Whew... full of stuff, here you go.... and thanks for even trying on this huge task,
Cosmo:
KASPERSKY ONLINE SCANNER REPORT
Thursday, May 17, 2007 9:54:55 AM
Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.93.0
Kaspersky Anti-Virus database last update: 17/05/2007
Kaspersky Anti-Virus database records: 322804
-------------------------------------------------------------------------------
Scan Settings:
Scan using the following antivirus database: extended
Scan Archives: true
Scan Mail Bases: true
Scan Target - My Computer:
C:\
D:\
E:\
Scan Statistics:
Total number of scanned objects: 32533
Number of viruses found: 27
Number of infected objects: 136
Number of suspicious objects: 2
Duration of the scan process: 00:18:27
Infected Object Name / Virus Name / Last Action
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC7.zip/POPCORN72.EXE Suspicious: Password-protected-EXE skipped
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC7.zip ZIP: suspicious - 1 skipped
C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\RED1\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\RED1\Desktop\requested-files[2007-05-03_21_11].cab/C:/WINDOWS/system32/sony.exe Infected: Email-Worm.Win32.Zhelatin.cx skipped
C:\Documents and Settings\RED1\Desktop\requested-files[2007-05-03_21_11].cab/C:/WINDOWS/system32/cent.exe Infected: Packed.Win32.Tibs.v skipped
C:\Documents and Settings\RED1\Desktop\requested-files[2007-05-03_21_11].cab CAB: infected - 2 skipped
C:\Documents and Settings\RED1\Desktop\smitfraud\SmitfraudFix\Reboot.exe Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped
C:\Documents and Settings\RED1\Desktop\smitfraud\SmitfraudFix.exe/data.rar/SmitfraudFix/Reboot.exe Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped
C:\Documents and Settings\RED1\Desktop\smitfraud\SmitfraudFix.exe/data.rar Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped
C:\Documents and Settings\RED1\Desktop\smitfraud\SmitfraudFix.exe RarSFX: infected - 2 skipped
C:\Documents and Settings\RED1\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\RED1\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\RED1\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\RED1\Local Settings\History\History.IE5\MSHist012007051720070518\index.dat Object is locked skipped
C:\Documents and Settings\RED1\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\RED1\ntuser.dat Object is locked skipped
C:\Documents and Settings\RED1\ntuser.dat.LOG Object is locked skipped
C:\QooBox\Quarantine\C\WINDOWS\pp.exe.vir Infected: Email-Worm.Win32.Zhelatin.bl skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\adirka.dll.vir Infected: Email-Worm.Win32.Banwarum.f skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\adirka.exe.vir Infected: Email-Worm.Win32.Zhelatin.ce skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\adirss.exe.vir Infected: Email-Worm.Win32.Zhelatin.ce skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\cent.exe.exe.vir Infected: Email-Worm.Win32.Zhelatin.cx skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\dd.exe.vir Infected: Trojan-Downloader.Win32.Tibs.kc skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\lnwin.exe.vir Infected: Trojan-Downloader.Win32.Tibs.kc skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\m22.exe.vir Infected: Backdoor.Win32.Agent.amd skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\ma.exe.exe.vir Infected: Email-Worm.Win32.Zhelatin.ce skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\pdp.exe.exe.vir Infected: Email-Worm.Win32.Zhelatin.dh skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\pep.exe.exe.vir Infected: Email-Worm.Win32.Zhelatin.ce skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\pp.exe.exe.vir Infected: Trojan-Downloader.Win32.Tibs.kc skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\rsvp32_2.dll.vir Infected: Email-Worm.Win32.Zhelatin.al skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\sm.exe.vir Infected: Trojan-Downloader.Win32.Tibs.kc skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\wincom32.sys.vir Infected: Rootkit.Win32.Agent.dh skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\zoom.exe.exe.vir Infected: Email-Worm.Win32.Zhelatin.ce skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\zu.exe.exe.vir Infected: Trojan-Downloader.Win32.Tibs.kc skipped
Return to OTMoveIt, right click on the "Paste List of Files/Folders to be moved" window and choose Paste.
Click the red Moveit! button.
Close OTMoveIt
If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.
Restart the computer.
Restart your computer to the safe mode:
Restart your computer
Start tapping the F8 key when the computer restarts.
When the start menu opens, choose Safe mode
Press Enter. The computer then begins to start in Safe mode.
Run a scan with Dr.Web CureIt
Doubleclick the drweb-cureit.exe file and Allow to run the express scan
This will scan the files currently running in memory and when something is found, click the yes button when it asks you if you want to cure it. This is only a short scan.
Once the short scan has finished, you should now mark the drives that you want to scan.
Select all drives. A red dot shows which drives have been chosen.
Click the green arrow at the right, and the scan will start.
Click 'Yes to all' if it asks if you want to cure/move the file.
When the scan has finished, look if you can click next icon next to the files found
If so, click it and then click the next icon right below and select Move incurable
After the scan, in the menu, click file and choose save report list
Save the report to your desktop. The report will be called DrWeb.csv
Close Dr.Web Cureit.
Reboot the computer in Normal Mode,
Post the Cure-it report and a fresh HijackThis log
This topic has been archived due to lack of a response. :spider:
If you need it re-opened, please send me a private message (pm) and provide a link to the thread. Applies only to the original poster, anyone else with similar problems please start a new topic.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.