Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

I Think I Am Infected With Win32/virut & Win32.hll Hjt Log


  • Please log in to reply
17 replies to this topic

#1 ashzoomerintrack

ashzoomerintrack

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:08:49 PM

Posted 11 January 2008 - 09:36 PM

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 08:04:28, on 12/01/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Program Files\Comodo\Firewall\cmdagent.exe
C:\Program Files\Common Files\EPSON\EBAPI\eEBSVC.exe
C:\Program Files\Comodo\Firewall\CPF.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Winamp\winampa.exe
C:\WINDOWS\system32\spooIsv.exe
C:\Program Files\Common Files\PCSuite\DataLayer\DataLayer.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe
C:\WINDOWS\system\Fun.exe
C:\WINDOWS\dc.exe
C:\WINDOWS\SVIQ.EXE
C:\PROGRA~1\COMMON~1\PCSuite\Services\SERVIC~1.EXE
C:\PROGRA~1\COMMON~1\Nokia\MPAPI\MPAPI3s.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\funj.exe
C:\WINDOWS\system32\rygsga.exe
C:\Documents and Settings\Reliance\Desktop\HiJackThis\HijackThis.exe

F2 - REG:system.ini: Shell=Explorer.exe C:\WINDOWS\system32\WinSit.exe
F3 - REG:win.ini: load=C:\WINDOWS\inf\Other.exe
F3 - REG:win.ini: run=C:\WINDOWS\system32\config\Win.exe
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [COMODO Firewall Pro] "C:\Program Files\Comodo\Firewall\CPF.exe" /background
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKLM\..\Run: [WinampAgent] C:\Program Files\Winamp\winampa.exe
O4 - HKLM\..\Run: [Spooler SubSystem App] C:\WINDOWS\system32\spooIsv.exe
O4 - HKLM\..\Run: [SsAAD.exe] C:\PROGRA~1\Sony\SONICS~1\SsAAD.exe
O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe -onlytray
O4 - HKLM\..\Run: [DataLayer] C:\Program Files\Common Files\PCSuite\DataLayer\DataLayer.exe
O4 - HKLM\..\Run: [Client Server Runtime Process] C:\WINDOWS\system32\csrs.exe
O4 - HKLM\..\Run: [Advanced DHTML Enable] C:\WINDOWS\system32\funj.exe
O4 - HKLM\..\Run: [NvGraphicsInterface] C:\WINDOWS\system32\rygsga.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [PcSync] C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe /NoDialog
O4 - HKCU\..\Run: [Fun] C:\WINDOWS\system\Fun.exe
O4 - HKCU\..\Run: [dc] C:\WINDOWS\dc.exe
O4 - HKCU\..\Run: [dc2k5] C:\WINDOWS\SVIQ.EXE
O4 - HKUS\S-1-5-18\..\Run: [Yahoo Messengger] C:\WINDOWS\system32\SSVICHOSST.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [Yahoo Messengger] C:\WINDOWS\system32\SSVICHOSST.exe (User 'Default user')
O4 - Global Startup: EPSON Status Monitor 3 Environment Check 2.lnk = C:\WINDOWS\system32\spool\drivers\w32x86\3\E_SRCV02.EXE
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{95B915DA-FFC7-4F1F-9068-E92767437CC2}: NameServer = 61.1.96.69,61.1.96.71
O17 - HKLM\System\CCS\Services\Tcpip\..\{B7CF92B6-C186-4A98-87F9-7364BD1637F3}: NameServer = 218.248.240.79 218.248.255.193
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Comodo Application Agent (CmdAgent) - COMODO - C:\Program Files\Comodo\Firewall\cmdagent.exe
O23 - Service: EpsonBidirectionalService - SEIKO EPSON CORPORATION - C:\Program Files\Common Files\EPSON\EBAPI\eEBSVC.exe
O23 - Service: MSCSPTISRV - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\MSCSPTISRV.exe
O23 - Service: PACSPTISVR - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: SonicStage SCSI Service (SSScsiSV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SSScsiSV.exe

--
End of file - 5324 bytes

BC AdBot (Login to Remove)

 


#2 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:04:19 PM

Posted 12 January 2008 - 06:39 AM

Welcome to the BleepingComputer HijackThis Logs and Analysis forum ashzoomerintrack
My name is Richie and i'll be helping you to fix your problems.

It appears you've no virus protection installed,which is somewhat suicidal.
Please download/install Avira AntiVir Personal Edition Classic[Free]:
http://www.free-av.com/
Perform a full scan with Avira and allow it to delete everything it detects.
Restart your pc when you've done.
After restart,open Avira Antivirus and select "Reports".
Then double click the report from the full scan you have just completed.
Click the "Report File" button,then copy and paste the report into your next reply.

If you have previously downloaded ComboFix,please delete that version now.
Warning
You should NOT use Combofix unless you have been instructed to do so by a Malware Removal Expert.
It is intended by its creator to be used under the guidance and supervision of an expert,not for private use.
Using this tool incorrectly could render your system/pc inoperable.

Now download Combofix by sUBs and save to your desktop:
Note
It is important that it is saved directly to your desktop

Close any open browsers.
Double click on combofix.exe and follow the prompts.
When it's finished it will produce a log.
Post the entire contents of C:\ComboFix.txt into your next reply.
Note
Do not mouseclick combofix's window while it's running.
That may cause the program to freeze/hang.

Do NOT post the ComboFix-quarantined-files.txt unless I ask.
Note
In case your Antivirus or any other realtime scanner is displaying an alert after you downloaded Combofix or while you use Combofix,please disable your scanner and redownload Combofix again.
Some scanners may see some combofix related components as suspicious and block or delete them while there's nothing wrong with them.

Also post a new Hijackthis log please.
Posted Image
Posted Image

#3 ashzoomerintrack

ashzoomerintrack
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:08:49 PM

Posted 12 January 2008 - 01:01 PM

As you said here are the logs
AVIRA log before updating:
A n t i V i r P e r s o n a l E d i t i o n C l a s s i c
R e p o r t f i l e d a t e : S a t u r d a y , J a n u a r y 1 2 , 2 0 0 8 1 8 : 2 5
S c a n n i n g f o r 1 0 3 6 3 7 0 v i r u s s t r a i n s a n d u n w a n t e d p r o g r a m s .
L i c e n s e d t o : A v i r a A n t i V i r P e r s o n a l E d i t i o n C l a s s i c

S e r i a l n u m b e r : 0 0 0 0 1 4 9 9 9 6 - A D J I E - 0 0 0 1

P l a t f o r m : W i n d o w s X P

W i n d o w s v e r s i o n : ( S e r v i c e P a c k 2 ) [ 5 . 1 . 2 6 0 0 ]

U s e r n a m e : A d m i n i s t r a t o r

C o m p u t e r n a m e : R E L I A N C E - U M U V H C



V e r s i o n i n f o r m a t i o n :

B U I L D . D A T : 2 6 9 1 5 6 0 4 B y t e s 9 / 1 0 / 2 0 0 7 1 4 : 3 1 : 0 0

A V S C A N . E X E : 7 . 0 . 6 . 1 2 9 0 8 5 6 B y t e s 8 / 2 3 / 2 0 0 7 0 8 : 4 6 : 3 0

A V S C A N . D L L : 7 . 0 . 6 . 0 4 9 1 9 2 B y t e s 8 / 1 6 / 2 0 0 7 0 7 : 5 3 : 5 2

L U K E . D L L : 7 . 0 . 5 . 3 1 4 7 4 9 6 B y t e s 8 / 1 4 / 2 0 0 7 1 1 : 0 2 : 4 8

L U K E R E S . D L L : 7 . 0 . 6 . 1 1 0 2 8 0 B y t e s 8 / 2 1 / 2 0 0 7 0 8 : 0 5 : 2 2

A N T I V I R 0 . V D F : 6 . 3 5 . 0 . 1 7 3 7 1 2 6 4 B y t e s 5 / 3 1 / 2 0 0 6 0 8 : 0 2 : 4 2

A N T I V I R 1 . V D F : 6 . 3 9 . 0 . 1 2 9 7 2 5 1 9 6 8 B y t e s 7 / 1 0 / 2 0 0 7 0 8 : 0 2 : 4 8

A N T I V I R 2 . V D F : 6 . 3 9 . 1 . 4 3 1 5 4 2 6 5 6 B y t e s 8 / 2 5 / 2 0 0 7 1 2 : 5 1 : 0 2

A N T I V I R 3 . V D F : 6 . 3 9 . 1 . 5 1 2 9 6 9 6 B y t e s 8 / 2 8 / 2 0 0 7 0 2 : 5 2 : 3 6

A V E W I N 3 2 . D L L : 7 . 6 . 0 . 5 2 7 8 9 8 8 8 B y t e s 8 / 2 9 / 2 0 0 7 1 2 : 3 9 : 1 0

A V W I N L L . D L L : 1 . 0 . 0 . 7 1 4 3 7 6 B y t e s 2 / 2 6 / 2 0 0 7 0 6 : 0 6 : 2 8

A V P R E F . D L L : 7 . 0 . 2 . 2 2 5 6 4 0 B y t e s 7 / 1 8 / 2 0 0 7 0 3 : 0 9 : 1 8

A V R E P . D L L : 7 . 0 . 0 . 1 1 5 5 6 8 8 B y t e s 4 / 1 6 / 2 0 0 7 0 8 : 4 6 : 2 4

A V P A C K 3 2 . D L L : 7 . 3 . 0 . 1 5 3 6 0 4 8 8 B y t e s 8 / 3 / 2 0 0 7 0 4 : 1 6 : 0 2

A V R E G . D L L : 7 . 0 . 1 . 6 3 0 7 6 0 B y t e s 7 / 1 8 / 2 0 0 7 0 2 : 4 7 : 0 8

A V A R K T . D L L : 1 . 0 . 0 . 2 0 2 7 8 5 6 8 B y t e s 8 / 2 8 / 2 0 0 7 0 7 : 5 6 : 3 4

A V E V T L O G . D L L : 7 . 0 . 0 . 2 0 8 6 0 5 6 B y t e s 7 / 1 8 / 2 0 0 7 0 2 : 4 0 : 2 0

N E T N T . D L L : 7 . 0 . 0 . 0 7 7 2 0 B y t e s 3 / 8 / 2 0 0 7 0 6 : 3 9 : 4 4

R C I M A G E . D L L : 7 . 0 . 1 . 3 0 2 3 4 2 9 5 2 B y t e s 8 / 7 / 2 0 0 7 0 8 : 0 8 : 1 4

R C T E X T . D L L : 7 . 0 . 6 2 . 0 8 6 0 5 6 B y t e s 8 / 2 1 / 2 0 0 7 0 8 : 2 0 : 3 8

S Q L I T E 3 . D L L : 3 . 3 . 1 7 . 1 3 3 9 9 6 8 B y t e s 7 / 2 3 / 2 0 0 7 0 5 : 0 7 : 2 2



C o n f i g u r a t i o n s e t t i n g s f o r t h e s c a n :

J o b n a m e . . . . . . . . . . . . . . . . . . . . . . . . . . : L o c a l D r i v e s

C o n f i g u r a t i o n f i l e . . . . . . . . . . . . . . . : c : \ p r o g r a m f i l e s \ a v i r a \ a n t i v i r p e r s o n a l e d i t i o n c l a s s i c \ a l l d r i v e s . a v p

L o g g i n g . . . . . . . . . . . . . . . . . . . . . . . . . . : l o w

P r i m a r y a c t i o n . . . . . . . . . . . . . . . . . . . : i n t e r a c t i v e

S e c o n d a r y a c t i o n . . . . . . . . . . . . . . . . . : i g n o r e

S c a n m a s t e r b o o t s e c t o r . . . . . . . . . . : o f f

S c a n b o o t s e c t o r . . . . . . . . . . . . . . . . . : o n

B o o t s e c t o r s . . . . . . . . . . . . . . . . . . . . . : G : ,

S c a n m e m o r y . . . . . . . . . . . . . . . . . . . . . . : o n

P r o c e s s s c a n . . . . . . . . . . . . . . . . . . . . . : o n

S c a n r e g i s t r y . . . . . . . . . . . . . . . . . . . . : o n

S e a r c h f o r r o o t k i t s . . . . . . . . . . . . . . : o f f

S c a n a l l f i l e s . . . . . . . . . . . . . . . . . . . : I n t e l l i g e n t f i l e s e l e c t i o n

S c a n a r c h i v e s . . . . . . . . . . . . . . . . . . . . : o n

R e c u r s i o n d e p t h . . . . . . . . . . . . . . . . . . : 2 0

S m a r t e x t e n s i o n s . . . . . . . . . . . . . . . . . : o n

M a c r o h e u r i s t i c . . . . . . . . . . . . . . . . . . : o n

F i l e h e u r i s t i c . . . . . . . . . . . . . . . . . . . : m e d i u m



S t a r t o f t h e s c a n : S a t u r d a y , J a n u a r y 1 2 , 2 0 0 8 1 8 : 2 5



T h e s c a n o f r u n n i n g p r o c e s s e s w i l l b e s t a r t e d

S c a n p r o c e s s ' a v s c a n . e x e ' - ' 1 ' M o d u l e ( s ) h a v e b e e n s c a n n e d

S c a n p r o c e s s ' a v c e n t e r . e x e ' - ' 1 ' M o d u l e ( s ) h a v e b e e n s c a n n e d

S c a n p r o c e s s ' d c . e x e ' - ' 1 ' M o d u l e ( s ) h a v e b e e n s c a n n e d

M o d u l e i s i n f e c t e d - > ' C : \ W I N D O W S \ d c . e x e '

S c a n p r o c e s s ' w m i p r v s e . e x e ' - ' 1 ' M o d u l e ( s ) h a v e b e e n s c a n n e d

S c a n p r o c e s s ' S V I Q . E X E ' - ' 1 ' M o d u l e ( s ) h a v e b e e n s c a n n e d

M o d u l e i s i n f e c t e d - > ' C : \ W I N D O W S \ S V I Q . E X E '

S c a n p r o c e s s ' F u n . e x e ' - ' 1 ' M o d u l e ( s ) h a v e b e e n s c a n n e d

M o d u l e i s i n f e c t e d - > ' C : \ W I N D O W S \ s y s t e m \ F u n . e x e '

S c a n p r o c e s s ' E x p l o r e r . e x e ' - ' 1 ' M o d u l e ( s ) h a v e b e e n s c a n n e d

S c a n p r o c e s s ' g u a r d . e x e ' - ' 1 ' M o d u l e ( s ) h a v e b e e n s c a n n e d

S c a n p r o c e s s ' s v c h o s t . e x e ' - ' 1 ' M o d u l e ( s ) h a v e b e e n s c a n n e d

S c a n p r o c e s s ' s v c h o s t . e x e ' - ' 1 ' M o d u l e ( s ) h a v e b e e n s c a n n e d

S c a n p r o c e s s ' s v c h o s t . e x e ' - ' 1 ' M o d u l e ( s ) h a v e b e e n s c a n n e d

S c a n p r o c e s s ' s v c h o s t . e x e ' - ' 1 ' M o d u l e ( s ) h a v e b e e n s c a n n e d

S c a n p r o c e s s ' s v c h o s t . e x e ' - ' 1 ' M o d u l e ( s ) h a v e b e e n s c a n n e d

S c a n p r o c e s s ' l s a s s . e x e ' - ' 1 ' M o d u l e ( s ) h a v e b e e n s c a n n e d

S c a n p r o c e s s ' s a v e d u m p . e x e ' - ' 1 ' M o d u l e ( s ) h a v e b e e n s c a n n e d

S c a n p r o c e s s ' s e r v i c e s . e x e ' - ' 1 ' M o d u l e ( s ) h a v e b e e n s c a n n e d

S c a n p r o c e s s ' w i n l o g o n . e x e ' - ' 1 ' M o d u l e ( s ) h a v e b e e n s c a n n e d

S c a n p r o c e s s ' c s r s s . e x e ' - ' 1 ' M o d u l e ( s ) h a v e b e e n s c a n n e d

S c a n p r o c e s s ' s m s s . e x e ' - ' 1 ' M o d u l e ( s ) h a v e b e e n s c a n n e d

P r o c e s s ' d c . e x e ' h a s b e e n t e r m i n a t e d

P r o c e s s ' S V I Q . E X E ' h a s b e e n t e r m i n a t e d

P r o c e s s ' F u n . e x e ' h a s b e e n t e r m i n a t e d

C : \ W I N D O W S \ d c . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 6 b 9 2 6 . q u a ' !

C : \ W I N D O W S \ S V I Q . E X E

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 d 1 b 9 1 e . q u a ' !

C : \ W I N D O W S \ s y s t e m \ F u n . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 f 6 b 9 3 f . q u a ' !



2 2 p r o c e s s e s w i t h 1 9 m o d u l e s w e r e s c a n n e d



S t a r t s c a n n i n g b o o t s e c t o r s :

B o o t s e c t o r ' C : \ '

[ N O T E ] N o v i r u s w a s f o u n d !

B o o t s e c t o r ' E : \ '

[ N O T E ] N o v i r u s w a s f o u n d !

B o o t s e c t o r ' F : \ '

[ N O T E ] N o v i r u s w a s f o u n d !

B o o t s e c t o r ' A : \ '

[ N O T E ] I n t h e d r i v e ' A : \ ' n o d a t a m e d i u m i s i n s e r t e d !



S t a r t i n g t o s c a n t h e r e g i s t r y .

C : \ W I N D O W S \ s y s t e m 3 2 \ f u n j . e x e

[ D E T E C T I O N ] I s t h e T r o j a n h o r s e T R / C r y p t . X P A C K . G e n

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 f 6 b 9 4 6 . q u a ' !

C : \ W I N D O W S \ s y s t e m 3 2 \ f u n j . e x e

[ D E T E C T I O N ] I s t h e T r o j a n h o r s e T R / C r y p t . X P A C K . G e n

C : \ W I N D O W S \ s y s t e m 3 2 \ c o n f i g \ W i n . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 f 6 b 9 4 3 . q u a ' !

C : \ W I N D O W S \ s y s t e m 3 2 \ c o n f i g \ W i n . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

C : \ W I N D O W S \ i n f \ O t h e r . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 f 0 b 9 5 4 . q u a ' !

C : \ W I N D O W S \ i n f \ O t h e r . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2



T h e r e g i s t r y w a s s c a n n e d ( ' 3 3 ' f i l e s ) .





S t a r t i n g t h e f i l e s c a n :



B e g i n s c a n i n ' C : \ '

C : \ P A G E F I L E . S Y S

[ W A R N I N G ] T h e f i l e c o u l d n o t b e o p e n e d !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 0 0 4 . E X E

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b 9 9 4 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 0 0 5 . E X E

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b 9 a 8 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 0 0 6 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b 9 a b . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 0 0 7 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b 9 a d . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 0 0 8 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b 9 b 0 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 0 5 5 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 1 3 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 0 6 8 . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 2 a . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 0 7 3 . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 2 f . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 0 7 4 . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 3 1 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 0 7 7 . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 3 3 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 0 7 9 . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 3 5 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 0 8 1 . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 3 7 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 0 8 3 . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 3 a . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 0 8 7 . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 3 c . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 0 8 9 . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 3 e . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 0 9 1 . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 4 0 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 1 0 4 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 4 9 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 1 0 9 . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 5 5 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 1 1 1 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 5 7 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 1 1 2 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 5 9 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 1 1 3 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 5 b . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 1 1 4 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 5 c . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 1 1 5 . E X E

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 5 e . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 6 3 1 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 8 9 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 6 3 2 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 8 b . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 6 3 3 . E X E

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 8 d . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 6 3 4 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 8 e . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 6 3 6 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 8 f . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 1 \ A 0 0 0 0 6 3 7 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 9 1 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 0 6 9 7 . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 9 a . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 0 6 9 8 . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 9 c . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 0 7 0 2 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a 9 e . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 0 7 0 3 . E X E

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a a 0 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 0 7 0 4 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a a 1 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 0 7 0 5 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a a 3 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 0 7 0 6 . i n i

[ D E T E C T I O N ] I s t h e T r o j a n h o r s e T R / S p y . 1 0 4

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a a 5 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 0 7 0 7 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a a d . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 0 7 0 8 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a b 2 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 0 8 5 8 . E X E

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a b e . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 0 8 7 4 . E X E

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a b f . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 0 9 4 9 . E X E

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a c 2 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 0 9 5 5 . E X E

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 6 d 3 8 e 8 b . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 0 9 8 6 . E X E

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a c 3 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 0 0 5 . E X E

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a c 4 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 0 3 6 . E X E

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 6 d 3 8 e 8 d . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 0 3 9 . E X E

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a c 5 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 0 4 8 . E X E

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a c 6 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 0 5 9 . E X E

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 6 d 3 8 e 8 f . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 0 6 3 . E X E

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a c 7 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 1 6 5 . E X E

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a c 9 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 2 8 5 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a d 3 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 2 8 6 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 6 d 3 8 e 9 c . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 3 1 0 . E X E

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a d 5 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 4 4 6 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e W i n d o w s v i r u s W 3 2 / C h o l e r a

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a d e . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 4 4 7 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e W i n d o w s v i r u s W 3 2 / C h o l e r a

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a d f . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 4 8 3 . e x e

[ D E T E C T I O N ] I s t h e T r o j a n h o r s e T R / C r y p t . N S P M . G e n

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a e 1 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 6 1 3 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e W i n d o w s v i r u s W 3 2 / C h o l e r a

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a e a . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 6 2 9 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a e b . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 6 3 0 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 6 d 3 8 e a 4 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 6 3 1 . E X E

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a e c . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 6 3 2 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 6 d 3 8 e a 5 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 6 3 3 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a e e . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 6 6 2 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a e f . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 6 6 3 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 6 d 3 8 e b 8 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 6 6 4 . E X E

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a f 1 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 6 6 5 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 6 d 3 8 e b a . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 6 6 6 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a f 0 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 6 6 7 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 6 d 3 8 e b 9 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 6 7 2 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a f 2 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 6 7 3 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 6 d 3 8 e b b . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 6 7 4 . E X E

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a f 3 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 6 7 5 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 6 d 3 8 e b c . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 6 7 6 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a f 5 . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 6 7 7 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 6 d 3 8 e b e . q u a ' !

C : \ S y s t e m V o l u m e I n f o r m a t i o n \ _ r e s t o r e { 1 D 8 4 0 B 3 3 - 3 8 0 5 - 4 1 F 7 - 8 C 8 F - 7 4 5 2 F A 0 5 6 8 F B } \ R P 2 \ A 0 0 0 1 6 7 9 . e x e

[ D E T E C T I O N ] I s t h e T r o j a n h o r s e T R / C r y p t . X P A C K . G e n

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 8 b a f 4 . q u a ' !

C : \ W I N D O W S \ s y s t e m 3 2 \ w g e q s e p . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 e d b b 2 e . q u a ' !

C : \ W I N D O W S \ s y s t e m 3 2 \ f a b f r f . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 e a b b 2 f . q u a ' !

C : \ W I N D O W S \ s y s t e m 3 2 \ p v t j . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 f c b b 5 1 . q u a ' !

C : \ W I N D O W S \ s y s t e m 3 2 \ r k a a k x s z . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 e 9 b b 4 7 . q u a ' !

C : \ W I N D O W S \ s y s t e m 3 2 \ f r r x v . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 f a b b 5 2 . q u a ' !

C : \ W I N D O W S \ s y s t e m 3 2 \ y j s k t . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 f b b b 4 c . q u a ' !

C : \ W I N D O W S \ s y s t e m 3 2 \ e f o l q . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 f 7 b b 4 d . q u a ' !

C : \ W I N D O W S \ s y s t e m 3 2 \ h k c d . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 e b b b 5 3 . q u a ' !

C : \ W I N D O W S \ s y s t e m 3 2 \ u x n s r e p v . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 f 6 b b 6 2 . q u a ' !

C : \ W I N D O W S \ s y s t e m 3 2 \ q s f r f q . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 e e b b 6 0 . q u a ' !

C : \ W I N D O W S \ s y s t e m 3 2 \ u s f n h m t . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 e e b b 6 1 . q u a ' !

C : \ W I N D O W S \ s y s t e m 3 2 \ W i n S i t . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 f 6 b b 6 5 . q u a ' !

C : \ W I N D O W S \ s y s t e m 3 2 \ o y x p s . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / M a l w a r e

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 8 0 0 b b 7 7 . q u a ' !

C : \ W I N D O W S \ s y s t e m 3 2 \ d r i v e r s \ e t c \ h o s t s

[ D E T E C T I O N ] I s t h e T r o j a n h o r s e T R / Q h o s t . A A

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 f b b b 7 3 . q u a ' !

C : \ W I N D O W S \ H e l p \ O t h e r . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 f 0 b b e 1 . q u a ' !

C : \ q o o b o x \ Q u a r a n t i n e \ C \ W I N D O W S \ d c . e x e . v i r

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b 6 b d b 6 . q u a ' !

C : \ q o o b o x \ Q u a r a n t i n e \ C \ W I N D O W S \ S V I Q . E X E . v i r

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 d 1 b d a 9 . q u a ' !

C : \ q o o b o x \ Q u a r a n t i n e \ C \ W I N D O W S \ s y s t e m 3 2 \ W i n S i t . e x e . v i r

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 f 6 b d b e . q u a ' !

C : \ q o o b o x \ Q u a r a n t i n e \ C \ W I N D O W S \ s y s t e m 3 2 \ c o n f i g \ W i n . e x e . v i r

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 6 9 9 f c c 7 . q u a ' !

C : \ q o o b o x \ Q u a r a n t i n e \ C \ W I N D O W S \ H e l p \ O t h e r . e x e . v i r

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 f 0 b d c 9 . q u a ' !

C : \ q o o b o x \ Q u a r a n t i n e \ C \ W I N D O W S \ i n f \ O t h e r . e x e . v i r

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / V B . A S . 2 2

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 6 8 3 e 7 4 a . q u a ' !

B e g i n s c a n i n ' E : \ ' < W O R K D R I V E >

E : \ A s h i s h B a c k U p \ I n s t a l l a t i o n F i l e s \ S R S . A u d i o . S a n d B o x . v 1 . 6 . 3 . 0 . I n c l . K e y m a k e r - C O R E . r a r

[ 0 ] A r c h i v e t y p e : R A R

- - > C R - S A S 1 6 . e x e

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e w o r m W O R M / S d B o t . 1 2 8 5 1 2 . A

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 d b b f f 3 . q u a ' !

E : \ A s h i s h B a c k U p \ I n s t a l l a t i o n F i l e s \ C D \ E R M P \ D E S K T O P . I N I

[ D E T E C T I O N ] I s t h e T r o j a n h o r s e T R / A g e n t . B C F

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 d b c 0 1 1 . q u a ' !

E : \ A s h i s h B a c k U p \ I n s t a l l a t i o n F i l e s \ C D \ t u n e u p s o f t w a r e \ D E S K T O P . I N I

[ D E T E C T I O N ] I s t h e T r o j a n h o r s e T R / A g e n t . B C F

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 d b c 0 1 a . q u a ' !

E : \ A s h i s h B a c k U p \ I n s t a l l a t i o n F i l e s \ C D \ t u n e u p s o f t w a r e \ t u n e u p u t i l i t i e s 2 0 0 6 c r a c k o n l y f o r a l l v e r s i o n s r e g f i l e s h a r k y \ D E S K T O P . I N I

[ D E T E C T I O N ] I s t h e T r o j a n h o r s e T R / A g e n t . B C F

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 d b c 0 1 b . q u a ' !

E : \ A s h i s h B a c k U p \ I n s t a l l a t i o n F i l e s \ C D \ t u n e u p s o f t w a r e \ t u n e u p u t i l i t i e s 2 0 0 6 v v 5 . 0 . 2 3 2 7 g e r m a n k e y g e n h a z e \ D E S K T O P . I N I

[ D E T E C T I O N ] I s t h e T r o j a n h o r s e T R / A g e n t . B C F

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 6 a 8 9 a 9 c . q u a ' !

E : \ A s h i s h B a c k U p \ N o k i a 6 6 8 1 \ S y s t e m \ R E C O G S \ R L 3 D R e c o g . m d l

[ D E T E C T I O N ] C o n t a i n s t h e S y m b i a n O S v i r u s S Y M B O S / M a b i r . A

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b b c 0 6 6 . q u a ' !

E : \ A s h i s h B a c k U p \ B a c k u p 0 7 a u g 0 5 \ T C C \ 1 . E X E

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e D O S v i r u s D O S / C a n d y

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 c d c 0 7 1 . q u a ' !

E : \ U b u n t u 6 . 0 6 L T S \ N e w F o l d e r \ a m i t \ R I T I K A \ S P N S R V 9 X . E X E

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e W i n d o w s v i r u s W 3 2 / C h o l e r a

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 d 6 c 0 e c . q u a ' !

E : \ U b u n t u 6 . 0 6 L T S \ N e w F o l d e r \ a m i t \ R I T I K A \ S P N S R V N T . E X E

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e W i n d o w s v i r u s W 3 2 / C h o l e r a

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 6 b 8 f 1 5 5 . q u a ' !

E : \ S e r i a l s 2 0 0 0 L a t e s t U p d a t e d \ S 2 K D O S . E X E

[ D E T E C T I O N ] I s t h e T r o j a n h o r s e T R / C r y p t . U . G e n

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 d 3 c 1 2 1 . q u a ' !

B e g i n s c a n i n ' F : \ ' < S O N G S >

F : \ A s h i s h B a c k U P \ B a c k \ R e l i a n c e \ D e s k t o p 1 \ O x y g e n P h o n e M a n a g e r 2 . 5 , 2 . 6 , 2 . 7 A n d S y m b i a n 2 . 2 , 2 . 3 , 2 . 4 L o a d e r B y D o c t o r 2 K \ l a u n c h . e x e

[ D E T E C T I O N ] C o n t a i n s s u s p i c i o u s c o d e H E U R / C r y p t e d

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 f d c 1 7 b . q u a ' !

F : \ B a c k u p C D r i v e \ W R _ 3 . 7 1 . r a r

[ 0 ] A r c h i v e t y p e : R A R

- - > W i n R A R 3 . 7 1 \ W i n R A R _ 3 . x x _ C u s t o m _ P a t c h _ v 1 . 3 . s t a r z b o y . e x e

[ D E T E C T I O N ] C o n t a i n s a d e t e c t i o n p a t t e r n o f t h e ( d a n g e r o u s ) b a c k d o o r p r o g r a m B D S / H u p i g o n . B V . 3 6 4 B a c k d o o r s e r v e r p r o g r a m s

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 e 7 c 1 c 6 . q u a ' !

F : \ B a c k u p C D r i v e \ a m i t \ R I T I K A \ S P N S R V 9 X . E X E

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e W i n d o w s v i r u s W 3 2 / C h o l e r a

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 d 6 c 1 c 5 . q u a ' !

F : \ B a c k u p C D r i v e \ a m i t \ R I T I K A \ S P N S R V N T . E X E

[ D E T E C T I O N ] C o n t a i n s d e t e c t i o n p a t t e r n o f t h e W i n d o w s v i r u s W 3 2 / C h o l e r a

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 d 6 c 1 c 6 . q u a ' !

F : \ B a c k u p C D r i v e \ D e s k t o p \ D E S K T O P \ M S O 2 k 7 _ k g \ M S O 2 k 7 _ k g . e x e

[ D E T E C T I O N ] I s t h e T r o j a n h o r s e T R / C r y p t . U . G e n

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 d 7 c 1 e 0 . q u a ' !

F : \ B a c k u p C D r i v e \ D e s k t o p \ D E S K T O P \ r a p i d s h a r e . c o m _ d o w n l o a d e r 1 3 4 b 8 \ R a p i d S h a r e . C o m _ D o w n l o a d e r 1 3 4 b 8 \ P l u g i n s \ g o c r . e x e

[ D E T E C T I O N ] I s t h e T r o j a n h o r s e T R / C r y p t . U . G e n

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 e b c 2 0 0 . q u a ' !

F : \ B a c k u p C D r i v e \ S m i t f r a u d F i x \ G e n e r i c R e n o s F i x . e x e

[ D E T E C T I O N ] I s t h e T r o j a n h o r s e T R / C r y p t . U . G e n

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 f 6 c 2 0 f . q u a ' !

F : \ B a c k u p C D r i v e \ S m i t f r a u d F i x \ H o s t s C h k . e x e

[ D E T E C T I O N ] I s t h e T r o j a n h o r s e T R / C r y p t . U . G e n

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 f b c 2 1 a . q u a ' !

F : \ B a c k u p C D r i v e \ S m i t f r a u d F i x \ s w r e g . e x e

[ D E T E C T I O N ] I s t h e T r o j a n h o r s e T R / C r y p t . U . G e n

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 f a c 2 2 2 . q u a ' !

F : \ B a c k u p C D r i v e \ S m i t f r a u d F i x \ s w s c . e x e

[ D E T E C T I O N ] I s t h e T r o j a n h o r s e T R / C r y p t . U . G e n

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 f b c 2 2 3 . q u a ' !

F : \ B a c k u p C D r i v e \ S m i t f r a u d F i x \ s w x c a c l s . e x e

[ D E T E C T I O N ] I s t h e T r o j a n h o r s e T R / C r y p t . U . G e n

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 8 0 0 c 2 2 3 . q u a ' !

F : \ B a c k u p C D r i v e \ S m i t f r a u d F i x \ W S 2 F i x . e x e

[ D E T E C T I O N ] I s t h e T r o j a n h o r s e T R / C r y p t . U . G e n

[ I N F O ] T h e f i l e w a s m o v e d t o ' 4 7 b a c 2 0 0 . q u a ' !

B e g i n s c a n i n ' A : \ '

S e a r c h p a t h A : \ c o u l d n o t b e o p e n e d !

T h e d e v i c e i s n o t r e a d y .



B e g i n s c a n i n ' G : \ '

S e a r c h p a t h G : \ c o u l d n o t b e o p e n e d !

T h e d e v i c e i s n o t r e a d y .







E n d o f t h e s c a n : S a t u r d a y , J a n u a r y 1 2 , 2 0 0 8 1 9 : 0 5

U s e d t i m e : 4 0 : 0 7 m i n



T h e s c a n h a s b e e n d o n e c o m p l e t e l y .



5 7 8 0 S c a n n i n g d i r e c t o r i e s

2 2 1 1 8 6 F i l e s w e r e s c a n n e d

8 8 v i r u s e s a n d / o r u n w a n t e d p r o g r a m s w e r e f o u n d

3 9 F i l e s w e r e c l a s s i f i e d a s s u s p i c i o u s :

0 f i l e s w e r e d e l e t e d

0 f i l e s w e r e r e p a i r e d

1 2 4 f i l e s w e r e m o v e d t o q u a r a n t i n e

0 f i l e s w e r e r e n a m e d

1 F i l e s c a n n o t b e s c a n n e d

2 2 1 0 9 8 F i l e s n o t c o n c e r n e d

1 3 1 7 A r c h i v e s w e r e s c a n n e d

3 W a r n i n g s

1 0 N o t e s

AVIRA LOG REPORT After Update:


AntiVir PersonalEdition Classic
Report file date: 12 January 2008 22:25

Scanning for 1027920 virus strains and unwanted programs.

Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Username: Reliance
Computer name: RELIANCE-UMUVHC

Version information:
BUILD.DAT : 270 15603 Bytes 9/19/2007 13:32:00
AVSCAN.EXE : 7.0.6.1 290856 Bytes 8/23/2007 08:46:30
AVSCAN.DLL : 7.0.6.0 49192 Bytes 8/16/2007 07:53:52
LUKE.DLL : 7.0.5.3 147496 Bytes 8/14/2007 11:02:48
LUKERES.DLL : 7.0.6.1 10280 Bytes 8/21/2007 08:05:22
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 7/18/2007 16:50:48
ANTIVIR1.VDF : 7.0.1.95 3367424 Bytes 12/14/2007 16:50:48
ANTIVIR2.VDF : 7.0.1.205 620544 Bytes 1/8/2008 16:50:50
ANTIVIR3.VDF : 7.0.1.227 161280 Bytes 1/11/2008 16:50:50
AVEWIN32.DLL : 7.6.0.46 3084800 Bytes 1/12/2008 16:51:00
AVWINLL.DLL : 1.0.0.7 14376 Bytes 2/26/2007 06:06:28
AVPREF.DLL : 7.0.2.2 25640 Bytes 7/18/2007 03:09:18
AVREP.DLL : 7.0.0.1 155688 Bytes 4/16/2007 08:46:24
AVPACK32.DLL : 7.6.0.2 360488 Bytes 1/12/2008 16:51:00
AVREG.DLL : 7.0.1.6 30760 Bytes 7/18/2007 02:47:08
AVARKT.DLL : 1.0.0.20 278568 Bytes 8/28/2007 07:56:34
AVEVTLOG.DLL : 7.0.0.20 86056 Bytes 7/18/2007 02:40:20
NETNT.DLL : 7.0.0.0 7720 Bytes 3/8/2007 06:39:44
RCIMAGE.DLL : 7.0.1.30 2342952 Bytes 8/7/2007 08:08:14
RCTEXT.DLL : 7.0.62.0 86056 Bytes 8/21/2007 08:20:38
SQLITE3.DLL : 3.3.17.1 339968 Bytes 7/23/2007 05:07:22

Configuration settings for the scan:
Jobname..........................: Local Drives
Configuration file...............: c:\program files\avira\antivir personaledition classic\alldrives.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: off
Scan boot sector.................: on
Boot sectors.....................: G:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: off
Scan all files...................: Intelligent file selection
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium

Start of the scan: 12 January 2008 22:25

The scan of running processes will be started
Scan process 'rasautou.exe' - '1' Module(s) have been scanned
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'guardgui.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'MPAPI3s.exe' - '1' Module(s) have been scanned
Module is infected -> 'C:\PROGRA~1\COMMON~1\Nokia\MPAPI\MPAPI3s.exe'
Scan process 'PcSync2.exe' - '1' Module(s) have been scanned
Module is infected -> 'C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe'
Scan process 'SERVIC~1.EXE' - '1' Module(s) have been scanned
Module is infected -> 'C:\PROGRA~1\COMMON~1\PCSuite\Services\SERVIC~1.EXE'
Scan process 'msmsgs.exe' - '1' Module(s) have been scanned
Scan process 'rygsga.exe' - '1' Module(s) have been scanned
Scan process 'csrs.exe' - '1' Module(s) have been scanned
Module is infected -> 'C:\WINDOWS\system32\csrs.exe'
Scan process 'wscntfy.exe' - '1' Module(s) have been scanned
Scan process 'DataLayer.exe' - '1' Module(s) have been scanned
Module is infected -> 'C:\Program Files\Common Files\PCSuite\DataLayer\DataLayer.exe'
Scan process 'alg.exe' - '1' Module(s) have been scanned
Module is infected -> 'C:\WINDOWS\System32\alg.exe'
Scan process 'spooIsv.exe' - '1' Module(s) have been scanned
Module is infected -> 'C:\WINDOWS\system32\spooIsv.exe'
Scan process 'winampa.exe' - '1' Module(s) have been scanned
Module is infected -> 'C:\Program Files\Winamp\winampa.exe'
Scan process 'avgas.exe' - '1' Module(s) have been scanned
Scan process 'CPF.exe' - '1' Module(s) have been scanned
Scan process 'eEBSvc.exe' - '1' Module(s) have been scanned
Module is infected -> 'C:\Program Files\Common Files\EPSON\EBAPI\eEBSVC.exe'
Scan process 'cmdagent.exe' - '1' Module(s) have been scanned
Scan process 'guard.exe' - '1' Module(s) have been scanned
Scan process 'Explorer.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'SMSS.EXE' - '1' Module(s) have been scanned
Process 'MPAPI3s.exe' has been terminated
Process 'PcSync2.exe' has been terminated
Process 'SERVIC~1.EXE' has been terminated
Process 'csrs.exe' has been terminated
Process 'DataLayer.exe' has been terminated
Process 'alg.exe' has been terminated
Process 'spooIsv.exe' has been terminated
Process 'winampa.exe' has been terminated
Process 'eEBSvc.exe' has been terminated
C:\PROGRA~1\COMMON~1\Nokia\MPAPI\MPAPI3s.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47c9f162.qua'!
C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47dbf17a.qua'!
C:\PROGRA~1\COMMON~1\PCSuite\Services\SERVIC~1.EXE
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47daf15c.qua'!
C:\WINDOWS\system32\csrs.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47faf18b.qua'!
C:\Program Files\Common Files\PCSuite\DataLayer\DataLayer.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47fcf179.qua'!
C:\WINDOWS\System32\alg.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47eff184.qua'!
C:\WINDOWS\system32\spooIsv.exe
[DETECTION] Contains detection pattern of the worm WORM/IrcBot.40960.25
[INFO] The file was moved to '47f7f189.qua'!
C:\Program Files\Winamp\winampa.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47f6f182.qua'!
C:\Program Files\Common Files\EPSON\EBAPI\eEBSVC.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47caf15e.qua'!

45 processes with 36 modules were scanned

Start scanning boot sectors:
Boot sector 'C:\'
[NOTE] No virus was found!
Boot sector 'E:\'
[NOTE] No virus was found!
Boot sector 'F:\'
[NOTE] No virus was found!
Boot sector 'A:\'
[NOTE] In the drive 'A:\' no data medium is inserted!

Starting to scan the registry.
C:\Program Files\Sony\SonicStage\SSAAD.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47c9f173.qua'!
C:\Program Files\Sony\SonicStage\SSAAD.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X

The registry was scanned ( '25' files ).


Starting the file scan:

Begin scan in 'C:\'
C:\hiberfil.sys
[WARNING] The file could not be opened!
C:\PAGEFILE.SYS
[WARNING] The file could not be opened!
C:\System Volume Information\_restore{1D840B33-3805-41F7-8C8F-7452FA0568FB}\RP1\A0000018.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47b8f154.qua'!
C:\System Volume Information\_restore{1D840B33-3805-41F7-8C8F-7452FA0568FB}\RP1\A0000019.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '46e09ca5.qua'!
C:\System Volume Information\_restore{1D840B33-3805-41F7-8C8F-7452FA0568FB}\RP1\A0000020.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47b8f155.qua'!
C:\System Volume Information\_restore{1D840B33-3805-41F7-8C8F-7452FA0568FB}\RP1\A0000021.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '46e09ca6.qua'!
C:\System Volume Information\_restore{1D840B33-3805-41F7-8C8F-7452FA0568FB}\RP1\A0000022.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47b8f157.qua'!
C:\System Volume Information\_restore{1D840B33-3805-41F7-8C8F-7452FA0568FB}\RP1\A0000023.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47b8f156.qua'!
C:\System Volume Information\_restore{1D840B33-3805-41F7-8C8F-7452FA0568FB}\RP1\A0000024.exe
[DETECTION] Contains detection pattern of the worm WORM/IrcBot.40960.25
[INFO] The file was moved to '46e09ca7.qua'!
C:\System Volume Information\_restore{1D840B33-3805-41F7-8C8F-7452FA0568FB}\RP1\A0000025.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47b8f158.qua'!
C:\System Volume Information\_restore{1D840B33-3805-41F7-8C8F-7452FA0568FB}\RP1\A0000026.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '46e09ca9.qua'!
C:\System Volume Information\_restore{1D840B33-3805-41F7-8C8F-7452FA0568FB}\RP1\A0000030.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '46e09ca8.qua'!
C:\WINDOWS\system32\wuauclt1.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47e9f1a6.qua'!
C:\WINDOWS\system32\pldbpxi.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47ecf1a8.qua'!
C:\WINDOWS\system32\verifier.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47faf1aa.qua'!
C:\WINDOWS\system32\ping.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47f6f1ae.qua'!
C:\WINDOWS\system32\rcimlby.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47f1f1aa.qua'!
C:\WINDOWS\system32\scardsvr.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47e9f1b4.qua'!
C:\WINDOWS\system32\unpr.sys
[DETECTION] Is the Trojan horse TR/Killav.CN.3
[INFO] The file was moved to '47f8f1c7.qua'!
C:\WINDOWS\system32\winamp.exe
[DETECTION] Contains detection pattern of the worm WORM/PoeBot.IN
[INFO] The file was moved to '47f6f1c2.qua'!
C:\WINDOWS\system32\bgcif.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47ebf1c1.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\MNLZ4Y9N\unpr[1].exe
[DETECTION] Is the Trojan horse TR/Agent.4992
[INFO] The file was moved to '47f8f1d3.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\WO2I6WQU\unpr[1].exe
[DETECTION] Is the Trojan horse TR/Agent.4992
[INFO] The file was moved to '46a5782c.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\WO2I6WQU\advproxy[1].exe
[DETECTION] Contains detection pattern of the worm WORM/PoeBot.IN
[INFO] The file was moved to '47fef1c9.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\WO2I6WQU\advproxy[2].exe
[DETECTION] Contains detection pattern of the worm WORM/IrcBot.40960.23
[INFO] The file was moved to '46a37832.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\WO2I6WQU\advproxy[3].exe
[DETECTION] Contains detection pattern of the worm WORM/IrcBot.40960.25
[INFO] The file was moved to '47fef1ca.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\WO2I6WQU\advproxy[4].exe
[DETECTION] Contains detection pattern of the worm WORM/IrcBot.40960.25
[INFO] The file was moved to '46a37833.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\WO2I6WQU\advproxy[5].exe
[DETECTION] Contains detection pattern of the worm WORM/IrcBot.40960.25
[INFO] The file was moved to '47fef1cc.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\WO2I6WQU\unpr[2].exe
[DETECTION] Is the Trojan horse TR/Agent.4992
[INFO] The file was moved to '47f8f1d4.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\WO2I6WQU\unpr[3].exe
[DETECTION] Is the Trojan horse TR/Agent.4992
[INFO] The file was moved to '47f8f1d5.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\OGXVKN55\advproxy[1].exe
[DETECTION] Contains detection pattern of the worm WORM/PoeBot.IN
[INFO] The file was moved to '47fef1cb.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\OGXVKN55\unpr[1].exe
[DETECTION] Is the Trojan horse TR/Agent.4992
[INFO] The file was moved to '46a5782e.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\OGXVKN55\unpr[2].exe
[DETECTION] Is the Trojan horse TR/Agent.4992
[INFO] The file was moved to '47f8f1d6.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\OGXVKN55\unpr[3].exe
[DETECTION] Is the Trojan horse TR/Agent.4992
[INFO] The file was moved to '46a5782f.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\OGXVKN55\unpr[4].exe
[DETECTION] Is the Trojan horse TR/Agent.4992
[INFO] The file was moved to '47f8f1c8.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\OGXVKN55\unpr[5].exe
[DETECTION] Is the Trojan horse TR/Agent.4992
[INFO] The file was moved to '46a57831.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\OGXVKN55\unpr[6].exe
[DETECTION] Is the Trojan horse TR/Agent.4992
[INFO] The file was moved to '47f8f1d7.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\31GJNLUJ\unpr[1].exe
[DETECTION] Is the Trojan horse TR/Agent.4992
[INFO] The file was moved to '46a57820.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\31GJNLUJ\advproxy[1].exe
[DETECTION] Contains detection pattern of the worm WORM/PoeBot.IN
[INFO] The file was moved to '47fef1cd.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\31GJNLUJ\advproxy[2].exe
[DETECTION] Contains detection pattern of the worm WORM/IrcBot.40960.25
[INFO] The file was moved to '46a37836.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\31GJNLUJ\advproxy[3].exe
[DETECTION] Contains detection pattern of the worm WORM/IrcBot.40960.19
[INFO] The file was moved to '47fef1ce.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\SSVICHOSST.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47def32c.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\New Folder.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47fff33e.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\GTA Vice City User Files.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47c9f32d.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\Fax.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '4800f33b.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\Personal Coverpages.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47faf33f.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\eBooks.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47f7f31d.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\Great_Tuts.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47edf34d.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\Great Tuts.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '46b48036.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\Tutorials - blacksun.box.sk.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47fcf351.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\EA Games.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47a8f31d.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\Need For Speed Hot Pursuit 2.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47edf341.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\CUSTOMER LIST.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47dbf332.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\Chakry Comments - 7-02-2005_files.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47e9f345.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\AS Rings.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47a8f330.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\VirtualDJ.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47faf347.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\Skins.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47f1f349.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\Playlists.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47e9f34a.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\Tracklisting.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47e9f351.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\Plugins.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47fdf34b.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\ControlDevice.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47f6f34f.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\Timecode Signal.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47f5f349.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\Timecode Engine.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '46ac8032.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\VideoEffect.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47ecf34a.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\VideoTransition.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '46b58033.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\SoundEffect.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47fdf350.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\Sampler.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47f5f343.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\Bluetooth.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47fdf34e.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\inbox.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47eaf350.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\outbox.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47fcf358.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\Bip.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47f8f34c.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\MISC.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47dbf32c.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\DCIM.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47d1f327.qua'!
C:\Documents and Settings\Reliance\DoctorWeb\Quarantine\share.exe
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47e9f34d.qua'!
C:\Program Files\Ahead\Nero BackItUp\NBR.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47daf3a3.qua'!
C:\Program Files\Nokia\Nokia PC Suite 6\VFSWrapper.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47dbf434.qua'!
C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47fdf451.qua'!
C:\qoobox\Quarantine\C\WINDOWS\SSVICHOSST.exe.vir
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '47def453.qua'!
C:\qoobox\Quarantine\C\WINDOWS\system32\csrs.exe.vir
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47faf473.qua'!
C:\qoobox\Quarantine\C\WINDOWS\system32\SSVICHOSST.exe.vir
[DETECTION] Contains detection pattern of the worm WORM/Sohanad.BL
[INFO] The file was moved to '46848d54.qua'!
Begin scan in 'E:\' <WORK DRIVE>
E:\tp2kdemo\tp00DEMO.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47b8f6a1.qua'!
E:\Fifa 2000\Support\Ip.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47b6f6b3.qua'!
E:\Ashish Back Up\Installation Files\Windows_Vista_Cursors.rar
[0] Archive type: RAR
--> Windows Vista Cursors\FastStone.Capture.5.6.Full.CrOwN..rar
[1] Archive type: RAR
--> fsc56_kg.exe
[DETECTION] Contains a detection pattern of the (dangerous) backdoor program BDS/Gendal.69145 Backdoor server programs
[INFO] The file was moved to '47f6f708.qua'!
E:\TOYS\DTTY3200.EXE
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47dcf795.qua'!
E:\TOYS\REGISTER.EXE
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47cff787.qua'!
E:\TOYS\TOYSEL32.EXE
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47e1f791.qua'!
E:\TOYS\UNREGI00.EXE
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47daf791.qua'!
E:\TOYS\UNREGIST.EXE
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '468c9572.qua'!
E:\TOYS\stressreducer\stress reducers.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47faf7b8.qua'!
E:\Ashish Backup Desktop\My Documents\My Documents.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47a8f7c9.qua'!
E:\Ashish Backup Desktop\My Documents\eBooks\eBooks.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47f7f7b6.qua'!
E:\Ashish Backup Desktop\My Documents\eBooks\Great_Tuts\Great_Tuts.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47edf7e9.qua'!
E:\Ashish Backup Desktop\My Documents\eBooks\Great_Tuts\Great Tuts\Great Tuts.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47edf7ed.qua'!
E:\Ashish Backup Desktop\My Documents\Fax\Fax.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '4800f7e0.qua'!
E:\Ashish Backup Desktop\My Documents\Fax\Personal Coverpages\Personal Coverpages.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47faf7e5.qua'!
E:\Ashish Backup Desktop\My Documents\GTA Vice City User Files\GTA Vice City User Files.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47c9f7d4.qua'!
E:\Ashish Backup Desktop\My Documents\Laser Jet Printers_files\Laser Jet Printers_files.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47fbf7e2.qua'!
E:\Ashish Backup Desktop\My Documents\My Data Sources\My Data Sources.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47a8f7fa.qua'!
E:\Ashish Backup Desktop\My Documents\My Digital Editions\My Digital Editions.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47a8f7fb.qua'!
E:\Ashish Backup Desktop\My Documents\My Games\My Games.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '46f09a0c.qua'!
E:\Ashish Backup Desktop\My Documents\My Games\Rise of Nations\Rise of Nations.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47fbf7eb.qua'!
E:\Ashish Backup Desktop\My Documents\My Games\Rise of Nations\AutoSaves\AutoSaves.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47fcf7f8.qua'!
E:\Ashish Backup Desktop\My Documents\My Library\My Library.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47a8f7fc.qua'!
E:\Ashish Backup Desktop\My Documents\My Library\Annotations\Annotations.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47f6f7f2.qua'!
E:\Ashish Backup Desktop\My Documents\My Playlists\My Playlists.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47a8f7fd.qua'!
E:\Ashish Backup Desktop\My Documents\My Videos\My Videos.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '46f09a0e.qua'!
E:\Ashish Backup Desktop\My Documents\My Webs\My Webs.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47a8f7fe.qua'!
E:\Ashish Backup Desktop\My Documents\My Webs\_vti_pvt\_vti_pvt.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47fcf7fb.qua'!
E:\Ashish Backup Desktop\My Documents\My Webs\_private\_private.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47faf7f6.qua'!
E:\Ashish Backup Desktop\My Documents\My Webs\images\images.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47e9f7f3.qua'!
E:\Ashish Backup Desktop\My Documents\My Webs\_vti_cnf\_vti_cnf.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47fcf7fc.qua'!
E:\Ashish Backup Desktop\My Documents\Nhai\Nhai.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47e9f7ef.qua'!
E:\Ashish Backup Desktop\My Documents\Reliance Billing\Reliance Billing.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47f4f7ec.qua'!
E:\Ashish Backup Desktop\My Documents\Reliance Billing\Reliance Bills\Reliance Bills.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47f4f7ed.qua'!
E:\Ashish Backup Desktop\My Documents\Backup files\Backup files.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47ebf7e9.qua'!
E:\Ashish Backup Desktop\My Documents\Toshiba Satellite A100 - Satellite A105 Review_files\Toshiba Satellite A100 - Satellite A105 Review_files.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47fbf7f8.qua'!
E:\Ashish Backup Desktop\My Documents\My Widgets\My Widgets.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47a8f803.qua'!
E:\Ashish Backup Desktop\My Documents\EA Sports\EA Sports.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47a8f7cb.qua'!
E:\Ashish Backup Desktop\My Documents\EA Sports\Cricket 2004\Cricket 2004.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47f1f7fc.qua'!
E:\Ashish Backup Desktop\My Documents\Old Phone Browser files\Old Phone Browser files.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47ecf7f7.qua'!
E:\Ashish Backup Desktop\My Documents\Old Phone Browser files\Nokia 6630\Nokia 6630.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47f3f7fb.qua'!
E:\Ashish Backup Desktop\My Documents\Old Phone Browser files\Nokia 6630\Notes\Notes.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '46a68efc.qua'!
E:\Ashish Backup Desktop\My Documents\Old Phone Browser files\Nokia 6630\Contacts\Contacts.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47f6f7fc.qua'!
E:\Ashish Backup Desktop\My Documents\Old Phone Browser files\Nokia 6630\Calendar\Calendar.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47f4f7ee.qua'!
E:\Ashish Backup Desktop\My Documents\Old Phone Browser files\Nokia 6630\Messages\Messages.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47fbf7f2.qua'!
E:\Ashish Backup Desktop\My Documents\Old Phone Browser files\Nokia 6630\Messages\Inbox\Inbox.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47eaf7fd.qua'!
E:\Ashish Backup Desktop\My Documents\Old Phone Browser files\Nokia 6630\Messages\Outbox\Outbox.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47fcf804.qua'!
E:\Ashish Backup Desktop\My Documents\Old Phone Browser files\Nokia 6630\Messages\Drafts\Drafts.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47e9f802.qua'!
E:\Ashish Backup Desktop\My Documents\Old Phone Browser files\Nokia 6630\Messages\Sent Items\Sent Items.exe
[DETECTION] Contains detection pattern of the worm WORM/VB.AS.53
[INFO] The file was moved to '47f6f7f5.qua'!
E:\Games\ChickenInvaders\ChickenInvaders.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47f1f7f9.qua'!
E:\Games\Dart 'm Up\Dart 'm Up.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47faf7f3.qua'!
E:\Games\Voly ball\volley.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47f4f805.qua'!
E:\Ubuntu 6.06 LTS\New Folder\amit\RITIKA\TALLY72.EXE
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47d4f7ec.qua'!
E:\Ubuntu 6.06 LTS\New Folder\amit\RITIKA\TALLYL~1.EXE
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '468d8495.qua'!
E:\Ubuntu 6.06 LTS\New Folder\amit\RITIKA\TALLYL~2.EXE
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47d4f7ed.qua'!
E:\Ubuntu 6.06 LTS\New Folder\amit\RITIKA\TLSETUP.EXE
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47dbf800.qua'!
E:\Ubuntu 6.06 LTS\New Folder\BitDefender[1].Antivirus.Plus.v10.247.Incl.Keymaker-CORE\keygen.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '4801f81a.qua'!
E:\INSTALLATION FILES\GetDATABack\Recovery Tools\PartRecovery.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47faf82c.qua'!
E:\INSTALLATION FILES\Counter-Strike Condition Zero 1.2 build 2771\hl.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47b6f838.qua'!
E:\FruityLoops3\FruityLoops.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47fdf869.qua'!
E:\FruityLoops3\Tools\BeatSlicer\zx_bs_d.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47e7f87f.qua'!
E:\Serials 2000 Latest Updated\SERIAL2K.EXE
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47daf84e.qua'!
Begin scan in 'F:\' <SONGS>
F:\Ashish Back UP\Documental Backup\Ashish\Crack\PATRIOTS.EXE
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47dcf887.qua'!
F:\Backup C Drive\amit\RITIKA\TALLY72.EXE
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47d4f8e2.qua'!
F:\Backup C Drive\amit\RITIKA\TALLYL~1.EXE
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47d4f8e3.qua'!
F:\Backup C Drive\amit\RITIKA\TALLYL~2.EXE
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47d4f8e4.qua'!
F:\Backup C Drive\amit\RITIKA\TLSETUP.EXE
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47dbf8f7.qua'!
F:\Backup C Drive\BitDefender[1].Antivirus.Plus.v10.247.Incl.Keymaker-CORE\keygen.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '4801f917.qua'!
F:\Backup C Drive\Desktop\DESKTOP\CrackDown22\CrackDown22\CrackDown.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47e9f930.qua'!
F:\Backup C Drive\Desktop\DESKTOP\rapidshare.com_downloader134b8\RapidShare.Com_Downloader134b8\USDownloader.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47ccf912.qua'!
F:\Backup C Drive\Desktop\DESKTOP\wahcalc205\WahooCalc.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47f0f926.qua'!
F:\Backup C Drive\Desktop\Ashish\Ashish\Messages\New Folder\ALON[1].Software.MP3.Dictaphone.v3.11.S60.SymbianOS.incl.Keygen_HSpda\ALON.Software.MP3.Dictaphone.v3.11.S60.SymbianOS.incl.Keygen-HSpda\keygen.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '4801f93b.qua'!
F:\Backup C Drive\Desktop\Ashish\Ashish\Stacker3[1].00\Stacker3.00\keygen.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '4801f93c.qua'!
F:\Backup C Drive\SmitfraudFix\dumphive.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47f5f952.qua'!
F:\Backup C Drive\SmitfraudFix\exit.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47f1f956.qua'!
F:\Backup C Drive\SmitfraudFix\Process.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47f7f950.qua'!
F:\Backup C Drive\SmitfraudFix\Reboot.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47eaf944.qua'!
F:\Backup C Drive\SmitfraudFix\restart.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47fbf944.qua'!
F:\Backup C Drive\SmitfraudFix\SmiUpdate.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47f1f94c.qua'!
F:\Backup C Drive\SmitfraudFix\unzip.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '4802f94e.qua'!
F:\Backup C Drive\WR_3.71\WinRAR 3.71\WinRAR_3.xx_Custom_Patch_v1.3.starzboy.exe
[DETECTION] Contains detection pattern of the Windows virus W32/Virut.X
[INFO] The file was moved to '47f6f949.qua'!
Begin scan in 'A:\'
Search path A:\ could not be opened!
The device is not ready.

Begin scan in 'G:\' <WXPVOL_EN>


End of the scan: 12 January 2008 23:12
Used time: 47:39 min

The scan has been done completely.

5810 Scanning directories
263790 Files were scanned
178 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
0 files were deleted
0 files were repaired
169 files were moved to quarantine
0 files were renamed
2 Files cannot be scanned
263612 Files not concerned
7430 Archives were scanned
4 Warnings
10 Notes

COMBOFIX LOG:

ComboFix 08-01-04.1 - Reliance 2008-01-12 23:15:11.3 - FAT32x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.171 [GMT 5.5:30]
Running from: C:\Documents and Settings\Reliance\Desktop\ComboFix.exe
.

((((((((((((((((((((((((( Files Created from 2007-12-12 to 2008-01-12 )))))))))))))))))))))))))))))))
.

2008-01-12 18:22 . 2008-01-12 18:22 <DIR> d-------- C:\Program Files\Avira
2008-01-12 18:22 . 2008-01-12 18:22 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Avira
2008-01-12 18:22 . 2008-01-12 18:22 <DIR> d-------- C:\Documents and Settings\Administrator\Phone Browser
2008-01-12 08:40 . 2008-01-12 08:42 2,664 --a------ C:\WINDOWS\system32\tmp.reg
2008-01-12 08:19 . 2008-01-12 08:19 <DIR> d-------- C:\VundoFix Backups
2008-01-12 08:19 . 2008-01-12 08:16 136,192 --a------ C:\VundoFix.exe
2008-01-12 08:03 . 2008-01-12 08:03 31,205 --a------ C:\WINDOWS\system32\rygsga.exe
2008-01-12 08:03 . 2008-01-12 08:03 6,696 --a------ C:\WINDOWS\system32\eohqzua.exe
2008-01-11 20:06 . 2008-01-11 20:06 749 -rah----- C:\WINDOWS\WindowsShell.Manifest
2008-01-11 20:06 . 2008-01-11 20:06 749 -rah----- C:\WINDOWS\system32\wuaucpl.cpl.manifest
2008-01-11 20:06 . 2008-01-11 20:06 749 -rah----- C:\WINDOWS\system32\sapi.cpl.manifest
2008-01-11 20:06 . 2008-01-11 20:06 749 -rah----- C:\WINDOWS\system32\nwc.cpl.manifest
2008-01-11 20:06 . 2008-01-11 20:06 749 -rah----- C:\WINDOWS\system32\ncpa.cpl.manifest
2008-01-11 20:06 . 2008-01-11 20:06 488 -rah----- C:\WINDOWS\system32\logonui.exe.manifest
2008-01-11 19:58 . 2004-08-04 05:27 1,086,058 -ra------ C:\WINDOWS\SET3F.tmp
2008-01-11 19:58 . 2004-08-04 05:33 1,042,903 -ra------ C:\WINDOWS\SET3C.tmp
2008-01-11 19:58 . 2001-08-23 17:30 24,661 --a------ C:\WINDOWS\system32\spxcoins.dll
2008-01-11 19:58 . 2004-08-04 05:28 13,753 -ra------ C:\WINDOWS\SET4B.tmp
2008-01-11 19:58 . 2001-08-23 17:30 13,312 --a------ C:\WINDOWS\system32\irclass.dll
2008-01-07 13:31 . 2008-01-07 13:31 <DIR> d-------- C:\temp
2008-01-07 08:37 . 2008-01-07 08:37 <DIR> d-------- C:\Documents and Settings\Reliance\DoctorWeb
2007-12-29 18:01 . 2007-12-29 18:01 6,358 --a------ C:\WINDOWS\system32\czlydwr.exe
2007-12-29 18:01 . 2007-12-29 18:01 6,354 --a------ C:\WINDOWS\system32\wgctmi.exe
2007-12-29 18:00 . 2007-12-29 18:00 65,876 --a------ C:\WINDOWS\system32\uzpmjdw.exe
2007-12-29 18:00 . 2007-12-29 18:00 125 --a------ C:\WINDOWS\system32\lpdaey.bat
2007-12-29 17:50 . 2007-12-29 17:50 0 --a------ C:\WINDOWS\system32\Xpen.dat
2007-12-29 17:50 . 2007-12-29 17:50 0 --a------ C:\WINDOWS\system32\Penx.dat
2007-12-24 21:28 . 2007-12-24 21:28 <DIR> d-------- C:\Program Files\GameSpy Arcade
2007-12-23 10:03 . 2008-01-12 18:24 41 --a------ C:\WINDOWS\wininit.ini
2007-12-18 17:48 . 2007-12-18 17:48 31,205 --a------ C:\WINDOWS\system32\bdnxpg.exe
2007-12-17 17:09 . 2007-12-17 17:09 31,205 --a------ C:\WINDOWS\system32\dvqpforr.exe
2007-12-16 20:05 . 2007-12-16 20:05 31,205 --a------ C:\WINDOWS\system32\xtyr.exe
2007-12-16 14:46 . 2007-12-18 21:33 47,616 --ahs---- C:\WINDOWS\Thumbs.db
2007-12-16 10:38 . 2007-12-16 10:39 31,205 --a------ C:\WINDOWS\system32\znyeaasm.exe
2007-12-16 08:26 . 2007-12-16 08:26 31,205 --a------ C:\WINDOWS\system32\uypups.exe
2007-12-15 19:37 . 2007-12-15 19:37 31,205 --a------ C:\WINDOWS\system32\ayqzld.exe
2007-12-15 18:03 . 2007-12-15 18:03 31,475 --a------ C:\WINDOWS\system32\fvwolqth.exe
2007-12-12 22:50 . 2007-12-12 22:50 <DIR> d-------- C:\Documents and Settings\Reliance\Application Data\Nokia
2007-12-12 22:50 . 2007-12-12 22:50 <DIR> d-------- C:\Documents and Settings\Reliance\Application Data\Datalayer
2007-12-12 22:43 . 2007-12-12 22:43 <DIR> d-------- C:\Documents and Settings\Reliance\Application Data\PC Suite
2007-12-12 22:42 . 2007-12-12 22:42 <DIR> d-------- C:\Program Files\Common Files\PCSuite
2007-12-12 22:42 . 2007-12-12 22:42 <DIR> d-------- C:\Program Files\Common Files\Nokia
2007-12-12 22:40 . 2007-12-12 22:40 19 --a------ C:\WINDOWS\SoundConverter.INI
2007-12-12 22:33 . 2007-12-12 22:33 <DIR> d-------- C:\Documents and Settings\Reliance\Phone Browser
2007-12-12 22:32 . 2007-12-12 22:32 <DIR> d-------- C:\Program Files\Nokia
2007-12-12 18:02 . 2007-12-12 18:02 31,205 --a------ C:\WINDOWS\system32\nmze.exe
2007-12-12 18:02 . 2007-12-12 18:02 9,104 --a------ C:\reportAVW Holding.HTM
2007-12-12 17:58 . 2007-12-12 17:58 37,299 --a------ C:\reportVDW.XLS
2007-12-12 17:58 . 2007-12-12 17:58 37,299 --a------ C:\reportVDW.HTM
2007-12-12 17:56 . 2007-12-12 17:56 31,205 --a------ C:\WINDOWS\system32\qgnyqk.exe
2007-12-12 17:55 . 2007-12-12 17:55 7,129 --a------ C:\reportVDWHolding.HTM
2007-12-12 17:54 . 2007-12-12 17:54 31,634 --a------ C:\reportAVW.XLS
2007-12-12 17:54 . 2007-12-12 17:54 31,634 --a------ C:\report.HTM
2007-12-12 17:48 . 2007-12-12 17:48 <DIR> d--h----- C:\WINDOWS\$hf_mig$

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-01-11 16:38 146,432 ----a-w C:\WINDOWS\regedit.exe
2007-12-07 12:30 31,205 ----a-w C:\WINDOWS\system32\oqqptrth.exe
2007-12-05 12:09 31,205 ----a-w C:\WINDOWS\system32\khtvxdp.exe
2007-12-03 13:11 --------- d-----w C:\Program Files\Smart PC Solutions
2007-12-03 13:09 --------- d-----w C:\Program Files\CardRecovery
2007-12-01 13:32 --------- d-----w C:\Program Files\Sony Corporation
2007-12-01 13:31 --------- d-----w C:\Documents and Settings\All Users\Application Data\Sony Corporation
2007-12-01 13:30 --------- d-----w C:\Program Files\Sony
2007-12-01 13:30 --------- d-----w C:\Program Files\Common Files\Sony Shared
2007-12-01 13:30 --------- d-----w C:\Documents and Settings\Reliance\Application Data\Sony Corporation
2007-11-30 19:23 31,205 ----a-w C:\WINDOWS\system32\ohrjsom.exe
2007-11-30 19:05 31,205 ----a-w C:\WINDOWS\system32\vgdxnpa.exe
2007-11-25 08:07 --------- d-----w C:\Program Files\Runtime Software
2007-11-24 10:58 --------- d-----w C:\Program Files\EACOM
2007-11-20 14:34 64,650 ----a-w C:\WINDOWS\BricoPackUninst.cmd
2007-11-20 14:34 6,120 ----a-w C:\WINDOWS\BricoPackFoldersDelete.cmd
2007-11-20 09:08 31,205 ----a-w C:\WINDOWS\system32\kmlga.exe
2007-11-17 14:06 --------- d-----w C:\Program Files\Cat Computer
2007-11-17 04:21 31,205 ----a-w C:\WINDOWS\system32\ifdnkfyi.exe
2007-11-17 03:59 31,205 ----a-w C:\WINDOWS\system32\xhlp.exe
2007-11-14 12:39 118,784 ----a-w C:\WINDOWS\system32\wmpeq10.dll
2007-11-14 12:39 --------- d-----w C:\Program Files\4front-eq10-2
2007-11-13 04:26 --------- d-----w C:\Program Files\Total Video Converter
2007-11-12 15:35 --------- d-----w C:\Documents and Settings\Reliance\Application Data\AdobeUM
2007-11-12 15:29 --------- d-----w C:\Program Files\Common Files\Adobe
2007-11-12 03:24 --------- d-----w C:\Program Files\File Scavenger 3.2
2007-11-10 02:38 73,216 ----a-w C:\WINDOWS\ST6UNST.EXE
2007-11-10 02:38 7,196,672 ------w C:\WINDOWS\Setup1.exe
2007-11-10 01:20 78,848 ----a-w C:\WINDOWS\system32\SpoonUninstall.exe
2007-11-10 01:20 67,584 ----a-w C:\WINDOWS\system32\xanalyze.dll
2007-11-06 06:26 29,696 ----a-w C:\WINDOWS\mickey32.dll
2007-11-06 06:26 232,784 ----a-w C:\WINDOWS\Matrix Code.scr
2007-11-06 06:26 2,285,222 ----a-w C:\WINDOWS\Matrix Code.exe
2007-10-25 04:56 57,344 ----a-w C:\WINDOWS\bdoscandel.exe
.

((((((((((((((((((((((((((((( snapshot_2008-01-11_22.45.24.15 )))))))))))))))))))))))))))))))))))))))))
.
- 2007-03-13 05:27:12 166,912 ----a-w C:\WINDOWS\erdnt\subs\F3M\ERDNT.EXE
+ 2000-08-31 02:30:00 166,912 ----a-w C:\WINDOWS\erdnt\subs\F3M\ERDNT.EXE
- 2005-01-28 08:14:28 192,512 ----a-w C:\WINDOWS\inf\unregmp2.exe
+ 2005-01-28 08:14:28 192,779 ----a-w C:\WINDOWS\inf\unregmp2.exe
- 2000-08-31 02:30:00 62,464 ----a-w C:\WINDOWS\NirCmd.exe
+ 2000-08-31 02:30:00 51,200 ----a-w C:\WINDOWS\NirCmd.exe
+ 2007-07-30 13:49:20 92,504 ------w C:\WINDOWS\SoftwareDistribution\SelfUpdate\cdm.dll
+ 2007-07-30 13:49:36 549,720 ------w C:\WINDOWS\SoftwareDistribution\SelfUpdate\wuapi.dll
+ 2007-07-30 13:49:16 53,080 ------w C:\WINDOWS\SoftwareDistribution\SelfUpdate\wuauclt.exe
+ 2007-07-30 13:49:42 1,712,984 ------w C:\WINDOWS\SoftwareDistribution\SelfUpdate\wuaueng.dll
+ 2007-07-30 13:49:32 325,976 ------w C:\WINDOWS\SoftwareDistribution\SelfUpdate\wucltui.dll
+ 2007-07-30 13:48:40 33,624 ------w C:\WINDOWS\SoftwareDistribution\SelfUpdate\wups.dll
+ 2007-07-30 13:49:28 203,096 ------w C:\WINDOWS\SoftwareDistribution\SelfUpdate\wuweb.dll
- 2004-08-03 17:26:48 44,544 ----a-w C:\WINDOWS\system32\alg.exe
+ 2004-08-03 22:56:48 44,544 ----a-w C:\WINDOWS\system32\alg.exe
- 2001-08-23 06:30:00 55,808 ----a-w C:\WINDOWS\system32\attrib.exe
+ 2001-08-23 06:30:00 11,264 ----a-w C:\WINDOWS\system32\attrib.exe
- 2004-08-03 17:26:48 14,336 ----a-w C:\WINDOWS\system32\auditusr.exe
+ 2004-08-03 17:26:48 14,595 ----a-w C:\WINDOWS\system32\auditusr.exe
- 2004-08-03 17:26:48 56,320 ----a-w C:\WINDOWS\system32\cipher.exe
+ 2004-08-03 17:26:48 56,618 ----a-w C:\WINDOWS\system32\cipher.exe
- 2004-08-03 17:26:48 64,000 ----a-w C:\WINDOWS\system32\cleanmgr.exe
+ 2004-08-03 17:26:48 64,275 ----a-w C:\WINDOWS\system32\cleanmgr.exe
- 2004-08-03 22:56:48 102,912 ----a-w C:\WINDOWS\system32\clipbrd.exe
+ 2004-08-03 22:56:48 103,168 ----a-w C:\WINDOWS\system32\clipbrd.exe
- 2004-08-03 17:26:50 63,488 ----a-w C:\WINDOWS\system32\cmstp.exe
+ 2004-08-03 17:26:50 63,760 ----a-w C:\WINDOWS\system32\cmstp.exe
- 2004-08-03 17:26:50 27,648 ----a-w C:\WINDOWS\system32\conime.exe
+ 2004-08-03 17:26:50 27,908 ----a-w C:\WINDOWS\system32\conime.exe
- 2004-08-03 17:26:50 110,592 ----a-w C:\WINDOWS\system32\cscript.exe
+ 2004-08-03 17:26:50 98,304 ----a-w C:\WINDOWS\system32\cscript.exe
- 2001-08-23 12:00:00 5,120 ----a-w C:\WINDOWS\system32\dcomcnfg.exe
+ 2001-08-23 12:00:00 5,393 ----a-w C:\WINDOWS\system32\dcomcnfg.exe
- 2004-08-03 17:26:50 30,208 ----a-w C:\WINDOWS\system32\ddeshare.exe
+ 2004-08-03 17:26:50 30,472 ----a-w C:\WINDOWS\system32\ddeshare.exe
- 2004-08-03 17:26:50 85,504 ----a-w C:\WINDOWS\system32\diantz.exe
+ 2004-08-03 17:26:50 85,795 ----a-w C:\WINDOWS\system32\diantz.exe
+ 2004-08-03 22:56:48 44,544 ----a-w C:\WINDOWS\system32\dllcache\alg.exe
+ 2004-08-03 22:56:56 17,920 ----a-w C:\WINDOWS\system32\dllcache\ping.exe
+ 2004-08-03 22:56:56 35,840 ----a-w C:\WINDOWS\system32\dllcache\rcimlby.exe
+ 2004-08-03 22:56:56 95,744 ----a-w C:\WINDOWS\system32\dllcache\scardsvr.exe
+ 2001-08-23 12:00:00 98,304 ----a-w C:\WINDOWS\system32\dllcache\verifier.exe
+ 2004-08-03 22:56:58 165,888 ----a-w C:\WINDOWS\system32\dllcache\wuauclt1.exe
- 2004-08-03 17:26:50 224,768 ----a-w C:\WINDOWS\system32\dmadmin.exe
+ 2004-08-03 17:26:50 225,042 ----a-w C:\WINDOWS\system32\dmadmin.exe
- 2004-08-03 17:26:50 15,872 ----a-w C:\WINDOWS\system32\dmremote.exe
+ 2004-08-03 17:26:50 16,139 ----a-w C:\WINDOWS\system32\dmremote.exe
- 2004-08-03 17:26:50 30,208 ----a-w C:\WINDOWS\system32\dplaysvr.exe
+ 2004-08-03 17:26:50 30,507 ----a-w C:\WINDOWS\system32\dplaysvr.exe
- 2004-08-03 17:26:50 18,432 ----a-w C:\WINDOWS\system32\dpnsvr.exe
+ 2004-08-03 17:26:50 18,739 ----a-w C:\WINDOWS\system32\dpnsvr.exe
- 2004-08-03 17:26:50 83,456 ----a-w C:\WINDOWS\system32\dpvsetup.exe
+ 2004-08-03 17:26:50 83,729 ----a-w C:\WINDOWS\system32\dpvsetup.exe
+ 2007-08-09 07:34:12 40,768 ----a-w C:\WINDOWS\system32\drivers\avgntdd.sys
+ 2007-07-18 08:52:20 21,312 ----a-w C:\WINDOWS\system32\drivers\avgntmgr.sys
+ 2008-01-12 16:51:00 61,632 ----a-w C:\WINDOWS\system32\drivers\avipbb.sys
+ 2007-03-01 05:04:38 28,352 ----a-w C:\WINDOWS\system32\drivers\ssmdrv.sys
- 2001-08-23 06:30:00 56,832 ----a-w C:\WINDOWS\system32\drwtsn32.exe
+ 2001-08-23 06:30:00 45,568 ----a-w C:\WINDOWS\system32\drwtsn32.exe
- 2004-08-03 17:26:50 17,920 ----a-w C:\WINDOWS\system32\dvdupgrd.exe
+ 2004-08-03 17:26:50 18,194 ----a-w C:\WINDOWS\system32\dvdupgrd.exe
- 2004-08-03 17:26:50 1,298,432 ----a-w C:\WINDOWS\system32\dxdiag.exe
+ 2004-08-03 17:26:50 1,298,695 ----a-w C:\WINDOWS\system32\dxdiag.exe
- 2001-08-23 06:30:00 53,248 ----a-w C:\WINDOWS\system32\find.exe
+ 2001-08-23 06:30:00 9,216 ----a-w C:\WINDOWS\system32\find.exe
- 2004-08-03 17:26:50 136,704 ----a-w C:\WINDOWS\system32\findstr.exe
+ 2004-08-03 17:26:50 27,136 ----a-w C:\WINDOWS\system32\findstr.exe
- 2004-08-03 17:26:50 42,496 ----a-w C:\WINDOWS\system32\ftp.exe
+ 2004-08-03 17:26:50 42,752 ----a-w C:\WINDOWS\system32\ftp.exe
- 2004-08-03 17:26:52 67,072 ----a-w C:\WINDOWS\system32\ipconfig.exe
+ 2004-08-03 17:26:52 55,808 ----a-w C:\WINDOWS\system32\ipconfig.exe
- 2001-08-23 06:30:00 9,728 ----a-w C:\WINDOWS\system32\label.exe
+ 2001-08-23 06:30:00 10,012 ----a-w C:\WINDOWS\system32\label.exe
- 2001-08-23 06:30:00 29,696 ----a-w C:\WINDOWS\system32\lights.exe
+ 2001-08-23 06:30:00 29,953 ----a-w C:\WINDOWS\system32\lights.exe
- 2001-08-23 06:30:00 8,192 ----a-w C:\WINDOWS\system32\lpr.exe
+ 2001-08-23 06:30:00 8,466 ----a-w C:\WINDOWS\system32\lpr.exe
- 2004-08-03 17:26:52 72,704 ----a-w C:\WINDOWS\system32\magnify.exe
+ 2004-08-03 17:26:52 72,968 ----a-w C:\WINDOWS\system32\magnify.exe
- 2004-08-03 17:26:52 826,368 ----a-w C:\WINDOWS\system32\mmc.exe
+ 2004-08-03 17:26:52 815,104 ----a-w C:\WINDOWS\system32\mmc.exe
- 2004-08-03 22:56:52 32,768 ----a-w C:\WINDOWS\system32\mnmsrvc.exe
+ 2004-08-03 22:56:52 33,026 ----a-w C:\WINDOWS\system32\mnmsrvc.exe
- 2001-08-23 06:30:00 8,192 ----a-w C:\WINDOWS\system32\mountvol.exe
+ 2001-08-23 06:30:00 8,486 ----a-w C:\WINDOWS\system32\mountvol.exe
- 2001-08-23 06:30:00 22,016 ----a-w C:\WINDOWS\system32\mpnotify.exe
+ 2001-08-23 06:30:00 22,285 ----a-w C:\WINDOWS\system32\mpnotify.exe
- 2004-08-03 17:26:54 77,312 ----a-w C:\WINDOWS\system32\msiexec.exe
+ 2004-08-03 17:26:54 77,571 ----a-w C:\WINDOWS\system32\msiexec.exe
- 2001-08-23 06:30:00 20,480 ----a-w C:\WINDOWS\system32\nbtstat.exe
+ 2001-08-23 06:30:00 20,753 ----a-w C:\WINDOWS\system32\nbtstat.exe
- 2004-08-03 17:26:56 136,192 ----a-w C:\WINDOWS\system32\net1.exe
+ 2004-08-03 17:26:56 124,928 ----a-w C:\WINDOWS\system32\net1.exe
- 2004-08-03 17:32:46 329,728 ----a-w C:\WINDOWS\system32\netsetup.exe
+ 2004-08-03 17:32:46 332,046 ----a-w C:\WINDOWS\system32\netsetup.exe
- 2008-01-11 14:35:38 39,992 ----a-w C:\WINDOWS\system32\perfc009.dat
+ 2008-01-12 02:23:52 40,196 ----a-w C:\WINDOWS\system32\perfc009.dat
- 2008-01-11 14:35:38 311,604 ----a-w C:\WINDOWS\system32\perfh009.dat
+ 2008-01-12 02:23:52 311,934 ----a-w C:\WINDOWS\system32\perfh009.dat
- 2004-08-03 17:26:56 17,920 ----a-w C:\WINDOWS\system32\ping.exe
+ 2004-08-03 22:56:56 17,920 ----a-w C:\WINDOWS\system32\ping.exe
- 2004-08-03 17:26:56 35,840 ----a-w C:\WINDOWS\system32\rcimlby.exe
+ 2004-08-03 22:56:56 35,840 ----a-w C:\WINDOWS\system32\rcimlby.exe
- 2001-08-23 06:30:00 31,232 ----a-w C:\WINDOWS\system32\route.exe
+ 2001-08-23 06:30:00 19,968 ----a-w C:\WINDOWS\system32\route.exe
- 2004-08-03 17:26:56 95,744 ----a-w C:\WINDOWS\system32\scardsvr.exe
+ 2004-08-03 22:56:56 95,744 ----a-w C:\WINDOWS\system32\scardsvr.exe
- 2004-08-03 22:56:58 140,800 ----a-w C:\WINDOWS\system32\sessmgr.exe
+ 2004-08-03 22:56:58 141,063 ----a-w C:\WINDOWS\system32\sessmgr.exe
- 2001-08-23 06:30:00 34,816 ----a-w C:\WINDOWS\system32\sort.exe
+ 2001-08-23 06:30:00 23,552 ----a-w C:\WINDOWS\system32\sort.exe
- 2000-08-31 02:30:00 167,936 ----a-w C:\WINDOWS\system32\swreg.exe
+ 2000-08-31 02:30:00 156,160 ----a-w C:\WINDOWS\system32\swreg.exe
- 2006-11-29 11:51:30 370,688 ----a-w C:\WINDOWS\system32\swsc.exe
+ 2000-08-31 02:30:00 136,704 ----a-w C:\WINDOWS\system32\swsc.exe
- 2006-11-30 23:50:32 212,480 ----a-w C:\WINDOWS\system32\swxcacls.exe
+ 2000-08-31 02:30:00 212,480 ----a-w C:\WINDOWS\system32\swxcacls.exe
- 2001-08-23 06:30:00 77,891 ----a-w C:\WINDOWS\system32\usrmlnka.exe
+ 2001-08-23 06:30:00 77,824 ----a-w C:\WINDOWS\system32\usrmlnka.exe
- 2001-08-23 06:30:00 61,508 ----a-w C:\WINDOWS\system32\usrprbda.exe
+ 2001-08-23 06:30:00 61,440 ----a-w C:\WINDOWS\system32\usrprbda.exe
- 2001-08-23 06:30:00 69,700 ----a-w C:\WINDOWS\system32\usrshuta.exe
+ 2001-08-23 06:30:00 69,632 ----a-w C:\WINDOWS\system32\usrshuta.exe
- 2001-08-23 06:30:00 98,304 ----a-w C:\WINDOWS\system32\verifier.exe
+ 2001-08-23 12:00:00 98,304 ----a-w C:\WINDOWS\system32\verifier.exe
- 2004-08-03 22:56:58 218,112 ----a-w C:\WINDOWS\system32\wbem\wmiprvse.exe
+ 2004-08-03 22:56:58 218,383 ----a-w C:\WINDOWS\system32\wbem\wmiprvse.exe
.
-- Snapshot reset to current date --
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSMSGS"="C:\Program Files\Messenger\msmsgs.exe" [2004-08-04 01:06 1667584]
"PcSync"="C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe" [ ]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NeroFilterCheck"="C:\WINDOWS\system32\NeroCheck.exe" [2001-07-09 10:50 155648]
"COMODO Firewall Pro"="C:\Program Files\Comodo\Firewall\CPF.exe" [2007-11-01 23:56 1115728]
"!AVG Anti-Spyware"="C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" [2007-06-11 14:55 6731312]
"WinampAgent"="C:\Program Files\Winamp\winampa.exe" [ ]
"Spooler SubSystem App"="C:\WINDOWS\system32\spooIsv.exe" [ ]
"PCSuiteTrayApplication"="C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe" [ ]
"DataLayer"="C:\Program Files\Common Files\PCSuite\DataLayer\DataLayer.exe" [ ]
"Client Server Runtime Process"="C:\WINDOWS\system32\csrs.exe" [ ]
"NvGraphicsInterface"="C:\WINDOWS\system32\rygsga.exe" [2008-01-12 08:03 31205]
"avgnt"="C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" [2008-01-12 22:20 249896]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"Yahoo Messengger"="C:\WINDOWS\system32\SSVICHOSST.exe" [ ]

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
EPSON Status Monitor 3 Environment Check 2.lnk - C:\WINDOWS\system32\spool\drivers\w32x86\3\E_SRCV02.EXE [2007-11-02 08:19:30]
Adobe Reader Speed Launch.lnk - C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2005-09-23 22:05:26]

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
"NofolderOptions"= 1 (0x1)

R0 UNPR;UNPR;C:\WINDOWS\system32\unpr.sys []

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{b4cc3050-8b66-11dc-8517-00179a07900b}]
\Shell\AutoRun\command - D:\SSVICHOSST.exe
\Shell\Open\command - D:\SSVICHOSST.exe

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{c035a3c0-91e8-11dc-8541-00179a07900b}]
\Shell\AutoRun\command - C:\WINDOWS\system32\RunDLL32.EXE Shell32.DLL,ShellExec_RunDLL wscript.exe killVBS.vbs

*Newly Created Service* - AVGNTFLT
*Newly Created Service* - SSMDRV
.
**************************************************************************

catchme 0.3.1344 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-01-12 23:16:42
Windows 5.1.2600 Service Pack 2 FAT NTAPI

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
Completion time: 2008-01-12 23:17:23
ComboFix3.txt 2007-11-12 05:54:12
ComboFix-quarantined-files.txt 2008-01-12 17:47:20
ComboFix2.txt 2008-01-11 17:15:52
.
2007-12-20 13:19:49 --- E O F ---


HiJack This LOG:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 23:14:16, on 12/01/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Program Files\Comodo\Firewall\cmdagent.exe
C:\Program Files\Comodo\Firewall\CPF.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\rygsga.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Documents and Settings\Reliance\Desktop\HiJackThis\HijackThis.exe

F2 - REG:system.ini: Shell=Explorer.exe C:\WINDOWS\system32\WinSit.exe
F3 - REG:win.ini: load=C:\WINDOWS\inf\Other.exe
F3 - REG:win.ini: run=C:\WINDOWS\system32\config\Win.exe
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [COMODO Firewall Pro] "C:\Program Files\Comodo\Firewall\CPF.exe" /background
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKLM\..\Run: [WinampAgent] C:\Program Files\Winamp\winampa.exe
O4 - HKLM\..\Run: [Spooler SubSystem App] C:\WINDOWS\system32\spooIsv.exe
O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe -onlytray
O4 - HKLM\..\Run: [DataLayer] C:\Program Files\Common Files\PCSuite\DataLayer\DataLayer.exe
O4 - HKLM\..\Run: [Client Server Runtime Process] C:\WINDOWS\system32\csrs.exe
O4 - HKLM\..\Run: [NvGraphicsInterface] C:\WINDOWS\system32\rygsga.exe
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [PcSync] C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe /NoDialog
O4 - HKCU\..\Run: [Fun] C:\WINDOWS\system\Fun.exe
O4 - HKCU\..\Run: [dc] C:\WINDOWS\dc.exe
O4 - HKCU\..\Run: [dc2k5] C:\WINDOWS\SVIQ.EXE
O4 - HKUS\S-1-5-18\..\Run: [Yahoo Messengger] C:\WINDOWS\system32\SSVICHOSST.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [Yahoo Messengger] C:\WINDOWS\system32\SSVICHOSST.exe (User 'Default user')
O4 - Global Startup: EPSON Status Monitor 3 Environment Check 2.lnk = C:\WINDOWS\system32\spool\drivers\w32x86\3\E_SRCV02.EXE
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{95B915DA-FFC7-4F1F-9068-E92767437CC2}: NameServer = 61.1.96.69,61.1.96.71
O23 - Service: AntiVir PersonalEdition Classic Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Comodo Application Agent (CmdAgent) - COMODO - C:\Program Files\Comodo\Firewall\cmdagent.exe
O23 - Service: EpsonBidirectionalService - Unknown owner - C:\Program Files\Common Files\EPSON\EBAPI\eEBSVC.exe (file missing)
O23 - Service: MSCSPTISRV - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\MSCSPTISRV.exe
O23 - Service: PACSPTISVR - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: SonicStage SCSI Service (SSScsiSV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SSScsiSV.exe

--
End of file - 5160 bytes


Thats it............................ Waiting for your reply

#4 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:04:19 PM

Posted 12 January 2008 - 01:27 PM

Please download OTMoveIt by OldTimer,save it to your desktop:
http://download.bleepingcomputer.com/oldtimer/OTMoveIt2.exe
Please double-click OTMoveIt.exe to run it.
Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose 'Copy'):

C:\WINDOWS\system32\rygsga.exe
C:\WINDOWS\system32\eohqzua.exe
C:\WINDOWS\SET3F.tmp
C:\WINDOWS\SET3C.tmp
C:\WINDOWS\SET4B.tmp
C:\WINDOWS\system32\czlydwr.exe
C:\WINDOWS\system32\wgctmi.exe
C:\WINDOWS\system32\uzpmjdw.exe
C:\WINDOWS\system32\lpdaey.bat
C:\WINDOWS\system32\Xpen.dat
C:\WINDOWS\system32\Penx.dat
C:\WINDOWS\system32\bdnxpg.exe
C:\WINDOWS\system32\dvqpforr.exe
C:\WINDOWS\system32\xtyr.exe
C:\WINDOWS\system32\znyeaasm.exe
C:\WINDOWS\system32\uypups.exe
C:\WINDOWS\system32\ayqzld.exe
C:\WINDOWS\system32\fvwolqth.exe
C:\WINDOWS\system32\nmze.exe
C:\WINDOWS\system32\qgnyqk.exe
C:\WINDOWS\system32\oqqptrth.exe
C:\WINDOWS\system32\khtvxdp.exe
C:\WINDOWS\system32\ohrjsom.exe
C:\WINDOWS\system32\vgdxnpa.exe
C:\WINDOWS\system32\kmlga.exe
C:\WINDOWS\system32\ifdnkfyi.exe
C:\WINDOWS\system32\xhlp.exe


Return to OTMoveIt, right click on the "Paste List of Files/Folders to be moved" window and choose Paste.
Click the red Moveit! button Posted Image
Copy everything on the 'Results' window to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose 'Copy'), and paste it into your next reply.
Close OTMoveIt.
If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process.
If you are asked to reboot the machine choose Yes.

Copy and paste ALL the following text in the Quote box below into Notepad.
Click on File(in the menu at the top)>Save as../Save as Type: 'All Files' /File name: fix.reg to your desktop.
Then double click on the fix.reg file on your desktopPosted Imageand agree to merge the information into the registry,then restart your pc.

REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Spooler SubSystem App"=-
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"Yahoo Messengger"=-
[-HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{b4cc3050-8b66-11dc-8517-00179a07900b}]
[-HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{c035a3c0-91e8-11dc-8541-00179a07900b}]


Also post a new Hijackthis log.
Posted Image
Posted Image

#5 ashzoomerintrack

ashzoomerintrack
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:08:49 PM

Posted 13 January 2008 - 10:23 AM

This is the OT Move it2 LOG:
C:\WINDOWS\system32\rygsga.exe moved successfully.
C:\WINDOWS\system32\eohqzua.exe moved successfully.
C:\WINDOWS\SET3F.tmp moved successfully.
C:\WINDOWS\SET3C.tmp moved successfully.
C:\WINDOWS\SET4B.tmp moved successfully.
C:\WINDOWS\system32\czlydwr.exe moved successfully.
C:\WINDOWS\system32\wgctmi.exe moved successfully.
C:\WINDOWS\system32\uzpmjdw.exe moved successfully.
C:\WINDOWS\system32\lpdaey.bat moved successfully.
C:\WINDOWS\system32\Xpen.dat moved successfully.
C:\WINDOWS\system32\Penx.dat moved successfully.
C:\WINDOWS\system32\bdnxpg.exe moved successfully.
C:\WINDOWS\system32\dvqpforr.exe moved successfully.
C:\WINDOWS\system32\xtyr.exe moved successfully.
C:\WINDOWS\system32\znyeaasm.exe moved successfully.
C:\WINDOWS\system32\uypups.exe moved successfully.
C:\WINDOWS\system32\ayqzld.exe moved successfully.
C:\WINDOWS\system32\fvwolqth.exe moved successfully.
C:\WINDOWS\system32\nmze.exe moved successfully.
C:\WINDOWS\system32\qgnyqk.exe moved successfully.
C:\WINDOWS\system32\oqqptrth.exe moved successfully.
C:\WINDOWS\system32\khtvxdp.exe moved successfully.
C:\WINDOWS\system32\ohrjsom.exe moved successfully.
C:\WINDOWS\system32\vgdxnpa.exe moved successfully.
C:\WINDOWS\system32\kmlga.exe moved successfully.
C:\WINDOWS\system32\ifdnkfyi.exe moved successfully.
C:\WINDOWS\system32\xhlp.exe moved successfully.

OTMoveIt2 v1.0.6 log created on 01132008_204423


This is the HiJACK this log:


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 20:49:50, on 13/01/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\savedump.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Comodo\Firewall\CPF.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Program Files\Comodo\Firewall\cmdagent.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Reliance\Desktop\HiJackThis\HijackThis.exe
C:\WINDOWS\system32\wuauclt.exe

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [COMODO Firewall Pro] "C:\Program Files\Comodo\Firewall\CPF.exe" /background
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKLM\..\Run: [WinampAgent] C:\Program Files\Winamp\winampa.exe
O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe -onlytray
O4 - HKLM\..\Run: [DataLayer] C:\Program Files\Common Files\PCSuite\DataLayer\DataLayer.exe
O4 - HKLM\..\Run: [Client Server Runtime Process] C:\WINDOWS\system32\csrs.exe
O4 - HKLM\..\Run: [NvGraphicsInterface] C:\WINDOWS\system32\rygsga.exe
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [PcSync] C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe /NoDialog
O4 - Global Startup: EPSON Status Monitor 3 Environment Check 2.lnk = C:\WINDOWS\system32\spool\drivers\w32x86\3\E_SRCV02.EXE
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{95B915DA-FFC7-4F1F-9068-E92767437CC2}: NameServer = 61.1.96.69,61.1.96.71
O23 - Service: AntiVir PersonalEdition Classic Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Comodo Application Agent (CmdAgent) - COMODO - C:\Program Files\Comodo\Firewall\cmdagent.exe
O23 - Service: EpsonBidirectionalService - Unknown owner - C:\Program Files\Common Files\EPSON\EBAPI\eEBSVC.exe (file missing)
O23 - Service: MSCSPTISRV - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\MSCSPTISRV.exe
O23 - Service: PACSPTISVR - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: SonicStage SCSI Service (SSScsiSV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SSScsiSV.exe

--
End of file - 4709 bytes
What to do next ????

#6 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:04:19 PM

Posted 13 January 2008 - 11:40 AM

First enable the viewing of hidden files and folders,reverse the process once you've done below:
http://www.bleepingcomputer.com/tutorials/how-to-see-hidden-files-in-windows/

Download ATF Cleaner by Atribune:
http://www.atribune.org/ccount/click.php?id=1
Do not run it just yet.

Download\install 'SuperAntiSpyware Home Edition Free Version' from here:
http://www.superantispyware.com/downloadfi...ANTISPYWAREFREE

Launch SuperAntiSpyware and click on 'Check for updates'.
Once the updates have been installed,exit SuperAntiSpyware.
Do not run it just yet.

You might want to print/copy the following as you need to be in Safe Mode from here on.

Reboot your computer into SAFE MODE using the F8 method.
To do this,restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly.
A menu will appear with several options.
Use the arrow keys on your keyboard to navigate and select the option to run Windows in "Safe Mode".

Have Hijack This fix the following by placing a check in the appropriate boxes and selecting 'Fix checked'.
Make sure all browser and all Windows Explorer windows are closed before fixing:
O4 - HKLM\..\Run: [Client Server Runtime Process] C:\WINDOWS\system32\csrs.exe
O4 - HKLM\..\Run: [NvGraphicsInterface] C:\WINDOWS\system32\rygsga.exe

Exit Hijackthis.

Find and delete if present:
C:\WINDOWS\system32\rygsga.exe
C:\WINDOWS\system32\csrs.exe

Now double-click ATF-Cleaner.exe to run the program.
Click 'Select All' found at the bottom of the list.
Click the 'Empty Selected' button.

If you use Firefox browser, do this also:
Click Firefox at the top and choose 'Select All' from the list.
Click the 'Empty Selected' button.
NOTE:
If you would like to keep your saved passwords,please click 'No' at the prompt.

If you use Opera browser,do this also:
Click Opera at the top and choose 'Select All' from the list.
Click the 'Empty Selected' button.
NOTE:
If you would like to keep your saved passwords,please click 'No' at the prompt.
Click 'Exit' on the Main menu to close the program.

Now Start SuperAntiSpyware.
On the main screen click on 'Scan your computer'.
Check: 'Perform Complete Scan'.
Click 'Next' to start the scan.

Superantispyware will now scan your computer,when it's finished it will list all/any infections found.
Make sure everything found has a checkmark next to it,then press 'Next'.
Click on 'Finish' when you've done.

It's possible that the program will ask you to reboot in order to delete some files.

Obtain the SuperAntiSpyware log as follows:
Click on 'Preferences'.
Click on the 'Statistics/Logs' tab.
Under 'Scanner Logs' double click on 'SuperAntiSpyware Scan Log'.
It will then open in your default text editor,such as Notepad.
Copy and paste the contents of that report into your next reply.

Please run this online virus scan:Activescan using Internet Explorer.
Once you are on the Panda site click the Scan your PC button
A new window will open...click the Check Now button
Enter your Country
Enter your State/Province
Enter your e-mail address and click send
Select either Home User or Company
Click the big Scan Now button
If it wants to install an ActiveX component allow it
It will start downloading the files it requires for the scan (Note: It may take a couple of minutes)
When download is complete, click on Local Disks to start the scan
When the scan completes,click the See Report button, then Save Report, and save it to your desktop.
Copy and paste the contents of that report in your next reply.

Also post a new Hijackthis log,let me know how your pc is running now.
Posted Image
Posted Image

#7 ashzoomerintrack

ashzoomerintrack
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:08:49 PM

Posted 13 January 2008 - 12:56 PM

When i try to install SuperAnti Spyware OS says Windows installer service could not be accessed. This can occur if you are running in safe mode or Windows installer in not installed correctly. Please contact your support personnel for assistance. Plz help me what to do ?????

#8 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:04:19 PM

Posted 13 January 2008 - 12:58 PM

Download/unzip/install Dial-a-Fix from here:
http://djlizard.net/software/Dial-a-fix-v0.60.0.24.zip
Launch the program,place a check in the 'MSI' box 'Fix Windows Installer'.
Then click on 'GO' at the bottom.
Restart your pc when Dial-a-Fix has done.
Are you now able to install SuperAntiSpyware now or not please.
Posted Image
Posted Image

#9 ashzoomerintrack

ashzoomerintrack
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:08:49 PM

Posted 14 January 2008 - 08:29 AM

Posting the HiJack this Log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 18:55:57, on 14/01/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Comodo\Firewall\CPF.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Program Files\Comodo\Firewall\cmdagent.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avcenter.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\taskmgr.exe
C:\Documents and Settings\Reliance\Desktop\HiJackThis\HijackThis.exe

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [COMODO Firewall Pro] "C:\Program Files\Comodo\Firewall\CPF.exe" /background
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKLM\..\Run: [WinampAgent] C:\Program Files\Winamp\winampa.exe
O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe -onlytray
O4 - HKLM\..\Run: [DataLayer] C:\Program Files\Common Files\PCSuite\DataLayer\DataLayer.exe
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [PcSync] C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe /NoDialog
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - Global Startup: EPSON Status Monitor 3 Environment Check 2.lnk = C:\WINDOWS\system32\spool\drivers\w32x86\3\E_SRCV02.EXE
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{95B915DA-FFC7-4F1F-9068-E92767437CC2}: NameServer = 61.1.96.69,61.1.96.71
O17 - HKLM\System\CCS\Services\Tcpip\..\{B7CF92B6-C186-4A98-87F9-7364BD1637F3}: NameServer = 218.248.240.79 218.248.255.193
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: AntiVir PersonalEdition Classic Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Comodo Application Agent (CmdAgent) - COMODO - C:\Program Files\Comodo\Firewall\cmdagent.exe
O23 - Service: EpsonBidirectionalService - Unknown owner - C:\Program Files\Common Files\EPSON\EBAPI\eEBSVC.exe (file missing)
O23 - Service: MSCSPTISRV - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\MSCSPTISRV.exe
O23 - Service: PACSPTISVR - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: SonicStage SCSI Service (SSScsiSV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SSScsiSV.exe

--
End of file - 5135 bytes


Also Richie I scanned with Super Anti Spyware but it gave me an empty log. Dont understand Why ???

Also I tried Active scan but PC hangs up taking a heck of processing load after a while. I scanned with Avira it showed me a clean system also AVG Scanner from Linux showed me a clean hardisk. What should i do further. I think the PC is running good. But I want a clean certificate from you.................

#10 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:04:19 PM

Posted 14 January 2008 - 09:48 AM

Run this online virus/spyware scan using Internet Explorer:
Kaspersky WebScanner
Next click Kaspersky Online Scanner
You will be prompted to install an ActiveX component from Kaspersky, Click Yes.
The program will launch and then begin downloading the latest definition files:
Once the files have been downloaded click on NEXT
Now click on Scan Settings
In the scan settings make that the following are selected:
Scan using the following Anti-Virus database:
Standard
Scan Options:
Scan Archives
Scan Mail Bases
Click OK
Now under select a target to scan:
Select My Computer
This will start the program and scan your system.
The scan will take a while so be patient and let it run.
Once the scan is complete it will display if your system has been infected.
Now click on the Save as Text button:
Save the file to your desktop.
Copy and paste the contents of that file into your next reply.

If the above link doesn't work,try this:
http://www.kaspersky.com/kos/english/kavwebscan.html


Close any open browsers.
Double click on combofix.exe again and follow the prompts.
When it's finished it will produce a log.
Post the entire contents of C:\ComboFix.txt into your next reply.
Posted Image
Posted Image

#11 ashzoomerintrack

ashzoomerintrack
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:08:49 PM

Posted 14 January 2008 - 01:53 PM

Here is the Kaspersky Online Scanner Log:

-------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER REPORT
Tuesday, January 15, 2008 12:12:41 AM
Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 14/01/2008
Kaspersky Anti-Virus database records: 477163
-------------------------------------------------------------------------------

Scan Settings:
Scan using the following antivirus database: standard
Scan Archives: true
Scan Mail Bases: true

Scan Target - My Computer:
A:\
C:\
E:\
F:\
G:\

Scan Statistics:
Total number of scanned objects: 64380
Number of viruses found: 4
Number of infected objects: 22
Number of suspicious objects: 0
Duration of the scan process: 01:27:48

Infected Object Name / Virus Name / Last Action
C:\WINDOWS\system32\config\system.LOG Object is locked skipped
C:\WINDOWS\system32\config\software.LOG Object is locked skipped
C:\WINDOWS\system32\config\default.LOG Object is locked skipped
C:\WINDOWS\system32\config\SECURITY Object is locked skipped
C:\WINDOWS\system32\config\SAM Object is locked skipped
C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SYSTEM Object is locked skipped
C:\WINDOWS\system32\config\SOFTWARE Object is locked skipped
C:\WINDOWS\system32\config\DEFAULT Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped
C:\WINDOWS\system32\CatRoot2\tmp.edb Object is locked skipped
C:\WINDOWS\system32\CatRoot2\edb.log Object is locked skipped
C:\WINDOWS\system32\h323log.txt Object is locked skipped
C:\WINDOWS\system32\LogFiles\HTTPERR\httperr1.log Object is locked skipped
C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
C:\WINDOWS\WindowsUpdate.log Object is locked skipped
C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\WINDOWS\SoftwareDistribution\EventCache\{7798051A-B865-471E-8758-1DF9BFCDFBE2}.bin Object is locked skipped
C:\WINDOWS\SchedLgU.Txt Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat Object is locked skipped
C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\Reliance\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\Reliance\Local Settings\Temp\~DF40BF.tmp Object is locked skipped
C:\Documents and Settings\Reliance\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Reliance\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Reliance\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\Reliance\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\Reliance\Local Settings\Application Data\Mozilla\Firefox\Profiles\rlm456q9.default\Cache\_CACHE_MAP_ Object is locked skipped
C:\Documents and Settings\Reliance\Local Settings\Application Data\Mozilla\Firefox\Profiles\rlm456q9.default\Cache\_CACHE_001_ Object is locked skipped
C:\Documents and Settings\Reliance\Local Settings\Application Data\Mozilla\Firefox\Profiles\rlm456q9.default\Cache\_CACHE_002_ Object is locked skipped
C:\Documents and Settings\Reliance\Local Settings\Application Data\Mozilla\Firefox\Profiles\rlm456q9.default\Cache\_CACHE_003_ Object is locked skipped
C:\Documents and Settings\Reliance\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\Reliance\Application Data\Mozilla\Firefox\Profiles\rlm456q9.default\history.dat Object is locked skipped
C:\Documents and Settings\Reliance\Application Data\Mozilla\Firefox\Profiles\rlm456q9.default\cert8.db Object is locked skipped
C:\Documents and Settings\Reliance\Application Data\Mozilla\Firefox\Profiles\rlm456q9.default\key3.db Object is locked skipped
C:\Documents and Settings\Reliance\Application Data\Mozilla\Firefox\Profiles\rlm456q9.default\parent.lock Object is locked skipped
C:\Documents and Settings\Reliance\Application Data\Mozilla\Firefox\Profiles\rlm456q9.default\formhistory.dat Object is locked skipped
C:\Documents and Settings\Reliance\Application Data\Mozilla\Firefox\Profiles\rlm456q9.default\search.sqlite Object is locked skipped
C:\Documents and Settings\Reliance\Application Data\Mozilla\Firefox\Profiles\rlm456q9.default\urlclassifier2.sqlite Object is locked skipped
C:\Documents and Settings\Reliance\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SUPERANTISPYWARE.LOG Object is locked skipped
C:\Documents and Settings\Reliance\ntuser.dat.LOG Object is locked skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\rygsga.exe Infected: Trojan-Downloader.Win32.Delf.czz skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\eohqzua.exe Infected: Trojan.Win32.Qhost.aei skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\czlydwr.exe Infected: Trojan.Win32.Qhost.aei skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\wgctmi.exe Infected: Trojan.Win32.Qhost.aei skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\uzpmjdw.exe Infected: Backdoor.Win32.SdBot.cpl skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\bdnxpg.exe Infected: Trojan-Downloader.Win32.Delf.czz skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\dvqpforr.exe Infected: Trojan-Downloader.Win32.Delf.czz skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\xtyr.exe Infected: Trojan-Downloader.Win32.Delf.czz skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\znyeaasm.exe Infected: Trojan-Downloader.Win32.Delf.czz skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\uypups.exe Infected: Trojan-Downloader.Win32.Delf.czz skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\ayqzld.exe Infected: Trojan-Downloader.Win32.Delf.czz skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\fvwolqth.exe Infected: Trojan-Downloader.Win32.Delf.czz skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\nmze.exe Infected: Trojan-Downloader.Win32.Delf.czz skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\qgnyqk.exe Infected: Trojan-Downloader.Win32.Delf.czz skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\oqqptrth.exe Infected: Trojan-Downloader.Win32.Delf.czz skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\khtvxdp.exe Infected: Trojan-Downloader.Win32.Delf.czz skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\ohrjsom.exe Infected: Trojan-Downloader.Win32.Delf.czz skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\vgdxnpa.exe Infected: Trojan-Downloader.Win32.Delf.czz skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\kmlga.exe Infected: Trojan-Downloader.Win32.Delf.czz skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\ifdnkfyi.exe Infected: Trojan-Downloader.Win32.Delf.czz skipped
C:\_OTMoveIt\MovedFiles\01132008_204423\WINDOWS\system32\xhlp.exe Infected: Trojan-Downloader.Win32.Delf.czz skipped
C:\qoobox\Quarantine\C\WINDOWS\system32\autorun.ini.vir Infected: Trojan.Win32.AutoRun.a skipped

Scan process completed.


Also the COMBOFIX Log:

ComboFix 08-01-09.2 - Reliance 2008-01-15 0:18:37.4 - FAT32x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.197 [GMT 5.5:30]
Running from: C:\Documents and Settings\Reliance\Desktop\ComboFix.exe
* Created a new restore point
.

((((((((((((((((((((((((( Files Created from 2007-12-14 to 2008-01-14 )))))))))))))))))))))))))))))))
.

2008-01-14 22:03 . 2008-01-14 22:03 <DIR> d-------- C:\WINDOWS\system32\Kaspersky Lab
2008-01-14 22:03 . 2008-01-14 22:03 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
2008-01-14 18:49 . 2008-01-14 18:53 68,460,544 --a------ C:\160.tmp
2008-01-14 18:49 . 2007-06-08 09:44 8,576 --a------ C:\WINDOWS\system32\drivers\RkPavProc.sys
2008-01-14 18:45 . 2008-01-14 18:45 <DIR> d-------- C:\WINDOWS\LastGood
2008-01-14 18:38 . 2007-06-08 09:44 8,576 --a------ C:\WINDOWS\system32\drivers\oeceaoquxlnc.sys
2008-01-14 09:40 . 2008-01-14 09:40 129,843,200 --a------ C:\1E3.tmp
2008-01-14 09:39 . 2007-06-05 10:56 44,928 --a------ C:\WINDOWS\system32\drivers\SDTHOOK.SYS
2008-01-14 09:38 . 2007-06-08 09:44 8,576 --a------ C:\WINDOWS\system32\drivers\ilumdqsruiso.sys
2008-01-14 09:25 . 2008-01-14 09:25 <DIR> d-------- C:\WINDOWS\system32\ActiveScan
2008-01-14 09:25 . 2008-01-14 18:33 30,590 --a------ C:\WINDOWS\system32\pavas.ico
2008-01-14 09:25 . 2008-01-14 18:33 2,550 --a------ C:\WINDOWS\system32\Uninstall.ico
2008-01-14 09:25 . 2008-01-14 18:33 1,406 --a------ C:\WINDOWS\system32\Help.ico
2008-01-14 01:08 . 2008-01-14 01:08 5,632 --ahs---- C:\WINDOWS\system32\Thumbs.db
2008-01-14 01:04 . 2008-01-14 01:04 <DIR> d--hs---- C:\FOUND.000
2008-01-14 01:00 . 2008-01-14 01:00 <DIR> d-------- C:\Program Files\SUPERAntiSpyware
2008-01-14 01:00 . 2008-01-14 01:00 <DIR> d-------- C:\Documents and Settings\Reliance\Application Data\SUPERAntiSpyware.com
2008-01-14 01:00 . 2008-01-14 01:00 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
2008-01-13 23:17 . 2008-01-13 23:17 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
2008-01-12 18:22 . 2008-01-12 18:22 <DIR> d-------- C:\Program Files\Avira
2008-01-12 18:22 . 2008-01-12 18:22 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Avira
2008-01-12 18:22 . 2008-01-12 18:22 <DIR> d-------- C:\Documents and Settings\Administrator\Phone Browser
2008-01-12 08:40 . 2008-01-12 08:42 2,664 --a------ C:\WINDOWS\system32\tmp.reg
2008-01-12 08:19 . 2008-01-12 08:19 <DIR> d-------- C:\VundoFix Backups
2008-01-12 08:19 . 2008-01-12 08:16 136,192 --a------ C:\VundoFix.exe
2008-01-11 20:06 . 2008-01-11 20:06 749 -rah----- C:\WINDOWS\WindowsShell.Manifest
2008-01-11 20:06 . 2008-01-11 20:06 749 -rah----- C:\WINDOWS\system32\wuaucpl.cpl.manifest
2008-01-11 20:06 . 2008-01-11 20:06 749 -rah----- C:\WINDOWS\system32\sapi.cpl.manifest
2008-01-11 20:06 . 2008-01-11 20:06 749 -rah----- C:\WINDOWS\system32\nwc.cpl.manifest
2008-01-11 20:06 . 2008-01-11 20:06 749 -rah----- C:\WINDOWS\system32\ncpa.cpl.manifest
2008-01-11 20:06 . 2008-01-11 20:06 488 -rah----- C:\WINDOWS\system32\logonui.exe.manifest
2008-01-11 19:58 . 2001-08-23 17:30 24,661 --a------ C:\WINDOWS\system32\spxcoins.dll
2008-01-11 19:58 . 2001-08-23 17:30 13,312 --a------ C:\WINDOWS\system32\irclass.dll
2008-01-07 13:31 . 2008-01-07 13:31 <DIR> d-------- C:\temp
2008-01-07 08:37 . 2008-01-07 08:37 <DIR> d-------- C:\Documents and Settings\Reliance\DoctorWeb
2007-12-24 21:28 . 2007-12-24 21:28 <DIR> d-------- C:\Program Files\GameSpy Arcade
2007-12-23 10:03 . 2008-01-12 18:24 41 --a------ C:\WINDOWS\wininit.ini
2007-12-16 14:46 . 2008-01-14 01:08 49,664 --ahs---- C:\WINDOWS\Thumbs.db

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-01-11 16:38 146,432 ----a-w C:\WINDOWS\regedit.exe
2007-12-12 17:20 --------- d-----w C:\Documents and Settings\Reliance\Application Data\Nokia
2007-12-12 17:20 --------- d-----w C:\Documents and Settings\Reliance\Application Data\Datalayer
2007-12-12 17:13 --------- d-----w C:\Documents and Settings\Reliance\Application Data\PC Suite
2007-12-12 17:12 --------- d-----w C:\Program Files\Common Files\PCSuite
2007-12-12 17:12 --------- d-----w C:\Program Files\Common Files\Nokia
2007-12-12 17:02 --------- d-----w C:\Program Files\Nokia
2007-12-03 13:11 --------- d-----w C:\Program Files\Smart PC Solutions
2007-12-03 13:09 --------- d-----w C:\Program Files\CardRecovery
2007-12-01 13:32 --------- d-----w C:\Program Files\Sony Corporation
2007-12-01 13:31 --------- d-----w C:\Documents and Settings\All Users\Application Data\Sony Corporation
2007-12-01 13:30 --------- d-----w C:\Program Files\Sony
2007-12-01 13:30 --------- d-----w C:\Program Files\Common Files\Sony Shared
2007-12-01 13:30 --------- d-----w C:\Documents and Settings\Reliance\Application Data\Sony Corporation
2007-11-25 08:07 --------- d-----w C:\Program Files\Runtime Software
2007-11-24 10:58 --------- d-----w C:\Program Files\EACOM
2007-11-20 14:34 64,650 ----a-w C:\WINDOWS\BricoPackUninst.cmd
2007-11-20 14:34 6,120 ----a-w C:\WINDOWS\BricoPackFoldersDelete.cmd
2007-11-17 14:06 --------- d-----w C:\Program Files\Cat Computer
2007-11-14 12:39 118,784 ----a-w C:\WINDOWS\system32\wmpeq10.dll
2007-11-14 12:39 --------- d-----w C:\Program Files\4front-eq10-2
2007-11-10 02:38 73,216 ----a-w C:\WINDOWS\ST6UNST.EXE
2007-11-10 02:38 7,196,672 ------w C:\WINDOWS\Setup1.exe
2007-11-10 01:20 78,848 ----a-w C:\WINDOWS\system32\SpoonUninstall.exe
2007-11-10 01:20 67,584 ----a-w C:\WINDOWS\system32\xanalyze.dll
2007-11-06 06:26 29,696 ----a-w C:\WINDOWS\mickey32.dll
2007-11-06 06:26 232,784 ----a-w C:\WINDOWS\Matrix Code.scr
2007-11-06 06:26 2,285,222 ----a-w C:\WINDOWS\Matrix Code.exe
2007-10-25 04:56 57,344 ----a-w C:\WINDOWS\bdoscandel.exe
.

((((((((((((((((((((((((((((( snapshot_2008-01-12_23.16.53.00 )))))))))))))))))))))))))))))))))))))))))
.
+ 2006-08-24 02:58:54 141,424 ----a-w C:\WINDOWS\Downloaded Program Files\asinst.dll
+ 2000-08-31 02:30:00 163,328 ----a-w C:\WINDOWS\erdnt\Hiv-backup\ERDNT.EXE
+ 2008-01-14 18:48:16 237,568 ----a-w C:\WINDOWS\erdnt\Hiv-backup\Users\00000001\ntuser.dat
+ 2008-01-14 18:48:16 8,192 ----a-w C:\WINDOWS\erdnt\Hiv-backup\Users\00000002\UsrClass.dat
+ 2008-01-14 18:48:16 237,568 ----a-w C:\WINDOWS\erdnt\Hiv-backup\Users\00000003\ntuser.dat
+ 2008-01-14 18:48:18 8,192 ----a-w C:\WINDOWS\erdnt\Hiv-backup\Users\00000004\UsrClass.dat
+ 2008-01-14 18:48:18 4,759,552 ----a-w C:\WINDOWS\erdnt\Hiv-backup\Users\00000005\ntuser.dat
+ 2008-01-14 18:48:18 8,192 ----a-w C:\WINDOWS\erdnt\Hiv-backup\Users\00000006\UsrClass.dat
- 2000-08-31 02:30:00 166,912 ----a-w C:\WINDOWS\erdnt\subs\F3M\ERDNT.EXE
+ 2000-08-31 02:30:00 163,328 ----a-w C:\WINDOWS\erdnt\subs\F3M\ERDNT.EXE
+ 2008-01-13 19:30:10 29,696 ----a-r C:\WINDOWS\Installer\{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}\IconCDDCBBF11.exe
+ 2008-01-13 19:30:10 18,944 ----a-r C:\WINDOWS\Installer\{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}\IconCDDCBBF13.exe
+ 2008-01-13 19:30:10 65,024 ----a-r C:\WINDOWS\Installer\{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}\IconCDDCBBF15.exe
+ 2007-03-29 03:50:50 110,592 ----a-w C:\WINDOWS\system32\ActiveScan\as.dll
+ 2006-10-05 10:45:26 233,472 ----a-w C:\WINDOWS\system32\ActiveScan\ascontrol.dll
+ 2005-06-03 08:33:18 96,256 ----a-w C:\WINDOWS\system32\ActiveScan\asmdat.dll
+ 2003-08-01 05:30:16 36,864 ----a-w C:\WINDOWS\system32\ActiveScan\certdll.dll
+ 2005-05-20 08:12:44 86,016 ----a-w C:\WINDOWS\system32\ActiveScan\instlsp.dll
+ 2007-11-12 04:16:18 26,112 ----a-w C:\WINDOWS\system32\ActiveScan\JID.dll
+ 2006-02-16 12:50:20 4,608 ----a-w C:\WINDOWS\system32\ActiveScan\memvfile.dll
+ 2005-10-25 12:38:32 348,160 ----a-w C:\WINDOWS\system32\ActiveScan\msvcr71.dll
+ 2007-11-26 05:40:36 61,440 ----a-w C:\WINDOWS\system32\ActiveScan\NanoWrapper.dll
+ 2004-05-04 09:31:02 139,264 ----a-w C:\WINDOWS\system32\ActiveScan\pavaleas.dll
+ 2006-07-14 07:34:10 45,056 ----a-w C:\WINDOWS\system32\ActiveScan\pavdr.exe
+ 2006-04-10 05:20:02 159,832 ----a-w C:\WINDOWS\system32\ActiveScan\pavexcom.dll
+ 2006-02-14 07:35:38 94,208 ----a-w C:\WINDOWS\system32\ActiveScan\pavinas.dll
+ 2006-02-16 13:05:38 180,224 ----a-w C:\WINDOWS\system32\ActiveScan\pavoe.dll
+ 2006-10-05 10:45:38 122,880 ----a-w C:\WINDOWS\system32\ActiveScan\pavpz.dll
+ 2007-06-04 06:01:52 57,344 ----a-w C:\WINDOWS\system32\ActiveScan\pavsddl.dll
+ 2006-06-30 08:43:38 8,704 ----a-w C:\WINDOWS\system32\ActiveScan\pfdnnt.exe
+ 2004-02-04 08:38:42 49,152 ----a-w C:\WINDOWS\system32\ActiveScan\port32.dll
+ 2007-10-30 04:34:14 36,864 ----a-w C:\WINDOWS\system32\ActiveScan\Prescan.dll
+ 2006-08-01 07:53:10 69,632 ----a-w C:\WINDOWS\system32\ActiveScan\pscpu.dll
+ 2007-11-21 04:30:06 376,832 ----a-w C:\WINDOWS\system32\ActiveScan\pskahk.dll
+ 2007-10-31 07:35:06 32,768 ----a-w C:\WINDOWS\system32\ActiveScan\PSKAHKPRESCAN.dll
+ 2006-08-17 06:08:14 10,752 ----a-w C:\WINDOWS\system32\ActiveScan\pskalloc.dll
+ 2006-09-04 06:19:54 61,440 ----a-w C:\WINDOWS\system32\ActiveScan\pskas.dll
+ 2006-08-18 03:16:18 779,264 ----a-w C:\WINDOWS\system32\ActiveScan\pskavs.dll
+ 2007-03-26 08:55:34 417,792 ----a-w C:\WINDOWS\system32\ActiveScan\pskcmp.dll
+ 2006-08-09 05:12:24 90,112 ----a-w C:\WINDOWS\system32\ActiveScan\pskfss.dll
+ 2006-07-19 05:25:58 208,896 ----a-w C:\WINDOWS\system32\ActiveScan\pskhtml.dll
+ 2006-01-20 11:27:00 9,728 ----a-w C:\WINDOWS\system32\ActiveScan\pskmas.dll
+ 2006-05-17 04:20:12 14,336 ----a-w C:\WINDOWS\system32\ActiveScan\pskmdfs.dll
+ 2006-08-16 05:28:12 33,280 ----a-w C:\WINDOWS\system32\ActiveScan\pskpack.dll
+ 2006-06-30 09:12:36 266,240 ----a-w C:\WINDOWS\system32\ActiveScan\pskscs.dll
+ 2006-08-17 09:03:14 62,976 ----a-w C:\WINDOWS\system32\ActiveScan\pskutil.dll
+ 2006-08-08 07:43:10 13,312 ----a-w C:\WINDOWS\system32\ActiveScan\pskvfile.dll
+ 2006-08-18 03:23:08 69,632 ----a-w C:\WINDOWS\system32\ActiveScan\pskvfs.dll
+ 2006-08-18 03:19:50 167,936 ----a-w C:\WINDOWS\system32\ActiveScan\pskvm.dll
+ 2007-10-18 04:00:16 105,472 ----a-w C:\WINDOWS\system32\ActiveScan\psnahk.dll
+ 2007-11-23 08:59:08 10,752 ----a-w C:\WINDOWS\system32\ActiveScan\psndsk.dll
+ 2007-10-18 04:00:38 42,496 ----a-w C:\WINDOWS\system32\ActiveScan\psnflg.dll
+ 2007-10-30 05:49:22 98,304 ----a-w C:\WINDOWS\system32\ActiveScan\psnglknt.dll
+ 2007-08-22 03:22:00 20,272 ----a-w C:\WINDOWS\system32\ActiveScan\psnhsh.dll
+ 2007-11-12 10:19:34 11,776 ----a-w C:\WINDOWS\system32\ActiveScan\psnjidsign.dll
+ 2007-08-22 03:22:04 76,080 ----a-w C:\WINDOWS\system32\ActiveScan\psnkrnl.dll
+ 2007-08-22 03:22:06 21,296 ----a-w C:\WINDOWS\system32\ActiveScan\psnmem.dll
+ 2007-10-04 09:56:28 28,672 ----a-w C:\WINDOWS\system32\ActiveScan\PsnPen.dll
+ 2007-10-23 06:10:10 86,016 ----a-w C:\WINDOWS\system32\ActiveScan\psntuc.dll
+ 2007-05-24 05:57:36 27,136 ----a-w C:\WINDOWS\system32\ActiveScan\PSNXprs.dll
+ 2007-04-18 11:46:04 353,840 ----a-w C:\WINDOWS\system32\ActiveScan\psscan.dll
+ 2007-01-22 09:12:48 35,328 ----a-w C:\WINDOWS\system32\ActiveScan\rawvfile.dll
+ 2007-06-08 04:14:36 8,576 ----a-w C:\WINDOWS\system32\ActiveScan\RKPavProc.sys
+ 2007-06-05 05:26:40 44,928 ----a-w C:\WINDOWS\system32\ActiveScan\sdthook.sys
+ 1997-09-18 00:42:32 9,488 ----a-w C:\WINDOWS\system32\ActiveScan\sporder.dll
+ 2006-02-28 11:53:40 69,632 ----a-w C:\WINDOWS\system32\ActiveScan\tcpvfile.dll
+ 2007-09-17 03:44:08 126,976 ----a-w C:\WINDOWS\system32\ActiveScan\Tucan.dll
+ 2006-08-02 07:09:06 73,728 ----a-w C:\WINDOWS\system32\asuninst.exe
- 2004-08-03 17:26:42 66,560 ----a-w C:\WINDOWS\system32\cdm.dll
+ 2007-07-30 13:49:20 92,504 ----a-w C:\WINDOWS\system32\cdm.dll
+ 2007-07-30 13:49:20 92,504 ----a-w C:\WINDOWS\system32\dllcache\cdm.dll
+ 2007-07-30 13:49:36 549,720 ----a-w C:\WINDOWS\system32\dllcache\wuapi.dll
+ 2007-07-30 13:49:16 53,080 ----a-w C:\WINDOWS\system32\dllcache\wuauclt.exe
+ 2007-07-30 13:49:42 1,712,984 ----a-w C:\WINDOWS\system32\dllcache\wuaueng.dll
+ 2007-07-30 13:49:32 325,976 ----a-w C:\WINDOWS\system32\dllcache\wucltui.dll
+ 2007-07-30 13:48:40 33,624 ----a-w C:\WINDOWS\system32\dllcache\wups.dll
+ 2007-07-30 13:49:28 203,096 ----a-w C:\WINDOWS\system32\dllcache\wuweb.dll
+ 2005-05-24 06:57:16 213,048 ----a-w C:\WINDOWS\system32\Kaspersky Lab\Kaspersky Online Scanner\kavss.dll
+ 2007-08-29 10:17:20 94,208 ----a-w C:\WINDOWS\system32\Kaspersky Lab\Kaspersky Online Scanner\kavuninstall.exe
+ 2007-08-29 10:19:54 950,272 ----a-w C:\WINDOWS\system32\Kaspersky Lab\Kaspersky Online Scanner\kavwebscan.dll
- 2004-08-03 22:56:48 430,592 ----a-w C:\WINDOWS\system32\wuapi.dll
+ 2007-07-30 13:49:36 549,720 ----a-w C:\WINDOWS\system32\wuapi.dll
- 2004-08-03 22:56:58 111,104 ----a-w C:\WINDOWS\system32\wuauclt.exe
+ 2007-07-30 13:49:16 53,080 ----a-w C:\WINDOWS\system32\wuauclt.exe
- 2004-08-03 22:56:48 1,134,592 ----a-w C:\WINDOWS\system32\wuaueng.dll
+ 2007-07-30 13:49:42 1,712,984 ----a-w C:\WINDOWS\system32\wuaueng.dll
- 2004-08-03 22:56:48 112,640 ----a-w C:\WINDOWS\system32\wucltui.dll
+ 2007-07-30 13:49:32 325,976 ----a-w C:\WINDOWS\system32\wucltui.dll
- 2004-08-03 22:56:48 36,864 ----a-w C:\WINDOWS\system32\wups.dll
+ 2007-07-30 13:48:40 33,624 ----a-w C:\WINDOWS\system32\wups.dll
- 2004-08-03 22:56:48 120,320 ----a-w C:\WINDOWS\system32\wuweb.dll
+ 2007-07-30 13:49:28 203,096 ----a-w C:\WINDOWS\system32\wuweb.dll
+ 2003-03-25 13:23:50 11,776 ----a-w C:\WINDOWS\system32\ZPORT4AS.dll
.
-- Snapshot reset to current date --
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSMSGS"="C:\Program Files\Messenger\msmsgs.exe" [2004-08-04 01:06 1667584]
"PcSync"="C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe" [ ]
"SUPERAntiSpyware"="C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2007-06-21 14:06 1318912]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NeroFilterCheck"="C:\WINDOWS\system32\NeroCheck.exe" [2001-07-09 10:50 155648]
"COMODO Firewall Pro"="C:\Program Files\Comodo\Firewall\CPF.exe" [2007-11-01 23:56 1115728]
"!AVG Anti-Spyware"="C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" [2007-06-11 14:55 6731312]
"WinampAgent"="C:\Program Files\Winamp\winampa.exe" [ ]
"PCSuiteTrayApplication"="C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe" [ ]
"DataLayer"="C:\Program Files\Common Files\PCSuite\DataLayer\DataLayer.exe" [ ]
"avgnt"="C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" [2008-01-12 22:20 249896]

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
EPSON Status Monitor 3 Environment Check 2.lnk - C:\WINDOWS\system32\spool\drivers\w32x86\3\E_SRCV02.EXE [2007-11-02 08:19:30]
Adobe Reader Speed Launch.lnk - C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2005-09-23 22:05:26]

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
"NofolderOptions"= 1 (0x1)

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\shellexecutehooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= C:\Program Files\SUPERAntiSpyware\SASSEH.DLL [2006-12-20 13:55 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
C:\Program Files\SUPERAntiSpyware\SASWINLO.dll 2007-04-19 13:41 294912 C:\Program Files\SUPERAntiSpyware\SASWINLO.dll

S0 UNPR;UNPR;C:\WINDOWS\system32\unpr.sys []

*Newly Created Service* - OECEAOQUXLNC
.
**************************************************************************

catchme 0.3.1344 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-01-15 00:20:16
Windows 5.1.2600 Service Pack 2 FAT NTAPI

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
Completion time: 2008-01-15 0:20:55
ComboFix4.txt 2007-11-12 05:54:12
ComboFix-quarantined-files.txt 2008-01-14 18:50:52
ComboFix3.txt 2008-01-11 17:15:52
ComboFix2.txt 2008-01-12 17:47:24
.
2007-12-20 13:19:49 --- E O F ---



What to do next???

#12 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:04:19 PM

Posted 14 January 2008 - 02:14 PM

Copy and paste ALL the following text in the Quote box below into Notepad.
Click on File(in the menu at the top)>Save as../Save as Type: 'All Files' /File name: CFScript to your desktop.

File::
C:\WINDOWS\system32\drivers\oeceaoquxlnc.sys
C:\WINDOWS\system32\drivers\ilumdqsruiso.sys
C:\160.tmp
C:\1E3.tmp
Service::
OECEAOQUXLNC
Driver::
OECEAOQUXLNC

Now drag then drop the CFScript file onto ComboFix.exe as seen in the image below.

Posted Image

This will start ComboFix again.
After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply along with a new HijackThis log.
Posted Image
Posted Image

#13 ashzoomerintrack

ashzoomerintrack
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:08:49 PM

Posted 14 January 2008 - 08:43 PM

Here is the COMBOFIX LOG:

ComboFix 08-01-09.2 - Reliance 2008-01-15 7:04:29.5 - FAT32x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.176 [GMT 5.5:30]
Running from: C:\Documents and Settings\Reliance\Desktop\ComboFix.exe
Command switches used :: C:\Documents and Settings\Reliance\Desktop\CFScript
* Created a new restore point

FILE
C:\160.tmp
C:\1E3.tmp
C:\WINDOWS\system32\drivers\ilumdqsruiso.sys
C:\WINDOWS\system32\drivers\oeceaoquxlnc.sys
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\160.tmp
C:\1E3.tmp
C:\WINDOWS\system32\drivers\ilumdqsruiso.sys
C:\WINDOWS\system32\drivers\oeceaoquxlnc.sys

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.
-------\LEGACY_OECEAOQUXLNC
-------\oeceaoquxlnc


((((((((((((((((((((((((( Files Created from 2007-12-15 to 2008-01-15 )))))))))))))))))))))))))))))))
.

2008-01-14 22:03 . 2008-01-14 22:03 <DIR> d-------- C:\WINDOWS\system32\Kaspersky Lab
2008-01-14 22:03 . 2008-01-14 22:03 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
2008-01-14 18:49 . 2007-06-08 09:44 8,576 --a------ C:\WINDOWS\system32\drivers\RkPavProc.sys
2008-01-14 09:39 . 2007-06-05 10:56 44,928 --a------ C:\WINDOWS\system32\drivers\SDTHOOK.SYS
2008-01-14 09:25 . 2008-01-14 09:25 <DIR> d-------- C:\WINDOWS\system32\ActiveScan
2008-01-14 09:25 . 2008-01-14 18:33 30,590 --a------ C:\WINDOWS\system32\pavas.ico
2008-01-14 09:25 . 2008-01-14 18:33 2,550 --a------ C:\WINDOWS\system32\Uninstall.ico
2008-01-14 09:25 . 2008-01-14 18:33 1,406 --a------ C:\WINDOWS\system32\Help.ico
2008-01-14 01:08 . 2008-01-14 01:08 5,632 --ahs---- C:\WINDOWS\system32\Thumbs.db
2008-01-14 01:04 . 2008-01-14 01:04 <DIR> d--hs---- C:\FOUND.000
2008-01-14 01:00 . 2008-01-14 01:00 <DIR> d-------- C:\Program Files\SUPERAntiSpyware
2008-01-14 01:00 . 2008-01-14 01:00 <DIR> d-------- C:\Documents and Settings\Reliance\Application Data\SUPERAntiSpyware.com
2008-01-14 01:00 . 2008-01-14 01:00 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
2008-01-13 23:17 . 2008-01-13 23:17 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
2008-01-12 18:22 . 2008-01-12 18:22 <DIR> d-------- C:\Program Files\Avira
2008-01-12 18:22 . 2008-01-12 18:22 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Avira
2008-01-12 18:22 . 2008-01-12 18:22 <DIR> d-------- C:\Documents and Settings\Administrator\Phone Browser
2008-01-12 08:40 . 2008-01-12 08:42 2,664 --a------ C:\WINDOWS\system32\tmp.reg
2008-01-12 08:19 . 2008-01-12 08:19 <DIR> d-------- C:\VundoFix Backups
2008-01-12 08:19 . 2008-01-12 08:16 136,192 --a------ C:\VundoFix.exe
2008-01-11 20:06 . 2008-01-11 20:06 749 -rah----- C:\WINDOWS\WindowsShell.Manifest
2008-01-11 20:06 . 2008-01-11 20:06 749 -rah----- C:\WINDOWS\system32\wuaucpl.cpl.manifest
2008-01-11 20:06 . 2008-01-11 20:06 749 -rah----- C:\WINDOWS\system32\sapi.cpl.manifest
2008-01-11 20:06 . 2008-01-11 20:06 749 -rah----- C:\WINDOWS\system32\nwc.cpl.manifest
2008-01-11 20:06 . 2008-01-11 20:06 749 -rah----- C:\WINDOWS\system32\ncpa.cpl.manifest
2008-01-11 20:06 . 2008-01-11 20:06 488 -rah----- C:\WINDOWS\system32\logonui.exe.manifest
2008-01-11 19:58 . 2001-08-23 17:30 24,661 --a------ C:\WINDOWS\system32\spxcoins.dll
2008-01-11 19:58 . 2001-08-23 17:30 13,312 --a------ C:\WINDOWS\system32\irclass.dll
2008-01-07 13:31 . 2008-01-07 13:31 <DIR> d-------- C:\temp
2008-01-07 08:37 . 2008-01-07 08:37 <DIR> d-------- C:\Documents and Settings\Reliance\DoctorWeb
2007-12-24 21:28 . 2007-12-24 21:28 <DIR> d-------- C:\Program Files\GameSpy Arcade
2007-12-23 10:03 . 2008-01-12 18:24 41 --a------ C:\WINDOWS\wininit.ini
2007-12-16 14:46 . 2008-01-14 01:08 49,664 --ahs---- C:\WINDOWS\Thumbs.db

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-01-11 16:38 146,432 ----a-w C:\WINDOWS\regedit.exe
2007-12-12 17:20 --------- d-----w C:\Documents and Settings\Reliance\Application Data\Nokia
2007-12-12 17:20 --------- d-----w C:\Documents and Settings\Reliance\Application Data\Datalayer
2007-12-12 17:13 --------- d-----w C:\Documents and Settings\Reliance\Application Data\PC Suite
2007-12-12 17:12 --------- d-----w C:\Program Files\Common Files\PCSuite
2007-12-12 17:12 --------- d-----w C:\Program Files\Common Files\Nokia
2007-12-12 17:02 --------- d-----w C:\Program Files\Nokia
2007-12-03 13:11 --------- d-----w C:\Program Files\Smart PC Solutions
2007-12-03 13:09 --------- d-----w C:\Program Files\CardRecovery
2007-12-01 13:32 --------- d-----w C:\Program Files\Sony Corporation
2007-12-01 13:31 --------- d-----w C:\Documents and Settings\All Users\Application Data\Sony Corporation
2007-12-01 13:30 --------- d-----w C:\Program Files\Sony
2007-12-01 13:30 --------- d-----w C:\Program Files\Common Files\Sony Shared
2007-12-01 13:30 --------- d-----w C:\Documents and Settings\Reliance\Application Data\Sony Corporation
2007-11-25 08:07 --------- d-----w C:\Program Files\Runtime Software
2007-11-24 10:58 --------- d-----w C:\Program Files\EACOM
2007-11-20 14:34 64,650 ----a-w C:\WINDOWS\BricoPackUninst.cmd
2007-11-20 14:34 6,120 ----a-w C:\WINDOWS\BricoPackFoldersDelete.cmd
2007-11-17 14:06 --------- d-----w C:\Program Files\Cat Computer
2007-11-14 12:39 118,784 ----a-w C:\WINDOWS\system32\wmpeq10.dll
2007-11-10 02:38 73,216 ----a-w C:\WINDOWS\ST6UNST.EXE
2007-11-10 02:38 7,196,672 ------w C:\WINDOWS\Setup1.exe
2007-11-10 01:20 78,848 ----a-w C:\WINDOWS\system32\SpoonUninstall.exe
2007-11-10 01:20 67,584 ----a-w C:\WINDOWS\system32\xanalyze.dll
2007-11-06 06:26 29,696 ----a-w C:\WINDOWS\mickey32.dll
2007-11-06 06:26 232,784 ----a-w C:\WINDOWS\Matrix Code.scr
2007-11-06 06:26 2,285,222 ----a-w C:\WINDOWS\Matrix Code.exe
2007-10-25 04:56 57,344 ----a-w C:\WINDOWS\bdoscandel.exe
.

((((((((((((((((((((((((((((( snapshot_2008-01-15_ 0.20.26.64 )))))))))))))))))))))))))))))))))))))))))
.
- 2008-01-14 18:48:16 237,568 ----a-w C:\WINDOWS\erdnt\Hiv-backup\Users\00000001\ntuser.dat
+ 2008-01-15 01:34:08 237,568 ----a-w C:\WINDOWS\erdnt\Hiv-backup\Users\00000001\ntuser.dat
- 2008-01-14 18:48:16 8,192 ----a-w C:\WINDOWS\erdnt\Hiv-backup\Users\00000002\UsrClass.dat
+ 2008-01-15 01:34:08 8,192 ----a-w C:\WINDOWS\erdnt\Hiv-backup\Users\00000002\UsrClass.dat
- 2008-01-14 18:48:16 237,568 ----a-w C:\WINDOWS\erdnt\Hiv-backup\Users\00000003\ntuser.dat
+ 2008-01-15 01:34:08 237,568 ----a-w C:\WINDOWS\erdnt\Hiv-backup\Users\00000003\ntuser.dat
- 2008-01-14 18:48:18 8,192 ----a-w C:\WINDOWS\erdnt\Hiv-backup\Users\00000004\UsrClass.dat
+ 2008-01-15 01:34:08 8,192 ----a-w C:\WINDOWS\erdnt\Hiv-backup\Users\00000004\UsrClass.dat
- 2008-01-14 18:48:18 4,759,552 ----a-w C:\WINDOWS\erdnt\Hiv-backup\Users\00000005\ntuser.dat
+ 2008-01-15 01:34:08 4,767,744 ----a-w C:\WINDOWS\erdnt\Hiv-backup\Users\00000005\ntuser.dat
- 2008-01-14 18:48:18 8,192 ----a-w C:\WINDOWS\erdnt\Hiv-backup\Users\00000006\UsrClass.dat
+ 2008-01-15 01:34:08 8,192 ----a-w C:\WINDOWS\erdnt\Hiv-backup\Users\00000006\UsrClass.dat
+ 2000-08-31 02:30:00 163,328 ----a-w C:\WINDOWS\erdnt\subs\ERDNT.EXE
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSMSGS"="C:\Program Files\Messenger\msmsgs.exe" [2004-08-04 01:06 1667584]
"PcSync"="C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe" [ ]
"SUPERAntiSpyware"="C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2007-06-21 14:06 1318912]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NeroFilterCheck"="C:\WINDOWS\system32\NeroCheck.exe" [2001-07-09 10:50 155648]
"COMODO Firewall Pro"="C:\Program Files\Comodo\Firewall\CPF.exe" [2007-11-01 23:56 1115728]
"!AVG Anti-Spyware"="C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" [2007-06-11 14:55 6731312]
"WinampAgent"="C:\Program Files\Winamp\winampa.exe" [ ]
"PCSuiteTrayApplication"="C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe" [ ]
"DataLayer"="C:\Program Files\Common Files\PCSuite\DataLayer\DataLayer.exe" [ ]
"avgnt"="C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" [2008-01-12 22:20 249896]

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
EPSON Status Monitor 3 Environment Check 2.lnk - C:\WINDOWS\system32\spool\drivers\w32x86\3\E_SRCV02.EXE [2007-11-02 08:19:30]
Adobe Reader Speed Launch.lnk - C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2005-09-23 22:05:26]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"DisableRegistryTools"= 0 (0x0)

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
"NofolderOptions"= 1 (0x1)

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\shellexecutehooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= C:\Program Files\SUPERAntiSpyware\SASSEH.DLL [2006-12-20 13:55 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
C:\Program Files\SUPERAntiSpyware\SASWINLO.dll 2007-04-19 13:41 294912 C:\Program Files\SUPERAntiSpyware\SASWINLO.dll

S0 UNPR;UNPR;C:\WINDOWS\system32\unpr.sys []

.
**************************************************************************

catchme 0.3.1344 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-01-15 07:09:04
Windows 5.1.2600 Service Pack 2 FAT NTAPI

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
Completion time: 2008-01-15 7:10:49 - machine was rebooted
ComboFix5.txt 2007-11-12 05:54:12
ComboFix-quarantined-files.txt 2008-01-15 01:40:46
ComboFix4.txt 2008-01-11 17:15:52
ComboFix3.txt 2008-01-12 17:47:24
ComboFix2.txt 2008-01-14 18:50:58
.
2008-01-15 01:28:44 --- E O F ---


Here is the HiJAck THIS LOG:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 07:11:16, on 15/01/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\savedump.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Program Files\Comodo\Firewall\cmdagent.exe
C:\Program Files\Comodo\Firewall\CPF.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\notepad.exe
C:\Documents and Settings\Reliance\Desktop\HiJackThis\HijackThis.exe

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [COMODO Firewall Pro] "C:\Program Files\Comodo\Firewall\CPF.exe" /background
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKLM\..\Run: [WinampAgent] C:\Program Files\Winamp\winampa.exe
O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe -onlytray
O4 - HKLM\..\Run: [DataLayer] C:\Program Files\Common Files\PCSuite\DataLayer\DataLayer.exe
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [PcSync] C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe /NoDialog
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - Global Startup: EPSON Status Monitor 3 Environment Check 2.lnk = C:\WINDOWS\system32\spool\drivers\w32x86\3\E_SRCV02.EXE
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/eng/partner/d...can_unicode.cab
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{95B915DA-FFC7-4F1F-9068-E92767437CC2}: NameServer = 61.1.96.69,61.1.96.71
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: AntiVir PersonalEdition Classic Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Comodo Application Agent (CmdAgent) - COMODO - C:\Program Files\Comodo\Firewall\cmdagent.exe
O23 - Service: EpsonBidirectionalService - Unknown owner - C:\Program Files\Common Files\EPSON\EBAPI\eEBSVC.exe (file missing)
O23 - Service: MSCSPTISRV - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\MSCSPTISRV.exe
O23 - Service: PACSPTISVR - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: SonicStage SCSI Service (SSScsiSV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SSScsiSV.exe

--
End of file - 5092 bytes


What do further???

#14 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:04:19 PM

Posted 15 January 2008 - 07:02 AM

Your log is clean :thumbsup: ,please do the following:

Click on Start/Run,copy and paste ComboFix /u into the 'Open:' space,then press Ok.
This will uninstall Combofix,delete its related folders and files,reset your clock settings,hide file extensions,hide the system/hidden files and resets System Restore again.

Posted Image

Please double-click OTMoveIt.exe again to run it.
Click on the 'Cleanup' button Posted Image
When you do this a text file named cleanup.txt will be downloaded from the internet.
If you get a warning from your firewall or other security programs regarding OTMoveIt attempting to contact the internet you should allow it to do so.
When the 'Confirm' box appears click 'Yes'.
Restart your pc when prompted.

You should take the time to read and follow the information found in the links below,to help you prevent any possible future infections and stay safe and secure while online:

Simple and easy ways to keep your computer safe and secure on the Internet:
http://www.bleepingcomputer.com/tutorials/keep-your-computer-safe-online/

How to prevent Malware:
http://users.telenet.be/bluepatchy/miekiem...prevention.html

So how did I get infected in the first place:
http://forums.spybot.info/showthread.php?t=279

Malware Cleanup Programs and Preventative Procedures:
http://russelltexas.com/malware/allclear.htm
Posted Image
Posted Image

#15 ashzoomerintrack

ashzoomerintrack
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:08:49 PM

Posted 15 January 2008 - 07:31 AM

Thank you Richie very much for helping me. :thumbsup: But ihave a problem I have a Worm VB.22 or something (which makes .exe files inside the folder by making name of Folder)in my Pen Drive so how do i get rid of it. Also how should i connect to it to clean the Pen Drive. Help me! Also great job done




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users