Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Hijackthis - Aurora [CLOSED]


  • This topic is locked This topic is locked

#1
jford1906

jford1906

    New Member

  • Member
  • Pip
  • 6 posts
Ewido log

---------------------------------------------------------
ewido security suite - Scan report
---------------------------------------------------------

+ Created on:  9:40:21 PM, 5/29/2005
+ Report-Checksum:  47A5D9AB

+ Date of database:  5/29/2005
+ Version of scan engine: v3.0

+ Duration:    18 min
+ Scanned Files:  53557
+ Speed:    48.24 Files/Second
+ Infected files:  32
+ Removed files:  32
+ Files put in quarantine:  32
+ Files that could not be opened: 0
+ Files that could not be cleaned: 0

+ Binder:  Yes
+ Crypter:  Yes
+ Archives:  Yes

+ Scanned items:
C:\
F:\

+ Scan result:
C:\WINDOWS\wupdsnff.exe -> Spyware.BetterInternet.f -> Cleaned with backup
C:\WINDOWS\systb.dll -> Spyware.ImiBar.d -> Cleaned with backup
C:\WINDOWS\Nail.exe -> Trojan.Nail -> Cleaned with backup
C:\WINDOWS\ipelaylzu.exe -> Spyware.BetterInternet -> Cleaned with backup
C:\WINDOWS\TMP_FILE_2.tmp -> Spyware.BetterInternet.f -> Cleaned with backup
C:\Documents and Settings\Jeff\Local Settings\Temp\ZCZ\aurareco.exe -> Spyware.BetterInternet -> Cleaned with backup
C:\Documents and Settings\Jeff\Local Settings\Temp\SQP\aurareco.exe -> Spyware.BetterInternet -> Cleaned with backup
C:\Documents and Settings\Jeff\Local Settings\Temp\wupdt.exe -> TrojanDownloader.Intexp.c -> Cleaned with backup
C:\Documents and Settings\Jeff\Cookies\jeff@adknowledge[1].txt -> Spyware.Tracking-Cookie -> Cleaned with backup
C:\Documents and Settings\Jeff\Cookies\jeff@burstnet[1].txt -> Spyware.Tracking-Cookie -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP189\A0018136.exe -> TrojanDownloader.Intexp.c -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP189\A0018137.exe -> Trojan.Imiserv.c -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP189\A0018138.dll -> Spyware.ImiBar.d -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP189\A0018139.exe -> Spyware.BetterInternet -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP189\A0018140.exe -> Trojan.Stervis.c -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP189\A0018141.exe -> Trojan.Nail -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP189\A0018142.exe -> Backdoor.Agent.bg -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP189\A0018143.exe -> TrojanDownloader.Small.aak -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP189\A0018151.dll -> Trojan.Agent.db -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP189\A0018179.exe -> Trojan.Agent.cp -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP190\A0018184.exe -> Trojan.Nail -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP190\A0018186.EXE -> Spyware.BetterInternet.f -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP191\snapshot\MFEX-1.DAT -> Spyware.BetterInternet.f -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP191\A0018206.exe -> Trojan.Agent.cp -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP191\A0018208.exe -> Trojan.Agent.cp -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP191\A0018215.exe -> Trojan.Agent.cp -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP191\A0018219.EXE -> Trojan.Stervis.c -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP191\A0018222.dll -> Trojan.Agent.db -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP191\A0018227.exe -> Trojan.Agent.cp -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP191\A0018238.exe -> Trojan.Agent.cp -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP192\A0018244.exe -> Spyware.BetterInternet -> Cleaned with backup
C:\System Volume Information\_restore{8197854D-74F7-4E78-A8C0-99513ED0F5B9}\RP192\A0018247.exe -> Trojan.Imiserv.c -> Cleaned with backup


::Report End


HiJackThis Log

Logfile of HijackThis v1.99.1
Scan saved at 9:40:34 PM, on 5/29/2005
Platform: Windows XP  (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2600.0000)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.exe
C:\WINDOWS\System32\RunDll32.exe
C:\Program Files\Browser MOUSE\mouse32a.exe
C:\Program Files\D-Tools\daemon.exe
C:\PROGRA~1\BILLPS~1\WINPAT~1\winpatrol.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\backWeb-7288971.exe
C:\Program Files\Microsoft Broadband Networking\MSBNTray.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\Program Files\ewido\security suite\ewidoguard.exe
C:\WINDOWS\system32\drivers\KodakCCS.exe
C:\WINDOWS\System32\ScsiAccess.EXE
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Documents and Settings\All Users\Desktop\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://websearch.drs...esearch.cgi?id=
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://websearch.drs...esearch.cgi?id=
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://websearch.drs...esearch.cgi?id=
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://websearch.drs...esearch.cgi?id=
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = http://websearch.drs...esearch.cgi?id=
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = websearch.drsnsrch.com/q.cgi?q=
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = :0
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
R3 - Default URLSearchHook is missing
F2 - REG:system.ini: Shell=Explorer.exe C:\WINDOWS\Nail.exe
O2 - BHO: MyWay Search Assistant BHO - {04079851-5845-4dea-848C-3ECD647AA554} - C:\Program Files\MyWay\SrchAstt\1.bin\MYSRCHAS.DLL (file missing)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\PROGRAM FILES\ADOBE\ACROBAT 5.0\READER\ACTIVEX\ACROIEHELPER.OCX
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: (no name) - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - (no file)
O2 - BHO: SDWin32 Class - {A4DF71B8-AE57-4C9A-A16F-2784C7973E6A} - C:\WINDOWS\System32\npmzx.dll (file missing)
O2 - BHO: (no name) - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - (no file)
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: (no name) - {2CDE1A7D-A478-4291-BF31-E1B4C16F92EB} - (no file)
O4 - HKLM\..\Run: [Cmaudio] RunDll32 cmicnfg.cpl,CMICtrlWnd
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [FLMOFFICE4DMOUSE] C:\Program Files\Browser MOUSE\mouse32a.exe
O4 - HKLM\..\Run: [Rxagik] C:\WINDOWS\Meruoq.exe
O4 - HKLM\..\Run: [bwgopas] C:\WINDOWS\Fqjfcz.exe
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [t98T36X] cisocx.exe
O4 - HKLM\..\Run: [DAEMON Tools-1033] "C:\Program Files\D-Tools\daemon.exe"  -lang 1033
O4 - HKLM\..\Run: [QuickTime Task] "C:\WINDOWS\SYSTEM32\qttask.exe" -atboottime
O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [npmzxc] C:\WINDOWS\System32\npmzxc.exe
O4 - HKLM\..\Run: [WinPatrol] C:\PROGRA~1\BILLPS~1\WINPAT~1\winpatrol.exe
O4 - HKLM\..\RunServices: [CMD] cmd32.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\System32\NVMCTRAY.DLL,NvTaskbarInit
O4 - HKCU\..\Run: [cyr3RWb7R] rpcsynth.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - Global Startup: Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
O4 - Global Startup: KODAK Software Updater.lnk = C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\backWeb-7288971.exe
O4 - Global Startup: Microsoft Broadband Networking.lnk = ?
O8 - Extra context menu item: E&xport to Microsoft Office Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O12 - Plugin for .pdf: C:\PROGRA~1\INTERN~1\PLUGINS\nppdf32.dll
O12 - Plugin for .spop: C:\PROGRA~1\INTERN~1\Plugins\NPDocBox.dll
O15 - Trusted Zone: *.adorons.com
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....467&clcid=0x409
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akama...meInstaller.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupd...b?1098151758515
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido\security suite\ewidoguard.exe
O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: ScsiAccess - Unknown owner - C:\WINDOWS\System32\ScsiAccess.EXE
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\PROGRA~1\COMMON~1\SONYSH~1\AVLib\Sptisrv.exe
O23 - Service: System Startup Service  (SvcProc) - Unknown owner - C:\WINDOWS\svcproc.exe (file missing)


  • 0

Advertisements


#2
greyknight17

greyknight17

    Malware Expert

  • Visiting Consultant
  • 16,560 posts
Just wondering, did you run Ewido in Safe Mode or Normal Mode?

Please print out the instructions here (or save it in Notepad) so that you can follow along more easily.

Download Ewido Security Suite at http://www.ewido.net/en/download/ and install it. Update to the newest definitions. Do NOT run it yet.

Please download nailfix at http://www.noidea.us...050515010747824 Unzip it to the desktop but do NOT run it yet.

Reboot into Safe Mode by hitting the F8 key repeatedly until a menu shows up (and choose Safe Mode from the list). In some systems, this may be the F5 key, so try that if F8 doesn't work.

Once in Safe Mode, please double-click on nailfix.cmd. Your desktop and icons will disappear and reappear, and a window should open and close very quickly --- this is normal.

Next run a full scan in Ewido. Post the log from the Ewido scan here.

Run a scan in HijackThis. Check each of the following and hit 'Fix checked' (after checking them) if they still exist (make sure not to miss any):

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://websearch.drs...esearch.cgi?id=
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://websearch.drs...esearch.cgi?id=
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://websearch.drs...esearch.cgi?id=
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://websearch.drs...esearch.cgi?id=
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = http://websearch.drs...esearch.cgi?id=
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = websearch.drsnsrch.com/q.cgi?q=
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = :0
R3 - Default URLSearchHook is missing
F2 - REG:system.ini: Shell=Explorer.exe C:\WINDOWS\Nail.exe
O2 - BHO: MyWay Search Assistant BHO - {04079851-5845-4dea-848C-3ECD647AA554} - C:\Program Files\MyWay\SrchAstt\1.bin\MYSRCHAS.DLL (file missing)
O2 - BHO: (no name) - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - (no file)
O2 - BHO: SDWin32 Class - {A4DF71B8-AE57-4C9A-A16F-2784C7973E6A} - C:\WINDOWS\System32\npmzx.dll (file missing)
O2 - BHO: (no name) - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - (no file)
O3 - Toolbar: (no name) - {2CDE1A7D-A478-4291-BF31-E1B4C16F92EB} - (no file)
O4 - HKLM\..\Run: [Rxagik] C:\WINDOWS\Meruoq.exe
O4 - HKLM\..\Run: [bwgopas] C:\WINDOWS\Fqjfcz.exe
O4 - HKLM\..\Run: [t98T36X] cisocx.exe
O4 - HKLM\..\Run: [npmzxc] C:\WINDOWS\System32\npmzxc.exe
O4 - HKLM\..\RunServices: [CMD] cmd32.exe
O4 - HKCU\..\Run: [cyr3RWb7R] rpcsynth.exe
O15 - Trusted Zone: *.adorons.com
O23 - Service: System Startup Service (SvcProc) - Unknown owner - C:\WINDOWS\svcproc.exe (file missing)


Close all open windows except for HijackThis and click Fix Checked.

Uninstall these from Add/Remove panel if listed:

MyWay

Delete these if found:

C:\WINDOWS\Nail.exe
C:\Program Files\MyWay\
C:\WINDOWS\System32\npmzx.dll
C:\WINDOWS\Meruoq.exe
C:\WINDOWS\Fqjfcz.exe
cisocx.exe
C:\WINDOWS\System32\npmzxc.exe
cmd32.exe
rpcsynth.exe


Restart your computer in normal mode and post a new HijackThis log, as well as the log from the Ewido scan.

Download FindIt's.zip to your desktop: http://forums.net-in...=post&id=142443

1. Unzip/extract the files inside to a folder on your desktop.
2. Open the folder. Double click on FindIt's.bat and wait for Notepad to open a text file. It will take a while so please be patient ...
3. Then post the results here.
  • 0

#3
greyknight17

greyknight17

    Malware Expert

  • Visiting Consultant
  • 16,560 posts
Due to lack of feedback, this topic has been closed.

If you need this topic reopened, please contact a staff member with address of this thread. This applies only to the original topic starter. Everyone else please begin a New Topic.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP