-
-
Hello sayanwader
Welcome to Safer Networking.
Please read Before You Post
That said, All advice given by anyone volunteering here, is taken at own risk.
While best efforts are made to assist in removing infections safely, unexpected stuff can happen.
You are still very much infected with the Vundo Trojan and its preventing you from updating your system.
Open HijackThis > Do a System Scan Only, close your browser and all open windows including this one, the only program or window you should have open is HijackThis, check the following entries and click on Fix Checked.
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [58481eae] rundll32.exe "C:\WINDOWS\system32\flmmtelo.dll",b
O4 - HKLM\..\Run: [BM5b7b2d32] Rundll32.exe "C:\WINDOWS\system32\vrwwwlyw.dll",s
O20 - AppInit_DLLs: lewvbt.dll
Please download Malwarebytes' Anti-Malware from Here or Here
Double Click mbam-setup.exe to install the application.
- Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
- If an update is found, it will download and install the latest version.
- Once the program has loaded, select "Perform Quick Scan", then click Scan.
- The scan may take some time to finish,so please be patient.
- When the scan is complete, click OK, then Show Results to view the results.
- Make sure that everything is checked, and click Remove Selected.<-- Don't forget this
- When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
- The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
- Copy and Paste the entire report in your next reply along with a New Hijackthis log.
-
thanks for ur reply pal..
but i cannot find the lines that u've give me, instead i found
O4 - HKLM\..\Run: [BM5b7b2d32] Rundll32.exe "C:\WINDOWS\system32\qbpudnlt.dll",s
O4 - HKLM\..\Run: [58481eae] rundll32.exe "C:\WINDOWS\system32\wryxvheg.dll",b
the letters in bold r the only difference..shall i proceed with ur steps?
-
Yes, please do, these files change names faster than you change your socks
-
oh!!
i've done what u said..
here's my mbam-log
Malwarebytes' Anti-Malware 1.28
Database version: 1227
Windows 5.1.2600 Service Pack 2
10/4/2008 5:36:02 PM
mbam-log-2008-10-04 (17-36-02).txt
Scan type: Quick Scan
Objects scanned: 38777
Time elapsed: 3 minute(s), 36 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 5
Registry Keys Infected: 13
Registry Values Infected: 1
Registry Data Items Infected: 3
Folders Infected: 0
Files Infected: 28
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
C:\WINDOWS\system32\kkltrrpf.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\qoMgeeed.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\sifbxa.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\ewemgubo.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\kellyh.dll (Trojan.Vundo.H) -> Delete on reboot.
Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5f07cd60-9855-487c-9331-c2d85d39c2c6} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{5f07cd60-9855-487c-9331-c2d85d39c2c6} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9eb35cbd-7ebe-42b0-bd05-5ec1cd0a1336} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{9eb35cbd-7ebe-42b0-bd05-5ec1cd0a1336} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Bifrost (Backdoor.Bifrose) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Bifrost (Backdoor.Bifrose) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IProxyProvider (Trojan.Vundo) -> Quarantined and deleted successfully.
and my HijackThis log
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 5:39:01 PM, on 10/4/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\VTTimer.exe
C:\WINDOWS\system32\VTtrayp.exe
C:\Program Files\DU Meter\DUMeter.exe
C:\Program Files\ESET\ESET Smart Security\egui.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\VIA\RAID\raid_tool.exe
H:\Vista Inspirat 2\RocketDock\RocketDock.exe
C:\Program Files\ESET\ESET Smart Security\ekrn.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\mspaint.exe
G:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: (no name) - {018B27FF-E05F-4CB5-8763-540CB3FD457A} - (no file)
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - H:\Real Player\rpbrowserrecordplugin.dll
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O2 - BHO: FlashGet GetFlash Class - {F156768E-81EF-470C-9057-481BA8380DBA} - g:\Program Files\FlashGet\getflash.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O4 - HKLM\..\Run: [VTTimer] VTTimer.exe
O4 - HKLM\..\Run: [VTTrayp] VTtrayp.exe
O4 - HKLM\..\Run: [DU Meter] C:\Program Files\DU Meter\DUMeter.exe
O4 - HKLM\..\Run: [egui] "C:\Program Files\ESET\ESET Smart Security\egui.exe" /hide /waitservice
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - Startup: RocketDock.lnk = H:\Vista Inspirat 2\RocketDock\RocketDock.exe
O4 - Global Startup: VIA RAID TOOL.lnk = C:\Program Files\VIA\RAID\raid_tool.exe
O8 - Extra context menu item: &Download All with FlashGet - G:\Program
am i clean from Voundo now?
-
and i also got this Error message at statup
Error loading C:\WINDOWS\system32\jlalqlyh.dll
The specefied module could not be found.
-
Good Morning,
The error your getting is because a file used by the Vundo trojan was deleted and the infection is looking for it, not to worry as it will be gone when we're done.
I need to see the ENTIRE malwarebytes log and the ENTIRE HJT log, you only posted partial logs
-
sorry pal...
Hijack this log :
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 10:21:22 AM, on 10/5/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\ESET\ESET Smart Security\ekrn.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\VTTimer.exe
C:\WINDOWS\system32\VTtrayp.exe
C:\Program Files\DU Meter\DUMeter.exe
C:\Program Files\ESET\ESET Smart Security\egui.exe
C:\Program Files\VIA\RAID\raid_tool.exe
H:\Vista Inspirat 2\RocketDock\RocketDock.exe
C:\Program Files\Mozilla Firefox\firefox.exe
G:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: (no name) - {018B27FF-E05F-4CB5-8763-540CB3FD457A} - (no file)
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - H:\Real Player\rpbrowserrecordplugin.dll
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O2 - BHO: FlashGet GetFlash Class - {F156768E-81EF-470C-9057-481BA8380DBA} - g:\Program Files\FlashGet\getflash.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - G:\Program Files\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll
O4 - HKLM\..\Run: [VTTimer] VTTimer.exe
O4 - HKLM\..\Run: [VTTrayp] VTtrayp.exe
O4 - HKLM\..\Run: [DU Meter] C:\Program Files\DU Meter\DUMeter.exe
O4 - HKLM\..\Run: [egui] "C:\Program Files\ESET\ESET Smart Security\egui.exe" /hide /waitservice
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [Veoh] "G:\Program Files\Veoh Networks\Veoh\VeohClient.exe" /VeohHide
O4 - Startup: RocketDock.lnk = H:\Vista Inspirat 2\RocketDock\RocketDock.exe
O4 - Global Startup: VIA RAID TOOL.lnk = C:\Program Files\VIA\RAID\raid_tool.exe
O8 - Extra context menu item: &Download All with FlashGet - G:\Program Files\FlashGet\jc_all.htm
O8 - Extra context menu item: &Download with FlashGet - G:\Program Files\FlashGet\jc_link.htm
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - g:\Program Files\FlashGet\FlashGet.exe
O9 - Extra 'Tools' menuitem: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - g:\Program Files\FlashGet\FlashGet.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsu...?1223009094218
O17 - HKLM\System\CCS\Services\Tcpip\..\{8D2FBEEC-67B0-41B0-AA9B-EEA32046BCD3}: NameServer = 218.248.240.181 218.248.240.23
O20 - Winlogon Notify: fccyvSKc - C:\WINDOWS\
O23 - Service: Eset HTTP Server (EhttpSrv) - ESET - C:\Program Files\ESET\ESET Smart Security\EHttpSrv.exe
O23 - Service: Eset Service (ekrn) - ESET - C:\Program Files\ESET\ESET Smart Security\ekrn.exe
O23 - Service: TuneUp Drive Defrag Service (TuneUp.Defrag) - TuneUp Software GmbH - C:\WINDOWS\System32\TuneUpDefragService.exe
--
End of file - 4612 bytes
Malwarebytes' Anti-Malware log (after running for the first time)
Malwarebytes' Anti-Malware 1.28
Database version: 1227
Windows 5.1.2600 Service Pack 2
10/4/2008 5:36:02 PM
mbam-log-2008-10-04 (17-36-02).txt
Scan type: Quick Scan
Objects scanned: 38777
Time elapsed: 3 minute(s), 36 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 5
Registry Keys Infected: 13
Registry Values Infected: 1
Registry Data Items Infected: 3
Folders Infected: 0
Files Infected: 28
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
C:\WINDOWS\system32\kkltrrpf.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\qoMgeeed.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\sifbxa.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\ewemgubo.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\kellyh.dll (Trojan.Vundo.H) -> Delete on reboot.
Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5f07cd60-9855-487c-9331-c2d85d39c2c6} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{5f07cd60-9855-487c-9331-c2d85d39c2c6} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9eb35cbd-7ebe-42b0-bd05-5ec1cd0a1336} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{9eb35cbd-7ebe-42b0-bd05-5ec1cd0a1336} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Bifrost (Backdoor.Bifrose) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Bifrost (Backdoor.Bifrose) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IProxyProvider (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bm5b7b2d32 (Trojan.Agent) -> Delete on reboot.
Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\qomgeeed -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\regfile\shell\open\command\ (Broken.OpenCommand) -> Bad: ("regedit.exe" "%1") Good: (regedit.exe "%1") -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\qomgeeed -> Delete on reboot.
Folders Infected:
(No malicious items detected)
Files Infected:
C:\WINDOWS\system32\qoMgeeed.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\deeegMoq.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\deeegMoq.ini2 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\kellyh.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\gdyennkk.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\kknneydg.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\kkltrrpf.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\fprrtlkk.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\koxdoodg.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\gdoodxok.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wryxvheg.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\gehvxyrw.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\sifbxa.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\ewemgubo.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\qbpudnlt.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\cnxowpyi.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\eccwwnql.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lipqed.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\bothhebr.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\E9SHUVK9\nd82m0[1] (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\QV2FY5CJ\upd105320[1] (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mcrh.tmp (Malware.Trace) -> Quarantined and deleted successfully.
C:\disconn.bat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jlalqlyh.dll (Trojan.Agent) -> Delete on reboot.
C:\Documents and Settings\Administrator\Application Data\addon.dat (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\pskt.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\BM5b7b2d32.xml (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\BM5b7b2d32.txt (Trojan.Vundo) -> Quarantined and deleted successfully.
Malwarebytes' Anti-Malware log (after the second scan):
Malwarebytes' Anti-Malware 1.28
Database version: 1227
Windows 5.1.2600 Service Pack 2
10/5/2008 10:31:12 AM
mbam-log-2008-10-05 (10-31-12).txt
Scan type: Quick Scan
Objects scanned: 38549
Time elapsed: 6 minute(s), 44 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
(No malicious items detected)
Registry Values Infected:
(No malicious items detected)
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
(No malicious items detected)
Files Infected:
(No malicious items detected)
-
Thanks for the new logs,
Remove this with HJT
O20 - Winlogon Notify: fccyvSKc - C:\WINDOWS\
Please download ATF Cleaner by Atribune to your desktop.
- This program is for XP and Windows 2000 only
- Double-click ATF-Cleaner.exe to run the program.
- Under Main choose: Select All
- Click the Empty Selected button.
Your system may start up slower after running ATF Cleaner, this is expected but will be back to normal after the first or second boot up
Please note: If you use online banking or are registered online with any other organizations, ensure you have memorized password and other personal information as removing cookies will temporarily disable the auto-login facility.
Download ComboFix from Here or Here to your Desktop.
In the event you already have Combofix, this is a new version that I need you to download.
It must be saved directly to your desktop.
1. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
- Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan.
- Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
- Remember to re enable the protection again afterwards before connecting to the net
2. Close any open browsers and make sure you are disconnected from the net. Unplug the cable if need be before running combofix.
- IF you have not already done so Combofix will disconnect your machine from the Internet when it starts.
- If there is no internet connection when Combofix has completely finished then restart your computer to restore back the connections.
3. Now double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.
Please post the "C:\ComboFix.txt" along with a new HijackThis log for further review
Note: Do not mouseclick combofix's window while it's running. That may cause it to stall or freeze.
-
here's [bComboFix[/b] log :
ComboFix 08-10-04.07 - Administrator 2008-10-05 21:12:18.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.609 [GMT -7:00]
Running from: C:\Documents and Settings\Administrator\Desktop\ComboFix.exe
* Created a new restore point
WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.
/wow section - STAGE 41
grep: (standard input): Not enough space
grep: (standard input): Not enough space
The system cannot find the file temp00.
grep: (standard input): Not enough space
/wow section - STAGE 47
The process cannot access the file because it is being used by another process.
The process cannot access the file because it is being used by another process.
The process cannot access the file because it is being used by another process.
The process cannot access the file because it is being used by another process.
The process cannot access the file because it is being used by another process.
The process cannot access the file because it is being used by another process.
The process cannot access the file because it is being used by another process.
The process cannot access the file because it is being used by another process.
The process cannot access the file because it is being used by another process.
The process cannot access the file because it is being used by another process.
The process cannot access the file because it is being used by another process.
The process cannot access the file because it is being used by another process.
The process cannot access the file because it is being used by another process.
The process cannot access the file because it is being used by another process.
The process cannot access the file because it is being used by another process.
The process cannot access the file because it is being used by another process.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
C:\WINDOWS\system32\_000110_.tmp.dll
C:\WINDOWS\system32\cwtwjsxy.dll
C:\WINDOWS\system32\dootbvqg.dll
C:\WINDOWS\system32\fctebo.dll
C:\WINDOWS\system32\lewvbt.dll
C:\WINDOWS\system32\oletmmlf.ini
C:\WINDOWS\system32\prxfnsdc.dll
C:\WINDOWS\system32\vrwwwlyw.dll
.
((((((((((((((((((((((((( Files Created from 2008-09-06 to 2008-10-06 )))))))))))))))))))))))))))))))
.
2008-10-05 11:24 . 2008-10-05 11:24 19 --a------ C:\disconn.bat
2008-10-04 17:30 . 2008-10-04 17:30 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Malwarebytes
2008-10-04 17:30 . 2008-10-04 17:30 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Malwarebytes
2008-10-04 17:30 . 2008-09-10 00:08 38,528 --a------ C:\WINDOWS\system32\drivers\mbamswissarmy.sys
2008-10-04 17:30 . 2008-09-10 00:08 17,200 --a------ C:\WINDOWS\system32\drivers\mbam.sys
2008-10-04 15:29 . 2008-10-04 15:29 <DIR> d-------- C:\Program Files\Lonely Cat Games
2008-10-02 21:36 . 2008-07-18 22:10 45,768 --a------ C:\WINDOWS\system32\wups2.dll
2008-10-02 21:36 . 2008-07-18 22:10 33,992 --a------ C:\WINDOWS\system32\wucltui.dll.mui
2008-10-02 21:36 . 2008-07-18 22:09 25,800 --a------ C:\WINDOWS\system32\wuaucpl.cpl.mui
2008-10-02 21:36 . 2008-07-18 22:09 25,800 --a------ C:\WINDOWS\system32\wuapi.dll.mui
2008-10-02 21:36 . 2008-07-18 22:08 20,680 --a------ C:\WINDOWS\system32\wuaueng.dll.mui
2008-10-02 15:12 . 2008-10-02 15:13 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Winamp
2008-10-02 11:30 . 2008-10-02 11:30 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\TuneUp Software
2008-10-02 11:30 . 2008-10-02 11:30 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\TuneUp Software
2008-10-02 11:30 . 2008-10-02 11:30 307,968 --a------ C:\WINDOWS\system32\TuneUpDefragService.exe
2008-10-02 11:30 . 2008-02-27 13:15 28,416 --a------ C:\WINDOWS\system32\uxtuneup.dll
2008-10-02 11:29 . 2008-10-02 11:29 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
2008-10-02 10:13 . 2008-10-05 15:59 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\OpenOffice.org2
2008-10-01 22:45 . 2008-10-01 22:45 <DIR> d-------- C:\Documents and Settings\sayan sajith
2008-10-01 22:31 . 2004-08-03 18:07 221,184 --a------ C:\WINDOWS\system32\wmpns.dll
2008-10-01 22:27 . 2008-10-01 22:27 11 --a------ C:\shutpc.bat
2008-10-01 22:26 . 2008-10-01 22:26 26 --a------ C:\conn.bat
2008-10-01 17:48 . 2008-10-01 17:48 <DIR> d-------- C:\VundoFix Backups
2008-10-01 14:47 . 2008-10-01 15:29 <DIR> d-------- C:\Program Files\Enigma Software Group
2008-10-01 14:33 . 2008-10-01 14:44 <DIR> d-------- C:\Program Files\SpyZooka
2008-10-01 14:32 . 2008-10-01 14:32 <DIR> d-------- C:\Program Files\Common Files\Download Manager
2008-10-01 13:56 . 2008-10-01 23:23 <DIR> d-------- C:\Program Files\OpenOffice.org 2.4
2008-10-01 10:41 . 2008-10-01 10:41 24,250 --a------ C:\WINDOWS\Aware40.mch
2008-10-01 10:40 . 2008-10-01 10:41 <DIR> d-------- C:\WINDOWS\A4W_DATA
2008-10-01 10:40 . 2008-10-01 10:40 35 --a------ C:\WINDOWS\A4W.INI
2008-10-01 10:38 . 2008-10-01 10:39 <DIR> d-------- C:\Program Files\Pals e-Dictionary
2008-09-30 21:40 . 2008-10-04 17:58 <DIR> d-------- C:\WINDOWS\Downloaded Installations
2008-09-30 21:09 . 2008-10-05 07:29 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\uTorrent
2008-09-30 21:03 . 2008-09-30 21:03 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Thinking Minds Budiling Bytes
2008-09-30 19:27 . 2008-10-01 16:44 <DIR> d-a------ C:\Documents and Settings\All Users\Application Data\TEMP
2008-09-30 19:14 . 2008-10-02 20:42 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\vlc
2008-09-30 17:26 . 2008-09-30 17:26 <DIR> d--h----- C:\WINDOWS\system32\GroupPolicy
2008-09-30 17:01 . 2004-08-04 00:56 159,232 --a------ C:\WINDOWS\system32\ptpusd.dll
2008-09-30 17:01 . 2004-08-03 22:58 15,104 --a------ C:\WINDOWS\system32\drivers\usbscan.sys
2008-09-30 17:01 . 2004-08-03 22:58 15,104 --a--c--- C:\WINDOWS\system32\dllcache\usbscan.sys
2008-09-30 17:01 . 2001-08-17 22:36 5,632 --a------ C:\WINDOWS\system32\ptpusb.dll
2008-09-30 16:48 . 2008-06-10 02:32 73,728 --a------ C:\WINDOWS\system32\javacpl.cpl
2008-09-30 16:46 . 2008-09-30 16:46 <DIR> d-------- C:\Program Files\NOS
2008-09-30 16:46 . 2008-10-01 13:53 <DIR> d-------- C:\Program Files\Java
2008-09-30 16:46 . 2008-09-30 16:46 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\NOS
2008-09-30 16:44 . 2008-09-30 16:45 <DIR> d-------- C:\WINDOWS\system32\Adobe
2008-09-30 16:44 . 2008-09-30 16:44 <DIR> d-------- C:\Program Files\Common Files\Java
2008-09-30 16:26 . 2008-09-30 16:26 <DIR> d-------- C:\Program Files\%temp&
2008-09-30 16:26 . 2008-01-07 14:29 352 --ah----- C:\WINDOWS\nod32fixtemdono.reg
2008-09-30 16:25 . 2008-09-30 16:25 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\ESET
2008-09-30 16:23 . 2008-09-30 16:23 <DIR> d-------- C:\Program Files\ESET
2008-09-30 16:23 . 2008-09-30 16:23 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\ESET
2008-09-30 16:04 . 2008-09-30 16:04 <DIR> d-------- C:\Program Files\TweakNow RegCleaner Std
2008-09-30 15:58 . 2008-09-30 15:58 0 --a------ C:\WINDOWS\nsreg.dat
2008-09-30 15:54 . 2008-09-30 15:54 <DIR> d---s---- C:\Documents and Settings\Administrator\UserData
2008-09-30 15:53 . 2008-09-30 15:53 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Yahoo! Companion
2008-09-30 15:53 . 2008-09-30 15:54 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Yahoo!
2008-09-30 15:51 . 2004-07-30 01:15 28,160 --a------ C:\WINDOWS\system32\tuscaenc.dll
2008-09-30 15:48 . 2008-09-30 15:48 53,248 --a------ C:\WINDOWS\system32\suppdll.dll
2008-09-30 15:48 . 2008-09-30 15:48 35,363 --a------ C:\WINDOWS\system32\windrvNT.sys
2008-09-30 15:46 . 2008-10-05 18:45 2,764 --a------ C:\WINDOWS\system32\$$$mclip.cfg
2008-09-30 15:43 . 2008-09-30 15:43 <DIR> d-------- C:\Program Files\Jiao System, Ltd.VCDCutter
2008-09-30 15:43 . 2008-09-30 15:46 564 --a------ C:\WINDOWS\system\cdplayer.dat
2008-09-30 15:38 . 2008-09-30 15:38 <DIR> d-------- C:\Program Files\VstPlugins
2008-09-30 15:38 . 2008-09-30 15:38 <DIR> d-------- C:\Program Files\ASIO4ALL v2
2008-09-30 15:38 . 2002-07-07 15:14 1,294,336 --a------ C:\WINDOWS\system32\vorbis.acm
2008-09-30 15:38 . 2006-06-20 01:56 225,280 --a------ C:\WINDOWS\system32\rewire.dll
2008-09-30 15:37 . 2008-09-30 15:37 <DIR> d-------- C:\Program Files\Outsim
2008-09-30 15:37 . 2008-09-30 23:00 <DIR> d-------- C:\Program Files\Image-Line
2008-09-30 15:35 . 2008-09-30 15:36 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Yahoo!
2008-09-30 15:32 . 2008-09-30 15:35 <DIR> d-------- C:\Program Files\Yahoo!
2008-09-30 15:27 . 2008-09-30 15:27 <DIR> d-------- C:\Program Files\Google
2008-09-30 15:25 . 2008-09-30 15:25 <DIR> d-------- C:\Program Files\SlySoft
2008-09-30 15:21 . 2000-05-22 22:58 608,448 --a------ C:\WINDOWS\system32\comctl32.ocx
2008-09-30 15:18 . 2008-09-30 15:18 <DIR> d-------- C:\Program Files\Common Files\xing shared
2008-09-30 15:18 . 2008-09-30 15:18 <DIR> d-------- C:\Program Files\Common Files\Real
2008-09-30 15:18 . 2008-09-30 15:18 499,712 --a------ C:\WINDOWS\system32\msvcp71.dll
2008-09-30 15:18 . 2008-09-30 15:18 348,160 --a------ C:\WINDOWS\system32\msvcr71.dll
2008-09-30 15:12 . 2007-03-07 13:27 4,245,008 --a------ C:\WINDOWS\system32\qtp-mt334.dll
2008-09-30 15:12 . 2007-03-07 13:27 247,824 --a------ C:\WINDOWS\system32\prgiso.dll
2008-09-30 15:12 . 2007-03-07 13:27 38,448 --a------ C:\WINDOWS\system32\drivers\hotcore3.sys
2008-09-30 15:12 . 2007-03-07 13:27 13,840 --a------ C:\WINDOWS\system32\wnaspi32.dll
2008-09-30 15:10 . 2008-09-30 15:10 <DIR> d-------- C:\Program Files\DU Meter
2008-09-30 15:10 . 2008-09-30 15:10 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Hagel Technologies
2008-09-30 14:56 . 2008-09-30 14:56 2,359,350 --a------ C:\WINDOWS\BricoPack Wallpaper.bmp
2008-09-30 14:56 . 2008-09-30 14:56 55,466 --a------ C:\WINDOWS\BricoPackUninst.cmd
2008-09-30 14:55 . 2008-09-30 14:55 <DIR> d-------- C:\WINDOWS\BricoPacks
2008-09-30 14:55 . 2008-09-30 14:56 4,590 --a------ C:\WINDOWS\BricoPackFoldersDelete.cmd
2008-09-30 14:54 . 2008-09-30 14:54 <DIR> d-------- C:\Program Files\BearShare
2008-09-30 14:54 . 2008-09-30 14:54 <DIR> d-------- C:\DOWNLOADS
2008-09-30 14:54 . 2008-09-30 14:54 <DIR> d-------- C:\!Temp
2008-09-30 14:48 . 2008-09-30 14:48 <DIR> d-------- C:\POD
2008-09-30 14:48 . 2008-09-30 14:48 <DIR> d-------- C:\Documents and Settings\Administrator\WINDOWS
2008-09-30 14:48 . 1996-11-05 16:19 247,648 --a------ C:\WINDOWS\UNINST16.EXE
2008-09-30 14:48 . 1995-07-13 18:43 26,768 --a------ C:\WINDOWS\system\CTL3D.DLL
2008-09-30 14:48 . 2008-10-05 14:12 208 --a------ C:\WINDOWS\POD.INI
2008-09-30 14:48 . 2008-09-30 14:48 8 --a------ C:\WINDOWS\Q.TRD
2008-09-30 14:48 . 2008-09-30 14:48 0 --a------ C:\WINDOWS\PROTOCOL.INI
2008-09-30 14:43 . 2008-09-30 14:43 <DIR> d-------- C:\WINDOWS\OPTIONS
2008-09-30 14:43 . 2008-09-30 14:43 <DIR> d-------- C:\Program Files\Realtek Sound Manager
2008-09-30 14:43 . 2008-09-30 14:43 <DIR> d-------- C:\Program Files\AvRack
2008-09-30 14:42 . 2008-09-30 14:44 <DIR> d-------- C:\Program Files\VIA
2008-09-30 14:42 . 2008-10-04 17:59 <DIR> d--h----- C:\Program Files\InstallShield Installation Information
2008-09-30 14:42 . 2008-09-30 14:42 <DIR> d-------- C:\Program Files\AMD
2008-09-30 14:42 . 2005-03-07 19:50 3,453,824 -ra------ C:\WINDOWS\system32\vtdisp.dll
2008-09-30 14:41 . 2008-09-30 14:43 <DIR> d-------- C:\Program Files\Common Files\InstallShield
2008-09-30 14:41 . 2004-08-03 23:08 26,496 --a--c--- C:\WINDOWS\system32\dllcache\usbstor.sys
2008-09-30 14:40 . 2004-10-05 16:54 306,688 --a------ C:\WINDOWS\IsUninst.exe
2008-09-30 14:35 . 2008-09-30 14:35 <DIR> d-------- C:\Program Files\VideoLAN
2008-09-30 14:17 . 2008-09-30 14:17 <DIR> d-------- C:\Program Files\Common Files\Adobe
2008-09-30 14:17 . 2008-09-30 14:17 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\AdobeUM
2008-09-30 14:16 . 2008-09-30 14:16 <DIR> d-------- C:\Program Files\Common Files\SWF Studio
2008-09-30 14:05 . 2008-09-30 14:05 <DIR> d---s---- C:\WINDOWS\system32\Microsoft
2008-09-30 14:05 . 2008-10-02 11:37 <DIR> d--hs---- C:\Documents and Settings\LocalService
2008-09-30 14:05 . 2008-10-04 17:36 <DIR> d-------- C:\Documents and Settings\Administrator
2008-09-30 14:04 . 2008-10-02 11:37 <DIR> d--hs---- C:\Documents and Settings\NetworkService
2008-09-30 14:04 . 2008-09-30 14:04 8,192 --a------ C:\WINDOWS\REGLOCS.OLD
2008-09-30 14:01 . 2004-08-03 18:07 10,129,408 --a--c--- C:\WINDOWS\system32\dllcache\hwxkor.dll
2008-09-30 14:00 . 2008-09-30 14:00 <DIR> d-------- C:\WINDOWS\system32\xircom
2008-09-30 14:00 . 2008-09-30 14:00 <DIR> d-------- C:\Program Files\microsoft frontpage
2008-09-28 15:05 . 1997-01-15 00:00 71,680 --a------ C:\WINDOWS\ST5UNST.EXE
2008-09-28 15:05 . 1997-01-15 00:00 29,696 --a------ C:\WINDOWS\system32\VB5StKit.dll
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-09-30 21:56 218,624 ----a-w C:\WINDOWS\system32\uxtheme.dll
2008-07-19 05:10 94,920 ----a-w C:\WINDOWS\system32\cdm.dll
2008-07-19 05:10 53,448 ----a-w C:\WINDOWS\system32\wuauclt.exe
2008-07-19 05:10 36,552 ----a-w C:\WINDOWS\system32\wups.dll
2008-07-19 05:09 563,912 ----a-w C:\WINDOWS\system32\wuapi.dll
2008-07-19 05:09 325,832 ----a-w C:\WINDOWS\system32\wucltui.dll
2008-07-19 05:09 1,811,656 ----a-w C:\WINDOWS\system32\wuaueng.dll
2008-07-19 05:08 205,000 ----a-w C:\WINDOWS\system32\wuweb.dll
.
------- Sigcheck -------
2004-08-03 18:07 690176 3a5ee0514f56b1b775d7641cfba5ad37 C:\WINDOWS\system32\wininet.dll
2004-08-03 18:07 690176 3a5ee0514f56b1b775d7641cfba5ad37 C:\WINDOWS\system32\dllcache\wininet.dll
2004-08-03 18:07 974336 a5c1f2cf7c31874e66478910b43d6513 C:\WINDOWS\explorer.exe
2004-08-03 18:07 974336 a5c1f2cf7c31874e66478910b43d6513 C:\WINDOWS\system32\dllcache\explorer.exe
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Yahoo! Pager"="C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" [2007-08-30 4670704]
"Veoh"="G:\Program Files\Veoh Networks\Veoh\VeohClient.exe" [2008-09-26 3660848]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DU Meter"="C:\Program Files\DU Meter\DUMeter.exe" [2006-11-27 1582616]
"egui"="C:\Program Files\ESET\ESET Smart Security\egui.exe" [2008-04-23 1443072]
"TkBellExe"="C:\Program Files\Common Files\Real\Update_OB\realsched.exe" [2008-09-30 185896]
"VTTimer"="VTTimer.exe" [2005-03-07 C:\WINDOWS\system32\VTTimer.exe]
"VTTrayp"="VTtrayp.exe" [2005-01-10 C:\WINDOWS\system32\VTTrayp.exe]
C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\
RocketDock.lnk - H:\Vista Inspirat 2\RocketDock\RocketDock.exe [2007-03-18 630784]
C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
VIA RAID TOOL.lnk - C:\Program Files\VIA\RAID\raid_tool.exe [2008-09-30 585728]
[HKLM\~\startupfolder\C:^Documents and Settings^Administrator^Start Menu^Programs^Startup^OpenOffice.org 2.4.lnk]
path=C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\OpenOffice.org 2.4.lnk
backup=C:\WINDOWS\pss\OpenOffice.org 2.4.lnkStartup
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\KernelFaultCheck]
C:\WINDOWS\system32\dumprep 0 -k [X]
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
--a------ 2008-06-12 02:38 34672 G:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\CloneCDTray]
--a------ 2006-09-28 12:21 57344 C:\Program Files\SlySoft\CloneCD\CloneCDTray.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Update]
--a----t- 2008-09-30 20:58 133104 C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\googletalk]
--a------ 2007-01-01 14:22 3739648 C:\Program Files\Google\Google Talk\googletalk.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PWRISOVM.EXE]
--a------ 2008-07-07 00:34 167936 H:\PowerISO\PWRISOVM.EXE
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
--a------ 2008-06-10 04:27 144784 C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
--a------ 2008-09-30 15:18 185896 C:\Program Files\Common Files\Real\Update_OB\realsched.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Veoh]
--a------ 2008-09-26 19:14 3660848 G:\Program Files\Veoh Networks\Veoh\VeohClient.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Yahoo! Pager]
--a------ 2007-08-30 17:43 4670704 C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"getPlus(R) Helper"=3 (0x3)
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
"BM5b7b2d32"=Rundll32.exe "C:\WINDOWS\system32\prxfnsdc.dll",s
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"C:\\Program Files\\BearShare\\Bearshare.exe"=
"C:\\Program Files\\Google\\Google Talk\\googletalk.exe"=
"C:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"C:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"=
"G:\\Program Files\\FlashGet\\flashget.exe"=
"G:\\Program Files\\uTorrent\\uTorrent.exe"=
"G:\\Program Files\\Veoh Networks\\Veoh\\VeohClient.exe"=
R0 hotcore3;hotcore3;C:\WINDOWS\system32\drivers\hotcore3.sys [2007-03-07 38448]
R2 UxTuneUp;TuneUp Theme Extension;C:\WINDOWS\System32\svchost.exe [2004-08-03 14336]
S3 TuneUp.Defrag;TuneUp Drive Defrag Service;C:\WINDOWS\System32\TuneUpDefragService.exe [2008-10-02 307968]
S4 getPlus(R) Helper;getPlus(R) Helper;C:\Program Files\NOS\bin\getPlus_HelperSvc.exe [2008-08-29 33752]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost - NetSvcs
UxTuneUp
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{8540f86f-90b3-11dd-af32-000fea9f72b5}]
\Shell\AutoRun\command - AutoRun\AutoStart.exe
\Shell\Explore\Command - AutoRun\AutoStart.exe
\Shell\Open\Command - AutoRun\AutoStart.exe
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{8540f870-90b3-11dd-af32-000fea9f72b5}]
\Shell\AutoRun\command - AutoRun\AutoStart.exe
\Shell\Explore\Command - AutoRun\AutoStart.exe
\Shell\Open\Command - AutoRun\AutoStart.exe
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{9245485c-8f38-11dd-80c9-000fea9f72b5}]
\Shell\AutoRun\command - AutoRun\AutoStart.exe
\Shell\Explore\Command - AutoRun\AutoStart.exe
\Shell\Open\Command - AutoRun\AutoStart.exe
*Newly Created Service* - CATCHME
*Newly Created Service* - PROCEXP90
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{99DA742A-B779-C873-FF30-45979E1478C8}]
C:\WINDOWS\system32\Bifrost\server.exe s
.
Contents of the 'Scheduled Tasks' folder
2008-10-06 C:\WINDOWS\Tasks\1-Click Maintenance.job
- G:\Program Files\TuneUp Utilities 2008\OneClickStarter.exe [2008-02-29 14:24]
2008-10-05 C:\WINDOWS\Tasks\bear.job
- C:\Program Files\BearShare\Bearshare.exe [2006-12-29 21:43]
2008-10-05 C:\WINDOWS\Tasks\connect.job
- C:\conn.bat [2008-10-01 22:26]
2008-10-03 C:\WINDOWS\Tasks\discon.job
- C:\disconn.bat [2008-10-05 11:24]
2008-10-03 C:\WINDOWS\Tasks\shut.job
- C:\shutpc.bat [2008-10-01 22:27]
2008-10-05 C:\WINDOWS\Tasks\torr.job
- G:\Program Files\uTorrent\uTorrent.exe [2008-09-30 21:09]
2008-10-03 C:\WINDOWS\Tasks\veo.job
- G:\Program Files\Veoh Networks\Veoh\VeohClient.exe [2008-09-26 19:14]
.
- - - - ORPHANS REMOVED - - - -
BHO-{018B27FF-E05F-4CB5-8763-540CB3FD457A} - (no file)
ShellExecuteHooks-{018B27FF-E05F-4CB5-8763-540CB3FD457A} - (no file)
MSConfigStartUp-BM5b7b2d32 - C:\WINDOWS\system32\prxfnsdc.dll
.
------- Supplementary Scan -------
.
FireFox -: Profile - C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\zeaqybug.default\
FireFox -: prefs.js - STARTUP.HOMEPAGE -
FF -: plugin - C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\zeaqybug.default\extensions\{CF40ACC5-E1BB-4aff-AC72-04C2F616BCA7}\plugins\np_gp.dll
FF -: plugin - C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Update\1.2.131.11\npGoogleOneClick5.dll
FF -: plugin - C:\Program Files\Mozilla Firefox\plugins\np_gp.dll
FF -: plugin - C:\Program Files\Yahoo!\Shared\npYState.dll
FF -: plugin - G:\Program Files\Adobe\Reader 9.0\Reader\browser\nppdf32.dll
FF -: plugin - G:\Program Files\Veoh Networks\Veoh\Plugins\noreg\NPVeohVersion.dll
FF -: plugin - H:\Real Player\Netscape6\nppl3260.dll
FF -: plugin - H:\Real Player\Netscape6\nprjplug.dll
FF -: plugin - H:\Real Player\Netscape6\nprpjplug.dll
.
**************************************************************************
catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-10-05 21:13:15
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
C:\sccfg.sys 264 bytes
scan completed successfully
hidden files: 1
**************************************************************************
.
Completion time: 2008-10-05 21:14:53
ComboFix-quarantined-files.txt 2008-10-06 04:14:41
Pre-Run: 2,015,256,576 bytes free
Post-Run: 2,000,670,720 bytes free
309
and HijackThis log:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 9:19:04 PM, on 10/5/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\VTTimer.exe
C:\WINDOWS\system32\VTtrayp.exe
C:\Program Files\DU Meter\DUMeter.exe
C:\Program Files\ESET\ESET Smart Security\egui.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\VIA\RAID\raid_tool.exe
H:\Vista Inspirat 2\RocketDock\RocketDock.exe
C:\Program Files\ESET\ESET Smart Security\ekrn.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Mozilla Firefox\firefox.exe
G:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - H:\Real Player\rpbrowserrecordplugin.dll
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O2 - BHO: FlashGet GetFlash Class - {F156768E-81EF-470C-9057-481BA8380DBA} - g:\Program Files\FlashGet\getflash.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - G:\Program Files\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll
O4 - HKLM\..\Run: [VTTimer] VTTimer.exe
O4 - HKLM\..\Run: [VTTrayp] VTtrayp.exe
O4 - HKLM\..\Run: [DU Meter] C:\Program Files\DU Meter\DUMeter.exe
O4 - HKLM\..\Run: [egui] "C:\Program Files\ESET\ESET Smart Security\egui.exe" /hide /waitservice
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [Veoh] "G:\Program Files\Veoh Networks\Veoh\VeohClient.exe" /VeohHide
O4 - Startup: RocketDock.lnk = H:\Vista Inspirat 2\RocketDock\RocketDock.exe
O4 - Global Startup: VIA RAID TOOL.lnk = C:\Program Files\VIA\RAID\raid_tool.exe
O8 - Extra context menu item: &Download All with FlashGet - G:\Program Files\FlashGet\jc_all.htm
O8 - Extra context menu item: &Download with FlashGet - G:\Program Files\FlashGet\jc_link.htm
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - g:\Program Files\FlashGet\FlashGet.exe
O9 - Extra 'Tools' menuitem: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - g:\Program Files\FlashGet\FlashGet.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsu...?1223009094218
O17 - HKLM\System\CCS\Services\Tcpip\..\{8D2FBEEC-67B0-41B0-AA9B-EEA32046BCD3}: NameServer = 218.248.240.181 218.248.240.23
O23 - Service: Eset HTTP Server (EhttpSrv) - ESET - C:\Program Files\ESET\ESET Smart Security\EHttpSrv.exe
O23 - Service: Eset Service (ekrn) - ESET - C:\Program Files\ESET\ESET Smart Security\ekrn.exe
O23 - Service: TuneUp Drive Defrag Service (TuneUp.Defrag) - TuneUp Software GmbH - C:\WINDOWS\System32\TuneUpDefragService.exe
--
End of file - 4898 bytes
Tags for this Thread
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules