Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

Collected 5.L virus [CLOSED]


  • This topic is locked This topic is locked

#16
Michelle

Michelle

    Malware Removal Goddess

  • Retired Staff
  • 8,928 posts
Run HiJackThis. Place a check next to the following items and click FIX CHECKED:

F2 - REG:system.ini: Shell=Explorer.exe mssvcnes.exe
F2 - REG:system.ini: UserInit=userinit.exe,xpjava.exe

O2 - BHO: Need2Find Bar BHO - {4D1C4E81-A32A-416b-BCDB-33B3EF3617D3} - C:\Program Files\Need2Find\bar\1.bin\ND2FNBAR.DLL (file missing)

O8 - Extra context menu item: &Search - http://ka.bar.need2f...earch.html?p=KA


Close HiJackThis.

Delete the following folder, in bold:

C:\WINDOWS\System32\adcache

* Run Killbox.exe.

* Select "Delete on Reboot".

* Copy the file names below to the clipboard by highlighting ALL of them then press CTRL + C

C:\WINDOWS\smdat32m.sys
C:\WINDOWS\system32\P2P Networking v126.cpl
C:\Documents and Settings\Ben\Local Settings\Temp\ryniizro.exe
C:\Documents and Settings\Ben\Local Settings\Temporary Internet Files\Content.IE5\YSLTZV3R\dropper[1].chm
C:\Documents and Settings\Ben\Local Settings\Temporary Internet Files\Content.IE5\YSLTZV3R\dropper[1].chm[dropper.exe]
C:\Documents and Settings\Ben\Local Settings\Temporary Internet Files\Content.IE5\YSLTZV3R\dropper[1].chm[xxx.html]
C:\Program Files\Need2Find\bar\1.bin\N2PLUGIN.DLL


* Return to Killbox, go to the File menu, and choose "Paste from Clipboard".

* Click the red-and-white "Delete File" button. Click "Yes" at the Delete on Reboot prompt. If your computer does not restart automatically, please restart it manually.

After your computer reboots, post a new HiJackThis log.
  • 0

Advertisements


#17
Nastrado

Nastrado

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
here ya go

thanks

Logfile of HijackThis v1.99.1
Scan saved at 4:33:26 PM, on 14/07/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\System32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\WINDOWS\System32\CTsvcCDA.EXE
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\Program Files\ewido\security suite\ewidoguard.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
C:\WINDOWS\System32\svsidat32.exe
C:\WINDOWS\System32\msupdater.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program Files\Creative\PlayCenter2\CTNMRun.exe
C:\Program Files\Eraser\eraser.exe
C:\Hijackthis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.ultrawave.com.au
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by Ultrawave Internet
O1 - Hosts: 64.91.255.87 www.dcsresearch.com
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\System32\\NeroCheck.exe
O4 - HKLM\..\Run: [LiveMonitor] C:\Program Files\MSI\Live Update 2\LMonitor.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [AVG7_EMC] C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
O4 - HKLM\..\Run: [svsidat32] svsidat32.exe
O4 - HKLM\..\Run: [Microsoft Windows Updater] msupdater.exe
O4 - HKLM\..\RunServices: [svsidat32] svsidat32.exe
O4 - HKLM\..\RunServices: [Microsoft Windows Updater] msupdater.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [NOMAD Detector] "C:\Program Files\Creative\PlayCenter2\CTNMRun.exe"
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\MSMSGS.EXE" /background
O4 - HKCU\..\Run: [ATI Launchpad] "C:\Program Files\ATI Multimedia\main\launchpd.exe"
O4 - HKCU\..\Run: [Eraser] C:\Program Files\Eraser\eraser.exe -hide
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [svsidat32] svsidat32.exe
O4 - HKCU\..\RunServices: [svsidat32] svsidat32.exe
O4 - Startup: PowerReg Scheduler V3.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O14 - IERESET.INF: START_PAGE_URL=http://www.ultrawave.com.au
O16 - DPF: {04E214E5-63AF-4236-83C6-A7ADCBF9BD02} (HouseCall Control) - http://housecall60.t...all/xscan60.cab
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.syma...bin/AvSniff.cab
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akama...meInstaller.exe
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.syma...n/bin/cabsa.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: {8E28B3A9-FE83-45D1-B657-D5426B81A121} (CustomerCtrl Class) - http://cs1b.instants...erxsigned35.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoft.../as5/asinst.cab
O16 - DPF: {AB29A544-D6B4-4E36-A1F8-D3E34FC7B00A} (WTHoster Class) - http://install.wildt...stx/install.cab
O16 - DPF: {AE1C01E3-0283-11D3-9B3F-00C04F8EF466} (HeartbeatCtl Class) - http://fdl.msn.com/z...s/heartbeat.cab
O16 - DPF: {E13F1132-4CA0-4005-84D3-51406E27D269} (BTDownloadCtrl Control) - http://www.bravetree...ownloadCtrl.cab
O16 - DPF: {EF791A6B-FC12-4C68-99EF-FB9E207A39E6} (McFreeScan Class) - http://download.mcaf...306/mcfscan.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{0A40D8FB-850F-40FB-B6BD-FB66D4B3FC6C}: NameServer = 202.52.32.2 202.52.32.6
O17 - HKLM\System\CCS\Services\Tcpip\..\{17F9E1BA-2263-492F-BC5C-E7B0D30F256F}: NameServer = 203.194.27.57
O17 - HKLM\System\CS1\Services\Tcpip\..\{0A40D8FB-850F-40FB-B6BD-FB66D4B3FC6C}: NameServer = 202.52.32.2 202.52.32.6
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\System32\CTsvcCDA.EXE
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido\security suite\ewidoguard.exe
  • 0

#18
Michelle

Michelle

    Malware Removal Goddess

  • Retired Staff
  • 8,928 posts
It appears you have picked up some new files. So, I would like to see if anything else it hiding out.

Please download RKFiles from here:
http://skads.org/special/rkfiles.zip
Unzip it to the desktop but please do NOT run it yet.

Next, please reboot your computer in Safe Mode. You can do this by restarting your computer and continually tapping F8 until a menu appears. Use your up arrow key to highlight Safe Mode then hit enter.

Once in Safe Mode, please run RKFiles.bat. It may take a while. When it is finished a windows should appear with a log.

Restart your computer in normal mode.

Then please download DLLCompare from here:
http://downloads.sub.../DllCompare.exe
Save it to the desktop and run it. Click "Run Locate.com" to scan for DLL files. When the scan is finished, click "Compare". Finally, when that is complete, click "Make a Log of What Was Found". Please post the entire contents of the logfile here for me.

So, in your next post I need to post the log From RKfiles, which should be at c:\log.txt and the log from DLLCompare that you just copied.
  • 0

#19
Nastrado

Nastrado

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
here you go

thaqnks


C:\Documents and Settings\Ben\Desktop

PLEASE NOTE THAT ALL FILES FOUND BY THIS METHOD ARE NOT BAD FILES, THERE MIGHT BE LEGIT FILES LISTED AND PLEASE BE CAREFUL WHILE FIXING. IF YOU ARE UNSURE OF WHAT IT IS LEAVE THEM ALONE.
Files Found in system Folder............
------------------------
C:\WINDOWS\system32\TFTP268: UPX!
C:\WINDOWS\system32\dfrg.msc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQAAAAAwGpEc213

Files Found in all users startup Folder............
------------------------
Files Found in all users windows Folder............
------------------------
C:\WINDOWS\tsc.exe: UPX!
C:\WINDOWS\RMAgentOutput.dll: UPX!
Finished
bye


* DLLCompare Log version(1.0.0.127)
Files Found that Windows does not See or cannot Access
*Not everything listed here means you are infected!
________________________________________________

O^E says: "There were no files found :tazz:"
________________________________________________

1,256 items found: 1,256 files, 0 directories.
Total of file sizes: 249,365,313 bytes 237.81 M

Administrator Account = True

--------------------End log---------------------
  • 0

#20
Michelle

Michelle

    Malware Removal Goddess

  • Retired Staff
  • 8,928 posts
* Run Killbox.exe.

* Select "Delete on Reboot".

* Copy the file names below to the clipboard by highlighting ALL of them then press CTRL + C

C:\WINDOWS\System32\svsidat32.exe
C:\WINDOWS\System32\msupdater.exe


* Return to Killbox, go to the File menu, and choose "Paste from Clipboard".

* Click the red-and-white "Delete File" button. Click "Yes" at the Delete on Reboot prompt.

After your computer reboots, using Windows Explorer delete this file, in bold:

C:\WINDOWS\system32\TFTP268

It is there so please let me know if you have any trouble finding it/deleting it.

Run HiJackThis. Place a check next to the following items and click FIX CHECKED:

O4 - HKLM\..\Run: [svsidat32] svsidat32.exe
O4 - HKLM\..\Run: [Microsoft Windows Updater] msupdater.exe
O4 - HKLM\..\RunServices: [svsidat32] svsidat32.exe
O4 - HKLM\..\RunServices: [Microsoft Windows Updater] msupdater.exe
O4 - HKCU\..\Run: [svsidat32] svsidat32.exe
O4 - HKCU\..\RunServices: [svsidat32] svsidat32.exe


Close HiJackThis.

Please open Ewido, update it, and run a full system scan as you did previously. Post the log from Ewido and a new HiJackThis log.
  • 0

#21
Nastrado

Nastrado

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
---------------------------------------------------------
ewido security suite - Scan report
---------------------------------------------------------

+ Created on: 4:16:18 PM, 16/07/2005
+ Report-Checksum: 7B3CD955

+ Scan result:

HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_0 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_0\Level_4 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_0\Level_4\Seqn_1104 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_0\Level_4\Seqn_2806 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_0\Level_4\Seqn_2826 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_0\Level_4\Seqn_3340 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_0\Level_4\Seqn_3514 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_0\Level_4\Seqn_4704 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_1 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_1\Level_4 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_1\Level_4\Seqn_1207 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_1\Level_4\Seqn_1425 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_1\Level_4\Seqn_1525 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_1\Level_4\Seqn_1526 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_2 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_2\Level_4 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_2\Level_4\Seqn_1104 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_2\Level_4\Seqn_2920 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_2\Level_4\Seqn_4704 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_3 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_3\Level_4 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_3\Level_4\Seqn_1104 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_3\Level_4\Seqn_2806 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_3\Level_4\Seqn_2826 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_3\Level_4\Seqn_3340 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_3\Level_4\Seqn_3514 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_3\Level_4\Seqn_4704 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_4 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_4\Level_4 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_4\Level_4\Seqn_1296 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_4\Level_4\Seqn_1383 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_4\Level_4\Seqn_1456 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_4\Level_4\Seqn_1790 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_4\Level_4\Seqn_2811 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_4\Level_4\Seqn_2849 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_4\Level_4\Seqn_2898 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_4\Level_4\Seqn_3582 -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Services -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Services\Queue -> Spyware.Cydoor : Cleaned with backup
HKU\S-1-5-21-1085031214-1767777339-839522115-1003\Software\Kazaa\Promotions\Cydoor\Adwr_329\Services\Status -> Spyware.Cydoor : Cleaned with backup
C:\Documents and Settings\Ben\Local Settings\Temporary Internet Files\Content.IE5\OTEF4T67\lak[1].exe -> Backdoor.SdBot : Cleaned with backup
:mozilla.19:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Doubleclick : Cleaned with backup
:mozilla.28:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Specificclick : Cleaned with backup
:mozilla.29:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Specificclick : Cleaned with backup
:mozilla.30:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Specificclick : Cleaned with backup
:mozilla.34:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Fastclick : Cleaned with backup
:mozilla.35:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Fastclick : Cleaned with backup
:mozilla.36:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Fastclick : Cleaned with backup
:mozilla.37:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Fastclick : Cleaned with backup
:mozilla.38:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Fastclick : Cleaned with backup
:mozilla.39:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Fastclick : Cleaned with backup
:mozilla.44:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.45:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.46:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.47:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.48:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.49:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
:mozilla.54:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Popuptraffic : Cleaned with backup
:mozilla.55:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Popuptraffic : Cleaned with backup
:mozilla.67:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Atdmt : Cleaned with backup
:mozilla.96:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Targetnet : Cleaned with backup
:mozilla.101:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Targetnet : Cleaned with backup
:mozilla.102:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Targetnet : Cleaned with backup
:mozilla.111:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Sexlist : Cleaned with backup
:mozilla.115:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.116:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.117:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.122:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.158:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Adtech : Cleaned with backup
:mozilla.159:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Adtech : Cleaned with backup
:mozilla.199:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Centrport : Cleaned with backup
:mozilla.233:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Ru4 : Cleaned with backup
:mozilla.234:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Ru4 : Cleaned with backup
:mozilla.391:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Paycounter : Cleaned with backup
:mozilla.395:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Overture : Cleaned with backup
:mozilla.403:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Questionmarket : Cleaned with backup
:mozilla.445:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Serving-sys : Cleaned with backup
:mozilla.446:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Serving-sys : Cleaned with backup
:mozilla.447:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Serving-sys : Cleaned with backup
:mozilla.448:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Serving-sys : Cleaned with backup
:mozilla.487:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Tradedoubler : Cleaned with backup
:mozilla.631:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Counted : Cleaned with backup
:mozilla.632:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Serving-sys : Cleaned with backup
:mozilla.633:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Bridgetrack : Cleaned with backup
:mozilla.634:C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\lv9r5yyl.default\cookies.txt -> Spyware.Cookie.Bridgetrack : Cleaned with backup


::Report End

Logfile of HijackThis v1.99.1
Scan saved at 4:18:25 PM, on 16/07/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\System32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\WINDOWS\System32\CTsvcCDA.EXE
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\Program Files\ewido\security suite\ewidoguard.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program Files\Creative\PlayCenter2\CTNMRun.exe
C:\Program Files\Eraser\eraser.exe
C:\PROGRA~1\MOZILL~1\FIREFOX.EXE
C:\Hijackthis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.ultrawave.com.au
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by Ultrawave Internet
O1 - Hosts: 64.91.255.87 www.dcsresearch.com
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\System32\\NeroCheck.exe
O4 - HKLM\..\Run: [LiveMonitor] C:\Program Files\MSI\Live Update 2\LMonitor.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [AVG7_EMC] C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [NOMAD Detector] "C:\Program Files\Creative\PlayCenter2\CTNMRun.exe"
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\MSMSGS.EXE" /background
O4 - HKCU\..\Run: [ATI Launchpad] "C:\Program Files\ATI Multimedia\main\launchpd.exe"
O4 - HKCU\..\Run: [Eraser] C:\Program Files\Eraser\eraser.exe -hide
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
O4 - Startup: PowerReg Scheduler V3.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O14 - IERESET.INF: START_PAGE_URL=http://www.ultrawave.com.au
O16 - DPF: {04E214E5-63AF-4236-83C6-A7ADCBF9BD02} (HouseCall Control) - http://housecall60.t...all/xscan60.cab
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.syma...bin/AvSniff.cab
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akama...meInstaller.exe
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.syma...n/bin/cabsa.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: {8E28B3A9-FE83-45D1-B657-D5426B81A121} (CustomerCtrl Class) - http://cs1b.instants...erxsigned35.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoft.../as5/asinst.cab
O16 - DPF: {AB29A544-D6B4-4E36-A1F8-D3E34FC7B00A} (WTHoster Class) - http://install.wildt...stx/install.cab
O16 - DPF: {AE1C01E3-0283-11D3-9B3F-00C04F8EF466} (HeartbeatCtl Class) - http://fdl.msn.com/z...s/heartbeat.cab
O16 - DPF: {E13F1132-4CA0-4005-84D3-51406E27D269} (BTDownloadCtrl Control) - http://www.bravetree...ownloadCtrl.cab
O16 - DPF: {EF791A6B-FC12-4C68-99EF-FB9E207A39E6} (McFreeScan Class) - http://download.mcaf...306/mcfscan.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{0A40D8FB-850F-40FB-B6BD-FB66D4B3FC6C}: NameServer = 202.52.32.2 202.52.32.6
O17 - HKLM\System\CCS\Services\Tcpip\..\{17F9E1BA-2263-492F-BC5C-E7B0D30F256F}: NameServer = 203.194.27.57
O17 - HKLM\System\CS1\Services\Tcpip\..\{0A40D8FB-850F-40FB-B6BD-FB66D4B3FC6C}: NameServer = 202.52.32.2 202.52.32.6
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\System32\CTsvcCDA.EXE
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido\security suite\ewidoguard.exe
  • 0

#22
Michelle

Michelle

    Malware Removal Goddess

  • Retired Staff
  • 8,928 posts
Do you still use Kazaa??

One more log please:

*Download finditnt2000xp.zip
*Unzip the contents of finditnt2000xp.zip to a convenient location.
*Navigate to the Find It NT-2K-XP folder and double-click on find.bat.
*A command prompt will open and it will search your computer for malicious files.
*Once it has finished a Notepad window will pop up with output.txt.
*Copy the entire contents of output.txt into your next post.
  • 0

#23
Michelle

Michelle

    Malware Removal Goddess

  • Retired Staff
  • 8,928 posts
Due to lack of feedback, this topic has been closed.

If you need this topic reopened, please contact a staff member. This applies only to the original topic starter. Everyone else please begin a New Topic.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP