Page 1 of 3 123 LastLast
Results 1 to 10 of 21

Thread: Another Virumonde attack

  1. #1
    Junior Member
    Join Date
    Feb 2008
    Posts
    18

    Default Another Virumonde attack

    Folks - this is my first post - always a victim on the first post eh? Thanks in advance for your help. Here is the HJT log:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 07:59:38, on 27/02/2008
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\System32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\System32\inetsrv\inetinfo.exe
    C:\Program Files\Apoint\Apoint.exe
    C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    C:\WINDOWS\System32\ICO.EXE
    C:\WINDOWS\System32\ezSP_Px.exe
    C:\Program Files\Sony\HotKey Utility\HKserv.exe
    C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
    C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
    C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe
    C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe
    C:\PROGRA~1\ntl\BROADB~1\SMARTB~1\MotiveSB.exe
    C:\Program Files\Network Associates\VirusScan\Mcshield.exe
    C:\Program Files\Sony\HotKey Utility\HKWnd.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\WINDOWS\System32\rundll32.exe
    C:\WINDOWS\System32\Rundll32.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
    C:\WINDOWS\System32\ctfmon.exe
    C:\Program Files\Apoint\Apntex.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\Belkin\Belkin 802.11g Wireless Card Configuration Utility\utility.exe
    C:\Program Files\powerpanel\Program\PcfMgr.exe
    C:\WINDOWS\System32\wuauclt.exe
    C:\WINDOWS\system32\NOTEPAD.EXE
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://onecare.live.com/site/en-US/d....htm?s_cid=sah
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.club-vaio.sony-europe.com/
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe
    O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe
    O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    O4 - HKLM\..\Run: [Mouse Suite 98 Daemon] ICO.EXE
    O4 - HKLM\..\Run: [ezShieldProtector for Px] C:\WINDOWS\System32\ezSP_Px.exe
    O4 - HKLM\..\Run: [HKSERV.EXE] C:\Program Files\Sony\HotKey Utility\HKserv.exe
    O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
    O4 - HKLM\..\Run: [McAfeeUpdaterUI] "C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" /StartedFromRunKey
    O4 - HKLM\..\Run: [Network Associates Error Reporting Service] "C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe"
    O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\ntl\BROADB~1\SMARTB~1\MotiveSB.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [dcb3aab0] rundll32.exe "C:\WINDOWS\System32\mdajfoml.dll",b
    O4 - HKLM\..\Run: [BMdf80992c] Rundll32.exe "C:\WINDOWS\System32\dogjaomj.dll",s
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'Default user')
    O4 - Global Startup: Belkin 802.11g Wireless Card Utility.lnk = C:\Program Files\Belkin\Belkin 802.11g Wireless Card Configuration Utility\utility.exe
    O4 - Global Startup: broadband medic.lnk = C:\Program Files\ntl\broadband medic\bin\matcli.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
    O4 - Global Startup: PowerPanel.lnk = ?
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O14 - IERESET.INF: START_PAGE_URL=http://www.club-vaio.sony-europe.com/
    O15 - Trusted Zone: *.sony-europe.com
    O15 - Trusted Zone: *.sonystyle-europe.com
    O15 - Trusted Zone: *.vaio-link.com
    O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english...an_unicode.cab
    O16 - DPF: {5CD4310E-88FB-43C1-BE24-5F3FA9C5C9D1} (KooPlayer Control) - http://www.tvkoo.com/update/KooPlayer.ocx
    O16 - DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} (Windows Live Safety Center Base Module) - http://cdn.scan.onecare.live.com/res...lscbase370.cab
    O16 - DPF: {FEE1002D-90A5-4A5D-AABE-01803FFBCF7A} - http://ps.itv.mop.com/dn/files/pCast....94_signed.cab
    O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe
    O23 - Service: McAfee Framework Service (McAfeeFramework) - Network Associates, Inc. - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
    O23 - Service: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\Mcshield.exe
    O23 - Service: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
    O23 - Service: MS Common Service - Unknown owner - C:\WINDOWS\System32\mscomserv.exe (file missing)

    --
    End of file - 6612 bytes

  2. #2
    Junior Member
    Join Date
    Feb 2008
    Posts
    18

    Default

    And here is the Kaspersky:

    -------------------------------------------------------------------------------
    KASPERSKY ONLINE SCANNER REPORT
    Wednesday, February 27, 2008 7:19:03 AM
    Operating System: Microsoft Windows XP Professional, Service Pack 1 (Build 2600)
    Kaspersky Online Scanner version: 5.0.98.0
    Kaspersky Anti-Virus database last update: 26/02/2008
    Kaspersky Anti-Virus database records: 582431
    -------------------------------------------------------------------------------

    Scan Settings:
    Scan using the following antivirus database: extended
    Scan Archives: true
    Scan Mail Bases: true

    Scan Target - My Computer:
    C:\
    D:\
    E:\
    G:\

    Scan Statistics:
    Total number of scanned objects: 124669
    Number of viruses found: 4
    Number of infected objects: 7
    Number of suspicious objects: 0
    Duration of the scan process: 02:00:26

    Infected Object Name / Virus Name / Last Action
    C:\Documents and Settings\Administrator\NTUSER.DAT Object is locked skipped
    C:\Documents and Settings\Administrator\NTUSER.DAT.LOG Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Network Associates\Common Framework\Db\Agent_THEVAIO.log Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Network Associates\Common Framework\Db\PrdMgr_THEVAIO.log Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Network Associates\VirusScan\AccessProtectionLog.txt Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Network Associates\VirusScan\BufferOverflowProtectionLog.txt Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Network Associates\VirusScan\OnAccessScanLog.txt Object is locked skipped
    C:\Documents and Settings\allUsers\Cookies\index.dat Object is locked skipped
    C:\Documents and Settings\allUsers\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\allUsers\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\allUsers\Local Settings\History\History.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\allUsers\Local Settings\History\History.IE5\MSHist012008022720080228\index.dat Object is locked skipped
    C:\Documents and Settings\allUsers\Local Settings\Temp\ICD1.tmp\UGA6P_0001_N122M0611NetInstaller.exe Infected: not-a-virus:Downloader.Win32.WinFixer.au skipped
    C:\Documents and Settings\allUsers\Local Settings\Temp\yazzsnet.exe/data0003 Infected: Trojan.Win32.Scapur.k skipped
    C:\Documents and Settings\allUsers\Local Settings\Temp\yazzsnet.exe NSIS: infected - 1 skipped
    C:\Documents and Settings\allUsers\Local Settings\Temp\~DF7BF0.tmp Object is locked skipped
    C:\Documents and Settings\allUsers\Local Settings\Temporary Internet Files\Content.IE5\A5OFEB8J\cmp638[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
    C:\Documents and Settings\allUsers\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\allUsers\NTUSER.DAT Object is locked skipped
    C:\Documents and Settings\allUsers\NTUSER.DAT.LOG Object is locked skipped
    C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
    C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
    C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
    C:\Program Files\ntl\broadband medic\SmartBridge\AlertFilter.log Object is locked skipped
    C:\Program Files\ntl\broadband medic\SmartBridge\log\httpclient.log Object is locked skipped
    C:\Program Files\ntl\broadband medic\SmartBridge\SmartBridge.log Object is locked skipped
    C:\System Volume Information\_restore{F64B586C-C1F0-46E5-BF86-46FAF5A3D503}\RP326\A0238033.exe/data0001 Infected: not-a-virus:AdWare.Win32.PurityScan.gp skipped
    C:\System Volume Information\_restore{F64B586C-C1F0-46E5-BF86-46FAF5A3D503}\RP326\A0238033.exe NSIS: infected - 1 skipped
    C:\System Volume Information\_restore{F64B586C-C1F0-46E5-BF86-46FAF5A3D503}\RP331\change.log Object is locked skipped
    C:\WINDOWS\Debug\oakley.log Object is locked skipped
    C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
    C:\WINDOWS\SchedLgU.Txt Object is locked skipped
    C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
    C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
    C:\WINDOWS\system32\config\default Object is locked skipped
    C:\WINDOWS\system32\config\DEFAULT.LOG Object is locked skipped
    C:\WINDOWS\system32\config\SAM Object is locked skipped
    C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
    C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
    C:\WINDOWS\system32\config\SECURITY Object is locked skipped
    C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
    C:\WINDOWS\system32\config\software Object is locked skipped
    C:\WINDOWS\system32\config\SOFTWARE.LOG Object is locked skipped
    C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
    C:\WINDOWS\system32\config\system Object is locked skipped
    C:\WINDOWS\system32\config\SYSTEM.LOG Object is locked skipped
    C:\WINDOWS\system32\dogjaomj.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.gen skipped
    C:\WINDOWS\system32\h323log.txt Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
    C:\WINDOWS\Temp\Perflib_Perfdata_ec4.dat Object is locked skipped
    C:\WINDOWS\WindowsUpdate.log Object is locked skipped

    Scan process completed.

  3. #3
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    Welcome to Safer Networking, I wish to be sure you have viewed and understand this information.
    "BEFORE you POST" (READ this Procedure before Requesting Assistance)
    http://forums.spybot.info/showthread.php?t=288
    All advice given is taken at your own risk.
    Please make sure you have read this information so we are on the same page.

    Welcome to a new member, thanks for following directions, not everyone does.

    Now that is out of the way, the bad news. I see probably three different infections so do not expect fast or easy. I see PurityScan/OIN, Vundo (winfixer popups) and also this new item:
    O23 - Service: MS Common Service - Unknown owner - C:\WINDOWS\System32\mscomserv.exe (file missing)
    http://www.sophos.com/security/analyses/trojzlobrf.html

    I need to investigate before we can start, you are infected, I suggest you keep this computer offline except when troubleshooting, the junk may download more. If you have any tool I use, delete it and download it new from the link I provide. Read and follow the directions carefully, the tools will not work unless you do.

    http://siri.geekstogo.com/SmitfraudFix.php <<< download Smitfraudfix from here and follow ONLY these directions.

    Search:
    Double-click SmitfraudFix.exe
    Select 1 and hit Enter to create a report of the infected files. The report can be found at the root of the system drive, usually at C:\rapport.txt

    Note: process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool". It is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
    http://www.beyondlogic.org/consultin...rocessutil.htm

    Post only the C:\rapport.txt

    Thanks
    MS-MVP Consumer Security 2007-08-09
    Proud Member ASAP
    UNITE Member 2006

  4. #4
    Junior Member
    Join Date
    Feb 2008
    Posts
    18

    Default

    PS - Greetings from Belfast and many many thanks for taking the time to help me out - you guys are doing honourable work


    Here is the rapport log:

    SmitFraudFix v2.296

    Scan done at 16:58:50.36, 27/02/2008
    Run from F:\virusfix\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    The filesystem type is NTFS
    Fix run in normal mode

    »»»»»»»»»»»»»»»»»»»»»»»» Process

    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\System32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\System32\inetsrv\inetinfo.exe
    C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
    C:\Program Files\Apoint\Apoint.exe
    C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    C:\WINDOWS\System32\ICO.EXE
    C:\WINDOWS\System32\ezSP_Px.exe
    C:\Program Files\Sony\HotKey Utility\HKserv.exe
    C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
    C:\Program Files\Network Associates\VirusScan\Mcshield.exe
    C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe
    C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe
    C:\PROGRA~1\ntl\BROADB~1\SMARTB~1\MotiveSB.exe
    C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\WINDOWS\System32\rundll32.exe
    C:\WINDOWS\System32\Rundll32.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\WINDOWS\System32\ctfmon.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\Apoint\Apntex.exe
    C:\Program Files\Belkin\Belkin 802.11g Wireless Card Configuration Utility\utility.exe
    C:\Program Files\powerpanel\Program\PcfMgr.exe
    C:\Program Files\Sony\HotKey Utility\HKWnd.exe
    C:\WINDOWS\System32\wuauclt.exe
    C:\WINDOWS\system32\NOTEPAD.EXE
    C:\WINDOWS\system32\cmd.exe

    »»»»»»»»»»»»»»»»»»»»»»»» hosts


    »»»»»»»»»»»»»»»»»»»»»»»» C:\


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32\LogFiles


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\allUsers


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\allUsers\Application Data


    »»»»»»»»»»»»»»»»»»»»»»»» Start Menu


    »»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\allUsers\FAVORI~1


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files


    »»»»»»»»»»»»»»»»»»»»»»»» Corrupted keys


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop Components

    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
    "Source"="About:Home"
    "SubscribedURL"="About:Home"
    "FriendlyName"="My Current Home Page"


    »»»»»»»»»»»»»»»»»»»»»»»» IEDFix
    !!!Attention, following keys are not inevitably infected!!!

    IEDFix
    Credits: Malware Analysis & Diagnostic
    Code: S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» VACFix
    !!!Attention, following keys are not inevitably infected!!!

    VACFix
    Credits: Malware Analysis & Diagnostic
    Code: S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll


    »»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
    "AppInit_DLLs"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "System"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Rustock



    »»»»»»»»»»»»»»»»»»»»»»»» DNS

    HKLM\SYSTEM\CCS\Services\Tcpip\..\{F5F2E294-358A-471D-8C62-1F04754AE164}: DhcpNameServer=194.168.8.100 194.168.4.100
    HKLM\SYSTEM\CS1\Services\Tcpip\..\{F5F2E294-358A-471D-8C62-1F04754AE164}: DhcpNameServer=194.168.8.100 194.168.4.100
    HKLM\SYSTEM\CS2\Services\Tcpip\..\{F5F2E294-358A-471D-8C62-1F04754AE164}: DhcpNameServer=194.168.8.100 194.168.4.100


    »»»»»»»»»»»»»»»»»»»»»»»» Scanning for wininet.dll infection


    »»»»»»»»»»»»»»»»»»»»»»»» End

  5. #5
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    Thanks for returning your information and the greetings. My last name of Skelley, that may make us cousins?

    Unfortunantely, even though that item is part of Smitfraud, the Smitfraudfix must not have it added to the data bases, the C:\rapport.txt is clean and we will have to remove that bad item by other means. You may remove Smitfraudfix from your computer.

    1) We need first to disable TeaTimer that it doesn't interfere with fixes. You can re-enable it when you're clean again:
    * Run Spybot-S&D in Advanced Mode.
    * If it is not already set to do this Go to the Mode menu select "Advanced Mode"
    * On the left hand side, Click on Tools
    * Then click on the Resident Icon in the List
    * Uncheck "Resident TeaTimer" and OK any prompts.
    * Restart your computer.
    (leave TT disabled until we finish)

    2) Thanks to Atribune and any others who helped with this fix.

    http://vundofix.atribune.org/ <<< tutorial

    "Download VundoFix" to your Desktop

    http://www.atribune.org/ccount/click.php?id=4

    Double-click VundoFix.exe to run it.
    When VundoFix opens, click the Scan for Vundo button.
    Once it's done scanning, click the Remove Vundo button.
    You will receive a prompt asking if you want to remove the files, click YES
    Once you click yes, your desktop will go blank as it starts removing Vundo.
    When completed, it will prompt that it will reboot your computer, click OK.
    Note: It is possible that VundoFix encountered a file it could not remove.
    In this case, VundoFix will attempt run on reboot, simply follow the above instructions starting from "Click
    the Scan for Vundo button." when VundoFix appears at reboot. Vundofix.txt will be on the C:\

    (wait until you finish to post reports and logs)

    3) Tutorial if needed:
    http://www.bleepingcomputer.com/comb...o-use-combofix

    Thanks to sUBs and anyone else who helped with this fix.

    It is important that it is saved directly to your Desktop

    Download ComboFix from Here to your Desktop
    • Double click combofix.exe and follow the prompts.
    • When finished, it shall produce a log for you. Post that log and a HiJackthis log in your next reply

    Note: Do not mouseclick combofix's window while its running. That may cause it to stall

    Post the Vundofix.txt, combofix log and a new HJT log.

    Thanks
    MS-MVP Consumer Security 2007-08-09
    Proud Member ASAP
    UNITE Member 2006

  6. #6
    Junior Member
    Join Date
    Feb 2008
    Posts
    18

    Default

    Hi PS - we may very well be cousins - you never know - have you ever visited the "old country"?


    Thanks again for your help so far - I am having trouble downloading Vundofix as the atribune site appears to be having some issues - can you recommend anywhere else to get a version?

  7. #7
    Junior Member
    Join Date
    Feb 2008
    Posts
    18

    Default

    I have just found a copy from majorgeeks.com - it is version 6.7.8 - is this ok?

  8. #8
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    Yes, that should be the most recent version. That link appears to be working now, must have been down for a while.

    Thanks
    MS-MVP Consumer Security 2007-08-09
    Proud Member ASAP
    UNITE Member 2006

  9. #9
    Junior Member
    Join Date
    Feb 2008
    Posts
    18

    Default

    First off the VundoFix file - this was after a couple of scans and reboots:


    VundoFix V6.7.8

    Checking Java version...

    Java version is 1.5.0.3
    Old versions of java are exploitable and should be removed.

    Scan started at 19:08:37 27/02/2008

    Listing files found while scanning....

    C:\WINDOWS\system32\byxyvtr.dll
    C:\WINDOWS\system32\dogjaomj.dll
    C:\WINDOWS\system32\fccccaa.dll
    C:\WINDOWS\system32\lmofjadm.ini
    C:\WINDOWS\system32\mdajfoml.dll
    C:\WINDOWS\system32\pmnlj.dll
    C:\WINDOWS\system32\qomkifg.dll
    C:\WINDOWS\system32\xoalgjmj.dll

    Beginning removal...

    Attempting to delete C:\WINDOWS\system32\byxyvtr.dll
    C:\WINDOWS\system32\byxyvtr.dll Could not be deleted.

    Attempting to delete C:\WINDOWS\system32\dogjaomj.dll
    C:\WINDOWS\system32\dogjaomj.dll Could not be deleted.

    Attempting to delete C:\WINDOWS\system32\fccccaa.dll
    C:\WINDOWS\system32\fccccaa.dll Has been deleted!

    Attempting to delete C:\WINDOWS\system32\lmofjadm.ini
    C:\WINDOWS\system32\lmofjadm.ini Has been deleted!

    Attempting to delete C:\WINDOWS\system32\mdajfoml.dll
    C:\WINDOWS\system32\mdajfoml.dll Could not be deleted.

    Attempting to delete C:\WINDOWS\system32\pmnlj.dll
    C:\WINDOWS\system32\pmnlj.dll Has been deleted!

    Attempting to delete C:\WINDOWS\system32\qomkifg.dll
    C:\WINDOWS\system32\qomkifg.dll Has been deleted!

    Attempting to delete C:\WINDOWS\system32\xoalgjmj.dll
    C:\WINDOWS\system32\xoalgjmj.dll Has been deleted!

    Performing Repairs to the registry.
    Done!

    VundoFix V6.7.8

    Checking Java version...

    Java version is 1.5.0.3
    Old versions of java are exploitable and should be removed.

    Scan started at 19:35:23 27/02/2008

    Listing files found while scanning....

    C:\WINDOWS\system32\byxyvtr.dll
    C:\WINDOWS\system32\dogjaomj.dll
    C:\WINDOWS\system32\mdajfoml.dll

    Beginning removal...

    Beginning removal...

    Attempting to delete C:\WINDOWS\system32\byxyvtr.dll
    C:\WINDOWS\system32\byxyvtr.dll Could not be deleted.

    Attempting to delete C:\WINDOWS\system32\dogjaomj.dll
    C:\WINDOWS\system32\dogjaomj.dll Could not be deleted.

    Attempting to delete C:\WINDOWS\system32\mdajfoml.dll
    C:\WINDOWS\system32\mdajfoml.dll Could not be deleted.

    Performing Repairs to the registry.
    Done!

    VundoFix V6.7.8

    Checking Java version...

    Java version is 1.5.0.3
    Old versions of java are exploitable and should be removed.

    Scan started at 20:01:34 27/02/2008

    Listing files found while scanning....

    C:\WINDOWS\system32\byxyvtr.dll
    C:\WINDOWS\system32\dogjaomj.dll
    C:\WINDOWS\system32\lmofjadm.ini
    C:\WINDOWS\system32\mdajfoml.dll

    Beginning removal...

    Attempting to delete C:\WINDOWS\system32\byxyvtr.dll
    C:\WINDOWS\system32\byxyvtr.dll Could not be deleted.

    Attempting to delete C:\WINDOWS\system32\dogjaomj.dll
    C:\WINDOWS\system32\dogjaomj.dll Has been deleted!

    Attempting to delete C:\WINDOWS\system32\lmofjadm.ini
    C:\WINDOWS\system32\lmofjadm.ini Has been deleted!

    Attempting to delete C:\WINDOWS\system32\mdajfoml.dll
    C:\WINDOWS\system32\mdajfoml.dll Has been deleted!

    Performing Repairs to the registry.
    Done!

    Beginning removal...

    Attempting to delete C:\WINDOWS\system32\byxyvtr.dll
    C:\WINDOWS\system32\byxyvtr.dll Could not be deleted.

    Performing Repairs to the registry.
    Done!

    Beginning removal...

  10. #10
    Junior Member
    Join Date
    Feb 2008
    Posts
    18

    Default

    Now the Combofix

    ComboFix 08-02-25.3 - allUsers 2008-02-27 21:07:43.1 - NTFSx86
    Microsoft Windows XP Professional 5.1.2600.1.1252.1.1033.18.194 [GMT 0:00]
    Running from: C:\Documents and Settings\allUsers\Desktop\ComboFix.exe
    * Created a new restore point

    WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\WINDOWS\cookies.ini
    C:\WINDOWS\system32\byxyvtr.dll
    C:\WINDOWS\system32\Cache
    C:\WINDOWS\system32\mt_32.dll
    C:\WINDOWS\system32\pac.txt

    .
    ((((((((((((((((((((((((( Files Created from 2008-01-27 to 2008-02-27 )))))))))))))))))))))))))))))))
    .

    2008-02-27 19:08 . 2008-02-27 21:00 <DIR> d-------- C:\VundoFix Backups
    2008-02-27 16:59 . 2008-02-27 16:59 3,052 --a------ C:\WINDOWS\system32\tmp.reg
    2008-02-27 07:58 . 2008-02-27 07:58 <DIR> d-------- C:\Program Files\Trend Micro
    2008-02-27 00:15 . 2008-02-27 00:15 <DIR> d-------- C:\WINDOWS\system32\Kaspersky Lab
    2008-02-27 00:15 . 2008-02-27 00:15 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
    2008-02-26 22:01 . 2008-02-26 22:01 <DIR> d-------- C:\Program Files\Windows Live Safety Center
    2008-02-26 21:34 . 2008-02-26 21:36 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Lavasoft
    2008-02-26 21:33 . 2008-02-26 21:33 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
    2008-02-26 18:16 . 2008-02-26 18:15 691,545 --a------ C:\WINDOWS\unins000.exe
    2008-02-26 18:16 . 2008-02-26 18:16 2,545 --a------ C:\WINDOWS\unins000.dat
    2008-02-26 09:40 . 2008-02-27 16:56 136,611 --a------ C:\WINDOWS\BMdf80992c.xml
    2008-02-26 09:40 . 2008-02-27 19:58 22 --a------ C:\WINDOWS\pskt.ini
    2008-02-25 19:18 . 2008-02-27 19:31 210,625 --ahs---- C:\WINDOWS\system32\jlnmp.ini2
    2008-02-25 19:18 . 2008-02-27 19:31 210,625 --ahs---- C:\WINDOWS\system32\jlnmp.ini
    2008-02-25 19:12 . 2008-02-25 19:18 <DIR> d-------- C:\WINDOWS\system32\iDlo01
    2008-02-25 19:12 . 2008-02-25 19:12 <DIR> d-------- C:\Temp\sanR24
    2008-02-25 19:12 . 2008-02-25 19:12 <DIR> d-------- C:\Temp

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2008-02-26 21:34 --------- d-----w C:\Program Files\Lavasoft
    2008-02-26 18:17 --------- d-----w C:\Program Files\Spybot - Search & Destroy
    2008-02-26 18:17 --------- d-----w C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
    2008-01-02 22:05 --------- d-----w C:\Program Files\Common Files\Adobe
    2007-01-24 12:10 18,096 ----a-w C:\Documents and Settings\allUsers\Application Data\GDIPFONTCACHEV1.DAT
    2006-08-07 22:16 24,192 ----a-w C:\Documents and Settings\allUsers\usbsermptxp.sys
    2006-08-07 22:16 22,768 ----a-w C:\Documents and Settings\allUsers\usbsermpt.sys
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{08FC8370-D26F-4562-A767-E783411CA5F1}]

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{3C49DDAC-3DA4-4743-AF6C-5974FEAF875C}]

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{50135FE6-744F-45D1-890F-9508B3F9C336}]
    C:\WINDOWS\System32\pmnlj.dll

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{7d5c3535-d1b9-42b4-9072-48860768c763}]
    C:\WINDOWS\System32\xoalgjmj.dll

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{ED120D76-BF31-412C-A99B-783C6676E128}]

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{F42D655E-D9EA-4736-9BA5-9C0C0A427B26}]

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "MSMSGS"="C:\Program Files\Messenger\msmsgs.exe" [2002-08-20 14:08 1511453]
    "ctfmon.exe"="C:\WINDOWS\System32\ctfmon.exe" [2002-08-29 12:00 13312]
    "SpybotSD TeaTimer"="C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe" [2008-01-28 11:43 2097488]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Apoint"="C:\Program Files\Apoint\Apoint.exe" [2003-06-13 13:52 114688]
    "ATIModeChange"="Ati2mdxx.exe" [2001-09-04 14:24 28672 C:\WINDOWS\system32\Ati2mdxx.exe]
    "ATIPTA"="C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2003-07-30 20:00 335872]
    "Mouse Suite 98 Daemon"="ICO.EXE" [2002-03-14 15:46 45056 C:\WINDOWS\system32\ico.exe]
    "ezShieldProtector for Px"="C:\WINDOWS\System32\ezSP_Px.exe" [2002-08-20 09:29 40960]
    "HKSERV.EXE"="C:\Program Files\Sony\HotKey Utility\HKserv.exe" [2003-06-26 15:00 90112]
    "ShStatEXE"="C:\Program Files\Network Associates\VirusScan\SHSTAT.exe" [2004-08-18 07:00 94208]
    "McAfeeUpdaterUI"="C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" [2004-08-06 02:50 139320]
    "Network Associates Error Reporting Service"="C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe" [2003-10-07 08:48 147514]
    "Motive SmartBridge"="C:\PROGRA~1\ntl\BROADB~1\SMARTB~1\MotiveSB.exe" [2003-12-30 09:40 380928]
    "QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2005-11-11 17:44 155648]
    "dcb3aab0"="C:\WINDOWS\System32\mdajfoml.dll" [ ]
    "BMdf80992c"="C:\WINDOWS\System32\dogjaomj.dll" [ ]

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "CTFMON.EXE"="C:\WINDOWS\System32\CTFMON.EXE" [2002-08-29 12:00 13312]

    C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
    Belkin 802.11g Wireless Card Utility.lnk - C:\Program Files\Belkin\Belkin 802.11g Wireless Card Configuration Utility\utility.exe [2005-11-08 18:10:54 630872]
    broadband medic.lnk - C:\Program Files\ntl\broadband medic\bin\matcli.exe [2005-08-08 12:08:17 217088]
    Microsoft Office.lnk - C:\Program Files\Microsoft Office\Office\OSA9.EXE [1999-02-17 20:05:56 65588]
    PowerPanel.lnk - C:\Program Files\powerpanel\Program\PcfMgr.exe [2003-08-20 14:34:36 872448]

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^LUMIX Simple Viewer.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\LUMIX Simple Viewer.lnk
    backup=C:\WINDOWS\pss\LUMIX Simple Viewer.lnkCommon Startup

    [HKLM\~\startupfolder\C:^Documents and Settings^allUsers^Start Menu^Programs^Startup^Adobe Gamma.lnk]
    path=C:\Documents and Settings\allUsers\Start Menu\Programs\Startup\Adobe Gamma.lnk
    backup=C:\WINDOWS\pss\Adobe Gamma.lnkStartup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
    --a------ 2005-10-18 11:58 278528 C:\Program Files\iTunes\iTunesHelper.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RemoteControl]
    --a------ 2004-11-02 19:24 32768 C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\YeppStudioAgent]
    C:\Program Files\Samsung\Samsung Media Studio\SamsungMediaStudioAgent.exe

    R1 Asapi;Asapi;C:\WINDOWS\System32\drivers\Asapi.sys [2002-04-17 19:27]
    R2 SMTPSVC;Simple Mail Transfer Protocol (SMTP);C:\WINDOWS\System32\inetsrv\inetinfo.exe [2002-08-29 12:00]
    R3 DNINDIS5;DNINDIS5 NDIS Protocol Driver;C:\PROGRA~1\Belkin\BELKIN~1.11G\DNINDIS5.SYS [2003-07-24 12:10]
    R3 SPI;Sony Programmable I/O Control Device;C:\WINDOWS\System32\DRIVERS\SonyPI.sys [2002-08-20 09:59]
    S2 MS Common Service;MS Common Service;C:\WINDOWS\System32\mscomserv.exe []
    S3 pelmouse;Mouse Suite Driver;C:\WINDOWS\System32\DRIVERS\pelmouse.sys [2002-06-28 17:21]
    S3 pelusblf;USB Mouse Low Filter Driver;C:\WINDOWS\System32\DRIVERS\pelusblf.sys [2001-07-24 09:34]

    .
    **************************************************************************

    catchme 0.3.1344 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-02-27 21:15:49
    Windows 5.1.2600 Service Pack 1 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    ------------------------ Other Running Processes ------------------------
    .
    C:\WINDOWS\System32\Ati2evxx.exe
    C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
    C:\Program Files\Network Associates\VirusScan\Mcshield.exe
    C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
    C:\PROGRA~1\NETWOR~1\COMMON~1\naPrdMgr.exe
    C:\Program Files\Apoint\Apntex.exe
    C:\Program Files\Sony\HotKey Utility\HKWnd.exe
    C:\WINDOWS\System32\imapi.exe
    .
    **************************************************************************
    .
    Completion time: 2008-02-27 21:21:03 - machine was rebooted
    ComboFix-quarantined-files.txt 2008-02-27 21:20:58

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •