Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Rapid Antivirus?


  • Please log in to reply
7 replies to this topic

#1 Drayik

Drayik

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:20 PM

Posted 29 November 2008 - 10:06 AM

I've recently formatted my computer, and in the rush of getting everything back up and running, I got a keygen for one of my programs I lost the CD key for. I double clicked it, and it disapeared. Right away, I knew I was in trouble. I ran a malwarebytes scan and found 20 infections, 'fixed' them, and then restarted in safe mode, and did the same thing. I get back to full windows, scan again, 20 infections. So I decide to go ahead and get hijack this, only to find that I can't get on any type of virus removal site. I keep getting some fake notifications from "Rapid Antivirus" and every so often it brings up a fake blue stop error screen telling me I have an unregistered copy of Rapid Antivirus, and then goes to the windows startup animation, which tells me the same thing. Heres the log.




Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 9:43:17 AM, on 11/29/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\D-Link\Wireless G WUA-1340\AirGCFG.exe
C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe
C:\Program Files\Skype\Phone\Skype.exe
C:\Program Files\Skype\Plugin Manager\skypePM.exe
C:\WINDOWS\system32\sysmgr.exe
C:\Program Files\Windows Live\Messenger\usnsvc.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\msiconf.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

O2 - BHO: (no name) - {00cf9f61-7d2c-47d7-a38e-1bdab94416ee} - \\?\globalroot\systemroot\system32\nj2cf8.dll (file missing)
O2 - BHO: (no name) - {00d09461-61f0-4775-aead-f0bcffcaa1cc} - \\?\globalroot\systemroot\system32\nj2cf8.dll (file missing)
O2 - BHO: (no name) - {017ecba1-21d2-4ae1-bdec-8d7892d7ceb9} - C:\WINDOWS\system32\ssqRKdAQ.dll (file missing)
O4 - HKLM\..\Run: [D-Link Wireless G WUA-1340] C:\Program Files\D-Link\Wireless G WUA-1340\AirGCFG.exe
O4 - HKLM\..\Run: [ANIWZCS2Service] C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [Microsoft® System Manager] C:\WINDOWS\system32\sysmgr.exe
O4 - HKLM\..\Run: [rs32net] C:\WINDOWS\System32\rs32net.exe
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [Skype] "C:\Program Files\Skype\Phone\Skype.exe" /nosplash /minimized
O4 - HKCU\..\Run: [DAEMON Tools Lite] "C:\Program Files\DAEMON Tools Lite\daemon.exe" -autorun
O4 - HKCU\..\Run: [rs32net] C:\WINDOWS\System32\rs32net.exe
O4 - HKUS\.DEFAULT\..\Run: [msiexec.exe] msiconf.exe (User 'Default user')
O4 - .DEFAULT Startup: Rapid Antivirus.lnk = C:\Program Files\Rapid Antivirus\Rapid Antivirus.exe (User 'Default user')
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O20 - AppInit_DLLs: csmgza.dll
O20 - Winlogon Notify: wincqt32 - C:\WINDOWS\SYSTEM32\wincqt32.dll
O23 - Service: ANIWZCSd Service (ANIWZCSdService) - Wireless Service - C:\Program Files\ANI\ANIWZCS2 Service\ANIWZCSdS.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

--
End of file - 3781 bytes


And this is from RSIT


info.txt logfile of random's system information tool 1.04 2008-11-29 10:13:29

======Uninstall list======

-->MsiExec /X{A7E07C2B-2220-4415-87E3-784D5814BC93}
-->rundll32.exe setupapi.dll,InstallHinfSection DefaultUninstall 132 C:\WINDOWS\INF\PCHealth.inf
Adobe Flash Player 10 Plugin-->C:\WINDOWS\system32\Macromed\Flash\uninstall_plugin.exe
ANIO Service-->RunDll32 C:\PROGRA~1\COMMON~1\INSTAL~1\engine\6\INTEL3~1\Ctor.dll,LaunchSetup "C:\Program Files\InstallShield Installation Information\{7B5CE976-C7A9-4E38-A7F3-6C8EF025DD8E}\Setup.exe"
ANIWZCS2 Service-->RunDll32 C:\PROGRA~1\COMMON~1\INSTAL~1\engine\6\INTEL3~1\Ctor.dll,LaunchSetup "C:\Program Files\InstallShield Installation Information\{4C590030-7469-453E-8589-D15DA9D03F52}\Setup.exe"
HijackThis 2.0.2-->"C:\Program Files\Trend Micro\HijackThis\HijackThis.exe" /uninstall
Malwarebytes' Anti-Malware-->"C:\Program Files\Malwarebytes' Anti-Malware\unins000.exe"
Mozilla Firefox (3.0.4)-->C:\Program Files\Mozilla Firefox\uninstall\helper.exe
NVIDIA Drivers-->C:\WINDOWS\system32\nvuninst.exe UninstallGUI
NVIDIA PhysX v8.09.04-->MsiExec.exe /X{A7E07C2B-2220-4415-87E3-784D5814BC93}
Realtek High Definition Audio Driver-->RunDll32 C:\PROGRA~1\COMMON~1\INSTAL~1\PROFES~1\RunTime\11\50\Intel32\Ctor.dll,LaunchSetup "C:\Program Files\InstallShield Installation Information\{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}\Setup.exe" -l0x9 -removeonly
Skype™ 3.8-->MsiExec.exe /X{5C82DAE5-6EB0-4374-9254-BE3319BA4E82}
Windows Live installer-->MsiExec.exe /X{A7E4ECCA-4A8E-4258-8EC8-2DCCF5B11320}
Windows Live Messenger-->MsiExec.exe /X{508CE775-4BA4-4748-82DF-FE28DA9F03B0}
Wireless G WUA-1340-->C:\Program Files\InstallShield Installation Information\{D895E3FB-45BA-4BBF-BE50-0DEED3CD3F7E}\setup.exe -runfromtemp -l0x0009 -removeonly
Xilisoft iPod Rip-->C:\Program Files\Xilisoft\iPod Rip\Uninstall.exe

======Environment variables======

"ComSpec"=%SystemRoot%\system32\cmd.exe
"Path"=%SystemRoot%\system32;%SystemRoot%;%SystemRoot%\System32\Wbem
"windir"=%SystemRoot%
"FP_NO_HOST_CHECK"=NO
"OS"=Windows_NT
"PROCESSOR_ARCHITECTURE"=x86
"PROCESSOR_LEVEL"=15
"PROCESSOR_IDENTIFIER"=x86 Family 15 Model 67 Stepping 3, AuthenticAMD
"PROCESSOR_REVISION"=4303
"NUMBER_OF_PROCESSORS"=2
"PATHEXT"=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH
"TEMP"=%SystemRoot%\TEMP
"TMP"=%SystemRoot%\TEMP

-----------------EOF-----------------

Edited by Drayik, 29 November 2008 - 10:15 AM.


BC AdBot (Login to Remove)

 


#2 OldTimer

OldTimer

    Malware Expert


  • Members
  • 11,092 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:North Carolina
  • Local time:01:20 PM

Posted 30 November 2008 - 11:57 AM

Hello Drayik and welcome to BC. Let's see what we can find.

Before running a new scan let's clean out the temporoary folders.

Download ATF Cleaner to your Desktop.
  • Double-click ATF-Cleaner.exe to run the program.
  • Click Select All found at the bottom of the list.
  • Click the Empty Selected button.
If you use Firefox browser, do this also:
  • Click Firefox at the top and choose Select All from the list.
  • Click the Empty Selected button.
  • NOTE : If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browser, do this also:
  • Click Opera at the top and choose Select All from the list.
  • Close ALL Internet browsers (very important).
  • Click the Empty Selected button.
  • NOTE : If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.

Now download OTScanIt2.exe to your Desktop and double-click on it to extract the files. It will create a folder named OTScanIt2 on your desktop.

Note: You must be logged on to the system with an account that has Administrator privileges to run this program.
  • Close ALL OTHER PROGRAMS.
  • Open the OTScanIt2 folder and double-click on OTScanIt2.exe to start the program (if you are running on Vista then right-click the program and choose Run as Administrator).
  • Click the Scan All Users checkbox on the toolbar.
  • Do not change any other settings.
  • Now click the Run Scan button on the toolbar.
  • Let it run unhindered until it finishes.
  • When the scan is complete Notepad will open with the report file loaded in it.
  • Click the Format menu and make sure that Wordwrap is not checked. If it is then click on it to uncheck it.
  • Close Notepad (saving the change if necessry).
Use the Add Reply button and Attach the scan back here (do not copy/paste it as it will be too big to fit into the post). It will be located in the OTScanIt2 folder and named OTScanIt.txt.

I will review it when it comes in.

Cheers.

OT
I do not respond to PM's requesting help. That's what the forums are here for. Please use them so that others may benefit from your questions and the responses you receive.
OldTimer

Posted Image

#3 Drayik

Drayik
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:20 PM

Posted 01 December 2008 - 12:49 AM

Thanks for the help! I ran a few more scans and did a few more things since I posted, and got rid of the rapidantivirus, but I still have something, I'm still not able to get on any kind of virus protection site. Heres my new hijack this log, and the log you requested, along with the malwarebytes list. (just in case you want these)

Attached Files


Edited by Drayik, 01 December 2008 - 11:26 AM.


#4 OldTimer

OldTimer

    Malware Expert


  • Members
  • 11,092 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:North Carolina
  • Local time:01:20 PM

Posted 01 December 2008 - 01:49 AM

Hi Drayik. This system is pretty heavily infected. Please do not run any tools or applications that you have not been instructed to run. It will only make matters worse.

Now, let's see what we can do. Follow the steps below in order:

Step #1

Please download The Avenger by Swandog46 to your Desktop.
  • Click on Avenger.zip to open the file
  • Extract avenger.exe to your desktop
Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+C):

Drivers to delete:
ati1hkxx
Files to delete:
%systemdrive%\345114352
%systemdrive%\qthqdso.exe
%systemdrive%\yvmkdwn.exe
%systemroot%\system32\betavosi
%systemroot%\system32\cmdl.lock
%systemroot%\system32\cnf.dat
%systemroot%\system32\drivers\826913f8.sys
%systemroot%\system32\drivers\ati1hkxx.sys
%systemroot%\system32\drivers\tdssmqlt.sys
%systemroot%\system32\hggyvtld.dll
%systemroot%\system32\msiconf.exe
%systemroot%\system32\msvcrt2.dll
%systemroot%\system32\nj2cf8.dll
%systemroot%\system32\peyuvaba.dll
%systemroot%\system32\qhdawlqd.dll
%systemroot%\system32\sysmgr.exe
%systemroot%\system32\tdssosvd.dat
%systemroot%\system32\vipepili.dll
%systemroot%\system32\wincqt32.dll
%systemroot%\system32\windrv.sys
%systemroot%\tasks\zhpmstsv.job
c:\documents and settings\all users.windows\application data\microsoft\network\downloader\qmgr0.dat
c:\documents and settings\all users.windows\application data\microsoft\network\downloader\qmgr1.dat
d:\autorun.inf
Folders to delete:
%appdata%\gadcom
%systemroot%\system32\124909

Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.

Now, start The Avenger program by clicking on its icon on your desktop.
  • Click in the window labeled Input Scrupt Here and paste the text copied to the clipboard into it by pressing (Ctrl+V).
  • Click the Execute button
  • Answer "Yes" twice when prompted.
The Avenger will automatically do the following:
  • It will Restart your computer. ( In cases where the code to execute contains "Drivers to Unload", The Avenger will actually restart your system twice.)
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avenger?s actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
Step #2

Start OTScanIt2. Copy/Paste the information in the codebox below into the pane where it says "Paste fix here" and then click the Run Fix button.

[Kill Explorer]
[Unregister Dlls]
[Processes - Safe List]
YY -> sysmgr.exe -> %SystemRoot%\system32\sysmgr.exe
[Driver Services - Safe List]
YY -> (ati1hkxx) ati1hkxx [Kernel | Boot | Running] -> %SystemRoot%\system32\drivers\ati1hkxx.sys
[Registry - Safe List]
< BHO's [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
YN -> {2514de97-7fc8-4eab-beaa-569829453ef2} [HKLM] -> %SystemRoot%\system32\sudenupu.dll [Reg Error: Value  does not exist or could not be read.]
< Run [HKEY_LOCAL_MACHINE\] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
YY -> "Microsoft(R) System Manager" -> %SystemRoot%\system32\sysmgr.exe [C:\WINDOWS\system32\sysmgr.exe]
YY -> "mijolejaru" -> %SystemRoot%\system32\vipepili.dll [Rundll32.exe "C:\WINDOWS\system32\vipepili.dll",s]
YN -> "SNM" -> [C:\Program Files\SpyNoMore\SNM.exe /startup]
< Run [HKEY_USERS\.DEFAULT\] > -> HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
YY -> "msiexec.exe" -> %SystemRoot%\system32\msiconf.exe [msiconf.exe]
< Run [HKEY_USERS\S-1-5-18\] > -> HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
YY -> "msiexec.exe" -> %SystemRoot%\system32\msiconf.exe [msiconf.exe]
< Run [HKEY_USERS\s-1-5-19\] > -> HKEY_USERS\s-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
YY -> "mijolejaru" -> %SystemRoot%\system32\vipepili.dll [Rundll32.exe "C:\WINDOWS\system32\vipepili.dll",s]
< Run [HKEY_USERS\s-1-5-20\] > -> HKEY_USERS\s-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
YY -> "mijolejaru" -> %SystemRoot%\system32\vipepili.dll [Rundll32.exe "C:\WINDOWS\system32\vipepili.dll",s]
< AppInit_DLLs [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\\AppInit_DLLs
*AppInit_DLLs* -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\\AppInit_Dlls
YN -> csmgza.dll -> 
YY -> C:\WINDOWS\system32\peyuvaba.dll -> %SystemRoot%\system32\peyuvaba.dll
< AppInit_DLLs [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\\AppInit_DLLs
< Winlogon\Notify settings [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\
YY -> wincqt32 -> %SystemRoot%\system32\wincqt32.dll
< LSA Authentication Packages [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\\Authentication Packages
*LSA Authentication Packages* -> HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\\Authentication Packages
YY -> C:\WINDOWS\system32\ssqRKdAQ -> 
< LSA Authentication Packages [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\\Authentication Packages
< Drives with AutoRun files > -> 
YY -> D:\autorun.inf [[autorun] | open=Installer.exe | icon=disc.ico |  | ] -> D:\autorun.inf [ UDF ]
< MountPoints2 [HKEY_CURRENT_USER] > -> HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2
YN -> \D -> 
YN -> \E -> 
YN -> \{b94de292-bd0f-11dd-9b63-806d6172696f} -> 
YN -> \{cea54715-be9e-11dd-8295-001e58a2e42f} -> 
[Files/Folders - Created Within 30 Days]
NY -> 1 C:\*.tmp files -> C:\*.tmp
NY -> 1 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp
NY -> 4 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp
NY -> windrv.sys -> %SystemRoot%\System32\windrv.sys
NY -> msiconf.exe -> %SystemRoot%\System32\msiconf.exe
NY -> nj2cf8.dll -> %SystemRoot%\System32\nj2cf8.dll
NY -> qhdawlqd.dll -> %SystemRoot%\System32\qhdawlqd.dll
NY -> 124909 -> %SystemRoot%\System32\124909
NY -> cmdl.lock -> %SystemRoot%\System32\cmdl.lock
NY -> cnf.dat -> %SystemRoot%\System32\cnf.dat
NY -> msvcrt2.dll -> %SystemRoot%\System32\msvcrt2.dll
NY -> yvmkdwn.exe -> %SystemDrive%\yvmkdwn.exe
NY -> TDSSosvd.dat -> %SystemRoot%\System32\TDSSosvd.dat
NY -> TDSSmqlt.sys -> %SystemRoot%\System32\drivers\TDSSmqlt.sys
NY -> sysmgr.exe -> %SystemRoot%\System32\sysmgr.exe
NY -> 826913f8.sys -> %SystemRoot%\System32\drivers\826913f8.sys
NY -> gadcom -> %AppData%\gadcom
NY -> ati1hkxx.sys -> %SystemRoot%\System32\drivers\ati1hkxx.sys
NY -> qthqdso.exe -> %SystemDrive%\qthqdso.exe
NY -> wincqt32.dll -> %SystemRoot%\System32\wincqt32.dll
NY -> hgGyvTLD.dll -> %SystemRoot%\System32\hgGyvTLD.dll
NY -> zhpmstsv.job -> %SystemRoot%\tasks\zhpmstsv.job
NY -> 345114352 -> %SystemDrive%\345114352
[Files/Folders - Modified Within 30 Days]
NY -> 1 C:\*.tmp files -> C:\*.tmp
NY -> 1 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp
NY -> 4 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp
NY -> qmgr0.dat -> C:\Documents and Settings\All Users.WINDOWS\Application Data\Microsoft\Network\Downloader\qmgr0.dat
NY -> qmgr1.dat -> C:\Documents and Settings\All Users.WINDOWS\Application Data\Microsoft\Network\Downloader\qmgr1.dat
NY -> 826913f8.sys -> %SystemRoot%\System32\drivers\826913f8.sys
NY -> betavosi -> %SystemRoot%\System32\betavosi
NY -> zhpmstsv.job -> %SystemRoot%\tasks\zhpmstsv.job
NY -> ati1hkxx.sys -> %SystemRoot%\System32\drivers\ati1hkxx.sys
NY -> windrv.sys -> %SystemRoot%\System32\windrv.sys
NY -> msiconf.exe -> %SystemRoot%\System32\msiconf.exe
NY -> nj2cf8.dll -> %SystemRoot%\System32\nj2cf8.dll
NY -> sysmgr.exe -> %SystemRoot%\System32\sysmgr.exe
NY -> qhdawlqd.dll -> %SystemRoot%\System32\qhdawlqd.dll
NY -> cmdl.lock -> %SystemRoot%\System32\cmdl.lock
NY -> cnf.dat -> %SystemRoot%\System32\cnf.dat
NY -> msvcrt2.dll -> %SystemRoot%\System32\msvcrt2.dll
NY -> yvmkdwn.exe -> %SystemDrive%\yvmkdwn.exe
NY -> TDSSmqlt.sys -> %SystemRoot%\System32\drivers\TDSSmqlt.sys
NY -> TDSSosvd.dat -> %SystemRoot%\System32\TDSSosvd.dat
NY -> qthqdso.exe -> %SystemDrive%\qthqdso.exe
NY -> wincqt32.dll -> %SystemRoot%\System32\wincqt32.dll
NY -> hgGyvTLD.dll -> %SystemRoot%\System32\hgGyvTLD.dll
NY -> 345114352 -> %SystemDrive%\345114352
[Empty Temp Folders]
[Start Explorer]

The fix should only take a very short time. When the fix is completed a message box will popup either telling you that it is finished, or that a reboot is needed to complete the fix. If the fix is complete, click the Ok button and Notepad will open with a log of actions taken during the fix. Post that log back here in your next reply.

If a reboot is required, click the "Yes" button to reboot the machine. After the reboot, OTScanIt2 will finish moving any files that could not be moved during the fix and NotePad will open with the final results at that time. Post that log back here in your next reply.

Step #3

Now let's run an online virus scan. Both of these require Internet Explorer. Try F-Secure first. Sometimes it doesn't play nice with other system components so if it cannot complete then try the Kaspersky scan. You only need to complete one of the two.

Run the F-Secure Online Scanner

Note: This Scanner is for Internet Explorer Only!
  • Click on Online Services and then Online Scanner
  • Accept the License Agreement.
  • Once the ActiveX installs,Click Full System Scan
  • Once the download completes,the scan will begin automatically.
  • The scan will take some time to finish,so please be patient.
  • When the scan completes, click the Automatic cleaning (recommended) button.
  • Click the Show Report button and Copy&Paste the entire report in your next reply.
If the F-Secure scan did not work then try an online scan with Kaspersky WebScanner

Click on Kaspersky Online Scanner

You will be prompted to install an ActiveX component from Kaspersky, click Yes.
  • The program will launch and then begin downloading the latest definition files:
  • Once the files have been downloaded click on NEXT
  • Now click on Scan Settings
  • In the scan settings make that the following are selected:
    • Scan using the following Anti-Virus database:
      • Extended (if available otherwise Standard)
    • Scan Options:Scan Archives
      Scan Mail Bases
  • Click OK
  • Now under select a target to scan:Select My Computer
  • The program will start and scan your system.
  • The scan will take a while so be patient and let it run.
  • Once the scan is complete it will display if your system has been infected.
  • Click on the Save as Text button:
  • Save the file to your desktop.
  • Copy and paste that information in your next post.
Step #4

Run a new OTScanIt2 scan with the following options

Note: You must be logged on to the system with an account that has Administrator privileges to run this program.
  • Close ALL OTHER PROGRAMS.
  • Open the OTScanIt2 folder and double-click on OTScanIt2.exe to start the program.
  • Just use the default settings.
  • Do not change any other settings.
  • Now click the Run Scan button on the toolbar.
  • Let it run unhindered until it finishes.
  • When the scan is complete Notepad will open with the report file loaded in it.
  • Click the Format menu and make sure that Wordwrap is not checked. If it is then click on it to uncheck it and close Notepad (save changes if necessary).
  • Close OTScanIt2 and locate the OTScanIt.txt file in the folder where OTScanIt2.exe is located.
  • Attach that file back here in your next reply.
Step #5

Copy/paste the following back here in your next reply:
  • The Avenger report (c:\Avenger.txt)
  • The latest OTScanIt2 fix log (look in the OTScanIt2 folder for a file with a name in the form of mmddyyyy_hhmmss.log for month, day, year, hours, minutes, and seconds that the scan was run. )
  • The online virus scan report (whichever one you ran)
Attach the following back here in your next reply:
  • The new OTScanIt2 scan log
I will review the information when it comes back in.

Also let me know of any problems you encountered performing the steps above or any continuing problems you are still having with the computer.

Cheers.

OT
I do not respond to PM's requesting help. That's what the forums are here for. Please use them so that others may benefit from your questions and the responses you receive.
OldTimer

Posted Image

#5 Drayik

Drayik
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:20 PM

Posted 01 December 2008 - 04:33 AM

I did a few more scans before I got your reply, so I'm really sorry if I screwed something up, (and it looks like it did, the OTscan fix didn't work, it just froze, and the avenger didn't find half the files to delete)

After cleaning it with the online scan, malwarebytes finds nothing.


I'll wait for a reply before I do anything else, I'm sorry.

Attached Files



#6 OldTimer

OldTimer

    Malware Expert


  • Members
  • 11,092 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:North Carolina
  • Local time:01:20 PM

Posted 01 December 2008 - 09:25 AM

Hi Drayik. Well, run a new OTScanIt2 scan (Step #4 above) and let's see what we have.

Cheers.

OT
I do not respond to PM's requesting help. That's what the forums are here for. Please use them so that others may benefit from your questions and the responses you receive.
OldTimer

Posted Image

#7 Drayik

Drayik
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:20 PM

Posted 01 December 2008 - 11:27 AM

Here it is.

Attached Files



#8 OldTimer

OldTimer

    Malware Expert


  • Members
  • 11,092 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:North Carolina
  • Local time:01:20 PM

Posted 01 December 2008 - 06:19 PM

Hi Drayik. Everything looks good so even though it might not have finished it did do what it was supposed to. Go ahead and run the system normally for a couple of days to see if there are any more malware related issues and hten get back with me so we can do some final cleanup.

Cheers.

OT
I do not respond to PM's requesting help. That's what the forums are here for. Please use them so that others may benefit from your questions and the responses you receive.
OldTimer

Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users