Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

Google and Search Engine Virus/Redirect [Solved]


  • This topic is locked This topic is locked

#1
helpmeplease!

helpmeplease!

    Member

  • Member
  • PipPip
  • 11 posts
Hi,

I need some help as I have seen others with the same problem, but don't know enough to fix the problem myself.

I have the Google and other search engine redirect virus; when I click on many links after doing a search on Google and other search engines, it redirects me to odd pages.

I've seen people helped using Hijack this, and other programs, along with the help of others, to solve the problem. Can someone walk me through this?

I would greatly appreciate it.

Thank you.
  • 0

Advertisements


#2
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
hi

Please download ComboFix from Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved and renamed following this process directly to your desktop**
  • If you are using Firefox, make sure that your download settings are as follows:
    • Tools->Options->Main tab
    • Set to "Always ask me where to Save the files".
  • During the download, rename Combofix to Combo-Fix as follows:

    Posted Image

    Posted Image

  • It is important you rename Combofix during the download, but not after.
  • Please do not rename Combofix to other names, but only to the one indicated.
  • Close any open browsers.
  • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

    -----------------------------------------------------------

    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

      -----------------------------------------------------------

    • Close any open browsers.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
    • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

    -----------------------------------------------------------

  • Double click on combo-Fix.exe & follow the prompts.
  • When finished, it will produce a report for you.
  • Please post the "C:\Combo-Fix.txt" for further review.
[B]**Note: Do not mouseclick combo-fix's window while it's running. That may cause it to stall**
  • 0

#3
helpmeplease!

helpmeplease!

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
Thank you so much! Here's what came out:


ComboFix 09-06-20.04 - Justin 06/21/2009 10:58.1 - FAT32x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.510.306 [GMT -4:00]
Running from: c:\documents and settings\Justin\Desktop\Combo-Fix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\program files\podmena
c:\windows\SYSTEM32\796525
c:\documents and settings\Justin\Application Data\wiaserva.log
c:\documents and settings\Justin\Application Data\wiaservg.log
c:\documents and settings\Justin\Start Menu\Programs\Startup\fmnupd32.exe
c:\documents and settings\Justin\Start Menu\Programs\Startup\zqosys32.exe
C:\giyghshu.exe
c:\program files\podmena\podmena.dll
c:\program files\podmena\podmena.sys
c:\windows\$NtServicePackUninstall$\dmc.bak2
c:\windows\9129837.exe
c:\windows\ADDINS\cpcm.bak2
c:\windows\AppPatch\dmc.bak2
c:\windows\Config\rvsbk.bak2
c:\windows\Cursors\wsnd.bak2
c:\windows\Fonts\cpkab.bak2
c:\windows\Fonts\pateni.bak1
c:\windows\Fonts\pateni.ini
c:\windows\Fonts\yeksii.bak2
c:\windows\Help\SBSI\capxe.bak2
c:\windows\INF\codofni.bak2
c:\windows\ld08.exe
c:\windows\ld09.exe
c:\windows\MSAGENT\evawyek.bak1
c:\windows\MSAGENT\evawyek.bak2
c:\windows\MSAGENT\evawyek.ini
c:\windows\MSAGENT\INTL\cbac.bak1
c:\windows\MSAGENT\INTL\cbac.bak2
c:\windows\MSAGENT\INTL\cbac.ini
c:\windows\MSAGENT\INTL\evawcm.bak1
c:\windows\MSAGENT\INTL\evawcm.bak2
c:\windows\MSAGENT\INTL\evawcm.ini
c:\windows\MSAGENT\niamcvsm.bak2
c:\windows\MSAGENT\yektac.bak2
c:\windows\pacvs.bak2
c:\windows\ptfbd.bak2
c:\windows\Registration\vrscfm.bak2
c:\windows\REPAIR\pctbil.bak1
c:\windows\REPAIR\pctbil.ini
c:\windows\SECURITY\dmcrc.bak1
c:\windows\SECURITY\dmcrc.ini
c:\windows\SECURITY\LOGS\spvrs.bak1
c:\windows\SECURITY\LOGS\spvrs.bak2
c:\windows\SECURITY\LOGS\spvrs.ini
c:\windows\SYSTEM\elosp.bak1
c:\windows\SYSTEM\elosp.ini
c:\windows\SYSTEM\lldsa.bak2
c:\windows\SYSTEM\lmxpa.bak2
c:\windows\SYSTEM32\796525\796525.dll
c:\windows\SYSTEM32\DLLCACHE\papct.bak1
c:\windows\SYSTEM32\DLLCACHE\papct.bak2
c:\windows\SYSTEM32\DLLCACHE\papct.ini
c:\windows\system32\gsf83iujid.dll
c:\windows\system32\SYSDLL.exe
c:\windows\system32\wbem\proquota.exe
c:\windows\SYSTEM32\XIRCOM\ssvipat.bak1
c:\windows\SYSTEM32\XIRCOM\ssvipat.bak2
c:\windows\SYSTEM32\XIRCOM\ssvipat.ini
c:\windows\Tasks\sw.bak2
c:\windows\yalpbac.bak2
c:\windows\yekten.bak2
c:\windows\zaponce52689.dat
c:\windows\zaponce53173.dat
c:\windows\zaponce53290.dat

c:\windows\system32\proquota.exe was missing
Restored copy from - c:\windows\ServicePackFiles\i386\proquota.exe

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_podmena
-------\Legacy_podmenadrv
-------\Service_podmena
-------\Service_podmenadrv


((((((((((((((((((((((((( Files Created from 2009-05-21 to 2009-06-21 )))))))))))))))))))))))))))))))
.

2009-06-21 15:00 . 2004-08-04 07:56 50176 ----a-w- c:\windows\system32\proquota.exe
2009-06-21 15:00 . 2004-08-04 07:56 50176 ----a-w- c:\windows\system32\dllcache\proquota.exe
2009-06-20 04:08 . 2009-06-20 04:05 19968 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Shortcuts\icwsetup.exe
2009-06-14 21:46 . 2008-01-07 21:36 2216064 ----a-w- c:\windows\system32\drivers\w29n51.sys
2009-06-14 21:46 . 2007-02-12 19:41 2732032 ----a-w- c:\windows\system32\Netw2r32.dll
2009-06-14 21:46 . 2007-02-12 19:40 557056 ----a-w- c:\windows\system32\Netw2c32.dll
2009-06-14 21:42 . 2009-06-14 21:42 -------- d-sh--w- C:\FOUND.003
2009-06-14 17:59 . 2009-06-14 17:59 -------- d-sh--w- C:\FOUND.002
2009-06-14 17:54 . 2009-06-14 17:54 -------- d-sh--w- C:\FOUND.001
2009-06-14 17:48 . 2009-06-14 17:48 -------- d-sh--w- C:\FOUND.000
2009-06-14 17:40 . 2009-06-14 21:11 100684 ----a-w- c:\windows\system32\drivers\2d79df44.sys

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-05-05 04:36 . 2009-05-05 04:36 410984 ----a-w- c:\windows\system32\deploytk.dll
2009-05-05 04:36 . 2009-05-05 04:36 -------- d-----w- c:\program files\Java
2009-05-05 04:35 . 2009-05-05 04:35 152576 ----a-w- c:\documents and settings\Justin\Application Data\Sun\Java\jre1.6.0_13\lzma.dll
2008-12-21 20:47 . 2005-04-16 21:56 67688 ----a-w- c:\program files\mozilla firefox\components\jar50.dll
2008-12-21 20:47 . 2005-04-16 21:56 54368 ----a-w- c:\program files\mozilla firefox\components\jsd3250.dll
2008-12-21 20:47 . 2005-04-16 21:56 172136 ----a-w- c:\program files\mozilla firefox\components\xpinstal.dll
2008-12-21 20:47 . 2007-09-02 01:25 34944 ----a-w- c:\program files\mozilla firefox\components\myspell.dll
2008-12-21 20:47 . 2007-09-02 01:25 46712 ----a-w- c:\program files\mozilla firefox\components\spellchk.dll
2005-04-13 12:13 . 2005-04-13 12:13 383508 --sh--w- c:\windows\SYSTEM32\DLLCACHE\tcpap.exe
2005-01-24 12:07 . 2005-01-24 12:07 381952 --sh--w- c:\windows\REPAIR\libtcp.exe
2005-06-05 22:41 . 2005-06-05 22:41 91 --sh--w- c:\windows\REPAIR\lib.exe
2005-01-24 12:08 . 2005-01-24 12:08 734849 --sh--w- c:\windows\MSAGENT\smwdrah.tmp
2005-02-05 05:42 . 2005-02-05 05:42 385044 --sh--w- c:\windows\MSAGENT\keywave.exe
2005-01-18 13:48 . 2005-01-18 13:48 388116 --sh--w- c:\windows\MSAGENT\INTL\mcwave.exe
2005-06-04 14:30 . 2005-06-04 14:30 91 --sh--w- c:\windows\SECURITY\crcmd.exe
2005-01-12 13:53 . 2005-01-12 13:52 388116 --sh--w- c:\windows\SECURITY\LOGS\srvps.exe
2005-06-03 23:28 . 2005-06-03 23:27 91 --sh--w- c:\windows\Help\raslib.exe
2005-03-21 12:56 . 2005-03-21 12:56 385044 --sh--w- c:\windows\Fonts\inetap.exe
2005-02-03 13:49 . 2005-02-02 00:26 707313 --sh--w- c:\windows\Driver Cache\dvdrba.bak2
2005-01-10 00:58 . 2005-01-10 00:58 721381 --sh--w- c:\windows\Driver Cache\drahsm.bak2
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Apoint"="c:\program files\Apoint\Apoint.exe" [2004-02-02 155648]
"PRONoMgr.exe"="c:\program files\Intel\PROSetWireless\NCS\PROSet\PRONoMgr.exe" [2003-12-19 86016]
"DVDSentry"="c:\windows\System32\DSentry.exe" [2002-07-17 28672]
"AdaptecDirectCD"="c:\program files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe" [2002-12-17 684032]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-09-20 94208]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-09-20 77824]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-09-20 114688]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2008-05-27 413696]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2008-06-02 267048]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-05-05 148888]
"Internet Connection Wizard Setup Tool"="c:\program files\Internet Explorer\Connection Wizard\icwsetup.exe" [2009-06-20 19968]

c:\documents and settings\All Users\Application Data\Microsoft\Shortcuts\
icwsetup.exe [2009-6-20 19968]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\Sebring]
2004-01-13 19:17 110592 ----a-w- c:\windows\SYSTEM32\LgNotify.dll

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"8085:TCP"= 8085:TCP:podmena

S1 2d79df44;2d79df44;c:\windows\SYSTEM32\DRIVERS\2d79df44.sys [6/14/2009 1:40 PM 100684]
S2 CiscoVpnInstallService;Cisco Systems, Inc. Installer service;c:\docume~1\KAT\DESKTOP\VPNCLI~1\VPNCLI~1\INSTAL~1.EXE --> c:\docume~1\KAT\DESKTOP\VPNCLI~1\VPNCLI~1\INSTAL~1.EXE [?]
S3 {E2B953A7-195A-44F9-9BA3-3D5F4E32BB55};AIM 3.0 Part 01 Codec Driver CH-7009-B;c:\windows\SYSTEM32\DRIVERS\wA301b.sys [1/1/1980 33847]
.
Contents of the 'Scheduled Tasks' folder

2008-07-05 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 18:57]
.
- - - - ORPHANS REMOVED - - - -

HKLM-Run-LWBMOUSE - c:\program files\Tech\Wheel Mouse\5.0\MOUSE32A.EXE
HKLM-Run-*netkey - c:\windows\netkey.exe
HKLM-Run-*kbsvr - c:\windows\Config\kbsvr.exe
HKLM-Run-CTUPGD - c:\progra~1\toolbar\ct5upd1.exe
HKLM-Run-TBPS - c:\progra~1\Toolbar\TBPS.exe
HKLM-Run-Microsoft System DLL Services Configuration - windir32.exe


.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.dell.com
mStart Page = hxxp://www.dell.com
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
FF - ProfilePath -
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-06-21 11:02
Windows 5.1.2600 Service Pack 2 FAT NTAPI

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
*netkey = c:\windows\netkey.exe??????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????
*kbsvr = c:\windows\Config\kbsvr.exe????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????
Microsoft System DLL Services Configuration = windir32.exe?

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(564)
c:\windows\System32\LgNotify.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\SYSTEM32\S24EVMON.EXE
c:\windows\SYSTEM32\ZCFGSVC.EXE
c:\windows\SYSTEM32\IGFXSRVC.EXE
c:\program files\APOINT\APNTEX.EXE
c:\program files\COMMON FILES\APPLE\MOBILE DEVICE SUPPORT\BIN\APPLEMOBILEDEVICESERVICE.EXE
c:\program files\BONJOUR\MDNSRESPONDER.EXE
c:\windows\SYSTEM32\REGSRVC.EXE
c:\windows\SYSTEM32\TCPSVCS.EXE
c:\windows\SYSTEM32\WDFMGR.EXE
c:\program files\IPOD\BIN\IPODSERVICE.EXE
c:\windows\SYSTEM32\1XCONFIG.EXE
.
**************************************************************************
.
Completion time: 2009-06-21 11:04 - machine was rebooted
ComboFix-quarantined-files.txt 2009-06-21 15:04

Pre-Run: 19,573,964,800 bytes free
Post-Run: 19,582,124,032 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Professional" /fastdetect /NoExecute=OptIn

216 --- E O F --- 2008-06-10 22:30
  • 0

#4
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
hi

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

folder::
C:\FOUND.003
C:\FOUND.002
C:\FOUND.001
C:\FOUND.000
file::
c:\windows\system32\drivers\2d79df44.sys
c:\windows\MSAGENT\smwdrah.tmp
c:\windows\MSAGENT\keywave.exe
c:\windows\MSAGENT\INTL\mcwave.exe
c:\windows\SECURITY\crcmd.exe
c:\windows\SECURITY\LOGS\srvps.exe
c:\windows\Help\raslib.exe
c:\windows\Fonts\inetap.exe
c:\windows\Driver Cache\dvdrba.bak2
c:\windows\Driver Cache\drahsm.bak2


Registry::

Driver::
2d79df44


Save this as CFScript.txt, in the same location as ComboFix.exe


Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.
  • 0

#5
helpmeplease!

helpmeplease!

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
Thank you. Here you go:


ComboFix 09-06-20.04 - Justin 06/21/2009 11:46.2 - FAT32x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.510.300 [GMT -4:00]
Running from: c:\documents and settings\Justin\Desktop\Combo-Fix.exe
Command switches used :: c:\documents and settings\Justin\Desktop\CFScript.txt

FILE ::
"c:\windows\Driver Cache\drahsm.bak2"
"c:\windows\Driver Cache\dvdrba.bak2"
"c:\windows\Fonts\inetap.exe"
"c:\windows\Help\raslib.exe"
"c:\windows\MSAGENT\INTL\mcwave.exe"
"c:\windows\MSAGENT\keywave.exe"
"c:\windows\MSAGENT\smwdrah.tmp"
"c:\windows\SECURITY\crcmd.exe"
"c:\windows\SECURITY\LOGS\srvps.exe"
"c:\windows\system32\drivers\2d79df44.sys"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\FOUND.000
C:\FOUND.001
C:\FOUND.002
C:\FOUND.003
c:\found.000\FILE0000.CHK
c:\found.000\FILE0001.CHK
c:\found.000\FILE0002.CHK
c:\found.000\FILE0003.CHK
c:\found.001\FILE0000.CHK
c:\found.002\FILE0000.CHK
c:\found.003\FILE0000.CHK
c:\found.003\FILE0001.CHK
c:\found.003\FILE0002.CHK
c:\found.003\FILE0003.CHK
c:\found.003\FILE0004.CHK
c:\found.003\FILE0005.CHK
c:\found.003\FILE0006.CHK
c:\found.003\FILE0007.CHK
c:\found.003\FILE0008.CHK
c:\found.003\FILE0009.CHK
c:\found.003\FILE0010.CHK
c:\found.003\FILE0011.CHK
c:\found.003\FILE0012.CHK
c:\found.003\FILE0013.CHK
c:\found.003\FILE0014.CHK
c:\windows\Driver Cache\drahsm.bak2
c:\windows\Driver Cache\dvdrba.bak2
c:\windows\Fonts\inetap.exe
c:\windows\Help\raslib.exe
c:\windows\MSAGENT\INTL\mcwave.exe
c:\windows\MSAGENT\keywave.exe
c:\windows\MSAGENT\smwdrah.tmp
c:\windows\SECURITY\crcmd.exe
c:\windows\SECURITY\LOGS\srvps.exe
c:\windows\system32\drivers\2d79df44.sys

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_2d79df44


((((((((((((((((((((((((( Files Created from 2009-05-21 to 2009-06-21 )))))))))))))))))))))))))))))))
.

2009-06-21 15:00 . 2004-08-04 07:56 50176 ----a-w- c:\windows\system32\proquota.exe
2009-06-21 15:00 . 2004-08-04 07:56 50176 ----a-w- c:\windows\system32\dllcache\proquota.exe
2009-06-20 04:08 . 2009-06-20 04:05 19968 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Shortcuts\icwsetup.exe
2009-06-14 21:46 . 2008-01-07 21:36 2216064 ----a-w- c:\windows\system32\drivers\w29n51.sys
2009-06-14 21:46 . 2007-02-12 19:41 2732032 ----a-w- c:\windows\system32\Netw2r32.dll
2009-06-14 21:46 . 2007-02-12 19:40 557056 ----a-w- c:\windows\system32\Netw2c32.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-05-05 04:36 . 2009-05-05 04:36 410984 ----a-w- c:\windows\system32\deploytk.dll
2009-05-05 04:36 . 2009-05-05 04:36 -------- d-----w- c:\program files\Java
2009-05-05 04:35 . 2009-05-05 04:35 152576 ----a-w- c:\documents and settings\Justin\Application Data\Sun\Java\jre1.6.0_13\lzma.dll
2008-12-21 20:47 . 2005-04-16 21:56 67688 ----a-w- c:\program files\mozilla firefox\components\jar50.dll
2008-12-21 20:47 . 2005-04-16 21:56 54368 ----a-w- c:\program files\mozilla firefox\components\jsd3250.dll
2008-12-21 20:47 . 2005-04-16 21:56 172136 ----a-w- c:\program files\mozilla firefox\components\xpinstal.dll
2008-12-21 20:47 . 2007-09-02 01:25 34944 ----a-w- c:\program files\mozilla firefox\components\myspell.dll
2008-12-21 20:47 . 2007-09-02 01:25 46712 ----a-w- c:\program files\mozilla firefox\components\spellchk.dll
2005-04-13 12:13 . 2005-04-13 12:13 383508 --sh--w- c:\windows\SYSTEM32\DLLCACHE\tcpap.exe
2005-01-24 12:07 . 2005-01-24 12:07 381952 --sh--w- c:\windows\REPAIR\libtcp.exe
2005-06-05 22:41 . 2005-06-05 22:41 91 --sh--w- c:\windows\REPAIR\lib.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Apoint"="c:\program files\Apoint\Apoint.exe" [2004-02-02 155648]
"PRONoMgr.exe"="c:\program files\Intel\PROSetWireless\NCS\PROSet\PRONoMgr.exe" [2003-12-19 86016]
"DVDSentry"="c:\windows\System32\DSentry.exe" [2002-07-17 28672]
"AdaptecDirectCD"="c:\program files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe" [2002-12-17 684032]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-09-20 94208]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-09-20 77824]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-09-20 114688]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2008-05-27 413696]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2008-06-02 267048]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-05-05 148888]
"Internet Connection Wizard Setup Tool"="c:\program files\Internet Explorer\Connection Wizard\icwsetup.exe" [2009-06-20 19968]

c:\documents and settings\All Users\Application Data\Microsoft\Shortcuts\
icwsetup.exe [2009-6-20 19968]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\Sebring]
2004-01-13 19:17 110592 ----a-w- c:\windows\SYSTEM32\LgNotify.dll

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"8085:TCP"= 8085:TCP:podmena

S2 CiscoVpnInstallService;Cisco Systems, Inc. Installer service;c:\docume~1\KAT\DESKTOP\VPNCLI~1\VPNCLI~1\INSTAL~1.EXE --> c:\docume~1\KAT\DESKTOP\VPNCLI~1\VPNCLI~1\INSTAL~1.EXE [?]
S3 {E2B953A7-195A-44F9-9BA3-3D5F4E32BB55};AIM 3.0 Part 01 Codec Driver CH-7009-B;c:\windows\SYSTEM32\DRIVERS\wA301b.sys [1/1/1980 33847]
.
Contents of the 'Scheduled Tasks' folder

2008-07-05 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 18:57]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.dell.com
mStart Page = hxxp://www.dell.com
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
FF - ProfilePath -
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-06-21 11:49
Windows 5.1.2600 Service Pack 2 FAT NTAPI

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(564)
c:\windows\System32\LgNotify.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\SYSTEM32\S24EVMON.EXE
c:\windows\SYSTEM32\ZCFGSVC.EXE
c:\windows\SYSTEM32\IGFXSRVC.EXE
c:\program files\APOINT\APNTEX.EXE
c:\program files\COMMON FILES\APPLE\MOBILE DEVICE SUPPORT\BIN\APPLEMOBILEDEVICESERVICE.EXE
c:\program files\BONJOUR\MDNSRESPONDER.EXE
c:\windows\SYSTEM32\REGSRVC.EXE
c:\windows\SYSTEM32\TCPSVCS.EXE
c:\windows\SYSTEM32\WDFMGR.EXE
c:\program files\IPOD\BIN\IPODSERVICE.EXE
c:\windows\SYSTEM32\1XCONFIG.EXE
.
**************************************************************************
.
Completion time: 2009-06-21 11:51 - machine was rebooted
ComboFix-quarantined-files.txt 2009-06-21 15:51
ComboFix2.txt 2009-06-21 15:04

Pre-Run: 19,597,361,152 bytes free
Post-Run: 19,576,389,632 bytes free

162 --- E O F --- 2008-06-10 22:30
  • 0

#6
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
hi

Please download OTM
  • Save it to your desktop.
  • Please double-click OTM to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
  • Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

    :Processes
    explorer.exe
    
    :Services
    
    :Reg
    
    :Files
    c:\windows\REPAIR\libtcp.exe
    c:\windows\REPAIR\lib.exe
    :Commands
    [purity]
    [emptytemp]
    [Reboot]
  • Return to OTM, right click in the "Paste Instructions for Items to be Moved" window (under the yellow bar) and choose Paste.
  • Click the red Moveit! button.
  • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
  • Close OTM and reboot your PC.
Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTMoveIt\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.



Now we need to reconfigure Windows XP to show hidden files:
Double-click the My Computer icon on the Windows desktop.
Select the Tools menu and click Folder Options. Select the View Tab.

Under the Hidden files and folders heading select "Show hidden files and folders".
Uncheck the "Hide protected operating system files (recommended)" option.
Uncheck the "Hide file extensions for known file types" option.
Click Yes to confirm. Click OK.



  • Make sure to use Internet Explorer for this
  • Please go to VirSCAN.org FREE on-line scan service
  • Copy and paste the following file path into the "Suspicious files to scan" box on the top of the page:

    • c:\windows\SYSTEM32\DLLCACHE\tcpap.exe
  • Click on the Upload button
  • If a pop-up appears saying the file has been scanned already, please select the ReScan button.
  • Once the Scan is completed, click on the "Copy to Clipboard" button. This will copy the link of the report into the Clipboard.
  • Paste the contents of the Clipboard in your next reply.

  • 0

#7
helpmeplease!

helpmeplease!

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
Here are the results from OTM, and I'm taking care of the virus scan thing now, will post results after.

========== PROCESSES ==========
Process explorer.exe killed successfully.
========== SERVICES/DRIVERS ==========
========== REGISTRY ==========
========== FILES ==========
c:\windows\REPAIR\libtcp.exe moved successfully.
c:\windows\REPAIR\lib.exe moved successfully.
========== COMMANDS ==========
User's Temp folder emptied.
User's Internet Explorer cache folder emptied.
File delete failed. C:\Documents and Settings\Justin\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
User's Temporary Internet Files folder emptied.
Local Service Temp folder emptied.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\INDEX.DAT scheduled to be deleted on reboot.
Local Service Temporary Internet Files folder emptied.
Network Service Temp folder emptied.
File delete failed. C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
Network Service Temporary Internet Files folder emptied.
Windows Temp folder emptied.
Java cache emptied.
File delete failed. C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\Cache\_CACHE_MAP_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\Cache\_CACHE_001_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\Cache\_CACHE_002_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\Cache\_CACHE_003_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\XUL.mfl scheduled to be deleted on reboot.
FireFox cache emptied.
Temp folders emptied.

OTM by OldTimer - Version 2.1.0.1 log created on 06212009_121057

Files moved on Reboot...
C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\Cache\_CACHE_MAP_ moved successfully.
C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\Cache\_CACHE_001_ moved successfully.
C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\Cache\_CACHE_002_ moved successfully.
C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\Cache\_CACHE_003_ moved successfully.
C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\XUL.mfl moved successfully.

Registry entries deleted on Reboot...
  • 0

#8
helpmeplease!

helpmeplease!

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
Alright. I changed all of the preferences you asked for under "My Computer" concerning hidden files, etc., I ran the virus scan using Internet Explorer, and here are the results:


VirSCAN.org Scanned Report :
Scanned time : 2009/06/21 12:17:14 (EDT)
Scanner results: 79% Scanner(30/38) found malware!
File Name : tcpap.exe
File Size : 383508 byte
File Type : PE32 executable for MS Windows (GUI) Intel 80386 32-bit
MD5 : 10cb0e82d4dff0fd4a672bc8e30e1414
SHA1 : c92ef6cd9ace07aaef3cfb1d6f6b8c3a53af33e3
Online report : http://virscan.org/r...a8292a24bb.html

Scanner Engine Ver Sig Ver Sig Date Time Scan result
a-squared 4.5.0.1 20090621192326 2009-06-21 2.90 Riskware.AdWare.Win32.Virtumonde!IK
AhnLab V3 2009.06.21.00 2009.06.21 2009-06-21 0.88 Win-Trojan/Virtumod.383508
AntiVir 8.2.0.193 7.1.4.120 2009-06-21 0.41 ADSPY/Virtumonde.M
Antiy 2.0.18 20090621.2563876 2009-06-21 0.12 AdWare/Virtumonde.m[:not_virus]
Arcavir 2009 200906210742 2009-06-21 0.05 Adware.Virtumonde.M
Authentium 5.1.1 200906201725 2009-06-20 1.15 W32/Virtumonde.CY (Exact)
AVAST! 4.7.4 090620-0 2009-06-20 0.02 Win32:Trojan-gen {Other}
AVG 8.5.286 270.12.83/2191 2009-06-21 4.70 Generic.IBB
BitDefender 7.81008.3439807 7.26107 2009-06-21 3.16 Adware.Virtumonde.GER
CA (VET) 9.0.0.143 31.6.6569 2009-06-20 5.91 Win32/Chisyne.AX trojan.
ClamAV 0.95.1 9490 2009-06-20 0.01 Adware.Virtumonde-8
Comodo 3.9 1385 2009-06-21 0.74 -
CP Secure 1.1.0.715 2009.06.21 2009-06-21 10.53 Malware.W32.Virtumonde.M
Dr.Web 4.44.0.9170 2009.06.21 2009-06-21 4.78 Trojan.Virtumod
F-Prot 4.4.4.56 20090620 2009-06-20 1.12 W32/Virtumonde.CY (exact)
F-Secure 5.51.6100 2009.06.19.02 2009-06-19 0.07 -
Fortinet 2.81-3.117 10.518 2009-06-21 0.29 -
GData 19.5966/19.371 20090621 2009-06-21 4.34 Win32:Trojan-gen {Other} [Engine:B]
ViRobot 20090619 2009.06.19 2009-06-19 0.52 -
Ikarus T3.1.01.59 2009.06.21.72900 2009-06-21 3.27 not-a-virus:AdWare.Win32.Virtumonde
JiangMin 11.0.706 2009.06.21 2009-06-21 2.47 -
Kaspersky 5.5.10 2009.06.21 2009-06-21 0.05 not-a-virus:AdWare.Win32.Virtumonde.m
KingSoft 2009.2.5.15 2009.6.21.21 2009-06-21 0.57 -
McAfee 5.3.00 5652 2009-06-20 3.05 Vundo
Microsoft 1.4803 2009.06.21 2009-06-21 4.83 Adware:Win32/Virtumonde.C
mks_vir 2.01 2009.06.19 2009-06-19 3.27 Win32.4
Norman 6.01.09 6.01.00 2009-06-19 4.01 W32/Virtumonde.M
Panda 9.05.01 2009.06.21 2009-06-21 1.88 Adware/CWS
Trend Micro 8.700-1004 6.210.12 2009-06-21 0.16 -
Quick Heal 10.00 2009.06.19 2009-06-19 1.46 AdWare.Virtumonde.m (Not a Virus)
Rising 20.0 21.34.63.00 2009-06-21 0.89 Trojan.Virtumod.aj
Sophos 2.87.1 4.42 2009-06-21 2.60 -
Sunbelt 5200 5200 2009-06-20 1.08 VIPRE.Suspicious
Symantec 1.3.0.24 20090620.025 2009-06-20 0.07 Trojan.Vundo
nProtect 20090621.01 4379863 2009-06-21 5.83 Trojan-Clicker/W32.Virtumonde.383508
The Hacker 6.3.4.3 v00350 2009-06-20 0.64 Adware/Virtumonde.m (Unwanted)
VBA32 3.12.10.7 20090620.1443 2009-06-20 3.10 AdWare.Virtumonde.m
VirusBuster 4.5.11.10 10.107.19/1648057 2009-06-21 2.15 Adware.Virtumonde.H
  • 0

#9
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
hi

Please download OTM
  • Save it to your desktop.
  • Please double-click OTM to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
  • Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

    :Processes
    explorer.exe
    
    :Services
    
    :Reg
    
    :Files
    c:\windows\SYSTEM32\DLLCACHE\tcpap.exe
    :Commands
    [purity]
    [emptytemp]
    [Reboot]
  • Return to OTM, right click in the "Paste Instructions for Items to be Moved" window (under the yellow bar) and choose Paste.
  • Click the red Moveit! button.
  • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
  • Close OTM and reboot your PC.
Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTMoveIt\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.



Download TFC to your desktop
  • Open the file and close any other windows.
  • It will close all programs itself when run, make sure to let it run uninterrupted.
  • Click the Start button to begin the process. The program should not take long to finish its job
  • Once its finished it should reboot your machine, if not, do this yourself to ensure a complete clean




Please download Malwarebytes' Anti-Malware from Here

Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.
Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.






Go to Kaspersky website and perform an online antivirus scan.

  • Read through the requirements and privacy statement and click on Accept button.
  • It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
  • When the downloads have finished, click on Settings.
  • Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:
    • Spyware, Adware, Dialers, and other potentially dangerous programs
      Archives
      Mail databases
  • Click on My Computer under Scan.
  • Once the scan is complete, it will display the results. Click on View Scan Report.
  • You will see a list of infected items there. Click on Save Report As....
  • Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button. Then post it here.

  • 0

#10
helpmeplease!

helpmeplease!

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
Here's the next OTM scan. I will do the other steps next and reply with info.


========== PROCESSES ==========
Process explorer.exe killed successfully.
========== SERVICES/DRIVERS ==========
========== REGISTRY ==========
========== FILES ==========
c:\windows\SYSTEM32\DLLCACHE\tcpap.exe moved successfully.
========== COMMANDS ==========
User's Temp folder emptied.
User's Internet Explorer cache folder emptied.
File delete failed. C:\Documents and Settings\Justin\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
User's Temporary Internet Files folder emptied.
Local Service Temp folder emptied.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
Local Service Temporary Internet Files folder emptied.
Network Service Temp folder emptied.
File delete failed. C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
Network Service Temporary Internet Files folder emptied.
Windows Temp folder emptied.
Java cache emptied.
File delete failed. C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\Cache\_CACHE_MAP_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\Cache\_CACHE_001_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\Cache\_CACHE_002_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\Cache\_CACHE_003_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\XUL.mfl scheduled to be deleted on reboot.
FireFox cache emptied.
Temp folders emptied.

OTM by OldTimer - Version 2.1.0.1 log created on 06212009_123506

Files moved on Reboot...
C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\Cache\_CACHE_MAP_ moved successfully.
C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\Cache\_CACHE_001_ moved successfully.
C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\Cache\_CACHE_002_ moved successfully.
C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\Cache\_CACHE_003_ moved successfully.
C:\Documents and Settings\Justin\Local Settings\Application Data\Mozilla\Firefox\Profiles\5q84ylmz.default\XUL.mfl moved successfully.

Registry entries deleted on Reboot...
  • 0

Advertisements


#11
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
ok cool
  • 0

#12
helpmeplease!

helpmeplease!

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
Here's the Malwarebytes log. I'll do the Kaspersky one now.


Malwarebytes' Anti-Malware 1.38
Database version: 2318
Windows 5.1.2600 Service Pack 2

6/21/2009 12:47:48 PM
mbam-log-2009-06-21 (12-47-48).txt

Scan type: Quick Scan
Objects scanned: 89854
Time elapsed: 3 minute(s), 25 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 11
Registry Values Infected: 2
Registry Data Items Infected: 2
Folders Infected: 1
Files Infected: 5

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\minibugtransporter.minibugtransporterx (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\minibugtransporter.minibugtransporterx.1 (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mywebsearch.htmlpanel (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mywebsearch.htmlpanel.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{04a38f6b-006f-4247-ba4c-02a139d5531c} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{2e9937fc-cf2f-4f56-af54-5a6a3dd375cc} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{741de825-a6f0-4497-9aa6-8023cf9b0fff} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a4730ebe-43a6-443e-9776-36915d323ad3} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{3c2d2a1e-031f-4397-9614-87c932a848e0} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\internet connection wizard setup tool (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\8085:tcp (Malware.Trace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
C:\Program Files\Common Files\WinTools (Trojan.WinTools) -> Quarantined and deleted successfully.

Files Infected:
C:\Program Files\Internet Explorer\Connection Wizard\icwsetup.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\all users\application data\microsoft\Shortcuts.000 (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\program files\common files\WinTools\iwuivj.wzg (Trojan.WinTools) -> Quarantined and deleted successfully.
c:\program files\common files\WinTools\WToolsT.dll (Trojan.WinTools) -> Quarantined and deleted successfully.
c:\documents and settings\All Users\Application Data\Microsoft\Shortcuts\icwsetup.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
  • 0

#13
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
ok cool
  • 0

#14
helpmeplease!

helpmeplease!

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
Hi, sorry this took so long. I had to run the Kaspersky scan twice, because the first time I mistakenly clicked off the window before I could copy the scan results. Anyway, here they are, for the second scan:


--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7.0 REPORT
Sunday, June 21, 2009
Operating System: Microsoft Windows XP Professional Service Pack 2 (build 2600)
Kaspersky Online Scanner version: 7.0.26.13
Program database last update: Sunday, June 21, 2009 22:19:00
Records in database: 2375193
--------------------------------------------------------------------------------

Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes

Scan area - My Computer:
C:\
D:\

Scan statistics:
Files scanned: 61519
Threat name: 15
Infected objects: 54
Suspicious objects: 0
Duration of the scan: 01:47:15


File name / Threat name / Threats count
C:\_OTM\MovedFiles\06212009_121057\windows\REPAIR\libtcp.exe Infected: not-a-virus:AdWare.Win32.Virtumonde.f 1
C:\_OTM\MovedFiles\06212009_123506\windows\SYSTEM32\DLLCACHE\tcpap.exe Infected: not-a-virus:AdWare.Win32.Virtumonde.m 1
C:\WINDOWS\SYSTEM32\svcmn.dll Infected: Trojan-Clicker.Win32.Small.fu 1
C:\WINDOWS\SYSTEM\psole.exe Infected: Trojan-Spy.Win32.Agent.l 1
C:\WINDOWS\SYSTEM\nutas.exe Infected: Trojan-Downloader.Win32.Virtumonde.g 1
C:\WINDOWS\SYSTEM\catbak.exe Infected: Trojan-Downloader.Win32.Virtumonde.g 1
C:\WINDOWS\REPAIR\svcmc.exe Infected: Trojan-Downloader.Win32.Virtumonde.g 1
C:\WINDOWS\MSAGENT\INTL\apbak.exe Infected: Trojan-Downloader.Win32.Virtumonde.g 1
C:\WINDOWS\MSAGENT\INTL\winmain.exe Infected: Trojan-Downloader.Win32.Virtumonde.g 1
C:\WINDOWS\ADDINS\clog.exe Infected: Trojan-Downloader.Win32.Virtumonde.g 1
C:\WINDOWS\AppPatch\keyabr.exe Infected: Trojan-Downloader.Win32.Virtumonde.g 1
C:\WINDOWS\$NtServicePackUninstall$\keyabr.exe Infected: Trojan-Downloader.Win32.Virtumonde.g 1
C:\Qoobox\Quarantine\C\giyghshu.exe.vir Infected: Trojan.Win32.Agent2.hoc 1
C:\Qoobox\Quarantine\C\Program Files\podmena\podmena.dll.vir Infected: Trojan.Win32.Agent.clsj 1
C:\Qoobox\Quarantine\C\Program Files\podmena\podmena.sys.vir Infected: Trojan.Win32.Agent.clsj 1
C:\Qoobox\Quarantine\C\WINDOWS\SYSTEM32\SYSDLL.exe.vir Infected: Trojan.Win32.Agent2.jyw 1
C:\Qoobox\Quarantine\C\WINDOWS\SYSTEM32\796525\796525.dll.vir Infected: Trojan-Downloader.Win32.BHO.lfm 1
C:\Qoobox\Quarantine\C\WINDOWS\ld08.exe.vir Infected: Net-Worm.Win32.Koobface.abs 1
C:\Qoobox\Quarantine\C\WINDOWS\ld09.exe.vir Infected: Trojan.Win32.Small.bzi 1
C:\Qoobox\Quarantine\C\WINDOWS\Fonts\inetap.exe.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.j 1
C:\Qoobox\Quarantine\C\WINDOWS\MSAGENT\INTL\mcwave.exe.vir Infected: Trojan-Spy.Win32.Agent.l 1
C:\Qoobox\Quarantine\C\WINDOWS\MSAGENT\keywave.exe.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.j 1
C:\Qoobox\Quarantine\C\WINDOWS\SECURITY\LOGS\srvps.exe.vir Infected: Trojan-Spy.Win32.Agent.l 1
C:\Qoobox\Quarantine\C\Documents and Settings\Justin\Start Menu\Programs\Startup\fmnupd32.exe.vir Infected: Trojan.Win32.Inject.aduu 1
C:\Qoobox\Quarantine\C\FOUND.003\FILE0013.CHK.vir Infected: Backdoor.Win32.NewRest.z 1
C:\Qoobox\Quarantine\[4]-Submit_2009-06-21_11.46.04.zip Infected: not-a-virus:AdWare.Win32.Virtumonde.j 2
C:\Qoobox\Quarantine\[4]-Submit_2009-06-21_11.46.04.zip Infected: Trojan-Spy.Win32.Agent.l 2
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1189\A0112247.sys Infected: Trojan.Win32.Agent.clsj 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1189\A0112248.dll Infected: Trojan.Win32.Agent.clsj 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1190\A0112284.exe Infected: Trojan-Downloader.Win32.Small.juy 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1190\A0112313.EXE Infected: Trojan-Downloader.Win32.Small.juy 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112314.EXE Infected: Trojan-Downloader.Win32.Small.juy 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112331.exe Infected: Trojan.Win32.Agent2.hoc 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112332.DLL Infected: Trojan.Win32.Agent.clsj 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112333.sys Infected: Trojan.Win32.Agent.clsj 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112336.exe Infected: Trojan.Win32.Agent2.jyw 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112339.EXE Infected: Trojan.Win32.Inject.aduu 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112341.exe Infected: Net-Worm.Win32.Koobface.abs 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112342.exe Infected: Trojan.Win32.Small.bzi 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112351.dll Infected: Trojan-Downloader.Win32.BHO.lfm 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112368.EXE Infected: Trojan-Downloader.Win32.Small.juy 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112443.exe Infected: not-a-virus:AdWare.Win32.Virtumonde.j 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112445.exe Infected: Trojan-Spy.Win32.Agent.l 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112446.exe Infected: not-a-virus:AdWare.Win32.Virtumonde.j 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112448.exe Infected: Trojan-Spy.Win32.Agent.l 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112468.exe Infected: Trojan-Downloader.Win32.Small.juy 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112469.EXE Infected: Trojan-Downloader.Win32.Small.juy 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112542.EXE Infected: Trojan-Downloader.Win32.Small.juy 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112549.exe Infected: Trojan-Downloader.Win32.Small.juy 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112550.EXE Infected: Trojan-Downloader.Win32.Small.juy 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112557.exe Infected: Trojan-Downloader.Win32.Small.juy 1
C:\System Volume Information\_restore{CCA15F78-7193-4CA6-8115-2B570DD6546C}\RP1191\A0112558.EXE Infected: Trojan-Downloader.Win32.Small.juy 1

The selected area was scanned.
  • 0

#15
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
hi

Open notepad and copy/paste the text in the quotebox below into it:

http://www.geekstogo...ct-t243082.html

Collect::
C:\WINDOWS\SYSTEM32\svcmn.dll
C:\WINDOWS\SYSTEM\psole.exe
C:\WINDOWS\SYSTEM\nutas.exe
C:\WINDOWS\SYSTEM\catbak.exe
C:\WINDOWS\REPAIR\svcmc.exe
C:\WINDOWS\MSAGENT\INTL\apbak.exe
C:\WINDOWS\MSAGENT\INTL\winmain.exe
C:\WINDOWS\ADDINS\clog.exe
C:\WINDOWS\AppPatch\keyabr.exe
C:\WINDOWS\$NtServicePackUninstall$\keyabr.exe

Suspect::


Save this as CFScript.txt


Posted Image

Refering to the picture above, drag CFScript.txt into ComboFix.exe

When finished, it shall produce a log for you. Post that log in your next reply.

**Note**

When CF finishes running, the ComboFix log will open along with a message box--do not be alarmed. With the above script, ComboFix will capture files to submit for analysis.
  • Ensure you are connected to the internet and click OK on the message box.

  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP