Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

I have trojans in my system!


  • Please log in to reply

#1
yoichi_hiruma21

yoichi_hiruma21

    Member

  • Member
  • PipPip
  • 17 posts
Hi geeks to go!

I'm having problems with my pc since last week. My task manager, msconfig, and regedit aren't working. A prompt on my computer says "The task manager has been disabled by your administrator"..

I checked on the internet the possible causes of such technicalities and I read that it was due to a virus called "Brontok" which is said to be from Indonesia. I downloaded an anti-brontok virus program together with the hijack this program. I only used the anti-brontok one, since I wasn't completely aware of hijack this... after the scan, it said my computer was clean but i still have the same problem(task manager, msconfig, regedit)..

So i searched more and found your site. i did everything as instructed on the malware cleaning guide and I have just ran hijack this.. this are the results. hope you can help me...thanks.


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 8:21:23 AM, on 2/19/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16608)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\WgaTray.exe
C:\WINDOWS\Explorer.exe
C:\WINDOWS\system32\wscript.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\RVHOST.exe
C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\VMSnap3.EXE
C:\WINDOWS\Domino.EXE
C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
C:\WINDOWS\system32\wuauclt.exe
C:\PROGRA~1\Grisoft\AVG7\avgw.exe
C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\WINDOWS\system32\RVHOST.exe
C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe
C:\Program Files\SEC\Natural Color Pro\NCProTray.exe
C:\Program Files\AVG\brontok-washer\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.c...rch/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft....k/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://go.microsoft....k/?LinkId=62548
F2 - REG:system.ini: Shell=Explorer.exe RVHOST.exe
F2 - REG:system.ini: UserInit=userinit.exe,peanut.bat
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: WCNetMon Class - {3BE313C3-DAD6-4da6-801D-75860118A0B5} - C:\Program Files\blcorp\WCCSC\WCPStop\wcpstop.dll
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.0.1121.2472\swg.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [SkyTel] SkyTel.EXE
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [VMSnap3] C:\WINDOWS\VMSnap3.EXE
O4 - HKLM\..\Run: [Domino] C:\WINDOWS\Domino.EXE
O4 - HKLM\..\Run: [YSearchProtection] "C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKLM\..\Run: [BigDog303] C:\WINDOWS\VM303_STI.EXE VIMICRO USB PC Camera (ZC0301PLH)
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - HKCU\..\Run: [Yahoo Messengger] C:\WINDOWS\system32\RVHOST.exe
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
O4 - Global Startup: NCProTray.lnk = ?
O7 - HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky...can_unicode.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoft...free/asinst.cab
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: VNC Server Version 4 (WinVNC4) - Unknown owner - C:\Program Files\RealVNC\VNC4\WinVNC4.exe (file missing)

--
End of file - 8122 bytes
  • 0

Advertisements


#2
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
Hello yoichi_hiruma21

Welcome to G2Go. :)
===================
Download SDFix and save it to your Desktop.

Double click SDFix.exe and choose Install to extract it to its own folder on the Desktop. Please then reboot your computer in Safe Mode by doing the following :
  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
  • Instead of Windows loading as normal, the Advanced Options Menu should appear;
  • Select the first option, to run Windows in Safe Mode, then press Enter.
  • Choose your usual account.
  • Open the extracted SDFix folder and double click RunThis.bat to start the script.
  • Type Y to begin the cleanup process.
  • It will remove any Trojan Services or Registry Entries found then prompt you to press any key to Reboot.
  • Press any Key and it will restart the PC.
  • When the PC restarts the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
  • Once the desktop icons load the SDFix report will open on screen and also save into the SDFix folder as Report.txt.
  • Finally copy and paste the contents of the results file Report.txt back onto the forum with a new HijackThis log

  • 0

#3
yoichi_hiruma21

yoichi_hiruma21

    Member

  • Topic Starter
  • Member
  • PipPip
  • 17 posts
Thank you very much! I'll do it right away....
  • 0

#4
yoichi_hiruma21

yoichi_hiruma21

    Member

  • Topic Starter
  • Member
  • PipPip
  • 17 posts
Gee, thanks a lot kadah. I did what you said and everything's just fine now, I guess. So, am I clean now? the task manager, regedit, and msconfig are working properly. What's next?

By the way, here's the report from SDFix:

SDFix: Version 1.143

Run by arthur_samuraix on Tue 02/19/2008 at 01:58 PM

Microsoft Windows XP [Version 5.1.2600]
Running From: C:\DOCUME~1\ARTHUR~1\Desktop\SDFix

Checking Services:


Restoring Windows Registry Values
Restoring Windows Default Hosts File

Rebooting...


Checking Files:

Trojan Files Found:

C:\autorun.inf - Deleted
C:\WINDOWS\system32\setting.ini - Deleted





Removing Temp Files...

ADS Check:



Final Check:

catchme 0.3.1344.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-02-19 14:16:50
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden services & system hive ...

scanning hidden registry entries ...

scanning hidden files ...

scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0


Remaining Services:



Authorized Application Key Export:

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\Grisoft\\AVG7\\avginet.exe"="C:\\Program Files\\Grisoft\\AVG7\\avginet.exe:*:Enabled:avginet.exe"
"C:\\Program Files\\Grisoft\\AVG7\\avgamsvr.exe"="C:\\Program Files\\Grisoft\\AVG7\\avgamsvr.exe:*:Enabled:avgamsvr.exe"
"C:\\Program Files\\Grisoft\\AVG7\\avgcc.exe"="C:\\Program Files\\Grisoft\\AVG7\\avgcc.exe:*:Enabled:avgcc.exe"
"C:\\Program Files\\Grisoft\\AVG7\\avgemc.exe"="C:\\Program Files\\Grisoft\\AVG7\\avgemc.exe:*:Enabled:avgemc.exe"
"C:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"="C:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe:*:Enabled:Yahoo! Messenger"
"C:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"="C:\\Program Files\\Yahoo!\\Messenger\\YServer.exe:*:Enabled:Yahoo! FT Server"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\Program Files\\Messenger\\msmsgs.exe"="C:\\Program Files\\Messenger\\msmsgs.exe:*:Enabled:Windows Messenger"
"C:\\Program Files\\Skype\\Phone\\Skype.exe"="C:\\Program Files\\Skype\\Phone\\Skype.exe:*:Enabled:Skype"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"

Remaining Files:

C:\autorun.inf Found

File Backups: - C:\DOCUME~1\ARTHUR~1\Desktop\SDFix\backups\backups.zip

Files with Hidden Attributes:

Thu 6 Sep 2007 532 A.SHR --- "C:\peanut.reg"
Wed 12 Dec 2007 34,304 ...H. --- "C:\Program Files\Art\~WRL3985.tmp"
Thu 6 Sep 2007 532 A.SHR --- "C:\WINDOWS\system32\peanut.reg"

Finished!

Thanks again!
  • 0

#5
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
You are wlcome but I will need to see a new hijackthis log please.
  • 0

#6
yoichi_hiruma21

yoichi_hiruma21

    Member

  • Topic Starter
  • Member
  • PipPip
  • 17 posts
Is my system safe now? What will I do with the hijack this program? which one will I check?

Here's the hijack this log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 10:40:26 AM, on 2/20/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16608)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\WgaTray.exe
C:\WINDOWS\system32\wscript.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
C:\WINDOWS\VMSnap3.EXE
C:\WINDOWS\Domino.EXE
C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\PROGRA~1\Mozilla Firefox\firefox.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\SEC\Natural Color Pro\NCProTray.exe
C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe
C:\Program Files\AVG\brontok-washer\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.c...rch/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft....k/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://go.microsoft....k/?LinkId=62548
F2 - REG:system.ini: UserInit=userinit.exe,peanut.bat
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: WCNetMon Class - {3BE313C3-DAD6-4da6-801D-75860118A0B5} - C:\Program Files\blcorp\WCCSC\WCPStop\wcpstop.dll
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.0.1121.2472\swg.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [SkyTel] SkyTel.EXE
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [VMSnap3] C:\WINDOWS\VMSnap3.EXE
O4 - HKLM\..\Run: [Domino] C:\WINDOWS\Domino.EXE
O4 - HKLM\..\Run: [YSearchProtection] "C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe"
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKLM\..\Run: [BigDog303] C:\WINDOWS\VM303_STI.EXE VIMICRO USB PC Camera (ZC0301PLH)
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
O4 - Global Startup: NCProTray.lnk = ?
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky...can_unicode.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoft...free/asinst.cab
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: VNC Server Version 4 (WinVNC4) - Unknown owner - C:\Program Files\RealVNC\VNC4\WinVNC4.exe (file missing)

--
End of file - 7777 bytes

Thanks.
  • 0

#7
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
Fix only this entry below with Hijackthis:

F2 - REG:system.ini: UserInit=userinit.exe,peanut.bat

Then close Hijackthis.
=================
Do a search for this file and delete it >peanut.bat
===============================================
Please do an online scan with Kaspersky WebScanner
(This scanner is for use with internet explorer only)
Click on "Accept"

You will be promted to install an ActiveX component from Kaspersky, Click Yes.
  • The program will launch and then begin downloading the latest definition files:
  • Once the files have been downloaded click on NEXT
  • Now click on Scan Settings
  • In the scan settings make that the following are selected:
    • Scan using the following Anti-Virus database:
    Extended (if available otherwise Standard)
    • Scan Options:
    Scan Archives
    Scan Mail Bases
  • Click OK
  • Now under select a target to scan:Select My Computer
  • This will program will start and scan your system.
  • The scan will take a while so be patient and let it run.
  • Once the scan is complete it will display if your system has been infected.
    • Now click on the Save as Text button:
  • Save the file to your desktop.
  • Copy and paste that information in your next post.

  • 0

#8
yoichi_hiruma21

yoichi_hiruma21

    Member

  • Topic Starter
  • Member
  • PipPip
  • 17 posts
Hi, it's me again. I have here a hijack this log from my other computer. What should I do? Am I going to use SDfix too?

Thanks.

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:49:44 AM, on 2/20/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
C:\WINDOWS\Explorer.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\WINDOWS\RVHOST.exe
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\VMSnap3.EXE
C:\WINDOWS\Domino.EXE
C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\WINDOWS\system32\RVHOST.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
D:\Art\brontok-washer\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.c...rch/search.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.c...//www.yahoo.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.c...//www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.c...rch/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.c...//www.yahoo.com
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.c...//www.yahoo.com
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.macromedia.com/go/getflash
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
F2 - REG:system.ini: Shell=Explorer.exe RVHOST.exe
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [SkyTel] SkyTel.EXE
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [VMSnap3] C:\WINDOWS\VMSnap3.EXE
O4 - HKLM\..\Run: [Domino] C:\WINDOWS\Domino.EXE
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - HKCU\..\Run: [Yahoo Messengger] C:\WINDOWS\system32\RVHOST.exe
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
O7 - HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoft...free/asinst.cab
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

--
End of file - 6328 bytes
  • 0

#9
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
One log at a time when the first one is cleared then we will move on to the next log.
Please follow the directions in my previous post.
Then we will go from there.
Thanks.
  • 0

#10
yoichi_hiruma21

yoichi_hiruma21

    Member

  • Topic Starter
  • Member
  • PipPip
  • 17 posts
I'm sorry. OK.
  • 0

Advertisements


#11
yoichi_hiruma21

yoichi_hiruma21

    Member

  • Topic Starter
  • Member
  • PipPip
  • 17 posts
Uh..one more thing. When you told me to search for peanut.bat in my computer, I did, but there wasn't any.

Is it OK? I continued with the kaspersky anyway...
  • 0

#12
yoichi_hiruma21

yoichi_hiruma21

    Member

  • Topic Starter
  • Member
  • PipPip
  • 17 posts
I'm all done. What's next?

Here's the report... thanks.

Wednesday, February 20, 2008 1:03:16 PM
Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 20/02/2008
Kaspersky Anti-Virus database records: 573443
Scan Settings
Scan using the following antivirus database extended
Scan Archives true
Scan Mail Bases true
Scan Target My Computer
A:\
C:\
D:\
E:\
Scan Statistics
Total number of scanned objects 35188
Number of viruses found 2
Number of infected objects 89
Number of suspicious objects 0
Duration of the scan process 00:56:53

Infected Object Name Virus Name Last Action
C:\Documents and Settings\All Users\Application Data\avg7\Log\emc.log Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Grisoft\Avg7Data\avg7log.log Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Grisoft\Avg7Data\avg7log.log.lck Object is locked skipped
C:\Documents and Settings\All Users\Documents\My Music\My Music.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\Documents and Settings\All Users\Documents\My Music\My Music.exe Embedded: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Music\My Music.exe UPX: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Music\My Music.exe PE_Patch.UPX: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Music\My Playlists\My Playlists.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\Documents and Settings\All Users\Documents\My Music\My Playlists\My Playlists.exe Embedded: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Music\My Playlists\My Playlists.exe UPX: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Music\My Playlists\My Playlists.exe PE_Patch.UPX: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Music\Sample Music\Sample Music.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\Documents and Settings\All Users\Documents\My Music\Sample Music\Sample Music.exe Embedded: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Music\Sample Music\Sample Music.exe UPX: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Music\Sample Music\Sample Music.exe PE_Patch.UPX: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Music\Sample Playlists\000C3619\000C3619.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\Documents and Settings\All Users\Documents\My Music\Sample Playlists\000C3619\000C3619.exe Embedded: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Music\Sample Playlists\000C3619\000C3619.exe UPX: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Music\Sample Playlists\000C3619\000C3619.exe PE_Patch.UPX: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Music\Sample Playlists\Sample Playlists.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\Documents and Settings\All Users\Documents\My Music\Sample Playlists\Sample Playlists.exe Embedded: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Music\Sample Playlists\Sample Playlists.exe UPX: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Music\Sample Playlists\Sample Playlists.exe PE_Patch.UPX: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Pictures\My Pictures.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\Documents and Settings\All Users\Documents\My Pictures\My Pictures.exe Embedded: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Pictures\My Pictures.exe UPX: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Pictures\My Pictures.exe PE_Patch.UPX: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Sample Pictures.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Sample Pictures.exe Embedded: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Sample Pictures.exe UPX: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Sample Pictures.exe PE_Patch.UPX: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Videos\My Videos.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\Documents and Settings\All Users\Documents\My Videos\My Videos.exe Embedded: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Videos\My Videos.exe UPX: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\My Videos\My Videos.exe PE_Patch.UPX: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\New Folder.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\Documents and Settings\All Users\Documents\New Folder.exe Embedded: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\New Folder.exe UPX: infected - 1 skipped
C:\Documents and Settings\All Users\Documents\New Folder.exe PE_Patch.UPX: infected - 1 skipped
C:\Documents and Settings\arthur_samuraix\Application Data\Mozilla\Firefox\Profiles\bqte5toj.default\cert8.db Object is locked skipped
C:\Documents and Settings\arthur_samuraix\Application Data\Mozilla\Firefox\Profiles\bqte5toj.default\history.dat Object is locked skipped
C:\Documents and Settings\arthur_samuraix\Application Data\Mozilla\Firefox\Profiles\bqte5toj.default\key3.db Object is locked skipped
C:\Documents and Settings\arthur_samuraix\Application Data\Mozilla\Firefox\Profiles\bqte5toj.default\parent.lock Object is locked skipped
C:\Documents and Settings\arthur_samuraix\Application Data\Mozilla\Firefox\Profiles\bqte5toj.default\search.sqlite Object is locked skipped
C:\Documents and Settings\arthur_samuraix\Application Data\Mozilla\Firefox\Profiles\bqte5toj.default\urlclassifier2.sqlite Object is locked skipped
C:\Documents and Settings\arthur_samuraix\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SUPERANTISPYWARE.LOG Object is locked skipped
C:\Documents and Settings\arthur_samuraix\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\arthur_samuraix\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\arthur_samuraix\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\arthur_samuraix\Local Settings\Application Data\Mozilla\Firefox\Profiles\bqte5toj.default\Cache\_CACHE_001_ Object is locked skipped
C:\Documents and Settings\arthur_samuraix\Local Settings\Application Data\Mozilla\Firefox\Profiles\bqte5toj.default\Cache\_CACHE_002_ Object is locked skipped
C:\Documents and Settings\arthur_samuraix\Local Settings\Application Data\Mozilla\Firefox\Profiles\bqte5toj.default\Cache\_CACHE_003_ Object is locked skipped
C:\Documents and Settings\arthur_samuraix\Local Settings\Application Data\Mozilla\Firefox\Profiles\bqte5toj.default\Cache\_CACHE_MAP_ Object is locked skipped
C:\Documents and Settings\arthur_samuraix\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\arthur_samuraix\Local Settings\Temp\~DF9716.tmp Object is locked skipped
C:\Documents and Settings\arthur_samuraix\Local Settings\Temp\~DFF1F9.tmp Object is locked skipped
C:\Documents and Settings\arthur_samuraix\Local Settings\Temporary Internet Files\AntiPhishing\B3BB5BBA-E7D5-40AB-A041-A5B1C0B26C8F.dat Object is locked skipped
C:\Documents and Settings\arthur_samuraix\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\arthur_samuraix\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\arthur_samuraix\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
C:\peanut.bat Infected: Virus.VBS.AutoRun.af skipped
C:\peanut.reg Infected: Virus.VBS.AutoRun.af skipped
C:\peanut.vbs Infected: Virus.VBS.AutoRun.af skipped
C:\Pictures.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\Pictures.exe Embedded: infected - 1 skipped
C:\Pictures.exe UPX: infected - 1 skipped
C:\Pictures.exe PE_Patch.UPX: infected - 1 skipped
C:\Program Files\Adobe\Grisoft\AVG7\AVG7.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\Program Files\Adobe\Grisoft\AVG7\AVG7.exe Embedded: infected - 1 skipped
C:\Program Files\Adobe\Grisoft\AVG7\AVG7.exe UPX: infected - 1 skipped
C:\Program Files\Adobe\Grisoft\AVG7\AVG7.exe PE_Patch.UPX: infected - 1 skipped
C:\Program Files\Adobe\Grisoft\Grisoft.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\Program Files\Adobe\Grisoft\Grisoft.exe Embedded: infected - 1 skipped
C:\Program Files\Adobe\Grisoft\Grisoft.exe UPX: infected - 1 skipped
C:\Program Files\Adobe\Grisoft\Grisoft.exe PE_Patch.UPX: infected - 1 skipped
C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0035625.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0035625.exe Embedded: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0035625.exe UPX: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0035625.exe PE_Patch.UPX: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0036633.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0036633.exe Embedded: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0036633.exe UPX: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0036633.exe PE_Patch.UPX: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0036646.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0036646.exe Embedded: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0036646.exe UPX: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0036646.exe PE_Patch.UPX: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0036653.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0036653.exe Embedded: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0036653.exe UPX: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0036653.exe PE_Patch.UPX: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0037653.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0037653.exe Embedded: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0037653.exe UPX: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0037653.exe PE_Patch.UPX: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0037764.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0037764.exe Embedded: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0037764.exe UPX: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0037764.exe PE_Patch.UPX: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0037769.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0037769.exe Embedded: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0037769.exe UPX: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP61\A0037769.exe PE_Patch.UPX: infected - 1 skipped
C:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP62\change.log Object is locked skipped
C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
C:\WINDOWS\RVHOST.exe/script.au3 Infected: Worm.Win32.AutoIt.c skipped
C:\WINDOWS\RVHOST.exe Embedded: infected - 1 skipped
C:\WINDOWS\RVHOST.exe UPX: infected - 1 skipped
C:\WINDOWS\RVHOST.exe PE_Patch.UPX: infected - 1 skipped
C:\WINDOWS\SchedLgU.Txt Object is locked skipped
C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\WINDOWS\Sti_Trace.log Object is locked skipped
C:\WINDOWS\system32\CatRoot2\edb.log Object is locked skipped
C:\WINDOWS\system32\CatRoot2\tmp.edb Object is locked skipped
C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\default Object is locked skipped
C:\WINDOWS\system32\config\default.LOG Object is locked skipped
C:\WINDOWS\system32\config\Internet.evt Object is locked skipped
C:\WINDOWS\system32\config\SAM Object is locked skipped
C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SECURITY Object is locked skipped
C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
C:\WINDOWS\system32\config\software Object is locked skipped
C:\WINDOWS\system32\config\software.LOG Object is locked skipped
C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\system Object is locked skipped
C:\WINDOWS\system32\config\system.LOG Object is locked skipped
C:\WINDOWS\system32\h323log.txt Object is locked skipped
C:\WINDOWS\system32\peanut.bat Infected: Virus.VBS.AutoRun.af skipped
C:\WINDOWS\system32\peanut.reg Infected: Virus.VBS.AutoRun.af skipped
C:\WINDOWS\system32\peanut.vbs Infected: Virus.VBS.AutoRun.af skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped
C:\WINDOWS\wiadebug.log Object is locked skipped
C:\WINDOWS\wiaservc.log Object is locked skipped
C:\WINDOWS\WindowsUpdate.log Object is locked skipped
E:\peanut.bat Infected: Virus.VBS.AutoRun.af skipped
E:\peanut.reg Infected: Virus.VBS.AutoRun.af skipped
E:\peanut.vbs Infected: Virus.VBS.AutoRun.af skipped
E:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
E:\System Volume Information\_restore{FB828458-F1F8-4EB3-90C3-F1C191A7265A}\RP62\change.log Object is locked skipped
Scan process completed.
  • 0

#13
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
No we aren't done yet.

1. Please download The Avenger by Swandog46 to your Desktop.
  • Click on Avenger.zip to open the file
  • Extract avenger.exe to your desktop

2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+C):

Files to delete:
C:\Documents and Settings\All Users\Documents\My Music\My Music.exe
C:\Documents and Settings\All Users\Documents\My Music\My Playlists\My Playlists.exe
C:\Documents and Settings\All Users\Documents\My Music\Sample Music\Sample Music.exe
C:\Documents and Settings\All Users\Documents\My Music\Sample Playlists\000C3619\000C3619.exe
C:\Documents and Settings\All Users\Documents\My Music\Sample Playlists\Sample Playlists.exe
C:\Documents and Settings\All Users\Documents\My Pictures\My Pictures.exe
C:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Sample Pictures.exe
C:\Documents and Settings\All Users\Documents\My Videos\My Videos.exe
C:\Documents and Settings\All Users\Documents\New Folder.exe
C:\peanut.bat
C:\peanut.reg
C:\peanut.vbs
C:\Pictures.exe
C:\Program Files\Adobe\Grisoft\AVG7\AVG7.exe
C:\WINDOWS\RVHOST.exe
C:\WINDOWS\system32\peanut.bat
C:\WINDOWS\system32\peanut.reg
C:\WINDOWS\system32\peanut.vbs
E:\peanut.bat
E:\peanut.reg
E:\peanut.vbs


Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


3. Now, start The Avenger program by clicking on its icon on your desktop.
  • Under "Script file to execute" choose "Input Script Manually".
  • Now click on the Magnifying Glass icon which will open a new window titled "View/edit script"
  • Paste the text copied to clipboard into this window by pressing (Ctrl+V).
  • Click Done
  • Now click on the Green Light to begin execution of the script
  • Answer "Yes" twice when prompted.
4. The Avenger will automatically do the following:
  • It will Restart your computer. ( In cases where the code to execute contains "Drivers to Unload", The Avenger will actually restart your system twice.)
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
5. Please copy/paste the content of c:\avenger.txt into your reply [/b]
============================================================
After that Download Dr.Web CureIt to the desktop:
ftp://ftp.drweb.com/pub/drweb/cureit/drweb-cureit.exe
  • Doubleclick the drweb-cureit.exe file and Allow to run the express scan
  • This will scan the files currently running in memory and when something is found, click the yes button when it asks you if you want to cure it. This is only a short scan.
  • Once the short scan has finished, mark the drives that you want to scan.
  • Select all drives. A red dot shows which drives have been chosen.
  • Click the green arrow at the right, and the scan will start.
  • Click 'Yes to all' if it asks if you want to cure/move the file.
  • When the scan has finished, in the menu, click file and choose save report list
  • Save the report to your desktop. The report will be called DrWeb.csv
  • Close Dr.Web Cureit.
  • Post that log in your next reply.

(Note if you cannot open the log it produces then right click on it and choose rename.
Rename it to .txt and you will be able to open it)

  • 0

#14
yoichi_hiruma21

yoichi_hiruma21

    Member

  • Topic Starter
  • Member
  • PipPip
  • 17 posts
Good morning kadah..

Uh.. I ran the avenger but nothing was found. There weren't even a single report.

What's the next step?

Thanks...
  • 0

#15
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
Please download the OTMoveIt2 by OldTimer.
  • Save it to your desktop.
  • Please double-click OTMoveIt2.exe to run it. (Vista users, please right click on OTMoveit2.exe and select "Run as an Administrator")
  • Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

    C:\Documents and Settings\All Users\Documents\My Music\My Music.exe 
    C:\Documents and Settings\All Users\Documents\My Music\My Playlists\My Playlists.exe
    C:\Documents and Settings\All Users\Documents\My Music\Sample Music\Sample Music.exe
    C:\Documents and Settings\All Users\Documents\My Music\Sample Playlists\000C3619\000C3619.exe
    C:\Documents and Settings\All Users\Documents\My Music\Sample Playlists\Sample Playlists.exe
    C:\Documents and Settings\All Users\Documents\My Pictures\My Pictures.exe
    C:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Sample Pictures.exe
    C:\Documents and Settings\All Users\Documents\My Videos\My Videos.exe
    C:\Documents and Settings\All Users\Documents\New Folder.exe
    C:\peanut.bat
    C:\peanut.reg 
    C:\peanut.vbs 
    C:\Pictures.exe 
    C:\Program Files\Adobe\Grisoft\AVG7\AVG7.exe
    C:\WINDOWS\RVHOST.exe
    C:\WINDOWS\system32\peanut.bat 
    C:\WINDOWS\system32\peanut.reg 
    C:\WINDOWS\system32\peanut.vbs 
    E:\peanut.bat 
    E:\peanut.reg 
    E:\peanut.vbs
  • Return to OTMoveIt2, right click in the "Paste List of Files/Folders to be Moved" window (under the light blue bar) and choose Paste.
  • Click the red Moveit! button.
  • OTMoveit2 will create a log of moved files in the C:\_OTMoveIt\MovedFiles folder. The log's name will appear as the date and time it was created, with the format mmddyyyy_hhmmss.log. Open this log in Notepad and post its contents in your next reply.
  • Close OTMoveIt2
If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP