Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Vxh8jkdq2.exe Infection + Other Infections


  • This topic is locked This topic is locked
23 replies to this topic

#1 CBuddha

CBuddha

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:03:04 PM

Posted 17 November 2005 - 09:25 PM

When I bootup I get a message that says

"Your Computer is infected" I'm really not sure if this is a real Window message or not. But in my right hand bottom start bar, I have 2 red filled circles with white X's in them, and the message says to click here to protect your computer from spyware!

I have Zone Alarm (Free version) installed along with AVG (Free ver). My OS is XP.

I have lost all my quick start icons.

I've tried Adaware & Sybot, but nothing helps. Also tried to do a Restore, but it won't let me restore at all.

I have run Hijackthis, see log below:

Logfile of HijackThis v1.99.1
Scan saved at 8:39:30 PM, on 11/17/2005
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 (6.00.2600.0000)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\HP\hpcoretech\hpcmpmgr.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\WINDOWS\System32\devldr32.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Common Files\ACD Systems\EN\DevDetect.exe
C:\WINDOWS\System32\kernels32.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\AIM\aim.exe
C:\winstall.exe
C:\WINDOWS\System32\vxh8jkdq2.exe
C:\WINDOWS\System32\vxh8jkdq7.exe
C:\Program Files\HP\Digital Imaging\bin\hpqgalry.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Downloads\Utilities\HijackThis.exe

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\SYSTEM\blank.htm
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll (file missing)
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [HP Software Update] "C:\Program Files\HP\HP Software Update\HPWuSchd2.exe"
O4 - HKLM\..\Run: [HP Component Manager] "C:\Program Files\HP\hpcoretech\hpcmpmgr.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [AVG7_EMC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
O4 - HKLM\..\Run: [Zone Labs Client] C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [Device Detector] DevDetect.exe -autorun
O4 - HKLM\..\Run: [System] C:\WINDOWS\System32\kernels32.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [Yahoo! Pager] C:\Program Files\Yahoo!\Messenger\ypager.exe -quiet
O4 - HKCU\..\Run: [System] C:\WINDOWS\svchost.exe
O4 - HKCU\..\Run: [Windows installer] C:\winstall.exe
O4 - Global Startup: SonnReg.lnk = C:\Program Files\E-Color\Registration\SonnReg.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: HP Image Zone Fast Start.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O8 - Extra context menu item: &AIM Search - res://C:\Program Files\AIM Toolbar\AIMBar.dll/aimsearch.htm
O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://C:\Program Files\Google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: WeatherBug - {AF6CABAB-61F9-4f12-A198-B7D41EF1CB52} - C:\Program Files\AWS\WeatherBug\Weather.exe (file missing) (HKCU)
O16 - DPF: {7F8C8173-AD80-4807-AA75-5672F22B4582} (ICSScanner Class) - http://download.zonelabs.com/bin/promotion...canner37380.cab
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe


I appreciate all your help, thank you very much!

CBuddha

BC AdBot (Login to Remove)

 


#2 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:09:04 PM

Posted 18 November 2005 - 05:29 AM

Hello,

Any reason why your windows isn't up to date? You don't have even ServicePack1 installed!
Remember that your system is extremely vulnerable without the necessary security patches/updates, so malware can get installed automatically while surfing without any problems.
Please visit http://windowsupdate.microsoft.com and update to Service Pack 1. Without this update, you're wide open to re-infection, and we're both just wasting our time.
When your system is clean afterwards, then update to SP2, because updating to SP2 CAN cause problems as long as you are infected.

It's better to print out the next instructions or save them in notepad, because you also have to work in safe mode without networking support, so this page wouldn't be available then.
It is also important you don't miss a step and perform everything in the right order!!

* Download smitRem and save the file to your desktop.
Doubleclick it and choose install. This will create a new folder on your desktop with the name smitrem.

* Please download ewido security suite; it is a free version of the program.
  • Install ewido security suite
  • When installing, under "Additional Options" uncheck..
    • Install background guard
    • Install scan via context menu
  • Launch ewido by double-clicking on the icon on your desktop.
  • The program will now open to the main screen.
  • When you run ewido for the first time, you may get a warning "Database could not be found!". Click OK. We will fix this in a moment.
  • You will need to update ewido to the latest definition files.
    • On the left hand side of the main screen click update.
    • Then click on Start Update.
  • The update will start and a progress bar will show the updates being installed.
    (the status bar at the bottom will display ("Update successful")
If you are having problems with the updater, you can use this link to manually update ewido.
ewido manual updates
Don't run it yet.

* Reboot into Safe Mode`: ( without networking support !)
°To get into the Safe mode as the computer is booting press and hold your "F8 Key". Use your arrow keys to move to "Safe Mode" and press your Enter key.

* Start HijackThis, close all open windows leaving only HijackThis running. Place a check against each of the following if still present:

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\SYSTEM\blank.htm
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll (file missing)
O4 - HKLM\..\Run: [System] C:\WINDOWS\System32\kernels32.exe
O4 - HKCU\..\Run: [System] C:\WINDOWS\svchost.exe
O4 - HKCU\..\Run: [Windows installer] C:\winstall.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE


* Click on Fix Checked when finished and exit HijackThis.
Make sure your Internet Explorer is closed when you click Fix Checked!

* Using Windows Explorer, locate the following files/folders, and delete them if still present: WATCH the spelling! Don't delete files that look similar!!!

C:\WINDOWS\System32\kernels32.exe
C:\winstall.exe
C:\WINDOWS\System32\vxh8jkdq2.exe
C:\WINDOWS\System32\vxh8jkdq7.exe
c:\WINDOWS\system32\svchosts.dll <== please DON'T try to delete svchost.exe because that is a legit windows-file. Watch the spelling!!!

* Open the smitRem folder, then double click the RunThis.bat file to start the tool. Follow the prompts on screen.
Wait for the tool to complete and disk cleanup to finish.

* Now open Ewido Security Suite
Click on scanner

* Click Complete System Scan and the scan will begin.
* During the scan it will prompt you to clean files, click OK
* When the scan is finished, look at the bottom of the screen and click the Save report button.
* Save the report to your desktop

* Close Ewido

* Go to start > control panel > Display properties > Desktop > Customize Desktop... > Web tab > uncheck and delete everything you find in there. (except for "My current home page")

* Reboot back into Windows.

* Open notepad and copy and paste next bold in it:
(don't forget to copy and paste REGEDIT4)

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
"{E802FFFF-8E58-4d2c-A435-8BEEFB10AB77}"=-

[-HKEY_CLASSES_ROOT\CLSID\{E802FFFF-8E58-4d2c-A435-8BEEFB10AB77}]


Save this as fix.reg Choose to save as *all files and place it on your desktop.
This is how the regfix must look afterwards: Posted Image
Doubleclick on it and when it asks you if you want to merge the contents to the registry, click yes/ok.

* Perform an onlinescan with panda: (please use this scanner instead of any other scanner!)
Panda Online
- Once you are on the Panda site click the Scan your PC button
- A new window will open...click the Check Now button
- Enter your Country
- Enter your State/Province
- Enter your e-mail address and click send
- Select either Home User or Company
- Click the big Scan Now button
- If it wants to install an ActiveX component allow it
- It will start downloading the files it requires for the scan (Note: It may take a couple of minutes)
- When download is complete, click on Local Disks to start the scan
- When the scan completes, if anything malicious is detected, click the See Report button, then Save Report and save it to a convenient location.
Post the contents of the Panda scan report, along with a new HijackThis Log, the contents of smitfiles.txt which is present on your Homedrive (C:\ in most cases) and the Ewido Log by using Add Reply.

It could be possible, after reboot that your system is using the windows classic theme again.
To restore this and set it back to XP-theme, rightclick on your desktop > properties > tab Appearances and choose Windows XP style again under windows and buttons.
Click apply and OK.

AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#3 CBuddha

CBuddha
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:03:04 PM

Posted 19 November 2005 - 11:38 AM

Hello,

Any reason why your windows isn't up to date? You don't have even ServicePack1 installed!
Remember that your system is extremely vulnerable without the necessary security patches/updates, so malware can get installed automatically while surfing without any problems.
Please visit http://windowsupdate.microsoft.com and update to Service Pack 1. Without this update, you're wide open to re-infection, and we're both just wasting our time.
When your system is clean afterwards, then update to SP2, because updating to SP2 CAN cause problems as long as you are infected.

It's better to print out the next instructions or save them in notepad, because you also have to work in safe mode without networking support, so this page wouldn't be available then.
It is also important you don't miss a step and perform everything in the right order!!

* Download smitRem and save the file to your desktop.
Doubleclick it and choose install. This will create a new folder on your desktop with the name smitrem.

* Please download ewido security suite; it is a free version of the program.

  • Install ewido security suite
  • When installing, under "Additional Options" uncheck..
    • Install background guard
    • Install scan via context menu
  • Launch ewido by double-clicking on the icon on your desktop.
  • The program will now open to the main screen.
  • When you run ewido for the first time, you may get a warning "Database could not be found!". Click OK. We will fix this in a moment.

  • You will need to update ewido to the latest definition files.
    • On the left hand side of the main screen click update.
    • Then click on Start Update.
  • The update will start and a progress bar will show the updates being installed.
    (the status bar at the bottom will display ("Update successful")
If you are having problems with the updater, you can use this link to manually update ewido.
ewido manual updates
Don't run it yet.

* Reboot into Safe Mode`: ( without networking support !)
°To get into the Safe mode as the computer is booting press and hold your "F8 Key". Use your arrow keys to move to "Safe Mode" and press your Enter key.

* Start HijackThis, close all open windows leaving only HijackThis running. Place a check against each of the following if still present:

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\SYSTEM\blank.htm
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll (file missing)
O4 - HKLM\..\Run: [System] C:\WINDOWS\System32\kernels32.exe
O4 - HKCU\..\Run: [System] C:\WINDOWS\svchost.exe
O4 - HKCU\..\Run: [Windows installer] C:\winstall.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE


* Click on Fix Checked when finished and exit HijackThis.
Make sure your Internet Explorer is closed when you click Fix Checked!

* Using Windows Explorer, locate the following files/folders, and delete them if still present: WATCH the spelling! Don't delete files that look similar!!!

C:\WINDOWS\System32\kernels32.exe
C:\winstall.exe
C:\WINDOWS\System32\vxh8jkdq2.exe
C:\WINDOWS\System32\vxh8jkdq7.exe
c:\WINDOWS\system32\svchosts.dll <== please DON'T try to delete svchost.exe because that is a legit windows-file. Watch the spelling!!!

* Open the smitRem folder, then double click the RunThis.bat file to start the tool. Follow the prompts on screen.
Wait for the tool to complete and disk cleanup to finish.

* Now open Ewido Security Suite
Click on scanner

* Click Complete System Scan and the scan will begin.
* During the scan it will prompt you to clean files, click OK
* When the scan is finished, look at the bottom of the screen and click the Save report button.
* Save the report to your desktop

* Close Ewido

* Go to start > control panel > Display properties > Desktop > Customize Desktop... > Web tab > uncheck and delete everything you find in there. (except for "My current home page")

* Reboot back into Windows.

* Open notepad and copy and paste next bold in it:
(don't forget to copy and paste REGEDIT4)

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
"{E802FFFF-8E58-4d2c-A435-8BEEFB10AB77}"=-

[-HKEY_CLASSES_ROOT\CLSID\{E802FFFF-8E58-4d2c-A435-8BEEFB10AB77}]


Save this as fix.reg Choose to save as *all files and place it on your desktop.
This is how the regfix must look afterwards: Posted Image
Doubleclick on it and when it asks you if you want to merge the contents to the registry, click yes/ok.

* Perform an onlinescan with panda: (please use this scanner instead of any other scanner!)
Panda Online
- Once you are on the Panda site click the Scan your PC button
- A new window will open...click the Check Now button
- Enter your Country
- Enter your State/Province
- Enter your e-mail address and click send
- Select either Home User or Company
- Click the big Scan Now button
- If it wants to install an ActiveX component allow it
- It will start downloading the files it requires for the scan (Note: It may take a couple of minutes)
- When download is complete, click on Local Disks to start the scan
- When the scan completes, if anything malicious is detected, click the See Report button, then Save Report and save it to a convenient location.
Post the contents of the Panda scan report, along with a new HijackThis Log, the contents of smitfiles.txt which is present on your Homedrive (C:\ in most cases) and the Ewido Log by using Add Reply.

It could be possible, after reboot that your system is using the windows classic theme again.
To restore this and set it back to XP-theme, rightclick on your desktop > properties > tab Appearances and choose Windows XP style again under windows and buttons.
Click apply and OK.



#4 CBuddha

CBuddha
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:03:04 PM

Posted 19 November 2005 - 11:40 AM

Hello,

Any reason why your windows isn't up to date? You don't have even ServicePack1 installed!
Remember that your system is extremely vulnerable without the necessary security patches/updates, so malware can get installed automatically while surfing without any problems.
Please visit http://windowsupdate.microsoft.com and update to Service Pack 1. Without this update, you're wide open to re-infection, and we're both just wasting our time.
When your system is clean afterwards, then update to SP2, because updating to SP2 CAN cause problems as long as you are infected.

It's better to print out the next instructions or save them in notepad, because you also have to work in safe mode without networking support, so this page wouldn't be available then.
It is also important you don't miss a step and perform everything in the right order!!

* Download smitRem and save the file to your desktop.
Doubleclick it and choose install. This will create a new folder on your desktop with the name smitrem.

* Please download ewido security suite; it is a free version of the program.

  • Install ewido security suite
  • When installing, under "Additional Options" uncheck..
    • Install background guard
    • Install scan via context menu
  • Launch ewido by double-clicking on the icon on your desktop.
  • The program will now open to the main screen.
  • When you run ewido for the first time, you may get a warning "Database could not be found!". Click OK. We will fix this in a moment.

  • You will need to update ewido to the latest definition files.
    • On the left hand side of the main screen click update.
    • Then click on Start Update.
  • The update will start and a progress bar will show the updates being installed.
    (the status bar at the bottom will display ("Update successful")
If you are having problems with the updater, you can use this link to manually update ewido.
ewido manual updates
Don't run it yet.

* Reboot into Safe Mode`: ( without networking support !)
°To get into the Safe mode as the computer is booting press and hold your "F8 Key". Use your arrow keys to move to "Safe Mode" and press your Enter key.

* Start HijackThis, close all open windows leaving only HijackThis running. Place a check against each of the following if still present:

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\SYSTEM\blank.htm
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll (file missing)
O4 - HKLM\..\Run: [System] C:\WINDOWS\System32\kernels32.exe
O4 - HKCU\..\Run: [System] C:\WINDOWS\svchost.exe
O4 - HKCU\..\Run: [Windows installer] C:\winstall.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE


* Click on Fix Checked when finished and exit HijackThis.
Make sure your Internet Explorer is closed when you click Fix Checked!

* Using Windows Explorer, locate the following files/folders, and delete them if still present: WATCH the spelling! Don't delete files that look similar!!!

C:\WINDOWS\System32\kernels32.exe
C:\winstall.exe
C:\WINDOWS\System32\vxh8jkdq2.exe
C:\WINDOWS\System32\vxh8jkdq7.exe
c:\WINDOWS\system32\svchosts.dll <== please DON'T try to delete svchost.exe because that is a legit windows-file. Watch the spelling!!!

* Open the smitRem folder, then double click the RunThis.bat file to start the tool. Follow the prompts on screen.
Wait for the tool to complete and disk cleanup to finish.

* Now open Ewido Security Suite
Click on scanner

* Click Complete System Scan and the scan will begin.
* During the scan it will prompt you to clean files, click OK
* When the scan is finished, look at the bottom of the screen and click the Save report button.
* Save the report to your desktop

* Close Ewido

* Go to start > control panel > Display properties > Desktop > Customize Desktop... > Web tab > uncheck and delete everything you find in there. (except for "My current home page")

* Reboot back into Windows.

* Open notepad and copy and paste next bold in it:
(don't forget to copy and paste REGEDIT4)

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
"{E802FFFF-8E58-4d2c-A435-8BEEFB10AB77}"=-

[-HKEY_CLASSES_ROOT\CLSID\{E802FFFF-8E58-4d2c-A435-8BEEFB10AB77}]


Save this as fix.reg Choose to save as *all files and place it on your desktop.
This is how the regfix must look afterwards: Posted Image
Doubleclick on it and when it asks you if you want to merge the contents to the registry, click yes/ok.

* Perform an onlinescan with panda: (please use this scanner instead of any other scanner!)
Panda Online
- Once you are on the Panda site click the Scan your PC button
- A new window will open...click the Check Now button
- Enter your Country
- Enter your State/Province
- Enter your e-mail address and click send
- Select either Home User or Company
- Click the big Scan Now button
- If it wants to install an ActiveX component allow it
- It will start downloading the files it requires for the scan (Note: It may take a couple of minutes)
- When download is complete, click on Local Disks to start the scan
- When the scan completes, if anything malicious is detected, click the See Report button, then Save Report and save it to a convenient location.
Post the contents of the Panda scan report, along with a new HijackThis Log, the contents of smitfiles.txt which is present on your Homedrive (C:\ in most cases) and the Ewido Log by using Add Reply.

It could be possible, after reboot that your system is using the windows classic theme again.
To restore this and set it back to XP-theme, rightclick on your desktop > properties > tab Appearances and choose Windows XP style again under windows and buttons.
Click apply and OK.



#5 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:09:04 PM

Posted 19 November 2005 - 11:49 AM

Hi, you quoted my posts twice instead of posting your reply.
Please click the addreply button below Posted Image instead of quote :thumbsup:
AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#6 CBuddha

CBuddha
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:03:04 PM

Posted 19 November 2005 - 03:24 PM

Sorry......

To answer your question about upgrading to SP1 & SP2...all I got was grief, so I restored to my previous settings. Everything seemed to be going fine up untill the other day when I was searching different websites, then all hell broke loose. Well enough about that....below are the reports that you requested. Thanks again, I appreciate all your help!!


Panda Report

Incident Status Location

Virus:Trj/Agent.AVZ Disinfected C:\WINDOWS\SYSTEM32\syswrk.dll
Adware:Adware/SpySheriff No disinfected C:\WINDOWS\SYSTEM32\kernels32.exe
Virus:Trj/Downloader.GGB Disinfected C:\WINDOWS\SYSTEM32\vxh8jkdq2.exe
Virus:Trj/Downloader.GET Disinfected C:\WINDOWS\SYSTEM32\vxh8jkdq7.exe
Virus:Trj/Agent.AVZ Disinfected C:\WINDOWS\svchost.exe
Virus:Trj/Agent.AVZ Disinfected C:\WINDOWS\ie-hook.dll
Adware:Adware/SpySheriff No disinfected C:\WINDOWS\Downloaded Program Files\win32.exe
Adware:Adware/IST.YourSiteBar No disinfected C:\Documents and Settings\TDB\Local Settings\Temporary Internet Files\Content.IE5\47J3USHX\CAGEP7ML.HTM
Virus:Trj/Agent.AVZ Disinfected C:\Documents and Settings\TDB\Local Settings\Temporary Internet Files\Content.IE5\47J3USHX\web[1].exe
Virus:Trj/Agent.AVZ Disinfected C:\Documents and Settings\TDB\Desktop\m00.exe
Adware:Adware/IST.ISTBar No disinfected C:\Documents and Settings\TDB\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\javainstaller.jar-5aa0b436-5777c1b1.zip[InstallerApplet.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\TDB\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-4ef836e7-7bd38ac8.zip[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\TDB\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-4ef836e7-7bd38ac8.zip[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\TDB\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-4ef836e7-7bd38ac8.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\TDB\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-4ef836e7-7bd38ac8.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\TDB\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\ie0502b.jar-963ccf0-4c81b1f1.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\TDB\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\ie0502b.jar-963ccf0-4c81b1f1.zip[NewSecurityClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\TDB\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\ie0502b.jar-963ccf0-4c81b1f1.zip[NewURLClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\TDB\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\ie0502b.jar-963ccf0-4c81b1f1.zip[Installer.class]
Virus:Trj/Agent.AVZ Disinfected C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP80\A0020520.dll
Virus:Trj/Agent.AVZ Disinfected C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP80\A0020521.dll
Virus:Trj/Agent.AVZ Disinfected C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP81\A0020541.dll
Virus:Trj/Agent.AVZ Disinfected C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP81\A0020542.dll
Virus:Trj/Agent.AVZ Disinfected C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP83\A0020631.dll
Virus:Trj/Agent.AVZ Disinfected C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP83\A0020632.dll
Virus:Trj/Agent.AVZ Disinfected C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP83\A0020649.dll
Virus:Trj/Agent.AVZ Disinfected C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP83\A0020650.dll
Virus:Trj/Agent.AVZ Disinfected C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP83\A0020664.dll
Virus:Trj/Agent.AVZ Disinfected C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP83\A0020665.dll
Virus:Trj/Agent.AVZ Disinfected C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP83\A0020708.dll
Virus:Trj/Agent.AVZ Disinfected C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP83\A0020709.dll
Virus:Trj/Downloader.GGB Disinfected C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP83\A0020717.exe
Virus:Trj/Agent.AVZ Disinfected C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP83\A0020742.dll
Virus:Trj/Downloader.GGB Disinfected C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP83\A0020743.exe
Virus:Trj/Downloader.GET Disinfected C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP83\A0020744.exe
Virus:Trj/Agent.AVZ Disinfected C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP83\A0020745.exe
Virus:Trj/Agent.AVZ Disinfected C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP83\A0020746.dll
Virus:Trj/Agent.AVZ Disinfected C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP83\A0020747.exe
Spyware:Spyware/ClientMan No disinfected D:\WINDOWS\SYSTEM\msncjk.zzz
Adware:Adware/Getup No disinfected D:\WINDOWS\SYSTEM\MyExplore.exe
Adware:Adware/Getup No disinfected D:\WINDOWS\SYSTEM\xm2s.dll
Adware:Adware/Getup No disinfected D:\WINDOWS\SYSTEM\BPV2t.dll_
Adware:Adware/Look2Me No disinfected D:\WINDOWS\SYSTEM\msg116.zzz
Adware:Adware/SAHAgent No disinfected D:\WINDOWS\SYSTEM\xmltok.dll
Spyware:Spyware/ClientMan No disinfected D:\WINDOWS\SYSTEM\msmkmi.dll
Adware:Adware/WinAD No disinfected D:\WINDOWS\Downloaded Program Files\WinFormX.dll
Spyware:Spyware/New.net No disinfected D:\WINDOWS\NDNuninstall4_88.exe
Adware:Adware/Adtomi No disinfected D:\WINDOWS\6fe0t6jk.exe
Spyware:Spyware/BetterInet No disinfected D:\Program Files\Common Files\updater\data2.dat
Adware:Adware/Getup No disinfected D:\Program Files\Internet Explorer\winupdt.exe
Adware:Adware/eZula No disinfected D:\Program Files\Spybot - Search & Destroy 1.1\Recovery\eZulaHotText68.zip[mmod.exe]
Possible Virus. No disinfected D:\Program Files\Spybot - Search & Destroy 1.1\Recovery\eZulaHotText70.zip[ezstub.exe]
Adware:Adware/Ucmore No disinfected D:\Program Files\Spybot - Search & Destroy 1.1\Recovery\UCmore1.zip[ucmoreiex.exe][UCMIE.DLL]
Adware:Adware/Ucmore No disinfected D:\Program Files\Spybot - Search & Destroy 1.1\Recovery\UCmore8.zip[UCmoreIEx.exe][UCMIE.DLL]
Adware:Adware/ezCyberSearch No disinfected D:\Program Files\Spybot - Search & Destroy 1.1\Recovery\EzCyberSearch11.zip[ezSearch.dll]
Hacktool:HackTool/EvID4226 No disinfected D:\9-10-04 Downloads\EvID4226Patch212-en.zip[EvID4226Patch.exe]
Adware:Adware/Getup No disinfected D:\updt.exe
Adware:Adware/NavHelper No disinfected D:\Hijack\backups\backup-20041119-113645-471.dll
Adware:Adware/NavHelper No disinfected D:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP83\A0020727.dll
Adware:Adware/RazeSpyware No disinfected E:\WINDOWS\system32\zolker002.dll
----------------------------------------------------------------------------------------------------------------------------
Hijackthis Report

Logfile of HijackThis v1.99.1
Scan saved at 10:41:27 AM, on 11/19/2005
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 (6.00.2600.0000)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\WINDOWS\System32\devldr32.exe
C:\Program Files\HP\hpcoretech\hpcmpmgr.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\HP\Digital Imaging\bin\hpqgalry.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Downloads\Utilities\HijackThis.exe

O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [HP Software Update] "C:\Program Files\HP\HP Software Update\HPWuSchd2.exe"
O4 - HKLM\..\Run: [HP Component Manager] "C:\Program Files\HP\hpcoretech\hpcmpmgr.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [AVG7_EMC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
O4 - HKLM\..\Run: [Zone Labs Client] C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [Yahoo! Pager] C:\Program Files\Yahoo!\Messenger\ypager.exe -quiet
O4 - Global Startup: SonnReg.lnk = C:\Program Files\E-Color\Registration\SonnReg.exe
O4 - Global Startup: HP Image Zone Fast Start.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O8 - Extra context menu item: &AIM Search - res://C:\Program Files\AIM Toolbar\AIMBar.dll/aimsearch.htm
O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://C:\Program Files\Google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: WeatherBug - {AF6CABAB-61F9-4f12-A198-B7D41EF1CB52} - C:\Program Files\AWS\WeatherBug\Weather.exe (file missing) (HKCU)
O16 - DPF: {7F8C8173-AD80-4807-AA75-5672F22B4582} (ICSScanner Class) - http://download.zonelabs.com/bin/promotion...canner37380.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe
-----------------------------------------------------------------------------------------------------------------------------smitfiles

smitRem © log file
version 2.7

by noahdfear


Microsoft Windows XP [Version 5.1.2600]
The current date is: Fri 11/18/2005
The current time is: 20:21:32.17

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

checking for ShudderLTD key

ShudderLTD key not present!

checking for PSGuard.com key


PSGuard.com key not present!

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Existing Pre-run Files


~~~ Program Files ~~~



~~~ Shortcuts ~~~

Install.dat


~~~ Favorites ~~~



~~~ system32 folder ~~~



~~~ Icons in System32 ~~~



~~~ Windows directory ~~~



~~~ Drive root ~~~

winstall.exe

~~~ Miscellaneous Files/folders ~~~




~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



Remaining Post-run Files


~~~ Program Files ~~~



~~~ Shortcuts ~~~



~~~ Favorites ~~~



~~~ system32 folder ~~~



~~~ Icons in System32 ~~~



~~~ Windows directory ~~~



~~~ Drive root ~~~



~~~ Miscellaneous Files/folders ~~~




~~~ Wininet.dll ~~~

CLEAN! :thumbsup:
-----------------------------------------------------------------------------------------------------------------------------

ewido security suite - Scan report

+ Created on: 11:11:03 PM, 11/18/2005
+ Report-Checksum: AA8BA9BB

+ Scan result:

HKLM\SOFTWARE\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C} -> Spyware.MiniBug : Cleaned with backup
HKLM\SOFTWARE\Classes\MiniBugTransporter.MiniBugTransporterX\CLSID\\ -> Spyware.MiniBug : Cleaned with backup
HKLM\SOFTWARE\Classes\MiniBugTransporter.MiniBugTransporterX.1\CLSID\\ -> Spyware.MiniBug : Cleaned with backup
C:\WINDOWS\SYSTEM32\vxh8jkdq8.exe -> TrojanDownloader.Small.bho : Cleaned with backup
C:\WINDOWS\SYSTEM32\vx.tll -> Adware.SpySheriff : Cleaned with backup
C:\Program Files\AWS\WeatherBug\MiniBugTransporter.dll -> Spyware.Wheaterbug : Cleaned with backup
C:\Documents and Settings\TDB\Local Settings\Temporary Internet Files\Content.IE5\A9DUVITC\ibar[1].js -> TrojanDownloader.IstBar.ad : Cleaned with backup
C:\Documents and Settings\TDB\My Documents\Downloads\Serials 2005 2.1 Final.zip/Setup.exe -> Worm.VB.an : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@burstnet[2].txt -> Spyware.Cookie.Burstnet : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@msnportal.112.2o7[1].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@image.masterstats[1].txt -> Spyware.Cookie.Masterstats : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@ivwbox[1].txt -> Spyware.Cookie.Ivwbox : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@sento.122.2o7[2].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@adopt.specificclick[2].txt -> Spyware.Cookie.Specificclick : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@rotator.adjuggler[1].txt -> Spyware.Cookie.Adjuggler : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@com[2].txt -> Spyware.Cookie.Com : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@e-2dj6wjkoahcjoaq.stats.esomniture[2].txt -> Spyware.Cookie.Esomniture : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@burstnet[1].txt -> Spyware.Cookie.Burstnet : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@www.burstbeacon[2].txt -> Spyware.Cookie.Burstbeacon : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@cbs.112.2o7[2].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@www.burstnet[2].txt -> Spyware.Cookie.Burstnet : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@adopt.euroclick[2].txt -> Spyware.Cookie.Euroclick : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@paypopup[2].txt -> Spyware.Cookie.Paypopup : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@ad.yieldmanager[2].txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@vitacost.122.2o7[1].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@sonymediasoftware.122.2o7[1].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@sento.122.2o7[1].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@www.burstbeacon[3].txt -> Spyware.Cookie.Burstbeacon : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@ad.yieldmanager[1].txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@cnn.122.2o7[1].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@2o7[2].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Documents and Settings\TDB\Cookies\tdb@tribalfusion[1].txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
:mozilla.6:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.7:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.8:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.9:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.10:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.11:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.12:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.13:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.14:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.15:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.16:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.17:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.18:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.19:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.20:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.21:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.29:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
:mozilla.30:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
:mozilla.31:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
:mozilla.34:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Specificclick : Cleaned with backup
:mozilla.37:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Pointroll : Cleaned with backup
:mozilla.38:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Pointroll : Cleaned with backup
:mozilla.39:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Pointroll : Cleaned with backup
:mozilla.40:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Pointroll : Cleaned with backup
:mozilla.70:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Burstnet : Cleaned with backup
:mozilla.71:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Burstnet : Cleaned with backup
:mozilla.79:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
:mozilla.80:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
:mozilla.81:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
:mozilla.82:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
:mozilla.83:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
:mozilla.84:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Centrport : Cleaned with backup
:mozilla.86:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Com : Cleaned with backup
:mozilla.87:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Com : Cleaned with backup
:mozilla.88:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Com : Cleaned with backup
:mozilla.89:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Com : Cleaned with backup
:mozilla.95:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Sexcounter : Cleaned with backup
:mozilla.96:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Sexcounter : Cleaned with backup
:mozilla.108:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Esomniture : Cleaned with backup
:mozilla.114:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Ru4 : Cleaned with backup
:mozilla.115:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Ru4 : Cleaned with backup
:mozilla.136:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Masterstats : Cleaned with backup
:mozilla.159:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Ivwbox : Cleaned with backup
:mozilla.204:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Overture : Cleaned with backup
:mozilla.205:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Overture : Cleaned with backup
:mozilla.211:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Overture : Cleaned with backup
:mozilla.212:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Questionmarket : Cleaned with backup
:mozilla.228:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Adjuggler : Cleaned with backup
:mozilla.229:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Adjuggler : Cleaned with backup
:mozilla.242:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.243:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Liveperson : Cleaned with backup
:mozilla.244:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Liveperson : Cleaned with backup
:mozilla.248:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Spylog : Cleaned with backup
:mozilla.253:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.254:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.255:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.256:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.257:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.269:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Tradedoubler : Cleaned with backup
:mozilla.270:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.271:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.272:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.273:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.274:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.275:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
:mozilla.276:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
:mozilla.297:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Burstbeacon : Cleaned with backup
:mozilla.298:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Burstnet : Cleaned with backup
:mozilla.368:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.369:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.370:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.371:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.372:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
:mozilla.373:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
:mozilla.374:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
:mozilla.375:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
:mozilla.402:C:\Documents and Settings\TDB\Application Data\Mozilla\Firefox\Profiles\iotw3ifk.default\cookies.txt -> Spyware.Cookie.Burstbeacon : Cleaned with backup
C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP81\A0020543.exe -> TrojanDownloader.Small.bho : Cleaned with backup
C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP81\A0020545.exe -> TrojanDownloader.Small.atl : Cleaned with backup
C:\System Volume Information\_restore{570EDACF-B8A2-435E-B117-9AA78B00EDB5}\RP81\A0020548.exe -> TrojanDownloader.Small.axn : Cleaned with backup
D:\WINDOWS\Cookies\tdb@y-1shz2prbmdj6wvny-1sez2pra2dj6wfkoglajaboawdj6x9ny-1seq-2-2.stats.esomniture[1].txt -> Spyware.Cookie.Esomniture : Cleaned with backup
D:\WINDOWS\Cookies\tdb@y-1shz2prbmdj6wvny-1sez2pra2dj6wjnyaocjwaqaudj6x9ny-1seq-2-2.stats.esomniture[2].txt -> Spyware.Cookie.Esomniture : Cleaned with backup
D:\WINDOWS\Cookies\tdb@y-1shz2prbmdj6wvny-1sez2pra2dj6wjnycnajmhpqidj6x9ny-1seq-2-2.stats.esomniture[1].txt -> Spyware.Cookie.Esomniture : Cleaned with backup
D:\WINDOWS\Cookies\tdb@y-1shz2prbmdj6wvny-1sez2pra2dj6wjkysgdzidqqsdj6x9ny-1seq-2-2.stats.esomniture[2].txt -> Spyware.Cookie.Esomniture : Cleaned with backup
D:\WINDOWS\Cookies\tdb@y-1shz2prbmdj6wvny-1sez2pra2dj6wjlisndpmkpq2dj6x9ny-1seq-2-2.stats.esomniture[2].txt -> Spyware.Cookie.Esomniture : Cleaned with backup
D:\WINDOWS\Cookies\tdb@y-1shz2prbmdj6wvny-1sez2pra2dj6wjnyeldzwfow6dj6x9ny-1seq-2-2.stats.esomniture[2].txt -> Spyware.Cookie.Esomniture : Cleaned with backup
D:\WINDOWS\Cookies\tdb@y-1shz2prbmdj6wvny-1sez2pra2dj6wjkoekc5akpamdj6x9ny-1seq-2-2.stats.esomniture[2].txt -> Spyware.Cookie.Esomniture : Cleaned with backup
D:\WINDOWS\Cookies\tdb@cz11.clickzs[2].txt -> Spyware.Cookie.Clickzs : Cleaned with backup
D:\WINDOWS\Cookies\tdb@hypertracker[1].txt -> Spyware.Cookie.Hypertracker : Cleaned with backup
D:\WINDOWS\remover.dll -> Spyware.NavExcel : Cleaned with backup
E:\Documents and Settings\Tom\Cookies\tom@image.masterstats[1].txt -> Spyware.Cookie.Masterstats : Cleaned with backup
E:\WINDOWS\system32\ala343.exe -> Spyware.Hijacker.Generic : Cleaned with backup
E:\WINDOWS\system32\vx.tll -> Adware.SpySheriff : Cleaned with backup
E:\WINDOWS\system32\vxgame6.exe -> TrojanDownloader.Small.aux : Cleaned with backup
E:\WINDOWS\system32\vxh8jkdq5.exe -> TrojanDownloader.Small.awa : Cleaned with backup


::Report End
-----------------------------------------------------------------------------------------------------------------------------
I hope this is the way you wanted these files posted. I couldn't find a way to upload a file.

Thank You!!

#7 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:09:04 PM

Posted 19 November 2005 - 03:45 PM

Hello,

You still need to delete a lot of files manually:

Delete on your C-drive:

C:\WINDOWS\SYSTEM32\syswrk.dll
C:\WINDOWS\SYSTEM32\kernels32.exe
C:\WINDOWS\SYSTEM32\vxh8jkdq2.exe
C:\WINDOWS\SYSTEM32\vxh8jkdq7.exe
C:\WINDOWS\svchost.exe <==Please DON'T delete svchost.exe present in your system32-folder!!!!!
C:\WINDOWS\ie-hook.dll
C:\WINDOWS\Downloaded Program Files\win32.exe

Delete on your D-drive:

D:\WINDOWS\SYSTEM\msncjk.zzz
D:\WINDOWS\SYSTEM\MyExplore.exe
D:\WINDOWS\SYSTEM\xm2s.dll
D:\WINDOWS\Downloaded Program Files\WinFormX.dll
D:\WINDOWS\SYSTEM\BPV2t.dll_
D:\WINDOWS\SYSTEM\msg116.zzz
D:\WINDOWS\SYSTEM\xmltok.dll
D:\WINDOWS\SYSTEM\msmkmi.dll
D:\WINDOWS\NDNuninstall4_88.exe
D:\WINDOWS\6fe0t6jk.exe
D:\Program Files\Common Files\updater\data2.dat
D:\Program Files\Internet Explorer\winupdt.exe

Delete on your E-drive

E:\WINDOWS\system32\zolker002.dll

Then, *Go to start > run and type: cleanmgr and click ok.
Let it scan your system for files to remove.
Make sure Temporary Files, Temporary Internet Files, and Recycle Bin are the only things checked.
Press OK to remove them.

Go to start > control panel > and search for the Java-icon.
Doubleclick it, choose the General tab and choose: Delete files under Temporary Internet Files.
Make sure the items are dislayed in Classic View in Control Panel. To change that, in the Right Panel, choose: Switch to Classic View.

If you can't find the Java-icon,
go to start > search, and perform a search for javacpl.exe
This file will normally be present in C:\Program Files\Java\.....
Doubleclick javacpl.exe, choose the General tab and choose: Delete files under Temporary Internet Files.

when done,
An important thing to do is please disable your systemrestore.(note: this will delete all your system restore points and malware that were present in it).
How to disable system restore in XP
Reboot.. and after rebooting, enable it again, so a new systemrestorepoint will be made. A clean one now! :thumbsup:

Let me know in your next reply how things are running afterwards. :flowers:
AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#8 CBuddha

CBuddha
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:03:04 PM

Posted 19 November 2005 - 10:07 PM

Hi,

Everything seems to be fine, and my system is running quite a bit faster. There is only one thing I need to ask. When I started to delete the files you wanted me to delete manually, some of them I could not find, see below:

On my C Drive

C:\WINDOWS\SYSTEM32\syswrk.dll
C:\WINDOWS\SYSTEM32\vxh8jkdq2.exe
C:\WINDOWS\SYSTEM32\vxh8jkdq7.exe
C:\WINDOWS\ie-hook.dll
C:\WINDOWS\Downloaded Program Files\win32.exe

On my D Drive

D:\WINDOWS\Downloaded Program Files\WinFormX.dll

Thanks for the help....you guys do great work!!!! :thumbsup: :flowers:

#9 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:09:04 PM

Posted 20 November 2005 - 01:25 AM

Ok, perform next..

Please set your system to show all files.
Click Start.
Open My Computer.
Select the Tools menu and click Folder Options.
Select the View Tab. Under the Hidden files and folders heading, select Show hidden files and folders.
Uncheck: Hide file extensions for known file types
Uncheck the Hide protected operating system files (recommended) option.
Click Yes to confirm.
Click OK.

Delete next files:

C:\WINDOWS\SYSTEM32\syswrk.dll
C:\WINDOWS\SYSTEM32\vxh8jkdq2.exe
C:\WINDOWS\SYSTEM32\vxh8jkdq7.exe
C:\WINDOWS\ie-hook.dll

Then, Go to start > run and type: regsvr32 /u occache.dll
(or copy and paste this in the field in start > run )
Click Ok

Now search and delete:

C:\WINDOWS\Downloaded Program Files\win32.exe
D:\WINDOWS\Downloaded Program Files\WinFormX.dll

Go to start > run and type regsvr32 occache.dll
Click OK

Let me know how that went.

Edited by miekiemoes, 20 November 2005 - 01:26 AM.

AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#10 CBuddha

CBuddha
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:03:04 PM

Posted 20 November 2005 - 05:01 PM

Hi

I did everything you asked, but still can't find the following files:

C:\WINDOWS\SYSTEM32\syswrk.dll
C:\WINDOWS\SYSTEM32\vxh8jkdq2.exe
C:\WINDOWS\SYSTEM32\vxh8jkdq7.exe
C:\WINDOWS\ie-hook.dll


Thanks again!! :thumbsup:

#11 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:09:04 PM

Posted 20 November 2005 - 05:11 PM

Could be that they are already deleted though. :thumbsup:

Are you still having problems? How are things running now?
AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#12 CBuddha

CBuddha
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:03:04 PM

Posted 20 November 2005 - 07:44 PM

The only problems I am having now:

When I boot up I get a message telling me that my password will expire in 10 days, do I want to change it now......I never set up a password. How do I get this resolved, I just say no to the message, and hit ok.

The other problem is that when the system sits for a while, the XP screen saver comes on, I know how to reslove this, but when I move the mouse to wake the system, my log on screen with my name comes up & I have to hit my icon before it goes back to where it was before. I've never had to do this before, I would just touch the mouse or a key & I was right back to my program.

Thanks again, you guys are awesome!! :thumbsup:

#13 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:09:04 PM

Posted 21 November 2005 - 01:17 AM

This is odd it tells you that your password will expire in 10 days and I don't like this message at all...
The screensavebehaviour is normal, depends how long you are not using your system.

I want you to perform another online scan..

* Perform an online scan with Kaspersky Online Scanner

Click "Launch Kaspersky Anti-Virus Web Scanner"
You will be prompted if you want to install an ActiveX component from Kaspersky, click yes.
This will start downloading the latest definition files.
Once the files have been downloaded click on "Next"

* Click "Scan Settings"
Select the following in Scan Settings (normally they are already selected by default)

°Scan using the following Anti-Virus database: Standard

°Scan Options: Scan Archives
Scan Mail Bases

* Click OK
* Under select a target to scan, select "My Computer"

* This program will start to scan your system.
The scan will take a while so be patient and let it run.
When the scan is done, it will show a list of infected files found.

* Click on the "Save as Text"- button:
Save the scan log and post it in your next reply.
AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#14 CBuddha

CBuddha
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:03:04 PM

Posted 21 November 2005 - 09:42 PM

Hello

Wow, that scan took almost 4 hrs. The log is listed below.

Thanks again for your help!!


-------------------------------------------------------------------------------
KASPERSKY ON-LINE SCANNER REPORT
Monday, November 21, 2005 21:33:29
Operating System: Microsoft Windows XP Professional, (Build 2600)
Kaspersky On-line Scanner version: 5.0.67.0
Kaspersky Anti-Virus database last update: 21/11/2005
Kaspersky Anti-Virus database records: 151220
-------------------------------------------------------------------------------

Scan Settings:
Scan using the following antivirus database: standard
Scan Archives: true
Scan Mail Bases: true

Scan Target - My Computer:
A:\
C:\
D:\
E:\
F:\
G:\

Scan Statistics:
Total number of scanned objects: 133137
Number of viruses found: 10
Number of infected objects: 18
Number of suspicious objects: 4
Duration of the scan process: 14169 sec

Infected Object Name - Virus Name
D:\WINDOWS\Temporary Internet Files\Content.IE5\JB6IOHJM\albums1[1].htm Infected: Exploit.HTML.CodeBaseExec
D:\WINDOWS\Temporary Internet Files\Content.IE5\AL3J125Y\pictureheaven[1] Infected: Trojan-Clicker.JS.Linker.h
D:\WINDOWS\Temporary Internet Files\Content.IE5\AL3J125Y\test[1].htm Infected: Exploit.HTML.Mht
D:\WINDOWS\Temporary Internet Files\Content.IE5\4JU9W6PU\eifr[1].php Infected: Exploit.HTML.Mht
D:\WINDOWS\Temporary Internet Files\Content.IE5\KSJ9LAG5\umax-xp[1].htm Infected: Trojan-Clicker.JS.Linker.h
D:\WINDOWS\Temporary Internet Files\Content.IE5\CBNS7KFH\blendasex[1].htm Infected: Trojan-Clicker.JS.Linker.h
D:\WINDOWS\Temporary Internet Files\Content.IE5\ORAHWVCD\test[1].htm Infected: Exploit.HTML.Mht
D:\WINDOWS\esba-4.exe/WISE0008.BIN Infected: Backdoor.Win32.Ruledor.e
D:\WINDOWS\esba-4.exe/WISE0009.BIN Infected: Trojan-Downloader.Win32.Agent.ab
D:\WINDOWS\esba-4.exe/WISE0011.BIN Infected: Trojan-Dropper.Win32.Small.gj
D:\WINDOWS\esba-4.exe/WISE0012.BIN Infected: Trojan-Downloader.Win32.IstBar.er
D:\WINDOWS\esba-4.exe Infected: Trojan-Downloader.Win32.IstBar.er
D:\winupdt2.exe/TargetSoft.exe Infected: Trojan-Downloader.Win32.TargetSoft.a
D:\winupdt2.exe Infected: Trojan-Downloader.Win32.TargetSoft.a
D:\winTemp3a.exe/mp_sys.exe Infected: Trojan.Win32.VB.jh
D:\winTemp3a.exe/mxrptz1.dll Infected: Trojan.Win32.VB.jh
D:\winTemp3a.exe/WinExplore.exe Infected: Trojan.Win32.VB.jh
D:\winTemp3a.exe Infected: Trojan.Win32.VB.jh
E:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\CoolWWWSearchYexe.zip/{154FCB97-E8B8-4C9F-8F09-75DA61820108}/SECURITY.EXE Suspicious: Password-protected-EXE
E:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\CoolWWWSearchYexe.zip Suspicious: Password-protected-EXE
E:\Documents and Settings\Tom\My Documents\hijackthis.log Suspicious: Exploit.HTML.Mht
E:\Downloads 2-17-05\backups\backup-20050710-151934-455 Suspicious: Exploit.HTML.Mht

Scan process completed.

#15 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:09:04 PM

Posted 22 November 2005 - 01:21 AM

Hello,

Delete next files:

D:\WINDOWS\esba-4.exe
D:\winupdt2.exe
D:\winTemp3a.exe

Then run Ccleaner again.

As I already said, about your screensaver, this is normal. This is how it is suposed to go.
Do you still get the passwordprompt at startup?
Go into your accounts via controlpanel and select the option not to ask for a password at startup.
AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users