Page 1 of 2 12 LastLast
Results 1 to 10 of 15

Thread: Help - Infected with Virtumonde, Smitfraud, etc

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Junior Member
    Join Date
    Jul 2008
    Posts
    9

    Unhappy Help - Infected with Virtumonde, Smitfraud, etc

    I need your help! My computer is infected with these viruses (Virtumonde, Smitfraud) those are just the ones I know about and I have no idea what to do. I've tried to download McAfee security center but my computer won't allow it. Your help will be greatly appreciated.

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 2:00:31 AM, on 7/23/2008
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\System32\lxdccoms.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Binn\sqlservr.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\ctfmon.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\drivers\spools.exe
    C:\WINDOWS\System32\ctfmon.exe
    C:\WINDOWS\System32\taskmgr.exe
    C:\WINDOWS\System32\rundll32.exe
    C:\WINDOWS\system32\drivers\spools.exe
    C:\WINDOWS\System32\rundll32.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\System32\dwwin.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    C:\WINDOWS\System32\wbem\wmiprvse.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/cust...search/ie.html
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://red.clientapps.yahoo.com/cust.../www.yahoo.com
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://red.clientapps.yahoo.com/cust.../www.yahoo.com
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/cust...search/ie.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://red.clientapps.yahoo.com/cust.../www.yahoo.com
    O2 - BHO: AVG Safe Search - {1C1B8A44-61FE-411E-8F33-813A4E2E2984} - C:\WINDOWS\System32\AVIRAS~1.DLL
    O2 - BHO: (no name) - {2BF98F47-2AFF-43D3-8D9E-EC84BCDC3F5B} - (no file)
    O2 - BHO: (no name) - {2F8BF994-F0EA-4A73-B6BA-EF93DBE16B63} - C:\WINDOWS\System32\nnnkIbbY.dll (file missing)
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: (no name) - {5A3AFBB4-3119-49FE-9DA8-407FE5F7211C} - C:\WINDOWS\System32\wvUnNecY.dll (file missing)
    O2 - BHO: (no name) - {680DBEE8-B862-4B3B-9A3B-3F6DD618BA25} - C:\WINDOWS\System32\mlJBSlLc.dll (file missing)
    O2 - BHO: {598346fe-7fe5-e33b-0974-23b0c83932a6} - {6a23938c-0b32-4790-b33e-5ef7ef643895} - C:\WINDOWS\System32\adnpuc.dll
    O2 - BHO: scriptproxy - {6D0386B3-FD72-488E-9740-90355AE21735} - C:\WINDOWS\System32\diga32.dll
    O2 - BHO: (no name) - {6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C} - C:\WINDOWS\system32\iifcDWol.dll
    O2 - BHO: (no name) - {74C466E9-2FC5-43D7-8560-FE4362A2A30E} - C:\WINDOWS\System32\rqRIyWqP.dll (file missing)
    O2 - BHO: (no name) - {9E2C792A-1249-49BC-B1E3-27E1C7061905} - C:\WINDOWS\System32\iiffGWMe.dll (file missing)
    O2 - BHO: (no name) - {A7DAFB2E-E95B-4F23-B681-90C8040E5A96} - C:\WINDOWS\System32\qoMdBSmN.dll (file missing)
    O2 - BHO: (no name) - {E135EFEB-9E21-4EF4-8E24-2EDD98F6C87F} - C:\WINDOWS\System32\opnnnmkk.dll (file missing)
    O3 - Toolbar: Lexmark Toolbar - {1017A80C-6F09-4548-A84D-EDD6AC9525F0} - C:\Program Files\Lexmark Toolbar\toolband.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O4 - HKLM\..\Run: [ntuser] C:\WINDOWS\system32\drivers\spools.exe
    O4 - HKLM\..\Run: [C:\WINDOWS\system32\kdolk.exe] C:\WINDOWS\system32\kdolk.exe
    O4 - HKLM\..\Run: [C:\WINDOWS\System32\kddgq.exe] C:\WINDOWS\System32\kddgq.exe
    O4 - HKLM\..\Run: [6c129041] rundll32.exe "C:\WINDOWS\System32\xrhdovjk.dll",b
    O4 - HKLM\..\Run: [BM6f21a3dd] Rundll32.exe "C:\WINDOWS\System32\kyjheqcs.dll",s
    O4 - HKLM\..\Run: [autoload] C:\Documents and Settings\Admin.ANGIES\cftmon.exe
    O4 - HKLM\..\RunOnce: [Spybot - Search & Destroy] "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe" /autocheck
    O4 - HKLM\..\RunOnce: [SpybotDeletingA2607] command /c del "C:\WINDOWS\system32\mlJBSlLc.dll_old"
    O4 - HKLM\..\RunOnce: [SpybotDeletingC2887] cmd /c del "C:\WINDOWS\system32\iifcDWol.dll"
    O4 - HKLM\..\RunOnce: [SpybotDeletingA542] command /c del "C:\WINDOWS\system32\iifcDWol.dll"
    O4 - HKLM\..\RunOnce: [SpybotDeletingA5051] command /c del "C:\WINDOWS\system32\kyjheqcs.dll_old"
    O4 - HKLM\..\RunOnce: [SpybotDeletingC7712] cmd /c del "C:\WINDOWS\system32\kyjheqcs.dll_old"
    O4 - HKLM\..\RunOnce: [SpybotSnD] "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe" /autocheck
    O4 - HKCU\..\Run: [ntuser] C:\WINDOWS\system32\drivers\spools.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
    O4 - HKCU\..\Run: [autoload] C:\Documents and Settings\Admin.ANGIES\cftmon.exe
    O4 - HKCU\..\RunOnce: [SpybotDeletingB9380] command /c del "C:\WINDOWS\system32\mlJBSlLc.dll_old"
    O4 - HKCU\..\RunOnce: [SpybotDeletingD4642] cmd /c del "C:\WINDOWS\system32\mlJBSlLc.dll_old"
    O4 - HKCU\..\RunOnce: [SpybotDeletingB6749] command /c del "C:\WINDOWS\system32\iifcDWol.dll"
    O4 - HKCU\..\RunOnce: [SpybotDeletingD3800] cmd /c del "C:\WINDOWS\system32\iifcDWol.dll"
    O4 - HKCU\..\RunOnce: [SpybotDeletingB1935] command /c del "C:\WINDOWS\system32\kyjheqcs.dll_old"
    O4 - HKCU\..\RunOnce: [SpybotDeletingD3328] cmd /c del "C:\WINDOWS\system32\kyjheqcs.dll_old"
    O4 - HKUS\S-1-5-21-790525478-920026266-1708537768-1003\..\Run: [ntuser] C:\WINDOWS\system32\drivers\spools.exe (User 'angela storey')
    O4 - HKUS\S-1-5-21-790525478-920026266-1708537768-1003\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe (User 'angela storey')
    O4 - HKUS\S-1-5-21-790525478-920026266-1708537768-1003\..\Run: [autoload] C:\Documents and Settings\angela storey\cftmon.exe (User 'angela storey')
    O4 - HKUS\S-1-5-18\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'Default user')
    O4 - S-1-5-21-790525478-920026266-1708537768-1003 Startup: LimeWire On Startup.lnk = C:\Program Files\LimeWire\LimeWire.exe (User 'angela storey')
    O4 - S-1-5-21-790525478-920026266-1708537768-1003 User Startup: LimeWire On Startup.lnk = C:\Program Files\LimeWire\LimeWire.exe (User 'angela storey')
    O4 - Global Startup: PowerReg Scheduler.exe
    O4 - Global Startup: SBC Self Support Tool.lnk = C:\Program Files\SBC Self Support Tool\bin\matcli.exe
    O9 - Extra button: AT&T Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\PROGRA~1\YAHOO!\COMMON\yiesrvc.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm (file missing)
    O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm (file missing)
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O15 - Trusted Zone: http://*.mcafee.com
    O17 - HKLM\System\CCS\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CCS\Services\Tcpip\..\{3ECE3F59-2495-49E1-9F9C-DD73ACCF6C6E}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 208.67.220.220 208.67.222.222
    O17 - HKLM\System\CS1\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CS2\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 208.67.220.220 208.67.222.222
    O20 - Winlogon Notify: iifcDWol - C:\WINDOWS\SYSTEM32\iifcDWol.dll
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: lxdcCATSCustConnectService - Lexmark International, Inc. - C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxdcserv.exe
    O23 - Service: lxdc_device - - C:\WINDOWS\System32\lxdccoms.exe
    O23 - Service: Task Scheduler (Schedule) - Unknown owner - C:\WINDOWS\system32\drivers\spools.exe

    --
    End of file - 9537 bytes

    Thank you...for your reply. What do I do next?

    ----------------------------------
    Edit.
    Thank you...for your reply. What do I do next?
    Don't bump, read stickies?

    New topic closed yesterday: http://forums.spybot.info/showthread.php?t=31575

    Post here if still waiting for help in the Malware Forum, (AFTER) FOUR days
    Last edited by tashi; 2008-07-26 at 23:29. Reason: Mod: merged two posts, added links

  2. #2
    Security Expert: Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,288

    Default

    Hi

    Your system is heavily infected


    Disable Spybot's TeaTimer
    • Run Spybot-S&D in Advanced Mode
    • If it is not already set to do this, go to the Mode menu
      select
      Advanced Mode
    • On the left hand side, click on Tools
    • Then click on the Resident icon in the list
    • Uncheck
      Resident TeaTimer
      and OK any prompts.
    • Restart your computer



    You may want to print out these instructions for reference, since you
    will have to restart your computer during the fix.

    Please download FixWareout from one of these sites:
    http://downloads.subratam.org/Fixwareout.exe
    http://www.bleepingcomputer.com/file...Fixwareout.exe


    Save it to your desktop and run it. Click Next, then Install, then make
    sure Run fixit is checked and click Finish. The fix will
    begin; follow the prompts. You will be asked to reboot your computer;
    please do so. Your system may take longer than usual to load; this is
    normal.

    At the end of the fix, you may need to restart your computer again.

    Finally, please post the contents of the logfile C:\fixwareout\report.txt


    Then we'll continue.


    A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine by running ComboFix. This tool is not a toy and not for everyday use.

    1. Download combofix from any of these links and save it to Desktop:
    Link 1
    Link 2
    Link 3

    **Note: It is important that it is saved directly to your desktop**

    2. Double click combofix.exe & follow the prompts.
    3. When finished, it shall produce a log for you (C:\ComboFix.txt). Post that log & a fresh hjt log in your next reply

    Note:
    Do not mouseclick combofix's window whilst it's running. That may cause it to stall

    Combofix should never take more that 20 minutes including the reboot if malware is detected.
    If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
    If that happened we want to know, and also what process you had to end.

    If you have problems with Combofix usage, see here
    Microsoft Windows Insider MVP 2016-2020
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

  3. #3
    Junior Member
    Join Date
    Jul 2008
    Posts
    9

    Default Hello

    I really appreciate your help, thank you. I hope that I did everything correctly up to this point. Here are the reports that you instructed me to send.


    ComboFix 08-07-28.4 - Admin 2008-07-27 7:14:49.1 - FAT32x86
    Microsoft Windows XP Professional 5.1.2600.1.1252.1.1033.18.177 [GMT -7:00]
    Running from: C:\Documents and Settings\Admin.ANGIES\Desktop\ComboFix.exe
    * Created a new restore point

    WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\Documents and Settings\Admin.ANGIES\Application Data\macromedia\Flash Player\#SharedObjects\84688G7A\interclick.com
    C:\Documents and Settings\Admin.ANGIES\Application Data\macromedia\Flash Player\#SharedObjects\84688G7A\interclick.com\ud.sol
    C:\Documents and Settings\Admin.ANGIES\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com
    C:\Documents and Settings\Admin.ANGIES\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com\settings.sol
    C:\Program Files\Antispyware 2008
    C:\Program Files\Antispyware 2008\Antispyware-2008.exe
    C:\Program Files\Antispyware 2008\vscan.tsi
    C:\Program Files\Antispyware 2008\zlib.dll
    C:\WINDOWS\BM6f21a3dd.txt
    C:\WINDOWS\Downloaded Program Files\setup.inf
    C:\WINDOWS\pskt.ini
    C:\WINDOWS\system32\adnpuc.dll
    C:\WINDOWS\system32\awtttrsR.dll
    C:\WINDOWS\system32\byXOeEUm.dll
    C:\WINDOWS\system32\cLlSBJlm.ini
    C:\WINDOWS\system32\cLlSBJlm.ini2
    C:\WINDOWS\system32\ddcYsTnN.dll
    C:\WINDOWS\system32\drivers\msliksurserv.sys
    C:\WINDOWS\system32\drivers\spools.exe
    C:\WINDOWS\system32\eezfnc.dll
    C:\WINDOWS\system32\EhhiSvut.ini
    C:\WINDOWS\system32\EhhiSvut.ini2
    C:\WINDOWS\system32\eMWGffii.ini
    C:\WINDOWS\system32\eMWGffii.ini2
    C:\WINDOWS\system32\fleolcgk.ini
    C:\WINDOWS\system32\ieupdates.exe.tmp
    C:\WINDOWS\system32\iifcDWol.dll
    C:\WINDOWS\system32\IklRCJlm.ini
    C:\WINDOWS\system32\IklRCJlm.ini2
    C:\WINDOWS\system32\juuswa.dll
    C:\WINDOWS\system32\kjvodhrx.ini
    C:\WINDOWS\system32\kkmnnnpo.ini
    C:\WINDOWS\system32\kkmnnnpo.ini2
    C:\WINDOWS\system32\klnhwybw.dll
    C:\WINDOWS\system32\kmhtqxcp.dll
    C:\WINDOWS\system32\latahiab.dll
    C:\WINDOWS\system32\lhgmvbhp.dll
    C:\WINDOWS\system32\mavmxofn.ini
    C:\WINDOWS\system32\mcrh.tmp
    C:\WINDOWS\system32\mlJCRlkI.dll
    C:\WINDOWS\system32\mqovwy.dll
    C:\WINDOWS\system32\msliksurcredo.dll
    C:\WINDOWS\system32\msliksurdns.dll
    C:\WINDOWS\system32\nfoxmvam.dll
    C:\WINDOWS\system32\NmSBdMoq.ini
    C:\WINDOWS\system32\NmSBdMoq.ini2
    C:\WINDOWS\system32\omjblhfr.dll
    C:\WINDOWS\system32\osspyiti.dll
    C:\WINDOWS\system32\pfpgvhgu.ini
    C:\WINDOWS\system32\phbvmghl.ini
    C:\WINDOWS\system32\PqWyIRqr.ini
    C:\WINDOWS\system32\PqWyIRqr.ini2
    C:\WINDOWS\system32\qoMcaxUm.dll
    C:\WINDOWS\system32\rlalmi.dll
    C:\WINDOWS\system32\xrhdovjk.dll
    C:\WINDOWS\system32\YbbIknnn.ini
    C:\WINDOWS\system32\YbbIknnn.ini2
    C:\WINDOWS\system32\YceNnUvw.ini
    C:\WINDOWS\system32\YceNnUvw.ini2
    C:\WINDOWS\system32\ykuxpwub.dll

    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    -------\Service_msliksurserv


    ((((((((((((((((((((((((( Files Created from 2008-06-28 to 2008-07-28 )))))))))))))))))))))))))))))))
    .

    2008-07-27 06:51 . 2008-07-27 06:51 <DIR> d-------- C:\fixwareout
    2008-07-27 06:45 . 2008-07-07 07:26 7,680 --a------ C:\Documents and Settings\Admin.ANGIES\cftmon.exe
    2008-07-27 06:44 . 2008-07-07 07:26 7,680 --a------ C:\Documents and Settings\LocalService\cftmon.exe
    2008-07-27 06:44 . 2008-07-27 06:44 526 --a------ C:\Antispyware-2008.lnk
    2008-07-23 12:39 . 2008-07-23 12:39 18,944 --a------ C:\WINDOWS\system32\sofie.dll
    2008-07-23 02:00 . 2008-07-23 02:00 <DIR> d-------- C:\Program Files\Trend Micro
    2008-07-23 00:23 . 2008-07-23 00:23 <DIR> d-------- C:\Documents and Settings\Admin.ANGIES\Application Data\McAfee
    2008-07-22 23:04 . 2008-07-22 23:04 <DIR> d-------- C:\Documents and Settings\Admin.ANGIES\Application Data\ArcSoft
    2008-07-22 22:20 . 2008-07-22 22:20 <DIR> d-------- C:\Program Files\JL2005A
    2008-07-22 22:18 . 2008-07-22 22:18 361 --a------ C:\WINDOWS\videomvp.ini
    2008-07-22 22:17 . 2008-07-22 22:17 <DIR> d-------- C:\Program Files\ArcSoft
    2008-07-22 22:17 . 1998-07-21 20:29 21 --a------ C:\WINDOWS\CS_SETUP.ini
    2008-07-14 06:19 . 2008-07-14 06:19 26,624 --a------ C:\WINDOWS\system32\avirasafe.dll
    2008-07-11 08:46 . 2008-07-27 06:41 2,488 --a------ C:\WINDOWS\wininit.ini
    2008-07-11 06:59 . 2008-07-11 06:59 <DIR> d-------- C:\Program Files\Spybot - Search & Destroy
    2008-07-11 06:59 . 2008-07-11 06:59 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
    2008-07-11 06:57 . 2008-07-11 06:57 <DIR> d-------- C:\Documents and Settings\Admin.ANGIES
    2008-07-11 06:49 . 2008-07-11 06:49 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
    2008-07-10 07:57 . 2008-07-10 07:57 <DIR> d-------- C:\Program Files\CCleaner
    2008-07-10 07:40 . 2008-07-10 07:40 <DIR> d-------- C:\Program Files\Common Files\Motive
    2008-07-10 07:40 . 2008-07-10 07:40 <DIR> d-------- C:\Program Files\Common Files\Java
    2008-07-10 06:50 . 2008-07-10 06:50 <DIR> d---s---- C:\Documents and Settings\Admin
    2008-07-10 06:41 . 2008-07-10 06:41 <DIR> d-------- C:\WINDOWS\system32\NtmsData
    2008-07-09 03:07 . 2008-07-27 07:12 111,492 --a------ C:\WINDOWS\BM6f21a3dd.xml
    2008-07-08 02:54 . 2008-07-08 02:54 <DIR> d--hs---- C:\FOUND.006
    2008-07-07 07:31 . 2008-07-07 07:31 26,624 --a------ C:\WINDOWS\system32\avg_sr.dll
    2008-07-07 07:30 . 2008-07-07 07:30 25,088 --a------ C:\WINDOWS\system32\diga32.dll
    2008-07-04 03:36 . 2008-07-04 03:36 8,192 --a------ C:\30gp67.exe

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2008-04-09 08:32 744 ----a-w C:\Documents and Settings\angela storey\Application Data\filterclsid.dat
    2007-12-06 08:54 774,144 ----a-w C:\Program Files\RngInterstitial.dll
    2006-09-23 06:27 67,184 ----a-w C:\Documents and Settings\angela storey\Application Data\GDIPFONTCACHEV1.DAT
    2006-05-01 06:35 36,864 ----a-w C:\Program Files\Spelling words.doc
    2006-03-01 05:31 25,088 ----a-w C:\Program Files\Prophecy 06-09-05 Stockton.doc
    2001-09-10 16:00 139,264 ----a-w C:\WINDOWS\inf\i386\Rtscan.dll
    2001-09-10 15:10 61,440 ----a-w C:\WINDOWS\inf\i386\onetUSD.dll
    2001-08-18 01:43 32,768 ----a-w C:\WINDOWS\inf\i386\Wiamicro.dll
    2001-08-04 01:29 13,824 ----a-w C:\WINDOWS\inf\i386\usbscan.sys
    2001-06-29 15:10 163,840 ----a-w C:\WINDOWS\inf\i386\viceo.dll
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{A4D16645-4149-41FB-B670-E06072E540C1}]
    2008-07-23 12:39 18944 --a------ C:\WINDOWS\System32\sofie.dll

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ctfmon.exe"="C:\WINDOWS\System32\ctfmon.exe" [2002-08-29 12:00 13312]

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "MySpaceIM"="C:\Program Files\MySpace\IM\MySpaceIM.exe" [2007-12-06 23:33 8720384]

    C:\Documents and Settings\angela storey\Start Menu\Programs\Startup\
    LimeWire On Startup.lnk - C:\Program Files\LimeWire\LimeWire.exe [2007-12-03 13:35:53 147456]

    C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
    PowerReg Scheduler.exe [2006-02-18 15:46:34 256000]
    SBC Self Support Tool.lnk - C:\Program Files\SBC Self Support Tool\bin\matcli.exe [2007-10-28 16:25:02 217088]

    R1 ATMhelpr;ATMhelpr;C:\WINDOWS\System32\drivers\ATMhelpr.sys [1997-06-17 04:00]
    R2 lxdc_device;lxdc_device;C:\WINDOWS\System32\lxdccoms.exe [2007-05-25 02:38]
    R2 ppsio2;PPDevice;C:\WINDOWS\System32\drivers\ppsio2.sys [1999-06-30 02:49]
    S2 Ca533av;VCamNow Video Capture;C:\WINDOWS\System32\Drivers\Ca533av.sys [2002-10-21 11:37]
    S2 lxdcCATSCustConnectService;lxdcCATSCustConnectService;C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxdcserv.exe [2007-05-25 02:38]
    S2 UMAXPCLS;Print Port Scanner Driver;C:\WINDOWS\System32\DRIVERS\umaxpcls.sys [2001-08-17 13:58]
    S3 01e1F;01e1F;C:\WINDOWS\System32\01e1F.sys []
    S3 0c57;0c57;C:\WINDOWS\System32\0c57.sys []
    S3 1401E;1401E;C:\WINDOWS\System32\1401E.sys []
    S3 18818;18818;C:\WINDOWS\System32\18818.sys []
    S3 1d716;1d716;C:\WINDOWS\System32\1d716.sys []
    S3 2a34;2a34;C:\WINDOWS\System32\2a34.sys []
    S3 30f2;30f2;C:\WINDOWS\System32\30f2.sys []
    S3 34314;34314;C:\WINDOWS\System32\34314.sys []
    S3 41d1C;41d1C;C:\WINDOWS\System32\41d1C.sys []
    S3 46c1A;46c1A;C:\WINDOWS\System32\46c1A.sys []
    S3 5dbA;5dbA;C:\WINDOWS\System32\5dbA.sys []
    S3 60fE;60fE;C:\WINDOWS\System32\60fE.sys []
    S3 6ea3;6ea3;C:\WINDOWS\System32\6ea3.sys []
    S3 74917;74917;C:\WINDOWS\System32\74917.sys []
    S3 75813;75813;C:\WINDOWS\System32\75813.sys []
    S3 76b10;76b10;C:\WINDOWS\System32\76b10.sys []
    S3 7c9B;7c9B;C:\WINDOWS\System32\7c9B.sys []
    S3 8ae6;8ae6;C:\WINDOWS\System32\8ae6.sys []
    S3 a531B;a531B;C:\WINDOWS\System32\a531B.sys []
    S3 a8bC;a8bC;C:\WINDOWS\System32\a8bC.sys []
    S3 a9a12;a9a12;C:\WINDOWS\System32\a9a12.sys []
    S3 b81F;b81F;C:\WINDOWS\System32\b81F.sys []
    S3 c7e8;c7e8;C:\WINDOWS\System32\c7e8.sys []
    S3 f5b20;f5b20;C:\WINDOWS\System32\f5b20.sys []
    S3 USBCamera;VCamNow Digital Camera;C:\WINDOWS\System32\Drivers\Bulk533.sys [2002-11-22 09:25]

    *Newly Created Service* - ALG
    *Newly Created Service* - IPNAT
    .
    Contents of the 'Scheduled Tasks' folder

    2007-04-24 C:\WINDOWS\Tasks\Accessibility Wizard.job
    - C:\WINDOWS\system32\accwiz.exe [2002-08-29 05:00]

    2008-07-02 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job
    - C:\Program Files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 14:57]
    .
    - - - - ORPHANS REMOVED - - - -

    BHO-{2F8BF994-F0EA-4A73-B6BA-EF93DBE16B63} - C:\WINDOWS\System32\nnnkIbbY.dll
    BHO-{5A3AFBB4-3119-49FE-9DA8-407FE5F7211C} - C:\WINDOWS\System32\wvUnNecY.dll
    BHO-{680DBEE8-B862-4B3B-9A3B-3F6DD618BA25} - C:\WINDOWS\System32\mlJBSlLc.dll
    BHO-{74C466E9-2FC5-43D7-8560-FE4362A2A30E} - C:\WINDOWS\System32\rqRIyWqP.dll
    BHO-{9E2C792A-1249-49BC-B1E3-27E1C7061905} - C:\WINDOWS\System32\iiffGWMe.dll
    BHO-{A7DAFB2E-E95B-4F23-B681-90C8040E5A96} - C:\WINDOWS\System32\qoMdBSmN.dll
    BHO-{E135EFEB-9E21-4EF4-8E24-2EDD98F6C87F} - C:\WINDOWS\System32\opnnnmkk.dll
    HKLM-Run-C:\WINDOWS\system32\kdolk.exe - C:\WINDOWS\system32\kdolk.exe
    HKLM-Run-C:\WINDOWS\System32\kddgq.exe - C:\WINDOWS\System32\kddgq.exe
    HKLM-Run-BM6f21a3dd - C:\WINDOWS\System32\osspyiti.dll
    HKLM-Run-6c129041 - C:\WINDOWS\System32\lhgmvbhp.dll
    HKU-Default-Run-Antispyware-2008.exe - C:\Program Files\Antispyware 2008\Antispyware-2008.exe


    .
    ------- Supplementary Scan -------
    .
    R0 -: HKLM-Main,Search Bar = hxxp://red.clientapps.yahoo.com/customize/ie/defaults/sb/sbcydsl/*http://www.yahoo.com/search/ie.html
    O9 -: {c95fe080-8f5d-11d2-a20b-00aa003c157a} - %SystemRoot%\web\related.htm
    O17 -: HKLM\CCS\Interface\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
    O17 -: HKLM\CCS\Interface\{3ECE3F59-2495-49E1-9F9C-DD73ACCF6C6E}: NameServer = 208.67.220.220,208.67.222.222

    O16 -: DirectAnimation Java Classes - file://C:\WINDOWS\Java\classes\dajava.cab
    C:\WINDOWS\Downloaded Program Files\DirectAnimation Java Classes.osd

    O16 -: Microsoft XML Parser for Java - file://C:\WINDOWS\Java\classes\xmldso.cab
    C:\WINDOWS\Downloaded Program Files\Microsoft XML Parser for Java.osd


    **************************************************************************

    catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-07-28 07:36:38
    Windows 5.1.2600 Service Pack 1 FAT NTAPI

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    PROCESS: C:\WINDOWS\system32\lsass.exe
    -> C:\Program Files\Google\Google Desktop Search\GoogleDesktopNetwork1.dll

    PROCESS: C:\WINDOWS\explorer.exe
    -> C:\PROGRA~1\Google\GOOGLE~1\GOOGLE~2.DLL
    .
    ------------------------ Other Running Processes ------------------------
    .
    C:\WINDOWS\SYSTEM32\RUNDLL32.EXE
    C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\VS7DEBUG\MDM.EXE
    C:\PROGRAM FILES\MICROSOFT SQL SERVER\MSSQL$MICROSOFTBCM\BINN\SQLSERVR.EXE
    .
    **************************************************************************
    .
    Completion time: 2008-07-28 7:38:40 - machine was rebooted
    ComboFix-quarantined-files.txt 2008-07-28 14:38:36

    Pre-Run: 9,767,124,992 bytes free
    Post-Run: 9,699,983,360 bytes free

    225 --- E O F --- 2007-11-01 08:39:36



    Fresh HJT Report

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 7:41:48 AM, on 7/28/2008
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\System32\lxdccoms.exe
    C:\WINDOWS\system32\rundll32.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTBCM\Binn\sqlservr.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\ctfmon.exe
    C:\WINDOWS\System32\wuauclt.exe
    C:\WINDOWS\System32\wuauclt.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\system32\notepad.exe
    C:\WINDOWS\system32\msiexec.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/cust...search/ie.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: BHO.toolbar3 - {A4D16645-4149-41FB-B670-E06072E540C1} - C:\WINDOWS\System32\sofie.dll
    O3 - Toolbar: Lexmark Toolbar - {1017A80C-6F09-4548-A84D-EDD6AC9525F0} - C:\Program Files\Lexmark Toolbar\toolband.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O4 - HKLM\..\Run: [C:\WINDOWS\system32\kdolk.exe] C:\WINDOWS\system32\kdolk.exe
    O4 - HKLM\..\Run: [C:\WINDOWS\System32\kddgq.exe] C:\WINDOWS\System32\kddgq.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
    O4 - HKUS\S-1-5-18\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'Default user')
    O4 - Global Startup: PowerReg Scheduler.exe
    O4 - Global Startup: SBC Self Support Tool.lnk = C:\Program Files\SBC Self Support Tool\bin\matcli.exe
    O9 - Extra button: AT&T Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\PROGRA~1\YAHOO!\COMMON\yiesrvc.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm (file missing)
    O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm (file missing)
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O15 - Trusted Zone: http://*.mcafee.com
    O17 - HKLM\System\CCS\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CCS\Services\Tcpip\..\{3ECE3F59-2495-49E1-9F9C-DD73ACCF6C6E}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CS1\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CS2\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: lxdcCATSCustConnectService - Lexmark International, Inc. - C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxdcserv.exe
    O23 - Service: lxdc_device - - C:\WINDOWS\System32\lxdccoms.exe

    --
    End of file - 4726 bytes

  4. #4
    Security Expert: Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,288

    Default

    Hi

    Could you post Fixwareout report too, please?
    Microsoft Windows Insider MVP 2016-2020
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

  5. #5
    Junior Member
    Join Date
    Jul 2008
    Posts
    9

    Smile Fixwareout report

    Here's the report for you.



    Username "Admin" - 07/27/2008 6:52:08 [Fixwareout edited 9/01/2007

    ~~~~~ Prerun check

    Successfully flushed the DNS Resolver Cache.


    System was rebooted successfully.

    ~~~~~ Postrun check
    HKLM\SOFTWARE\~\Winlogon\ "System"=""
    ....
    ....
    ~~~~~ Misc files.
    ....
    ~~~~~ Checking for older varients.
    ....

    ~~~~~ Current runs (hklm hkcu "run" Keys Only)
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ntuser"="C:\\WINDOWS\\system32\\drivers\\spools.exe"
    "C:\\WINDOWS\\system32\\kdolk.exe"="C:\\WINDOWS\\system32\\kdolk.exe"
    "C:\\WINDOWS\\System32\\kddgq.exe"="C:\\WINDOWS\\System32\\kddgq.exe"
    "6c129041"="rundll32.exe \"C:\\WINDOWS\\System32\\xrhdovjk.dll\",b"
    "autoload"="C:\\Documents and Settings\\Admin.ANGIES\\cftmon.exe"
    "BM6f21a3dd"="Rundll32.exe \"C:\\WINDOWS\\System32\\osspyiti.dll\",s"

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ntuser"="C:\\WINDOWS\\system32\\drivers\\spools.exe"
    "ctfmon.exe"="C:\\WINDOWS\\System32\\ctfmon.exe"
    "autoload"="C:\\Documents and Settings\\Admin.ANGIES\\cftmon.exe"
    ....
    Hosts file was reset, If you use a custom hosts file please replace it...
    ~~~~~ End report ~~~~~

  6. #6
    Security Expert: Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,288

    Default

    Hi


    Upload following files to http://virusscan.jotti.org and post back the results:
    C:\WINDOWS\videomvp.ini
    C:\30gp67.exe


    Start hjt, do a system scan, check (if found):
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/cust...search/ie.html
    O4 - HKLM\..\Run: [C:\WINDOWS\system32\kdolk.exe] C:\WINDOWS\system32\kdolk.exe
    O4 - HKLM\..\Run: [C:\WINDOWS\System32\kddgq.exe] C:\WINDOWS\System32\kddgq.exe
    O4 - Global Startup: PowerReg Scheduler.exe
    O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm (file missing)
    O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm (file missing)
    O17 - HKLM\System\CCS\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222 <--if not your internet service provider's address
    O17 - HKLM\System\CCS\Services\Tcpip\..\{3ECE3F59-2495-49E1-9F9C-DD73ACCF6C6E}: NameServer = 208.67.220.220,208.67.222.222 <--if not your internet service provider's address
    O17 - HKLM\System\CS1\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222 <--if not your internet service provider's address
    O17 - HKLM\System\CS2\Services\Tcpip\..\{2D25CCBC-ECB6-4AD7-ACEB-15FACE35C238}: NameServer = 208.67.220.220,208.67.222.222 <--if not your internet service provider's address

    Close browsers and other windows. Click fix checked.

    Open notepad and copy/paste the text in the quotebox below into it:

    Code:
    Driver::
    01e1F
    0c57
    1401E
    18818
    1d716
    2a34
    30f2
    34314
    41d1C
    46c1A
    5dbA
    60fE
    6ea3
    74917
    75813
    76b10
    7c9B
    8ae6
    a531B
    a8bC
    a9a12
    b81F
    c7e8
    f5b20
    
    File::
    C:\Documents and Settings\Admin.ANGIES\cftmon.exe
    C:\Documents and Settings\LocalService\cftmon.exe
    C:\Antispyware-2008.lnk
    C:\WINDOWS\system32\sofie.dll
    C:\WINDOWS\system32\avirasafe.dll
    C:\WINDOWS\BM6f21a3dd.xml
    C:\WINDOWS\system32\avg_sr.dll
    C:\WINDOWS\system32\diga32.dll
    C:\WINDOWS\System32\01e1F.sys
    C:\WINDOWS\System32\0c57.sys
    C:\WINDOWS\System32\1401E.sys
    C:\WINDOWS\System32\18818.sys
    C:\WINDOWS\System32\1d716.sys
    C:\WINDOWS\System32\2a34.sys
    C:\WINDOWS\System32\30f2.sys
    C:\WINDOWS\System32\34314.sys
    C:\WINDOWS\System32\41d1C.sys
    C:\WINDOWS\System32\46c1A.sys
    C:\WINDOWS\System32\5dbA.sys
    C:\WINDOWS\System32\60fE.sys
    C:\WINDOWS\System32\6ea3.sys
    C:\WINDOWS\System32\74917.sys
    C:\WINDOWS\System32\75813.sys
    C:\WINDOWS\System32\76b10.sys
    C:\WINDOWS\System32\7c9B.sys
    C:\WINDOWS\System32\8ae6.sys
    C:\WINDOWS\System32\a531B.sys
    C:\WINDOWS\System32\a8bC.sys
    C:\WINDOWS\System32\a9a12.sys
    C:\WINDOWS\System32\b81F.sys
    C:\WINDOWS\System32\c7e8.sys
    C:\WINDOWS\System32\f5b20.sys
    C:\WINDOWS\system32\kdolk.exe
    C:\WINDOWS\System32\kddgq.exe
    
    Registry::
    [-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{A4D16645-4149-41FB-B670-E06072E540C1}]

    Save this as
    CFScript

    A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine. This tool is not a toy and not for everyday use.



    Refering to the picture above, drag CFScript into ComboFix.exe
    Then post the resultant log.


    Combofix should never take more that 20 minutes including the reboot if malware is detected.
    If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
    If that happened we want to know, and also what process you had to end.


    Download ATF (Atribune Temp File) Cleaner© by Atribune to your desktop.

    Double-click ATF Cleaner.exe to open it

    Under Main choose:
    Windows Temp
    Current User Temp
    All Users Temp
    Cookies
    Temporary Internet Files
    Prefetch
    Java Cache

    *The other boxes are optional*
    Then click the Empty Selected button.

    If you use Firefox:
    Click Firefox at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

    If you use Opera:
    Click Opera at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

    Click Exit on the Main menu to close the program.

    Please download Malwarebytes' Anti-Malware to your desktop.

    • Double-click mbam-setup.exe and follow the prompts to install the program.
    • At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    • If an update is found, it will download and install the latest version.
    • Once the program has loaded, select Perform full scan, then click Scan.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Be sure that everything is checked, and click Remove Selected.
    • When completed, a log will open in Notepad. Please save it to a convenient location. The log can also be found here: C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
    • Please post contents of that file & a fresh hjt log (don't forget above meantioned ComboFix resultant log) in your next reply.
    Microsoft Windows Insider MVP 2016-2020
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

  7. #7
    Junior Member
    Join Date
    Jul 2008
    Posts
    9

    Default Oops

    I forgot to delete the files that you instructed me to (30gp67.exe & 30gp67) before the Kapersky scan. I just deleted them now. Does that matter?

  8. #8
    Security Expert: Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,288

    Default

    I forgot to delete the files that you instructed me to (30gp67.exe & 30gp67) before the Kapersky scan. I just deleted them now. Does that matter?
    Hi

    No, that doesn't matter

    Delete following files:
    C:\Documents and Settings\angela storey\Desktop\I5aac\phycosocal slipknot.mp3
    C:\Documents and Settings\angela storey\Incomplete\T-3545425-phycosocial slipknot.mp3
    C:\Documents and Settings\angela storey\Shared\emmbeded job for cowboy doom.mp3
    C:\Documents and Settings\angela storey\Shared\phycosocal slipknot.mp3
    C:\Documents and Settings\angela storey\Shared\phycosocial slipknot.mp3
    C:\Documents and Settings\angela storey\Shared\emmbeded job for cow boy doom.mp3

    and C:\FOUND.006 folder.


    Well congrats, it appears your system is all clean Are you still noticing any problems? If not, it's time to secure your system to prevent against further intrusions.


    THESE STEPS ARE VERY IMPORTANT

    Let's reset system restore
    Reset and Re-enable your System Restore to remove infected files that have been backed up by Windows. The files in System Restore are protected to prevent any programs changing those files. This is the only way to clean these files: You will lose all previous restore points which are likely to be infected. Please note you need Administrator Access to do clean the restore points.

    1. Turn off System Restore.
    On the Desktop, right-click My Computer.
    Click Properties.
    Click the System Restore tab.
    Check Turn off System Restore.
    Click Apply, and then click OK.

    2. Reboot.

    3. Turn ON System Restore.
    On the Desktop, right-click My Computer.
    Click Properties.
    Click the System Restore tab.
    UN-Check *Turn off System Restore*.
    Click Apply, and then click OK.
    NOTE: only do this ONCE,NOT on a regular basis



    Now lets uninstall ComboFix:
    • Click START then RUN
    • Now type Combofix /u in the runbox and click OK






    UPDATING WINDOWS AND INTERNET EXPLORER

    IMPORTANT: You Need to Update Windows and Internet Explorer to protect your computer from the malware that is around on the Internet. Please go to the windows update site to get the critical updates.

    If you are running Microsoft Office, or any portion thereof, go to the Microsoft's Office Update site and make sure you have at least all the critical updates installed (Free) Microsoft Office Update.


    Make your Internet Explorer more secure

    This can be done by following these simple instructions:
    From within Internet Explorer click on the Tools menu and then click on Options.
    Click once on the Security tab
    Click once on the Internet icon so it becomes highlighted.
    Click once on the Custom Level button.
    Change the Download signed ActiveX controls to Prompt
    Change the Download unsigned ActiveX controls to Disable
    Change the Initialize and script ActiveX controls not marked as safe to Disable
    Change the Installation of desktop items to Prompt
    Change the Launching programs and files in an IFRAME to Prompt
    Change the Navigate sub-frames across different domains to Prompt
    When all these settings have been made, click on the OK button.
    If it prompts you as to whether or not you want to save the settings, press the Yes button.
    Next press the Apply button and then the OK to exit the Internet Properties page.



    The following are recommended third party programs that are designed to keep your computer clean. A link as well as a brief description is included with each item.

    • Download Adaware
      Adaware is a free program. It scans for known spyware on your computer. These scans should be run at least once every two weeks. For more information, see this tutorial
      The program is available for download here
    • Download SpywareBlaster
      Spyware blaster is a program that stops known malicious activex controls from installing on your computer. It works by changing settings in your registry. It makes
      kill bits
      in the registry, so that certain activex controls can't install.
      If you don't know what activex controls are, see here
      You can download SpywareBlaster here here
      SpywareBlaster tutorial
    • hosts file:
      • Every version of windows has a hosts file as part of them.
      • In a very basic sense, they are used to locate webpages.
      • We can customize a hosts file so that it blocks certain webpages.
      • However, it can slow down certain computers.
      • This is why using a hosts file is optional!!

      Download it here. Make sure you read the instructions on how to install the hosts file. There is a good tutorial here
      If you decide to download the hosts file, the slowdown problems can usually be avoided by following these steps:
      1. Click the start button (at the lower left hand corner of your screen)
      2. Click run
      3. In the dialog box, type services.msc
      4. hit enter, then locate dns client
      5. Highlight it, then double-click it.
      6. On the dropdown box, change the setting from automatic to manual.
      7. Click ok



    • Get Anti Virus Software and keep it updated - Most AVs will update automatically, but if not I would recommend making updating the AV the first job every time the PC is connected to the internet. An AV that is using defs that are seven days old is not going to be much protection. If you do not update your anti virus software then it will not be able to catch any of the new variants that may come out. See here to choose one
    • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is susceptible to being hacked and taken over. Simply using a Firewall in its default configuration can lower your risk greatly. For more info, check this webpage out.
      See here to choose one



    Just a final reminder for you. I am trying to stress these two points.
    UPDATE UPDATE UPDATE!!! Make sure you do this about every 1-2 weeks.
    Make sure all of your security programs are up to date.
    Run the spybot and malwarebytes' anti-malware regularly. (Once or twice a week minimum.)
    Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.



    Once again, please post and tell me how things are going with your system... problems etc.

    Have a great day,
    Blade
    Microsoft Windows Insider MVP 2016-2020
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

  9. #9
    Junior Member
    Join Date
    Jul 2008
    Posts
    9

    Smile Hi....I'm still here

    Thanks for all your help. I followed the instructions that you gave me. I installed Spywareblaster, avast anti-virus. I also installed a firewall but I had to uninstall it because it bloked everything and I couldn't connect with the internet until I uninstalled it. Any suggestions? The other issue is I ran avast and it showed an infected file (C:\System Volume Information\_restore\Win32:Trogan-ge...) I put it in the chest because I don't know if it is an important file that should not be deleted. I ran spybot and it showed these infections:
    Ad Revolver
    Double Click
    Fraud.XPAntivirus
    Statcounter
    I clicked "fix these problems". Does that mean that they are removed from my machine?

    Everything is much better than before.

  10. #10
    Security Expert: Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,288

    Default

    Hi

    Did you update Windows? Your service pack 1 is too vulnerable connected to the internet today. Windows update is the most important thing in your case.

    I also installed a firewall but I had to uninstall it because it bloked everything and I couldn't connect with the internet until I uninstalled it. Any suggestions?
    Firewall must be configured correctly. Makers have usually good forums where end users can ask questions if they have problems with the program.
    Microsoft Windows Insider MVP 2016-2020
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •