Page 1 of 2 12 LastLast
Results 1 to 10 of 15

Thread: Infected with ZLOB

  1. #1
    Junior Member
    Join Date
    Feb 2008
    Posts
    9

    Default Infected with ZLOB

    I have read the "Before you post" information and have completed the following:

    Updated my Spybot S&D and ran the scan twice, still shows the Zlob
    I have completed the KasperSky scan and here are the results:

    -------------------------------------------------------------------------------
    KASPERSKY ONLINE SCANNER REPORT
    Tuesday, February 26, 2008 4:18:36 PM
    Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
    Kaspersky Online Scanner version: 5.0.98.0
    Kaspersky Anti-Virus database last update: 26/02/2008
    Kaspersky Anti-Virus database records: 581962
    -------------------------------------------------------------------------------

    Scan Settings:
    Scan using the following antivirus database: extended
    Scan Archives: true
    Scan Mail Bases: true

    Scan Target - My Computer:
    C:\
    D:\
    E:\
    F:\

    Scan Statistics:
    Total number of scanned objects: 257846
    Number of viruses found: 9
    Number of infected objects: 19
    Number of suspicious objects: 0
    Duration of the scan process: 03:39:10

    Infected Object Name / Virus Name / Last Action
    C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\CardSpace\CardSpace.db Object is locked skipped
    C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\CardSpace\CardSpace.db.shadow Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Comodo\Comodo AntiVirus\OnAccess\inflist.dat Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\0fa59948417171e8f6bea087c64364a1_45617191-58fb-4ec3-87d4-19076f7b863d Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\1ecc12f308e655826b390671282bf00c_45617191-58fb-4ec3-87d4-19076f7b863d Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\5edf5a34c68e217ddf52ba201a08efc8_45617191-58fb-4ec3-87d4-19076f7b863d Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\6b53965ebaa5323bc0307061706982db_45617191-58fb-4ec3-87d4-19076f7b863d Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\c549f6e815b5df24913d9f8ce7a9a85c_45617191-58fb-4ec3-87d4-19076f7b863d Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\fbb1329e9e28647e5ff19a0ac4cac428_45617191-58fb-4ec3-87d4-19076f7b863d Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Microsoft\Windows Defender\Support\MPLog-02252008-143602.log Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Microsoft\Windows NT\MSFax\ActivityLog\InboxLOG.txt Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Microsoft\Windows NT\MSFax\ActivityLog\OutboxLOG.txt Object is locked skipped
    C:\Documents and Settings\All Users\Documents\Shared Software\Theater Software\freeripmp3.exe/data0011 Infected: not-a-virus:AdWare.Win32.MyWay.j skipped
    C:\Documents and Settings\All Users\Documents\Shared Software\Theater Software\freeripmp3.exe Inno: infected - 1 skipped
    C:\Documents and Settings\All Users\Documents\Shared Software\Theater Software\freeripmp3.zip/freeripmp3.exe/data0011 Infected: not-a-virus:AdWare.Win32.MyWay.j skipped
    C:\Documents and Settings\All Users\Documents\Shared Software\Theater Software\freeripmp3.zip/freeripmp3.exe Infected: not-a-virus:AdWare.Win32.MyWay.j skipped
    C:\Documents and Settings\All Users\Documents\Shared Software\Theater Software\freeripmp3.zip ZIP: infected - 2 skipped
    C:\Documents and Settings\Ken\Application Data\Microsoft\Outlook\Outlook.srs Object is locked skipped
    C:\Documents and Settings\Ken\Cookies\index.dat Object is locked skipped
    C:\Documents and Settings\Ken\Desktop\SmitfraudFix\Reboot.exe Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped
    C:\Documents and Settings\Ken\Desktop\SmitfraudFix.exe/data.rar/SmitfraudFix/Reboot.exe Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped
    C:\Documents and Settings\Ken\Desktop\SmitfraudFix.exe/data.rar Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped
    C:\Documents and Settings\Ken\Desktop\SmitfraudFix.exe RarSFX: infected - 2 skipped
    C:\Documents and Settings\Ken\Local Settings\Application Data\Microsoft\Feeds Cache\index.dat Object is locked skipped
    C:\Documents and Settings\Ken\Local Settings\Application Data\Microsoft\Messenger\kenlangendock@hotmail.com\SharingMetadata\Logs\Dfsr00005.log Object is locked skipped
    C:\Documents and Settings\Ken\Local Settings\Application Data\Microsoft\Messenger\kenlangendock@hotmail.com\SharingMetadata\pending.dat Object is locked skipped
    C:\Documents and Settings\Ken\Local Settings\Application Data\Microsoft\Messenger\kenlangendock@hotmail.com\SharingMetadata\Working\database_101C_DAC7_1CDA_A6CE\dfsr.db Object is locked skipped
    C:\Documents and Settings\Ken\Local Settings\Application Data\Microsoft\Messenger\kenlangendock@hotmail.com\SharingMetadata\Working\database_101C_DAC7_1CDA_A6CE\fsr.log Object is locked skipped
    C:\Documents and Settings\Ken\Local Settings\Application Data\Microsoft\Messenger\kenlangendock@hotmail.com\SharingMetadata\Working\database_101C_DAC7_1CDA_A6CE\fsrtmp.log Object is locked skipped
    C:\Documents and Settings\Ken\Local Settings\Application Data\Microsoft\Messenger\kenlangendock@hotmail.com\SharingMetadata\Working\database_101C_DAC7_1CDA_A6CE\tmp.edb Object is locked skipped
    C:\Documents and Settings\Ken\Local Settings\Application Data\Microsoft\Outlook\Outlook.pst Object is locked skipped
    C:\Documents and Settings\Ken\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\Ken\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\Ken\Local Settings\Application Data\Microsoft\Windows Defender\FileTracker\{4C447EA9-E79B-4AA9-B226-DD73873C7D28} Object is locked skipped
    C:\Documents and Settings\Ken\Local Settings\Application Data\Microsoft\Windows Live Contacts\kenlangendock@hotmail.com\real\members.stg Object is locked skipped
    C:\Documents and Settings\Ken\Local Settings\Application Data\Microsoft\Windows Live Contacts\kenlangendock@hotmail.com\shadow\members.stg Object is locked skipped
    C:\Documents and Settings\Ken\Local Settings\History\History.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\Ken\Local Settings\Temp\BIT1C0.tmp Object is locked skipped
    C:\Documents and Settings\Ken\Local Settings\Temp\~DFA881.tmp Object is locked skipped
    C:\Documents and Settings\Ken\Local Settings\Temp\~DFA88C.tmp Object is locked skipped
    C:\Documents and Settings\Ken\Local Settings\Temp\~DFC29B.tmp Object is locked skipped
    C:\Documents and Settings\Ken\Local Settings\Temp\~DFC2A6.tmp Object is locked skipped
    C:\Documents and Settings\Ken\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\Ken\NTUSER.DAT Object is locked skipped
    C:\Documents and Settings\Ken\ntuser.dat.LOG Object is locked skipped
    C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
    C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
    C:\Documents and Settings\NetworkService\Cookies\index.dat Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\History\History.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
    C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
    C:\flexlm\cognos1d Object is locked skipped
    C:\oraclexe\app\oracle\flash_recovery_area\XE\ONLINELOG\O1_MF_1_3RW5HDPG_.LOG Object is locked skipped
    C:\oraclexe\app\oracle\flash_recovery_area\XE\ONLINELOG\O1_MF_2_3RW5HFPY_.LOG Object is locked skipped
    C:\oraclexe\app\oracle\product\10.2.0\server\database\hc_xe.dat Object is locked skipped
    C:\oraclexe\app\oracle\product\10.2.0\server\NETWORK\log\listener.log Object is locked skipped
    C:\oraclexe\oradata\XE\CONTROL.DBF Object is locked skipped
    C:\oraclexe\oradata\XE\SYSAUX.DBF Object is locked skipped
    C:\oraclexe\oradata\XE\SYSTEM.DBF Object is locked skipped
    C:\oraclexe\oradata\XE\TEMP.DBF Object is locked skipped
    C:\oraclexe\oradata\XE\UNDO.DBF Object is locked skipped
    C:\oraclexe\oradata\XE\USERS.DBF Object is locked skipped
    C:\Program Files\Comodo\common\CAVASpy\cavasm.log Object is locked skipped
    C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
    C:\System Volume Information\_restore{49703415-7822-4333-ABC1-5372C85AE95E}\RP242\A0097139.dll Infected: not-a-virus:AdWare.Win32.Vapsup.bny skipped
    C:\System Volume Information\_restore{49703415-7822-4333-ABC1-5372C85AE95E}\RP242\A0097140.dll Infected: not-a-virus:AdWare.Win32.Vapsup.bnx skipped
    C:\System Volume Information\_restore{49703415-7822-4333-ABC1-5372C85AE95E}\RP246\A0098237.dll Infected: not-a-virus:AdWare.Win32.Vapsup.bnw skipped
    C:\System Volume Information\_restore{49703415-7822-4333-ABC1-5372C85AE95E}\RP251\A0101018.exe Infected: not-a-virus:AdWare.Win32.Vapsup.boa skipped
    C:\System Volume Information\_restore{49703415-7822-4333-ABC1-5372C85AE95E}\RP252\change.log Object is locked skipped
    C:\WINDOWS\admgcx.dll Infected: Trojan-Downloader.Win32.Zlob.htx skipped
    C:\WINDOWS\CSC\00000001 Object is locked skipped
    C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
    C:\WINDOWS\ModemLog_Intel(R) 537EP V9x DF PCI Modem.txt Object is locked skipped
    C:\WINDOWS\rnevent.rel Object is locked skipped
    C:\WINDOWS\S962BFD08.tmp Object is locked skipped
    C:\WINDOWS\SchedLgU.Txt Object is locked skipped
    C:\WINDOWS\SoftwareDistribution\EventCache\{DAA76D77-D297-4113-93C6-7D5741D3A655}.bin Object is locked skipped
    C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
    C:\WINDOWS\Sti_Trace.log Object is locked skipped
    C:\WINDOWS\system32\CatRoot2\edb.log Object is locked skipped
    C:\WINDOWS\system32\CatRoot2\tmp.edb Object is locked skipped
    C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
    C:\WINDOWS\system32\config\default Object is locked skipped
    C:\WINDOWS\system32\config\DEFAULT.LOG Object is locked skipped
    C:\WINDOWS\system32\config\Internet.evt Object is locked skipped
    C:\WINDOWS\system32\config\sam Object is locked skipped
    C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
    C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
    C:\WINDOWS\system32\config\security Object is locked skipped
    C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
    C:\WINDOWS\system32\config\software Object is locked skipped
    C:\WINDOWS\system32\config\SOFTWARE.LOG Object is locked skipped
    C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
    C:\WINDOWS\system32\config\system Object is locked skipped
    C:\WINDOWS\system32\config\SYSTEM.LOG Object is locked skipped
    C:\WINDOWS\system32\h323log.txt Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped
    C:\WINDOWS\wiadebug.log Object is locked skipped
    C:\WINDOWS\wiaservc.log Object is locked skipped
    C:\WINDOWS\WindowsUpdate.log Object is locked skipped
    D:\My Mail\outlook.pst/Personal Folders/Inbox/Jokes/16 Sep 1998 16:01 from Gerry Cruz:Are you ready for this?/XATT11.EXE Infected: not-virus:BadJoke.Win16.Stupid.a skipped
    D:\My Mail\outlook.pst Mail MS Mail: infected - 1 skipped
    D:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
    D:\System Volume Information\_restore{49703415-7822-4333-ABC1-5372C85AE95E}\RP252\A0101223.exe/stream/data0006 Infected: Trojan-Downloader.Win32.Zlob.edb skipped
    D:\System Volume Information\_restore{49703415-7822-4333-ABC1-5372C85AE95E}\RP252\A0101223.exe/stream Infected: Trojan-Downloader.Win32.Zlob.edb skipped
    D:\System Volume Information\_restore{49703415-7822-4333-ABC1-5372C85AE95E}\RP252\A0101223.exe NSIS: infected - 2 skipped
    D:\System Volume Information\_restore{49703415-7822-4333-ABC1-5372C85AE95E}\RP252\change.log Object is locked skipped

    Scan process completed.

  2. #2
    Junior Member
    Join Date
    Feb 2008
    Posts
    9

    Default HijackThis log

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 5:02:42 PM, on 2008/02/26
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16608)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
    C:\Program Files\Comodo\common\CAVASpy\cavasm.exe
    c:\oraclexe\app\oracle\product\10.2.0\server\bin\ORACLE.EXE
    C:\oraclexe\app\oracle\product\10.2.0\server\BIN\tnslsnr.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\fxssvc.exe
    C:\Program Files\Dell Photo AIO Printer 922\dlbtbmgr.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\Analog Devices\Core\smax4pnp.exe
    C:\Program Files\Dell Photo AIO Printer 922\dlbtbmon.exe
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\MSN Messenger\MsnMsgr.Exe
    C:\Program Files\Comodo\Comodo AntiVirus\Cavaud.exe
    C:\WINDOWS\System32\svchost.exe
    C:\PROGRA~1\Cognos\POWERH~1\lmgrd.exe
    C:\PROGRA~1\Cognos\POWERH~1\cognos1d.exe
    C:\Program Files\MSN Messenger\usnsvc.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
    C:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXE
    C:\Program Files\MailWasher Pro\MailWasher.exe
    C:\Program Files\Vim\vim63\gvim.exe
    C:\WINDOWS\system32\cmd.exe
    C:\progra~1\cognos\powerh~1.41f\qdesign.exe
    C:\Program Files\Vim\vim63\gvim.exe
    C:\WINDOWS\system32\cmd.exe
    C:\progra~1\cognos\powerh~1.41f\qshow.exe
    C:\Program Files\Vim\vim63\gvim.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.ca/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: BitComet ClickCapture - {39F7E362-828A-4B5A-BCAF-5B79BFDFEA60} - C:\Program Files\BitComet\tools\BitCometBHO_1.1.9.24.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
    O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
    O3 - Toolbar: emotigt - {B2F479AD-17DE-4F73-B844-7CF69003B916} - C:\WINDOWS\emotigt.dll (file missing)
    O4 - HKLM\..\Run: [cnfgCav] "C:\Program Files\Comodo\Comodo AntiVirus\CMain.exe" " /login"
    O4 - HKLM\..\Run: [Comodo Launch Pad Tray] C:\Program Files\Comodo\LaunchPad\CLPTray.exe
    O4 - HKLM\..\Run: [Dell Photo AIO Printer 922] "C:\Program Files\Dell Photo AIO Printer 922\dlbtbmgr.exe"
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [CloneCDTray] "C:\Program Files\SlySoft\CloneCD\CloneCDTray.exe" /s
    O4 - HKLM\..\Run: [BelkinAPM] C:\Program Files\Belkin Automatic Power Management Software\BelkinAPM.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\Core\smax4pnp.exe
    O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
    O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
    O4 - HKLM\..\RunServices: [BelkinAPM] C:\Program Files\Belkin Automatic Power Management Software\BelkinAPM.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
    O4 - HKCU\..\Run: [MailWasher] C:\PROGRA~1\MAILWA~1\MAILWA~1.EXE
    O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    O8 - Extra context menu item: &D&ownload &with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddLink.htm
    O8 - Extra context menu item: &D&ownload all video with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddVideo.htm
    O8 - Extra context menu item: &D&ownload all with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddAllLink.htm
    O9 - Extra button: BitComet Search - {461CC20B-FB6E-4f16-8FE8-C29359DB100E} - C:\Program Files\BitComet\tools\BitCometBHO_1.1.9.24.dll
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english...an_unicode.cab
    O16 - DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} (GpcContainer Class) - https://communique.webex.com/client/...ex/ieatgpc.cab
    O21 - SSODL: bdmanager - {784C001E-30A2-43AD-B774-7301AC9E0865} - C:\WINDOWS\bdmanager.dll (file missing)
    O21 - SSODL: admgcx - {6AB972D4-E7D9-49C1-95D4-4377135B0B75} - C:\WINDOWS\admgcx.dll
    O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
    O23 - Service: Comodo Anti-Virus and Anti-Spyware Service - Comodo Inc. - C:\Program Files\Comodo\common\CAVASpy\cavasm.exe
    O23 - Service: dlbt_device - Dell - C:\WINDOWS\system32\dlbtcoms.exe
    O23 - Service: FLEXlm License Manager - Unknown owner - C:\PROGRA~1\Cognos\POWERH~1\lmgrd.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: Cognos Netd (netd) - Cognos Incorporated - C:\PROGRA~1\Cognos\POWERH~1.41C\netd.exe
    O23 - Service: Cognos Netd for 841F (netd841F) - Cognos Incorporated - C:\PROGRA~1\Cognos\POWERH~1.41F\netd.exe
    O23 - Service: OracleMTSRecoveryService - Oracle Corporation - C:\oraclexe\app\oracle\product\10.2.0\server\BIN\omtsreco.exe
    O23 - Service: OracleOraHome92TNSListener - Unknown owner - C:\progra~1\oracle\ora92\BIN\TNSLSNR.exe (file missing)
    O23 - Service: OracleServiceV60 - Unknown owner - c:\progra~1\oracle\ora92\bin\ORACLE.EXE (file missing)
    O23 - Service: OracleServiceXE - Oracle Corporation - c:\oraclexe\app\oracle\product\10.2.0\server\bin\ORACLE.EXE
    O23 - Service: OracleXEClrAgent - Unknown owner - C:\oraclexe\app\oracle\product\10.2.0\server\bin\OraClrAgnt.exe
    O23 - Service: OracleXETNSListener - Unknown owner - C:\oraclexe\app\oracle\product\10.2.0\server\BIN\tnslsnr.exe
    O23 - Service: Cognos PowerHouse QKView Daemon (QKViewD) - Unknown owner - C:\PROGRA~1\COGNOS\POWERH~1.41F\QKVIEW\QKViewDaemonService.exe
    O23 - Service: SonicWall VPN Client Service (RampartSvc) - SonicWALL, Inc. - C:\Program Files\SonicWALL\SonicWALL Global VPN Client\RampartSvc.exe
    O23 - Service: Reflection Servers - WRQ, Inc. - C:\Program Files\Reflection\rninetd.exe

    --
    End of file - 7916 bytes

  3. #3
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    Welcome to Safer Networking, I wish to be sure you have viewed and understand this information.
    "BEFORE you POST" (READ this Procedure before Requesting Assistance)
    http://forums.spybot.info/showthread.php?t=288
    All advice given is taken at your own risk.
    Please make sure you have read this information so we are on the same page.

    You are still infected and I need to do some research first. I see you used Smitfraudfix, make sure you delete any copy you have and use the newest version I will supply a link for. Before we start, let's look at some items Kaspersky located.

    You need to be careful who you share software with, they are sharing junk infected with adware.

    C:\Documents and Settings\All Users\Documents\Shared Software\Theater Software\ <<< delete that folder and contents

    (delete these email...may only be one?)
    D:\My Mail\outlook.pst/Personal Folders/Inbox/Jokes/16 Sep 1998 16:01 from Gerry Cruz:Are you ready for this?/XATT11.EXE ------> not-virus:BadJoke.Win16.Stupid.a
    D:\My Mail\outlook.pst Mail MS Mail: infected - 1


    http://siri.geekstogo.com/SmitfraudFix.php <<< download Smitfraudfix from here and follow ONLY these directions.

    Search:
    Double-click SmitfraudFix.exe
    Select 1 and hit Enter to create a report of the infected files. The report can be found at the root of the system drive, usually at C:\rapport.txt

    Note: process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool". It is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
    http://www.beyondlogic.org/consultin...rocessutil.htm

    Post only the C:\rapport.txt

    Thanks
    MS-MVP Consumer Security 2007-08-09
    Proud Member ASAP
    UNITE Member 2006

  4. #4
    Junior Member
    Join Date
    Feb 2008
    Posts
    9

    Default contents of C:\Rapport.txt

    Files deleted as requested...
    Here is the output requested


    SmitFraudFix v2.296

    Scan done at 10:52:21.75, 2008/02/27
    Run from C:\Documents and Settings\Ken\Desktop\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    The filesystem type is NTFS
    Fix run in normal mode

    »»»»»»»»»»»»»»»»»»»»»»»» Process

    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Comodo\Comodo AntiVirus\CMain.exe
    C:\Program Files\Comodo\LaunchPad\CLPTray.exe
    C:\Program Files\Dell Photo AIO Printer 922\dlbtbmgr.exe
    C:\Program Files\Dell Photo AIO Printer 922\dlbtbmon.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\Analog Devices\Core\smax4pnp.exe
    C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\MSN Messenger\MsnMsgr.Exe
    C:\PROGRA~1\MAILWA~1\MAILWA~1.EXE
    C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
    C:\Program Files\Comodo\common\CAVASpy\cavasm.exe
    C:\PROGRA~1\Cognos\POWERH~1\lmgrd.exe
    c:\oraclexe\app\oracle\product\10.2.0\server\bin\ORACLE.EXE
    C:\oraclexe\app\oracle\product\10.2.0\server\BIN\tnslsnr.exe
    C:\WINDOWS\system32\svchost.exe
    C:\PROGRA~1\Cognos\POWERH~1\cognos1d.exe
    C:\WINDOWS\system32\fxssvc.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\Program Files\Comodo\Comodo AntiVirus\Cavaud.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\MSN Messenger\usnsvc.exe
    C:\Program Files\Comodo\Comodo AntiVirus\cavemsrv.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
    C:\WINDOWS\system32\cmd.exe

    »»»»»»»»»»»»»»»»»»»»»»»» hosts

    hosts file corrupted !

    127.0.0.1 www.legal-at-spybot.info
    127.0.0.1 legal-at-spybot.info

    »»»»»»»»»»»»»»»»»»»»»»»» C:\


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Ken


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Ken\Application Data


    »»»»»»»»»»»»»»»»»»»»»»»» Start Menu


    »»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\Ken\FAVORI~1

    C:\DOCUME~1\Ken\FAVORI~1\Error Cleaner.url FOUND !
    C:\DOCUME~1\Ken\FAVORI~1\Privacy Protector.url FOUND !
    C:\DOCUME~1\Ken\FAVORI~1\Spyware?Malware Protection.url FOUND !

    »»»»»»»»»»»»»»»»»»»»»»»» Desktop


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files


    »»»»»»»»»»»»»»»»»»»»»»»» Corrupted keys


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop Components

    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
    "Source"="About:Home"
    "SubscribedURL"="About:Home"
    "FriendlyName"="My Current Home Page"


    »»»»»»»»»»»»»»»»»»»»»»»» IEDFix
    !!!Attention, following keys are not inevitably infected!!!

    IEDFix
    Credits: Malware Analysis & Diagnostic
    Code: S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» VACFix
    !!!Attention, following keys are not inevitably infected!!!

    VACFix
    Credits: Malware Analysis & Diagnostic
    Code: S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll


    »»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
    "AppInit_DLLs"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "System"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Rustock



    »»»»»»»»»»»»»»»»»»»»»»»» DNS

    Description: SOHOware 10/100 PCI Network Adapter - Packet Scheduler Miniport
    DNS Server Search Order: 64.71.255.198

    HKLM\SYSTEM\CCS\Services\Tcpip\..\{1FEFA8CE-CC05-40BA-B20A-08D873741412}: DhcpNameServer=192.168.0.28 192.168.0.17
    HKLM\SYSTEM\CCS\Services\Tcpip\..\{3EA812E8-E76B-4608-9C52-3A916490A578}: DhcpNameServer=64.71.255.198
    HKLM\SYSTEM\CCS\Services\Tcpip\..\{D75142A0-C97D-420F-9554-EC7AF2AFDC80}: DhcpNameServer=192.168.0.28 192.168.0.17
    HKLM\SYSTEM\CS1\Services\Tcpip\..\{1FEFA8CE-CC05-40BA-B20A-08D873741412}: DhcpNameServer=192.168.0.28 192.168.0.17
    HKLM\SYSTEM\CS1\Services\Tcpip\..\{3EA812E8-E76B-4608-9C52-3A916490A578}: DhcpNameServer=64.71.255.198
    HKLM\SYSTEM\CS1\Services\Tcpip\..\{D75142A0-C97D-420F-9554-EC7AF2AFDC80}: DhcpNameServer=192.168.0.28 192.168.0.17
    HKLM\SYSTEM\CS2\Services\Tcpip\..\{1FEFA8CE-CC05-40BA-B20A-08D873741412}: DhcpNameServer=192.168.0.28 192.168.0.17
    HKLM\SYSTEM\CS2\Services\Tcpip\..\{3EA812E8-E76B-4608-9C52-3A916490A578}: DhcpNameServer=64.71.255.198
    HKLM\SYSTEM\CS2\Services\Tcpip\..\{D75142A0-C97D-420F-9554-EC7AF2AFDC80}: DhcpNameServer=192.168.0.28 192.168.0.17
    HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=64.71.255.198
    HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=64.71.255.198


    »»»»»»»»»»»»»»»»»»»»»»»» Scanning for wininet.dll infection


    »»»»»»»»»»»»»»»»»»»»»»»» End

  5. #5
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    Thanks for returning your information, Smitfraudfix found the infection and it also found this:

    »»»»»»»»»»»»»»»»»»»»»»»» hosts
    hosts file corrupted !


    After we clean, in the next C:\rapport.txt, there may be a very large hosts file
    (items starting with 127.0.0.1) and I do not need to see it. Edit (remove) it from
    the C:\rapport.txt before you post it.

    Clean:
    Reboot your computer in Safe Mode (before the Windows icon appears, tap the F8 key continually)
    Double-click SmitfraudFix.exe
    Select 2 and hit Enter to delete infect files.
    You will be prompted: Do you want to clean the registry ? answer Y (yes) and hit Enter in order to remove the Desktop background and clean registry keys associated with the infection.
    The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found): Replace infected file ? answer Y (yes) and hit Enter to restore a clean file.
    A reboot may be needed to finish the cleaning process. The report can be found at the root of the system drive, usually at C:\rapport.txt

    Optional:
    To restore Trusted and Restricted site zone, select 3 and hit Enter.
    You will be prompted: Restore Trusted Zone ? answer Y (yes) and hit Enter to delete trusted zone.
    Note, if you use SpywareBlaster and/or IE-SPYAD, it will be necessary to re-install the protection both afford. For SpywareBlaster, run the program and re-protect all items. For IE-SPYAD, run the batch file and reinstall the protection.

    Post the C:\rapport.txt and a new HJT log.

    Thanks
    MS-MVP Consumer Security 2007-08-09
    Proud Member ASAP
    UNITE Member 2006

  6. #6
    Junior Member
    Join Date
    Feb 2008
    Posts
    9

    Default New HJT log

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 12:58:41 PM, on 2008/02/27
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16608)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Comodo\Comodo AntiVirus\CMain.exe
    C:\Program Files\Comodo\LaunchPad\CLPTray.exe
    C:\Program Files\Dell Photo AIO Printer 922\dlbtbmgr.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\Dell Photo AIO Printer 922\dlbtbmon.exe
    C:\Program Files\Analog Devices\Core\smax4pnp.exe
    C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\MSN Messenger\MsnMsgr.Exe
    C:\PROGRA~1\MAILWA~1\MAILWA~1.EXE
    C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
    C:\Program Files\Comodo\common\CAVASpy\cavasm.exe
    C:\PROGRA~1\Cognos\POWERH~1\lmgrd.exe
    c:\oraclexe\app\oracle\product\10.2.0\server\bin\ORACLE.EXE
    C:\oraclexe\app\oracle\product\10.2.0\server\BIN\tnslsnr.exe
    C:\PROGRA~1\Cognos\POWERH~1\cognos1d.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\fxssvc.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\Program Files\Comodo\Comodo AntiVirus\Cavaud.exe
    C:\Program Files\Comodo\Comodo AntiVirus\cavemsrv.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\MSN Messenger\usnsvc.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    C:\WINDOWS\system32\wuauclt.exe

    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: BitComet ClickCapture - {39F7E362-828A-4B5A-BCAF-5B79BFDFEA60} - C:\Program Files\BitComet\tools\BitCometBHO_1.1.9.24.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
    O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
    O3 - Toolbar: emotigt - {B2F479AD-17DE-4F73-B844-7CF69003B916} - C:\WINDOWS\emotigt.dll (file missing)
    O4 - HKLM\..\Run: [cnfgCav] "C:\Program Files\Comodo\Comodo AntiVirus\CMain.exe" " /login"
    O4 - HKLM\..\Run: [Comodo Launch Pad Tray] C:\Program Files\Comodo\LaunchPad\CLPTray.exe
    O4 - HKLM\..\Run: [Dell Photo AIO Printer 922] "C:\Program Files\Dell Photo AIO Printer 922\dlbtbmgr.exe"
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [CloneCDTray] "C:\Program Files\SlySoft\CloneCD\CloneCDTray.exe" /s
    O4 - HKLM\..\Run: [BelkinAPM] C:\Program Files\Belkin Automatic Power Management Software\BelkinAPM.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\Core\smax4pnp.exe
    O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
    O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
    O4 - HKLM\..\RunServices: [BelkinAPM] C:\Program Files\Belkin Automatic Power Management Software\BelkinAPM.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
    O4 - HKCU\..\Run: [MailWasher] C:\PROGRA~1\MAILWA~1\MAILWA~1.EXE
    O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    O8 - Extra context menu item: &D&ownload &with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddLink.htm
    O8 - Extra context menu item: &D&ownload all video with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddVideo.htm
    O8 - Extra context menu item: &D&ownload all with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddAllLink.htm
    O9 - Extra button: BitComet Search - {461CC20B-FB6E-4f16-8FE8-C29359DB100E} - C:\Program Files\BitComet\tools\BitCometBHO_1.1.9.24.dll
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O21 - SSODL: bdmanager - {784C001E-30A2-43AD-B774-7301AC9E0865} - C:\WINDOWS\bdmanager.dll (file missing)
    O21 - SSODL: admgcx - {6AB972D4-E7D9-49C1-95D4-4377135B0B75} - C:\WINDOWS\admgcx.dll (file missing)
    O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
    O23 - Service: Comodo Anti-Virus and Anti-Spyware Service - Comodo Inc. - C:\Program Files\Comodo\common\CAVASpy\cavasm.exe
    O23 - Service: dlbt_device - Dell - C:\WINDOWS\system32\dlbtcoms.exe
    O23 - Service: FLEXlm License Manager - Unknown owner - C:\PROGRA~1\Cognos\POWERH~1\lmgrd.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: Cognos Netd (netd) - Cognos Incorporated - C:\PROGRA~1\Cognos\POWERH~1.41C\netd.exe
    O23 - Service: Cognos Netd for 841F (netd841F) - Cognos Incorporated - C:\PROGRA~1\Cognos\POWERH~1.41F\netd.exe
    O23 - Service: OracleMTSRecoveryService - Oracle Corporation - C:\oraclexe\app\oracle\product\10.2.0\server\BIN\omtsreco.exe
    O23 - Service: OracleOraHome92TNSListener - Unknown owner - C:\progra~1\oracle\ora92\BIN\TNSLSNR.exe (file missing)
    O23 - Service: OracleServiceV60 - Unknown owner - c:\progra~1\oracle\ora92\bin\ORACLE.EXE (file missing)
    O23 - Service: OracleServiceXE - Oracle Corporation - c:\oraclexe\app\oracle\product\10.2.0\server\bin\ORACLE.EXE
    O23 - Service: OracleXEClrAgent - Unknown owner - C:\oraclexe\app\oracle\product\10.2.0\server\bin\OraClrAgnt.exe
    O23 - Service: OracleXETNSListener - Unknown owner - C:\oraclexe\app\oracle\product\10.2.0\server\BIN\tnslsnr.exe
    O23 - Service: Cognos PowerHouse QKView Daemon (QKViewD) - Unknown owner - C:\PROGRA~1\COGNOS\POWERH~1.41F\QKVIEW\QKViewDaemonService.exe
    O23 - Service: SonicWall VPN Client Service (RampartSvc) - SonicWALL, Inc. - C:\Program Files\SonicWALL\SonicWALL Global VPN Client\RampartSvc.exe
    O23 - Service: Reflection Servers - WRQ, Inc. - C:\Program Files\Reflection\rninetd.exe

    --
    End of file - 7186 bytes

  7. #7
    Junior Member
    Join Date
    Feb 2008
    Posts
    9

    Default New rapport.txt

    SmitFraudFix v2.296

    Scan done at 12:50:49.18, 2008/02/27
    Run from C:\Documents and Settings\Ken\Desktop\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    The filesystem type is NTFS
    Fix run in safe mode

    »»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    »»»»»»»»»»»»»»»»»»»»»»»» Killing process


    »»»»»»»»»»»»»»»»»»»»»»»» hosts


    DELETED

    »»»»»»»»»»»»»»»»»»»»»»»» VACFix

    VACFix
    Credits: Malware Analysis & Diagnostic
    Code: S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix

    S!Ri's WS2Fix: LSP not Found.


    »»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

    GenericRenosFix by S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files

    C:\DOCUME~1\Ken\FAVORI~1\Error Cleaner.url Deleted
    C:\DOCUME~1\Ken\FAVORI~1\Privacy Protector.url Deleted
    C:\DOCUME~1\Ken\FAVORI~1\Spyware?Malware Protection.url Deleted

    »»»»»»»»»»»»»»»»»»»»»»»» IEDFix

    IEDFix
    Credits: Malware Analysis & Diagnostic
    Code: S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» DNS

    HKLM\SYSTEM\CCS\Services\Tcpip\..\{1FEFA8CE-CC05-40BA-B20A-08D873741412}: DhcpNameServer=192.168.0.28 192.168.0.17
    HKLM\SYSTEM\CCS\Services\Tcpip\..\{3EA812E8-E76B-4608-9C52-3A916490A578}: DhcpNameServer=64.71.255.198
    HKLM\SYSTEM\CCS\Services\Tcpip\..\{D75142A0-C97D-420F-9554-EC7AF2AFDC80}: DhcpNameServer=192.168.0.28 192.168.0.17
    HKLM\SYSTEM\CS1\Services\Tcpip\..\{1FEFA8CE-CC05-40BA-B20A-08D873741412}: DhcpNameServer=192.168.0.28 192.168.0.17
    HKLM\SYSTEM\CS1\Services\Tcpip\..\{3EA812E8-E76B-4608-9C52-3A916490A578}: DhcpNameServer=64.71.255.198
    HKLM\SYSTEM\CS1\Services\Tcpip\..\{D75142A0-C97D-420F-9554-EC7AF2AFDC80}: DhcpNameServer=192.168.0.28 192.168.0.17
    HKLM\SYSTEM\CS2\Services\Tcpip\..\{1FEFA8CE-CC05-40BA-B20A-08D873741412}: DhcpNameServer=192.168.0.28 192.168.0.17
    HKLM\SYSTEM\CS2\Services\Tcpip\..\{3EA812E8-E76B-4608-9C52-3A916490A578}: DhcpNameServer=64.71.255.198
    HKLM\SYSTEM\CS2\Services\Tcpip\..\{D75142A0-C97D-420F-9554-EC7AF2AFDC80}: DhcpNameServer=192.168.0.28 192.168.0.17
    HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=64.71.255.198
    HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=64.71.255.198


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


    »»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "System"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

    Registry Cleaning done.

    »»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll


    »»»»»»»»»»»»»»»»»»»»»»»» End

  8. #8
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    Thank for returning your information, let's clean up a little.

    1) Windows Defender
    Click on "Tools"
    Click on "General Settings"
    Scroll down to "Real-time protection options"
    Uncheck "Turn on Real-time protection (recommended)"
    Click "Save"
    Make sure to turn your proection back on when you finish.

    2) AVG Anti-Spyware <<< do you own this program?

    Open AVG Anti-Spyware by double-clicking the multi-colored box emblazoned with an 'S' in the system tray.
    In the 'Resident Shield' section, toggle the AVG Anti-Spyware active protection 'off' by clicking 'Change state' which will then change the protection status to 'inactive'.
    If you are instructed to reboot at any time during your cleanup, AVG Anti-Spyware will prompt you as to whether you would like to "Restart the Resident Shield".
    Reply 'no' and set it to 'inactive' for the duration of your cleanup.

    3) Please download ATF Cleaner by Atribune
    http://www.atribune.org/content/view/25/2/
    Save it to your Desktop. We will use this later.

    4) Open HijackThis and choose "Do a system scan only" then check the box in front of these line items:

    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
    O3 - Toolbar: emotigt - {B2F479AD-17DE-4F73-B844-7CF69003B916} - C:\WINDOWS\emotigt.dll (file missing)
    O21 - SSODL: bdmanager - {784C001E-30A2-43AD-B774-7301AC9E0865} - C:\WINDOWS\bdmanager.dll (file missing)
    O21 - SSODL: admgcx - {6AB972D4-E7D9-49C1-95D4-4377135B0B75} - C:\WINDOWS\admgcx.dll (file missing)

    Close all programs but HJT and all browser windows, then click on "Fix Checked"

    5) Run ATF Cleaner
    Double-click ATF-Cleaner.exe to run the program.
    Click Select All found at the bottom of the list.
    Click the Empty Selected button.
    Click Exit on the Main menu to close the program.

    Restart and post a new HJT log and some feedback. How is the computer running now?

    Thanks
    MS-MVP Consumer Security 2007-08-09
    Proud Member ASAP
    UNITE Member 2006

  9. #9
    Junior Member
    Join Date
    Feb 2008
    Posts
    9

    Default

    The link to ATF cleaner is not working.
    I also tried to access the download area...I think they are having problems.

  10. #10
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    OK thanks, save that link and get that nice free tool for yourself when it is available. For now, use Clean Manager:

    http://spyware-free.us/tutorials/cleanmgr/
    MS-MVP Consumer Security 2007-08-09
    Proud Member ASAP
    UNITE Member 2006

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •