Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

problem with malwares


  • This topic is locked This topic is locked
2 replies to this topic

#1 Bhnm

Bhnm

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:On a gleaming razor's edge
  • Local time:02:18 PM

Posted 19 August 2010 - 01:44 AM

here i post my hijack this log :
Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 7:43:06 AM, on 8/19/2010
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.17184)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Alwil Software\Avast5\AvastSvc.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Winamp\winampa.exe
C:\PROGRA~1\ALWILS~1\Avast5\avastUI.exe
C:\Program Files\Internet Download Manager\IDMan.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Xfire\Xfire.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\PnkBstrA.exe
C:\WINDOWS\system32\PnkBstrB.exe
C:\Program Files\Internet Download Manager\IEMonitor.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\BitTorrent\bittorrent.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Hijack This Stinkin Malware\Trend Micro\HiJackThis\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/customize/.../search/ie.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://red.clientapps.yahoo.com/customize/...//www.yahoo.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=105563
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://red.clientapps.yahoo.com/customize/...//www.yahoo.com
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = local
R3 - URLSearchHook: UrlSearchHook Class - {00000000-6E41-4FD3-8538-502F5495E5FC} - C:\Program Files\Ask.com\GenericAskToolbar.dll
O1 - Hosts: dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPKYiA1LQohRTwU2aYzKLJPgox9mlFJND8ofXBE4BGXTyOiiPZeM0Kd
O1 - Hosts: MF2H9O205hCU46fIBacQXkuhTNOMSAIRaGFZNQG!IjgVH7UJ1cSRCC0iy
O1 - Hosts: s5wS8SPI51r9ksnBQXmnz3Fdw!gENBc897bULUu1J38!1t3Dje2pd4jwbaQFbCR0M8QVqb03njLbELHVZgGHT6YxQcAYRE
O1 - Hosts: qrpvd6dO44lptjN6QDhkJhmDPeufZvQVs7q!
O1 - Hosts: KfslHD6uYPKYiA1LQohRTwU2aYzKLJPgox9
O1 - Hosts: lFJND8ofXBE4BGXTyOiiPZeM0Kdy5yMF2H9O205hCU46
O1 - Hosts: acQXkuhTNOMSAIRaGFZNQG!IjgVH7UJ1cSRCC0iy7s5wS8SPI51r9ksnBQXm
O1 - Hosts: z3Fdw!gENBc897bULUu1J38!1t3Dje2pd4jwbaQFbCR0M
O1 - Hosts: QVqb03njLbELHVZgGHT6YxQcAYREfqrpvd6dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPKYiA1LQohRTwU2aYzKLJ
O1 - Hosts: x9mlFJND8ofXBE4BGXTyOiiPZeM0Kdy5yMF2H9O205hCU4
O1 - Hosts: BacQXkuhTNOMSAIRaGFZNQG!IjgVH7UJ1cSRCC0iy7s5wS8SPI51r9ksnBQXmnz3Fdw
O1 - Hosts: NBc897bULUu1J38!1t3Dje2pd4jwbaQFbCR0M8QVqb03njLbELHVZgGHT6YxQcA
O1 - Hosts: fqrpvd6dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPKYiA1LQohRTwU2a
O1 - Hosts: zKLJPgox9mlFJND8ofXBE4BGXTyOiiPZeM0Kdy5yMF2H9O205hCU46fIBacQXkuhTNOMSAIRaGFZNQG!IjgVH
O1 - Hosts: UJ1cSRCC0iy7s5wS8SPI51r9ksnBQXmnz3Fdw!gENBc897bULUu1J38!1t3Dje2pd4jwbaQFbCR0M8QVqb03njLbELHVZgG
O1 - Hosts: T6YxQcAYREfqrpvd6dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPKYiA1LQoh
O1 - Hosts: U2aYzKLJPgox9mlFJND8ofXBE4BGXTyOiiPZeM0Kdy5yMF2H9O205h
O1 - Hosts: U46fIBacQXkuhTNOMSAIRaGFZNQG!IjgVH7UJ1cSRCC0iy7s5wS8SPI51r9ks
O1 - Hosts: BQXmnz3Fdw!gENBc897bULUu1J38!1t3Dje2pd4jwbaQ
O1 - Hosts: bCR0M8QVqb03njLbELHVZgGHT6YxQcAYREfqrpvd6dO44lptjN6QDhkJhmDPeufZv
O1 - Hosts: 7q!eKfslHD6uYPKYiA1LQohRTwU2aYzKLJPgox9mlFJND8ofXB
O1 - Hosts: 4BGXTyOiiPZeM0Kdy5yMF2H9O205hCU46fIBacQXkuhTNOMSAIRaGFZNQG!IjgV
O1 - Hosts: 7UJ1cSRCC0iy7s5wS8SPI51r9ksnBQXmnz3Fdw!gENBc897bULUu1J38!1t3Dje2pd4
O1 - Hosts: wbaQFbCR0M8QVqb03njLbELHVZgGHT6YxQcAYREf
O1 - Hosts: vd6dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPKYi
O1 - Hosts: 1LQohRTwU2aYzKLJPgox9mlFJND8ofXBE4BGXTyOiiPZeM0Kdy5yMF2H9O
O1 - Hosts: hCU46fIBacQXkuhTNOMSAIRaGFZNQG!IjgVH7UJ1cSRCC0iy7s5wS8SPI51r9ksnBQXmnz3Fdw!gENBc897bULUu1J38
O1 - Hosts: 1t3Dje2pd4jwbaQFbCR0M8QVqb03njLbELHVZgGHT6YxQcAYREfqrpvd6dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPK
O1 - Hosts: iA1LQohRTwU2aYzKLJPgox9mlFJND8ofXBE4BGXTyOiiPZeM0Kdy5yMF2H9O205hCU46fIBacQXkuhTNOMSAIR
O1 - Hosts: GFZNQG!IjgVH7UJ1cSRCC0iy7s5wS8
O1 - Hosts: PI51r9ksnBQXmnz3Fdw!gENBc897bULUu1J38!1t3Dje2pd4jwbaQFbCR0M8QVqb03njLbELHVZgGHT
O1 - Hosts: QcAYREfqrpvd6dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPKY
O1 - Hosts: A1LQohRTwU2aYzKLJPgox9mlFJND8ofXBE4BGXT
O1 - Hosts: OiiPZeM0Kdy5yMF2H9O205hCU46fIBacQXkuhTNOMSAIRaGFZNQG!IjgV
O1 - Hosts: 7UJ1cSRCC0iy7s5wS8SPI51r9ksnBQXmnz3Fdw!gENBc897bULUu1J38!1t3Dje2pd4
O1 - Hosts: aQFbCR0M8QVqb03njLbELHVZgGHT6Yx
O1 - Hosts: cAYREfqrpvd6dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPKYiA1LQohRTwU2aYzKLJPgox
O1 - Hosts: FJND8ofXBE4BGXTyOiiPZeM0Kdy5yMF2H9O205hCU46
O1 - Hosts: IBacQXkuhTNOMSAIRaGFZNQG!IjgVH7UJ1cS
O1 - Hosts: 0iy7s5wS8SPI51r9ksnBQXmnz3Fdw!gENBc897bULUu1J38!1t3Dje2pd4jwb
O1 - Hosts: QFbCR0M8QVqb03njLbELHVZgGHT6Yx
O1 - Hosts: cAYREfqrpvd6dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPKYiA1LQohRTwU2aYzKLJPgox
O1 - Hosts: FJND8ofXBE4BGXTyOiiPZeM0Kdy5yMF2H9O205hCU46
O1 - Hosts: IBacQXkuhTNOMSAIRaGFZNQG!IjgVH7UJ1cS
O1 - Hosts: 0iy7s5wS8SPI51r9ksnBQXmnz3Fdw!gENBc897bULUu1J38!1t3Dje2pd4jwb
O1 - Hosts: QFbCR0M8QVqb03njLbELHVZgGHT6Yx
O1 - Hosts: cAYREfqrpvd6dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPKYiA1LQohRTwU2aYzKLJPgox
O1 - Hosts: FJND8ofXBE4BGXTyOiiPZeM0Kdy5yMF2H9O205hCU46
O1 - Hosts: IBacQXkuhTNOMSAIRaGFZNQG!IjgVH7UJ1cS
O1 - Hosts: 0iy7s5wS8SPI51r9ksnBQXmnz3Fdw!gENBc897bULUu1J38!1t3Dje2pd4jwb
O1 - Hosts: QFbCR0M8QVqb03njLbELHVZgGHT6Yx
O1 - Hosts: cAYREfqrpvd6dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPKYiA1LQohRTwU2aYzKLJPgox
O1 - Hosts: FJND8ofXBE4BGXTyOiiPZeM0Kdy5yMF2H9O205hCU46
O1 - Hosts: IBacQXkuhTNOMSAIRaGFZNQG!IjgVH7UJ1cS
O1 - Hosts: 0iy7s5wS8SPI51r9ksnBQXmnz3Fdw!gENBc897bULUu1J38!1t3Dje2pd4jwb
O1 - Hosts: QFbCR0M8QVqb03njLbELHVZgGHT6Yx
O1 - Hosts: cAYREfqrpvd6dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPKYiA1LQohRTwU2aYzKLJPgox
O1 - Hosts: FJND8ofXBE4BGXTyOiiPZeM0Kdy5yMF2H9O205hCU46
O1 - Hosts: IBacQXkuhTNOMSAIRaGFZNQG!IjgVH7UJ1cS
O1 - Hosts: 0iy7s5wS8SPI51r9ksnBQXmnz3Fdw!gENBc897bULUu1J38!1t3Dje2pd4jwb
O1 - Hosts: QFbCR0M8QVqb03njLbELHVZgGHT6Yx
O1 - Hosts: cAYREfqrpvd6dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPKYiA1LQohRTwU2aYzKLJPgox
O1 - Hosts: FJND8ofXBE4BGXTyOiiPZeM0Kdy5yMF2H9O205hCU46
O1 - Hosts: IBacQXkuhTNOMSAIRaGFZNQG!IjgVH7UJ1cS
O1 - Hosts: 0iy7s5wS8SPI51r9ksnBQXmnz3Fdw!gENBc897bULUu1J38!1t3Dje2pd4jwb
O1 - Hosts: QFbCR0M8QVqb03njLbELHVZgGHT6Yx
O1 - Hosts: cAYREfqrpvd6dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPKYiA1LQohRTwU2aYzKLJPgox
O1 - Hosts: FJND8ofXBE4BGXTyOiiPZeM0Kdy5yMF2H9O205hCU46
O1 - Hosts: IBacQXkuhTNOMSAIRaGFZNQG!IjgVH7UJ1cS
O1 - Hosts: 0iy7s5wS8SPI51r9ksnBQXmnz3Fdw!gENBc897bULUu1J38!1t3Dje2pd4jwb
O1 - Hosts: QFbCR0M8QVqb03njLbELHVZgGHT6Yx
O1 - Hosts: cAYREfqrpvd6dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPKYiA1LQohRTwU2aYzKLJPgox
O1 - Hosts: FJND8ofXBE4BGXTyOiiPZeM0Kdy5yMF2H9O205hCU46
O1 - Hosts: IBacQXkuhTNOMSAIRaGFZNQG!IjgVH7UJ1cS
O1 - Hosts: 0iy7s5wS8SPI51r9ksnBQXmnz3Fdw!gENBc897bULUu1J38!1t3Dje2pd4jwb
O1 - Hosts: QFbCR0M8QVqb03njLbELHVZgGHT6Yx
O1 - Hosts: cAYREfqrpvd6dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPKYiA1LQohRTwU2aYzKLJPgox
O1 - Hosts: FJND8ofXBE4BGXTyOiiPZeM0Kdy5yMF2H9O205hCU46
O1 - Hosts: IBacQXkuhTNOMSAIRaGFZNQG!IjgVH7UJ1cS
O1 - Hosts: 0iy7s5wS8SPI51r9ksnBQXmnz3Fdw!gENBc897bULUu1J38!1t3Dje2pd4jwb
O1 - Hosts: QFbCR0M8QVqb03njLbELHVZgGHT6Yx
O1 - Hosts: cAYREfqrpvd6dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPKYiA1LQohRTwU2aYzKLJPgox
O1 - Hosts: FJND8ofXBE4BGXTyOiiPZeM0Kdy5yMF2H9O205hCU46
O1 - Hosts: IBacQXkuhTNOMSAIRaGFZNQG!IjgVH7UJ1cS
O1 - Hosts: 0iy7s5wS8SPI51r9ksnBQXmnz3Fdw!gENBc897bULUu1J38!1t3Dje2pd4jwb
O1 - Hosts: QFbCR0M8QVqb03njLbELHVZgGHT6Yx
O1 - Hosts: cAYREfqrpvd6dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPKYiA1LQohRTwU2aYzKLJPgox
O1 - Hosts: FJND8ofXBE4BGXTyOiiPZeM0Kdy5yMF2H9O205hCU46
O1 - Hosts: IBacQXkuhTNOMSAIRaGFZNQG!IjgVH7UJ1cS
O1 - Hosts: 0iy7s5wS8SPI51r9ksnBQXmnz3Fdw!gENBc897bULUu1J38!1t3Dje2pd4jwb
O1 - Hosts: QFbCR0M8QVqb03njLbELHVZgGHT6Yx
O1 - Hosts: cAYREfqrpvd6dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPKYiA1LQohRTwU2aYzKLJPgox
O1 - Hosts: FJND8ofXBE4BGXTyOiiPZeM0Kdy5yMF2H9O205hCU46
O1 - Hosts: IBacQXkuhTNOMSAIRaGFZNQG!IjgVH7UJ1cS
O1 - Hosts: 0iy7s5wS8SPI51r9ksnBQXmnz3Fdw!gENBc897bULUu1J38!1t3Dje2pd4jwb
O1 - Hosts: QFbCR0M8QVqb03njLbELHVZgGHT6Yx
O1 - Hosts: cAYREfqrpvd6dO44lptjN6QDhkJhmDPeufZvQVs7q!eKfslHD6uYPKYiA1LQohRTwU2aYzKLJPgox
O1 - Hosts: FJND8ofXBE4BGXTyOiiPZeM0Kdy5yMF2H9O205hCU46
O1 - Hosts: IBacQXkuhTNOMSAIRaGFZNQG!IjgVH7UJ1cS
O1 - Hosts: 0iy7s5wS8SPI51r9ksnBQXmnz3Fdw!gENBc897bULUu1J38!1t3Dje2pd4jwb
O1 - Hosts: QFbCR0M8QVqb03njLbELHVZgGHT6Yx
O2 - BHO: IDM Helper - {0055C089-8582-441B-A0BF-17B458C2A3A8} - C:\Program Files\Internet Download Manager\IDMIECC.dll
O2 - BHO: Yahoo! Companion BHO - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\ycomp5_6_0_1.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Ask Toolbar BHO - {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files\Ask.com\GenericAskToolbar.dll
O3 - Toolbar: &Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\ycomp5_6_0_1.dll
O3 - Toolbar: Ask Toolbar - {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files\Ask.com\GenericAskToolbar.dll
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [WinampAgent] "C:\Program Files\Winamp\winampa.exe"
O4 - HKLM\..\Run: [802] C:\WINDOWS\system32\syscache.exe
O4 - HKLM\..\Run: [9521] C:\WINDOWS\system32\syscache.exe
O4 - HKLM\..\Run: [avast5] C:\PROGRA~1\ALWILS~1\Avast5\avastUI.exe /nogui
O4 - HKLM\..\Run: [865] C:\WINDOWS\system32\syscache.exe
O4 - HKCU\..\Run: [IDMan] C:\Program Files\Internet Download Manager\IDMan.exe /onboot
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Startup: Xfire.lnk = C:\Program Files\Xfire\Xfire.exe
O8 - Extra context menu item: Download all links with IDM - C:\Program Files\Internet Download Manager\IEGetAll.htm
O8 - Extra context menu item: Download FLV video content with IDM - C:\Program Files\Internet Download Manager\IEGetVL.htm
O8 - Extra context menu item: Download with IDM - C:\Program Files\Internet Download Manager\IEExt.htm
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: avast! Antivirus - AVAST Software - C:\Program Files\Alwil Software\Avast5\AvastSvc.exe
O23 - Service: avast! Mail Scanner - AVAST Software - C:\Program Files\Alwil Software\Avast5\AvastSvc.exe
O23 - Service: avast! Web Scanner - AVAST Software - C:\Program Files\Alwil Software\Avast5\AvastSvc.exe
O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe
O23 - Service: PnkBstrB - Unknown owner - C:\WINDOWS\system32\PnkBstrB.exe

--
End of file - 12911 bytes

i scanned with malware bytes , it found sth , but im still not sure if the malware is gone
thanks ..

oh btw these are the main problem , malwarebytes deletes them but they just keep coming
Syscache.exe
cfdrive32.exe
and some weird things in my startup !!

here is a malwarebytes log
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4461

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.17184

8/22/2010 1:06:47 PM
mbam-log-2010-08-22 (13-06-47).txt

Scan type: Full scan (C:\|D:\|E:\|)
Objects scanned: 248280
Time elapsed: 27 minute(s), 59 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 3
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 6

Memory Processes Infected:
C:\WINDOWS\system32\msvmiode.exe (Backdoor.Bot) -> Unloaded process successfully.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\microsoft driver setup (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell (Worm.Palevo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\taskman (Worm.Palevo) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Hijack.Shell) -> Bad: (C:\RECYCLER\S-1-5-21-2695567807-7734217318-700091693-3022\syscr.exe,explorer.exe,C:\Documents and Settings\Bhnm the Great\Application Data\ltzqai.exe,Explorer.exen) Good: (Explorer.exe) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\RECYCLER\S-1-5-21-2695567807-7734217318-700091693-3022\syscr.exe (Worm.Autorun.cool.gif -> Delete on reboot.
C:\Documents and Settings\Bhnm the Great\Application Data\ltzqai.exe (Worm.Palevo) -> Delete on reboot.
C:\WINDOWS\system32\hosts (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msvmiode.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\cfdrive32.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\hosts (Trojan.Agent) -> Quarantined and deleted successfully.

sorry for posting logs , i'm just too worried about my pc ...

EDIT: Posts merged ~BP

Edited by Budapest, 22 August 2010 - 04:37 PM.

I wanna feel your body breaking
Wanna feel your body breaking and shaking and left in the cold
I want to heal your conscience making a change to fix this dying soul
This Dying Soul


BC AdBot (Login to Remove)

 


#2 Blind Faith

Blind Faith

  • Malware Response Team
  • 4,101 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:10:18 PM

Posted 26 August 2010 - 06:18 AM

Hello and welcome to Bleeping Computer! welcome.gif

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.

Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

We also need a new log from the GMER anti-rootkit scanner. Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice

Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log





Elle
Can you hear it?It's all around!

Tomar ki manè acchè?
Yadi thakè, tahalè
Ki kshama kartè paro
?



If I haven't replied in 48 hours, please feel free to send me a PM.



Posted Image

#3 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:18 PM

Posted 02 September 2010 - 02:33 PM

Due to the lack of feedback this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users