Page 1 of 2 12 LastLast
Results 1 to 10 of 15

Thread: Help - Infected with Virtumonde, Smitfraud, etc

  1. #1
    Junior Member
    Join Date
    Jul 2008
    Posts
    9

    Unhappy Help - Infected with Virtumonde, Smitfraud, etc

    I need your help! My computer is infected with these viruses (Virtumonde, Smitfraud) those are just the ones I know about and I have no idea what to do. I've tried to download McAfee security center but my computer won't allow it. Your help will be greatly appreciated.

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 2:00:31 AM, on 7/23/2008
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\System32\lxdccoms.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Binn\sqlservr.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\ctfmon.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\drivers\spools.exe
    C:\WINDOWS\System32\ctfmon.exe
    C:\WINDOWS\System32\taskmgr.exe
    C:\WINDOWS\System32\rundll32.exe
    C:\WINDOWS\system32\drivers\spools.exe
    C:\WINDOWS\System32\rundll32.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\System32\dwwin.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    C:\WINDOWS\System32\wbem\wmiprvse.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/cust...search/ie.html
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://red.clientapps.yahoo.com/cust.../www.yahoo.com
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://red.clientapps.yahoo.com/cust.../www.yahoo.com
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/cust...search/ie.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://red.clientapps.yahoo.com/cust.../www.yahoo.com
    O2 - BHO: AVG Safe Search - {1C1B8A44-61FE-411E-8F33-813A4E2E2984} - C:\WINDOWS\System32\AVIRAS~1.DLL
    O2 - BHO: (no name) - {2BF98F47-2AFF-43D3-8D9E-EC84BCDC3F5B} - (no file)
    O2 - BHO: (no name) - {2F8BF994-F0EA-4A73-B6BA-EF93DBE16B63} - C:\WINDOWS\System32\nnnkIbbY.dll (file missing)
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: (no name) - {5A3AFBB4-3119-49FE-9DA8-407FE5F7211C} - C:\WINDOWS\System32\wvUnNecY.dll (file missing)
    O2 - BHO: (no name) - {680DBEE8-B862-4B3B-9A3B-3F6DD618BA25} - C:\WINDOWS\System32\mlJBSlLc.dll (file missing)
    O2 - BHO: {598346fe-7fe5-e33b-0974-23b0c83932a6} - {6a23938c-0b32-4790-b33e-5ef7ef643895} - C:\WINDOWS\System32\adnpuc.dll
    O2 - BHO: scriptproxy - {6D0386B3-FD72-488E-9740-90355AE21735} - C:\WINDOWS\System32\diga32.dll
    O2 - BHO: (no name) - {6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C} - C:\WINDOWS\system32\iifcDWol.dll
    O2 - BHO: (no name) - {74C466E9-2FC5-43D7-8560-FE4362A2A30E} - C:\WINDOWS\System32\rqRIyWqP.dll (file missing)
    O2 - BHO: (no name) - {9E2C792A-1249-49BC-B1E3-27E1C7061905} - C:\WINDOWS\System32\iiffGWMe.dll (file missing)
    O2 - BHO: (no name) - {A7DAFB2E-E95B-4F23-B681-90C8040E5A96} - C:\WINDOWS\System32\qoMdBSmN.dll (file missing)
    O2 - BHO: (no name) - {E135EFEB-9E21-4EF4-8E24-2EDD98F6C87F} - C:\WINDOWS\System32\opnnnmkk.dll (file missing)
    O3 - Toolbar: Lexmark Toolbar - {1017A80C-6F09-4548-A84D-EDD6AC9525F0} - C:\Program Files\Lexmark Toolbar\toolband.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O4 - HKLM\..\Run: [ntuser] C:\WINDOWS\system32\drivers\spools.exe
    O4 - HKLM\..\Run: [C:\WINDOWS\system32\kdolk.exe] C:\WINDOWS\system32\kdolk.exe
    O4 - HKLM\..\Run: [C:\WINDOWS\System32\kddgq.exe] C:\WINDOWS\System32\kddgq.exe
    O4 - HKLM\..\Run: [6c129041] rundll32.exe "C:\WINDOWS\System32\xrhdovjk.dll",b
    O4 - HKLM\..\Run: [BM6f21a3dd] Rundll32.exe "C:\WINDOWS\System32\kyjheqcs.dll",s
    O4 - HKLM\..\Run: [autoload] C:\Documents and Settings\Admin.ANGIES\cftmon.exe
    O4 - HKLM\..\RunOnce: [Spybot - Search & Destroy] "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe" /autocheck
    O4 - HKLM\..\RunOnce: [SpybotDeletingA2607] command /c del "C:\WINDOWS\system32\mlJBSlLc.dll_old"
    O4 - HKLM\..\RunOnce: [SpybotDeletingC2887] cmd /c del "C:\WINDOWS\system32\iifcDWol.dll"
    O4 - HKLM\..\RunOnce: [SpybotDeletingA542] command /c del "C:\WINDOWS\system32\iifcDWol.dll"
    O4 - HKLM\..\RunOnce: [SpybotDeletingA5051] command /c del "C:\WINDOWS\system32\kyjheqcs.dll_old"
    O4 - HKLM\..\RunOnce: [SpybotDeletingC7712] cmd /c del "C:\WINDOWS\system32\kyjheqcs.dll_old"
    O4 - HKLM\..\RunOnce: [SpybotSnD] "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe" /autocheck
    O4 - HKCU\..\Run: [ntuser] C:\WINDOWS\system32\drivers\spools.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
    O4 - HKCU\..\Run: [autoload] C:\Documents and Settings\Admin.ANGIES\cftmon.exe
    O4 - HKCU\..\RunOnce: [SpybotDeletingB9380] command /c del "C:\WINDOWS\system32\mlJBSlLc.dll_old"
    O4 - HKCU\..\RunOnce: [SpybotDeletingD4642] cmd /c del "C:\WINDOWS\system32\mlJBSlLc.dll_old"
    O4 - HKCU\..\RunOnce: [SpybotDeletingB6749] command /c del "C:\WINDOWS\system32\iifcDWol.dll"
    O4 - HKCU\..\RunOnce: [SpybotDeletingD3800] cmd /c del "C:\WINDOWS\system32\iifcDWol.dll"
    O4 - HKCU\..\RunOnce: [SpybotDeletingB1935] command /c del "C:\WINDOWS\system32\kyjheqcs.dll_old"
    O4 - HKCU\..\RunOnce: [SpybotDeletingD3328] cmd /c del "C:\WINDOWS\system32\kyjheqcs.dll_old"
    O4 - HKUS\S-1-5-21-790525478-920026266-1708537768-1003\..\Run: [ntuser] C:\WINDOWS\system32\drivers\spools.exe (User 'angela storey')
    O4 - HKUS\S-1-5-21-790525478-920026266-1708537768-1003\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe (User 'angela storey')
    O4 - HKUS\S-1-5-21-790525478-920026266-1708537768-1003\..\Run: [autoload] C:\Documents and Settings\angela storey\cftmon.exe (User 'angela storey')
    O4 - HKUS\S-1-5-18\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'Default user')
    O4 - S-1-5-21-790525478-920026266-1708537768-1003 Startup: LimeWire On Startup.lnk = C:\Program Files\LimeWire\LimeWire.exe (User 'angela storey')
    O4 - S-1-5-21-790525478-920026266-1708537768-1003 User Startup: LimeWire On Startup.lnk = C:\Program Files\LimeWire\LimeWire.exe (User 'angela storey')
    O4 - Global Startup: PowerReg Scheduler.exe
    O4 - Global Startup: SBC Self Support Tool.lnk = C:\Program Files\SBC Self Support Tool\bin\matcli.exe
    O9 - Extra button: AT&T Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\PROGRA~1\YAHOO!\COMMON\yiesrvc.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm (file missing)
    O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm (file missing)
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O15 - Trusted Zone: http://*.mcafee.com
    O17 - HKLM\System\CCS\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CCS\Services\Tcpip\..\{3ECE3F59-2495-49E1-9F9C-DD73ACCF6C6E}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 208.67.220.220 208.67.222.222
    O17 - HKLM\System\CS1\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CS2\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 208.67.220.220 208.67.222.222
    O20 - Winlogon Notify: iifcDWol - C:\WINDOWS\SYSTEM32\iifcDWol.dll
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: lxdcCATSCustConnectService - Lexmark International, Inc. - C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxdcserv.exe
    O23 - Service: lxdc_device - - C:\WINDOWS\System32\lxdccoms.exe
    O23 - Service: Task Scheduler (Schedule) - Unknown owner - C:\WINDOWS\system32\drivers\spools.exe

    --
    End of file - 9537 bytes

    Thank you...for your reply. What do I do next?

    ----------------------------------
    Edit.
    Thank you...for your reply. What do I do next?
    Don't bump, read stickies?

    New topic closed yesterday: http://forums.spybot.info/showthread.php?t=31575

    Post here if still waiting for help in the Malware Forum, (AFTER) FOUR days
    Last edited by tashi; 2008-07-26 at 23:29. Reason: Mod: merged two posts, added links

  2. #2
    Security Expert: Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,288

    Default

    Hi

    Your system is heavily infected


    Disable Spybot's TeaTimer
    • Run Spybot-S&D in Advanced Mode
    • If it is not already set to do this, go to the Mode menu
      select
      Advanced Mode
    • On the left hand side, click on Tools
    • Then click on the Resident icon in the list
    • Uncheck
      Resident TeaTimer
      and OK any prompts.
    • Restart your computer



    You may want to print out these instructions for reference, since you
    will have to restart your computer during the fix.

    Please download FixWareout from one of these sites:
    http://downloads.subratam.org/Fixwareout.exe
    http://www.bleepingcomputer.com/file...Fixwareout.exe


    Save it to your desktop and run it. Click Next, then Install, then make
    sure Run fixit is checked and click Finish. The fix will
    begin; follow the prompts. You will be asked to reboot your computer;
    please do so. Your system may take longer than usual to load; this is
    normal.

    At the end of the fix, you may need to restart your computer again.

    Finally, please post the contents of the logfile C:\fixwareout\report.txt


    Then we'll continue.


    A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine by running ComboFix. This tool is not a toy and not for everyday use.

    1. Download combofix from any of these links and save it to Desktop:
    Link 1
    Link 2
    Link 3

    **Note: It is important that it is saved directly to your desktop**

    2. Double click combofix.exe & follow the prompts.
    3. When finished, it shall produce a log for you (C:\ComboFix.txt). Post that log & a fresh hjt log in your next reply

    Note:
    Do not mouseclick combofix's window whilst it's running. That may cause it to stall

    Combofix should never take more that 20 minutes including the reboot if malware is detected.
    If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
    If that happened we want to know, and also what process you had to end.

    If you have problems with Combofix usage, see here
    Microsoft Windows Insider MVP 2016-2020
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

  3. #3
    Junior Member
    Join Date
    Jul 2008
    Posts
    9

    Default Hello

    I really appreciate your help, thank you. I hope that I did everything correctly up to this point. Here are the reports that you instructed me to send.


    ComboFix 08-07-28.4 - Admin 2008-07-27 7:14:49.1 - FAT32x86
    Microsoft Windows XP Professional 5.1.2600.1.1252.1.1033.18.177 [GMT -7:00]
    Running from: C:\Documents and Settings\Admin.ANGIES\Desktop\ComboFix.exe
    * Created a new restore point

    WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\Documents and Settings\Admin.ANGIES\Application Data\macromedia\Flash Player\#SharedObjects\84688G7A\interclick.com
    C:\Documents and Settings\Admin.ANGIES\Application Data\macromedia\Flash Player\#SharedObjects\84688G7A\interclick.com\ud.sol
    C:\Documents and Settings\Admin.ANGIES\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com
    C:\Documents and Settings\Admin.ANGIES\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com\settings.sol
    C:\Program Files\Antispyware 2008
    C:\Program Files\Antispyware 2008\Antispyware-2008.exe
    C:\Program Files\Antispyware 2008\vscan.tsi
    C:\Program Files\Antispyware 2008\zlib.dll
    C:\WINDOWS\BM6f21a3dd.txt
    C:\WINDOWS\Downloaded Program Files\setup.inf
    C:\WINDOWS\pskt.ini
    C:\WINDOWS\system32\adnpuc.dll
    C:\WINDOWS\system32\awtttrsR.dll
    C:\WINDOWS\system32\byXOeEUm.dll
    C:\WINDOWS\system32\cLlSBJlm.ini
    C:\WINDOWS\system32\cLlSBJlm.ini2
    C:\WINDOWS\system32\ddcYsTnN.dll
    C:\WINDOWS\system32\drivers\msliksurserv.sys
    C:\WINDOWS\system32\drivers\spools.exe
    C:\WINDOWS\system32\eezfnc.dll
    C:\WINDOWS\system32\EhhiSvut.ini
    C:\WINDOWS\system32\EhhiSvut.ini2
    C:\WINDOWS\system32\eMWGffii.ini
    C:\WINDOWS\system32\eMWGffii.ini2
    C:\WINDOWS\system32\fleolcgk.ini
    C:\WINDOWS\system32\ieupdates.exe.tmp
    C:\WINDOWS\system32\iifcDWol.dll
    C:\WINDOWS\system32\IklRCJlm.ini
    C:\WINDOWS\system32\IklRCJlm.ini2
    C:\WINDOWS\system32\juuswa.dll
    C:\WINDOWS\system32\kjvodhrx.ini
    C:\WINDOWS\system32\kkmnnnpo.ini
    C:\WINDOWS\system32\kkmnnnpo.ini2
    C:\WINDOWS\system32\klnhwybw.dll
    C:\WINDOWS\system32\kmhtqxcp.dll
    C:\WINDOWS\system32\latahiab.dll
    C:\WINDOWS\system32\lhgmvbhp.dll
    C:\WINDOWS\system32\mavmxofn.ini
    C:\WINDOWS\system32\mcrh.tmp
    C:\WINDOWS\system32\mlJCRlkI.dll
    C:\WINDOWS\system32\mqovwy.dll
    C:\WINDOWS\system32\msliksurcredo.dll
    C:\WINDOWS\system32\msliksurdns.dll
    C:\WINDOWS\system32\nfoxmvam.dll
    C:\WINDOWS\system32\NmSBdMoq.ini
    C:\WINDOWS\system32\NmSBdMoq.ini2
    C:\WINDOWS\system32\omjblhfr.dll
    C:\WINDOWS\system32\osspyiti.dll
    C:\WINDOWS\system32\pfpgvhgu.ini
    C:\WINDOWS\system32\phbvmghl.ini
    C:\WINDOWS\system32\PqWyIRqr.ini
    C:\WINDOWS\system32\PqWyIRqr.ini2
    C:\WINDOWS\system32\qoMcaxUm.dll
    C:\WINDOWS\system32\rlalmi.dll
    C:\WINDOWS\system32\xrhdovjk.dll
    C:\WINDOWS\system32\YbbIknnn.ini
    C:\WINDOWS\system32\YbbIknnn.ini2
    C:\WINDOWS\system32\YceNnUvw.ini
    C:\WINDOWS\system32\YceNnUvw.ini2
    C:\WINDOWS\system32\ykuxpwub.dll

    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    -------\Service_msliksurserv


    ((((((((((((((((((((((((( Files Created from 2008-06-28 to 2008-07-28 )))))))))))))))))))))))))))))))
    .

    2008-07-27 06:51 . 2008-07-27 06:51 <DIR> d-------- C:\fixwareout
    2008-07-27 06:45 . 2008-07-07 07:26 7,680 --a------ C:\Documents and Settings\Admin.ANGIES\cftmon.exe
    2008-07-27 06:44 . 2008-07-07 07:26 7,680 --a------ C:\Documents and Settings\LocalService\cftmon.exe
    2008-07-27 06:44 . 2008-07-27 06:44 526 --a------ C:\Antispyware-2008.lnk
    2008-07-23 12:39 . 2008-07-23 12:39 18,944 --a------ C:\WINDOWS\system32\sofie.dll
    2008-07-23 02:00 . 2008-07-23 02:00 <DIR> d-------- C:\Program Files\Trend Micro
    2008-07-23 00:23 . 2008-07-23 00:23 <DIR> d-------- C:\Documents and Settings\Admin.ANGIES\Application Data\McAfee
    2008-07-22 23:04 . 2008-07-22 23:04 <DIR> d-------- C:\Documents and Settings\Admin.ANGIES\Application Data\ArcSoft
    2008-07-22 22:20 . 2008-07-22 22:20 <DIR> d-------- C:\Program Files\JL2005A
    2008-07-22 22:18 . 2008-07-22 22:18 361 --a------ C:\WINDOWS\videomvp.ini
    2008-07-22 22:17 . 2008-07-22 22:17 <DIR> d-------- C:\Program Files\ArcSoft
    2008-07-22 22:17 . 1998-07-21 20:29 21 --a------ C:\WINDOWS\CS_SETUP.ini
    2008-07-14 06:19 . 2008-07-14 06:19 26,624 --a------ C:\WINDOWS\system32\avirasafe.dll
    2008-07-11 08:46 . 2008-07-27 06:41 2,488 --a------ C:\WINDOWS\wininit.ini
    2008-07-11 06:59 . 2008-07-11 06:59 <DIR> d-------- C:\Program Files\Spybot - Search & Destroy
    2008-07-11 06:59 . 2008-07-11 06:59 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
    2008-07-11 06:57 . 2008-07-11 06:57 <DIR> d-------- C:\Documents and Settings\Admin.ANGIES
    2008-07-11 06:49 . 2008-07-11 06:49 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
    2008-07-10 07:57 . 2008-07-10 07:57 <DIR> d-------- C:\Program Files\CCleaner
    2008-07-10 07:40 . 2008-07-10 07:40 <DIR> d-------- C:\Program Files\Common Files\Motive
    2008-07-10 07:40 . 2008-07-10 07:40 <DIR> d-------- C:\Program Files\Common Files\Java
    2008-07-10 06:50 . 2008-07-10 06:50 <DIR> d---s---- C:\Documents and Settings\Admin
    2008-07-10 06:41 . 2008-07-10 06:41 <DIR> d-------- C:\WINDOWS\system32\NtmsData
    2008-07-09 03:07 . 2008-07-27 07:12 111,492 --a------ C:\WINDOWS\BM6f21a3dd.xml
    2008-07-08 02:54 . 2008-07-08 02:54 <DIR> d--hs---- C:\FOUND.006
    2008-07-07 07:31 . 2008-07-07 07:31 26,624 --a------ C:\WINDOWS\system32\avg_sr.dll
    2008-07-07 07:30 . 2008-07-07 07:30 25,088 --a------ C:\WINDOWS\system32\diga32.dll
    2008-07-04 03:36 . 2008-07-04 03:36 8,192 --a------ C:\30gp67.exe

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2008-04-09 08:32 744 ----a-w C:\Documents and Settings\angela storey\Application Data\filterclsid.dat
    2007-12-06 08:54 774,144 ----a-w C:\Program Files\RngInterstitial.dll
    2006-09-23 06:27 67,184 ----a-w C:\Documents and Settings\angela storey\Application Data\GDIPFONTCACHEV1.DAT
    2006-05-01 06:35 36,864 ----a-w C:\Program Files\Spelling words.doc
    2006-03-01 05:31 25,088 ----a-w C:\Program Files\Prophecy 06-09-05 Stockton.doc
    2001-09-10 16:00 139,264 ----a-w C:\WINDOWS\inf\i386\Rtscan.dll
    2001-09-10 15:10 61,440 ----a-w C:\WINDOWS\inf\i386\onetUSD.dll
    2001-08-18 01:43 32,768 ----a-w C:\WINDOWS\inf\i386\Wiamicro.dll
    2001-08-04 01:29 13,824 ----a-w C:\WINDOWS\inf\i386\usbscan.sys
    2001-06-29 15:10 163,840 ----a-w C:\WINDOWS\inf\i386\viceo.dll
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{A4D16645-4149-41FB-B670-E06072E540C1}]
    2008-07-23 12:39 18944 --a------ C:\WINDOWS\System32\sofie.dll

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ctfmon.exe"="C:\WINDOWS\System32\ctfmon.exe" [2002-08-29 12:00 13312]

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "MySpaceIM"="C:\Program Files\MySpace\IM\MySpaceIM.exe" [2007-12-06 23:33 8720384]

    C:\Documents and Settings\angela storey\Start Menu\Programs\Startup\
    LimeWire On Startup.lnk - C:\Program Files\LimeWire\LimeWire.exe [2007-12-03 13:35:53 147456]

    C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
    PowerReg Scheduler.exe [2006-02-18 15:46:34 256000]
    SBC Self Support Tool.lnk - C:\Program Files\SBC Self Support Tool\bin\matcli.exe [2007-10-28 16:25:02 217088]

    R1 ATMhelpr;ATMhelpr;C:\WINDOWS\System32\drivers\ATMhelpr.sys [1997-06-17 04:00]
    R2 lxdc_device;lxdc_device;C:\WINDOWS\System32\lxdccoms.exe [2007-05-25 02:38]
    R2 ppsio2;PPDevice;C:\WINDOWS\System32\drivers\ppsio2.sys [1999-06-30 02:49]
    S2 Ca533av;VCamNow Video Capture;C:\WINDOWS\System32\Drivers\Ca533av.sys [2002-10-21 11:37]
    S2 lxdcCATSCustConnectService;lxdcCATSCustConnectService;C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxdcserv.exe [2007-05-25 02:38]
    S2 UMAXPCLS;Print Port Scanner Driver;C:\WINDOWS\System32\DRIVERS\umaxpcls.sys [2001-08-17 13:58]
    S3 01e1F;01e1F;C:\WINDOWS\System32\01e1F.sys []
    S3 0c57;0c57;C:\WINDOWS\System32\0c57.sys []
    S3 1401E;1401E;C:\WINDOWS\System32\1401E.sys []
    S3 18818;18818;C:\WINDOWS\System32\18818.sys []
    S3 1d716;1d716;C:\WINDOWS\System32\1d716.sys []
    S3 2a34;2a34;C:\WINDOWS\System32\2a34.sys []
    S3 30f2;30f2;C:\WINDOWS\System32\30f2.sys []
    S3 34314;34314;C:\WINDOWS\System32\34314.sys []
    S3 41d1C;41d1C;C:\WINDOWS\System32\41d1C.sys []
    S3 46c1A;46c1A;C:\WINDOWS\System32\46c1A.sys []
    S3 5dbA;5dbA;C:\WINDOWS\System32\5dbA.sys []
    S3 60fE;60fE;C:\WINDOWS\System32\60fE.sys []
    S3 6ea3;6ea3;C:\WINDOWS\System32\6ea3.sys []
    S3 74917;74917;C:\WINDOWS\System32\74917.sys []
    S3 75813;75813;C:\WINDOWS\System32\75813.sys []
    S3 76b10;76b10;C:\WINDOWS\System32\76b10.sys []
    S3 7c9B;7c9B;C:\WINDOWS\System32\7c9B.sys []
    S3 8ae6;8ae6;C:\WINDOWS\System32\8ae6.sys []
    S3 a531B;a531B;C:\WINDOWS\System32\a531B.sys []
    S3 a8bC;a8bC;C:\WINDOWS\System32\a8bC.sys []
    S3 a9a12;a9a12;C:\WINDOWS\System32\a9a12.sys []
    S3 b81F;b81F;C:\WINDOWS\System32\b81F.sys []
    S3 c7e8;c7e8;C:\WINDOWS\System32\c7e8.sys []
    S3 f5b20;f5b20;C:\WINDOWS\System32\f5b20.sys []
    S3 USBCamera;VCamNow Digital Camera;C:\WINDOWS\System32\Drivers\Bulk533.sys [2002-11-22 09:25]

    *Newly Created Service* - ALG
    *Newly Created Service* - IPNAT
    .
    Contents of the 'Scheduled Tasks' folder

    2007-04-24 C:\WINDOWS\Tasks\Accessibility Wizard.job
    - C:\WINDOWS\system32\accwiz.exe [2002-08-29 05:00]

    2008-07-02 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job
    - C:\Program Files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 14:57]
    .
    - - - - ORPHANS REMOVED - - - -

    BHO-{2F8BF994-F0EA-4A73-B6BA-EF93DBE16B63} - C:\WINDOWS\System32\nnnkIbbY.dll
    BHO-{5A3AFBB4-3119-49FE-9DA8-407FE5F7211C} - C:\WINDOWS\System32\wvUnNecY.dll
    BHO-{680DBEE8-B862-4B3B-9A3B-3F6DD618BA25} - C:\WINDOWS\System32\mlJBSlLc.dll
    BHO-{74C466E9-2FC5-43D7-8560-FE4362A2A30E} - C:\WINDOWS\System32\rqRIyWqP.dll
    BHO-{9E2C792A-1249-49BC-B1E3-27E1C7061905} - C:\WINDOWS\System32\iiffGWMe.dll
    BHO-{A7DAFB2E-E95B-4F23-B681-90C8040E5A96} - C:\WINDOWS\System32\qoMdBSmN.dll
    BHO-{E135EFEB-9E21-4EF4-8E24-2EDD98F6C87F} - C:\WINDOWS\System32\opnnnmkk.dll
    HKLM-Run-C:\WINDOWS\system32\kdolk.exe - C:\WINDOWS\system32\kdolk.exe
    HKLM-Run-C:\WINDOWS\System32\kddgq.exe - C:\WINDOWS\System32\kddgq.exe
    HKLM-Run-BM6f21a3dd - C:\WINDOWS\System32\osspyiti.dll
    HKLM-Run-6c129041 - C:\WINDOWS\System32\lhgmvbhp.dll
    HKU-Default-Run-Antispyware-2008.exe - C:\Program Files\Antispyware 2008\Antispyware-2008.exe


    .
    ------- Supplementary Scan -------
    .
    R0 -: HKLM-Main,Search Bar = hxxp://red.clientapps.yahoo.com/customize/ie/defaults/sb/sbcydsl/*http://www.yahoo.com/search/ie.html
    O9 -: {c95fe080-8f5d-11d2-a20b-00aa003c157a} - %SystemRoot%\web\related.htm
    O17 -: HKLM\CCS\Interface\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
    O17 -: HKLM\CCS\Interface\{3ECE3F59-2495-49E1-9F9C-DD73ACCF6C6E}: NameServer = 208.67.220.220,208.67.222.222

    O16 -: DirectAnimation Java Classes - file://C:\WINDOWS\Java\classes\dajava.cab
    C:\WINDOWS\Downloaded Program Files\DirectAnimation Java Classes.osd

    O16 -: Microsoft XML Parser for Java - file://C:\WINDOWS\Java\classes\xmldso.cab
    C:\WINDOWS\Downloaded Program Files\Microsoft XML Parser for Java.osd


    **************************************************************************

    catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-07-28 07:36:38
    Windows 5.1.2600 Service Pack 1 FAT NTAPI

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    PROCESS: C:\WINDOWS\system32\lsass.exe
    -> C:\Program Files\Google\Google Desktop Search\GoogleDesktopNetwork1.dll

    PROCESS: C:\WINDOWS\explorer.exe
    -> C:\PROGRA~1\Google\GOOGLE~1\GOOGLE~2.DLL
    .
    ------------------------ Other Running Processes ------------------------
    .
    C:\WINDOWS\SYSTEM32\RUNDLL32.EXE
    C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\VS7DEBUG\MDM.EXE
    C:\PROGRAM FILES\MICROSOFT SQL SERVER\MSSQL$MICROSOFTBCM\BINN\SQLSERVR.EXE
    .
    **************************************************************************
    .
    Completion time: 2008-07-28 7:38:40 - machine was rebooted
    ComboFix-quarantined-files.txt 2008-07-28 14:38:36

    Pre-Run: 9,767,124,992 bytes free
    Post-Run: 9,699,983,360 bytes free

    225 --- E O F --- 2007-11-01 08:39:36



    Fresh HJT Report

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 7:41:48 AM, on 7/28/2008
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\System32\lxdccoms.exe
    C:\WINDOWS\system32\rundll32.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Binn\sqlservr.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\ctfmon.exe
    C:\WINDOWS\System32\wuauclt.exe
    C:\WINDOWS\System32\wuauclt.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\system32\notepad.exe
    C:\WINDOWS\system32\msiexec.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/cust...search/ie.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: BHO.toolbar3 - {A4D16645-4149-41FB-B670-E06072E540C1} - C:\WINDOWS\System32\sofie.dll
    O3 - Toolbar: Lexmark Toolbar - {1017A80C-6F09-4548-A84D-EDD6AC9525F0} - C:\Program Files\Lexmark Toolbar\toolband.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O4 - HKLM\..\Run: [C:\WINDOWS\system32\kdolk.exe] C:\WINDOWS\system32\kdolk.exe
    O4 - HKLM\..\Run: [C:\WINDOWS\System32\kddgq.exe] C:\WINDOWS\System32\kddgq.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
    O4 - HKUS\S-1-5-18\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'Default user')
    O4 - Global Startup: PowerReg Scheduler.exe
    O4 - Global Startup: SBC Self Support Tool.lnk = C:\Program Files\SBC Self Support Tool\bin\matcli.exe
    O9 - Extra button: AT&T Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\PROGRA~1\YAHOO!\COMMON\yiesrvc.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm (file missing)
    O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm (file missing)
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O15 - Trusted Zone: http://*.mcafee.com
    O17 - HKLM\System\CCS\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CCS\Services\Tcpip\..\{3ECE3F59-2495-49E1-9F9C-DD73ACCF6C6E}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CS1\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CS2\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: lxdcCATSCustConnectService - Lexmark International, Inc. - C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxdcserv.exe
    O23 - Service: lxdc_device - - C:\WINDOWS\System32\lxdccoms.exe

    --
    End of file - 4726 bytes

  4. #4
    Security Expert: Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,288

    Default

    Hi

    Could you post Fixwareout report too, please?
    Microsoft Windows Insider MVP 2016-2020
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

  5. #5
    Junior Member
    Join Date
    Jul 2008
    Posts
    9

    Smile Fixwareout report

    Here's the report for you.



    Username "Admin" - 07/27/2008 6:52:08 [Fixwareout edited 9/01/2007

    ~~~~~ Prerun check

    Successfully flushed the DNS Resolver Cache.


    System was rebooted successfully.

    ~~~~~ Postrun check
    HKLM\SOFTWARE\~\Winlogon\ "System"=""
    ....
    ....
    ~~~~~ Misc files.
    ....
    ~~~~~ Checking for older varients.
    ....

    ~~~~~ Current runs (hklm hkcu "run" Keys Only)
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ntuser"="C:\\WINDOWS\\system32\\drivers\\spools.exe"
    "C:\\WINDOWS\\system32\\kdolk.exe"="C:\\WINDOWS\\system32\\kdolk.exe"
    "C:\\WINDOWS\\System32\\kddgq.exe"="C:\\WINDOWS\\System32\\kddgq.exe"
    "6c129041"="rundll32.exe \"C:\\WINDOWS\\System32\\xrhdovjk.dll\",b"
    "autoload"="C:\\Documents and Settings\\Admin.ANGIES\\cftmon.exe"
    "BM6f21a3dd"="Rundll32.exe \"C:\\WINDOWS\\System32\\osspyiti.dll\",s"

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ntuser"="C:\\WINDOWS\\system32\\drivers\\spools.exe"
    "ctfmon.exe"="C:\\WINDOWS\\System32\\ctfmon.exe"
    "autoload"="C:\\Documents and Settings\\Admin.ANGIES\\cftmon.exe"
    ....
    Hosts file was reset, If you use a custom hosts file please replace it...
    ~~~~~ End report ~~~~~

  6. #6
    Security Expert: Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,288

    Default

    Hi


    Upload following files to http://virusscan.jotti.org and post back the results:
    C:\WINDOWS\videomvp.ini
    C:\30gp67.exe


    Start hjt, do a system scan, check (if found):
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/cust...search/ie.html
    O4 - HKLM\..\Run: [C:\WINDOWS\system32\kdolk.exe] C:\WINDOWS\system32\kdolk.exe
    O4 - HKLM\..\Run: [C:\WINDOWS\System32\kddgq.exe] C:\WINDOWS\System32\kddgq.exe
    O4 - Global Startup: PowerReg Scheduler.exe
    O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm (file missing)
    O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm (file missing)
    O17 - HKLM\System\CCS\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222 <--if not your internet service provider's address
    O17 - HKLM\System\CCS\Services\Tcpip\..\{3ECE3F59-2495-49E1-9F9C-DD73ACCF6C6E}: NameServer = 208.67.220.220,208.67.222.222 <--if not your internet service provider's address
    O17 - HKLM\System\CS1\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222 <--if not your internet service provider's address
    O17 - HKLM\System\CS2\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222 <--if not your internet service provider's address

    Close browsers and other windows. Click fix checked.

    Open notepad and copy/paste the text in the quotebox below into it:

    Code:
    Driver::
    01e1F
    0c57
    1401E
    18818
    1d716
    2a34
    30f2
    34314
    41d1C
    46c1A
    5dbA
    60fE
    6ea3
    74917
    75813
    76b10
    7c9B
    8ae6
    a531B
    a8bC
    a9a12
    b81F
    c7e8
    f5b20
    
    File::
    C:\Documents and Settings\Admin.ANGIES\cftmon.exe
    C:\Documents and Settings\LocalService\cftmon.exe
    C:\Antispyware-2008.lnk
    C:\WINDOWS\system32\sofie.dll
    C:\WINDOWS\system32\avirasafe.dll
    C:\WINDOWS\BM6f21a3dd.xml
    C:\WINDOWS\system32\avg_sr.dll
    C:\WINDOWS\system32\diga32.dll
    C:\WINDOWS\System32\01e1F.sys
    C:\WINDOWS\System32\0c57.sys
    C:\WINDOWS\System32\1401E.sys
    C:\WINDOWS\System32\18818.sys
    C:\WINDOWS\System32\1d716.sys
    C:\WINDOWS\System32\2a34.sys
    C:\WINDOWS\System32\30f2.sys
    C:\WINDOWS\System32\34314.sys
    C:\WINDOWS\System32\41d1C.sys
    C:\WINDOWS\System32\46c1A.sys
    C:\WINDOWS\System32\5dbA.sys
    C:\WINDOWS\System32\60fE.sys
    C:\WINDOWS\System32\6ea3.sys
    C:\WINDOWS\System32\74917.sys
    C:\WINDOWS\System32\75813.sys
    C:\WINDOWS\System32\76b10.sys
    C:\WINDOWS\System32\7c9B.sys
    C:\WINDOWS\System32\8ae6.sys
    C:\WINDOWS\System32\a531B.sys
    C:\WINDOWS\System32\a8bC.sys
    C:\WINDOWS\System32\a9a12.sys
    C:\WINDOWS\System32\b81F.sys
    C:\WINDOWS\System32\c7e8.sys
    C:\WINDOWS\System32\f5b20.sys
    C:\WINDOWS\system32\kdolk.exe
    C:\WINDOWS\System32\kddgq.exe
    
    Registry::
    [-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{A4D16645-4149-41FB-B670-E06072E540C1}]

    Save this as
    CFScript

    A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine. This tool is not a toy and not for everyday use.



    Refering to the picture above, drag CFScript into ComboFix.exe
    Then post the resultant log.


    Combofix should never take more that 20 minutes including the reboot if malware is detected.
    If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
    If that happened we want to know, and also what process you had to end.


    Download ATF (Atribune Temp File) Cleaner© by Atribune to your desktop.

    Double-click ATF Cleaner.exe to open it

    Under Main choose:
    Windows Temp
    Current User Temp
    All Users Temp
    Cookies
    Temporary Internet Files
    Prefetch
    Java Cache

    *The other boxes are optional*
    Then click the Empty Selected button.

    If you use Firefox:
    Click Firefox at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

    If you use Opera:
    Click Opera at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

    Click Exit on the Main menu to close the program.

    Please download Malwarebytes' Anti-Malware to your desktop.

    • Double-click mbam-setup.exe and follow the prompts to install the program.
    • At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    • If an update is found, it will download and install the latest version.
    • Once the program has loaded, select Perform full scan, then click Scan.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Be sure that everything is checked, and click Remove Selected.
    • When completed, a log will open in Notepad. Please save it to a convenient location. The log can also be found here: C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
    • Please post contents of that file & a fresh hjt log (don't forget above meantioned ComboFix resultant log) in your next reply.
    Microsoft Windows Insider MVP 2016-2020
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

  7. #7
    Junior Member
    Join Date
    Jul 2008
    Posts
    9

    Smile Hi

    Here are the reports that you asked for. I wasn't able to find C:\WINDOWS\videomvp.ini on my computer.

    C:\30gp67.exe
    Scan taken on 30 Jul 2008 16:37:07 (GMT) A-Squared
    Found nothing
    AntiVir
    Found HEUR/Crypted
    ArcaVir
    Found nothing
    Avast
    Found nothing
    AVG Antivirus
    Found nothing
    BitDefender
    Found nothing
    ClamAV
    Found nothing
    CPsecure
    Found nothing
    Dr.Web
    Found nothing
    F-Prot Antivirus
    Found nothing
    F-Secure Anti-Virus
    Found nothing
    Fortinet
    Found nothing
    Ikarus
    Found nothing
    Kaspersky Anti-Virus
    Found nothing
    NOD32
    Found nothing
    Norman Virus Control
    Found nothing
    Panda Antivirus
    Found nothing
    Sophos Antivirus
    Found Mal/EncPk-CO
    VirusBuster
    Found nothing
    VBA32
    Found Malware-Cryptor.Win32.General.2 (probable variant)




    Last file scanned at least one scanner reported something about: X7349.rar (MD5: b8fdd1cc72db48d428fa6124610b542b, size: 146635 bytes), detected by:
    Scanner Malware name
    A-Squared X
    AntiVir ADSPY/Drop.Boran.I
    ArcaVir Trojan.Dnschanger.Gw
    Avast Win32:Trojan-gen {Other}
    AVG Antivirus Downloader.Small.BZK
    BitDefender Trojan.Adclicker.AZ
    ClamAV Adware.Dropper-22
    CPsecure AdWare.W32.Stud.D
    Dr.Web Adware.Adx
    F-Prot Antivirus W32/Downldr2.BJZS
    F-Secure Anti-Virus Trojan-Dropper:W32/Agent.DZN
    Fortinet W32/Small.FQE!tr
    Ikarus not-a-virus:AdWare.Win32.Yokbar.n
    Kaspersky Anti-Virus Trojan.Win32.Agent.lpm
    NOD32 probably a variant of Win32/TrojanDropper.Agent
    Norman Virus Control X
    Panda Antivirus Application/Yok
    Sophos Antivirus Troj/Mdrop-BSE
    VirusBuster X
    VBA32 Trojan.Win32.Agent.lpm


    Malwarebytes' Anti-Malware 1.23
    Database version: 1008
    Windows 5.1.2600 Service Pack 1

    11:21:59 PM 7/29/2008
    mbam-log-7-29-2008 (23-21-59).txt

    Scan type: Full Scan (C:\|)
    Objects scanned: 76892
    Time elapsed: 20 minute(s), 14 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 1
    Files Infected: 43

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    C:\Documents and Settings\LocalService\Start Menu\Programs\Antispyware 2008 (Rogue.Antispyware) -> Quarantined and deleted successfully.

    Files Infected:
    C:\Program Files\Mozilla Firefox\components\zxjkewvi.dll (Trojan.Peed) -> Quarantined and deleted successfully.
    C:\Program Files\The Weather Channel FW\Desktop Weather\DesktopWeather.exe (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\Program Files\The Weather Channel FW\Framework\wxfw.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000006.exe (Worm.Socks) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000011.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000012.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000013.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000015.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000016.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000018.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000019.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000020.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000023.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000026.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000027.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP5\A0000646.exe (Worm.Socks) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP5\A0000647.exe (Worm.Socks) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP5\A0000648.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP5\A0000649.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP5\A0000650.dll (Adware.BHO) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP5\A0000651.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\FOUND.006\FILE0047.CHK (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\awtttrsR.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\byXOeEUm.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\ddcYsTnN.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\iifcDWol.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\juuswa.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\kmhtqxcp.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\latahiab.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\lhgmvbhp.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\nfoxmvam.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\qoMcaxUm.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\rlalmi.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\avg_sr.dll.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\avirasafe.dll.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\diga32.dll.vir (Adware.BHO) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\sofie.dll.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\drivers\spools.exe.vir (Worm.Socks) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\Documents and Settings\Admin.ANGIES\cftmon.exe.vir (Worm.Socks) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\Documents and Settings\LocalService\cftmon.exe.vir (Worm.Socks) -> Quarantined and deleted successfully.
    C:\Documents and Settings\LocalService\Start Menu\Programs\Antispyware 2008\Antispyware-2008.lnk (Rogue.Antispyware) -> Quarantined and deleted successfully.
    C:\wincget.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\Documents and Settings\LocalService\Application Data\Microsoft\Internet Explorer\Quick Launch\Antispyware-2008.lnk (Rogue.Antispyware) -> Quarantined and deleted successfully.


    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 11:29:33 PM, on 7/29/2008
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\System32\lxdccoms.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Binn\sqlservr.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\ctfmon.exe
    C:\WINDOWS\System32\wuauclt.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\system32\NOTEPAD.EXE
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\WINDOWS\system32\NOTEPAD.EXE
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O3 - Toolbar: Lexmark Toolbar - {1017A80C-6F09-4548-A84D-EDD6AC9525F0} - C:\Program Files\Lexmark Toolbar\toolband.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
    O4 - HKUS\S-1-5-18\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'Default user')
    O4 - Global Startup: SBC Self Support Tool.lnk = C:\Program Files\SBC Self Support Tool\bin\matcli.exe
    O9 - Extra button: AT&T Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\PROGRA~1\YAHOO!\COMMON\yiesrvc.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O15 - Trusted Zone: http://*.mcafee.com
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: lxdcCATSCustConnectService - Lexmark International, Inc. - C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxdcserv.exe
    O23 - Service: lxdc_device - - C:\WINDOWS\System32\lxdccoms.exe

    --
    End of file - 3487 bytes


    ComboFix 08-07-28.4 - Admin 2008-07-29 22:27:18.2 - FAT32x86
    Microsoft Windows XP Professional 5.1.2600.1.1252.1.1033.18.190 [GMT -7:00]
    Running from: C:\Documents and Settings\Admin.ANGIES\Desktop\ComboFix.exe
    Command switches used :: C:\Documents and Settings\Admin.ANGIES\Desktop\CFScript.txt
    * Created a new restore point

    WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!

    FILE ::
    C:\Antispyware-2008.lnk
    C:\Documents and Settings\Admin.ANGIES\cftmon.exe
    C:\Documents and Settings\LocalService\cftmon.exe
    C:\WINDOWS\BM6f21a3dd.xml
    C:\WINDOWS\System32\01e1F.sys
    C:\WINDOWS\System32\0c57.sys
    C:\WINDOWS\System32\1401E.sys
    C:\WINDOWS\System32\18818.sys
    C:\WINDOWS\System32\1d716.sys
    C:\WINDOWS\System32\2a34.sys
    C:\WINDOWS\System32\30f2.sys
    C:\WINDOWS\System32\34314.sys
    C:\WINDOWS\System32\41d1C.sys
    C:\WINDOWS\System32\46c1A.sys
    C:\WINDOWS\System32\5dbA.sys
    C:\WINDOWS\System32\60fE.sys
    C:\WINDOWS\System32\6ea3.sys
    C:\WINDOWS\System32\74917.sys
    C:\WINDOWS\System32\75813.sys
    C:\WINDOWS\System32\76b10.sys
    C:\WINDOWS\System32\7c9B.sys
    C:\WINDOWS\System32\8ae6.sys
    C:\WINDOWS\System32\a531B.sys
    C:\WINDOWS\System32\a8bC.sys
    C:\WINDOWS\System32\a9a12.sys
    C:\WINDOWS\system32\avg_sr.dll
    C:\WINDOWS\system32\avirasafe.dll
    C:\WINDOWS\System32\b81F.sys
    C:\WINDOWS\System32\c7e8.sys
    C:\WINDOWS\system32\diga32.dll
    C:\WINDOWS\System32\f5b20.sys
    C:\WINDOWS\System32\kddgq.exe
    C:\WINDOWS\system32\kdolk.exe
    C:\WINDOWS\system32\sofie.dll
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\Antispyware-2008.lnk
    C:\Documents and Settings\Admin.ANGIES\cftmon.exe
    C:\Documents and Settings\LocalService\cftmon.exe
    C:\WINDOWS\BM6f21a3dd.xml
    C:\WINDOWS\system32\avg_sr.dll
    C:\WINDOWS\system32\avirasafe.dll
    C:\WINDOWS\system32\diga32.dll
    C:\WINDOWS\system32\sofie.dll

    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    -------\Legacy_01E1F
    -------\Legacy_0C57
    -------\Legacy_1401E
    -------\Legacy_18818
    -------\Legacy_1D716
    -------\Legacy_2A34
    -------\Legacy_30F2
    -------\Legacy_34314
    -------\Legacy_41D1C
    -------\Legacy_46C1A
    -------\Legacy_5DBA
    -------\Legacy_60FE
    -------\Legacy_6EA3
    -------\Legacy_74917
    -------\Legacy_75813
    -------\Legacy_76B10
    -------\Legacy_7C9B
    -------\Legacy_8AE6
    -------\Legacy_A531B
    -------\Legacy_A8BC
    -------\Legacy_A9A12
    -------\Legacy_B81F
    -------\Legacy_C7E8
    -------\Legacy_F5B20
    -------\Service_01e1F
    -------\Service_0c57
    -------\Service_1401E
    -------\Service_18818
    -------\Service_1d716
    -------\Service_2a34
    -------\Service_30f2
    -------\Service_34314
    -------\Service_41d1C
    -------\Service_46c1A
    -------\Service_5dbA
    -------\Service_60fE
    -------\Service_6ea3
    -------\Service_74917
    -------\Service_75813
    -------\Service_76b10
    -------\Service_7c9B
    -------\Service_8ae6
    -------\Service_a531B
    -------\Service_a8bC
    -------\Service_a9a12
    -------\Service_b81F
    -------\Service_c7e8
    -------\Service_f5b20


    ((((((((((((((((((((((((( Files Created from 2008-06-28 to 2008-07-30 )))))))))))))))))))))))))))))))
    .

    2008-07-29 21:49 . 2008-07-29 21:51 37,888 --a------ C:\30gp67.exe.doc
    2008-07-27 06:51 . 2008-07-27 06:51 <DIR> d-------- C:\fixwareout
    2008-07-23 02:00 . 2008-07-23 02:00 <DIR> d-------- C:\Program Files\Trend Micro
    2008-07-23 00:23 . 2008-07-23 00:23 <DIR> d-------- C:\Documents and Settings\Admin.ANGIES\Application Data\McAfee
    2008-07-22 23:04 . 2008-07-22 23:04 <DIR> d-------- C:\Documents and Settings\Admin.ANGIES\Application Data\ArcSoft
    2008-07-22 22:20 . 2008-07-22 22:20 <DIR> d-------- C:\Program Files\JL2005A
    2008-07-11 08:46 . 2008-07-27 06:41 2,488 --a------ C:\WINDOWS\wininit.ini
    2008-07-11 06:59 . 2008-07-11 06:59 <DIR> d-------- C:\Program Files\Spybot - Search & Destroy
    2008-07-11 06:59 . 2008-07-11 06:59 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
    2008-07-11 06:57 . 2008-07-11 06:57 <DIR> d-------- C:\Documents and Settings\Admin.ANGIES
    2008-07-11 06:49 . 2008-07-11 06:49 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
    2008-07-10 07:57 . 2008-07-10 07:57 <DIR> d-------- C:\Program Files\CCleaner
    2008-07-10 07:40 . 2008-07-10 07:40 <DIR> d-------- C:\Program Files\Common Files\Motive
    2008-07-10 07:40 . 2008-07-10 07:40 <DIR> d-------- C:\Program Files\Common Files\Java
    2008-07-10 06:50 . 2008-07-10 06:50 <DIR> d---s---- C:\Documents and Settings\Admin
    2008-07-10 06:41 . 2008-07-10 06:41 <DIR> d-------- C:\WINDOWS\system32\NtmsData
    2008-07-08 02:54 . 2008-07-08 02:54 <DIR> d--hs---- C:\FOUND.006
    2008-07-04 03:36 . 2008-07-04 03:36 8,192 --a------ C:\30gp67.exe

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2008-04-09 08:32 744 ----a-w C:\Documents and Settings\angela storey\Application Data\filterclsid.dat
    2007-12-06 08:54 774,144 ----a-w C:\Program Files\RngInterstitial.dll
    2006-09-23 06:27 67,184 ----a-w C:\Documents and Settings\angela storey\Application Data\GDIPFONTCACHEV1.DAT
    2006-05-01 06:35 36,864 ----a-w C:\Program Files\Spelling words.doc
    2006-03-01 05:31 25,088 ----a-w C:\Program Files\Prophecy 06-09-05 Stockton.doc
    2001-09-10 16:00 139,264 ----a-w C:\WINDOWS\inf\i386\Rtscan.dll
    2001-09-10 15:10 61,440 ----a-w C:\WINDOWS\inf\i386\onetUSD.dll
    2001-08-18 01:43 32,768 ----a-w C:\WINDOWS\inf\i386\Wiamicro.dll
    2001-08-04 01:29 13,824 ----a-w C:\WINDOWS\inf\i386\usbscan.sys
    2001-06-29 15:10 163,840 ----a-w C:\WINDOWS\inf\i386\viceo.dll
    .

    ((((((((((((((((((((((((((((( snapshot@2008-07-28_ 7.37.43.57 )))))))))))))))))))))))))))))))))))))))))
    .
    - 2007-11-02 21:16:42 71,248 ----a-w C:\WINDOWS\system32\perfc009.dat
    + 2008-07-28 14:37:36 71,248 ----a-w C:\WINDOWS\system32\perfc009.dat
    - 2007-11-02 21:16:42 422,636 ----a-w C:\WINDOWS\system32\perfh009.dat
    + 2008-07-28 14:37:36 422,636 ----a-w C:\WINDOWS\system32\perfh009.dat
    + 2008-07-30 05:32:54 16,384 ----a-w C:\WINDOWS\Temp\Perflib_Perfdata_588.dat
    .
    -- Snapshot reset to current date --
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ctfmon.exe"="C:\WINDOWS\System32\ctfmon.exe" [2002-08-29 12:00 13312]

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "MySpaceIM"="C:\Program Files\MySpace\IM\MySpaceIM.exe" [2007-12-06 23:33 8720384]

    C:\Documents and Settings\angela storey\Start Menu\Programs\Startup\
    LimeWire On Startup.lnk - C:\Program Files\LimeWire\LimeWire.exe [2007-12-03 13:35:53 147456]

    C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
    SBC Self Support Tool.lnk - C:\Program Files\SBC Self Support Tool\bin\matcli.exe [2007-10-28 16:25:02 217088]

    R1 ATMhelpr;ATMhelpr;C:\WINDOWS\System32\drivers\ATMhelpr.sys [1997-06-17 04:00]
    R2 lxdc_device;lxdc_device;C:\WINDOWS\System32\lxdccoms.exe [2007-05-25 02:38]
    R2 ppsio2;PPDevice;C:\WINDOWS\System32\drivers\ppsio2.sys [1999-06-30 02:49]
    S2 Ca533av;VCamNow Video Capture;C:\WINDOWS\System32\Drivers\Ca533av.sys [2002-10-21 11:37]
    S2 lxdcCATSCustConnectService;lxdcCATSCustConnectService;C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxdcserv.exe [2007-05-25 02:38]
    S2 UMAXPCLS;Print Port Scanner Driver;C:\WINDOWS\System32\DRIVERS\umaxpcls.sys [2001-08-17 13:58]
    S3 USBCamera;VCamNow Digital Camera;C:\WINDOWS\System32\Drivers\Bulk533.sys [2002-11-22 09:25]
    .
    Contents of the 'Scheduled Tasks' folder

    2007-04-24 C:\WINDOWS\Tasks\Accessibility Wizard.job
    - C:\WINDOWS\system32\accwiz.exe [2002-08-29 05:00]
    .
    **************************************************************************

    catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-07-29 22:33:52
    Windows 5.1.2600 Service Pack 1 FAT NTAPI

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    PROCESS: C:\WINDOWS\system32\lsass.exe
    -> C:\Program Files\Google\Google Desktop Search\GoogleDesktopNetwork1.dll

    PROCESS: C:\WINDOWS\explorer.exe
    -> ?:\WINDOWS\system32\VERSION.dll
    -> ?:\WINDOWS\system32\VERSION.dll
    -> ?:\WINDOWS\System32\msi.dll
    .
    ------------------------ Other Running Processes ------------------------
    .
    C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\VS7DEBUG\MDM.EXE
    C:\PROGRAM FILES\MICROSOFT SQL SERVER\MSSQL$MICROSOFTBCM\BINN\SQLSERVR.EXE
    .
    **************************************************************************
    .
    Completion time: 2008-07-29 22:35:31 - machine was rebooted
    ComboFix-quarantined-files.txt 2008-07-30 05:35:26
    ComboFix2.txt 2008-07-28 14:38:44

    Pre-Run: 9,692,282,880 bytes free
    Post-Run: 9,680,846,848 bytes free

    203 --- E O F --- 2007-11-01 08:39:36

  8. #8
    Security Expert: Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,288

    Default

    Hi again


    Delete following files:
    C:\30gp67.exe.doc
    C:\30gp67.exe


    Download ATF (Atribune Temp File) Cleaner© by Atribune to your desktop.

    Double-click ATF Cleaner.exe to open it

    Under Main choose:
    Windows Temp
    Current User Temp
    All Users Temp
    Cookies
    Temporary Internet Files
    Java Cache

    *The other boxes are optional*
    Then click the Empty Selected button.

    If you use Firefox:
    Click Firefox at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

    If you use Opera:
    Click Opera at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

    Click Exit on the Main menu to close the program.


    Please run an online scan with Kaspersky Online Scanner. You will be prompted to install an ActiveX component from Kaspersky, click Yes.
    • The program will launch and start to download the latest definition files.
    • Once the scanner is installed and the definitions downloaded, click Next.
    • Now click on Scan Settings and select the following:
    Scan using the following Anti-Virus database:
    • Extended (If available, otherwise Standard)
    Scan Options:
    • Scan Archives
    • Scan Mail Bases
    • Click OK.
    • Under
      select a target to scan
      , select My Computer.
    • The scan will take a while so be patient and let it run. As it scans your machine very deeply it could take hours to complete, Kaspersky suggests running it during a time of low activity.
    Once the scan is complete:
    • Click on the Save as Text button.
    • Save the file to your desktop.
    • Copy and paste that information into your next post if the AV content will fit into one post only. Post a fresh hjt log too.



    Note for Internet Explorer 7 users: If at any time you have trouble with the Accept button of the license, click on the Zoom tool located at the bottom right of the IE window and set the zoom to 75 %. Once the license has been accepted, reset to 100%.

    If having a problme doing the above

    Make sure that your Internet security settings are set to default values.

    To set default security settings for Internet Explorer:

    * Open Internet Explorer.
    * Go to the Tools menu, then choose Internet Options.
    * Click on the Security tab.
    * Make sure that all four item (Internet, Local intranet, Trusted sites, and Restricted sites) are set to their default settings.
    Microsoft Windows Insider MVP 2016-2020
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

  9. #9
    Junior Member
    Join Date
    Jul 2008
    Posts
    9

    Smile Hi

    Here you go.



    -------------------------------------------------------------------------------
    KASPERSKY ONLINE SCANNER REPORT
    Wednesday, July 30, 2008 11:14:51 AM
    Operating System: Microsoft Windows XP Professional, Service Pack 1 (Build 2600)
    Kaspersky Online Scanner version: 5.0.98.0
    Kaspersky Anti-Virus database last update: 31/07/2008
    Kaspersky Anti-Virus database records: 1032086
    -------------------------------------------------------------------------------

    Scan Settings:
    Scan using the following antivirus database: extended
    Scan Archives: true
    Scan Mail Bases: true

    Scan Target - My Computer:
    A:\
    B:\
    C:\
    D:\

    Scan Statistics:
    Total number of scanned objects: 44264
    Number of viruses found: 10
    Number of infected objects: 33
    Number of suspicious objects: 0
    Duration of the scan process: 02:16:00

    Infected Object Name / Virus Name / Last Action
    C:\WINDOWS\system32\config\system.LOG Object is locked skipped
    C:\WINDOWS\system32\config\software.LOG Object is locked skipped
    C:\WINDOWS\system32\config\default.LOG Object is locked skipped
    C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
    C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
    C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
    C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
    C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
    C:\WINDOWS\system32\config\SECURITY Object is locked skipped
    C:\WINDOWS\system32\config\SOFTWARE Object is locked skipped
    C:\WINDOWS\system32\config\SYSTEM Object is locked skipped
    C:\WINDOWS\system32\config\DEFAULT Object is locked skipped
    C:\WINDOWS\system32\config\SAM Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
    C:\WINDOWS\system32\h323log.txt Object is locked skipped
    C:\WINDOWS\Temp\Perflib_Perfdata_588.dat Object is locked skipped
    C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
    C:\WINDOWS\wiaservc.log Object is locked skipped
    C:\WINDOWS\wiadebug.log Object is locked skipped
    C:\WINDOWS\Sti_Trace.log Object is locked skipped
    C:\WINDOWS\WindowsUpdate.log Object is locked skipped
    C:\WINDOWS\SchedLgU.Txt Object is locked skipped
    C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
    C:\Documents and Settings\NetworkService\ntuser.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
    C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
    C:\Documents and Settings\LocalService\ntuser.dat Object is locked skipped
    C:\Documents and Settings\angela storey\Desktop\I5aac\phycosocal slipknot.mp3 Infected: Trojan-Downloader.WMA.Wimad.n skipped
    C:\Documents and Settings\angela storey\Incomplete\T-3545425-phycosocial slipknot.mp3 Infected: Trojan-Downloader.WMA.Wimad.n skipped
    C:\Documents and Settings\angela storey\Shared\emmbeded job for cowboy doom.mp3 Infected: Trojan-Downloader.WMA.Wimad.n skipped
    C:\Documents and Settings\angela storey\Shared\phycosocal slipknot.mp3 Infected: Trojan-Downloader.WMA.Wimad.n skipped
    C:\Documents and Settings\angela storey\Shared\phycosocial slipknot.mp3 Infected: Trojan-Downloader.WMA.Wimad.n skipped
    C:\Documents and Settings\angela storey\Shared\emmbeded job for cow boy doom.mp3 Infected: Trojan-Downloader.WMA.Wimad.n skipped
    C:\Documents and Settings\Admin.ANGIES\NTUSER.DAT Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\NTUSER.DAT.LOG Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Local Settings\History\History.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Local Settings\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\Cache\_CACHE_MAP_ Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Local Settings\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\Cache\_CACHE_001_ Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Local Settings\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\Cache\_CACHE_002_ Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Local Settings\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\Cache\_CACHE_003_ Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Local Settings\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\urlclassifier3.sqlite Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Local Settings\temp\etilqs_UmmQovp5hVgU7eHzKjr4 Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Cookies\index.dat Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\parent.lock Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\permissions.sqlite Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\cert8.db Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\key3.db Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\places.sqlite-journal Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\places.sqlite Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\search.sqlite Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\formhistory.sqlite Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\cookies.sqlite Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\content-prefs.sqlite Object is locked skipped
    C:\Documents and Settings\Admin.ANGIES\Application Data\Mozilla\Firefox\Profiles\p73fij09.default\downloads.sqlite Object is locked skipped
    C:\Program Files\Tiger Electronics\miniMEDIA\DelDrv.exe Infected: not-a-virus:RiskTool.Win32.Deleter.e skipped
    C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\LOG\ERRORLOG Object is locked skipped
    C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Data\master.mdf Object is locked skipped
    C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Data\mastlog.ldf Object is locked skipped
    C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Data\model.mdf Object is locked skipped
    C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Data\modellog.ldf Object is locked skipped
    C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Data\tempdb.mdf Object is locked skipped
    C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Data\templog.ldf Object is locked skipped
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000021.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.adqs skipped
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000028.dll Infected: Trojan.Win32.Monder.bfg skipped
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP2\A0000043.exe Infected: not-a-virus:FraudTool.Win32.VirusIsolator.u skipped
    C:\System Volume Information\_restore{92FD4745-8FD4-4D80-87A6-EAA9BC4AFEB6}\RP5\change.log Object is locked skipped
    C:\FOUND.006\FILE0005.CHK Infected: Backdoor.Win32.Agent.lns skipped
    C:\FOUND.006\FILE0006.CHK Infected: Trojan.Win32.Agent.gmo skipped
    C:\FOUND.006\FILE0007.CHK Infected: Trojan.Win32.Agent.gmo skipped
    C:\FOUND.006\FILE0008.CHK Infected: Trojan-Downloader.Win32.Zlob.pnq skipped
    C:\FOUND.006\FILE0009.CHK Infected: Trojan-Downloader.Win32.Zlob.pnq skipped
    C:\FOUND.006\FILE0019.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
    C:\FOUND.006\FILE0020.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
    C:\FOUND.006\FILE0022.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
    C:\FOUND.006\FILE0023.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
    C:\FOUND.006\FILE0027.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
    C:\FOUND.006\FILE0029.CHK Infected: Worm.Win32.Socks.agj skipped
    C:\FOUND.006\FILE0030.CHK Infected: Worm.Win32.Socks.agj skipped
    C:\FOUND.006\FILE0031.CHK Infected: Backdoor.Win32.Agent.lns skipped
    C:\FOUND.006\FILE0032.CHK Infected: Backdoor.Win32.Agent.lns skipped
    C:\FOUND.006\FILE0033.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
    C:\FOUND.006\FILE0034.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
    C:\FOUND.006\FILE0035.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
    C:\FOUND.006\FILE0036.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
    C:\FOUND.006\FILE0037.CHK Infected: Trojan-Downloader.Win32.Tibs.aek skipped
    C:\FOUND.006\FILE0043.CHK Infected: Backdoor.Win32.Agent.lns skipped
    C:\QooBox\Quarantine\C\WINDOWS\system32\mlJCRlkI.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.adqs skipped
    C:\QooBox\Quarantine\C\WINDOWS\system32\xrhdovjk.dll.vir Infected: Trojan.Win32.Monder.bfg skipped
    C:\QooBox\Quarantine\C\Program Files\Antispyware 2008\Antispyware-2008.exe.vir Infected: not-a-virus:FraudTool.Win32.VirusIsolator.u skipped

    Scan process completed.



    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 11:17:52 AM, on 7/30/2008
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\System32\lxdccoms.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Binn\sqlservr.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\ctfmon.exe
    C:\WINDOWS\System32\wuauclt.exe
    C:\WINDOWS\explorer.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\internet explorer\iexplore.exe
    C:\WINDOWS\system32\NOTEPAD.EXE
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O3 - Toolbar: Lexmark Toolbar - {1017A80C-6F09-4548-A84D-EDD6AC9525F0} - C:\Program Files\Lexmark Toolbar\toolband.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
    O4 - HKUS\S-1-5-18\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'Default user')
    O4 - Global Startup: SBC Self Support Tool.lnk = C:\Program Files\SBC Self Support Tool\bin\matcli.exe
    O9 - Extra button: AT&T Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\PROGRA~1\YAHOO!\COMMON\yiesrvc.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O15 - Trusted Zone: http://*.mcafee.com
    O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.nl/scanforvirus...an_unicode.cab
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: lxdcCATSCustConnectService - Lexmark International, Inc. - C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxdcserv.exe
    O23 - Service: lxdc_device - - C:\WINDOWS\System32\lxdccoms.exe

    --
    End of file - 3640 bytes

  10. #10
    Junior Member
    Join Date
    Jul 2008
    Posts
    9

    Default Oops

    I forgot to delete the files that you instructed me to (30gp67.exe & 30gp67) before the Kapersky scan. I just deleted them now. Does that matter?

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •