Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Malware Popups the works Hijack logs + others


  • Please log in to reply

#1
Mike19

Mike19

    Member

  • Member
  • PipPip
  • 19 posts
Hijack Log

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 6:21:56 PM, on 6/13/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16640)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\SYSTEM32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\WINDOWS\system32\CTsvcCDA.EXE
C:\Program Files\Intel\Intel Matrix Storage Manager\iaantmon.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\PnkBstrA.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Creative\SBAudigy2ZS\Surround Mixer\CTSysVol.exe
C:\Program Files\Creative\SBAudigy2ZS\DVDAudio\CTDVDDET.EXE
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\MSN Messenger\MsnMsgr.Exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Microsoft ActiveSync\wcescomm.exe
C:\PROGRA~1\MI3AA1~1\rapimgr.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O4 - HKLM\..\Run: [CTSysVol] C:\Program Files\Creative\SBAudigy2ZS\Surround Mixer\CTSysVol.exe /r
O4 - HKLM\..\Run: [CTDVDDET] "C:\Program Files\Creative\SBAudigy2ZS\DVDAudio\CTDVDDET.EXE"
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKLM\..\Run: [BM27de048a] Rundll32.exe "C:\WINDOWS\system32\lvwpoeju.dll",s
O4 - HKLM\..\Run: [24ed3716] rundll32.exe "C:\WINDOWS\system32\xxibqayo.dll",b
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [H/PC Connection Agent] "C:\Program Files\Microsoft ActiveSync\wcescomm.exe"
O4 - HKCU\..\Run: [AnyDVD] C:\Program Files\SlySoft\AnyDVD\AnyDVDtray.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\Office12\EXCEL.EXE/3000
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~4\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~4\Office12\ONBttnIE.dll
O10 - Broken Internet access because of LSP provider 'c:\program files\bonjour\mdnsnsp.dll' missing
O15 - Trusted Zone: http://*.metrolist.net
O15 - Trusted Zone: http://*.rapmls.com
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.EXE
O23 - Service: Intel® Matrix Storage Event Monitor (IAANTMon) - Intel Corporation - C:\Program Files\Intel\Intel Matrix Storage Manager\iaantmon.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe

--
End of file - 3907 bytes


SUPERanti LOG

SUPERAntiSpyware Scan Log
Generated 09/12/2007 at 01:45 PM

Application Version : 3.3.1020

Core Rules Database Version : 3245
Trace Rules Database Version: 1256

Scan type : Complete Scan
Total Scan Time : 00:04:00

Memory items scanned : 400
Memory threats detected : 0
Registry items scanned : 7269
Registry threats detected : 0
File items scanned : 2152
File threats detected : 124

Adware.Tracking Cookie
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected]adworld[2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][3].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][2].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt
C:\Documents and Settings\Adam S\Cookies\[email protected][1].txt


Malwarebytes LOG

Malwarebytes' Anti-Malware 1.17
Database version: 851

9:10:38 AM 6/13/2008
mbam-log-6-13-2008 (09-10-38).txt

Scan type: Full Scan (C:\|)
Objects scanned: 285045
Time elapsed: 56 minute(s), 34 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 3
Registry Keys Infected: 14
Registry Values Infected: 3
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 38

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\khfETmnK.dll (Trojan.Vundo) -> Unloaded module successfully.
C:\WINDOWS\system32\lqwddpdv.dll (Trojan.Vundo) -> Unloaded module successfully.
C:\WINDOWS\system32\efcdEtSm.dll (Trojan.Vundo) -> Unloaded module successfully.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ad0f2c18-4d37-49a6-bf14-236fba1860c6} (Trojan.Vundo) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{ad0f2c18-4d37-49a6-bf14-236fba1860c6} (Trojan.Vundo) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{bf0ca4fc-6378-4062-b546-3cde8a28b1e0} (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{bf0ca4fc-6378-4062-b546-3cde8a28b1e0} (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\efcdetsm (Trojan.Vundo) -> Delete on reboot.
HKEY_CLASSES_ROOT\Interface\{04a38f6b-006f-4247-ba4c-02a139d5531c} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{3c2d2a1e-031f-4397-9614-87c932a848e0} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\minibugtransporter.minibugtransporterx (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\minibugtransporter.minibugtransporterx.1 (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{2b96d5cc-c5b5-49a5-a69d-cc0a30f9028c} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\24ed3716 (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{bf0ca4fc-6378-4062-b546-3cde8a28b1e0} (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BM27de048a (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\khfetmnk -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\khfetmnk -> Delete on reboot.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\bwswfylt.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tlyfwswb.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\khfETmnK.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\KnmTEfhk.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\KnmTEfhk.ini2 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lqwddpdv.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\vdpddwql.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mceaveeq.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\qeevaecm.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\scvyremn.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nmeryvcs.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\efcdEtSm.dll (Trojan.Vundo) -> Delete on reboot.
C:\Documents and Settings\Adam S\Local Settings\Temporary Internet Files\Content.IE5\203P5X4N\kb456456[1] (Trojan.Vundo) -> Delete on reboot.
C:\Program Files\HijackThis\backups\backup-20080612-174210-557.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\HijackThis\backups\backup-20080612-174210-741.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\HijackThis\backups\backup-20080612-174332-535.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\HijackThis\backups\backup-20080612-174332-821.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\HijackThis\backups\backup-20080612-174347-299.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\HijackThis\backups\backup-20080612-174348-111.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\HijackThis\backups\backup-20080612-175706-928.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\HijackThis\backups\backup-20080612-175707-219.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\HijackThis\backups\backup-20080612-175824-154.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\HijackThis\backups\backup-20080612-175939-883.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\HijackThis\backups\backup-20080612-182304-110.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\HijackThis\backups\backup-20080612-182304-870.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\HijackThis\backups\backup-20080612-182622-773.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\HijackThis\backups\backup-20080612-182643-655.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\HijackThis\backups\backup-20080612-184126-689.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\HijackThis\backups\backup-20080612-190630-175.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\HijackThis\backups\backup-20080612-190631-726.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\HijackThis\backups\backup-20080612-192339-124.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\HijackThis\backups\backup-20080612-192339-991.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{46DE8921-1D39-44D2-A9E9-64119261F211}\RP338\A0049400.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{46DE8921-1D39-44D2-A9E9-64119261F211}\RP338\A0049945.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{46DE8921-1D39-44D2-A9E9-64119261F211}\RP338\A0049969.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\cookies.ini (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\iafcpkcv.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\clkcnt.txt (Trojan.Vundo) -> Quarantined and deleted successfully.
  • 0

Advertisements


#2
OldTimer

OldTimer

    Global Moderator

  • Global Moderator
  • 3,273 posts
Hello Mike19 and welcome to G2G. Let's see what we can find. Please follow the steps below in order:

Before running a new scan let's clean out the temporary folders.

Download ATF Cleaner to your Desktop.
  • Double-click ATF-Cleaner.exe to run the program.
  • Click Select All found at the bottom of the list.
  • Click the Empty Selected button.
If you use Firefox browser, do this also:
  • Click Firefox at the top and choose Select All from the list.
  • Click the Empty Selected button.
  • NOTE : If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browser, do this also:
  • Click Opera at the top and choose Select All from the list.
  • NOTE : If you would like to keep your saved passwords, please click No at the prompt.
Close ALL Internet browsers (very important).
Click the Empty Selected button.
Click Exit on the Main menu to close the program.

Now download OTScanIt from here or here to your Desktop and double-click on it to extract the files. It will create a folder named OTScanIt on your desktop.

Note: You must be logged on to the system with an account that has Administrator privileges to run this program.

  • Close ALL OTHER PROGRAMS.
  • Open the OTScanIt folder and double-click on OTScanIt.exe to start the program (if you are running on Vista then right-click the program and choose Run as Administrator).
  • In the Drivers section click on Non-Microsoft.
  • Under Additional Scans click the checkboxes in front of the following items to select them:
    • Reg - BotCheck
      File - Additional Folder Scans
  • Do not change any other settings.
  • Now click the Run Scan button on the toolbar.
  • Let it run unhindered until it finishes.
  • When the scan is complete Notepad will open with the report file loaded in it.
  • Click the Format menu and make sure that Wordwrap is not checked. If it is then click on it to uncheck it.
  • Save the file to your desktop or other location where you can find it back.
Use the Add Reply button and attach the file in your next post (do not try to copy/paste it into the post).

Cheers.

OT
  • 0

#3
Mike19

Mike19

    Member

  • Topic Starter
  • Member
  • PipPip
  • 19 posts
Here is the log

Attached Files


  • 0

#4
OldTimer

OldTimer

    Global Moderator

  • Global Moderator
  • 3,273 posts
Hi Mike19. Let's see what we can do. Follow the steps below in order:

Step #1

Please download The Avenger by Swandog46 to your Desktop.
  • Click on Avenger.zip to open the file
  • Extract avenger.exe to your desktop

Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+C):

Files to delete:
%systemroot%\bm27de048a.xml
%systemroot%\system32\bedrsujp.dll
%systemroot%\system32\dcghhacv.dll
%systemroot%\system32\efcdetsm.dll
%systemroot%\system32\fjnouljo.ini
%systemroot%\system32\gfonoqss.ini
%systemroot%\system32\gfonoqss.ini2
%systemroot%\system32\guwpflkf.dll
%systemroot%\system32\iprtutwa.ini
%systemroot%\system32\iprtutwa.ini2
%systemroot%\system32\jlpepmrq.dll
%systemroot%\system32\jtbkmnpo.ini
%systemroot%\system32\jtbkmnpo.ini2
%systemroot%\system32\kyakarbg.dll
%systemroot%\system32\lawlewgw.ini
%systemroot%\system32\lnpqajlm.ini
%systemroot%\system32\lnpqajlm.ini2
%systemroot%\system32\lvwpoeju.dll
%systemroot%\system32\nfdakaop.dll
%systemroot%\system32\nvapps.xml
%systemroot%\system32\opnmkbtj.dll
%systemroot%\system32\oubhirqr.ini
%systemroot%\system32\oubhirqr.ini2
%systemroot%\system32\oyaqbixx.ini
%systemroot%\system32\pplefblw.ini
%systemroot%\system32\pwnyqdvv.dll
%systemroot%\system32\rxtmtlfx.dll
%systemroot%\system32\tihdlytw.dll
%systemroot%\system32\upqtfwpa.ini
%systemroot%\system32\wdjtbccf.ini
%systemroot%\system32\wdjtbccf.ini2
%systemroot%\system32\wkyhssrc.dll
%systemroot%\system32\xckrpuxd.dll
%systemroot%\system32\xvvfvqmj.dll
%systemroot%\system32\xxibqayo.dll
%systemroot%\system32\yhbdtqlr.dll
c:\documents and settings\all users\application data\microsoft\network\downloader\qmgr0.dat
c:\documents and settings\all users\application data\microsoft\network\downloader\qmgr1.dat

Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.

Now, start The Avenger program by clicking on its icon on your desktop.
  • Click in the window labeled Input Scrupt Here and paste the text copied to the clipboard into it by pressing (Ctrl+V).
  • Click the Execute button
  • Answer "Yes" twice when prompted.

The Avenger will automatically do the following:
  • It will Restart your computer. ( In cases where the code to execute contains "Drivers to Unload", The Avenger will actually restart your system twice.)
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.

Step #2

Start OTScanIt. Copy/Paste the information in the codebox below into the pane where it says "Paste fix here" and then click the Run Fix button.

[Unregister Dlls]
[Registry - Non-Microsoft Only]
< Run [HKEY_LOCAL_MACHINE\] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
YY -> 24ed3716 -> %SystemRoot%\system32\xxibqayo.dll [rundll32.exe "C:\WINDOWS\system32\xxibqayo.dll",b]
YY -> BM27de048a -> %SystemRoot%\system32\lvwpoeju.dll [Rundll32.exe "C:\WINDOWS\system32\lvwpoeju.dll",s]
< ShellExecuteHooks [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks
YY -> {BF0CA4FC-6378-4062-B546-3CDE8A28B1E0} [HKEY_LOCAL_MACHINE] -> %SystemRoot%\system32\efcdEtSm.dll []
< Winlogon\Notify settings [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\
YY -> efcdEtSm -> %SystemRoot%\system32\efcdEtSm.dll
< CurrentVersion Policy Settings [HKEY_CURRENT_USER] > -> HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\
YN -> HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\DisableRegistryTools -> 0
< BHO's [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
YN -> {217167D6-B3EC-4A96-91C5-3196B91D6E83} [HKEY_LOCAL_MACHINE] -> %SystemRoot%\system32\ssqonOfg.dll [Reg Error: Value  does not exist or could not be read.]
YN -> {3E80DC37-1033-402B-8DED-058CF94DAF95} [HKEY_LOCAL_MACHINE] -> %SystemRoot%\system32\mlJAqpnL.dll [Reg Error: Value  does not exist or could not be read.]
YY -> {BF0CA4FC-6378-4062-B546-3CDE8A28B1E0} [HKEY_LOCAL_MACHINE] -> %SystemRoot%\system32\efcdEtSm.dll [Reg Error: Value  does not exist or could not be read.]
YY -> {C5D3176B-38CE-4208-8F80-86D5587EBF96} [HKEY_LOCAL_MACHINE] -> %SystemRoot%\system32\opnmKBTJ.dll [Reg Error: Value  does not exist or could not be read.]
YN -> {DFB0F1E5-9231-4770-BD69-B56F45099769} [HKEY_LOCAL_MACHINE] -> %SystemRoot%\system32\fccBTJDW.dll [Reg Error: Value  does not exist or could not be read.]
YN -> {EE722A0C-04F5-496C-B004-C0D48740CC63} [HKEY_LOCAL_MACHINE] -> %SystemRoot%\system32\khfETmnK.dll [Reg Error: Value  does not exist or could not be read.]
YY -> {f78ef1d1-7d32-4ece-9fdd-bd00c17eed84} [HKEY_LOCAL_MACHINE] -> %SystemRoot%\system32\tihdlytw.dll [Reg Error: Value  does not exist or could not be read.]
< Internet Explorer ToolBars [HKEY_CURRENT_USER\] > -> HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\
YN -> ShellBrowser\\{42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} [HKEY_LOCAL_MACHINE] -> Reg Error: Key does not exist or could not be opened. [Reg Error: Key does not exist or could not be opened.]
YN -> WebBrowser\\{0B53EAC3-8D69-4B9E-9B19-A37C9A5676A7} [HKEY_LOCAL_MACHINE] -> Reg Error: Key does not exist or could not be opened. [Reg Error: Key does not exist or could not be opened.]
YN -> WebBrowser\\{42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} [HKEY_LOCAL_MACHINE] -> Reg Error: Key does not exist or could not be opened. [Reg Error: Key does not exist or could not be opened.]
YN -> WebBrowser\\{C4069E3A-68F1-403E-B40E-20066696354B} [HKEY_LOCAL_MACHINE] -> Reg Error: Key does not exist or could not be opened. [Reg Error: Key does not exist or could not be opened.]
< Internet Explorer Extensions [HKEY_CURRENT_USER\] > -> HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Extensions\
YN -> CmdMapping\\{08B0E5C0-4FCB-11CF-AAA5-00401C608501} [HKEY_LOCAL_MACHINE] -> [Reg Error: Value  does not exist or could not be read.]
YN -> CmdMapping\\{2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} [HKEY_LOCAL_MACHINE] -> [Reg Error: Key does not exist or could not be opened.]
YN -> CmdMapping\\{2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} [HKEY_LOCAL_MACHINE] -> [Reg Error: Key does not exist or could not be opened.]
YN -> CmdMapping\\{92780B25-18CC-41C8-B9BE-3C9C571A8263} [HKEY_LOCAL_MACHINE] -> [Reg Error: Key does not exist or could not be opened.]
YN -> CmdMapping\\{B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} [HKEY_LOCAL_MACHINE] -> [Reg Error: Key does not exist or could not be opened.]
YN -> CmdMapping\\{e2e2dd38-d088-4134-82b7-f2ba38496583} [HKEY_LOCAL_MACHINE] -> [Reg Error: Key does not exist or could not be opened.]
YN -> CmdMapping\\{FB5F1910-F110-11d2-BB9E-00C04F795683} [HKEY_LOCAL_MACHINE] -> [Reg Error: Key does not exist or could not be opened.]
[Registry - Additional Scans - Non-Microsoft Only]
< BotCheck > -> 
YN -> HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\\C:\Program Files\RealVNC\VNC4\winvnc4.exe -> %ProgramFiles%\RealVNC\VNC4\winvnc4.exe [C:\Program Files\RealVNC\VNC4\winvnc4.exe:*:Enabled:VNC Server Free Edition for Win32]
YN -> HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\\C:\Documents and Settings\Adam S\Desktop\utorrent.exe -> %UserProfile%\Desktop\utorrent.exe [C:\Documents and Settings\Adam S\Desktop\utorrent.exe:*:Enabled:µTorrent]
[Files/Folders - Created Within 30 days]
NY -> bedrsujp.dll -> %SystemRoot%\System32\bedrsujp.dll
NY -> dcghhacv.dll -> %SystemRoot%\System32\dcghhacv.dll
NY -> efcdEtSm.dll -> %SystemRoot%\System32\efcdEtSm.dll
NY -> fjnouljo.ini -> %SystemRoot%\System32\fjnouljo.ini
NY -> gfOnoqss.ini -> %SystemRoot%\System32\gfOnoqss.ini
NY -> gfOnoqss.ini2 -> %SystemRoot%\System32\gfOnoqss.ini2
NY -> guwpflkf.dll -> %SystemRoot%\System32\guwpflkf.dll
NY -> IPrtutwa.ini -> %SystemRoot%\System32\IPrtutwa.ini
NY -> IPrtutwa.ini2 -> %SystemRoot%\System32\IPrtutwa.ini2
NY -> jlpepmrq.dll -> %SystemRoot%\System32\jlpepmrq.dll
NY -> JTBKmnpo.ini -> %SystemRoot%\System32\JTBKmnpo.ini
NY -> JTBKmnpo.ini2 -> %SystemRoot%\System32\JTBKmnpo.ini2
NY -> kyakarbg.dll -> %SystemRoot%\System32\kyakarbg.dll
NY -> lawlewgw.ini -> %SystemRoot%\System32\lawlewgw.ini
NY -> LnpqAJlm.ini -> %SystemRoot%\System32\LnpqAJlm.ini
NY -> LnpqAJlm.ini2 -> %SystemRoot%\System32\LnpqAJlm.ini2
NY -> lvwpoeju.dll -> %SystemRoot%\System32\lvwpoeju.dll
NY -> nfdakaop.dll -> %SystemRoot%\System32\nfdakaop.dll
NY -> opnmKBTJ.dll -> %SystemRoot%\System32\opnmKBTJ.dll
NY -> oUBHiRqr.ini -> %SystemRoot%\System32\oUBHiRqr.ini
NY -> oUBHiRqr.ini2 -> %SystemRoot%\System32\oUBHiRqr.ini2
NY -> oyaqbixx.ini -> %SystemRoot%\System32\oyaqbixx.ini
NY -> pplefblw.ini -> %SystemRoot%\System32\pplefblw.ini
NY -> pwnyqdvv.dll -> %SystemRoot%\System32\pwnyqdvv.dll
NY -> rxtmtlfx.dll -> %SystemRoot%\System32\rxtmtlfx.dll
NY -> tihdlytw.dll -> %SystemRoot%\System32\tihdlytw.dll
NY -> upqtfwpa.ini -> %SystemRoot%\System32\upqtfwpa.ini
NY -> WDJTBccf.ini -> %SystemRoot%\System32\WDJTBccf.ini
NY -> WDJTBccf.ini2 -> %SystemRoot%\System32\WDJTBccf.ini2
NY -> wkyhssrc.dll -> %SystemRoot%\System32\wkyhssrc.dll
NY -> xckrpuxd.dll -> %SystemRoot%\System32\xckrpuxd.dll
NY -> xvvfvqmj.dll -> %SystemRoot%\System32\xvvfvqmj.dll
NY -> xxibqayo.dll -> %SystemRoot%\System32\xxibqayo.dll
NY -> yhbdtqlr.dll -> %SystemRoot%\System32\yhbdtqlr.dll
NY -> BM27de048a.xml -> %SystemRoot%\BM27de048a.xml
NY -> 1 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp
[Files Created - Additional Folder Scans - Non-Microsoft Only]
NY -> ?icrosoft.NET -> %CommonProgramFiles%\Μicrosoft.NET
[Files/Folders - Modified Within 30 days]
NY -> bedrsujp.dll -> %SystemRoot%\System32\bedrsujp.dll
NY -> 26 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp
NY -> dcghhacv.dll -> %SystemRoot%\System32\dcghhacv.dll
NY -> efcdEtSm.dll -> %SystemRoot%\System32\efcdEtSm.dll
NY -> fjnouljo.ini -> %SystemRoot%\System32\fjnouljo.ini
NY -> gfOnoqss.ini -> %SystemRoot%\System32\gfOnoqss.ini
NY -> gfOnoqss.ini2 -> %SystemRoot%\System32\gfOnoqss.ini2
NY -> guwpflkf.dll -> %SystemRoot%\System32\guwpflkf.dll
NY -> IPrtutwa.ini -> %SystemRoot%\System32\IPrtutwa.ini
NY -> IPrtutwa.ini2 -> %SystemRoot%\System32\IPrtutwa.ini2
NY -> jlpepmrq.dll -> %SystemRoot%\System32\jlpepmrq.dll
NY -> JTBKmnpo.ini -> %SystemRoot%\System32\JTBKmnpo.ini
NY -> JTBKmnpo.ini2 -> %SystemRoot%\System32\JTBKmnpo.ini2
NY -> kyakarbg.dll -> %SystemRoot%\System32\kyakarbg.dll
NY -> lawlewgw.ini -> %SystemRoot%\System32\lawlewgw.ini
NY -> LnpqAJlm.ini -> %SystemRoot%\System32\LnpqAJlm.ini
NY -> LnpqAJlm.ini2 -> %SystemRoot%\System32\LnpqAJlm.ini2
NY -> lvwpoeju.dll -> %SystemRoot%\System32\lvwpoeju.dll
NY -> nfdakaop.dll -> %SystemRoot%\System32\nfdakaop.dll
NY -> nvapps.xml -> %SystemRoot%\System32\nvapps.xml
NY -> opnmKBTJ.dll -> %SystemRoot%\System32\opnmKBTJ.dll
NY -> oUBHiRqr.ini -> %SystemRoot%\System32\oUBHiRqr.ini
NY -> oUBHiRqr.ini2 -> %SystemRoot%\System32\oUBHiRqr.ini2
NY -> oyaqbixx.ini -> %SystemRoot%\System32\oyaqbixx.ini
NY -> pplefblw.ini -> %SystemRoot%\System32\pplefblw.ini
NY -> pwnyqdvv.dll -> %SystemRoot%\System32\pwnyqdvv.dll
NY -> rxtmtlfx.dll -> %SystemRoot%\System32\rxtmtlfx.dll
NY -> tihdlytw.dll -> %SystemRoot%\System32\tihdlytw.dll
NY -> upqtfwpa.ini -> %SystemRoot%\System32\upqtfwpa.ini
NY -> WDJTBccf.ini -> %SystemRoot%\System32\WDJTBccf.ini
NY -> WDJTBccf.ini2 -> %SystemRoot%\System32\WDJTBccf.ini2
NY -> wkyhssrc.dll -> %SystemRoot%\System32\wkyhssrc.dll
NY -> xckrpuxd.dll -> %SystemRoot%\System32\xckrpuxd.dll
NY -> xvvfvqmj.dll -> %SystemRoot%\System32\xvvfvqmj.dll
NY -> xxibqayo.dll -> %SystemRoot%\System32\xxibqayo.dll
NY -> yhbdtqlr.dll -> %SystemRoot%\System32\yhbdtqlr.dll
NY -> BM27de048a.xml -> %SystemRoot%\BM27de048a.xml
NY -> 1 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp
NY -> qmgr0.dat -> C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
NY -> qmgr1.dat -> C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
[Files Modified - Additional Folder Scans - Non-Microsoft Only]
NY -> ?icrosoft.NET -> %CommonProgramFiles%\Μicrosoft.NET
[Extra Files]
Purity
[Empty Temp Folders]
[Start Explorer]

The fix should only take a very short time. When the fix is completed a message box will popup either telling you that it is finished, or that a reboot is needed to complete the fix. If the fix is complete, click the Ok button and Notepad will open with a log of actions taken during the fix. Post that log back here in your next reply.

If a reboot is required, click the "Yes" button to reboot the machine. After the reboot, OTScanIt will finish moving any files that could not be moved during the fix and NotePad will open with the final results at that time. Post that log back here in your next reply.

Step #3

Now let's run an online virus scan. Both of these require Internet Explorer. Try F-Secure first. Sometimes it doesn't play nice with other system components so if it cannot complete then try the Kaspersky scan. You only need to complete one of the two.

Run the F-Secure Online Scanner

Note: This Scanner is for Internet Explorer Only!
  • Click on Online Services and then Online Scanner
  • Accept the License Agreement.
  • Once the ActiveX installs,Click Full System Scan
  • Once the download completes,the scan will begin automatically.
  • The scan will take some time to finish,so please be patient.
  • When the scan completes, click the Automatic cleaning (recommended) button.
  • Click the Show Report button and Copy&Paste the entire report in your next reply.

If the F-Secure scan did not work then try an online scan with Kaspersky WebScanner

Click on Kaspersky Online Scanner

You will be prompted to install an ActiveX component from Kaspersky, click Yes.
  • The program will launch and then begin downloading the latest definition files:
  • Once the files have been downloaded click on NEXT
  • Now click on Scan Settings
  • In the scan settings make that the following are selected:
    • Scan using the following Anti-Virus database:
      • Extended (if available otherwise Standard)
    • Scan Options:
      Scan Archives
      Scan Mail Bases
  • Click OK
  • Now under select a target to scan:
    Select My Computer
  • The program will start and scan your system.
  • The scan will take a while so be patient and let it run.
  • Once the scan is complete it will display if your system has been infected.
  • Click on the Save as Text button:
  • Save the file to your desktop.
  • Copy and paste that information in your next post.

Step #4

Run a new OTScanIt scan with the following options

Note: You must be logged on to the system with an account that has Administrator privileges to run this program.
  • Close ALL OTHER PROGRAMS.
  • Open the OTScanIt folder and double-click on OTScanIt.exe to start the program.
  • Just use the default settings.
  • Do not change any other settings.
  • Now click the Run Scan button on the toolbar.
  • Let it run unhindered until it finishes.
  • When the scan is complete Notepad will open with the report file loaded in it.
  • Click the Format menu and make sure that Wordwrap is not checked. If it is then click on it to uncheck it and close Notepad (save changes if necessary).
  • Close OTScanIt and locate the OTScanIt.txt file in the folder where OTScanIt.exe is located.
  • Attach that file back here in your next reply.

Step #5

Copy/paste the following back here in your next reply:
  • The Avenger report (c:\Avenger.txt)
  • The latest OTScanIt fix log (look in the OTScanIt folder for the MovedFiles folder. In that folder will be a file with a name in the form of mmddyyyy_hhmmss.log for month, day, year, hours, minutes, and seconds that the scan was run. )
  • The online virus scan report (whichever one you ran)

Attach the following back here in your next reply:
  • The new OTScanIt scan log

I will review the information when it comes back in.

Also let me know of any problems you encountered performing the steps above or any continuing problems you are still having with the computer.

Cheers.

OT
  • 0

#5
Mike19

Mike19

    Member

  • Topic Starter
  • Member
  • PipPip
  • 19 posts
Avenger LOG


Logfile of The Avenger Version 2.0, © by Swandog46
http://swandog46.geekstogo.com

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!

File "C:\WINDOWS\bm27de048a.xml" deleted successfully.
File "C:\WINDOWS\system32\bedrsujp.dll" deleted successfully.
File "C:\WINDOWS\system32\dcghhacv.dll" deleted successfully.
File "C:\WINDOWS\system32\efcdetsm.dll" deleted successfully.
File "C:\WINDOWS\system32\fjnouljo.ini" deleted successfully.
File "C:\WINDOWS\system32\gfonoqss.ini" deleted successfully.
File "C:\WINDOWS\system32\gfonoqss.ini2" deleted successfully.
File "C:\WINDOWS\system32\guwpflkf.dll" deleted successfully.
File "C:\WINDOWS\system32\iprtutwa.ini" deleted successfully.
File "C:\WINDOWS\system32\iprtutwa.ini2" deleted successfully.
File "C:\WINDOWS\system32\jlpepmrq.dll" deleted successfully.

Error: file "C:\WINDOWS\system32\jtbkmnpo.ini" not found!
Deletion of file "C:\WINDOWS\system32\jtbkmnpo.ini" failed!
Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist


Error: file "C:\WINDOWS\system32\jtbkmnpo.ini2" not found!
Deletion of file "C:\WINDOWS\system32\jtbkmnpo.ini2" failed!
Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist

File "C:\WINDOWS\system32\kyakarbg.dll" deleted successfully.
File "C:\WINDOWS\system32\lawlewgw.ini" deleted successfully.
File "C:\WINDOWS\system32\lnpqajlm.ini" deleted successfully.
File "C:\WINDOWS\system32\lnpqajlm.ini2" deleted successfully.

Error: file "C:\WINDOWS\system32\lvwpoeju.dll" not found!
Deletion of file "C:\WINDOWS\system32\lvwpoeju.dll" failed!
Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist

File "C:\WINDOWS\system32\nfdakaop.dll" deleted successfully.
File "C:\WINDOWS\system32\nvapps.xml" deleted successfully.
File "C:\WINDOWS\system32\opnmkbtj.dll" deleted successfully.
File "C:\WINDOWS\system32\oubhirqr.ini" deleted successfully.
File "C:\WINDOWS\system32\oubhirqr.ini2" deleted successfully.

Error: file "C:\WINDOWS\system32\oyaqbixx.ini" not found!
Deletion of file "C:\WINDOWS\system32\oyaqbixx.ini" failed!
Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist

File "C:\WINDOWS\system32\pplefblw.ini" deleted successfully.
File "C:\WINDOWS\system32\pwnyqdvv.dll" deleted successfully.
File "C:\WINDOWS\system32\rxtmtlfx.dll" deleted successfully.
File "C:\WINDOWS\system32\tihdlytw.dll" deleted successfully.
File "C:\WINDOWS\system32\upqtfwpa.ini" deleted successfully.
File "C:\WINDOWS\system32\wdjtbccf.ini" deleted successfully.
File "C:\WINDOWS\system32\wdjtbccf.ini2" deleted successfully.
File "C:\WINDOWS\system32\wkyhssrc.dll" deleted successfully.
File "C:\WINDOWS\system32\xckrpuxd.dll" deleted successfully.
File "C:\WINDOWS\system32\xvvfvqmj.dll" deleted successfully.

Error: file "C:\WINDOWS\system32\xxibqayo.dll" not found!
Deletion of file "C:\WINDOWS\system32\xxibqayo.dll" failed!
Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist

File "C:\WINDOWS\system32\yhbdtqlr.dll" deleted successfully.
File "c:\documents and settings\all users\application data\microsoft\network\downloader\qmgr0.dat" deleted successfully.
File "c:\documents and settings\all users\application data\microsoft\network\downloader\qmgr1.dat" deleted successfully.

Completed script processing.

*******************

Finished! Terminate.


OTSCANFIX log



[Registry - Non-Microsoft Only]
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\24ed3716 not found.
File C:\WINDOWS\system32\xxibqayo.dll not found.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\BM27de048a not found.
File C:\WINDOWS\system32\lvwpoeju.dll not found.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\\{BF0CA4FC-6378-4062-B546-3CDE8A28B1E0} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{BF0CA4FC-6378-4062-B546-3CDE8A28B1E0}\ deleted successfully.
File C:\WINDOWS\system32\efcdEtSm.dll not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\efcdEtSm\ deleted successfully.
File C:\WINDOWS\system32\efcdEtSm.dll not found.
Registry value HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\DisableRegistryTools deleted successfully.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{217167D6-B3EC-4A96-91C5-3196B91D6E83}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{217167D6-B3EC-4A96-91C5-3196B91D6E83}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3E80DC37-1033-402B-8DED-058CF94DAF95}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3E80DC37-1033-402B-8DED-058CF94DAF95}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BF0CA4FC-6378-4062-B546-3CDE8A28B1E0}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{BF0CA4FC-6378-4062-B546-3CDE8A28B1E0}\ not found.
File C:\WINDOWS\system32\efcdEtSm.dll not found.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C5D3176B-38CE-4208-8F80-86D5587EBF96}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C5D3176B-38CE-4208-8F80-86D5587EBF96}\ not found.
File C:\WINDOWS\system32\opnmKBTJ.dll not found.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DFB0F1E5-9231-4770-BD69-B56F45099769}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{DFB0F1E5-9231-4770-BD69-B56F45099769}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EE722A0C-04F5-496C-B004-C0D48740CC63}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{EE722A0C-04F5-496C-B004-C0D48740CC63}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{f78ef1d1-7d32-4ece-9fdd-bd00c17eed84}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f78ef1d1-7d32-4ece-9fdd-bd00c17eed84}\ deleted successfully.
File C:\WINDOWS\system32\tihdlytw.dll not found.
Registry value HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\\{42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6}\ not found.
Registry value HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{0B53EAC3-8D69-4B9E-9B19-A37C9A5676A7} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0B53EAC3-8D69-4B9E-9B19-A37C9A5676A7}\ not found.
Registry value HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6}\ not found.
Registry value HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{C4069E3A-68F1-403E-B40E-20066696354B} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C4069E3A-68F1-403E-B40E-20066696354B}\ not found.
Registry value HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Extensions\CmdMapping\\{08B0E5C0-4FCB-11CF-AAA5-00401C608501} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{08B0E5C0-4FCB-11CF-AAA5-00401C608501}\ deleted successfully.
Registry value HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Extensions\CmdMapping\\{2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2EAF5BB1-070F-11D3-9307-00C04FAE2D4F}\ not found.
Registry value HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Extensions\CmdMapping\\{2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2EAF5BB2-070F-11D3-9307-00C04FAE2D4F}\ not found.
Registry value HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Extensions\CmdMapping\\{92780B25-18CC-41C8-B9BE-3C9C571A8263} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{92780B25-18CC-41C8-B9BE-3C9C571A8263}\ not found.
Registry value HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Extensions\CmdMapping\\{B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B7FE5D70-9AA2-40F1-9C6B-12A255F085E1}\ not found.
Registry value HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Extensions\CmdMapping\\{e2e2dd38-d088-4134-82b7-f2ba38496583} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{e2e2dd38-d088-4134-82b7-f2ba38496583}\ not found.
Registry value HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Extensions\CmdMapping\\{FB5F1910-F110-11d2-BB9E-00C04F795683} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{FB5F1910-F110-11d2-BB9E-00C04F795683}\ not found.
[Registry - Additional Scans - Non-Microsoft Only]
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\\C:\Program Files\RealVNC\VNC4\winvnc4.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\\C:\Documents and Settings\Adam S\Desktop\utorrent.exe deleted successfully.
[Files/Folders - Created Within 30 days]
File C:\WINDOWS\System32\bedrsujp.dll not found!
File C:\WINDOWS\System32\dcghhacv.dll not found!
File C:\WINDOWS\System32\efcdEtSm.dll not found!
File C:\WINDOWS\System32\fjnouljo.ini not found!
File C:\WINDOWS\System32\gfOnoqss.ini not found!
File C:\WINDOWS\System32\gfOnoqss.ini2 not found!
File C:\WINDOWS\System32\guwpflkf.dll not found!
File C:\WINDOWS\System32\IPrtutwa.ini not found!
File C:\WINDOWS\System32\IPrtutwa.ini2 not found!
File C:\WINDOWS\System32\jlpepmrq.dll not found!
File C:\WINDOWS\System32\JTBKmnpo.ini not found!
File C:\WINDOWS\System32\JTBKmnpo.ini2 not found!
File C:\WINDOWS\System32\kyakarbg.dll not found!
File C:\WINDOWS\System32\lawlewgw.ini not found!
File C:\WINDOWS\System32\LnpqAJlm.ini not found!
File C:\WINDOWS\System32\LnpqAJlm.ini2 not found!
File C:\WINDOWS\System32\lvwpoeju.dll not found!
File C:\WINDOWS\System32\nfdakaop.dll not found!
File C:\WINDOWS\System32\opnmKBTJ.dll not found!
File C:\WINDOWS\System32\oUBHiRqr.ini not found!
File C:\WINDOWS\System32\oUBHiRqr.ini2 not found!
File C:\WINDOWS\System32\oyaqbixx.ini not found!
File C:\WINDOWS\System32\pplefblw.ini not found!
File C:\WINDOWS\System32\pwnyqdvv.dll not found!
File C:\WINDOWS\System32\rxtmtlfx.dll not found!
File C:\WINDOWS\System32\tihdlytw.dll not found!
File C:\WINDOWS\System32\upqtfwpa.ini not found!
File C:\WINDOWS\System32\WDJTBccf.ini not found!
File C:\WINDOWS\System32\WDJTBccf.ini2 not found!
File C:\WINDOWS\System32\wkyhssrc.dll not found!
File C:\WINDOWS\System32\xckrpuxd.dll not found!
File C:\WINDOWS\System32\xvvfvqmj.dll not found!
File C:\WINDOWS\System32\xxibqayo.dll not found!
File C:\WINDOWS\System32\yhbdtqlr.dll not found!
File C:\WINDOWS\BM27de048a.xml not found!
[Files Created - Additional Folder Scans - Non-Microsoft Only]
C:\Program Files\Common Files\Μicrosoft.NET folder moved successfully.
[Files/Folders - Modified Within 30 days]
File C:\WINDOWS\System32\bedrsujp.dll not found!
File C:\WINDOWS\System32\dcghhacv.dll not found!
File C:\WINDOWS\System32\efcdEtSm.dll not found!
File C:\WINDOWS\System32\fjnouljo.ini not found!
File C:\WINDOWS\System32\gfOnoqss.ini not found!
File C:\WINDOWS\System32\gfOnoqss.ini2 not found!
File C:\WINDOWS\System32\guwpflkf.dll not found!
File C:\WINDOWS\System32\IPrtutwa.ini not found!
File C:\WINDOWS\System32\IPrtutwa.ini2 not found!
File C:\WINDOWS\System32\jlpepmrq.dll not found!
File C:\WINDOWS\System32\JTBKmnpo.ini not found!
File C:\WINDOWS\System32\JTBKmnpo.ini2 not found!
File C:\WINDOWS\System32\kyakarbg.dll not found!
File C:\WINDOWS\System32\lawlewgw.ini not found!
File C:\WINDOWS\System32\LnpqAJlm.ini not found!
File C:\WINDOWS\System32\LnpqAJlm.ini2 not found!
File C:\WINDOWS\System32\lvwpoeju.dll not found!
File C:\WINDOWS\System32\nfdakaop.dll not found!
File C:\WINDOWS\System32\nvapps.xml not found!
File C:\WINDOWS\System32\opnmKBTJ.dll not found!
File C:\WINDOWS\System32\oUBHiRqr.ini not found!
File C:\WINDOWS\System32\oUBHiRqr.ini2 not found!
File C:\WINDOWS\System32\oyaqbixx.ini not found!
File C:\WINDOWS\System32\pplefblw.ini not found!
File C:\WINDOWS\System32\pwnyqdvv.dll not found!
File C:\WINDOWS\System32\rxtmtlfx.dll not found!
File C:\WINDOWS\System32\tihdlytw.dll not found!
File C:\WINDOWS\System32\upqtfwpa.ini not found!
File C:\WINDOWS\System32\WDJTBccf.ini not found!
File C:\WINDOWS\System32\WDJTBccf.ini2 not found!
File C:\WINDOWS\System32\wkyhssrc.dll not found!
File C:\WINDOWS\System32\xckrpuxd.dll not found!
File C:\WINDOWS\System32\xvvfvqmj.dll not found!
File C:\WINDOWS\System32\xxibqayo.dll not found!
File C:\WINDOWS\System32\yhbdtqlr.dll not found!
File C:\WINDOWS\BM27de048a.xml not found!
File C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat not found!
File C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat not found!
[Files Modified - Additional Folder Scans - Non-Microsoft Only]
File C:\Program Files\Common Files\Μicrosoft.NET not found!
[Extra Files]
< Purity >
[Empty Temp Folders]
File delete failed. C:\Documents and Settings\Adam S\Local Settings\Temp\TEMPOR~1.SH!\Content.SH!\Z485QRFN.SH!\Type=click&FlightID=20253&AdID=35421&TargetID=2927&Segments=3,7,26,35,36,41,43,54,56,57,70,104,106,107,111,123,162,277,337,465,
468,502,600,626,647,674,754,821,823,824,870[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Adam S\Local Settings\Temp\TEMPOR~1.SH!\Content.SH!\Y5O7YLIL.SH!\Type=click&FlightID=19991&AdID=35058&TargetID=2927&Segments=3,7,26,35,36,41,43,54,56,57,70,104,106,107,111,123,162,277,337,465,
468,502,600,626,647,674,754,821,823,824,870[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Adam S\Local Settings\Temp\TEMPOR~1.SH!\Content.SH!\Y3QR6PA3.SH!\Type=click&FlightID=19991&AdID=35058&TargetID=2927&Segments=3,7,26,35,36,41,43,54,56,57,70,104,106,107,111,123,162,277,337,465,
468,502,600,626,647,674,754,821,823,824,870[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Adam S\Local Settings\Temp\TEMPOR~1.SH!\Content.SH!\Y3QR6PA3.SH!\Type=click&FlightID=20253&AdID=35421&TargetID=2927&Segments=3,7,26,35,36,41,43,54,56,57,70,104,106,107,111,123,162,277,337,465,
468,502,600,626,647,674,754,821,823,824,870[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Adam S\Local Settings\Temp\TEMPOR~1.SH!\Content.SH!\Y3QR6PA3.SH!\Type=click&FlightID=20253&AdID=35421&TargetID=2927&Segments=3,7,26,35,36,41,43,54,56,57,70,104,106,107,111,123,162,277,337,465,
468,502,600,626,647,674,754,821,823,824,870[2].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Adam S\Local Settings\Temp\TEMPOR~1.SH!\Content.SH!\8D85MBWH.SH!\Type=click&FlightID=20253&AdID=35421&TargetID=2927&Segments=3,7,26,35,36,41,43,54,56,57,70,104,106,107,111,123,162,277,337,465,
468,502,600,626,647,674,754,821,823,824,870[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Adam S\Local Settings\Temp\TEMPOR~1.SH!\Content.SH!\8D85MBWH.SH!\Type=click&FlightID=20253&AdID=35421&TargetID=2927&Segments=3,7,26,35,36,41,43,54,56,57,70,104,106,107,111,123,162,277,337,465,
468,502,600,626,647,674,754,821,823,824,870[2].htm scheduled to be deleted on reboot.
User's Temp folder emptied.
User's Temporary Internet Files folder emptied.
User's Internet Explorer cache folder emptied.
Local Service Temp folder emptied.
Local Service Temporary Internet Files folder emptied.
Windows Temp folder emptied.
Java cache emptied.
RecycleBin -> emptied.
Explorer started successfully
< End of fix log >
OTScanIt by OldTimer - Version 1.0.15.15 fix logfile created on 06142008_124221

Files moved on Reboot...
File C:\Documents and Settings\Adam S\Local Settings\Temp\TEMPOR~1.SH!\Content.SH!\Z485QRFN.SH!\Type=click&FlightID=20253&AdID=35421&TargetID=2927&Segments=3,7,26,35,36,41,43,54,56,57,70,104,106,107,111,123,162,277,337,465,
468,502,600,626,647,674,754,821,823,824,870[1].htm not found!
File C:\Documents and Settings\Adam S\Local Settings\Temp\TEMPOR~1.SH!\Content.SH!\Y5O7YLIL.SH!\Type=click&FlightID=19991&AdID=35058&TargetID=2927&Segments=3,7,26,35,36,41,43,54,56,57,70,104,106,107,111,123,162,277,337,465,
468,502,600,626,647,674,754,821,823,824,870[1].htm not found!
File C:\Documents and Settings\Adam S\Local Settings\Temp\TEMPOR~1.SH!\Content.SH!\Y3QR6PA3.SH!\Type=click&FlightID=19991&AdID=35058&TargetID=2927&Segments=3,7,26,35,36,41,43,54,56,57,70,104,106,107,111,123,162,277,337,465,
468,502,600,626,647,674,754,821,823,824,870[1].htm not found!
File C:\Documents and Settings\Adam S\Local Settings\Temp\TEMPOR~1.SH!\Content.SH!\Y3QR6PA3.SH!\Type=click&FlightID=20253&AdID=35421&TargetID=2927&Segments=3,7,26,35,36,41,43,54,56,57,70,104,106,107,111,123,162,277,337,465,
468,502,600,626,647,674,754,821,823,824,870[1].htm not found!
File C:\Documents and Settings\Adam S\Local Settings\Temp\TEMPOR~1.SH!\Content.SH!\Y3QR6PA3.SH!\Type=click&FlightID=20253&AdID=35421&TargetID=2927&Segments=3,7,26,35,36,41,43,54,56,57,70,104,106,107,111,123,162,277,337,465,
468,502,600,626,647,674,754,821,823,824,870[2].htm not found!
File C:\Documents and Settings\Adam S\Local Settings\Temp\TEMPOR~1.SH!\Content.SH!\8D85MBWH.SH!\Type=click&FlightID=20253&AdID=35421&TargetID=2927&Segments=3,7,26,35,36,41,43,54,56,57,70,104,106,107,111,123,162,277,337,465,
468,502,600,626,647,674,754,821,823,824,870[1].htm not found!
File C:\Documents and Settings\Adam S\Local Settings\Temp\TEMPOR~1.SH!\Content.SH!\8D85MBWH.SH!\Type=click&FlightID=20253&AdID=35421&TargetID=2927&Segments=3,7,26,35,36,41,43,54,56,57,70,104,106,107,111,123,162,277,337,465,
468,502,600,626,647,674,754,821,823,824,870[2].htm not found!




F-Secure Online Report


Scanning Report
Saturday, June 14, 2008 12:46:50 - 14:51:43
Computer name: ADAM
Scanning type: Scan system for malware, rootkits
Target: C:\


--------------------------------------------------------------------------------

Result: 14 malware found
JS/Agent.A (virus)
C:\DOCUMENTS AND SETTINGS\ADAM S\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\REZ7PI6L\G2[1].HTM (Submitted)
C:\DOCUMENTS AND SETTINGS\ADAM S\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\REZ7PI6L\GS2[1].HTM (Submitted)
Tracking Cookie (spyware)
System
Trojan-Downloader.Win32.Dyfuca.eg (virus)
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\SYMANTEC\NORTON ANTIVIRUS\QUARANTINE\3A4F0EE0.DLL (Renamed & Submitted)
Trojan-Downloader.Win32.Dyfuca.ei (virus)
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\SYMANTEC\NORTON ANTIVIRUS\QUARANTINE\13C564BE.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Dyfuca.gen (virus)
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\SYMANTEC\NORTON ANTIVIRUS\QUARANTINE\5B2860BA.DLL (Renamed & Submitted)
Trojan-Downloader.Win32.Qoologic.ac (virus)
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\SYMANTEC\NORTON ANTIVIRUS\QUARANTINE\3A4B64E3.DLL (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\SYMANTEC\NORTON ANTIVIRUS\QUARANTINE\594E18C3.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Small.bmx (virus)
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\SYMANTEC\NORTON ANTIVIRUS\QUARANTINE\6A7D77F6.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Small.cam (virus)
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\SYMANTEC\NORTON ANTIVIRUS\QUARANTINE\588A419B.EXE (Renamed & Submitted)
Trojan.Win32.LowZones.am (virus)
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\SYMANTEC\NORTON ANTIVIRUS\QUARANTINE\39F04D48.EXE (Renamed & Submitted)
Trojan.Win32.Monder.oa (virus)
C:\PROGRAM FILES\HIJACKTHIS\BACKUPS\BACKUP-20080612-174210-568.DLL (Renamed & Submitted)
C:\PROGRAM FILES\HIJACKTHIS\BACKUPS\BACKUP-20080612-190630-748.DLL (Renamed & Submitted)
Trojan.Win32.Runner.h (virus)
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\SYMANTEC\NORTON ANTIVIRUS\QUARANTINE\6C8D4505.EXE (Renamed & Submitted)

--------------------------------------------------------------------------------

Statistics
Scanned:
Files: 137535
System: 10665
Not scanned: 9
Actions:
Disinfected: 0
Renamed: 11
Deleted: 0
None: 3
Submitted: 13
Files not scanned:
C:\HIBERFIL.SYS
C:\PAGEFILE.SYS
C:\WINDOWS\SYSTEM32\DRIVERS\SPTD.SYS
C:\WINDOWS\SYSTEM32\CONFIG\DEFAULT
C:\WINDOWS\SYSTEM32\CONFIG\SAM
C:\WINDOWS\SYSTEM32\CONFIG\SECURITY
C:\WINDOWS\SYSTEM32\CONFIG\SOFTWARE
C:\WINDOWS\SYSTEM32\CONFIG\SYSTEM
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\MICROSOFT\CRYPTO\RSA\MACHINEKEYS\3AD391678A806EC4D691E83AAA393B6F_50E417E0-E461-474B-96E2-077B80325612

--------------------------------------------------------------------------------

Options
Scanning engines:
F-Secure USS: 2.30.0
F-Secure Blacklight: 1.0.68
F-Secure Hydra: 2.8.8110, 2008-06-13
F-Secure Pegasus: 1.20.0, 2008-04-14
F-Secure AVP: 7.0.171, 2008-06-13
Scanning options:
Scan defined files: COM EXE SYS OV? BIN SCR DLL SHS HTM HTML HTT VBS JS INF VXD DO? XL? RTF CPL WIZ HTA PP? PWZ P?T MSO PIF . ACM ASP AX CNV CSC DRV INI MDB MPD MPP MPT OBD OBT OCX PCI TLB TSP WBK WBT WPC WSH VWP WML BOO HLP TD0 TT6 MSG ASD JSE VBE WSC CHM EML PRC SHB LNK WSF {* PDF ZL? XML ZIP XXX ANI AVB BAT CMD JPG LSP MAP MHT MIF PHP POT SWF WMF NWS TAR
Use Advanced heuristics

--------------------------------------------------------------------------------

Copyright © 1998-2007 Product support |Send virus sample to F-Secure
F-Secure assumes no responsibility for material created or published by third parties that F-Secure World Wide Web pages have a link to. Unless you have clearly stated otherwise, by submitting material to any of our servers, for example by E-mail or via our F-Secure's CGI E-mail, you agree that the material you make available may be published in the F-Secure World Wide Pages or hard-copy publications. You will reach F-Secure public web site by clicking on underlined links. While doing this, your access will be logged to our private access statistics with your domain name.This information will not be given to any third party. You agree not to take action against us in relation to material that you submit. Unless you have clearly stated otherwise, by submitting material you warrant that F-Secure may incorporate any concepts described in it in the F-Secure products/publications without liability.

Attached Files


  • 0

#6
OldTimer

OldTimer

    Global Moderator

  • Global Moderator
  • 3,273 posts
Hi Mike19. That looks pretty good. Just 1 leftover item to take care of:

Start OTScanIt. Copy/Paste the information in the codebox below into the pane where it says "Paste fix here" and then click the Run Fix button.

[Registry - Non-Microsoft Only]
< BHO's [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
YN -> {F8BCB8C6-C179-4DCB-A465-04DB0C09646B} [HKEY_LOCAL_MACHINE] -> %SystemRoot%\system32\opnmKBTJ.dll [Reg Error: Value  does not exist or could not be read.]

The fix should only take a very short time. When the fix is completed a message box will popup telling you that it is finished. Click the Ok button and Notepad will open with a log of actions taken during the fix.

Close Notepad and OTScanIt.

Go ahead and run the system normally for a couple of days and then get back with me and let me know if there are any continuing issues. If everything is Ok at that time, then we have some final cleanup to do and you'll be good to go.

Cheers.

OT
  • 0

#7
Mike19

Mike19

    Member

  • Topic Starter
  • Member
  • PipPip
  • 19 posts
Everything seems to be working fine. Whats the final clean up?
  • 0

#8
OldTimer

OldTimer

    Global Moderator

  • Global Moderator
  • 3,273 posts
Glad to hear it Mike19. Then let's do some final cleanup to reset the System Restore points and remove all of the tools we used during the fix and then you are all set.

Step #1

Reset and Re-enable your System Restore to remove infected files that have been backed up by Windows. The files in System Restore are protected to prevent any programs changing those files. This is the only way to clean these files: (You will lose all previous restore points which are likely to be infected)
1. Turn off System Restore.
On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
Check Turn off System Restore.
Click Apply, and then click OK.

2. Restart your computer.

3. Turn ON System Restore.
On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
UN-Check Turn off System Restore.
Click Apply, and then click OK.
[/list]
System Restore will now be active again.

Step #2

To remove all of the tools we used and the files and folders they created do the following:

  • Start OTScanIt
    Click the CleanUp button
  • OTScanIt will download a small file from the Internet. If a security program or firewall warns you of this allow it to download.
  • OTScanIt will delete any tools downloaded and files/folders created and then ask you to reboot so it can remove itself. Click Yes.
After that you are good to go.

Cheers and Happy Computing!

OT
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP