Page 1 of 2 12 LastLast
Results 1 to 10 of 14

Thread: Troj_Zlob.KW & spysheriff + ? [LOGS]

  1. #1
    Member
    Join Date
    Jan 2006
    Posts
    32

    Default Troj_Zlob.KW & spysheriff + ? [LOGS]

    Hi, I've been volunteered to fix a friends computer as they had a few problems with it.
    It appears as though they had a desktop hijacker - which pointed IE to www.securitycenter.com, which I believe I have at least partially removed, although not completely.
    After seeing this, I ran a pc-cillin scan to discover it suggested that TROJ_ZLOB.ZW was on the pc within a file called mssearchnet.exe in c:\windows\system32\. This I looked up on the trend housecall website, and followed their instructions on removal - which obviously haven't worked.
    I have run an online Panda Software Active Scan with the following results:

    Incident Status Location

    Virus:Trj/Downloader.IHX Disinfected Operating system
    Possible Virus. Not disinfected C:\WINDOWS\system32\hp86DE.tmp
    Adware:adware/emediacodec Not disinfected C:\WINDOWS\system32\nvctrl.exe
    Adware:adware/emediacodec Not disinfected C:\WINDOWS\SYSTEM32\dfrgsrv.exe
    Adware:adware/securityerror Not disinfected C:\WINDOWS\SYSTEM32\ot.ico
    Adware:adware/cws Not disinfected C:\WINDOWS\SYSTEM32\paytime.exe
    Adware:adware/secure32 Not disinfected C:\WINDOWS\SYSTEM32\scmt16.exe
    Adware:adware/spywarequake Not disinfected C:\WINDOWS\SYSTEM32\stickrep.dll
    Adware:adware/cws.searchmeup Not disinfected C:\WINDOWS\ms1.exe
    Spyware:Cookie/2o7 Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.112.2o7.net/]
    Spyware:Cookie/2o7 Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.2o7.net/]
    Spyware:Cookie/Doubleclick Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.doubleclick.net/]
    Spyware:Cookie/FastClick Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.fastclick.net/]
    Spyware:Cookie/BurstNet Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.burstnet.com/]
    Spyware:Cookie/Statcounter Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.statcounter.com/]
    Spyware:Cookie/Atwola Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.atwola.com/]
    Spyware:Cookie/YieldManager Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.ad.yieldmanager.com/]
    Spyware:Cookie/YieldManager Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[ad.yieldmanager.com/]
    Spyware:Cookie/YieldManager Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.ad.yieldmanager.com/]
    Spyware:Cookie/Atlas DMT Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.atdmt.com/]
    Spyware:Cookie/Serving-sys Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.serving-sys.com/]
    Spyware:Cookie/Com.com Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[ad.sensismediasmart.com.au/]
    Spyware:Cookie/Casalemedia Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.casalemedia.com/]
    Spyware:Cookie/RealMedia Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.realmedia.com/]
    Spyware:Cookie/ErrorSafe Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.errorsafe.com/]
    Spyware:Cookie/Tribalfusion Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.tribalfusion.com/]
    Spyware:Cookie/Mediaplex Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.mediaplex.com/]
    Spyware:Cookie/QkSrv Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.qksrv.net/]
    Spyware:Cookie/Apmebf Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.apmebf.com/]
    Spyware:Cookie/Cd Freaks Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.cdfreaks.com/]
    Spyware:Cookie/Cd Freaks Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.club.cdfreaks.com/]
    Spyware:Cookie/Advertising Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.advertising.com/]
    Spyware:Cookie/Hitbox Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.hitbox.com/]
    Spyware:Cookie/24/7 Realmedia Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.247realmedia.com/]
    Spyware:Cookie/Adserver Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.z1.adserver.com/]
    Spyware:Cookie/PointRoll Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.ads.pointroll.com/]
    Spyware:Cookie/Xiti Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.xiti.com/]
    Spyware:Cookie/Match Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[promo.match.com/]
    Spyware:Cookie/Mammamediasolutions Not disinfected C:\Documents and Settings\Bonnie\Application

    Cont'd...

  2. #2
    Member
    Join Date
    Jan 2006
    Posts
    32

    Default Cont'd activescan log + spybot 1.4 results

    Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.targetnet.com/]
    Spyware:Cookie/WinFixer Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.winfixer.com/]
    Spyware:Cookie/Hbmediapro Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.adopt.hbmediapro.com/]
    Spyware:Cookie/Bfast Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.bfast.com/]
    Spyware:Cookie/Maxserving Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.maxserving.com/]
    Spyware:Cookie/Overture Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.overture.com/]
    Spyware:Cookie/Belnk Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.belnk.com/]
    Spyware:Cookie/QuestionMarket Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.questionmarket.com/]
    Spyware:Cookie/onestat.com Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[.stat.onestat.com/]
    Spyware:Cookie/2o7 Not disinfected C:\Documents and Settings\Bonnie\Application Data\Mozilla\Firefox\Profiles\d3n21s3l.default\cookies.txt[]
    Virus:Trj/Downloader.IHX Disinfected C:\Documents and Settings\Bonnie\Local Settings\Temporary Internet Files\Content.IE5\MTF0POFM\wdinit64[1].exe
    Potentially unwanted tool:Application/KillApp.A Not disinfected C:\WINDOWS\country.exe
    Adware:Adware/SpywareQuake Not disinfected C:\WINDOWS\system32\1024\ld3C35.tmp
    Adware:Adware/SpywareQuake Not disinfected C:\WINDOWS\system32\1024\ld8575.tmp
    Possible Virus. Not disinfected C:\WINDOWS\system32\hp86DE.tmp
    Adware:Adware/CWS.Searchmeup Not disinfected C:\WINDOWS\system32\scmt16.exe
    Dialer:Dialer.GUJ Not disinfected C:\WINDOWS\system32\winjau32.dll
    Adware:Adware/SpySheriff Not disinfected C:\WINDOWS\toolbar.exe

    Spybot 1.4 had the following results:
    TIBS: Executable (File, fixed)
    C:\WINDOWS\ms1.exe

    Smitfraud-C.: Executable (File, fixed)
    C:\WINDOWS\tool1.exe

    Smitfraud-C.: Executable (File, fixed)
    C:\WINDOWS\tool3.exe

    Smitfraud-C.: Executable (File, fixed)
    C:\WINDOWS\tool4.exe

    Smitfraud-C.: Executable (File, fixed)
    C:\WINDOWS\tool5.exe

    Smitfraud-C.: Executable (File, fixed)
    C:\WINDOWS\system32\paytime.exe

    Smitfraud-C.: Settings (Registry value, fixed)
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\explorer\run\nvctrl.exe

    Smitfraud-C.: User settings (Registry value, fixed)
    HKEY_USERS\S-1-5-21-583907252-1563985344-1343024091-1003\Software\Install\Version

    Spy Sheriff: Executable (File, fixed)
    C:\WINDOWS\country.exe

    Vcodec: Data (File, fixing failed)
    C:\WINDOWS\system32\ncompat.tlb

    Vcodec: Data (File, fixed)
    C:\WINDOWS\system32\ts.ico

    Windows.ActiveDesktop: User settings (Registry change, fixed)
    HKEY_USERS\S-1-5-21-583907252-1563985344-1343024091-1003\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoHTMLWallPaper!=W=1

    SpywareQuake: Settings (Registry value, fixed)
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\explorer\run\wininet.dll=...dfrgsrv.exe...

    Zlob.Downloader: Executable (File, fixing failed)
    C:\WINDOWS\system32\nvctrl.exe

    Advertising.com: Tracking cookie (Firefox: default) (Cookie, fixed)


    Advertising.com: Tracking cookie (Firefox: default) (Cookie, fixed)


    Advertising.com: Tracking cookie (Firefox: default) (Cookie, fixed)


    Advertising.com: Tracking cookie (Firefox: default) (Cookie, fixed)


    Avenue A, Inc.: Tracking cookie (Firefox: default) (Cookie, fixed)


    BFast: Tracking cookie (Firefox: default) (Cookie, fixed)


    Commission Junction: Tracking cookie (Firefox: default) (Cookie, fixed)


    Commission Junction: Tracking cookie (Firefox: default) (Cookie, fixed)


    DoubleClick: Tracking cookie (Firefox: default) (Cookie, fixed)


    HitBox: Tracking cookie (Firefox: default) (Cookie, fixed)


    HitBox: Tracking cookie (Firefox: default) (Cookie, fixed)


    FastClick: Tracking cookie (Firefox: default) (Cookie, fixed)


    FastClick: Tracking cookie (Firefox: default) (Cookie, fixed)


    FastClick: Tracking cookie (Firefox: default) (Cookie, fixed)


    HitBox: Tracking cookie (Firefox: default) (Cookie, fixed)


    MediaPlex: Tracking cookie (Firefox: default) (Cookie, fixed)


    TargetNet: Tracking cookie (Firefox: default) (Cookie, fixed)


    Winfixer: Tracking cookie (Firefox: default) (Cookie, fixed)


    Winfixer: Tracking cookie (Firefox: default) (Cookie, fixed)



    --- Spybot - Search & Destroy version: 1.4 (build: 20050523) ---

    2005-05-31 blindman.exe (1.0.0.1)
    2005-05-31 SpybotSD.exe (1.4.0.3)
    2005-05-31 TeaTimer.exe (1.4.0.2)
    2006-04-11 unins000.exe (51.41.0.0)
    2005-05-31 Update.exe (1.4.0.0)
    2006-02-06 advcheck.dll (1.0.2.0)
    2005-05-31 aports.dll (2.1.0.0)
    2005-05-31 borlndmm.dll (7.0.4.453)
    2005-05-31 delphimm.dll (7.0.4.453)
    2006-02-20 Tools.dll (2.0.0.2)
    2005-05-31 UnzDll.dll (1.73.1.1)
    2005-05-31 ZipDll.dll (1.73.2.0)
    2006-04-07 Includes\Cookies.sbi (*)
    2006-04-07 Includes\Dialer.sbi (*)
    2006-04-07 Includes\Hijackers.sbi (*)
    2006-04-07 Includes\Keyloggers.sbi (*)
    2006-04-07 Includes\Malware.sbi (*)
    2006-04-07 Includes\PUPS.sbi (*)
    2006-04-07 Includes\Revision.sbi (*)
    2006-04-07 Includes\Security.sbi (*)
    2006-04-07 Includes\Spybots.sbi (*)
    2005-02-17 Includes\Tracks.uti
    2006-04-07 Includes\Trojans.sbi (*)

  3. #3
    Member
    Join Date
    Jan 2006
    Posts
    32

    Default And finally a HJT log

    Logfile of HijackThis v1.99.1
    Scan saved at 11:11:29 PM, on 4/11/2006
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Executive Software\Diskeeper\DkService.exe
    C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    C:\WINDOWS\ATK0100\Hcontrol.exe
    C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
    C:\Program Files\ASUSTek\ASUSDVD\PDVDServ.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\WINDOWS\system32\ctfmon.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    C:\WINDOWS\ATK0100\ATKOSD.exe
    C:\WINDOWS\system32\svchost.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\WINDOWS\system32\taskmgr.exe
    C:\WINDOWS\system32\nvctrl.exe
    C:\WINDOWS\TEMP\win3A5.tmp.exe
    C:\Program Files\Hijackthis\HijackThis.exe

    O2 - BHO: Nothing - {7a932ed2-1737-4ab8-b84d-c71779958551} - C:\WINDOWS\system32\hp7B27.tmp
    O3 - Toolbar: MSN - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\MSN Apps\MSN Toolbar\MSN Toolbar\01.02.5000.1021\en-us\msntb.dll (file missing)
    O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe
    O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    O4 - HKLM\..\Run: [Hcontrol] C:\WINDOWS\ATK0100\Hcontrol.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\ASUSTek\ASUSDVD\PDVDServ.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [pccguide.exe] "C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe"
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [DiskeeperSystray] "C:\Program Files\Executive Software\Diskeeper\DkIcon.exe"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll (file missing)
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll (file missing)
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/actives...ree/asinst.cab
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
    O20 - Winlogon Notify: winjau32 - C:\WINDOWS\SYSTEM32\winjau32.dll
    O23 - Service: Adobe LM Service - Unknown owner - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: Diskeeper - Executive Software International, Inc. - C:\Program Files\Executive Software\Diskeeper\DkService.exe
    O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Trend Micro Central Control Component (PcCtlCom) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    O23 - Service: Trend Micro Real-time Service (Tmntsrv) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe

  4. #4
    Member
    Join Date
    Jan 2006
    Posts
    32

    Default I am in Australia

    if this helps in choosing who assists.

  5. #5
    Expert-Emeritus illukka's Avatar
    Join Date
    Nov 2005
    Location
    The Pits Of Hell
    Posts
    1,289

    Default

    hi

    i was hoping we'd never see you again in this part of the forum, but i'm glad its not your computer


    Please download SmitfraudFix (by S!Ri)
    Extract the content (a folder named SmitfraudFix) to your Desktop.

    Open the SmitfraudFix folder and double-click smitfraudfix.cmd
    Select option #1 - Search by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present).
    Please copy/paste the content of that report into your next reply.

    Note : process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
    http://www.beyondlogic.org/consulting/proc...processutil.htm
    I Am A Proud Member of ASAP Since 2004

    To Ride, Shoot Straight And Speak TheTruth

    HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!

  6. #6
    Member
    Join Date
    Jan 2006
    Posts
    32

    Default SmitFraudFix log

    Quote Originally Posted by illukka
    hi

    i was hoping we'd never see you again in this part of the forum, but i'm glad its not your computer

    Hey, you're not the only one who hoped that - but unfortunately when a family member has misguidedly told others that you work with computers (Unix / IBM iseries in my case) you get every stupid problem come your way... as I guess you know oh so well yourself


    Anyway on to the problem with Bonnie's pc:

    SmitFraudFix v2.29

    Scan done at 20:44:36.28, Thu 04/13/2006
    Run from C:\Documents and Settings\Bonnie\Desktop\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600]

    »»»»»»»»»»»»»»»»»»»»»»»» C:\


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS

    C:\WINDOWS\toolbar.exe FOUND !

    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32

    C:\WINDOWS\system32\amcompat.tlb FOUND !
    C:\WINDOWS\system32\dfrgsrv.exe FOUND !
    C:\WINDOWS\system32\hp????.tmp FOUND !
    C:\WINDOWS\system32\interf.tlb FOUND !
    C:\WINDOWS\system32\ncompat.tlb FOUND !
    C:\WINDOWS\system32\nscompat.tlb FOUND !
    C:\WINDOWS\system32\ot.ico FOUND !
    C:\WINDOWS\system32\stickrep.dll FOUND !
    C:\WINDOWS\system32\1024\ FOUND !

    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Bonnie\Application Data


    »»»»»»»»»»»»»»»»»»»»»»»» Start Menu


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Bonnie\Favorites

    C:\Documents and Settings\Bonnie\Favorites\Antivirus Test Online.url FOUND !

    »»»»»»»»»»»»»»»»»»»»»»»» Desktop


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files


    »»»»»»»»»»»»»»»»»»»»»»»» Corrupted keys


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop Components

    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
    "Source"="About:Home"
    "SubscribedURL"="About:Home"
    "FriendlyName"="My Current Home Page"


    »»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
    "{438755C2-A8BA-11D1-B96B-00A0C90312E1}"="Browseui preloader"

    [HKEY_CLASSES_ROOT\CLSID\{438755C2-A8BA-11D1-B96B-00A0C90312E1}\InProcServer32]
    @="%SystemRoot%\system32\browseui.dll"

    [HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{438755C2-A8BA-11D1-B96B-00A0C90312E1}\InProcServer32]
    @="%SystemRoot%\system32\browseui.dll"


    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
    "{8C7461EF-2B13-11d2-BE35-3078302C2030}"="Component Categories cache daemon"

    [HKEY_CLASSES_ROOT\CLSID\{8C7461EF-2B13-11d2-BE35-3078302C2030}\InProcServer32]
    @="%SystemRoot%\system32\browseui.dll"

    [HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{8C7461EF-2B13-11d2-BE35-3078302C2030}\InProcServer32]
    @="%SystemRoot%\system32\browseui.dll"


    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
    "{E2CA7CD1-1AD9-F1C4-3D2A-DC1A33E7AF9D}"="USB Ware"


    »»»»»»»»»»»»»»»»»»»»»»»» Scanning wininet.dll infection


    »»»»»»»»»»»»»»»»»»»»»»»» End

  7. #7
    Member
    Join Date
    Jan 2006
    Posts
    32

    Default Apologies if that last message sounded rude,

    was just meant to be funny, but after re-reading thought I shoud clarify

  8. #8
    Expert-Emeritus illukka's Avatar
    Join Date
    Nov 2005
    Location
    The Pits Of Hell
    Posts
    1,289

    Default

    hi

    its great to see you back, even with nasty things like this

    ok lets fix it:




    You should print out these instructions, or copy them to a NotePad file for reading while in Safe Mode, because you will not be able to connect to the Internet to read from this site.

    Next, please reboot your computer in Safe Mode by doing the following :
    • Restart your computer
    • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
    • Instead of Windows loading as normal, a menu with options should appear;
    • Select the first option, to run Windows in Safe Mode, then press "Enter".
    • Choose your usual account.
    Once in Safe Mode, open the SmitfraudFix folder again and double-click smitfraudfix.cmd
    Select option #2 - Clean by typing 2 and press "Enter" to delete infected files.

    You will be prompted : "Registry cleaning - Do you want to clean the registry ?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.

    The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".

    The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart it into Normal Windows.
    A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply.
    The report can also be found at the root of the system drive, usually at C:\rapport.txt

    Warning : running option #2 on a non infected computer will remove your Desktop background.


    i would like to see a new hijackthis log too


    cheers

    good luck
    I Am A Proud Member of ASAP Since 2004

    To Ride, Shoot Straight And Speak TheTruth

    HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!

  9. #9
    Member
    Join Date
    Jan 2006
    Posts
    32

    Default

    SmitFraudFix log:
    SmitFraudFix v2.29

    Scan done at 6:56:04.56, Fri 04/14/2006
    Run from C:\Documents and Settings\Bonnie\Desktop\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600]

    »»»»»»»»»»»»»»»»»»»»»»»» Killing process


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files

    C:\WINDOWS\toolbar.exe Deleted
    C:\WINDOWS\system32\amcompat.tlb Deleted
    C:\WINDOWS\system32\dfrgsrv.exe Deleted
    C:\WINDOWS\system32\hp????.tmp Deleted
    C:\WINDOWS\system32\interf.tlb Deleted
    C:\WINDOWS\system32\ld????.tmp Deleted
    C:\WINDOWS\system32\mssearchnet.exe Deleted
    C:\WINDOWS\system32\ncompat.tlb Deleted
    C:\WINDOWS\system32\nscompat.tlb Deleted
    C:\WINDOWS\system32\nvctrl.exe Deleted
    C:\WINDOWS\system32\ot.ico Deleted
    C:\WINDOWS\system32\stickrep.dll Deleted
    C:\WINDOWS\system32\ts.ico Deleted
    C:\WINDOWS\system32\1024\ Deleted
    C:\Documents and Settings\Bonnie\Favorites\Antivirus Test Online.url Deleted

    »»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


    »»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

    Registry Cleaning done.

    »»»»»»»»»»»»»»»»»»»»»»»» End


    HJT log:
    Logfile of HijackThis v1.99.1
    Scan saved at 7:01:01 AM, on 4/14/2006
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    C:\WINDOWS\ATK0100\Hcontrol.exe
    C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
    C:\Program Files\ASUSTek\ASUSDVD\PDVDServ.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\WINDOWS\ATK0100\ATKOSD.exe
    C:\Program Files\Executive Software\Diskeeper\DkService.exe
    C:\Program Files\ewido anti-malware\ewidoctrl.exe
    C:\Program Files\ewido anti-malware\ewidoguard.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    C:\WINDOWS\system32\svchost.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\Hijackthis\HijackThis.exe
    C:\WINDOWS\system32\wuauclt.exe

    O3 - Toolbar: MSN - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\MSN Apps\MSN Toolbar\MSN Toolbar\01.02.5000.1021\en-us\msntb.dll (file missing)
    O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe
    O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    O4 - HKLM\..\Run: [Hcontrol] C:\WINDOWS\ATK0100\Hcontrol.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\ASUSTek\ASUSDVD\PDVDServ.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [pccguide.exe] "C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe"
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [DiskeeperSystray] "C:\Program Files\Executive Software\Diskeeper\DkIcon.exe"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll (file missing)
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll (file missing)
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/actives...ree/asinst.cab
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
    O20 - Winlogon Notify: winjau32 - winjau32.dll (file missing)
    O23 - Service: Adobe LM Service - Unknown owner - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: Diskeeper - Executive Software International, Inc. - C:\Program Files\Executive Software\Diskeeper\DkService.exe
    O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido anti-malware\ewidoctrl.exe
    O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido anti-malware\ewidoguard.exe
    O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Trend Micro Central Control Component (PcCtlCom) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    O23 - Service: Trend Micro Real-time Service (Tmntsrv) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe

  10. #10
    Expert-Emeritus illukka's Avatar
    Join Date
    Nov 2005
    Location
    The Pits Of Hell
    Posts
    1,289

    Default

    hi

    good work

    update ewido

    checkmark/fix this line with hiajckthis:


    O20 - Winlogon Notify: winjau32 - winjau32.dll (file missing)


    reboot into safe mode, scan with ewido, allowing it to clean infected files

    save the report and after rebooting post it here along with a new hiajckthis log
    I Am A Proud Member of ASAP Since 2004

    To Ride, Shoot Straight And Speak TheTruth

    HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •