Results 1 to 7 of 7

Thread: Smitfraud-c and zlob.dnschanger.rtk removal help required please. logs included.

  1. #1
    Junior Member
    Join Date
    Mar 2008
    Location
    Chicago
    Posts
    4

    Default Smitfraud-c and zlob.dnschanger.rtk removal help required please. logs included.

    The Kaspersky Anti-Virus Scan was too long for one post. Please advise if you still want it posted. Thank you in advance for any assistance that can be provided.


    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 6:49:40 PM, on 3/5/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16608)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
    C:\WINDOWS\system32\pctspk.exe
    C:\Program Files\Spyware Doctor\pctsAuxs.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\wdfmgr.exe
    C:\Program Files\BroadJump\Client Foundation\CFD.exe
    C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
    C:\Program Files\Yahoo!\browser\ybrwicon.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\PROGRA~1\Yahoo!\browser\ycommon.exe
    C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe
    C:\WINDOWS\System32\alg.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\system32\ctfmona.exe
    C:\WINDOWS\system32\runtime.exe
    C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
    C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Snapfish PictureMover\PictureMover.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe
    C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    C:\WINDOWS\system32\wbem\wmiprvse.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://att.yahoo.com
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://www.find.fm/?aid=6786&sid=99
    R3 - URLSearchHook: (no name) - {0579B4B6-0293-4d73-B02D-5EBB0BA0F0A2} - C:\Program Files\AskSBar\SrchAstt\1.bin\A2SRCHAS.DLL
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
    R3 - URLSearchHook: (no name) - {01E69986-A054-4C52-ABE8-EF63DF1C5211} - (no file)
    O1 - Hosts: 124.217.252.77 www.bravesentry.com
    O1 - Hosts: 124.217.252.77 bravesentry.com
    O1 - Hosts: 124.217.252.78 secure.isoftpay.com
    O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
    O2 - BHO: Ask Search Assistant BHO - {0579B4B1-0293-4d73-B02D-5EBB0BA0F0A2} - C:\Program Files\AskSBar\SrchAstt\1.bin\A2SRCHAS.DLL
    O2 - BHO: (no name) - {2143D7E2-880A-4D5A-8C59-B7CE226983AE} - C:\WINDOWS\system32\avica.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\PROGRA~1\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: XBTB04482 - {A11B4B6D-2E31-41c5-AB15-24E09C3B3D17} - C:\PROGRA~1\FINDFM~1\toolbar.dll (file missing)
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
    O2 - BHO: Ask Toolbar BHO - {F0D4B231-DA4B-4daf-81E4-DFEE4931A4AA} - C:\Program Files\AskSBar\bar\1.bin\ASKSBAR.DLL
    O2 - BHO: SidebarAutoLaunch Class - {F2AA9440-6328-4933-B7C9-A6CCDF9CBF6D} - C:\Program Files\Yahoo!\browser\YSidebarIEBHO.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
    O3 - Toolbar: Ask Toolbar - {F0D4B239-DA4B-4daf-81E4-DFEE4931A4AA} - C:\Program Files\AskSBar\bar\1.bin\ASKSBAR.DLL
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
    O3 - Toolbar: (no name) - {01E69986-A054-4C52-ABE8-EF63DF1C5211} - (no file)
    O4 - HKLM\..\Run: [NeroFilterCheck] "C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe"
    O4 - HKLM\..\Run: [BJCFD] "C:\Program Files\BroadJump\Client Foundation\CFD.exe"
    O4 - HKLM\..\Run: [HP Software Update] "C:\Program Files\HP\HP Software Update\HPWuSchd2.exe"
    O4 - HKLM\..\Run: [YBrowser] "C:\Program Files\Yahoo!\browser\ybrwicon.exe"
    O4 - HKLM\..\Run: [IPInSightMonitor 01] "C:\Program Files\SBC Yahoo!\Connection Manager\IP InSight\IPMon32.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe"
    O4 - HKLM\..\Run: [ctfmona] C:\WINDOWS\system32\ctfmona.exe
    O4 - HKLM\..\Run: [System] C:\WINDOWS\system32\wind32.exe
    O4 - HKLM\..\Run: [SpySweeper] C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exe /startintray
    O4 - HKLM\..\Run: [SystemSv121] C:\WINDOWS\system32\n2ewma1xxsv2234.exe
    O4 - HKLM\..\Run: [taskmon] C:\WINDOWS\taskmon.exe
    O4 - HKLM\..\Run: [runtime.exe] C:\WINDOWS\system32\runtime.exe
    O4 - HKLM\..\RunOnce: [tmp386515] cmd /Q /C "C:\WINDOWS\tmp386215.bat"
    O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
    O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    O4 - HKCU\..\Run: [ctfmona] C:\WINDOWS\system32\ctfmona.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet
    O4 - HKCU\..\Run: [MSI Configuration] msiconf.exe
    O4 - HKCU\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKCU\..\Run: [runtime.exe] C:\WINDOWS\system32\runtime.exe
    O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
    O4 - Global Startup: Snapfish PictureMover.lnk = C:\Program Files\Snapfish PictureMover\PictureMover.exe
    O8 - Extra context menu item: E&xport to Microsoft Office Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: AT&T Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\PROGRA~1\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper20073151.dll
    O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://www2.snapfish.com/SnapfishActivia.cab
    O16 - DPF: {CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7} (get_atlcom Class) - http://www.adobe.com/products/acrobat/nos/gp.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{A6889B28-0BEC-4A45-82BF-A54AF37C57A8}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
    O21 - SSODL: NdedxIGNe - {E87F0A22-42D5-A088-5836-93E4BDD587E3} - (no file)
    O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: PCTEL Speaker Phone (Pctspk) - PCtel, Inc. - C:\WINDOWS\system32\pctspk.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
    O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
    O23 - Service: YPCService - Yahoo! Inc. - C:\WINDOWS\system32\YPCSER~1.EXE

    --
    End of file - 9688 bytes

  2. #2
    Emeritus
    Join Date
    Nov 2005
    Location
    @localhost
    Posts
    6,066

    Default

    hi,
    before using hjt: disable any real time protection you may have running like tea timer, or avg guard.
    there is a list of some here:

    http://www.landzdown.com/index.php/topic,422.0.html
    -----------------------------------------------

    i dont see a resident antivirus app in your log? do you have one?
    start HJT, click the "Scan" button. check the items below, close any open windows, then click "Fixed checked"


    O1 - Hosts: 124.217.252.77 www.bravesentry.com
    O1 - Hosts: 124.217.252.77 bravesentry.com
    O1 - Hosts: 124.217.252.78 secure.isoftpay.com

    O2 - BHO: (no name) - {2143D7E2-880A-4D5A-8C59-B7CE226983AE} - C:\WINDOWS\system32\avica.dll

    O4 - HKLM\..\Run: [ctfmona] C:\WINDOWS\system32\ctfmona.exe

    O4 - HKLM\..\Run: [System] C:\WINDOWS\system32\wind32.exe

    O4 - HKLM\..\Run: [SystemSv121] C:\WINDOWS\system32\n2ewma1xxsv2234.exe

    O4 - HKLM\..\Run: [taskmon] C:\WINDOWS\taskmon.exe

    O4 - HKLM\..\Run: [runtime.exe] C:\WINDOWS\system32\runtime.exe

    O4 - HKLM\..\RunOnce: [tmp386515] cmd /Q /C "C:\WINDOWS\tmp386215.bat"

    O4 - HKCU\..\Run: [ctfmona] C:\WINDOWS\system32\ctfmona.exe

    O4 - HKCU\..\Run: [MSI Configuration] msiconf.exe

    O4 - HKCU\..\Run: [runtime.exe] C:\WINDOWS\system32\runtime.exe

    first stop is here for a online scan:
    ESET online scanner:



    http://www.eset.com/onlinescan/



    uses Internet Explorer only

    check "YES" to accept terms

    click start button

    allow the ActiveX component to install

    click the start button. the Scanner will update.

    check both "Remove found threats" and "Scan unwanted applications"

    click scan

    when done you can find the scan log at:C:\Program Files\EsetOnlineScanner\log.txt

    please copy/paste that log in next reply.

    after the above post the online scan report and a new hjtlog please.
    How Can I Reduce My Risk?

  3. #3
    Junior Member
    Join Date
    Mar 2008
    Location
    Chicago
    Posts
    4

    Default

    Hi Shelf Life,

    Thank you for your response.

    I disabled all real time protection and ran HJT to fix the specific items per your instructions. I then proceeded with the online scan, which revealed multiple infections upon completion of scan. Some items indicated they would be removed after reboot. I chose to reboot, and now am unable to boot to Windows either in normal or safe mode. I am presented with advanced boot options. Have tried "normal", "safe mode", and "last known configuration", to no avail.

    During online scan, I received the following Windows error: "Files that are required for Windows to run properly have been replaced by unrecognized versions. To maintain system stability, Windows must restore the original versions of these files. Insert your Windows XP Professional Service Pack 2 CD now."

    I don't have a CD available, as I believe OS is an OEM version. And now have no access to scan results.

    You are correct, no AV app installed. My friend thought he had AV app from ATT/Yahoo, however, I don't see it installed. Prior to my posting the initial HJT log, I attempted to install AVG Free, but there was a REG entry that prevented the install - HKLM/Software/Microsoft/Windows/Run: AVG; access denied (5).

    Upon initial discovery of infection, there has been no DT image. DT simply displays message "Warning spyware detected on your computer. Install anti-virus or spyware remover to clean your computer".

    Any suggestion for getting Windows to load?

  4. #4
    Emeritus
    Join Date
    Nov 2005
    Location
    @localhost
    Posts
    6,066

    Default

    Hi,

    thanks for the info. dosnt sound good. if you dont have the original windows install cd how about a recovery disk or a recovery partition on your hard drive? let me tell you that i build my own and have never used a "recovery cd" or recovery partition" to reinstall windows. Can you boot into safe mode?
    How Can I Reduce My Risk?

  5. #5
    Junior Member
    Join Date
    Mar 2008
    Location
    Chicago
    Posts
    4

    Lightbulb

    Hi Shelf Life,

    Thanks again for your response.

    I am unable to boot in safe mode. I am also not familiar with any of the other advanced boot options. No recovery disk and I don't believe there is a recovery partition.

    I tried to boot using a NAV SystemWorks (2002), in an attempt to use it as an emergency disk or rescue disk. It scanned for a virus but didn't find any. I assume it is because the definitions on the CD are old.

    If you don't have any additional suggestions for me, would you know how I would go about booting the PC using one of the other advanced options (I don't know DOS), or how I could get the latest definitions file for NAV to repair the damage, using the above method?

    I appreciate any assistance you can provide. However, I'm thinking that my friend's PC is trash now.

  6. #6
    Junior Member
    Join Date
    Mar 2008
    Location
    Chicago
    Posts
    4

    Question

    I'm posting the original KAV scan results in the hopes that you can tell me what System or Boot files were affected by malware and could be the reason I am unable to boot to Windows after running the Eset on-line scan.


    Tuesday, March 04, 2008 9:42:27 PM
    Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
    Kaspersky Online Scanner version: 5.0.98.0
    Kaspersky Anti-Virus database last update: 5/03/2008
    Kaspersky Anti-Virus database records: 597488
    Scan Settings
    Scan using the following antivirus database extended
    Scan Archives true
    Scan Mail Bases true
    Scan Target My Computer
    A:\
    C:\
    D:\
    E:\
    Scan Statistics
    Total number of scanned objects 39674
    Number of viruses found 8
    Number of infected objects 44
    Number of suspicious objects 0
    Duration of the scan process 01:30:15

    Infected Object Name Virus Name Last Action
    C:\Documents and Settings\All Users\Application Data\Lavasoft\Ad-Aware 2007\logs\AWProcessesLog.log Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Lavasoft\Ad-Aware 2007\logs\CoreEngineCommunicationLog.log Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC1.zip/dllgh8jkd1q1.exe Infected: Packed.Win32.Tibs.ie skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC1.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC2.zip/dllgh8jkd1q2.exe Infected: Packed.Win32.Tibs.ie skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC2.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC3.zip/dllgh8jkd1q6.exe Infected: Packed.Win32.Tibs.ie skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC3.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC4.zip/dllgh8jkd1q7.exe Infected: Packed.Win32.Tibs.ie skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC4.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC6.zip/n2ewma1xxsv234.exe Infected: Packed.Win32.Tibs.ie skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC6.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC7.zip/vedxga5me3.exe Infected: Trojan-Downloader.Win32.Small.ijp skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC7.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudCgeneric.zip/xpupdate.exe Infected: Packed.Win32.Tibs.ie skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudCgeneric.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl11.zip/runtime.exe Infected: Email-Worm.Win32.Zhelatin.vc skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl11.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl14.zip/runtime.exe Infected: Email-Worm.Win32.Zhelatin.vc skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl14.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl18.zip/runtime.exe Infected: Email-Worm.Win32.Zhelatin.vc skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl18.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl2.zip/runtime.exe Infected: Email-Worm.Win32.Zhelatin.vc skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl2.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl22.zip/runtime.exe Infected: Email-Worm.Win32.Zhelatin.vc skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl22.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl26.zip/runtime.exe Infected: Email-Worm.Win32.Zhelatin.vc skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl26.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl30.zip/runtime.exe Infected: Email-Worm.Win32.Zhelatin.vc skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl30.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl35.zip/runtime.exe Infected: Email-Worm.Win32.Zhelatin.vc skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl35.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl7.zip/runtime.exe Infected: Email-Worm.Win32.Zhelatin.vc skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl7.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
    C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
    C:\Documents and Settings\Michael\Application Data\Snapfish\Client\Data\DataCenter.ldb Object is locked skipped
    C:\Documents and Settings\Michael\Application Data\Snapfish\Client\Data\DataCenter.madb Object is locked skipped
    C:\Documents and Settings\Michael\Application Data\Snapfish\Client\Log\agent.log Object is locked skipped
    C:\Documents and Settings\Michael\Cookies\index.dat Object is locked skipped
    C:\Documents and Settings\Michael\Local Settings\Application Data\Microsoft\Feeds Cache\index.dat Object is locked skipped
    C:\Documents and Settings\Michael\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\Michael\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\Michael\Local Settings\History\History.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\Michael\Local Settings\History\History.IE5\MSHist012008030420080305\index.dat Object is locked skipped
    C:\Documents and Settings\Michael\Local Settings\Temp\79268f8hp68f8a.exe Infected: Trojan-Downloader.Win32.Agent.hzc skipped
    C:\Documents and Settings\Michael\Local Settings\Temp\hpodvd09.log Object is locked skipped
    C:\Documents and Settings\Michael\Local Settings\Temp\JET6E43.tmp Object is locked skipped
    C:\Documents and Settings\Michael\Local Settings\Temp\JET70CD.tmp Object is locked skipped
    C:\Documents and Settings\Michael\Local Settings\Temp\logger.log Object is locked skipped
    C:\Documents and Settings\Michael\Local Settings\Temp\Perflib_Perfdata_cc.dat Object is locked skipped
    C:\Documents and Settings\Michael\Local Settings\Temp\~DF3851.tmp Object is locked skipped
    C:\Documents and Settings\Michael\Local Settings\Temp\~DF45CC.tmp Object is locked skipped
    C:\Documents and Settings\Michael\Local Settings\Temporary Internet Files\AntiPhishing\B3BB5BBA-E7D5-40AB-A041-A5B1C0B26C8F.dat Object is locked skipped
    C:\Documents and Settings\Michael\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\Michael\NTUSER.DAT Object is locked skipped
    C:\Documents and Settings\Michael\NTUSER.DAT.LOG Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
    C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
    C:\Program Files\Snapfish PictureMover\Sample\DataCenter.ldb Object is locked skipped
    C:\Program Files\Snapfish PictureMover\Sample\DataCenter.madb Object is locked skipped
    C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
    C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
    C:\WINDOWS\explorer.exe Infected: Trojan.Win32.Patched.aa skipped
    C:\WINDOWS\SchedLgU.Txt Object is locked skipped
    C:\WINDOWS\SoftwareDistribution\EventCache\{A1355834-FF2D-45FD-8D1B-1340323149E7}.bin Object is locked skipped
    C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
    C:\WINDOWS\Sti_Trace.log Object is locked skipped
    C:\WINDOWS\system32\CatRoot2\edb.log Object is locked skipped
    C:\WINDOWS\system32\CatRoot2\tmp.edb Object is locked skipped
    C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
    C:\WINDOWS\system32\config\default Object is locked skipped
    C:\WINDOWS\system32\config\default.LOG Object is locked skipped
    C:\WINDOWS\system32\config\Internet.evt Object is locked skipped
    C:\WINDOWS\system32\config\SAM Object is locked skipped
    C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
    C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
    C:\WINDOWS\system32\config\SECURITY Object is locked skipped
    C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
    C:\WINDOWS\system32\config\software Object is locked skipped
    C:\WINDOWS\system32\config\software.LOG Object is locked skipped
    C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
    C:\WINDOWS\system32\config\system Object is locked skipped
    C:\WINDOWS\system32\config\system.LOG Object is locked skipped
    C:\WINDOWS\system32\ctfmona.exe Infected: Trojan-Downloader.Win32.Agent.ioz skipped
    C:\WINDOWS\system32\drivers\etc\hosts.20080301-212713.backup Infected: Trojan.Win32.Qhost.agu skipped
    C:\WINDOWS\system32\h323log.txt Object is locked skipped
    C:\WINDOWS\system32\lsass.exe Infected: Trojan.Win32.Patched.aa skipped
    C:\WINDOWS\system32\runtime.exe Infected: Email-Worm.Win32.Zhelatin.vc skipped
    C:\WINDOWS\system32\services.exe Infected: Trojan.Win32.Patched.aa skipped
    C:\WINDOWS\system32\spoolsv.exe Infected: Trojan.Win32.Patched.aa skipped
    C:\WINDOWS\system32\svchost.exe Infected: Trojan.Win32.Patched.aa skipped
    C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped
    C:\WINDOWS\system32\winlogon.exe Infected: Trojan.Win32.Patched.aa skipped
    C:\WINDOWS\system32\wscmp.dll Infected: not-a-virus:AdWare.Win32.BHO.cc skipped
    C:\WINDOWS\system32\wscmp.dll.tmp Infected: not-a-virus:AdWare.Win32.BHO.cc skipped
    C:\WINDOWS\wiadebug.log Object is locked skipped
    C:\WINDOWS\wiaservc.log Object is locked skipped
    C:\WINDOWS\WindowsUpdate.log Object is locked skipped
    Scan process completed.

  7. #7
    Emeritus
    Join Date
    Nov 2005
    Location
    @localhost
    Posts
    6,066

    Default

    hi balmoral

    tell me what System or Boot files were affected by malware
    i couldnt say. all those in the scan appear to be in spybots recovery folder.
    its possible that malware may be to blame, maybe not. could be a hardware problem also. i have never used windows advanced boot options.
    i think at some point you would need a install cd or recovery cd. especially if this message from system file protection is true:

    "Files that are required for Windows to run properly have been replaced by unrecognized versions."
    the files would have to come off the original install media.
    How Can I Reduce My Risk?

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •