Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Can't delete win32/clspring.FQ


  • This topic is locked This topic is locked

#1
Codered

Codered

    New Member

  • Member
  • Pip
  • 7 posts
I have run eTrust Pest patrol and EZantivirus both in safe mode and EZantivirus finds the win32/clspring.FQ but can't delete it. I can't get rid of all pop-ups. I even disabled system restore and ran again as per EZantivirus suggestion. I'm Lost!

Any help will be greatly appreciated.

Here's my HJT log:

Logfile of HijackThis v1.99.1
Scan saved at 5:53:18 PM, on 2/14/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\MEDIC\bin\sprtcmd.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVTray.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVRID.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Firewall\ca.exe
C:\Program Files\s?stem\s?oolsv.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\ISafe.exe
C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\VetMsg.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\USER\Desktop\HijackThis.exe

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\SYSTEM\blank.htm
R3 - Default URLSearchHook is missing
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,iojgeux.exe
O2 - BHO: (no name) - {8549EA3F-07A4-7723-DB4F-299091D56997} - C:\WINDOWS\system32\tgcp.dll
O4 - HKLM\..\Run: [Service] C:\WINDOWS\System32\service.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [MEDIC] "C:\Program Files\MEDIC\bin\sprtcmd.exe" /P MEDIC
O4 - HKLM\..\Run: [QOELOADER] "C:\Program Files\CA\eTrust EZ Armor\eTrust Anti-Spam\QSP-2.1.215.5\QOELoader.exe"
O4 - HKLM\..\Run: [CaAvTray] "C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVTray.exe"
O4 - HKLM\..\Run: [CAVRID] "C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVRID.exe"
O4 - HKLM\..\Run: [Zone Labs Client] "C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Firewall\ca.exe"
O4 - HKCU\..\Run: [Rnte] C:\Program Files\aads\ulcr.exe
O4 - HKCU\..\Run: [MSKAGENTEXE] C:\PROGRA~1\McAfee\SPAMKI~1\MSKAgent.exe
O4 - HKCU\..\Run: [Oooo] C:\Program Files\ubmn\ahia.exe
O4 - HKCU\..\Run: [Mlsn] C:\Program Files\s?stem\s?oolsv.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing)
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O15 - Trusted Zone: http://www.apple.com
O15 - Trusted Zone: http://click.getmirar.com (HKLM)
O15 - Trusted Zone: http://click.mirarsearch.com (HKLM)
O15 - Trusted IP range: 67.19.178.84 (HKLM)
O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.6) - http://housecall65.t...ivex/hcImpl.cab
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitd...can8/oscan8.cab
O20 - Winlogon Notify: WRNotifier - WRLogonNTF.dll (file missing)
O23 - Service: CAISafe - Computer Associates International, Inc. - C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\ISafe.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: VET Message Service (VETMSGNT) - Computer Associates International, Inc. - C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\VetMsg.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs Inc. - C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe

Edited by Codered, 14 February 2007 - 07:59 PM.

  • 0

Advertisements


#2
Crustyoldbloke

Crustyoldbloke

    Old Malware Surgeon with a shaky scalpel

  • Retired Staff
  • 15,131 posts
Hello Codered and welcome to Geeks to Go

As an introduction, please note that I am not Superhuman, I do not know everything, but what I do know has taken me years to learn. I am happy to pass on this information to you, but please bear in mind that I am also fallible.

ALL staff here at Geeks To Go are volunteers, please bear that in mind if I don’t answer your post quickly; I give what time I can.

Please note that you should have Administrator rights to perform the fixes. Also note that multiple identity PC’s (family PC’s) present a different problem; please tell me if your PC has more than one individual’s setting, but continue with the fix.

Before we get underway, you may wish to print these instructions for easy reference during the fix, although please be aware that many of the required URLs are hyperlinks in the red names shown on your screen. Part of the fix may require you to be in Safe Mode, which will not allow you to access the internet, or my instructions! (Click the Options drop down near the upper right of the topic. Select Print this topic.)

You have quite a mixture of malware and Trojans. Let’s see what we can do.

You have more infections than I can safely deal with in one go, so let’s start with the worst two offenders and take it from there.

Look in your Control Panel’s Add/Remove Programs for:
PuritySCAN By OIN,
OuterInfo,
OIN or similar
Yazzle by Oin
Snowballwars by Oin
Cowabanga by OIN
or anything similar with Oin in it.
, click on it and click remove.

Reboot and delete this folder if found: C:\Program Files\PurityScan\

If it is not listed, download and run this uninstaller: outerinfo.com/OiUninstaller.exe

Tutorial for the uninstaller if needed

---------------------------------------------------------------------------

Please download SDFix and save it to your desktop.

Please then reboot your computer in Safe Mode by doing the following :
  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
  • Instead of Windows loading as normal, a menu with options should appear.
  • Select the first option, to run Windows in Safe Mode, then press "Enter".
  • Choose your usual account.
  • In Safe Mode, right click the SDFix.zip folder and choose Extract All,
  • Open the extracted folder and double click RunThis.bat to start the script.
  • Type Y to begin the script.
  • It will remove the Trojan Services then make some repairs to the registry and prompt you to press any key to Reboot.
  • Press any Key and it will restart the PC.
  • Your system will take longer that normal to restart as the fixtool will be running and removing files.
  • When the desktop loads the Fixtool will complete the removal and display Finished, then press any key to end the script and load your desktop icons.
  • Finally open the SDFix folder on your desktop and copy and paste the contents of the results file Report.txt back onto the forum with a new HijackThis log

  • 0

#3
Codered

Codered

    New Member

  • Topic Starter
  • Member
  • Pip
  • 7 posts
Thank You. Here they are:


SDFix: Version 1.65

Run by: Administrator - Thu 02/15/2007 @ 17:55:53.68

Microsoft Windows XP [Version 5.1.2600]

Running From: C:\SDFix

Safe Mode:
Checking Services:

Name:

Path:


Restoring Windows Registry Entries
Restoring Default Hosts File


Rebooting...

Normal Mode:
Checking Files:

Below files will be copied to Backups folder then removed:

C:\WINDOWS\system32\zlbw.dll - Deleted



ADS Check:

C:\WINDOWS\system32
No streams found.

Final Check:


Authorized Application Key Export:

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
"C:\\WINDOWS\\system32\\sessmgr.exe"="C:\\WINDOWS\\system32\\sessmgr.exe:*:Disabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\iTunes\\iTunes.exe"="C:\\Program Files\\iTunes\\iTunes.exe:*:Enabled:iTunes"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"


Remaining Files:
---------------

Backups Folder: - C:\SDFix\backups\backups.zip


Checking For Files with Hidden Attributes :

C:\Program Files\Uninstall Information\IE40.Comctl32\AINF0000
C:\WINDOWS\TEMP\qa.dll
C:\Program Files\Uninstall Information\mshtml.DllReg\AINF0000
C:\WINDOWS\SYSTEM\Tools\All.exe
C:\WINDOWS\SYSTEM\Tools\Change.exe
C:\WINDOWS\SYSTEM\Tools\CheckPath.exe
C:\WINDOWS\SYSTEM\Tools\Counter.exe
C:\WINDOWS\SYSTEM\Tools\DelFolders.exe
C:\WINDOWS\SYSTEM\Tools\DirectSetup.exe
C:\WINDOWS\SYSTEM\Tools\RegClean.exe
C:\WINDOWS\SYSTEM\Tools\Regexe.exe
C:\WINDOWS\SYSTEM\Tools\Restart.exe
C:\WINDOWS\SYSTEM\Tools\RunRegexe.exe
C:\WINDOWS\SYSTEM32\F?nts\services.exe
C:\Program Files\Common Files\Adobe\ESD\DLMCleanup.exe
C:\Program Files\Outlook Express\msimn.exe
C:\Program Files\W?nSxS\netdde.exe
C:\Program Files\s?stem\s?oolsv.exe
C:\WINDOWS\SYSTEM32\config\system.tmp.LOG
C:\WINDOWS\SYSTEM32\config\software.tmp.LOG
C:\WINDOWS\SYSTEM32\config\default.tmp.LOG
C:\WINDOWS\TEMP\CSBABCDCB1-A973-4DC8-9689-65D5D79CA5C9.tmp
C:\WINDOWS\TEMP\CSEFB2A306-E9CC-4599-BEB1-C76115157AE7.tmp
C:\WINDOWS\TEMP\CS2EE7B5DA-642B-4BAE-BDCE-929AD88027BF.tmp
C:\WINDOWS\TEMP\CS4EC7930C-B26D-4BAC-B595-1A292BC59957.tmp
C:\WINDOWS\TEMP\CS9E088D21-6233-4797-8A94-EFFAE2AE7BB8.tmp
C:\WINDOWS\TEMP\CS001C44E1-5C5B-4081-A92B-92B9581E0C6F.tmp
C:\WINDOWS\TEMP\CSAFC8AF68-59C5-42EA-8F8A-504477FD99F9.tmp
C:\WINDOWS\TEMP\CS5B64217D-1206-4A70-BF00-22D97F8B39BC.tmp
C:\WINDOWS\TEMP\kyf6004.TMP
C:\WINDOWS\TEMP\CS7C999CD4-AAA2-4437-B3F4-BA547CA8BC56.tmp
C:\WINDOWS\TEMP\CSF54F1F28-2899-45EC-941A-DADC3A762DBB.tmp
C:\WINDOWS\TEMP\CS260E4A2E-8606-416B-BC01-8336AF6305E9.tmp
C:\WINDOWS\TEMP\CS3A70904A-2AA9-4E16-9817-22AFC551E076.tmp
C:\WINDOWS\TEMP\CS22CCA357-0497-4955-B02F-750BAFC30D75.tmp
C:\WINDOWS\TEMP\CS104729EF-BF60-4CEA-8556-1ED7E6E97BE4.tmp
C:\WINDOWS\TEMP\CS559C694B-4334-4A92-B0BD-759A9AB08BD1.tmp
C:\WINDOWS\TEMP\CS5C702D39-8C55-464E-AC20-2D3C0AED6170.tmp
C:\WINDOWS\TEMP\CSFCA32057-138B-4723-ACE6-F5E1075D36B3.tmp
C:\WINDOWS\TEMP\CSB5344371-12C7-4CF0-902F-56B536A78227.tmp
C:\WINDOWS\TEMP\CS7A340778-0D49-4EBC-89E7-63635702BF38.tmp
C:\WINDOWS\TEMP\CS3B9C2238-5AB5-4A4D-9417-824C297C56B3.tmp
C:\WINDOWS\TEMP\CSC142A913-F9C3-4CD3-A6EF-B3F701EB604C.tmp
C:\WINDOWS\TEMP\CSD4920940-AD19-4927-A5E3-AEC9A538DD1F.tmp
C:\WINDOWS\TEMP\CS2E4F8667-AEE7-4BFC-9982-43F12D706802.tmp
C:\WINDOWS\TEMP\CS28733DA2-006D-4670-8A95-3605B6FE920F.tmp
C:\WINDOWS\TEMP\CSDA96ED65-F56B-468F-A283-D30203B80D78.tmp
C:\WINDOWS\TEMP\CSD2952B8B-59A6-4ACD-8ED5-F57F03F70411.tmp
C:\WINDOWS\TEMP\CSEC05BEF7-862A-41FD-9870-86DDFF0E8A0E.tmp
C:\WINDOWS\TEMP\CS5CD5A862-A333-47C7-91D0-D70AE8909EB7.tmp
C:\WINDOWS\TEMP\CS90E44818-A86A-4953-B92D-2A608714F2AA.tmp
C:\WINDOWS\TEMP\CS91C75693-E36F-4F80-8B5F-61ADD9FAEEF9.tmp
C:\WINDOWS\TEMP\CS9DE6C9B5-447E-4E11-9BAE-486B2F268114.tmp
C:\WINDOWS\TEMP\CS4C9D302B-5D2D-476F-83BF-89BE07303DCE.tmp
C:\WINDOWS\TEMP\CS5E9AEBC3-ECEC-481A-8FEE-00B1908631E6.tmp
C:\WINDOWS\TEMP\CS022EF9D6-37CB-4E23-AB36-D0F29D709C6C.tmp
C:\WINDOWS\TEMP\CS575685A0-8EE1-4F32-A30B-91AAFAA233FA.tmp
C:\WINDOWS\TEMP\CSD81C811A-60CF-409D-A329-DA615D4696F7.tmp
C:\WINDOWS\TEMP\CSCC181C34-31B1-41BC-8CAD-CBBE19CD4A78.tmp
C:\WINDOWS\TEMP\CS4B141501-BA6F-419B-AD8A-B912E905D0BF.tmp
C:\WINDOWS\TEMP\CS0D01121D-B1C1-4024-9E9A-5BBD00670312.tmp
C:\WINDOWS\TEMP\CSE687F27E-4430-495E-9A63-FD0095D25728.tmp
C:\WINDOWS\TEMP\CS97A92502-607E-4F18-B846-90C84E04EC62.tmp
C:\WINDOWS\TEMP\CS7DD95180-499E-4B44-8223-A92C32FCAAF5.tmp
C:\WINDOWS\TEMP\CSEC553494-9BEA-4853-8C8C-07C970ACCE26.tmp
C:\WINDOWS\TEMP\CS6937E0D2-948C-4AE2-8473-FE23C9B97FBC.tmp
C:\WINDOWS\TEMP\CSCC4EDCC2-C60A-45A8-A78C-84EB20A7AA06.tmp
C:\WINDOWS\TEMP\CS2233FB0E-BD9B-4315-9387-975E542D8B3B.tmp
C:\WINDOWS\TEMP\CSC2B46F2D-64D8-4D1E-8BD8-F2CCD659C43A.tmp
C:\WINDOWS\TEMP\CS8E2FDE36-5529-4EEC-9D6B-A1A7483DD13D.tmp
C:\WINDOWS\TEMP\CS8BF07437-9B93-4021-8EBD-662A6DAB9BCD.tmp
C:\WINDOWS\TEMP\CS053AD659-CD82-485E-ADA9-90E555F8B739.tmp
C:\WINDOWS\TEMP\CSBCCB4189-6F06-4F01-A605-384F2C7ECDB8.tmp
C:\WINDOWS\TEMP\CS442D231B-F4AA-4B62-B534-E04F098BCF56.tmp
C:\WINDOWS\TEMP\CSDEE02726-979B-4E58-BD28-FAEBD98FDE78.tmp
C:\WINDOWS\TEMP\CS830CF5B7-C460-4B08-BFB8-22A871F71B19.tmp
C:\WINDOWS\TEMP\CS6866E458-D69A-40E9-AD7C-A51248A74762.tmp
C:\WINDOWS\TEMP\CSF7A92E81-EE66-4586-8676-0E5EFC1369CA.tmp
C:\WINDOWS\TEMP\CSF40DDFB3-8497-4EAF-BC7F-59DE613F74B1.tmp
C:\WINDOWS\TEMP\CS2EE020C1-1BC7-4AC9-8F43-7EB5D22D05FC.tmp
C:\WINDOWS\TEMP\CS09A43AFA-CD95-432F-B150-0529335BB8FF.tmp
C:\WINDOWS\TEMP\CSB8B95BF8-2595-4250-959A-5C908A22D179.tmp
C:\WINDOWS\TEMP\CSD23F3541-8E9A-429C-B154-B6D7EC9EDD56.tmp
C:\WINDOWS\TEMP\CS8BE86CB0-F332-4D30-A3E7-66A475BADC63.tmp
C:\WINDOWS\TEMP\CSFC34FE8B-F18F-4449-93C8-19D374D4F41D.tmp
C:\WINDOWS\TEMP\CSFA50679E-CF30-423F-8A3E-E694274500AE.tmp
C:\WINDOWS\TEMP\CS11449531-AA5C-4A13-BDCC-154247982B1C.tmp
C:\WINDOWS\TEMP\CSA19FC0D0-5000-4F33-B3B9-E3FCE2423426.tmp
C:\WINDOWS\TEMP\CS6B939DB1-9040-4743-AC77-9B2326BDB2CB.tmp
C:\WINDOWS\TEMP\CSCD39268E-4931-4FEC-88A8-486ACBA08597.tmp
C:\WINDOWS\TEMP\CS7EE572F8-CEF8-4BC4-B1DC-3A0CDE280467.tmp
C:\WINDOWS\TEMP\CSEB143E6E-1B9C-4F1C-B447-20237415FF4A.tmp
C:\WINDOWS\TEMP\CSC49297A5-EDBE-43E2-8ADC-25242002044B.tmp
C:\WINDOWS\TEMP\CS4BAE5EE9-7009-49AC-ABAE-49049D3BD673.tmp
C:\WINDOWS\TEMP\CS163A4747-F044-4D75-9853-D5CB6DEBF3F2.tmp
C:\WINDOWS\TEMP\CSECD443DA-92A5-4794-B455-67099FCEE069.tmp
C:\WINDOWS\TEMP\CSB28AC3CA-47AF-4877-9637-3F12BED5A89F.tmp
C:\WINDOWS\TEMP\CSD3E1EA27-8892-4C4E-B139-052C27CF8C35.tmp
C:\WINDOWS\TEMP\CSA96066F6-FD7D-4CF8-927F-7749CA7A2721.tmp
C:\WINDOWS\TEMP\CS510C5EC9-5E47-4861-A3FA-353DF98976B1.tmp
C:\WINDOWS\TEMP\CS0E561496-13DC-401B-872D-D10D18F42843.tmp
C:\WINDOWS\TEMP\CS74F3F9BC-710F-4E4C-AB8C-98CD0F8766FE.tmp
C:\WINDOWS\TEMP\CSF8291640-95E1-42B7-9777-0F7E5E78BFCF.tmp
C:\WINDOWS\TEMP\CSD205DB2E-FF6F-4B25-84A8-733E852858AE.tmp
C:\WINDOWS\TEMP\CSB811C0BE-8025-49CB-BE3D-66025E23471B.tmp
C:\WINDOWS\TEMP\CSD9CE0597-7FE0-4577-88CC-04083F2EE9AF.tmp
C:\WINDOWS\TEMP\CS3BED6AE7-47E7-41C5-8A3C-E5414DE7FA0F.tmp
C:\WINDOWS\TEMP\CSD9922AE8-00CB-4FF4-BE74-DD46B677F4DC.tmp
C:\WINDOWS\TEMP\CS87D17F49-A6FD-4E67-A85A-EF1E1158A4A7.tmp
C:\WINDOWS\TEMP\CSB2960770-976D-4320-87BC-50F90B3B8B3B.tmp
C:\WINDOWS\TEMP\CSB15818B4-D83A-4D1C-86F4-4D97ABC7E0F7.tmp
C:\WINDOWS\TEMP\CSC7EDCE30-84DB-471A-9C27-58AE1569FF49.tmp
C:\WINDOWS\TEMP\CSF962484A-3BAA-41DC-B8BD-56DFD9151098.tmp
C:\WINDOWS\TEMP\CS7CA1A4FB-936A-4D2B-9C59-ED69F1394C7C.tmp
C:\WINDOWS\TEMP\CSD60D3C70-14A5-4150-BC78-41AD97E00BD8.tmp
C:\WINDOWS\TEMP\CS30E378D1-4250-4B6A-8632-5337E4A959AC.tmp
C:\WINDOWS\TEMP\CSA4DCBBB4-D806-445F-B3D0-9F3FFDD9B3E3.tmp
C:\WINDOWS\TEMP\CSC751466A-A675-49B7-B70C-F198B2994828.tmp
C:\WINDOWS\TEMP\CS577729AB-25E9-49B0-A221-A9CF647D68DF.tmp
C:\WINDOWS\TEMP\CSE26D42CD-2E42-44B2-B285-B2E5D373B2EA.tmp
C:\WINDOWS\TEMP\CSC86DD267-F640-4059-BA0F-418BEFCA29D8.tmp
C:\WINDOWS\TEMP\CSC25E9D10-35F5-475F-9716-37707ABA3A6E.tmp
C:\WINDOWS\TEMP\CSE9BA4CAA-C61B-4857-A995-3AB590951AAF.tmp
C:\WINDOWS\TEMP\CS19CB609C-122B-48A5-8D19-7E49361D3ABA.tmp
C:\WINDOWS\TEMP\CS4A9B1AC1-25C3-48D3-9D65-812A53B5CD7B.tmp
C:\WINDOWS\TEMP\CSCFAA53A6-D2A9-48D6-B75B-8A130B59FD42.tmp
C:\WINDOWS\TEMP\CS0FE5C9B8-AF9D-4DD0-8DB3-DEEB794789EF.tmp
C:\WINDOWS\TEMP\CS391FB993-8549-428A-AA24-60BF477AC81C.tmp
C:\WINDOWS\TEMP\CSFF65437E-2604-4289-B75E-D8A2CD59BED7.tmp
C:\WINDOWS\TEMP\CS64DF059D-D921-4AF0-9496-E189CB0076FD.tmp
C:\WINDOWS\TEMP\CSD725B4B3-653C-4982-8E75-8D8FAB35D42C.tmp
C:\WINDOWS\TEMP\CS94C23611-EC5A-4067-8C84-D26CCD49387C.tmp
C:\WINDOWS\TEMP\CS212CFECE-DB89-4BFC-88CF-05B64BB32408.tmp
C:\WINDOWS\TEMP\CS66C53CD5-2A91-4E17-84C1-D0183BC711C7.tmp
C:\WINDOWS\TEMP\CSDA47A894-BD0C-4943-BA25-DED903EA1C5A.tmp
C:\WINDOWS\TEMP\CS78A3C651-6F6A-42E5-957C-5852968DD557.tmp
C:\WINDOWS\TEMP\CS5C311D90-B525-481A-9564-594CABD5AAF5.tmp
C:\WINDOWS\TEMP\CSC2DEAF7C-FAC2-4558-BC17-4D87BECB67DC.tmp
C:\WINDOWS\TEMP\CSE465E457-F616-48FE-87EB-100ABD2D81AB.tmp
C:\WINDOWS\TEMP\CSAD48A359-21D1-48E9-9075-379D79C1FCCB.tmp
C:\WINDOWS\TEMP\CSAFFEDF8A-DE73-4D58-8A58-169A1761989C.tmp
C:\WINDOWS\TEMP\CSFEDBCCE4-8260-4F3E-9FEC-E1CCEBA527FC.tmp
C:\WINDOWS\TEMP\CS274F9056-2324-4AD9-A25C-EBD6056F0267.tmp
C:\WINDOWS\TEMP\CSED7D54D9-A608-4831-825A-90416D52D42B.tmp
C:\WINDOWS\TEMP\CS3953E000-5BE8-4F17-A25E-792E2791A0C7.tmp
C:\WINDOWS\TEMP\CS689AEEE8-3349-4E5A-A337-83AE4032E18B.tmp
C:\WINDOWS\TEMP\CS109EEFD3-AAD7-473F-B45C-C39A31D4FD4D.tmp
C:\WINDOWS\TEMP\CSD2D070C4-264B-48E7-A965-F02FE14FCC98.tmp
C:\WINDOWS\TEMP\CS5F9878BB-E28C-4979-B1E7-C1C43BE49D85.tmp
C:\WINDOWS\TEMP\CSEE59D4F0-EBF6-4C87-982E-A19669EA9DD3.tmp
C:\WINDOWS\TEMP\CSB8AABCDB-F2EB-45CD-96AD-EA1D55B17F46.tmp
C:\WINDOWS\TEMP\CSBEC6428E-91FF-4018-B39B-3179DA96A3B8.tmp
C:\WINDOWS\TEMP\CSA203397D-B68C-4709-8A90-1B1F22D85604.tmp
C:\WINDOWS\TEMP\CS3EAD7B2C-4987-4DD8-9A5E-1FD9865F8F81.tmp
C:\WINDOWS\TEMP\CS12E96C74-56C1-4BA0-8BC7-DCE9518DD338.tmp
C:\WINDOWS\TEMP\CS2445A5A5-E07B-4010-AAC9-A0563107D9F8.tmp
C:\WINDOWS\TEMP\CS263E0F63-0624-4DE6-A87E-68E5C29CA0E7.tmp
C:\WINDOWS\TEMP\CSB8446A77-AE8E-4C1B-AEEE-7CF37F07E923.tmp
C:\WINDOWS\TEMP\CS4ECDBE82-44A6-4EB4-B808-47B9798BAECE.tmp
C:\WINDOWS\TEMP\CSD16FF346-D430-4CC9-BD4F-AD3ADF79FB24.tmp
C:\WINDOWS\TEMP\CS426E3871-C825-4BAA-A4C6-19084A3D52DD.tmp
C:\WINDOWS\TEMP\CS2F159FA2-0B91-4702-9902-ECBAC3F7E9C2.tmp
C:\WINDOWS\TEMP\CSD880F305-611E-4751-90C8-A240E2C081D1.tmp
C:\WINDOWS\TEMP\CS297824DF-C54D-4CA0-AE76-536DD9B46ABD.tmp
C:\WINDOWS\TEMP\CS78EE947F-041E-4C85-B0F8-4FDB3AEE0D9D.tmp
C:\WINDOWS\TEMP\CS7E1F4C1C-3E20-47F2-BDCD-BD057555FF2C.tmp
C:\WINDOWS\TEMP\CS432A5242-9537-4DBD-B91E-687A05969014.tmp
C:\WINDOWS\TEMP\CS6878C5E9-F053-4B51-ACB1-20F3EFD9DB88.tmp
C:\WINDOWS\TEMP\CSB2734829-E06F-49B4-B29D-48F34E5A7962.tmp
C:\WINDOWS\TEMP\CSE8A20457-F36A-4164-9062-4C008A113E5B.tmp
C:\WINDOWS\TEMP\CSB0924DC1-B2EC-4EC8-940F-3610EF92528E.tmp
C:\WINDOWS\TEMP\CS75BA2E60-D6DE-44C6-81E8-CC4D290A8EE6.tmp
C:\WINDOWS\TEMP\CS4A59ABB4-C96C-44FC-82F4-9F4A2FD7682D.tmp
C:\WINDOWS\TEMP\CS041A4830-9E07-48A2-A30D-CD39686C1D7C.tmp
C:\WINDOWS\TEMP\CS9B1AC8D0-5499-4C58-99AC-2FB9884825E1.tmp
C:\WINDOWS\TEMP\CS9AF7345A-8BB0-4FB5-892F-B3639FA9052B.tmp
C:\WINDOWS\TEMP\CS4712FD32-CF65-4AF8-A73C-A9C4BD1F879F.tmp
C:\WINDOWS\TEMP\CS8A2F6A06-394C-4957-8C83-7C9D1033657B.tmp
C:\WINDOWS\TEMP\CS075888FE-99C9-4B42-ABA2-56D0B622AD24.tmp
C:\WINDOWS\TEMP\CSB1585428-42C1-40F5-8C37-7401CE7142A6.tmp
C:\WINDOWS\TEMP\CS017D587C-4967-4FFA-9C05-FAE0B0DD03E2.tmp
C:\WINDOWS\TEMP\CSEAD19494-F31C-439C-B0C8-45B001BBA492.tmp
C:\WINDOWS\TEMP\CSE59F13F7-5E31-4959-A7F0-8B3726ED7805.tmp
C:\WINDOWS\TEMP\CSF6A7F4DC-F7AB-4534-BDB8-EBE2DF752CEE.tmp
C:\WINDOWS\TEMP\CS1D25BC24-D573-4D01-B0C2-7FA6EDBD1662.tmp
C:\WINDOWS\TEMP\CS09112D27-89F9-4AB7-8690-47C4D4F08459.tmp
C:\WINDOWS\TEMP\CSD3FBF36E-420F-41CC-8463-D56E3C2D1FAE.tmp
C:\WINDOWS\TEMP\CS652C8953-7597-4CC5-A694-B657122F9480.tmp
C:\WINDOWS\TEMP\CSC82D1249-04B1-469E-AA8E-889F76CF2198.tmp
C:\WINDOWS\TEMP\CSD2A94938-D798-4286-A823-0C9E9D1FED5A.tmp

Finished


HJT:

Logfile of HijackThis v1.99.1
Scan saved at 6:06:45 PM, on 2/15/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\ISafe.exe
C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\VetMsg.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\notepad.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\MEDIC\bin\sprtcmd.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust Anti-Spam\QSP-2.1.215.5\QOELoader.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVTray.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVRID.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Firewall\ca.exe
C:\Program Files\s?stem\s?oolsv.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\USER\Desktop\HijackThis.exe

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\SYSTEM\blank.htm
R3 - Default URLSearchHook is missing
O2 - BHO: (no name) - {8549EA3F-07A4-7723-DB4F-299091D56997} - C:\WINDOWS\system32\tgcp.dll
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [MEDIC] "C:\Program Files\MEDIC\bin\sprtcmd.exe" /P MEDIC
O4 - HKLM\..\Run: [QOELOADER] "C:\Program Files\CA\eTrust EZ Armor\eTrust Anti-Spam\QSP-2.1.215.5\QOELoader.exe"
O4 - HKLM\..\Run: [CaAvTray] "C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVTray.exe"
O4 - HKLM\..\Run: [CAVRID] "C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVRID.exe"
O4 - HKLM\..\Run: [Zone Labs Client] "C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Firewall\ca.exe"
O4 - HKCU\..\Run: [Rnte] C:\Program Files\aads\ulcr.exe
O4 - HKCU\..\Run: [MSKAGENTEXE] C:\PROGRA~1\McAfee\SPAMKI~1\MSKAgent.exe
O4 - HKCU\..\Run: [Oooo] C:\Program Files\ubmn\ahia.exe
O4 - HKCU\..\Run: [Mlsn] C:\Program Files\s?stem\s?oolsv.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing)
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O15 - Trusted Zone: http://www.apple.com
O15 - Trusted Zone: http://click.getmirar.com (HKLM)
O15 - Trusted Zone: http://click.mirarsearch.com (HKLM)
O15 - Trusted IP range: 67.19.178.84 (HKLM)
O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.6) - http://housecall65.t...ivex/hcImpl.cab
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitd...can8/oscan8.cab
O20 - Winlogon Notify: WRNotifier - WRLogonNTF.dll (file missing)
O23 - Service: CAISafe - Computer Associates International, Inc. - C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\ISafe.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: VET Message Service (VETMSGNT) - Computer Associates International, Inc. - C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\VetMsg.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs Inc. - C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe
  • 0

#4
Crustyoldbloke

Crustyoldbloke

    Old Malware Surgeon with a shaky scalpel

  • Retired Staff
  • 15,131 posts
Wow!

Please delete your temporary files.

Click on START > RUN > type in cleanmgr and hit ENTER

You will see a window asking you to choose your harddrive (most likely C: Drive)

Click it and Windows will now scan the drive and show you the results

Make sure the following are checked:Downloaded Program Files
Temporary Internet Files and
Recycle Bin
Compress Old Files (if you want more disk space)

Click OK and Disk Cleanup will delete those files for you.

Next, go to Start>Run>type in %temp% hit Enter and delete the content of all the temp folders shown (only the content, not the folder). A couple of files may be in memory and will not therefore delete, this is normal.

Please rerrun Outerinfouninstaller as before.

Please copy & paste this text into note pad and save as find.bat

dir C:\windows\temp\*.*>>log.txt

Save it to your desktop and doublecick it, a log will appear shortly afterwards. Please post that log.
  • 0

#5
Codered

Codered

    New Member

  • Topic Starter
  • Member
  • Pip
  • 7 posts
Here it is:

Volume in drive C has no label.
Volume Serial Number is 3B02-110F

Directory of C:\windows\temp

06/02/2004 10:09 AM <DIR> .
06/02/2004 10:09 AM <DIR> ..
02/16/2007 04:27 PM 256 ZLT07e67.TMP
02/01/2002 04:23 PM 344,923 IEC50E4.TMP
04/22/2006 12:03 PM 0 sbs.2
04/27/2006 04:10 PM 0 scq4.2
04/27/2006 04:10 PM 0 scq4.3
5 File(s) 345,179 bytes
2 Dir(s) 8,507,129,856 bytes free
  • 0

#6
Crustyoldbloke

Crustyoldbloke

    Old Malware Surgeon with a shaky scalpel

  • Retired Staff
  • 15,131 posts
Hello again

Please revisit this folder:

C:\windows\temp\

and delete these files:

02/16/2007 04:27 PM 256 ZLT07e67.TMP
02/01/2002 04:23 PM 344,923 IEC50E4.TMP
04/22/2006 12:03 PM 0 sbs.2
04/27/2006 04:10 PM 0 scq4.2
04/27/2006 04:10 PM 0 scq4.3

-----------------------------------------------------------------

Let's continue

To start please download the following programmes, we will run them later. Please save them to a place that you will remember, I suggest the Desktop:

Killbox by Option^Explicit
CCleaner
AVG AntiSpyware
cwsserviceemove.reg file

Right click on this link Del 015 Domains.inf and choose Save (link) As. Save it to your desktop. Right click on that file and choose Install. It will run immediately (you won't be able to see anything happen). You may delete it afterwards

There is a file in your log of which I am unsure. For that reason, I need you to submit it to Jotti's for analysis.

1. Click HERE to get to Jotti's site.

2. At the top of the Jotti window, use the Browse button to locate the following file on your system:

C:\Program Files\aads\ulcr.exe

3. Once you have located the file, click SUBMIT and the content of the file will be uploaded by the site and analysed.

4. Please provide me with the results of the analysis.(if it is definitely bad, please add it to the killbox list below).

Please install, and update AVG Anti Spyware
  • Load AVGas and then click the Update tab at the top. Under Manual Update click Start update.
  • After the update finishes (the status bar at the bottom will display "Update successful")
  • Please select the "Scanner" icon at the top of the screen, then select the "Settings" tab.
  • Once in the Settings screen click on "Recommended actions" and then select "Quarantine".
  • Under "Reports"
  • Select "Automatically generate report after every scan"
  • Deselect "Only if threats were found"
  • Close AVGas. Do not run it yet.
Next, please reboot your computer in Safe Mode by doing the following:
  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, press F8.
  • Instead of Windows loading as normal, a menu should appear
  • Select the first option, to run Windows in Safe Mode.
For additional help in booting into Safe Mode, see the following site:

Safe Mode

  • In Safe Mode, load AVGas and click on the Scanner tab at the top and then click on Complete System Scan. This scan can take quite a while to run, so be patient.
  • AVGas will list any infections found on the left hand side. When the scan has finished, it will automatically set the recommended action. Click the Apply all actions button. AVGas will display "All actions have been applied" on the right hand side.
  • Click on "Save Report", then "Save Report As". This will create a text file. Make sure you know where to find this file again (I suggest the Desktop).
  • Please ensure you post that log in your reply.
Please re-open HiJackThis and scan. Check the boxes next to all the entries listed below.

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\SYSTEM\blank.htm
R3 - Default URLSearchHook is missing
O2 - BHO: (no name) - {8549EA3F-07A4-7723-DB4F-299091D56997} - C:\WINDOWS\system32\tgcp.dll
O4 - HKCU\..\Run: [Oooo] C:\Program Files\ubmn\ahia.exe
O4 - HKCU\..\Run: [Mlsn] C:\Program Files\s?stem\s?oolsv.exe
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing)
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing)
O20 - Winlogon Notify: WRNotifier - WRLogonNTF.dll (file missing)
Now close all windows other than HiJackThis, then click Fix Checked.

Unzip cwsserviceemove.reg file to your desktop. While in safe mode, double click on it and grant it permission to add the registry items.

Please set your system to show all files; please see here if you're unsure how to do this.

Please delete these folders (if present) using Windows Explorer:

C:\Program Files\ubmn\

Close Windows Explorer and Reboot normally

Please install Killbox by Option^Explicit.
  • Please double-click Killbox.exe to run it.
  • Select Delete on Reboot
  • then Click on the All Files button.
  • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):
C:\Program Files\s?stem\s?oolsv.exe
C:\WINDOWS\SYSTEM\blank.htm
C:\WINDOWS\system32\tgcp.dll
C:\Program Files\ubmn\ahia.exe
  • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
  • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt. Click OK at any PendingFileRenameOperations prompt (and please let me know if you receive this message!).
If your computer does not restart automatically, please restart it manually.

If you receive a message such as: "Component 'MsComCtl.ocx' or one of its dependencies not correctly registered: a file is missing or invalid." when trying to run Killbox, click here to download and run missingfilesetup.exe. Then try Killbox again.

Now we must hide the files we revealed earlier by reversing the process, this is an important safeguard to stop important system files being deleted by accident.

There is almost certainly bound to be some junk (leftover bits and pieces) on your system that is doing nothing but taking up space. I would recommend that you run CCleaner. Install it, check the default setting in the left-hand pane, ensure you uncheck old prefetch data found under the Windows tab, and under the heading of Applications, Utilities uncheck AVGas Anti-Spyware then click Analyze> Run Cleaner. You may be fairly surprised by how much it finds. Also click Issues then Scan for issues – fix selected issues

Post back a fresh HijackThis log (from normal mode) and I will take another look.
  • 0

#7
Codered

Codered

    New Member

  • Topic Starter
  • Member
  • Pip
  • 7 posts
Thanks, Here they are:

Logfile of HijackThis v1.99.1
Scan saved at 9:30:27 PM, on 2/17/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\MEDIC\bin\sprtcmd.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust Anti-Spam\QSP-2.1.215.5\QOELoader.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVTray.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVRID.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Firewall\ca.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\AdobeUpdateManager.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\ISafe.exe
C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\VetMsg.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\USER\Desktop\HijackThis.exe

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [MEDIC] "C:\Program Files\MEDIC\bin\sprtcmd.exe" /P MEDIC
O4 - HKLM\..\Run: [QOELOADER] "C:\Program Files\CA\eTrust EZ Armor\eTrust Anti-Spam\QSP-2.1.215.5\QOELoader.exe"
O4 - HKLM\..\Run: [CaAvTray] "C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVTray.exe"
O4 - HKLM\..\Run: [CAVRID] "C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVRID.exe"
O4 - HKLM\..\Run: [Zone Labs Client] "C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Firewall\ca.exe"
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKCU\..\Run: [Rnte] C:\Program Files\aads\ulcr.exe
O4 - HKCU\..\Run: [MSKAGENTEXE] C:\PROGRA~1\McAfee\SPAMKI~1\MSKAgent.exe
O4 - HKCU\..\Run: [Oooo] C:\Program Files\ubmn\ahia.exe
O4 - HKCU\..\Run: [Mlsn] C:\Program Files\s?stem\s?oolsv.exe
O4 - HKCU\..\Run: [updateMgr] C:\Program Files\Adobe\Acrobat 7.0\Reader\AdobeUpdateManager.exe AcRdB7_0_0
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.6) - http://housecall65.t...ivex/hcImpl.cab
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitd...can8/oscan8.cab
O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: CAISafe - Computer Associates International, Inc. - C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\ISafe.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: VET Message Service (VETMSGNT) - Computer Associates International, Inc. - C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\VetMsg.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs Inc. - C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe



---------------------------------------------------------
AVG Anti-Spyware - Scan Report
---------------------------------------------------------

+ Created at: 8:31:06 PM 2/17/2007

+ Scan result:



C:\System Volume Information\_restore{B0A6A52E-A1A8-4DF5-8BE8-0A5FAFF620A8}\RP3\A0000266.exe -> Adware.PurityScan : Cleaned with backup (quarantined).
C:\WINDOWS\SYSTEM32\tgcp.dll -> Adware.PurityScan : Cleaned with backup (quarantined).
C:\Program Files\sуstem\sрoolsv.exe -> Adware.ValueAd : Cleaned with backup (quarantined).
C:\WINDOWS\SYSTEM32\oins.exe -> Downloader.PurityScan.be : Cleaned with backup (quarantined).
C:\Documents and Settings\USER\Cookies\[email protected][1].txt -> TrackingCookie.2o7 : Cleaned.
C:\Documents and Settings\USER\Cookies\[email protected][1].txt -> TrackingCookie.2o7 : Cleaned.
C:\Documents and Settings\USER\Cookies\[email protected][2].txt -> TrackingCookie.Adbrite : Cleaned.
C:\Documents and Settings\USER\Cookies\[email protected][2].txt -> TrackingCookie.Adrevolver : Cleaned.
C:\Documents and Settings\USER\Cookies\[email protected][2].txt -> TrackingCookie.Advertising : Cleaned.
C:\Documents and Settings\USER\Cookies\[email protected][2].txt -> TrackingCookie.Atdmt : Cleaned.
C:\Documents and Settings\USER\Cookies\[email protected][1].txt -> TrackingCookie.Casalemedia : Cleaned.
C:\Documents and Settings\USER\Cookies\[email protected][1].txt -> TrackingCookie.Doubleclick : Cleaned.
C:\Documents and Settings\USER\Cookies\[email protected][2].txt -> TrackingCookie.Euroclick : Cleaned.
C:\Documents and Settings\USER\Cookies\[email protected][1].txt -> TrackingCookie.Falkag : Cleaned.
C:\Documents and Settings\USER\Cookies\[email protected][1].txt -> TrackingCookie.Fastclick : Cleaned.
C:\Documents and Settings\USER\Cookies\[email protected][2].txt -> TrackingCookie.Information : Cleaned.
C:\Documents and Settings\USER\Cookies\[email protected][2].txt -> TrackingCookie.Realmedia : Cleaned.
C:\Documents and Settings\USER\Cookies\[email protected][2].txt -> TrackingCookie.Revenue : Cleaned.
C:\Documents and Settings\USER\Cookies\[email protected][2].txt -> TrackingCookie.Ru4 : Cleaned.
C:\Documents and Settings\USER\Cookies\[email protected][2].txt -> TrackingCookie.Serving-sys : Cleaned.
C:\Documents and Settings\USER\Cookies\[email protected][1].txt -> TrackingCookie.Statcounter : Cleaned.
C:\Documents and Settings\USER\Cookies\[email protected][1].txt -> TrackingCookie.Trafficmp : Cleaned.
C:\Documents and Settings\USER\Cookies\[email protected][2].txt -> TrackingCookie.Tribalfusion : Cleaned.
C:\Documents and Settings\USER\Cookies\[email protected][1].txt -> TrackingCookie.Yieldmanager : Cleaned.
C:\System Volume Information\_restore{B0A6A52E-A1A8-4DF5-8BE8-0A5FAFF620A8}\RP2\A0000171.exe -> Trojan.Small : Cleaned with backup (quarantined).
C:\WINDOWS\SYSTEM32\wapisvit.exe -> Trojan.Small : Cleaned with backup (quarantined).
C:\WINDOWS\SYSTEM\wapisvit.exe -> Trojan.Small : Cleaned with backup (quarantined).
C:\WINDOWS\teller2.chk -> Trojan.Small : Cleaned with backup (quarantined).


::Report end

Edited by Codered, 17 February 2007 - 11:35 PM.

  • 0

#8
Crustyoldbloke

Crustyoldbloke

    Old Malware Surgeon with a shaky scalpel

  • Retired Staff
  • 15,131 posts
Hello again

What about the file analysis from Jotti for this file: C:\Program Files\aads\ulcr.exe
  • 0

#9
Codered

Codered

    New Member

  • Topic Starter
  • Member
  • Pip
  • 7 posts
I went to the site and tried to upload this file to be checked but when I opened the aads folder it comes up empty with 0 bytes?

Edited by Codered, 18 February 2007 - 01:40 PM.

  • 0

#10
Crustyoldbloke

Crustyoldbloke

    Old Malware Surgeon with a shaky scalpel

  • Retired Staff
  • 15,131 posts
OK, understood.

We can try Killbox again for the files which HJT is reporting as still present. If they survive again, we can use something a little stronger.

Rescan with HijackThis. Close all programmes leaving only HijackThis running. Place a checkmark or tick against the following:

O4 - HKCU\..\Run: [Rnte] C:\Program Files\aads\ulcr.exe
O4 - HKCU\..\Run: [Oooo] C:\Program Files\ubmn\ahia.exe
O4 - HKCU\..\Run: [Mlsn] C:\Program Files\s?stem\s?oolsv.exe


Click on Fix Checked when finished and exit HijackThis.

Please install Killbox by Option^Explicit.
  • Please double-click Killbox.exe to run it.
  • Select Delete on Reboot
  • then Click on the All Files button.
  • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):
C:\Program Files\aads\ulcr.exe
C:\Program Files\ubmn\ahia.exe
C:\Program Files\s?stem\s?oolsv.exe
  • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
  • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt. Click OK at any PendingFileRenameOperations prompt (and please let me know if you receive this message!).
If your computer does not restart automatically, please restart it manually.

If you receive a message such as: "Component 'MsComCtl.ocx' or one of its dependencies not correctly registered: a file is missing or invalid." when trying to run Killbox, click here to download and run missingfilesetup.exe. Then try Killbox again.

Post back a fresh HijackThis log, from normal mode, and I will take another look.

How's the PC running now?
  • 0

#11
Codered

Codered

    New Member

  • Topic Starter
  • Member
  • Pip
  • 7 posts
This window follows all Killbox tries. Also I'm not able to load more than one file at a time. I copy all entries but when it pastes only one shows up?

PendingFileRenameOperations regestry data has been removed by external process.

But running great. No pop ups, no virus alert at start up. Thank You So Much.

Edited by Codered, 18 February 2007 - 08:57 PM.

  • 0

#12
Crustyoldbloke

Crustyoldbloke

    Old Malware Surgeon with a shaky scalpel

  • Retired Staff
  • 15,131 posts
Can I see a final fresh HJT log from normal mode?
  • 0

#13
Codered

Codered

    New Member

  • Topic Starter
  • Member
  • Pip
  • 7 posts
Yes, Here it is:

Logfile of HijackThis v1.99.1
Scan saved at 7:47:59 PM, on 2/19/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\MEDIC\bin\sprtcmd.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust Anti-Spam\QSP-2.1.215.5\QOELoader.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVTray.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVRID.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Firewall\ca.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\ISafe.exe
C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\VetMsg.exe
C:\Documents and Settings\USER\Desktop\HijackThis.exe

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [MEDIC] "C:\Program Files\MEDIC\bin\sprtcmd.exe" /P MEDIC
O4 - HKLM\..\Run: [QOELOADER] "C:\Program Files\CA\eTrust EZ Armor\eTrust Anti-Spam\QSP-2.1.215.5\QOELoader.exe"
O4 - HKLM\..\Run: [CaAvTray] "C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVTray.exe"
O4 - HKLM\..\Run: [CAVRID] "C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\CAVRID.exe"
O4 - HKLM\..\Run: [Zone Labs Client] "C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Firewall\ca.exe"
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKCU\..\Run: [MSKAGENTEXE] C:\PROGRA~1\McAfee\SPAMKI~1\MSKAgent.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.6) - http://housecall65.t...ivex/hcImpl.cab
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitd...can8/oscan8.cab
O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: CAISafe - Computer Associates International, Inc. - C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\ISafe.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: VET Message Service (VETMSGNT) - Computer Associates International, Inc. - C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\VetMsg.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs Inc. - C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe
  • 0

#14
Crustyoldbloke

Crustyoldbloke

    Old Malware Surgeon with a shaky scalpel

  • Retired Staff
  • 15,131 posts
Congratulations! your new log is clean. :whistling: Just a little bit more to do to prevent further infection.

Reset and Re-enable your System Restore to remove bad files that have been backed up by Windows. The files in System Restore are protected to prevent any programmes changing them. This is the only way to clean these files: (You will lose all previous restore points which are likely to be infected.)

To reset your restore points, please note that you will need to log into your computer with an account which has full administrator access. You will know if the account has administrator access because you will be able to see the System Restore tab. If the tab is missing, you are logged in under a limited account.

(Windows XP)
1. Turn OFF System Restore.
  • On the Desktop, right-click My Computer.
  • Click Properties.
  • Click the System Restore tab.
  • Check *Turn off System Restore*.
  • Click Apply, and then click OK.
2. Reboot.

3. Turn ON System Restore.
  • On the Desktop, right-click My Computer.
  • Click Properties.
  • Click the System Restore tab.
  • UN-Check *Turn off System Restore*.
  • Click Apply, and then click OK.
I recommend going to the following link and update as recommended by Microsoft. This adds more security and extra features including a pop-up blocker for Internet Explorer. Microsoft Update

MVPS Hosts file This replaces your current HOSTS file with one that will restrict known ad sites from serving you unsolicited advertisements. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1 which is the IP of your local computer.

SiteAdvisor download this plug-in for your browser and it will alert you of a known bad site for FREE.

Now that everything is fixed, I suggest that you consider getting these programmes to help keep the computer clean:

SPYWARE BLASTER - Blocks bad ActiveX items from installing on your computer.
WINDOWS DEFENDER - With daily updates and scans, this programme offers good security against malware.
AD-AWARE PERSONAL – A fine free malware detector and removal programme
SPYBOT S&D – Excellent free spyware detector and removal programme
GOOGLE TOOLBAR - Blocks many unwanted pop-ups in Internet Explorer.
FIREFOX - Safer alternative to the Internet Explorer web browser.
AVG ANTIVIRUS FREE EDITION - Free antivirus programme if you currently are not using one.
ZONEALARM - Free firewall programme if you currently are not using one (Windows XP has a built-in firewall).

Remember to update these frequently.

Please note that whilst there is nothing wrong in having more than one antispyware programme for “on demand” scanning, having two or more antivirus systems is not recommended as they may well cause conflicts and slowness.

You may also want to read "How did I get infected in the first place" to learn how to better secure your computer.

Be sure to keep your Windows, antispyware and antivirus updated. :blink:

It just remains for me to wish you happy safe surfing; I hope you found my advice helpful.
  • 0

#15
Crustyoldbloke

Crustyoldbloke

    Old Malware Surgeon with a shaky scalpel

  • Retired Staff
  • 15,131 posts
Since this issue appears to be resolved ... this Topic has been closed. Glad we could help. :whistling:

If you're the topic starter, and need this topic reopened, please contact a staff member with the address of the thread.

Everyone else please begin a New Topic.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP