System32\5dbA.sys
C:\WINDOWS\System32\60fE.sys
C:\WINDOWS\System32\6ea3.sys
C:\WINDOWS\System32\74917.sys
C:\WINDOWS\System32\75813.sys
C:\WINDOWS\System32\76b10.sys
C:\WINDOWS\System32\7c9B.sys
C:\WINDOWS\System32\8ae6.sys
C:\WINDOWS\System32\a531B.sys
C:\WINDOWS\System32\a8bC.sys
C:\WINDOWS\System32\a9a12.sys
C:\WINDOWS\System32\b81F.sys
C:\WINDOWS\System32\c7e8.sys
C:\WINDOWS\System32\f5b20.sys
C:\WINDOWS\system32\kdolk.exe
C:\WINDOWS\System32\kddgq.exe
Registry::
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{A4D16645-4149-41FB-B670-E06072E540C1}]
Save this as
CFScript
A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine. This tool is not a toy and not for everyday use.
http://users.pandora.be/bluepatchy/miekiemoes/images/CFScript.gif
Refering to the picture above, drag CFScript into ComboFix.exe
Then post the resultant log.
Combofix should never take more that 20 minutes including the reboot if malware is detected.
If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
If that happened we want to know, and also what process you had to end.
Download ATF (Atribune Temp File) Cleaner© by Atribune (http://www.atribune.org/ccount/click.php?id=1) to your desktop.
Double-click ATF Cleaner.exe to open it
Under Main choose:
Windows Temp
Current User Temp
All Users Temp
Cookies
Temporary Internet Files
Prefetch
Java Cache
*The other boxes are optional*
Then click the Empty Selected button.
If you use Firefox:
Click Firefox at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click NO at the prompt.
If you use Opera:
Click Opera at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click NO at the prompt.
Click Exit on the Main menu to close the program.
Please download Malwarebytes' Anti-Malware (http://www.besttechie.net/tools/mbam-setup.exe) to your desktop.
Double-click mbam-setup.exe and follow the prompts to install the program.
At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
If an update is found, it will download and install the latest version.
Once the program has loaded, select Perform full scan, then click Scan.
When the scan is complete, click OK, then Show Results to view the results.
Be sure that everything is checked, and click Remove Selected.
When completed, a log will open in Notepad. Please save it to a convenient location. The log can also be found here: C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Please post contents of that file & a fresh hjt log (don't forget above meantioned ComboFix resultant log) in your next reply.
storeyline
2008-07-30, 21:47
Here are the reports that you asked for. I wasn't able to find C:\WINDOWS\videomvp.ini on my computer.
C:\30gp67.exe
Scan taken on 30 Jul 2008 16:37:07 (GMT) A-Squared
Found nothing
AntiVir
Found HEUR/Crypted
ArcaVir
Found nothing
Avast
Found nothing
AVG Antivirus
Found nothing
BitDefender
Found nothing
ClamAV
Found nothing
CPsecure
Found nothing
Dr.Web
Found nothing
F-Prot Antivirus
Found nothing
F-Secure Anti-Virus
Found nothing
Fortinet
Found nothing
Ikarus
Found nothing
Kaspersky Anti-Virus
Found nothing
NOD32
Found nothing
Norman Virus Control
Found nothing
Panda Antivirus
Found nothing
Sophos Antivirus
Found Mal/EncPk-CO
VirusBuster
Found nothing
VBA32
Found Malware-Cryptor.Win32.General.2 (probable variant)
Last file scanned at least one scanner reported something about: X7349.rar (MD5: b8fdd1cc72db48d428fa6124610b542b, size: 146635 bytes), detected by:
Scanner Malware name
A-Squared X
AntiVir ADSPY/Drop.Boran.I
ArcaVir Trojan.Dnschanger.Gw
Avast Win32:Trojan-gen {Other}
AVG Antivirus Downloader.Small.BZK
BitDefender Trojan.Adclicker.AZ
ClamAV Adware.Dropper-22
CPsecure AdWare.W32.Stud.D
Dr.Web Adware.Adx
F-Prot Antivirus W32/Downldr2.BJZS
F-Secure Anti-Virus Trojan-Dropper:W32/Agent.DZN
Fortinet W32/Small.FQE!tr
Ikarus not-a-virus:AdWare.Win32.Yokbar.n
Kaspersky Anti-Virus Trojan.Win32.Agent.lpm
NOD32 probably a variant of Win32/TrojanDropper.Agent
Norman Virus Control X
Panda Antivirus Application/Yok
Sophos Antivirus Troj/Mdrop-BSE
VirusBuster X
VBA32 Trojan.Win32.Agent.lpm
Malwarebytes' Anti-Malware 1.23
Database version: 1008
Windows 5.1.2600 Service Pack 1
11:21:59 PM 7/29/2008
mbam-log-7-29-2008 (23-21-59).txt
Scan type: Full Scan (C:\|)
Objects scanned: 76892
Time elapsed: 20 minute(s), 14 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 43
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
(No malicious items detected)
Registry Values Infected:
(No malicious items detected)
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
C:\Documents and Settings\LocalService\Start Menu\Programs\Antispyware 2008 (Rogue.Antispyware) -> Quarantined and deleted successfully.
Files Infected:
C:\Program Files\Mozilla Firefox\components\zxjkewvi.dll (Trojan.Peed) -> Quarantined and deleted successfully.
C:\Program Files\The Weather Channel FW\Desktop Weather\DesktopWeather.exe (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\Program Files\The Weather Channel FW\Framework\wxfw.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000006.exe (Worm.Socks) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000011.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000012.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000013.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000015.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000016.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000018.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000019.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000020.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000023.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000026.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000027.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP5\A0000646.exe (Worm.Socks) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP5\A0000647.exe (Worm.Socks) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP5\A0000648.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP5\A0000649.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP5\A0000650.dll (Adware.BHO) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP5\A0000651.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\FOUND.006\FILE0047.CHK (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\awtttrsR.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\byXOeEUm.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\ddcYsTnN.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\iifcDWol.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\juuswa.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\kmhtqxcp.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\latahiab.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\lhgmvbhp.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\nfoxmvam.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\qoMcaxUm.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\rlalmi.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\avg_sr.dll.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\avirasafe.dll.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\diga32.dll.vir (Adware.BHO) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\sofie.dll.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\drivers\spools.exe.vir (Worm.Socks) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\Documents and Settings\Admin.ANGIES\cftmon.exe.vir (Worm.Socks) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\Documents and Settings\LocalService\cftmon.exe.vir (Worm.Socks) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Start Menu\Programs\Antispyware 2008\Antispyware-2008.lnk (Rogue.Antispyware) -> Quarantined and deleted successfully.
C:\wincget.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Application Data\Microsoft\Internet Explorer\Quick Launch\Antispyware-2008.lnk (Rogue.Antispyware) -> Quarantined and deleted successfully.
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:29:33 PM, on 7/29/2008
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\lxdccoms.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Binn\sqlservr.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\ctfmon.exe
C:\WINDOWS\System32\wuauclt.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O3 - Toolbar: Lexmark Toolbar - {1017A80C-6F09-4548-A84D-EDD6AC9525F0} - C:\Program Files\Lexmark Toolbar\toolband.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - HKUS\S-1-5-18\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'Default user')
O4 - Global Startup: SBC Self Support Tool.lnk = C:\Program Files\SBC Self Support Tool\bin\matcli.exe
O9 - Extra button: AT&T Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\PROGRA~1\YAHOO!\COMMON\yiesrvc.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O15 - Trusted Zone: http://*.mcafee.com
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: lxdcCATSCustConnectService - Lexmark International, Inc. - C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxdcserv.exe
O23 - Service: lxdc_device - - C:\WINDOWS\System32\lxdccoms.exe
--
End of file - 3487 bytes
ComboFix 08-07-28.4 - Admin 2008-07-29 22:27:18.2 - FAT32x86
Microsoft Windows XP Professional 5.1.2600.1.1252.1.1033.18.190 [GMT -7:00]
Running from: C:\Documents and Settings\Admin.ANGIES\Desktop\ComboFix.exe
Command switches used :: C:\Documents and Settings\Admin.ANGIES\Desktop\CFScript.txt
* Created a new restore point
WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
FILE ::
C:\Antispyware-2008.lnk
C:\Documents and Settings\Admin.ANGIES\cftmon.exe
C:\Documents and Settings\LocalService\cftmon.exe
C:\WINDOWS\BM6f21a3dd.xml
C:\WINDOWS\System32\01e1F.sys
C:\WINDOWS\System32\0c57.sys
C:\WINDOWS\System32\1401E.sys
C:\WINDOWS\System32\18818.sys
C:\WINDOWS\System32\1d716.sys
C:\WINDOWS\System32\2a34.sys
C:\WINDOWS\System32\30f2.sys
C:\WINDOWS\System32\34314.sys
C:\WINDOWS\System32\41d1C.sys
C:\WINDOWS\System32\46c1A.sys
C:\WINDOWS\System32\5dbA.sys
C:\WINDOWS\System32\60fE.sys
C:\WINDOWS\System32\6ea3.sys
C:\WINDOWS\System32\74917.sys
C:\WINDOWS\System32\75813.sys
C:\WINDOWS\System32\76b10.sys
C:\WINDOWS\System32\7c9B.sys
C:\WINDOWS\System32\8ae6.sys
C:\WINDOWS\System32\a531B.sys
C:\WINDOWS\System32\a8bC.sys
C:\WINDOWS\System32\a9a12.sys
C:\WINDOWS\system32\avg_sr.dll
C:\WINDOWS\system32\avirasafe.dll
C:\WINDOWS\System32\b81F.sys
C:\WINDOWS\System32\c7e8.sys
C:\WINDOWS\system32\diga32.dll
C:\WINDOWS\System32\f5b20.sys
C:\WINDOWS\System32\kddgq.exe
C:\WINDOWS\system32\kdolk.exe
C:\WINDOWS\system32\sofie.dll
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
C:\Antispyware-2008.lnk
C:\Documents and Settings\Admin.ANGIES\cftmon.exe
C:\Documents and Settings\LocalService\cftmon.exe
C:\WINDOWS\BM6f21a3dd.xml
C:\WINDOWS\system32\avg_sr.dll
C:\WINDOWS\system32\avirasafe.dll
C:\WINDOWS\system32\diga32.dll
C:\WINDOWS\system32\sofie.dll
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\Legacy_01E1F
-------\Legacy_0C57
-------\Legacy_1401E
-------\Legacy_18818
-------\Legacy_1D716
-------\Legacy_2A34
-------\Legacy_30F2
-------\Legacy_34314
-------\Legacy_41D1C
-------\Legacy_46C1A
-------\Legacy_5DBA
-------\Legacy_60FE
-------\Legacy_6EA3
-------\Legacy_74917
-------\Legacy_75813
-------\Legacy_76B10
-------\Legacy_7C9B
-------\Legacy_8AE6
-------\Legacy_A531B
-------\Legacy_A8BC
-------\Legacy_A9A12
-------\Legacy_B81F
-------\Legacy_C7E8
-------\Legacy_F5B20
-------\Service_01e1F
-------\Service_0c57
-------\Service_1401E
-------\Service_18818
-------\Service_1d716
-------\Service_2a34
-------\Service_30f2
-------\Service_34314
-------\Service_41d1C
-------\Service_46c1A
-------\Service_5dbA
-------\Service_60fE
-------\Service_6ea3
-------\Service_74917
-------\Service_75813
-------\Service_76b10
-------\Service_7c9B
-------\Service_8ae6
-------\Service_a531B
-------\Service_a8bC
-------\Service_a9a12
-------\Service_b81F
-------\Service_c7e8
-------\Service_f5b20
((((((((((((((((((((((((( Files Created from 2008-06-28 to 2008-07-30 )))))))))))))))))))))))))))))))
.
2008-07-29 21:49 . 2008-07-29 21:51 37,888 --a------ C:\30gp67.exe.doc
2008-07-27 06:51 . 2008-07-27 06:51 <DIR> d-------- C:\fixwareout
2008-07-23 02:00 . 2008-07-23 02:00 <DIR> d-------- C:\Program Files\Trend Micro
2008-07-23 00:23 . 2008-07-23 00:23 <DIR> d-------- C:\Documents and Settings\Admin.ANGIES\Application Data\McAfee
2008-07-22 23:04 . 2008-07-22 23:04 <DIR> d-------- C:\Documents and Settings\Admin.ANGIES\Application Data\ArcSoft
2008-07-22 22:20 . 2008-07-22 22:20 <DIR> d-------- C:\Program Files\JL2005A
2008-07-11 08:46 . 2008-07-27 06:41 2,488 --a------ C:\WINDOWS\wininit.ini
2008-07-11 06:59 . 2008-07-11 06:59 <DIR> d-------- C:\Program Files\Spybot - Search & Destroy
2008-07-11 06:59 . 2008-07-11 06:59 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2008-07-11 06:57 . 2008-07-11 06:57 <DIR> d-------- C:\Documents and Settings\Admin.ANGIES
2008-07-11 06:49 . 2008-07-11 06:49 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
2008-07-10 07:57 . 2008-07-10 07:57 <DIR> d-------- C:\Program Files\CCleaner
2008-07-10 07:40 . 2008-07-10 07:40 <DIR> d-------- C:\Program Files\Common Files\Motive
2008-07-10 07:40 . 2008-07-10 07:40 <DIR> d-------- C:\Program Files\Common Files\Java
2008-07-10 06:50 . 2008-07-10 06:50 <DIR> d---s---- C:\Documents and Settings\Admin
2008-07-10 06:41 . 2008-07-10 06:41 <DIR> d-------- C:\WINDOWS\system32\NtmsData
2008-07-08 02:54 . 2008-07-08 02:54 <DIR> d--hs---- C:\FOUND.006
2008-07-04 03:36 . 2008-07-04 03:36 8,192 --a------ C:\30gp67.exe
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-04-09 08:32 744 ----a-w C:\Documents and Settings\angela storey\Application Data\filterclsid.dat
2007-12-06 08:54 774,144 ----a-w C:\Program Files\RngInterstitial.dll
2006-09-23 06:27 67,184 ----a-w C:\Documents and Settings\angela storey\Application Data\GDIPFONTCACHEV1.DAT
2006-05-01 06:35 36,864 ----a-w C:\Program Files\Spelling words.doc
2006-03-01 05:31 25,088 ----a-w C:\Program Files\Prophecy 06-09-05 Stockton.doc
2001-09-10 16:00 139,264 ----a-w C:\WINDOWS\inf\i386\Rtscan.dll
2001-09-10 15:10 61,440 ----a-w C:\WINDOWS\inf\i386\onetUSD.dll
2001-08-18 01:43 32,768 ----a-w C:\WINDOWS\inf\i386\Wiamicro.dll
2001-08-04 01:29 13,824 ----a-w C:\WINDOWS\inf\i386\usbscan.sys
2001-06-29 15:10 163,840 ----a-w C:\WINDOWS\inf\i386\viceo.dll
.
((((((((((((((((((((((((((((( snapshot@2008-07-28_ 7.37.43.57 )))))))))))))))))))))))))))))))))))))))))
.
- 2007-11-02 21:16:42 71,248 ----a-w C:\WINDOWS\system32\perfc009.dat
+ 2008-07-28 14:37:36 71,248 ----a-w C:\WINDOWS\system32\perfc009.dat
- 2007-11-02 21:16:42 422,636 ----a-w C:\WINDOWS\system32\perfh009.dat
+ 2008-07-28 14:37:36 422,636 ----a-w C:\WINDOWS\system32\perfh009.dat
+ 2008-07-30 05:32:54 16,384 ----a-w C:\WINDOWS\Temp\Perflib_Perfdata_588.dat
.
-- Snapshot reset to current date --
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="C:\WINDOWS\System32\ctfmon.exe" [2002-08-29 12:00 13312]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"MySpaceIM"="C:\Program Files\MySpace\IM\MySpaceIM.exe" [2007-12-06 23:33 8720384]
C:\Documents and Settings\angela storey\Start Menu\Programs\Startup\
LimeWire On Startup.lnk - C:\Program Files\LimeWire\LimeWire.exe [2007-12-03 13:35:53 147456]
C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
SBC Self Support Tool.lnk - C:\Program Files\SBC Self Support Tool\bin\matcli.exe [2007-10-28 16:25:02 217088]
R1 ATMhelpr;ATMhelpr;C:\WINDOWS\System32\drivers\ATMhelpr.sys [1997-06-17 04:00]
R2 lxdc_device;lxdc_device;C:\WINDOWS\System32\lxdccoms.exe [2007-05-25 02:38]
R2 ppsio2;PPDevice;C:\WINDOWS\System32\drivers\ppsio2.sys [1999-06-30 02:49]
S2 Ca533av;VCamNow Video Capture;C:\WINDOWS\System32\Drivers\Ca533av.sys [2002-10-21 11:37]
S2 lxdcCATSCustConnectService;lxdcCATSCustConnectService;C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxdcserv.exe [2007-05-25 02:38]
S2 UMAXPCLS;Print Port Scanner Driver;C:\WINDOWS\System32\DRIVERS\umaxpcls.sys [2001-08-17 13:58]
S3 USBCamera;VCamNow Digital Camera;C:\WINDOWS\System32\Drivers\Bulk533.sys [2002-11-22 09:25]
.
Contents of the 'Scheduled Tasks' folder
2007-04-24 C:\WINDOWS\Tasks\Accessibility Wizard.job
- C:\WINDOWS\system32\accwiz.exe [2002-08-29 05:00]
.
**************************************************************************
catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-07-29 22:33:52
Windows 5.1.2600 Service Pack 1 FAT NTAPI
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
PROCESS: C:\WINDOWS\system32\lsass.exe
-> C:\Program Files\Google\Google Desktop Search\GoogleDesktopNetwork1.dll
PROCESS: C:\WINDOWS\explorer.exe
-> ?:\WINDOWS\system32\VERSION.dll
-> ?:\WINDOWS\system32\VERSION.dll
-> ?:\WINDOWS\System32\msi.dll
.
------------------------ Other Running Processes ------------------------
.
C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\VS7DEBUG\MDM.EXE
C:\PROGRAM FILES\MICROSOFT SQL SERVER\MSSQL$MICROSOFTBCM\BINN\SQLSERVR.EXE
.
**************************************************************************
.
Completion time: 2008-07-29 22:35:31 - machine was rebooted
ComboFix-quarantined-files.txt 2008-07-30 05:35:26
ComboFix2.txt 2008-07-28 14:38:44
Pre-Run: 9,692,282,880 bytes free
Post-Run: 9,680,846,848 bytes free
203 --- E O F --- 2007-11-01 08:39:36
Hi again
Delete following files:
C:\30gp67.exe.doc
C:\30gp67.exe
Download ATF (Atribune Temp File) Cleaner© by Atribune (http://www.atribune.org/ccount/click.php?id=1) to your desktop.
Double-click ATF Cleaner.exe to open it
Under Main choose:
Windows Temp
Current User Temp
All Users Temp
Cookies
Temporary Internet Files
Java Cache
*The other boxes are optional*
Then click the Empty Selected button.
If you use Firefox:
Click Firefox at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click NO at the prompt.
If you use Opera:
Click Opera at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click NO at the prompt.
Click Exit on the Main menu to close the program.
Please run an online scan with Kaspersky Online Scanner (http://www.kaspersky.nl/scanforvirus-en/kavwebscan.html). You will be prompted to install an ActiveX component from Kaspersky, click Yes.
The program will launch and start to download the latest definition files.
Once the scanner is installed and the definitions downloaded, click Next.
Now click on Scan Settings and select the following:
Scan using the following Anti-Virus database:
Extended (If available, otherwise Standard)
Scan Options:
Scan Archives
Scan Mail Bases
Click OK.
Under
select a target to scan
, select My Computer.
The scan will take a while so be patient and let it run. As it scans your machine very deeply it could take hours to complete, Kaspersky suggests running it during a time of low activity.Once the scan is complete:
Click on the Save as Text button.
Save the file to your desktop.
Copy and paste that information into your next post if the AV content will fit into one post only. Post a fresh hjt log too.
Note for Internet Explorer 7 users: If at any time you have trouble with the Accept button of the license, click on the Zoom tool located at the bottom right of the IE window and set the zoom to 75 %. Once the license has been accepted, reset to 100%.
If having a problme doing the above
Make sure that your Internet security settings are set to default values.
To set default security settings for Internet Explorer:
* Open Internet Explorer.
* Go to the Tools menu, then choose Internet Options.
* Click on the Security tab.
* Make sure that all four item (Internet, Local intranet, Trusted sites, and Restricted sites) are set to their default settings.
storeyline
2008-07-31, 09:18
Here you go.
-------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER REPORT
Wednesday, July 30, 2008 11:14:51 AM
Operating System: Microsoft Windows XP Professional, Service Pack 1 (Build 2600)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 31/07/2008
Kaspersky Anti-Virus database records: 1032086
-------------------------------------------------------------------------------
Scan Settings:
Scan using the following antivirus database: extended
Scan Archives: true
Scan Mail Bases: true
Scan Target - My Computer:
A:\
B:\
C:\
D:\
Scan Statistics:
Total number of scanned objects: 44264
Number of viruses found: 10
Number of infected objects: 33
Number of suspicious objects: 0
Duration of the scan process: 02:16:00
Infected Object Name / Virus Name / Last Action
C:\WINDOWS\system32\config\system.LOG Object is locked skipped
C:\WINDOWS\system32\config\software.LOG Object is locked skipped
C:\WINDOWS\system32\config\default.LOG Object is locked skipped
C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SECURITY Object is locked skipped
C:\WINDOWS\system32\config\SOFTWARE Object is locked skipped
C:\WINDOWS\system32\config\SYSTEM Object is locked skipped
C:\WINDOWS\system32\config\DEFAULT Object is locked skipped
C:\WINDOWS\system32\config\SAM Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
C:\WINDOWS\system32\h323log.txt Object is locked skipped
C:\WINDOWS\Temp\Perflib_Perfdata_588.dat Object is locked skipped
C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
C:\WINDOWS\wiaservc.log Object is locked skipped
C:\WINDOWS\wiadebug.log Object is locked skipped
C:\WINDOWS\Sti_Trace.log Object is locked skipped
C:\WINDOWS\WindowsUpdate.log Object is locked skipped
C:\WINDOWS\SchedLgU.Txt Object is locked skipped
C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat Object is locked skipped
C:\Documents and Settings\angela storey\Desktop\I5aac\phycosocal slipknot.mp3 Infected: Trojan-Downloader.WMA.Wimad.n skipped
C:\Documents and Settings\angela storey\Incomplete\T-3545425-phycosocial slipknot.mp3 Infected: Trojan-Downloader.WMA.Wimad.n skipped
C:\Documents and Settings\angela storey\Shared\emmbeded job for cowboy doom.mp3 Infected: Trojan-Downloader.WMA.Wimad.n skipped
C:\Documents and Settings\angela storey\Shared\phycosocal slipknot.mp3 Infected: Trojan-Downloader.WMA.Wimad.n skipped
C:\Documents and Settings\angela storey\Shared\phycosocial slipknot.mp3 Infected: Trojan-Downloader.WMA.Wimad.n skipped
C:\Documents and Settings\angela storey\Shared\emmbeded job for cow boy doom.mp3 Infected: Trojan-Downloader.WMA.Wimad.n skipped
C:\Documents and Settings\Admin.ANGIES\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\NTUSER.DAT.LOG Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Local Settings\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\Cache\_CACHE_MAP_ Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Local Settings\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\Cache\_CACHE_001_ Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Local Settings\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\Cache\_CACHE_002_ Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Local Settings\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\Cache\_CACHE_003_ Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Local Settings\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\urlclassifier3.sqlite Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Local Settings\temp\etilqs_UmmQovp5hVgU7eHzKjr4 Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\parent.lock Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\permissions.sqlite Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\cert8.db Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\key3.db Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\places.sqlite-journal Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\places.sqlite Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\search.sqlite Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\formhistory.sqlite Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\cookies.sqlite Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\content-prefs.sqlite Object is locked skipped
C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\downloads.sqlite Object is locked skipped
C:\Program Files\Tiger Electronics\miniMEDIA\DelDrv.exe Infected: not-a-virus:RiskTool.Win32.Deleter.e skipped
C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\LOG\ERRORLOG Object is locked skipped
C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Data\master.mdf Object is locked skipped
C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Data\mastlog.ldf Object is locked skipped
C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Data\model.mdf Object is locked skipped
C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Data\modellog.ldf Object is locked skipped
C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Data\tempdb.mdf Object is locked skipped
C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Data\templog.ldf Object is locked skipped
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000021.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.adqs skipped
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000028.dll Infected: Trojan.Win32.Monder.bfg skipped
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000043.exe Infected: not-a-virus:FraudTool.Win32.VirusIsolator.u skipped
C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP5\change.log Object is locked skipped
C:\FOUND.006\FILE0005.CHK Infected: Backdoor.Win32.Agent.lns skipped
C:\FOUND.006\FILE0006.CHK Infected: Trojan.Win32.Agent.gmo skipped
C:\FOUND.006\FILE0007.CHK Infected: Trojan.Win32.Agent.gmo skipped
C:\FOUND.006\FILE0008.CHK Infected: Trojan-Downloader.Win32.Zlob.pnq skipped
C:\FOUND.006\FILE0009.CHK Infected: Trojan-Downloader.Win32.Zlob.pnq skipped
C:\FOUND.006\FILE0019.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
C:\FOUND.006\FILE0020.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
C:\FOUND.006\FILE0022.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
C:\FOUND.006\FILE0023.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
C:\FOUND.006\FILE0027.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
C:\FOUND.006\FILE0029.CHK Infected: Worm.Win32.Socks.agj skipped
C:\FOUND.006\FILE0030.CHK Infected: Worm.Win32.Socks.agj skipped
C:\FOUND.006\FILE0031.CHK Infected: Backdoor.Win32.Agent.lns skipped
C:\FOUND.006\FILE0032.CHK Infected: Backdoor.Win32.Agent.lns skipped
C:\FOUND.006\FILE0033.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
C:\FOUND.006\FILE0034.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
C:\FOUND.006\FILE0035.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
C:\FOUND.006\FILE0036.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
C:\FOUND.006\FILE0037.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
C:\FOUND.006\FILE0043.CHK Infected: Backdoor.Win32.Agent.lns skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\mlJCRlkI.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.adqs skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\xrhdovjk.dll.vir Infected: Trojan.Win32.Monder.bfg skipped
C:\QooBox\Quarantine\C\Program Files\Antispyware 2008\Antispyware-2008.exe.vir Infected: not-a-virus:FraudTool.Win32.VirusIsolator.u skipped
Scan process completed.
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:17:52 AM, on 7/30/2008
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\lxdccoms.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Binn\sqlservr.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\ctfmon.exe
C:\WINDOWS\System32\wuauclt.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\internet explorer\iexplore.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O3 - Toolbar: Lexmark Toolbar - {1017A80C-6F09-4548-A84D-EDD6AC9525F0} - C:\Program Files\Lexmark Toolbar\toolband.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - HKUS\S-1-5-18\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'Default user')
O4 - Global Startup: SBC Self Support Tool.lnk = C:\Program Files\SBC Self Support Tool\bin\matcli.exe
O9 - Extra button: AT&T Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\PROGRA~1\YAHOO!\COMMON\yiesrvc.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O15 - Trusted Zone: http://*.mcafee.com
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.nl/scanforvirus-en/kavwebscan_unicode.cab
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: lxdcCATSCustConnectService - Lexmark International, Inc. - C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxdcserv.exe
O23 - Service: lxdc_device - - C:\WINDOWS\System32\lxdccoms.exe
--
End of file - 3640 bytes
storeyline
2008-07-31, 09:41
I forgot to delete the files that you instructed me to (30gp67.exe & 30gp67) before the Kapersky scan. I just deleted them now. Does that matter?:oops:
I forgot to delete the files that you instructed me to (30gp67.exe & 30gp67) before the Kapersky scan. I just deleted them now. Does that matter?
Hi
No, that doesn't matter :)
Delete following files:
C:\Documents and Settings\angela storey\Desktop\I5aac\phycosocal slipknot.mp3
C:\Documents and Settings\angela storey\Incomplete\T-3545425-phycosocial slipknot.mp3
C:\Documents and Settings\angela storey\Shared\emmbeded job for cowboy doom.mp3
C:\Documents and Settings\angela storey\Shared\phycosocal slipknot.mp3
C:\Documents and Settings\angela storey\Shared\phycosocial slipknot.mp3
C:\Documents and Settings\angela storey\Shared\emmbeded job for cow boy doom.mp3
and C:\FOUND.006 folder.
Well congrats, it appears your system is all clean Are you still noticing any problems? If not, it's time to secure your system to prevent against further intrusions.
THESE STEPS ARE VERY IMPORTANT
Let's reset system restore
Reset and Re-enable your System Restore to remove infected files that have been backed up by Windows. The files in System Restore are protected to prevent any programs changing those files. This is the only way to clean these files: You will lose all previous restore points which are likely to be infected. Please note you need Administrator Access to do clean the restore points.
1. Turn off System Restore.
On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
Check Turn off System Restore.
Click Apply, and then click OK.
2. Reboot.
3. Turn ON System Restore.
On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
UN-Check *Turn off System Restore*.
Click Apply, and then click OK.
NOTE: only do this ONCE,NOT on a regular basis
Now lets uninstall ComboFix:
Click START then RUN
Now type Combofix /u in the runbox and click OK
UPDATING WINDOWS AND INTERNET EXPLORER
IMPORTANT: You Need to Update Windows and Internet Explorer to protect your computer from the malware that is around on the Internet. Please go to the windows update site (http://windowsupdate.microsoft.com/) to get the critical updates.
If you are running Microsoft Office, or any portion thereof, go to the Microsoft's Office Update site and make sure you have at least all the critical updates installed (Free) Microsoft Office Update.
Make your Internet Explorer more secure
This can be done by following these simple instructions:
From within Internet Explorer click on the Tools menu and then click on Options.
Click once on the Security tab
Click once on the Internet icon so it becomes highlighted.
Click once on the Custom Level button.
Change the Download signed ActiveX controls to Prompt
Change the Download unsigned ActiveX controls to Disable
Change the Initialize and script ActiveX controls not marked as safe to Disable
Change the Installation of desktop items to Prompt
Change the Launching programs and files in an IFRAME to Prompt
Change the Navigate sub-frames across different domains to Prompt
When all these settings have been made, click on the OK button.
If it prompts you as to whether or not you want to save the settings, press the Yes button.
Next press the Apply button and then the OK to exit the Internet Properties page.
The following are recommended third party programs that are designed to keep your computer clean. A link as well as a brief description is included with each item.
Download Adaware
Adaware is a free program. It scans for known spyware on your computer. These scans should be run at least once every two weeks. For more information, see this tutorial (http://www.bleepingcomputer.com/forums/index.php?showtutorial=48)
The program is available for download here (http://www.download.com/Ad-Aware-SE-Personal-Edition/3000-8022_4-10319876.html?tag=lst-0-1)
Download SpywareBlaster
Spyware blaster is a program that stops known malicious activex controls from installing on your computer. It works by changing settings in your registry. It makes
kill bits
in the registry, so that certain activex controls can't install.
If you don't know what activex controls are, see here (http://www.webopedia.com/TERM/A/ActiveX_control.html)
You can download SpywareBlaster here here (http://majorgeeks.com/downloadget.php?id=2859&file=11&evp=61b0e8ad41924a03c37615f4682b4cef)
SpywareBlaster tutorial (http://www.bleepingcomputer.com/forums/tutorial49.html)
hosts file:
Every version of windows has a hosts file as part of them. In a very basic sense, they are used to locate webpages. We can customize a hosts file so that it blocks certain webpages. However, it can slow down certain computers. This is why using a hosts file is optional!!
Download it here (http://www.mvps.org/winhelp2002/hosts.htm). Make sure you read the instructions on how to install the hosts file. There is a good tutorial here (http://www.bleepingcomputer.com/forums/tutorial51.html)
If you decide to download the hosts file, the slowdown problems can usually be avoided by following these steps:
Click the start button (at the lower left hand corner of your screen) Click run In the dialog box, type services.msc hit enter, then locate dns client Highlight it, then double-click it. On the dropdown box, change the setting from automatic to manual. Click ok
Get Anti Virus Software and keep it updated - Most AVs will update automatically, but if not I would recommend making updating the AV the first job every time the PC is connected to the internet. An AV that is using defs that are seven days old is not going to be much protection. If you do not update your anti virus software then it will not be able to catch any of the new variants that may come out. See here (http://www.freebyte.com/antivirus/#scanners) to choose one
Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is susceptible to being hacked and taken over. Simply using a Firewall in its default configuration can lower your risk greatly. For more info, check this (http://www.bleepingcomputer.com/forums/tutorial60.html) webpage out.
See here (http://www.freebyte.com/antivirus/#firewalls) to choose one
Just a final reminder for you. I am trying to stress these two points.
UPDATE UPDATE UPDATE!!! Make sure you do this about every 1-2 weeks.
Make sure all of your security programs are up to date.
Run the spybot and malwarebytes' anti-malware regularly. (Once or twice a week minimum.)
Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.
Once again, please post and tell me how things are going with your system... problems etc.
Have a great day,
Blade :cool:
storeyline
2008-08-01, 23:05
Thanks for all your help. I followed the instructions that you gave me. I installed Spywareblaster, avast anti-virus. I also installed a firewall but I had to uninstall it because it bloked everything and I couldn't connect with the internet until I uninstalled it. Any suggestions? The other issue is I ran avast and it showed an infected file (C:\System Volume Information\_restore\Win32:Trogan-ge...) I put it in the chest because I don't know if it is an important file that should not be deleted. I ran spybot and it showed these infections:
Ad Revolver
Double Click
Fraud.XPAntivirus
Statcounter
I clicked "fix these problems". Does that mean that they are removed from my machine?
Everything is much better than before.
Hi
Did you update Windows? Your service pack 1 is too vulnerable connected to the internet today. Windows update is the most important thing in your case.
I also installed a firewall but I had to uninstall it because it bloked everything and I couldn't connect with the internet until I uninstalled it. Any suggestions?
Firewall must be configured correctly. Makers have usually good forums where end users can ask questions if they have problems with the program.
storeyline
2008-08-04, 02:02
Thank you for all of your help. You are fantastic.:2thumb: Finally, my computer is free from all infections:yahoo: You guys are doing a good thing by helping people the way you are. So, I'll be seeing you. Hopefully, I won't need to come back, but at least I know where to come for help. All the best to you.
storeyline:greeting:
Since this issue appears to be resolved ... this Topic has been closed. Glad I could help. :)
Note:If it has been five days or more since your last post, and the helper assisting you posted a response to that post to which you did not reply, your topic will not be reopened. At that point, if you still require help, please start a new topic and include a fresh HijackThis log and a link to your previous thread.
If it has been less than five days since your last response and you need the thread re-opened, please send me or MOD a private message (pm). A valid, working link to the closed topic is required.