Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected


  • Please log in to reply
5 replies to this topic

#1 brummy1984

brummy1984

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:09:29 PM

Posted 20 December 2007 - 05:42 PM

ok here is the hijack this report

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 22:36:12, on 20/12/2007
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2600.0000)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\atievxx.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\wdfmgr.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\WgaTray.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program Files\Sitecom\Sitecom WL-170 Wireless LAN Card\Installer\WLANUTL.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\WINDOWS\System32\wbem\wmiprvse.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.co.uk/
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
F2 - REG:system.ini: UserInit=userinit.exe,C:\WINDOWS\System32\ntos.exe,
O1 - Hosts: entry DnsMap
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: (no name) - {C4DE5B15-4FFE-4c02-8CB3-CAD24A33562B} - (no file)
O2 - BHO: (no name) - {CE3FE073-9CDB-4ACD-89F2-9461569B7C01} - C:\WINDOWS\System32\wm.dll
O2 - BHO: (no name) - {F675EED8-4A4B-4A11-801B-08297749B83D} - (no file)
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: (no name) - {05E9894E-9C5F-454B-A6E1-7BEF518EC87E} - (no file)
O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - Global Startup: Sitecom Wireless Utility.lnk = C:\Program Files\Sitecom\Sitecom WL-170 Wireless LAN Card\Installer\WLANUTL.exe
O7 - HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
O8 - Extra context menu item: &Search - http://kl.bar.need2find.com/KL/menusearch.html?p=KL
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: PacificPoker4 - {94EDF7B4-4272-4af3-8F8B-4E2F68E225B7} - C:\WINDOWS\System32\shdocvw.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O17 - HKLM\System\CCS\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CCS\Services\Tcpip\..\{7CD61C20-3E38-4A05-9CB0-20C5565CB87E}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CCS\Services\Tcpip\..\{CA4CD555-04FE-488C-B5F9-B544A11D6890}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS1\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS2\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS3\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS3\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS4\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS4\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS5\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS5\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS6\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS6\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS7\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS7\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS8\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS8\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS9\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS9\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS10\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS10\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS11\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS11\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS12\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS13\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O21 - SSODL: ddkret - {ACD92AA6-1C2E-482D-BD29-89EAF148F81B} - (no file)
O21 - SSODL: nopctrl - {435AF800-D500-417B-A6E2-49FD4B28C253} - (no file)
O21 - SSODL: nuxxpbbY - {0873C6F9-A2D9-6C53-6D6D-2A424DCFE64E} - (no file)
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Microsoft Inet Service2 - Unknown owner - C:\WINDOWS\System32\__svchost.exe (file missing)
O23 - Service: Windows Management Service - Unknown owner - C:\WINDOWS\System32\dmwwf.exe

--
End of file - 7608 bytes


this is the link to the original topic

www.bleepingcomputers.com/forums/topic121781.html

cheers matt

BC AdBot (Login to Remove)

 


#2 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:10:29 PM

Posted 21 December 2007 - 11:03 AM

Welcome to the BleepingComputer HijackThis Logs and Analysis forum brummy1984
My name is Richie and i'll be helping you to fix your problems.

It appears you've no virus protection installed,which is somewhat suicidal.
Please download/install Avira AntiVir Personal Edition Classic[Free]:
http://www.free-av.com/
Perform a full scan with Avira and allow it to delete everything it detects.
Restart your pc when you've done.
After restart,open Avira Antivirus and select "Reports".
Then double click the report from the full scan you have just completed.
Click the "Report File" button,then copy and paste the report into your next reply.


I don't see any signs of a firewall,which you really do need.
You may be behind a hardware firewall(Router/NAT),but it would'nt hurt to install a third party software firewall to henhance protection.
I suggest you download\install one of the following freeware firewalls from below:

Sygate Personal Firewall Free Edition:
http://www.filehippo.com/download_sygate_personal_firewall/
Zone Alarm Free:
http://download.zonelabs.com/bin/free/1001..._737_000_en.exe
Comodo Personal Firewall:
http://www.personalfirewall.comodo.com/
Outpost Firewall Free:
http://www.agnitum.com/products/outpostfree/index.php

You should take the time to read the following:
Understanding and Using Firewalls
http://www.bleepingcomputer.com/tutorials/understanding-and-using-firewalls/


Please download FixWareout:
http://downloads.subratam.org/Fixwareout.exe
http://www.bleepingcomputer.com/files/lonny/Fixwareout.exe

Save it to your desktop and run it.
Click Next,then Install,then make sure "Run fixit" is checked and click Finish.
The fix will begin; follow the prompts.
You will be asked to reboot your computer; please do so.
Your system may take longer than usual to load,this is normal.

When your system reboots,follow the prompts.
Afterwards, HijackThis will launch,if it doesn't,launch it manually.
Please click Scan, and checkmark the following items:

O17 - HKLM\System\CCS\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CCS\Services\Tcpip\..\{7CD61C20-3E38-4A05-9CB0-20C5565CB87E}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CCS\Services\Tcpip\..\{CA4CD555-04FE-488C-B5F9-B544A11D6890}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS1\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS2\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS3\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS3\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS4\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS4\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS5\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS5\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS6\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS6\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS7\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS7\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS8\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS8\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS9\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS9\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS10\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS10\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS11\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS11\Services\Tcpip\..\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}: NameServer = 85.255.116.146,85.255.112.225
O17 - HKLM\System\CS12\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CS13\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.116.146 85.255.112.225


Click 'Fix Checked'.
Close HijackThis,and click OK to proceed.
At the end of the fix you may need to restart your computer again.

Finally, please post the contents of the logfile C:\fixwareout\report.txt into your next reply.


If you have previously downloaded ComboFix,please delete that version now.
Warning
You should NOT use Combofix unless you have been instructed to do so by a Malware Removal Expert.
It is intended by its creator to be used under the guidance and supervision of an expert,not for private use.
Using this tool incorrectly could render your system/pc inoperable.

Now download Combofix and save to your desktop:
Note
It is important that it is saved directly to your desktop

Close any open browsers.
Double click on combofix.exe and follow the prompts.
When it's finished it will produce a log.
Post the entire contents of C:\ComboFix.txt into your next reply.
Note
Do not mouseclick combofix's window while it's running.
That may cause the program to freeze/hang.

Do NOT post the ComboFix-quarantined-files.txt unless I ask.
Note
In case your Antivirus or any other realtime scanner is displaying an alert after you downloaded Combofix or while you use Combofix,please disable your scanner and redownload Combofix again.
Some scanners may see some combofix related components as suspicious and block or delete them while there's nothing wrong with them.

Also post a new Hijackthis log please.
Posted Image
Posted Image

#3 brummy1984

brummy1984
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:09:29 PM

Posted 24 December 2007 - 06:38 AM

hi here are all the logs required

cheers




AntiVir PersonalEdition Classic
Report file date: 24 December 2007 08:44

Scanning for 835736 virus strains and unwanted programs.

Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (plain) [5.1.2600]
Username: Josh
Computer name: TIDY-PFVHII1GB0

Version information:
BUILD.DAT : 270 15603 Bytes 19/09/2007 13:32:00
AVSCAN.EXE : 7.0.6.1 290856 Bytes 23/08/2007 14:16:30
AVSCAN.DLL : 7.0.6.0 49192 Bytes 16/08/2007 13:23:52
LUKE.DLL : 7.0.5.3 147496 Bytes 14/08/2007 16:32:48
LUKERES.DLL : 7.0.6.1 10280 Bytes 21/08/2007 13:35:22
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 18/07/2007 15:27:16
ANTIVIR1.VDF : 7.0.0.0 1640448 Bytes 13/09/2007 15:26:56
ANTIVIR2.VDF : 7.0.0.1 2048 Bytes 13/09/2007 15:27:04
ANTIVIR3.VDF : 7.0.0.2 2048 Bytes 13/09/2007 15:27:14
AVEWIN32.DLL : 7.6.0.15 2806272 Bytes 17/09/2007 18:43:56
AVWINLL.DLL : 1.0.0.7 14376 Bytes 26/02/2007 11:36:28
AVPREF.DLL : 7.0.2.2 25640 Bytes 18/07/2007 08:39:18
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 14:16:24
AVPACK32.DLL : 7.3.0.15 360488 Bytes 03/08/2007 09:46:02
AVREG.DLL : 7.0.1.6 30760 Bytes 18/07/2007 08:17:08
AVARKT.DLL : 1.0.0.20 278568 Bytes 28/08/2007 13:26:34
AVEVTLOG.DLL : 7.0.0.20 86056 Bytes 18/07/2007 08:10:20
NETNT.DLL : 7.0.0.0 7720 Bytes 08/03/2007 12:09:44
RCIMAGE.DLL : 7.0.1.30 2342952 Bytes 07/08/2007 13:38:14
RCTEXT.DLL : 7.0.62.0 86056 Bytes 21/08/2007 13:50:38
SQLITE3.DLL : 3.3.17.1 339968 Bytes 23/07/2007 10:37:22

Configuration settings for the scan:
Jobname..........................: Local Drives
Configuration file...............: c:\program files\avira\antivir personaledition classic\alldrives.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: off
Scan boot sector.................: on
Boot sectors.....................: D:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: off
Scan all files...................: Intelligent file selection
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium

Start of the scan: 24 December 2007 08:44

The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'WLLoginProxy.exe' - '1' Module(s) have been scanned
Scan process 'IEXPLORE.EXE' - '1' Module(s) have been scanned
Scan process 'WLANUTL.exe' - '1' Module(s) have been scanned
Scan process 'CTFMON.EXE' - '1' Module(s) have been scanned
Scan process 'AVGAS.EXE' - '1' Module(s) have been scanned
Scan process 'wuauclt.exe' - '1' Module(s) have been scanned
Scan process 'Explorer.EXE' - '1' Module(s) have been scanned
Scan process 'taskmgr.exe' - '1' Module(s) have been scanned
Scan process 'WgaTray.exe' - '1' Module(s) have been scanned
Scan process 'WDFMGR.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'GUARD.EXE' - '0' Module(s) have been scanned
Scan process 'ATIEVXX.EXE' - '1' Module(s) have been scanned
Scan process 'SPOOLSV.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'LSASS.EXE' - '1' Module(s) have been scanned
Scan process 'SERVICES.EXE' - '1' Module(s) have been scanned
Scan process 'WINLOGON.EXE' - '1' Module(s) have been scanned
Scan process 'CSRSS.EXE' - '1' Module(s) have been scanned
Scan process 'SMSS.EXE' - '1' Module(s) have been scanned
27 processes with 27 modules were scanned

Start scanning boot sectors:
Boot sector 'C:\'
[NOTE] No virus was found!
Boot sector 'A:\'
[NOTE] In the drive 'A:\' no data medium is inserted!

Starting to scan the registry.
The registry was scanned ( '23' files ).


Starting the file scan:

Begin scan in 'C:\'
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\hiberfil.sys
[WARNING] The file could not be opened!
C:\WINDOWS\system32\grwag.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '47e67279.qua'!
C:\WINDOWS\system32\dmiez.exe
[DETECTION] Is the Trojan horse TR/Crypt.XPACK.Gen
[INFO] The file was moved to '47d8732d.qua'!
C:\WINDOWS\system32\libcurl.dll
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '47d1733d.qua'!
C:\WINDOWS\system32\dmoux.exe
[DETECTION] Is the Trojan horse TR/Crypt.XPACK.Gen
[INFO] The file was moved to '47de7360.qua'!
C:\WINDOWS\system32\dmwwf.exe
[DETECTION] Is the Trojan horse TR/Crypt.XPACK.Gen
[INFO] The file was moved to '47e6736a.qua'!
C:\WINDOWS\system32\dmvse.exe
[DETECTION] Is the Trojan horse TR/Crypt.XPACK.Gen
[INFO] The file was moved to '47e5736d.qua'!
C:\WINDOWS\system32\update243.exe
[DETECTION] Contains suspicious code HEUR/Malware
[INFO] The file was moved to '47d3737c.qua'!
C:\WINDOWS\system32\drivers\secdrv.sys
[DETECTION] Contains detection pattern of the rootkit RKIT/Agent.DQ.31.A
[INFO] RKIT/Agent.DQ.31.A:[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services//Runtime]
[INFO] RKIT/Agent.DQ.31.A:[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Runtime//Enum]
[INFO] RKIT/Agent.DQ.31.A:[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services//Runtime]
[INFO] RKIT/Agent.DQ.31.A:[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_RUNTIME\0000//Control]
[INFO] The file was moved to '47d27392.qua'!
C:\WINDOWS\system32\drivers\ctl_w32.sys
[DETECTION] Is the Trojan horse TR/Rootkit.Gen
[INFO] The file was moved to '47db73a8.qua'!
C:\WINDOWS\system32\wsnpoem\video.dll
[WARNING] The file could not be opened!
C:\WINDOWS\system32\wsnpoem\audio.dll
[WARNING] The file could not be opened!
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\AdwareRemover1.zip
[DETECTION] Contains suspicious code HEUR/PwdZIP
[INFO] The file was moved to '47e67753.qua'!
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\AdwareRemover2.zip
[DETECTION] Contains suspicious code HEUR/PwdZIP
[INFO] The file was moved to '47e67756.qua'!
C:\System Volume Information\_restore{E2FC5895-D670-4F93-8387-3AF99DCBE530}\RP104\A0213396.exe
[DETECTION] Is the Trojan horse TR/Dldr.Kreppe.AE.1
[INFO] The file was moved to '47a179f5.qua'!
C:\System Volume Information\_restore{E2FC5895-D670-4F93-8387-3AF99DCBE530}\RP106\A0215391.exe
[DETECTION] Contains suspicious code HEUR/Crypted
[INFO] The file was moved to '47a17a04.qua'!
C:\System Volume Information\_restore{E2FC5895-D670-4F93-8387-3AF99DCBE530}\RP107\A0215393.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '47a17a07.qua'!
C:\System Volume Information\_restore{E2FC5895-D670-4F93-8387-3AF99DCBE530}\RP107\A0215394.exe
[DETECTION] Is the Trojan horse TR/Crypt.XPACK.Gen
[INFO] The file was moved to '47a17a0a.qua'!
C:\System Volume Information\_restore{E2FC5895-D670-4F93-8387-3AF99DCBE530}\RP107\A0215395.dll
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '47a17a0c.qua'!
C:\System Volume Information\_restore{E2FC5895-D670-4F93-8387-3AF99DCBE530}\RP107\A0215396.exe
[DETECTION] Is the Trojan horse TR/Crypt.XPACK.Gen
[INFO] The file was moved to '47a17a0e.qua'!
C:\System Volume Information\_restore{E2FC5895-D670-4F93-8387-3AF99DCBE530}\RP107\A0215397.exe
[DETECTION] Is the Trojan horse TR/Crypt.XPACK.Gen
[INFO] The file was moved to '47a17a11.qua'!
C:\System Volume Information\_restore{E2FC5895-D670-4F93-8387-3AF99DCBE530}\RP107\A0215398.exe
[DETECTION] Is the Trojan horse TR/Crypt.XPACK.Gen
[INFO] The file was moved to '47a17a13.qua'!
C:\System Volume Information\_restore{E2FC5895-D670-4F93-8387-3AF99DCBE530}\RP107\A0215399.exe
[DETECTION] Contains suspicious code HEUR/Malware
[INFO] The file was moved to '47a17a17.qua'!
C:\System Volume Information\_restore{E2FC5895-D670-4F93-8387-3AF99DCBE530}\RP107\A0215400.sys
[DETECTION] Contains detection pattern of the rootkit RKIT/Agent.DQ.31.A
[INFO] RKIT/Agent.DQ.31.A:[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services//Runtime]
[INFO] RKIT/Agent.DQ.31.A:[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Runtime//Enum]
[INFO] RKIT/Agent.DQ.31.A:[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services//Runtime]
[INFO] RKIT/Agent.DQ.31.A:[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_RUNTIME\0000//Control]
[INFO] The file was moved to '47a17a19.qua'!
C:\System Volume Information\_restore{E2FC5895-D670-4F93-8387-3AF99DCBE530}\RP107\A0215401.sys
[DETECTION] Is the Trojan horse TR/Rootkit.Gen
[INFO] The file was moved to '47a17a1e.qua'!
Begin scan in 'A:\'
Search path A:\ could not be opened!
The device is not ready.

Begin scan in 'D:\'
Search path D:\ could not be opened!
The device is not ready.



End of the scan: 24 December 2007 09:20
Used time: 36:25 min









Username "Josh" - 24/12/2007 9:52:58 [Fixwareout edited 9/01/2007]

~~~~~ Prerun check
HKLM\SOFTWARE\~\Winlogon\ "System"="csvfp.exe"
Service: "Windows Management Service" = C:\WINDOWS\System32\dmwwf.exe

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
"nameserver"="85.255.116.146 85.255.112.225" <Value cleared.
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\tcpip\parameters\interfaces\{597F9332-15B5-4EFC-929A-3C8CC3B18E9A}
"nameserver"="85.255.116.146,85.255.112.225" <Value cleared.
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\tcpip\parameters\interfaces\{7CD61C20-3E38-4A05-9CB0-20C5565CB87E}
"nameserver"="85.255.116.146,85.255.112.225" <Value cleared.
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\tcpip\parameters\interfaces\{CA4CD555-04FE-488C-B5F9-B544A11D6890}
"nameserver"="85.255.116.146,85.255.112.225" <Value cleared.
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\tcpip\parameters\interfaces\{7CD61C20-3E38-4A05-9CB0-20C5565CB87E}
"DhcpNameServer"="85.255.116.146,85.255.112.225" <Value cleared.
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\tcpip\parameters\interfaces\{CA4CD555-04FE-488C-B5F9-B544A11D6890}
"DhcpNameServer"="85.255.116.146,85.255.112.225" <Value cleared.

Successfully flushed the DNS Resolver Cache.


System was rebooted successfully.

~~~~~ Postrun check
HKLM\SOFTWARE\~\Winlogon\ "system"=""
....
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Urls "0mdm" Deleted
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Urls "1mdm" Deleted
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\_r "}BF175F171F33-EDAA-F314-934D-2BC03E08{" Deleted
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\_r "}EA86519B4EDB-F63A-FE54-7F74-3DAE6AC0{" Deleted
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\_r "sqhmd" Deleted
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\_r "rknmd" Deleted
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\_r "injmd" Deleted
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\_r "zeimd" Deleted
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\_r "esvmd" Deleted
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\_r "}A86E82ACF65F-1C48-B0F4-FB41-6F33DACE{" Deleted
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\_r "fwwmd" Deleted
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\_r "}3297BA6D2F51-09D9-D844-FBC7-AA8D72AE{" Deleted
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion "pfvsc" Value deleted
HKCR\CLSID\{9B2F375E-92D7-4D55-8DE2-6F308C6E216E}\_h\4 Deleted.
....
~~~~~ Misc files.
C:\WINDOWS\System32\kernel32.exe Deleted
....
~~~~~ Checking for older varients.
....

~~~~~ Current runs (hklm hkcu "run" Keys Only)
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"BJCFD"="C:\\Program Files\\BroadJump\\Client Foundation\\CFD.exe"
"!AVG Anti-Spyware"="\"C:\\Program Files\\Grisoft\\AVG Anti-Spyware 7.5\\avgas.exe\" /minimized"
"avgnt"="\"C:\\Program Files\\Avira\\AntiVir PersonalEdition Classic\\avgnt.exe\" /min"

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="C:\\WINDOWS\\System32\\ctfmon.exe"
....
Hosts file was reset, If you use a custom hosts file please replace it...
~~~~~ End report ~~~~~






ComboFix 07-12-24.8 - Josh 2007-12-24 10:33:24.1 - FAT32x86
Running from: C:\Documents and Settings\Josh\Desktop\ComboFix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\Documents and Settings\All Users.\documents\settings
C:\WINDOWS\dat.txt
C:\WINDOWS\rs.txt
C:\WINDOWS\search_res.txt
C:\WINDOWS\system32\drivers\sezofjor.dat
C:\WINDOWS\system32\drivers\symavc32.sys
C:\WINDOWS\system32\nvs2.inf
C:\WINDOWS\system32\RunOnce.t__
C:\WINDOWS\system32\RunOnce2.t__
C:\WINDOWS\system32\skuns.dat
C:\WINDOWS\system32\wm.dll

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.
-------\LEGACY_MICROSOFT_INET_SERVICE
-------\LEGACY_NDISWON
-------\LEGACY_NPF
-------\LEGACY_OMBRRJPE
-------\LEGACY_RUNTIME
-------\LEGACY_RUNTIME2
-------\ombrrjpe


((((((((((((((((((((((((( Files Created from 2007-11-24 to 2007-12-24 )))))))))))))))))))))))))))))))
.

2007-12-24 10:25 . 2004-10-15 18:17 60,496 --a------ C:\WINDOWS\system32\drivers\Teefer.sys
2007-12-24 10:25 . 2004-10-15 18:18 21,075 --a------ C:\WINDOWS\system32\drivers\wpsdrvnt.sys
2007-12-24 10:25 . 2004-10-15 18:32 14,568 --a------ C:\WINDOWS\system32\drivers\wg6n.sys
2007-12-24 10:25 . 2004-10-15 18:32 14,568 --a------ C:\WINDOWS\system32\drivers\wg5n.sys
2007-12-24 10:25 . 2004-10-15 18:32 14,568 --a------ C:\WINDOWS\system32\drivers\wg4n.sys
2007-12-24 10:25 . 2004-10-15 18:32 14,568 --a------ C:\WINDOWS\system32\drivers\wg3n.sys
2007-12-24 10:24 . 2004-10-15 18:32 83,096 --a------ C:\WINDOWS\system32\SSSensor.dll
2007-12-24 10:23 . 2007-12-24 10:23 <DIR> d-------- C:\Program Files\Sygate
2007-12-24 10:19 . 2007-12-24 10:19 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
2007-12-24 08:36 . 2007-12-24 08:36 <DIR> d-------- C:\Program Files\Avira
2007-12-24 08:36 . 2007-12-24 08:36 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Avira
2007-12-20 22:33 . 2007-12-20 22:33 <DIR> d-------- C:\Program Files\Trend Micro
2007-12-19 23:17 . 2007-12-19 22:57 81,920 --a------ C:\WINDOWS\system32\IEDFix.exe
2007-12-17 23:04 . 2001-08-17 22:24 135,040 --a------ C:\WINDOWS\system32\drivers\portcls.sys
2007-12-17 23:04 . 2001-08-17 14:01 57,344 --a------ C:\WINDOWS\system32\drivers\drmk.sys
2007-12-17 22:51 . 2007-12-17 22:51 <DIR> d-------- C:\WINDOWS\system32\URTTemp
2007-12-17 22:42 . 2007-12-17 22:42 <DIR> d-------- C:\Program Files\EuroTool
2007-12-17 21:45 . 2007-12-17 21:45 <DIR> d-------- C:\6f5ad3a7412b4ddda9db2d06b5837b81
2007-12-17 21:21 . 2004-03-09 01:58 646,656 --a------ C:\WINDOWS\system32\sxs.dll
2007-12-17 21:21 . 2004-03-09 01:58 646,656 --a------ C:\WINDOWS\system32\dllcache\sxs.dll
2007-12-17 21:04 . 2003-10-21 22:42 32,256 --a------ C:\WINDOWS\system32\msgsvc.dll
2007-12-17 21:04 . 2003-10-21 22:42 32,256 --a------ C:\WINDOWS\system32\dllcache\msgsvc.dll
2007-12-17 20:34 . 2007-12-17 20:34 251,392 --a------ C:\WINDOWS\system32\mstask.dll
2007-12-17 20:34 . 2007-12-17 20:34 251,392 --a------ C:\WINDOWS\system32\dllcache\mstask.dll
2007-12-17 20:34 . 2007-12-17 20:35 123,392 --a------ C:\WINDOWS\system32\itss.dll
2007-12-17 20:34 . 2007-12-17 20:35 123,392 --a------ C:\WINDOWS\system32\dllcache\itss.dll
2007-12-17 20:33 . 2007-12-17 20:34 301,568 --a------ C:\WINDOWS\system32\dllcache\netapi32.dll
2007-12-17 20:33 . 2007-12-17 20:34 159,232 --a------ C:\WINDOWS\system32\schedsvc.dll
2007-12-17 20:33 . 2007-12-17 20:34 159,232 --a------ C:\WINDOWS\system32\dllcache\schedsvc.dll
2007-12-17 20:33 . 2007-12-17 20:34 48,640 --a------ C:\WINDOWS\system32\dllcache\browser.dll
2007-12-17 20:33 . 2007-12-17 20:34 48,640 --a------ C:\WINDOWS\system32\browser.dll
2007-12-17 20:33 . 2007-12-17 20:34 9,728 --a------ C:\WINDOWS\system32\mstinit.exe
2007-12-17 20:33 . 2007-12-17 20:34 9,728 --a------ C:\WINDOWS\system32\dllcache\mstinit.exe
2007-12-17 20:31 . 2007-12-17 20:31 <DIR> d--h----- C:\WINDOWS\$hf_mig$
2007-12-17 18:29 . 2007-12-17 18:29 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Lavasoft
2007-12-17 10:14 . 2007-12-17 10:14 444 --a------ C:\WINDOWS\system32\d3d8caps.dat
2007-12-14 18:25 . 2007-12-14 18:25 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2007-12-12 20:31 . 2007-12-12 20:31 <DIR> d--h----- C:\Program Files\InstallShield Installation Information
2007-12-12 20:31 . 2005-08-26 23:39 352,768 --a------ C:\WINDOWS\system32\drivers\rt61.sys
2007-12-12 20:31 . 2007-12-12 20:31 20,747 --a------ C:\WINDOWS\system32\drivers\AegisP.sys
2007-12-12 20:30 . 2007-12-12 20:30 <DIR> d-------- C:\Program Files\Sitecom
2007-12-10 20:08 . 2007-12-10 20:08 <DIR> d-------- C:\Program Files\Cain
2007-12-10 19:19 . 2007-12-19 23:19 546 --a------ C:\WINDOWS\system32\tmp.reg
2007-12-10 19:13 . 2007-09-05 23:22 289,144 --a------ C:\WINDOWS\system32\VCCLSID.exe
2007-12-10 19:13 . 2006-04-27 16:49 288,417 --a------ C:\WINDOWS\system32\SrchSTS.exe
2007-12-10 19:13 . 2003-06-05 20:13 53,248 --a------ C:\WINDOWS\system32\Process.exe
2007-12-10 19:13 . 2004-07-31 17:50 51,200 --a------ C:\WINDOWS\system32\dumphive.exe
2007-12-10 19:13 . 2007-10-03 23:36 25,600 --a------ C:\WINDOWS\system32\WS2Fix.exe
2007-12-10 19:02 . 2007-12-10 19:02 59,392 --a------ C:\WINDOWS\derc32xz.exe
2007-12-06 23:42 . 2007-12-06 23:42 <DIR> d-------- C:\Documents and Settings\Josh\Application Data\Tenebril
2007-12-06 23:06 . 2001-08-17 22:36 99,328 --a------ C:\WINDOWS\system32\irftp.exe
2007-12-06 23:06 . 2001-08-17 22:36 78,336 --a------ C:\WINDOWS\system32\irmon.dll
2007-12-06 23:06 . 2001-08-17 13:51 55,296 --a------ C:\WINDOWS\system32\drivers\irda.sys
2007-12-06 23:06 . 2001-08-17 22:37 48,128 --a------ C:\WINDOWS\system32\irprops.cpl
2007-12-06 23:06 . 2001-08-17 13:51 19,584 --a------ C:\WINDOWS\system32\drivers\rasirda.sys
2007-12-06 23:06 . 2001-08-17 13:51 18,688 --a------ C:\WINDOWS\system32\drivers\irsir.sys
2007-12-06 23:06 . 2001-08-17 22:36 7,680 --a------ C:\WINDOWS\system32\wshirda.dll
2007-12-03 00:06 . 2007-12-03 00:06 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Tenebril
2007-12-02 23:29 . 2006-02-23 06:52 280,576 -ra------ C:\WINDOWS\system32\drivers\MRV8335XP.sys
2007-12-02 23:22 . 2007-12-02 23:22 <DIR> d-------- C:\Documents and Settings\Josh\Application Data\Grisoft
2007-12-02 23:21 . 2007-05-30 12:10 10,872 --a------ C:\WINDOWS\system32\drivers\AvgAsCln.sys
2007-12-02 23:18 . 2007-12-02 23:18 <DIR> d-------- C:\WINDOWS\system32\tenarchlib
2007-12-02 23:18 . 2005-10-12 23:10 180,224 --a-s---- C:\WINDOWS\system32\archlib.dll
2007-11-29 23:33 . 2007-11-29 23:33 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\AVG7
2007-11-29 23:33 . 2007-11-29 23:33 499,712 --a------ C:\WINDOWS\system32\msvcp71.dll
2007-11-29 23:33 . 2007-11-29 23:33 348,160 --a------ C:\WINDOWS\system32\msvcr71.dll
2007-11-29 23:32 . 2007-11-29 23:32 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Grisoft
2007-11-29 22:48 . 2007-11-29 22:48 <DIR> d-------- C:\Documents and Settings\Josh\Application Data\Lavasoft
2007-11-29 22:47 . 2007-11-29 22:47 <DIR> d-------- C:\Program Files\Lavasoft
2007-11-29 21:39 . 2007-11-29 21:39 <DIR> d---s---- C:\Documents and Settings\Josh\UserData
2007-11-29 21:18 . 2007-11-29 21:18 383,488 --a------ C:\WINDOWS\ddubbv.exe
2007-11-29 21:02 . 2007-11-29 21:02 210 --a------ C:\WINDOWS\system32\4191.lps
2007-11-29 20:12 . 2007-11-29 20:12 <DIR> d-------- C:\Program Files\CCleaner
2007-11-29 20:11 . 2007-12-17 18:54 6 --a------ C:\WINDOWS\system32\lt.res

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2007-11-19 02:09 179,200 ----a-w C:\WINDOWS\system32\drivers\Gxe53.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="C:\WINDOWS\System32\ctfmon.exe" [2001-08-23 12:00]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"BJCFD"="C:\Program Files\BroadJump\Client Foundation\CFD.exe" [2003-01-27 17:16]
"!AVG Anti-Spyware"="C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" [2007-06-11 09:25]
"avgnt"="C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" [2007-12-24 09:42]
"SmcService"="C:\PROGRA~1\Sygate\SPF\smc.exe" [2004-10-15 19:40]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run-]
"MSMSGS"="C:\Program Files\Messenger\msmsgs.exe" /background

*Newly Created Service* - SMCSERVICE
.
**************************************************************************

catchme 0.3.1333 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2007-12-24 11:13:02
Windows 5.1.2600 FAT NTAPI

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

C:\WINDOWS\system32ntos.exe 286720 bytes
C:\WINDOWS\system32wsnpoem

scan completed successfully
hidden files: 2

**************************************************************************
.
Completion time: 2007-12-24 11:23:57 - machine was rebooted
.
2007-12-17 19:07:02 --- E O F ---







Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:25:18, on 24/12/2007
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2600.0000)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Sygate\SPF\smc.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\WgaTray.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\WINDOWS\System32\atievxx.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\WINDOWS\System32\wdfmgr.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program Files\Sitecom\Sitecom WL-170 Wireless LAN Card\Installer\WLANUTL.exe
C:\WINDOWS\System32\wbem\wmiprvse.exe
C:\WINDOWS\System32\wuauclt.exe
C:\WINDOWS\system32\notepad.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.co.uk/
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\System32\ntos.exe,
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: (no name) - {05E9894E-9C5F-454B-A6E1-7BEF518EC87E} - (no file)
O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKLM\..\Run: [SmcService] C:\PROGRA~1\Sygate\SPF\smc.exe -startgui
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - Global Startup: Sitecom Wireless Utility.lnk = C:\Program Files\Sitecom\Sitecom WL-170 Wireless LAN Card\Installer\WLANUTL.exe
O8 - Extra context menu item: &Search - http://kl.bar.need2find.com/KL/menusearch.html?p=KL
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: PacificPoker4 - {94EDF7B4-4272-4af3-8F8B-4E2F68E225B7} - C:\WINDOWS\System32\shdocvw.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O21 - SSODL: ddkret - {ACD92AA6-1C2E-482D-BD29-89EAF148F81B} - (no file)
O21 - SSODL: nopctrl - {435AF800-D500-417B-A6E2-49FD4B28C253} - (no file)
O21 - SSODL: nuxxpbbY - {0873C6F9-A2D9-6C53-6D6D-2A424DCFE64E} - (no file)
O23 - Service: AntiVir PersonalEdition Classic Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Microsoft Inet Service2 - Unknown owner - C:\WINDOWS\System32\__svchost.exe (file missing)
O23 - Service: Sygate Personal Firewall (SmcService) - Sygate Technologies, Inc. - C:\Program Files\Sygate\SPF\smc.exe

--
End of file - 4812 bytes

#4 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:10:29 PM

Posted 24 December 2007 - 09:23 AM

Please download OTMoveIt by OldTimer,save it to your desktop:
http://download.bleepingcomputer.com/oldtimer/OTMoveIt2.exe
Please double-click OTMoveIt.exe to run it.
Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose 'Copy'):

C:\6f5ad3a7412b4ddda9db2d06b5837b81
C:\WINDOWS\derc32xz.exe
C:\WINDOWS\ddubbv.exe
C:\WINDOWS\system32\4191.lps
C:\WINDOWS\system32\lt.res
C:\WINDOWS\system32\drivers\Gxe53.sys
C:\WINDOWS\system32ntos.exe
C:\WINDOWS\system32wsnpoem


Return to OTMoveIt, right click on the "Paste List of Files/Folders to be moved" window and choose Paste.
Click the red Moveit! button Posted Image
Copy everything on the 'Results' window to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose 'Copy'), and paste it into your next reply.
Close OTMoveIt.
If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process.
If you are asked to reboot the machine choose Yes.

Also post a new Hijackthis log.
Posted Image
Posted Image

#5 brummy1984

brummy1984
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:09:29 PM

Posted 24 December 2007 - 10:54 AM

C:\6f5ad3a7412b4ddda9db2d06b5837b81\update moved successfully.
C:\6f5ad3a7412b4ddda9db2d06b5837b81 moved successfully.
C:\WINDOWS\derc32xz.exe moved successfully.
File/Folder C:\WINDOWS\ddubbv.exe not found.
C:\WINDOWS\system32\4191.lps moved successfully.
C:\WINDOWS\system32\lt.res moved successfully.
File/Folder C:\WINDOWS\system32\drivers\Gxe53.sys not found.
File/Folder C:\WINDOWS\system32ntos.exe not found.
File/Folder C:\WINDOWS\system32wsnpoem not found.
File/Folder not found.

Created on 12242007_155023





Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 15:52:55, on 24/12/2007
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2600.0000)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Sygate\SPF\smc.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\WgaTray.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\WINDOWS\System32\atievxx.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\WINDOWS\System32\wdfmgr.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program Files\Sitecom\Sitecom WL-170 Wireless LAN Card\Installer\WLANUTL.exe
C:\WINDOWS\System32\wbem\wmiprvse.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Documents and Settings\Josh\Desktop\OTMoveIt2.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.co.uk/
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\System32\ntos.exe,
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: (no name) - {05E9894E-9C5F-454B-A6E1-7BEF518EC87E} - (no file)
O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKLM\..\Run: [SmcService] C:\PROGRA~1\Sygate\SPF\smc.exe -startgui
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - Global Startup: Sitecom Wireless Utility.lnk = C:\Program Files\Sitecom\Sitecom WL-170 Wireless LAN Card\Installer\WLANUTL.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O21 - SSODL: ddkret - {ACD92AA6-1C2E-482D-BD29-89EAF148F81B} - (no file)
O21 - SSODL: nopctrl - {435AF800-D500-417B-A6E2-49FD4B28C253} - (no file)
O21 - SSODL: nuxxpbbY - {0873C6F9-A2D9-6C53-6D6D-2A424DCFE64E} - (no file)
O23 - Service: AntiVir PersonalEdition Classic Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Microsoft Inet Service2 - Unknown owner - C:\WINDOWS\System32\__svchost.exe (file missing)
O23 - Service: Sygate Personal Firewall (SmcService) - Sygate Technologies, Inc. - C:\Program Files\Sygate\SPF\smc.exe

--
End of file - 4791 bytes

#6 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:10:29 PM

Posted 24 December 2007 - 11:27 AM

Download ATF Cleaner by Atribune:
http://www.atribune.org/ccount/click.php?id=1
Do not run it just yet.

Download\install 'SuperAntiSpyware Home Edition Free Version' from here:
http://www.superantispyware.com/downloadfi...ANTISPYWAREFREE

Launch SuperAntiSpyware and click on 'Check for updates'.
Once the updates have been installed,exit SuperAntiSpyware.
Do not run it just yet.

You might want to print/copy the following as you need to be in Safe Mode from here on.

Reboot your computer into SAFE MODE using the F8 method.
To do this,restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly.
A menu will appear with several options.
Use the arrow keys on your keyboard to navigate and select the option to run Windows in "Safe Mode".

Have Hijack This fix the following by placing a check in the appropriate boxes and selecting 'Fix checked'.
Make sure all browser and all Windows Explorer windows are closed before fixing:
O3 - Toolbar: (no name) - {05E9894E-9C5F-454B-A6E1-7BEF518EC87E} - (no file)
O21 - SSODL: ddkret - {ACD92AA6-1C2E-482D-BD29-89EAF148F81B} - (no file)
O21 - SSODL: nopctrl - {435AF800-D500-417B-A6E2-49FD4B28C253} - (no file)
O21 - SSODL: nuxxpbbY - {0873C6F9-A2D9-6C53-6D6D-2A424DCFE64E} - (no file)
O23 - Service: Microsoft Inet Service2 - Unknown owner - C:\WINDOWS\System32\__svchost.exe (file missing)

Exit Hijackthis.

Now double-click ATF-Cleaner.exe to run the program.
Click 'Select All' found at the bottom of the list.
Click the 'Empty Selected' button.

If you use Firefox browser, do this also:
Click Firefox at the top and choose 'Select All' from the list.
Click the 'Empty Selected' button.
NOTE:
If you would like to keep your saved passwords,please click 'No' at the prompt.

If you use Opera browser,do this also:
Click Opera at the top and choose 'Select All' from the list.
Click the 'Empty Selected' button.
NOTE:
If you would like to keep your saved passwords,please click 'No' at the prompt.
Click 'Exit' on the Main menu to close the program.

Now Start SuperAntiSpyware.
On the main screen click on 'Scan your computer'.
Check: 'Perform Complete Scan'.
Click 'Next' to start the scan.

Superantispyware will now scan your computer,when it's finished it will list all/any infections found.
Make sure everything found has a checkmark next to it,then press 'Next'.
Click on 'Finish' when you've done.

It's possible that the program will ask you to reboot in order to delete some files.

Obtain the SuperAntiSpyware log as follows:
Click on 'Preferences'.
Click on the 'Statistics/Logs' tab.
Under 'Scanner Logs' double click on 'SuperAntiSpyware Scan Log'.
It will then open in your default text editor,such as Notepad.
Copy and paste the contents of that report into your next reply.
Also post a new Hijackthis log,let me know how your pc is running now.

Posted Image
Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users