Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Multiple Infection--Smitfraud--system crippled [RESOLVED]


  • This topic is locked This topic is locked

#16
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
I mean the MslwareBytes log.
It didn't show the files it removed.
Do you have the rest of the log for MalwareBytes antimalware.
  • 0

Advertisements


#17
spywarehater

spywarehater

    Member

  • Topic Starter
  • Member
  • PipPip
  • 40 posts
Sorry



Malwarebytes' Anti-Malware 1.11
Database version: 603

Scan type: Full Scan (C:\|)
Objects scanned: 70380
Time elapsed: 40 minute(s), 33 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 24
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 73

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\Interface\{e4e3e0f8-cd30-4380-8ce9-b96904bdefca} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{fe8a736f-4124-4d9c-b4b1-3b12381efabe} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{c9c5deaf-0a1f-4660-8279-9edfad6fefe1} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2.1 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\{f663b917-591f-4172-8d87-3d7d729007ca} (Adware.Batco) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\bat.batbho (Adware.Batco) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\bat.batbho.1 (Adware.Batco) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{d279bc2b-a85b-4559-8fd9-ddc55f5d402d} (Adware.Batco) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{b80a3586-caa5-41c8-89bf-e617f0b6cfbf} (Adware.Batco) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{2eff3cf7-99c1-4c29-bc2b-68e057e22340} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{a6573479-9075-4a65-98a6-19fd29cf7374} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PopCapLoader.PopCapLoaderCtrl2 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PopCapLoader.PopCapLoaderCtrl2.1 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Trymedia Systems (Adware.Trymedia) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\BATCO (Adware.Batco) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Batco (Adware.Batco) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\bat.DLL (Adware.Batco) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\Bat (Adware.Batco) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Bat (Adware.Batco) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\xflock (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\{4e7bd74f-2b8d-469e-86bd-fd60bb9aae3a} (Adware.OneToolBar) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\Downloaded Program Files\popcaploader.dll (Adware.PopCap) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\Documents and Settings\All Users\Application Data\zqtkzeti\fejijuvg.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\Program Files\Bat\Bat.dll.vir (Adware.Batco) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\Program Files\Bat\Bat.exe.vir (Adware.Batco) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\Program Files\Bat\un_BatSetup_15041.exe.vir (Adware.Rabio) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\Program Files\Bat\X_Bat.exe.vir (Adware.Batco) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\Program Files\webHancer\Programs\webhdll.dll.vir (Adware.WebHancer) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\otgzubgr.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\wmsdkns.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP107\A0003903.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP108\A0003922.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP108\A0003951.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP108\A0004952.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP108\A0004978.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP108\A0005977.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP108\A0005985.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP108\A0006008.exe (Adware.WebHancer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP108\A0006010.dll (Adware.WebHancer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP108\A0006011.exe (Adware.WebHancer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP108\A0006035.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP108\A0007035.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP109\A0007047.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP109\A0007057.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP109\A0007067.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP109\A0008074.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP110\A0009086.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP111\A0009119.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP111\A0009139.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP111\A0010139.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP111\A0010149.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP111\A0010161.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP111\A0010163.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP111\A0010164.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP111\A0010171.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP111\A0010173.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP111\A0010175.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP111\A0010218.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP111\A0010238.dll (Adware.WebHancer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP111\A0010277.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP113\A0010430.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP113\A0010431.dll (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP113\A0010433.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP113\A0010435.exe (Adware.Rabio) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP113\A0010436.exe (Adware.Batco) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP113\A0010462.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\avifile32.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\avisynthex32.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\aviwrap32.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\browserad.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\changeurl_30.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\msa64chk.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\msapasrc.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\123messenger.per (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\ntnut.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\shdocpe.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\shdocpl.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\winsb.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\MSNSA32.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ntnut32.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\shdocpe.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SIPSPI32.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\Installer\id53.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\apphelp32.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\asferror32.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\asycfilt32.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\athprxy32.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\ati2dvaa32.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\ati2dvag32.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\audiosrv32.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\autodisc32.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\licencia.txt (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\telefonos.txt (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\textos.txt (Malware.Trace) -> Quarantined and deleted successfully.
  • 0

#18
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
Please download ATF Cleaner by Atribune.
This program is for XP and Windows 2000 onlyDouble-click ATF-Cleaner.exe to run the program.
Under Main choose: Select All
Click the Empty Selected button.
If you use Firefox browserClick Firefox at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browserClick Opera at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.
For Technical Support, double-click the e-mail address located at the bottom of each menu.
===============================================================
Please do an online scan with Kaspersky WebScanner
(This scanner is for use with internet explorer only)
Click on "Accept"

You will be promted to install an ActiveX component from Kaspersky, Click Yes.
  • The program will launch and then begin downloading the latest definition files:
  • Once the files have been downloaded click on NEXT
  • Now click on Scan Settings
  • In the scan settings make that the following are selected:
    • Scan using the following Anti-Virus database:
    Extended (if available otherwise Standard)
    • Scan Options:
    Scan Archives
    Scan Mail Bases
  • Click OK
  • Now under select a target to scan:Select My Computer
  • This will program will start and scan your system.
  • The scan will take a while so be patient and let it run.
  • Once the scan is complete it will display if your system has been infected.
    • Now click on the Save as an html document button:
  • Save the file to your desktop.
  • Attach that information in your next post.

  • 0

#19
spywarehater

spywarehater

    Member

  • Topic Starter
  • Member
  • PipPip
  • 40 posts
Kaspersky Scan results here



KASPERSKY ONLINE SCANNER REPORT
Wednesday, April 09, 2008 6:07:37 AM
Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 9/04/2008
Kaspersky Anti-Virus database records: 691612


Scan Settings
Scan using the following antivirus database extended
Scan Archives true
Scan Mail Bases true

Scan Target My Computer
A:\
C:\
D:\

Scan Statistics
Total number of scanned objects 43595
Number of viruses found 13
Number of infected objects 49
Number of suspicious objects 0
Duration of the scan process 01:34:30

Infected Object Name Virus Name Last Action
C:\Documents and Settings\All Users\Application Data\Grisoft\Avg7Data\avg7log.log Object is locked skipped

C:\Documents and Settings\All Users\Application Data\Grisoft\Avg7Data\avg7log.log.lck Object is locked skipped

C:\Documents and Settings\DAVID\Application Data\AVG7\Log\emc.log Object is locked skipped

C:\Documents and Settings\DAVID\Cookies\index.dat Object is locked skipped

C:\Documents and Settings\DAVID\Desktop\fixers\SmitfraudFix\Reboot.exe Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped

C:\Documents and Settings\DAVID\Desktop\fixers\SmitfraudFix.exe/data.rar/SmitfraudFix/Reboot.exe Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped

C:\Documents and Settings\DAVID\Desktop\fixers\SmitfraudFix.exe/data.rar Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped

C:\Documents and Settings\DAVID\Desktop\fixers\SmitfraudFix.exe RarSFX: infected - 2 skipped

C:\Documents and Settings\DAVID\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped

C:\Documents and Settings\DAVID\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped

C:\Documents and Settings\DAVID\Local Settings\History\History.IE5\index.dat Object is locked skipped

C:\Documents and Settings\DAVID\Local Settings\History\History.IE5\MSHist012008040820080409\index.dat Object is locked skipped

C:\Documents and Settings\DAVID\Local Settings\Temp\Perflib_Perfdata_e1c.dat Object is locked skipped

C:\Documents and Settings\DAVID\Local Settings\Temporary Internet Files\Content.IE5\0LMZWP2F\UserStatusChange[2].html Object is locked skipped

C:\Documents and Settings\DAVID\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped

C:\Documents and Settings\DAVID\Local Settings\Temporary Internet Files\Content.IE5\YCWC4GDL\UserStatusChange[2].html Object is locked skipped

C:\Documents and Settings\DAVID\My Documents\LimeWire\Saved\earthquake song fresh prince.mp3 Infected: Trojan-Downloader.WMA.Wimad.n skipped

C:\Documents and Settings\DAVID\ntuser.dat Object is locked skipped

C:\Documents and Settings\DAVID\NTUSER.DAT.LOG Object is locked skipped

C:\Documents and Settings\DAVID\Shared\there gos my old girl friend.mp3 Infected: Trojan-Downloader.WMA.Wimad.n skipped

C:\Documents and Settings\DAVID\Shared\Top of Charts - 2003 (pissed).wma Infected: Trojan-Downloader.WMA.Wimad.l skipped

C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped

C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped

C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped

C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped

C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped

C:\Documents and Settings\LocalService\ntuser.dat Object is locked skipped

C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped

C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped

C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped

C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped

C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped

C:\Downloads\AlohaSolitaireSetup-dm[1].exe Infected: not-a-virus:AdWare.Win32.Trymedia.b skipped

C:\Downloads\Ancient_TripeaksSetup-dm[1].exe Infected: not-a-virus:AdWare.Win32.Trymedia.b skipped

C:\Downloads\BallistikSCSetup-dm[1].exe Infected: not-a-virus:AdWare.Win32.Trymedia.b skipped

C:\Downloads\BallistikSCSetup-dm[2].exe Infected: not-a-virus:AdWare.Win32.Trymedia.b skipped

C:\Downloads\BewitchedSetup-dm[1].exe Infected: not-a-virus:AdWare.Win32.Trymedia.b skipped

C:\Downloads\Dicey-dm[1].exe Infected: not-a-virus:AdWare.Win32.Trymedia.b skipped

C:\Downloads\fairiesSetup-dm[1].exe Infected: not-a-virus:AdWare.Win32.Trymedia.b skipped

C:\Downloads\GoldRushSetup-dm[1].exe Infected: not-a-virus:AdWare.Win32.Trymedia.b skipped

C:\Downloads\HexalotSetup-dm[2].exe Infected: not-a-virus:AdWare.Win32.Trymedia.b skipped

C:\Downloads\hotelsolitaireSCSetup-dm[1].exe Infected: not-a-virus:AdWare.Win32.Trymedia.b skipped

C:\Downloads\MahJongAdventuresSetup-dm[1].exe Infected: not-a-virus:AdWare.Win32.Trymedia.b skipped

C:\Downloads\Scrabble_Setup-dm[1].exe Infected: not-a-virus:AdWare.Win32.Trymedia.b skipped

C:\Downloads\solitaireSetup-dm[1].exe Infected: not-a-virus:AdWare.Win32.Trymedia.b skipped

C:\Downloads\solitaireSetup-dm[2].exe Infected: not-a-virus:AdWare.Win32.Trymedia.b skipped

C:\Downloads\TumblebugsSetup-dm[1].exe Infected: not-a-virus:AdWare.Win32.Trymedia.b skipped

C:\Downloads\WordBuzzSetup-dm[1].exe Infected: not-a-virus:AdWare.Win32.Trymedia.b skipped

C:\Downloads\WordJongInstall-dm[1].exe Infected: not-a-virus:AdWare.Win32.Trymedia.b skipped

C:\Downloads\Yahtzee-dm[1].exe Infected: not-a-virus:AdWare.Win32.Trymedia.b skipped

C:\Program Files\Kodak\Kodak EasyShare software\bin\Catalog\EasyShare.me Object is locked skipped

C:\Program Files\Kodak\Kodak EasyShare software\bin\Catalog\EasyShare.mm Object is locked skipped

C:\Program Files\Yahoo!\Messenger\logs\billing_DAVID.log Object is locked skipped

C:\Program Files\Yahoo!\Messenger\logs\client_DAVID.log Object is locked skipped

C:\Program Files\Yahoo!\Messenger\logs\network_DAVID.log Object is locked skipped

C:\QooBox\Quarantine\C\Program Files\Bat\Info.dll.vir Infected: not-a-virus:AdWare.Win32.Rabio.m skipped

C:\QooBox\Quarantine\C\WINDOWS\default.htm.vir Infected: not-virus:Hoax.HTML.Secureinvites.b skipped

C:\QooBox\Quarantine\C\WINDOWS\system32\geBroOhF.dll.vir Infected: Packed.Win32.Monder.gen skipped

C:\QooBox\Quarantine\C\WINDOWS\system32\kcoygecg.dll.vir Infected: Packed.Win32.Monder.gen skipped

C:\QooBox\Quarantine\C\WINDOWS\system32\nmnjpxqy.dll.vir Infected: Packed.Win32.Monder.gen skipped

C:\QooBox\Quarantine\C\WINDOWS\system32\yiytsovy.dll.vir Infected: Packed.Win32.Monder.gen skipped

C:\QooBox\Quarantine\catchme2008-04-08_171308.57.zip/Documents and Settings/DAVID/Desktop/catchme.zip/geBqQKeb.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.mxi skipped

C:\QooBox\Quarantine\catchme2008-04-08_171308.57.zip/Documents and Settings/DAVID/Desktop/catchme.zip/ljJYOeCR.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.mhf skipped

C:\QooBox\Quarantine\catchme2008-04-08_171308.57.zip/Documents and Settings/DAVID/Desktop/catchme.zip Infected: not-a-virus:AdWare.Win32.Virtumonde.mhf skipped

C:\QooBox\Quarantine\catchme2008-04-08_171308.57.zip ZIP: infected - 3 skipped

C:\SDFix\backups\backups.zip/backups/b104.exe/stream/data0002 Infected: Trojan-Downloader.Win32.Small.buy skipped

C:\SDFix\backups\backups.zip/backups/b104.exe/stream/data0004 Infected: not-a-virus:AdWare.Win32.Mostofate.u skipped

C:\SDFix\backups\backups.zip/backups/b104.exe/stream Infected: not-a-virus:AdWare.Win32.Mostofate.u skipped

C:\SDFix\backups\backups.zip/backups/b104.exe Infected: not-a-virus:AdWare.Win32.Mostofate.u skipped

C:\SDFix\backups\backups.zip/backups/b153.exe Infected: not-a-virus:AdWare.Win32.Insider.d skipped

C:\SDFix\backups\backups.zip/backups/default.htm Infected: not-virus:Hoax.HTML.Secureinvites.b skipped

C:\SDFix\backups\backups.zip/backups/mrofinu72.exe Infected: Trojan-Downloader.Win32.Homles.au skipped

C:\SDFix\backups\backups.zip ZIP: infected - 7 skipped

C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped

C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP108\A0003931.exe Object is locked skipped

C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP108\A0003932.exe Object is locked skipped

C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP108\A0003933.exe Object is locked skipped

C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP108\A0003934.exe Object is locked skipped

C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP108\A0003935.dll Object is locked skipped

C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP108\A0005991.exe Object is locked skipped

C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP110\A0009090.exe Object is locked skipped

C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP110\A0009091.dll Infected: Packed.Win32.Monder.gen skipped

C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP110\A0009092.exe Object is locked skipped

C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP110\A0009100.exe Object is locked skipped

C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP110\A0009101.exe Object is locked skipped

C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP111\A0009144.exe Object is locked skipped

C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP111\A0010256.dll Infected: Packed.Win32.Monder.gen skipped

C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP111\A0010257.dll Infected: Packed.Win32.Monder.gen skipped

C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP111\A0010258.dll Infected: Packed.Win32.Monder.gen skipped

C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP111\A0010259.dll Infected: Packed.Win32.Monder.gen skipped

C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP113\A0010434.dll Infected: not-a-virus:AdWare.Win32.Rabio.m skipped

C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP113\A0010460.exe Object is locked skipped

C:\System Volume Information\_restore{FD57AD7D-8777-4773-AEF2-D9B5E76E2348}\RP113\change.log Object is locked skipped

C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped

C:\WINDOWS\SchedLgU.Txt Object is locked skipped

C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped

C:\WINDOWS\Sti_Trace.log Object is locked skipped

C:\WINDOWS\system32\CatRoot2\edb.log Object is locked skipped

C:\WINDOWS\system32\CatRoot2\tmp.edb Object is locked skipped

C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped

C:\WINDOWS\system32\config\default Object is locked skipped

C:\WINDOWS\system32\config\default.LOG Object is locked skipped

C:\WINDOWS\system32\config\SAM Object is locked skipped

C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped

C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped

C:\WINDOWS\system32\config\SECURITY Object is locked skipped

C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped

C:\WINDOWS\system32\config\software Object is locked skipped

C:\WINDOWS\system32\config\software.LOG Object is locked skipped

C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped

C:\WINDOWS\system32\config\system Object is locked skipped

C:\WINDOWS\system32\config\system.LOG Object is locked skipped

C:\WINDOWS\system32\h323log.txt Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped

C:\WINDOWS\wiadebug.log Object is locked skipped

C:\WINDOWS\wiaservc.log Object is locked skipped

C:\WINDOWS\WindowsUpdate.log Object is locked skipped

Scan process completed.
  • 0

#20
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
Please download the OTMoveIt2 by OldTimer.
  • Save it to your desktop.
  • Please double-click OTMoveIt2.exe to run it. (Vista users, please right click on OTMoveit2.exe and select "Run as an Administrator")
  • Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

    C:\Documents and Settings\DAVID\Desktop\fixers\SmitfraudFix
    C:\Documents and Settings\DAVID\Desktop\fixers\SmitfraudFix.exe
    C:\Documents and Settings\DAVID\My Documents\LimeWire\Saved\earthquake song fresh prince.mp3 
    C:\Documents and Settings\DAVID\Shared\there gos my old girl friend.mp3 
    C:\Documents and Settings\DAVID\Shared\Top of Charts - 2003 (pissed).wma 
    C:\Downloads\AlohaSolitaireSetup-dm[1].exe 
    C:\Downloads\Ancient_TripeaksSetup-dm[1].exe 
    C:\Downloads\BallistikSCSetup-dm[1].exe
    C:\Downloads\BallistikSCSetup-dm[2].exe  
    C:\Downloads\BewitchedSetup-dm[1].exe 
    C:\Downloads\Dicey-dm[1].exe 
    C:\Downloads\fairiesSetup-dm[1].exe 
    C:\Downloads\GoldRushSetup-dm[1].exe
    C:\Downloads\HexalotSetup-dm[2].exe 
    C:\Downloads\hotelsolitaireSCSetup-dm[1].exe 
    C:\Downloads\MahJongAdventuresSetup-dm[1].exe
    C:\Downloads\Scrabble_Setup-dm[1].exe 
    C:\Downloads\solitaireSetup-dm[1].exe 
    C:\Downloads\solitaireSetup-dm[2].exe 
    C:\Downloads\TumblebugsSetup-dm[1].exe
    C:\Downloads\WordBuzzSetup-dm[1].exe
    C:\Downloads\WordJongInstall-dm[1].exe
    C:\Downloads\Yahtzee-dm[1].exe
  • Return to OTMoveIt2, right click in the "Paste List of Files/Folders to be Moved" window (under the light blue bar) and choose Paste.
  • Click the red Moveit! button.
  • OTMoveit2 will create a log of moved files in the C:\_OTMoveIt\MovedFiles folder. The log's name will appear as the date and time it was created, with the format mmddyyyy_hhmmss.log. Open this log in Notepad and post its contents in your next reply.
  • Close OTMoveIt2
If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.
=============
After that post the OTMove it log and a new Hijackthis log please and let me know how things are running?
  • 0

#21
spywarehater

spywarehater

    Member

  • Topic Starter
  • Member
  • PipPip
  • 40 posts
C:\Documents and Settings\DAVID\Desktop\fixers\SmitfraudFix
C:\Documents and Settings\DAVID\Desktop\fixers\SmitfraudFix.exe
C:\Documents and Settings\DAVID\My Documents\LimeWire\Saved\earthquake song fresh prince.mp3
C:\Documents and Settings\DAVID\Shared\there gos my old girl friend.mp3
C:\Documents and Settings\DAVID\Shared\Top of Charts - 2003 (pissed).wma
C:\Downloads\AlohaSolitaireSetup-dm[1].exe
C:\Downloads\Ancient_TripeaksSetup-dm[1].exe
C:\Downloads\BallistikSCSetup-dm[1].exe
C:\Downloads\BallistikSCSetup-dm[2].exe
C:\Downloads\BewitchedSetup-dm[1].exe
C:\Downloads\Dicey-dm[1].exe
C:\Downloads\fairiesSetup-dm[1].exe
C:\Downloads\GoldRushSetup-dm[1].exe
C:\Downloads\HexalotSetup-dm[2].exe
C:\Downloads\hotelsolitaireSCSetup-dm[1].exe
C:\Downloads\MahJongAdventuresSetup-dm[1].exe
C:\Downloads\Scrabble_Setup-dm[1].exe
C:\Downloads\solitaireSetup-dm[1].exe
C:\Downloads\solitaireSetup-dm[2].exe
C:\Downloads\TumblebugsSetup-dm[1].exe
C:\Downloads\WordBuzzSetup-dm[1].exe
C:\Downloads\WordJongInstall-dm[1].exe
C:\Downloads\Yahtzee-dm[1].exe





HijackThis:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:19:36 AM, on 4/9/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\WgaTray.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb07.exe
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe
C:\WINDOWS\system32\devldr32.exe
C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
C:\Documents and Settings\DAVID\Desktop\OTMoveIt2.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapp...rch/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R3 - URLSearchHook: (no name) - - (no file)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [AVG7_EMC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb07.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe"
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'Default user')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: PalTalk.lnk = C:\Program Files\Paltalk Messenger\paltalk.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: PalTalk - {4EAFEF58-EEFA-4116-983D-03B49BCBFFFE} - C:\Program Files\Paltalk Messenger\Paltalk.exe (file missing)
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: Yahoo! Spades - http://download2.gam...nts/y/st3_x.cab
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky...can_unicode.cab
O16 - DPF: {1EF9F042-C2EB-4293-8213-474CAEEF531D} (TmHcmsX Control) - http://www.trendsecu...vex/TmHcmsX.CAB
O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.6) - http://housecall65.t...ivex/hcImpl.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {5C6698D9-7BE4-4122-8EC5-291D84DBD4A0} (Facebook Photo Uploader 4 Control) - http://upload.facebo...toUploader3.cab
O16 - DPF: {8A94C905-FF9D-43B6-8708-F0F22D22B1CB} (Wwlaunch Control) - http://www.worldwinn...ed/wwlaunch.cab
O16 - DPF: {AB86CE53-AC9F-449F-9399-D8ABCA09EC09} (Get_ActiveX Control) - https://h17000.www1....loadManager.ocx
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://cdn2.zone.msn...ro.cab56649.cab
O16 - DPF: {CF969D51-F764-4FBF-9E90-475248601C8A} (FamilyFeud Control) - http://www.worldwinn.../familyfeud.cab
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O24 - Desktop Component 0: (no name) - http://www.tshirthel...ofmonth_148.jpg

--
End of file - 6710 bytes
  • 0

#22
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
I need to see the log that OT Move it makes in this folder>C:\OTMove it \Moved Files\numbered .txt this is a generic name it will be the only .txt document there.
Please post that information.

Edited by kahdah, 09 April 2008 - 10:24 AM.

  • 0

#23
spywarehater

spywarehater

    Member

  • Topic Starter
  • Member
  • PipPip
  • 40 posts
I don't see a file with .txt in the name
  • 0

#24
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
It will not have .txt in the name it is a text doucument.
  • 0

#25
spywarehater

spywarehater

    Member

  • Topic Starter
  • Member
  • PipPip
  • 40 posts
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:19:36 AM, on 4/9/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\WgaTray.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb07.exe
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe
C:\WINDOWS\system32\devldr32.exe
C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
C:\Documents and Settings\DAVID\Desktop\OTMoveIt2.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapp...rch/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R3 - URLSearchHook: (no name) - - (no file)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [AVG7_EMC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb07.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe"
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'Default user')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: PalTalk.lnk = C:\Program Files\Paltalk Messenger\paltalk.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: PalTalk - {4EAFEF58-EEFA-4116-983D-03B49BCBFFFE} - C:\Program Files\Paltalk Messenger\Paltalk.exe (file missing)
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: Yahoo! Spades - http://download2.gam...nts/y/st3_x.cab
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky...can_unicode.cab
O16 - DPF: {1EF9F042-C2EB-4293-8213-474CAEEF531D} (TmHcmsX Control) - http://www.trendsecu...vex/TmHcmsX.CAB
O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.6) - http://housecall65.t...ivex/hcImpl.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {5C6698D9-7BE4-4122-8EC5-291D84DBD4A0} (Facebook Photo Uploader 4 Control) - http://upload.facebo...toUploader3.cab
O16 - DPF: {8A94C905-FF9D-43B6-8708-F0F22D22B1CB} (Wwlaunch Control) - http://www.worldwinn...ed/wwlaunch.cab
O16 - DPF: {AB86CE53-AC9F-449F-9399-D8ABCA09EC09} (Get_ActiveX Control) - https://h17000.www1....loadManager.ocx
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://cdn2.zone.msn...ro.cab56649.cab
O16 - DPF: {CF969D51-F764-4FBF-9E90-475248601C8A} (FamilyFeud Control) - http://www.worldwinn.../familyfeud.cab
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O24 - Desktop Component 0: (no name) - http://www.tshirthel...ofmonth_148.jpg

--
End of file - 6710 bytes
C:\Documents and Settings\DAVID\Desktop\fixers\SmitfraudFix moved successfully.
C:\Documents and Settings\DAVID\Desktop\fixers\SmitfraudFix.exe moved successfully.
C:\Documents and Settings\DAVID\My Documents\LimeWire\Saved\earthquake song fresh prince.mp3 moved successfully.
C:\Documents and Settings\DAVID\Shared\there gos my old girl friend.mp3 moved successfully.
C:\Documents and Settings\DAVID\Shared\Top of Charts - 2003 (pissed).wma moved successfully.
< C:\Downloads\AlohaSolitaireSetup-dm[1].exe >
C:\Downloads\AlohaSolitaireSetup-dm[1].exe moved successfully.
< C:\Downloads\Ancient_TripeaksSetup-dm[1].exe >
C:\Downloads\Ancient_TripeaksSetup-dm[1].exe moved successfully.
< C:\Downloads\BallistikSCSetup-dm[1].exe >
C:\Downloads\BallistikSCSetup-dm[1].exe moved successfully.
< C:\Downloads\BallistikSCSetup-dm[2].exe >
C:\Downloads\BallistikSCSetup-dm[2].exe moved successfully.
< C:\Downloads\BewitchedSetup-dm[1].exe >
C:\Downloads\BewitchedSetup-dm[1].exe moved successfully.
< C:\Downloads\Dicey-dm[1].exe >
C:\Downloads\Dicey-dm[1].exe moved successfully.
< C:\Downloads\fairiesSetup-dm[1].exe >
C:\Downloads\fairiesSetup-dm[1].exe moved successfully.
< C:\Downloads\GoldRushSetup-dm[1].exe >
C:\Downloads\GoldRushSetup-dm[1].exe moved successfully.
< C:\Downloads\HexalotSetup-dm[2].exe >
C:\Downloads\HexalotSetup-dm[2].exe moved successfully.
< C:\Downloads\hotelsolitaireSCSetup-dm[1].exe >
C:\Downloads\hotelsolitaireSCSetup-dm[1].exe moved successfully.
< C:\Downloads\MahJongAdventuresSetup-dm[1].exe >
C:\Downloads\MahJongAdventuresSetup-dm[1].exe moved successfully.
< C:\Downloads\Scrabble_Setup-dm[1].exe >
C:\Downloads\Scrabble_Setup-dm[1].exe moved successfully.
< C:\Downloads\solitaireSetup-dm[1].exe >
C:\Downloads\solitaireSetup-dm[1].exe moved successfully.
< C:\Downloads\solitaireSetup-dm[2].exe >
C:\Downloads\solitaireSetup-dm[2].exe moved successfully.
< C:\Downloads\TumblebugsSetup-dm[1].exe >
C:\Downloads\TumblebugsSetup-dm[1].exe moved successfully.
< C:\Downloads\WordBuzzSetup-dm[1].exe >
C:\Downloads\WordBuzzSetup-dm[1].exe moved successfully.
< C:\Downloads\WordJongInstall-dm[1].exe >
C:\Downloads\WordJongInstall-dm[1].exe moved successfully.
< C:\Downloads\Yahtzee-dm[1].exe >
C:\Downloads\Yahtzee-dm[1].exe moved successfully.

OTMoveIt2 by OldTimer - Version 1.0.4.1 log created on 04092008_111452
  • 0

Advertisements


#26
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
Please re-open Hijackthis and click on "Do a system scan only"
Then place a check mark next to this entry below:

R3 - URLSearchHook: (no name) - - (no file)


Now click on Fix Checked and then close Hijackthis.
==================================
Cleanup::
  • Make sure you have an Internet Connection.
  • Double-click OTMoveIt2.exe to run it. (Vista users, please right click on OTMoveit2.exe and select "Run as an Administrator")
  • Click on the CleanUp! button
  • A list of tool components used in the Cleanup of malware will be downloaded.
  • If your Firewall or Real Time protection attempts to block OtMoveit2 to reach the Internet, please allow the application to do so.
  • Click Yes to begin the Cleanup process and remove these components, including this application.
  • You will be asked to reboot the machine to finish the Cleanup process. If you are asked to reboot the machine choose Yes.

Also delete\uninstall anything else that we used.
=================
After that please update your Java:
Older versions have vulnerabilities that malware can use to infect your system. Please follow these steps to remove older version of Java components and upgrade the application. Beware it is NOT supported for use in 9x or ME and probably will not install in those systems

Ugrading Java:After that
  • Go to Start > Control Panel, double-click on Add/Remove programs and remove all older versions of Java.
  • Check any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java version.
  • Reboot your computer once all Java components are removed.
============================================
Then I will need you to reset your System Restore points, please note that you will need to log into your computer with an account which has full administrator access.
You will know if the account has administrator access because you will be able to see the System Restore tab. If the tab is missing, you are logged in under a limited account.

(Windows XP)
1. Turn off System Restore.
Click on *Start
Right-click *My Computer
Click *Properties
Click the *System Restore tab
Check *Turn off System Restore
Click *Apply, and then click *OK.

2. Reboot.

3. Turn ON System Restore.
Click on *Start
Right-click *My Computer
Click *Properties
*UN-Check *Turn off System Restore*
Check *Turn on System Restore
Click *Apply, and then click *OK.


How to Turn On and Turn Off System Restore in Windows XP
http://support.micro...kb/310405/en-us
==========================================
After that your log is clean. :)

The following is a list of tools and utilities that I like to suggest to people.
You do not have to have all or any of them they are only suggestions.
This list is full of great tools and utilities to help you understand how you got infected and how to keep from getting infected again.

Spybot Search & Destroy-Uber powerful tool which can search and annhilate nasties that make it onto your system. Now with an Immunize section that will help prevent future infections.

Ad-Aware-Another very powerful tool which searches and kills nasties that infect your system. AdAware and Spybot Search & Destroy compliment each other very well.

Spyware Blaster - Great prevention tool to keep nasties from installing on your system.

Spywareguard-Works as a Spyware "Shield" to protect your computer from getting malware in the first place.

IE-SPYAD- puts over 5000 sites in your restricted zone so you'll be protected when you visit innocent-looking sites that aren't actually innocent at all.

Windows Updates - It is very important to make sure that both Internet Explorer and Windows are kept current with the latest critical security patches from Microsoft. To do this just start Internet Explorer and select Tools > Windows Update, and follow the online instructions from there.

Castle Cops To find out more information about how you got infected in the first place and some great guidelines to follow to prevent future infections you can read this article by Tony Klein.
  • 0

#27
spywarehater

spywarehater

    Member

  • Topic Starter
  • Member
  • PipPip
  • 40 posts
Thanks you so much. Everything's better.
  • 0

#28
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
You are welcome :)


Since this issue appears to be resolved ... this Topic has been closed. Glad we could help. :)

If your the topic starter, and need this topic reopened, please contact a staff member with the address of the thread.

Everyone else please begin a New Topic.
  • 0

#29
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
Since this issue appears to be resolved ... this Topic has been closed. Glad we could help. :)

If you're the topic starter, and need this topic reopened, please contact a staff member with the address of the thread.

Everyone else please begin a New Topic.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP