Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Urgent Help - Computer Infected


  • Please log in to reply
15 replies to this topic

#1 Sureshb

Sureshb

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:39 AM

Posted 25 May 2008 - 09:48 PM

My system is affected by some Malware(Spyware.CyberLog-X..) I'm getting lot of Security warnings and ad popups.

when ever I'm trying to open any text file (notepad)
data execution prevention - Microsoft windows to help protect your computer windows has closed this program. My google search results is direcing me to different AD sites. I cannot even open some websites .my IE homepage has been always redirected to c:\windows\system32\spywarewarning.mht

Here are some of the popup's I'm getting

1)windows secuity system
threat : coolwebsearch


2)Critical System Warning!
---------------------------
Your system is probably infected with latest version of Spyware.CyberLog-X.
Type: Spyware
Infection Length: 266,129 bytes
Risk: High
Systems Affected: Windows 95, 98, 2000, NT, 2003 Server,
Windows XP, Windows Vista
Behavior: Spyware.CyberLog-X is a spyware program that
monitors user activity, logs keystrokes, and tracks
Web sites visited.
Symptoms: Low Internet connection speed
Low system perfomance
Security center alerts
Strange pop up windows
Protection: Click OK to donwload antispyware software.
---------------------------
OK Cancel
---------------------------


3)System Alert : Trojan-Spy-win32@mx
Type : Softeare/Trojan
Vulnerable:windows 95/98/ME/NT
Description : Spyware program that sends confidential informationto remote attacker
Protection : Click this baloon to download official security software


GUYS PLS. HELP ME OUT TO FIX THIS PROBLEM AS I HAVE A CRITICAL DATA IN MY SYSTEM. I NEED TO WORK ON THAT IMMEDIATELY. I HAVE TRIED THROUGH ANTIVIRUS AND SPY DOCTOR BUT OF NO USE. I'M REALLY SCARED. I COULDN'T EVEN OPEN SOME WEBSITES.I COULD SEE IN GOOGLE THAT YOUR TEAM HAS SOLUTION FOR THIS PROBLEM. I COULD SEE THAT IN http://www.bleepingcomputer.com/forums/lof...php/t66543.html.
ANY HELP SOON IS HIGHLY APPRECIATED. THANKS & LOOKING FORWARD FOR THE REPLY

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,428 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:39 AM

Posted 25 May 2008 - 10:24 PM

Hello what is your Operating system,XP,Vista etc..?
What is your installed Antivirus and Spyware tools?
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 Sureshb

Sureshb
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:39 AM

Posted 25 May 2008 - 10:36 PM

Thanks for your response..My operating system is Windows XP..
I have Norton 2008 and Spyware doctor in my system. I tried with AVG, Mcafee anitvirus and some
other spyware tools like Hijackthis, Spyhunter Scanner. But nothing worked. I couldn't open any anitvirus
or spyware websites. Its saying page cannot be displayed. I could access normal websites. Pls. let me know
if you need any futher information

Thanks
Suresh

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,428 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:39 AM

Posted 25 May 2008 - 10:44 PM

Ok thats good you should be able to run these tools with no interference.
Post back the 2 scan logs,please.

First run SmitFraudFix by S!Ri
The report can be found at the root of the system drive, usually at C:\rapport.txt

NEXT:
Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
  • Make sure you are connected to the Internet.
  • Double-click on Download_mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Quick Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 Sureshb

Sureshb
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:39 AM

Posted 25 May 2008 - 11:02 PM

I have downloaded both SmitFraudFix by S!Ri & Malwarebytes Anti-Malware from other PC and transferred them
to infected PC as I could not open the sites in the infected PC. But still I couldn't run the setup file. When I'm
clicking on the setup file it is not responding. Nothing is coming though I tried several times. I couldn't run the
setup file.. What to do?

Thanks
Suresh

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,428 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:39 AM

Posted 25 May 2008 - 11:27 PM

Can you rename the file to something like SureA and SureB
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 Sureshb

Sureshb
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:39 AM

Posted 25 May 2008 - 11:48 PM

Thanks ..it worked after renaming for Smitfraud Fix but after installing Malwarebytes when I'm trying to run it is saying Error Loading Database Line # 15054.
Pls find the log for SmitFraud

SmitFraudFix v2.322

Scan done at 0:29:36.98, Mon 05/26/2008
Run from C:\Documents and Settings\Suresh Bathula\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in normal mode

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» Killing process


»»»»»»»»»»»»»»»»»»»»»»»» hosts

127.0.0.1 localhost

»»»»»»»»»»»»»»»»»»»»»»»» VACFix

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix

S!Ri's WS2Fix: LSP not Found.


»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

GenericRenosFix by S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files

C:\WINDOWS\accesss.exe Deleted
C:\WINDOWS\astctl32.ocx Deleted
C:\WINDOWS\avpcc.dll Deleted
C:\WINDOWS\clrssn.exe Deleted
C:\WINDOWS\cpan.dll Deleted
C:\WINDOWS\default.htm Deleted
C:\WINDOWS\iexplorer.exe Deleted
C:\WINDOWS\loader.exe Deleted
C:\WINDOWS\mtwirl32.dll Deleted
C:\WINDOWS\notepad32.exe Deleted
C:\WINDOWS\olehelp.exe Deleted
C:\WINDOWS\systeem.exe Deleted
C:\WINDOWS\systemcritical.exe Deleted
C:\WINDOWS\time.exe Deleted
C:\WINDOWS\users32.exe Deleted
C:\WINDOWS\waol.exe Deleted
C:\WINDOWS\win32e.exe Deleted
C:\WINDOWS\win64.exe Deleted
C:\WINDOWS\winajbm.dll Deleted
C:\WINDOWS\window.exe Deleted
C:\WINDOWS\winmgnt.exe Deleted
C:\WINDOWS\x.exe Deleted
C:\WINDOWS\xplugin.dll Deleted
C:\WINDOWS\xxxvideo.hta Deleted
C:\WINDOWS\y.exe Deleted

»»»»»»»»»»»»»»»»»»»»»»»» IEDFix

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» 404Fix

404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» DNS

Description: Intel® PRO/Wireless 3945ABG Network Connection - Packet Scheduler Miniport
DNS Server Search Order: 192.168.0.1

HKLM\SYSTEM\CCS\Services\Tcpip\..\{07EF1E27-8525-4C9A-8A43-B1B18E964CA0}: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{07EF1E27-8525-4C9A-8A43-B1B18E964CA0}: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS2\Services\Tcpip\..\{07EF1E27-8525-4C9A-8A43-B1B18E964CA0}: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1


»»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""


»»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

Registry Cleaning done.

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


»»»»»»»»»»»»»»»»»»»»»»»» Reboot

C:\WINDOWS\default.htm Deleted
C:\WINDOWS\iexplorer.exe Deleted


»»»»»»»»»»»»»»»»»»»»»»»» End

#8 Sureshb

Sureshb
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:39 AM

Posted 26 May 2008 - 01:02 AM

I could run and save both the logs. Pls find both the logs

SmitFraudFix v2.322

Scan done at 0:29:36.98, Mon 05/26/2008
Run from C:\Documents and Settings\Suresh Bathula\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in normal mode

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» Killing process


»»»»»»»»»»»»»»»»»»»»»»»» hosts

127.0.0.1 localhost

»»»»»»»»»»»»»»»»»»»»»»»» VACFix

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix

S!Ri's WS2Fix: LSP not Found.


»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

GenericRenosFix by S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files

C:\WINDOWS\accesss.exe Deleted
C:\WINDOWS\astctl32.ocx Deleted
C:\WINDOWS\avpcc.dll Deleted
C:\WINDOWS\clrssn.exe Deleted
C:\WINDOWS\cpan.dll Deleted
C:\WINDOWS\default.htm Deleted
C:\WINDOWS\iexplorer.exe Deleted
C:\WINDOWS\loader.exe Deleted
C:\WINDOWS\mtwirl32.dll Deleted
C:\WINDOWS\notepad32.exe Deleted
C:\WINDOWS\olehelp.exe Deleted
C:\WINDOWS\systeem.exe Deleted
C:\WINDOWS\systemcritical.exe Deleted
C:\WINDOWS\time.exe Deleted
C:\WINDOWS\users32.exe Deleted
C:\WINDOWS\waol.exe Deleted
C:\WINDOWS\win32e.exe Deleted
C:\WINDOWS\win64.exe Deleted
C:\WINDOWS\winajbm.dll Deleted
C:\WINDOWS\window.exe Deleted
C:\WINDOWS\winmgnt.exe Deleted
C:\WINDOWS\x.exe Deleted
C:\WINDOWS\xplugin.dll Deleted
C:\WINDOWS\xxxvideo.hta Deleted
C:\WINDOWS\y.exe Deleted

»»»»»»»»»»»»»»»»»»»»»»»» IEDFix

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» 404Fix

404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» DNS

Description: Intel® PRO/Wireless 3945ABG Network Connection - Packet Scheduler Miniport
DNS Server Search Order: 192.168.0.1

HKLM\SYSTEM\CCS\Services\Tcpip\..\{07EF1E27-8525-4C9A-8A43-B1B18E964CA0}: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{07EF1E27-8525-4C9A-8A43-B1B18E964CA0}: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS2\Services\Tcpip\..\{07EF1E27-8525-4C9A-8A43-B1B18E964CA0}: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1


»»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""


»»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

Registry Cleaning done.

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


»»»»»»»»»»»»»»»»»»»»»»»» Reboot

C:\WINDOWS\default.htm Deleted
C:\WINDOWS\iexplorer.exe Deleted


»»»»»»»»»»»»»»»»»»»»»»»» End

Malwarebytes' Anti-Malware 1.12
Database version: 785

Scan type: Quick Scan
Objects scanned: 53136
Time elapsed: 11 minute(s), 53 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 9
Registry Values Infected: 4
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 11

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5321e378-ffad-4999-8c62-03ca8155f0b3} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Explorer Bars\{231f6fab-eced-4975-9ef2-c0c7bc81927b} (Adware.AdSponsor) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Installer (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\IEUpdate (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BM32e3c26f (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\advap32 (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Documents and Settings\Suresh Bathula\Application Data\Microsoft\dtsc\17376.exe (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\clbdll.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\lfn.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\a15s.exe (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\gjoswnip.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\000080.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\000090.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\clbdriver.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\spywarewarning.mht (Trojan.FakeAlert) -> Delete on reboot.
C:\WINDOWS\system32\ClickToFindandFixErrors_Intl.ico (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ClickToFindandFixErrors_US.ico (Malware.Trace) -> Quarantined and deleted successfully.

#9 Sureshb

Sureshb
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:39 AM

Posted 26 May 2008 - 01:02 AM

I could run and save both the logs. Pls find both the logs

SmitFraudFix v2.322

Scan done at 0:29:36.98, Mon 05/26/2008
Run from C:\Documents and Settings\Suresh Bathula\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in normal mode

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» Killing process


»»»»»»»»»»»»»»»»»»»»»»»» hosts

127.0.0.1 localhost

»»»»»»»»»»»»»»»»»»»»»»»» VACFix

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix

S!Ri's WS2Fix: LSP not Found.


»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

GenericRenosFix by S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files

C:\WINDOWS\accesss.exe Deleted
C:\WINDOWS\astctl32.ocx Deleted
C:\WINDOWS\avpcc.dll Deleted
C:\WINDOWS\clrssn.exe Deleted
C:\WINDOWS\cpan.dll Deleted
C:\WINDOWS\default.htm Deleted
C:\WINDOWS\iexplorer.exe Deleted
C:\WINDOWS\loader.exe Deleted
C:\WINDOWS\mtwirl32.dll Deleted
C:\WINDOWS\notepad32.exe Deleted
C:\WINDOWS\olehelp.exe Deleted
C:\WINDOWS\systeem.exe Deleted
C:\WINDOWS\systemcritical.exe Deleted
C:\WINDOWS\time.exe Deleted
C:\WINDOWS\users32.exe Deleted
C:\WINDOWS\waol.exe Deleted
C:\WINDOWS\win32e.exe Deleted
C:\WINDOWS\win64.exe Deleted
C:\WINDOWS\winajbm.dll Deleted
C:\WINDOWS\window.exe Deleted
C:\WINDOWS\winmgnt.exe Deleted
C:\WINDOWS\x.exe Deleted
C:\WINDOWS\xplugin.dll Deleted
C:\WINDOWS\xxxvideo.hta Deleted
C:\WINDOWS\y.exe Deleted

»»»»»»»»»»»»»»»»»»»»»»»» IEDFix

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» 404Fix

404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» DNS

Description: Intel® PRO/Wireless 3945ABG Network Connection - Packet Scheduler Miniport
DNS Server Search Order: 192.168.0.1

HKLM\SYSTEM\CCS\Services\Tcpip\..\{07EF1E27-8525-4C9A-8A43-B1B18E964CA0}: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{07EF1E27-8525-4C9A-8A43-B1B18E964CA0}: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS2\Services\Tcpip\..\{07EF1E27-8525-4C9A-8A43-B1B18E964CA0}: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1


»»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""


»»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

Registry Cleaning done.

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


»»»»»»»»»»»»»»»»»»»»»»»» Reboot

C:\WINDOWS\default.htm Deleted
C:\WINDOWS\iexplorer.exe Deleted


»»»»»»»»»»»»»»»»»»»»»»»» End

Malwarebytes' Anti-Malware 1.12
Database version: 785

Scan type: Quick Scan
Objects scanned: 53136
Time elapsed: 11 minute(s), 53 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 9
Registry Values Infected: 4
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 11

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5321e378-ffad-4999-8c62-03ca8155f0b3} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Explorer Bars\{231f6fab-eced-4975-9ef2-c0c7bc81927b} (Adware.AdSponsor) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Installer (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\IEUpdate (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BM32e3c26f (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\advap32 (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Documents and Settings\Suresh Bathula\Application Data\Microsoft\dtsc\17376.exe (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\clbdll.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\lfn.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\a15s.exe (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\gjoswnip.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\000080.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\000090.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\clbdriver.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\spywarewarning.mht (Trojan.FakeAlert) -> Delete on reboot.
C:\WINDOWS\system32\ClickToFindandFixErrors_Intl.ico (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ClickToFindandFixErrors_US.ico (Malware.Trace) -> Quarantined and deleted successfully.





I could run and save both the logs. Pls find both the logs

SmitFraudFix v2.322

Scan done at 0:29:36.98, Mon 05/26/2008
Run from C:\Documents and Settings\Suresh Bathula\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in normal mode

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» Killing process


»»»»»»»»»»»»»»»»»»»»»»»» hosts

127.0.0.1 localhost

»»»»»»»»»»»»»»»»»»»»»»»» VACFix

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix

S!Ri's WS2Fix: LSP not Found.


»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

GenericRenosFix by S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files

C:\WINDOWS\accesss.exe Deleted
C:\WINDOWS\astctl32.ocx Deleted
C:\WINDOWS\avpcc.dll Deleted
C:\WINDOWS\clrssn.exe Deleted
C:\WINDOWS\cpan.dll Deleted
C:\WINDOWS\default.htm Deleted
C:\WINDOWS\iexplorer.exe Deleted
C:\WINDOWS\loader.exe Deleted
C:\WINDOWS\mtwirl32.dll Deleted
C:\WINDOWS\notepad32.exe Deleted
C:\WINDOWS\olehelp.exe Deleted
C:\WINDOWS\systeem.exe Deleted
C:\WINDOWS\systemcritical.exe Deleted
C:\WINDOWS\time.exe Deleted
C:\WINDOWS\users32.exe Deleted
C:\WINDOWS\waol.exe Deleted
C:\WINDOWS\win32e.exe Deleted
C:\WINDOWS\win64.exe Deleted
C:\WINDOWS\winajbm.dll Deleted
C:\WINDOWS\window.exe Deleted
C:\WINDOWS\winmgnt.exe Deleted
C:\WINDOWS\x.exe Deleted
C:\WINDOWS\xplugin.dll Deleted
C:\WINDOWS\xxxvideo.hta Deleted
C:\WINDOWS\y.exe Deleted

»»»»»»»»»»»»»»»»»»»»»»»» IEDFix

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» 404Fix

404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» DNS

Description: Intel® PRO/Wireless 3945ABG Network Connection - Packet Scheduler Miniport
DNS Server Search Order: 192.168.0.1

HKLM\SYSTEM\CCS\Services\Tcpip\..\{07EF1E27-8525-4C9A-8A43-B1B18E964CA0}: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{07EF1E27-8525-4C9A-8A43-B1B18E964CA0}: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS2\Services\Tcpip\..\{07EF1E27-8525-4C9A-8A43-B1B18E964CA0}: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1


»»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""


»»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

Registry Cleaning done.

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


»»»»»»»»»»»»»»»»»»»»»»»» Reboot

C:\WINDOWS\default.htm Deleted
C:\WINDOWS\iexplorer.exe Deleted


»»»»»»»»»»»»»»»»»»»»»»»» End

Malwarebytes' Anti-Malware 1.12
Database version: 785

Scan type: Quick Scan
Objects scanned: 53136
Time elapsed: 11 minute(s), 53 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 9
Registry Values Infected: 4
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 11

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5321e378-ffad-4999-8c62-03ca8155f0b3} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Explorer Bars\{231f6fab-eced-4975-9ef2-c0c7bc81927b} (Adware.AdSponsor) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Installer (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\IEUpdate (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BM32e3c26f (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\advap32 (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Documents and Settings\Suresh Bathula\Application Data\Microsoft\dtsc\17376.exe (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\clbdll.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\lfn.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\a15s.exe (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\gjoswnip.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\000080.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\000090.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\clbdriver.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\spywarewarning.mht (Trojan.FakeAlert) -> Delete on reboot.
C:\WINDOWS\system32\ClickToFindandFixErrors_Intl.ico (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ClickToFindandFixErrors_US.ico (Malware.Trace) -> Quarantined and deleted successfully.

#10 Sureshb

Sureshb
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:39 AM

Posted 26 May 2008 - 08:13 AM

I could remove some..but still I'm getting some fake alerts from Windows security center saying
that possible spyware infection detected &
yellow triangle is often warning on right side corner that your computer is infected & some
times another triangle warning me that your computer is working slowly

My desktop background is

Warning : Spyware has been detected on your PC.

Your computer has several fatal errors due to Spyware activity.
It is strongly recommeneded to install an antispyware software
click here to scan your PC for spyware

#11 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,428 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:39 AM

Posted 26 May 2008 - 08:39 AM

OK good, now run this scan. You also needed to reboot after that scan to finish some removal.

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here.)
  • Under "Configuration and Preferences", click the Preferences button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Edited by boopme, 26 May 2008 - 08:40 AM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#12 Sureshb

Sureshb
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:39 AM

Posted 26 May 2008 - 10:40 AM

I have done that and below is the log



SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 05/26/2008 at 11:28 AM

Application Version : 4.1.1046

Core Rules Database Version : 3468
Trace Rules Database Version: 1459

Scan type : Complete Scan
Total Scan Time : 01:20:57

Memory items scanned : 484
Memory threats detected : 0
Registry items scanned : 5940
Registry threats detected : 18
File items scanned : 104161
File threats detected : 108

Parasite.CoolWebSearch Variant
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00110011-4b0b-44d5-9718-90c88817369b}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1f48aa48-c53a-4e21-85e7-ac7cc6b5ffb1}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{587dbf2d-9145-4c9e-92c2-1f953da73773}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{98dbbf16-ca43-4c33-be80-99e6694468a4}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e3eebbe8-9cab-4c76-b26a-747e25ebb4c6}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{fd9bc004-8331-4457-b830-4759ff704c22}
C:\WINDOWS\OLEHELP.EXE

HTMLCore Module BHO
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{086ae192-23a6-48d6-96ec-715f53797e85}

CoolWebSearch Parasite Variant
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{467faeb2-5f5b-4c81-bae0-2a4752ca7f4e}

Adware.CoolWebSearch
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5321e378-ffad-4999-8c62-03ca8155f0b3}

Browser Hijacker.Tubby
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{cf021f40-3e14-23a5-cba2-717765721306}

ClientMan BHO
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{fcaddc14-bd46-408a-9842-cdbe1c6d37eb}

Adware.Tracking Cookie
C:\Documents and Settings\Suresh Bathula\Cookies\suresh bathula@adopt.euroclick[1].txt
C:\Documents and Settings\Suresh Bathula\Cookies\suresh bathula@hitbox[2].txt
C:\Documents and Settings\Suresh Bathula\Cookies\suresh bathula@ehg-eset.hitbox[1].txt
C:\Documents and Settings\Satyavani Neppalli\Cookies\satyavani neppalli@2o7[1].txt
C:\Documents and Settings\Satyavani Neppalli\Cookies\satyavani neppalli@advertising[2].txt
C:\Documents and Settings\Satyavani Neppalli\Cookies\satyavani neppalli@atdmt[1].txt
C:\Documents and Settings\Satyavani Neppalli\Cookies\satyavani neppalli@atwola[2].txt
C:\Documents and Settings\Satyavani Neppalli\Cookies\satyavani neppalli@glb.adtechus[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@2o7[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@accounts[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@ad.yieldmanager[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@adbrite[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@adinterax[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@adopt.euroclick[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@adopt.specificclick[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@adrevolver[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@adrevolver[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@ads.adbrite[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@ads.cnn[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@ads.pointroll[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@ads.realtechnetwork[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@ads1.cricbuzz[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@advertising[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@anad.tacoda[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@anat.tacoda[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@apmebf[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@atdmt[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@atwola[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@bluestreak[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@burstnet[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@casalemedia[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@clicksor[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@doubleclick[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@dynamic.media.adrevolver[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@fastclick[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@insightexpressai[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@kontera[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@media.adrevolver[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@media6degrees[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@mediaplex[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@msnportal.112.2o7[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@questionmarket[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@realmedia[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@revenue[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@revsci[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@richmedia.yahoo[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@specificclick[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@statcounter[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@statse.webtrendslive[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@tacoda[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@trafficmp[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@tribalfusion[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@www.burstbeacon[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@www.burstnet[2].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@www.yourhitstats[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@xiti[1].txt
C:\Documents and Settings\Suresh Bathula\Local Settings\Temp\Cookies\suresh bathula@zedo[2].txt

Browser Hijacker.Internet Explorer Settings Hijack
HKU\.DEFAULT\Software\Microsoft\Internet Explorer\Main#Start Page [ C:\WINDOWS\system32\spywarewarning.mht ]
HKU\S-1-5-19\Software\Microsoft\Internet Explorer\Main#Start Page [ C:\WINDOWS\system32\spywarewarning.mht ]
HKU\S-1-5-19_Classes\Software\Microsoft\Internet Explorer\Main#Start Page [ C:\WINDOWS\system32\spywarewarning.mht ]
HKU\S-1-5-20\Software\Microsoft\Internet Explorer\Main#Start Page [ C:\WINDOWS\system32\spywarewarning.mht ]
HKU\S-1-5-20_Classes\Software\Microsoft\Internet Explorer\Main#Start Page [ C:\WINDOWS\system32\spywarewarning.mht ]
HKU\S-1-5-21-3835167338-2137041682-380311792-1005_Classes\Software\Microsoft\Internet Explorer\Main#Start Page [ C:\WINDOWS\system32\spywarewarning.mht ]
HKU\S-1-5-18\Software\Microsoft\Internet Explorer\Main#Start Page [ C:\WINDOWS\system32\spywarewarning.mht ]

Trojan.Fake-Drop/Gen
C:\WINDOWS\ACCESSS.EXE
C:\WINDOWS\AVPCC.DLL
C:\WINDOWS\CLRSSN.EXE
C:\WINDOWS\CPAN.DLL
C:\WINDOWS\CTFMON32.EXE
C:\WINDOWS\CTRLPAN.DLL
C:\WINDOWS\DIRECTX32.EXE
C:\WINDOWS\DNSRELAY.DLL
C:\WINDOWS\EDITPAD.EXE
C:\WINDOWS\EXPLORER32.EXE
C:\WINDOWS\FUNNIEST.EXE
C:\WINDOWS\FUNNY.EXE
C:\WINDOWS\GFMNAAA.DLL
C:\WINDOWS\HELPCVS.EXE
C:\WINDOWS\IEDLL.EXE
C:\WINDOWS\INETINF.EXE
C:\WINDOWS\INTERNET.EXE
C:\WINDOWS\MSCONFD.DLL
C:\WINDOWS\MSSPI.DLL
C:\WINDOWS\MSSYS.EXE
C:\WINDOWS\MSUPDATE.EXE
C:\WINDOWS\MSWSC10.DLL
C:\WINDOWS\MSWSC20.DLL
C:\WINDOWS\MTWIRL32.DLL
C:\WINDOWS\NOTEPAD32.EXE
C:\WINDOWS\QTTASKS.EXE
C:\WINDOWS\QUICKEN.EXE
C:\WINDOWS\RUNDLL16.EXE
C:\WINDOWS\SEARCHWORD.DLL
C:\WINDOWS\SISTEM.EXE
C:\WINDOWS\SVCHOST32.EXE
C:\WINDOWS\SVCINIT.EXE
C:\WINDOWS\TIME.EXE
C:\WINDOWS\USERS32.EXE
C:\WINDOWS\WAOL.EXE
C:\WINDOWS\WIN32E.EXE
C:\WINDOWS\WIN64.EXE
C:\WINDOWS\WINAJBM.DLL
C:\WINDOWS\WINDOW.EXE
C:\WINDOWS\WINMGNT.EXE
C:\WINDOWS\X.EXE
C:\WINDOWS\XPLUGIN.DLL
C:\WINDOWS\Y.EXE

Trojan.Net-Explore/DND
C:\WINDOWS\EXPLORE.EXE

Trojan.Unclassified/IExplorer-Fake
C:\WINDOWS\IEXPLORER.EXE

Trojan.Unclassified/Loader-Suspicious
C:\WINDOWS\LOADER.EXE

Trojan.Downloader-Systeem
C:\WINDOWS\SYSTEEM.EXE

Adware.Vundo Variant/Rel
C:\WINDOWS\SYSTEM32\MCRH.TMP

Rogue.Multi-Dropper/Installer
C:\WINDOWS\SYSTEM32\VBPDTVDP.EXE

Trojan.Downloader-SystemCritcial/Fake Alert
C:\WINDOWS\SYSTEMCRITICAL.EXE

#13 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,428 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:39 AM

Posted 26 May 2008 - 12:31 PM

So how is it running now?
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#14 Sureshb

Sureshb
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:39 AM

Posted 26 May 2008 - 01:49 PM

It seems everything is cleaned now. I haven't found any problem till now.
But I want to test for awhile. Pls. let me know if I need to do anything further.
Also can you pls. recommend how to avoid such spyware. I just went to some
election website and it caught upthere I think. can you recommend
some precautions to the system so that I can avoid infuture. I have the latest
version of NAV but its no way near its best for these type of malware.

I really appreciate your help. You have been very cooperative and patient.
Thanks a lot. I would always keep the services of your website in my mind.
Keep doing your wonderful job

Best wishes
Suresh

#15 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,428 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:39 AM

Posted 26 May 2008 - 08:27 PM

You're very welcome Sureshb. I came here over 4 years ago as you did .. dead PC not knowing what or how to do almost everything. BC took care of me I read, learned and never left. It was all free and very courteous. Grinler had a great idea.

Well in a day or two of wait and see if you feel all is good then....

Now you should Set a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since System Restore is a protected directory, your tools can not access it to delete these bad files which sometimes can reinfect your system. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Then go to Start > Run and type: Cleanmgr
  • Click "OK".
  • Click the "More Options" Tab.
  • Click "Clean Up" in the System Restore section to remove all previous restore points except the newly created one.
Well keep the Malwarebytes and SUperantispyware, Update weekly and scan at least that often.
If you decide to lose the NAV there are other free ones in our topic here..
Freeware Replacements For Common Commercial Apps
What firewall do you use?
Please read Quitman's topics list in Post 10 here http://www.bleepingcomputer.com/forums/top...tml#entry829374

Please feel free to ask any questions you need to.
boopme
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users