Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

bkinst and virtumonde.com


  • This topic is locked This topic is locked
7 replies to this topic

#1 jot311

jot311

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:09:44 AM

Posted 22 October 2004 - 11:04 AM

Yesterday I tried to clean my computer of the virtumonde.com bkinst.exe and all the other stuff that goes along with it. I did run xsoft spyware and I downloaded HiJack this as requested and ran it. I did have a runonce entry that I cleaned and it did remover the updates.virtumonde.com pop up at reboot and the virtumonde.com second pop up at reboot. This morning when I started my computer, I again have the bkinst.exe plus the dat files in my Documents and Settings\Local Settings\temp file (catnof,kabcp,pctpa,smwksat,ssvpa, and tuncvs). I cannot remove these dat files but the bkinst can be deleted. Here is the HiJack this log I generated. I did remove a couple of entries that direct my browser to open to our company IP.
Thanks for anyhelp that may come this way :thumbsup:

Logfile of HijackThis v1.98.2
Scan saved at 8:38:40 AM, on 10/22/2004
Platform: Windows 2000 SP3 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINNT\Explorer.EXE
C:\WINNT\system32\PELMICED.EXE
C:\WINNT\system32\dla\tfswctrl.exe
C:\WINNT\System32\spool\DRIVERS\W32X86\2\printray.exe
C:\Program Files\Winamp\Winampa.exe
C:\PROGRA~1\COMMON~1\SCM\ICONFIG.EXE
C:\Program Files\Common Files\Nokia\NCLTools\NclTray.exe
C:\Tivoli\lcf\bin\w32-ix86\mrt\lcfep.exe
C:\Program Files\Adobe\Adobe Version Cue\ControlPanel\VersionCueTray.exe
C:\PROGRA~1\COMMON~1\Nokia\Services\SERVIC~1.EXE
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\WINNT\AppPatch\fontac.exe
C:\Program Files\Adobe\Adobe Acrobat 6.0\Distillr\acrotray.exe
C:\Program Files\Microsoft Office\Office\1033\msoffice.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Hijack\HijackThis.exe

N3 - Netscape 7: user_pref("browser.search.defaultengine", "engine://C%3A%5CProgram%20Files%5CNetscape%5CNetscape%5Csearchplugins%5CSBWeb_01.src"); (C:\Documents and Settings\jott\Application Data\Mozilla\Profiles\default\2axjb9mk.slt\prefs.js)
O2 - BHO: CATLEvents Object - {18722863-6D1D-4300-BF29-406948EDA7CB} - C:\DOCUME~1\jott\LOCALS~1\Temp\catnof.dat
O3 - Toolbar: @msdxmLC.dll,-1@1033,&Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\System32\msdxm.ocx
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
O4 - HKLM\..\Run: [Mouse Suite 98 Daemon] PELMICED.EXE
O4 - HKLM\..\Run: [dllInit ibmasstw.dll] "C:\Program Files\IBM\UMS\utils\DLLINIT.EXE" ibmasstw.dll
O4 - HKLM\..\Run: [helptoc.bat] "C:\Program Files\IBM\UMS\httpserv\winspawn.exe" C:\PROGRA~1\IBM\UMS\httpserv\help\helptoc.bat
O4 - HKLM\..\Run: [dla] C:\WINNT\system32\dla\tfswctrl.exe
O4 - HKLM\..\Run: [PrinTray] C:\WINNT\System32\spool\DRIVERS\W32X86\2\printray.exe
O4 - HKLM\..\Run: [WinampAgent] "C:\Program Files\Winamp\Winampa.exe"
O4 - HKLM\..\Run: [ICONFIG] C:\PROGRA~1\COMMON~1\SCM\ICONFIG.EXE
O4 - HKLM\..\Run: [taskwms] C:\WINNT\Tasks\taskwms.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKLM\..\Run: [*vgadvd] C:\WINNT\AppPatch\vgadvd.exe
O4 - HKLM\..\Run: [*javas] C:\WINNT\Help\javas.exe
O4 - HKLM\..\Run: [*avmc] C:\WINNT\Tasks\avmc.exe
O4 - HKLM\..\Run: [*fontac] C:\WINNT\AppPatch\fontac.exe
O4 - HKLM\..\Run: [*antiiis] C:\WINNT\antiiis.exe
O4 - HKLM\..\Run: [*playutil] C:\WINNT\playutil.exe
O4 - HKLM\..\Run: [*kbsys] C:\WINNT\Tasks\kbsys.exe
O4 - HKLM\..\Run: [*iisav] C:\WINNT\iisav.exe
O4 - HKLM\..\Run: [*apvss] C:\WINNT\apvss.exe
O4 - HKLM\..\Run: [*mfcdisk] C:\WINNT\AppPatch\mfcdisk.exe
O4 - HKLM\..\Run: [*svcnut] C:\WINNT\svcnut.exe
O4 - HKLM\..\RunOnce: [*fontac] C:\WINNT\AppPatch\fontac.exe rerun
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINNT\System32\Shdocvw.dll

Edited by jot311, 22 October 2004 - 11:06 AM.


BC AdBot (Login to Remove)

 


#2 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,502 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:10:44 AM

Posted 22 October 2004 - 04:41 PM

O4 - HKLM\..\Run: [*mfcdisk]
O4 - HKLM\..\Run: [*svcnut]
O4 - HKLM\..\RunOnce: [*fontac]

Note, please read this carefully, as the steps do repeat a few times, but the last step does change a bit

Download killbox here:

KillBox


Unzip the folder to your desktop.

Start Killbox.exe

Select the Delete on reboot option.


In the field labeled "Full path of file to delete" enter C:\DOCUMENTS AND SETTINGS\jott\LOCAL SETTINGS\Temp\catnof.dat

Then press the button that looks like a red circle with a white X in it.

When it asks if you would like to Reboot now, press the NO button.


Next In the field labeled "Full path of file to delete" enter C:\WINNT\AppPatch\vgadvd.exe

Then press the button that looks like a red circle with a white X in it.

When it asks if you would like to Reboot now, press the NO button.


Next In the field labeled "Full path of file to delete" enter C:\WINNT\Tasks\avmc.exe

Then press the button that looks like a red circle with a white X in it.

When it asks if you would like to Reboot now, press the NO button.


Next In the field labeled "Full path of file to delete" enter C:\WINNT\Help\javas.exe

Then press the button that looks like a red circle with a white X in it.

When it asks if you would like to Reboot now, press the NO button.


Next In the field labeled "Full path of file to delete" enter C:\WINNT\AppPatch\fontac.exe

Then press the button that looks like a red circle with a white X in it.

When it asks if you would like to Reboot now, press the NO button.


Next In the field labeled "Full path of file to delete" enter C:\WINNT\antiiis.exe

Then press the button that looks like a red circle with a white X in it.

When it asks if you would like to Reboot now, press the NO button.


Next In the field labeled "Full path of file to delete" enter C:\WINNT\playutil.exe

Then press the button that looks like a red circle with a white X in it.

When it asks if you would like to Reboot now, press the NO button.


Next In the field labeled "Full path of file to delete" enter C:\WINNT\Tasks\kbsys.exe

Then press the button that looks like a red circle with a white X in it.

When it asks if you would like to Reboot now, press the NO button.



Next In the field labeled "Full path of file to delete" enter C:\WINNT\iisav.exe

Then press the button that looks like a red circle with a white X in it.

When it asks if you would like to Reboot now, press the NO button.


Next In the field labeled "Full path of file to delete" enter C:\WINNT\apvss.exe

Then press the button that looks like a red circle with a white X in it.

When it asks if you would like to Reboot now, press the NO button.


Next In the field labeled "Full path of file to delete" enter C:\WINNT\AppPatch\mfcdisk.exe

Then press the button that looks like a red circle with a white X in it.

When it asks if you would like to Reboot now, press the NO button.


Next In the field labeled "Full path of file to delete" enter C:\WINNT\svcnut.exe

Then press the button that looks like a red circle with a white X in it.

When it asks if you would like to Reboot now, press the NO button.


Next In the field labeled "Full path of file to delete" enter C:\WINNT\AppPatch\fontac.exe rerun

Then press the button that looks like a red circle with a white X in it.

When it asks if you would like to Reboot now, press the NO button.


Next In the field labeled "Full path of file to delete" enter c:\windows\system32\bkinst.exe

Then press the button that looks like a red circle with a white X in it.

When it asks if you would like to Reboot now, press the NO button.



Next In the field labeled "Full path of file to delete" enter c:\windows\system32\hostx.exe

Then press the button that looks like a red circle with a white X in it.

When it asks if you would like to Reboot now, press the YES button.


Your computer will now reboot and check to see if the file is gone.


When it reboots, fix these entries in hijackthis:

O2 - BHO: CATLEvents Object - {18722863-6D1D-4300-BF29-406948EDA7CB} - C:\DOCUME~1\jott\LOCALS~1\Temp\catnof.dat
O4 - HKLM\..\Run: [*vgadvd] C:\WINNT\AppPatch\vgadvd.exe
O4 - HKLM\..\Run: [*javas] C:\WINNT\Help\javas.exe
O4 - HKLM\..\Run: [*avmc] C:\WINNT\Tasks\avmc.exe
O4 - HKLM\..\Run: [*fontac] C:\WINNT\AppPatch\fontac.exe
O4 - HKLM\..\Run: [*antiiis] C:\WINNT\antiiis.exe
O4 - HKLM\..\Run: [*playutil] C:\WINNT\playutil.exe
O4 - HKLM\..\Run: [*kbsys] C:\WINNT\Tasks\kbsys.exe
O4 - HKLM\..\Run: [*iisav] C:\WINNT\iisav.exe
O4 - HKLM\..\Run: [*apvss] C:\WINNT\apvss.exe
O4 - HKLM\..\Run: [*mfcdisk] C:\WINNT\AppPatch\mfcdisk.exe
O4 - HKLM\..\Run: [*svcnut] C:\WINNT\svcnut.exe
O4 - HKLM\..\RunOnce: [*fontac] C:\WINNT\AppPatch\fontac.exe rerun

Reboot and post a new log

#3 jot311

jot311
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:09:44 AM

Posted 25 October 2004 - 02:57 PM

Grinler, Thanks for the post!

As requested I did the Killbox and then ran Hijack and then made a new Hijack list. I'm now getting a ksidcfm.dat and tenismw.dat file along with the bkinst.exe in my C:\Documents and Settings\jott\Local Settings\Temp file. Here is the new log file:

Logfile of HijackThis v1.98.2
Scan saved at 12:36:03 PM, on 10/25/2004
Platform: Windows 2000 SP3 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\System32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINNT\system32\LEXBCES.EXE
C:\WINNT\system32\spoolsv.exe
C:\WINNT\system32\LEXPPS.EXE
C:\WINNT\System32\cisvc.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\WINNT\System32\svchost.exe
c:\fsapps\fssys\utilities\fsprint\FSPRNSTART.EXE
C:\WINNT\System32\Hummingbird\Connectivity\7.10\Jconfig\jconfigdnt.exe
C:\WINNT\System32\Hummingbird\Connectivity\7.10\Jconfig\hjavaw.exe
C:\Tivoli\lcf\bin\w32-ix86\mrt\LCFD.EXE
C:\Program Files\Java\j2re1.4.0\bin\javaw.exe
C:\WINNT\System32\mnmsrvc.exe
C:\lotus\notes\ntmulti.exe
C:\WINNT\System32\nvsvc32.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\system32\stisvc.exe
C:\fsapps\fssys\Utilities\fsres\suss.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
c:\perl\scripts\tivep\TivCLepHealth.exe
C:\WINNT\RCSERV.EXE
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\System32\mspmspsv.exe
C:\Tivoli\lcf\dat\1\mcast\mcast_receiver.exe
C:\WINNT\Explorer.EXE
C:\WINNT\system32\PELMICED.EXE
C:\WINNT\system32\dla\tfswctrl.exe
C:\WINNT\System32\spool\DRIVERS\W32X86\2\printray.exe
C:\Program Files\Winamp\Winampa.exe
C:\PROGRA~1\COMMON~1\SCM\ICONFIG.EXE
C:\Program Files\Common Files\Nokia\NCLTools\NclTray.exe
C:\Tivoli\lcf\bin\w32-ix86\mrt\lcfep.exe
C:\Program Files\Adobe\Adobe Version Cue\ControlPanel\VersionCueTray.exe
C:\PROGRA~1\COMMON~1\Nokia\Services\SERVIC~1.EXE
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\WINNT\Help\wmsinet.exe
C:\Program Files\Adobe\Adobe Acrobat 6.0\Distillr\acrotray.exe
C:\Program Files\Microsoft Office\Office\1033\msoffice.exe
C:\WINNT\System32\cidaemon.exe
C:\Hijack\HijackThis.exe

O2 - BHO: CATLEvents Object - {55E301E5-BA44-4095-BB0B-14E0123CCF71} - C:\DOCUME~1\khaydenn\LOCALS~1\Temp\tenismw.dat
O3 - Toolbar: @msdxmLC.dll,-1@1033,&Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\System32\msdxm.ocx
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
O4 - HKLM\..\Run: [Mouse Suite 98 Daemon] PELMICED.EXE
O4 - HKLM\..\Run: [dllInit ibmasstw.dll] "C:\Program Files\IBM\UMS\utils\DLLINIT.EXE" ibmasstw.dll
O4 - HKLM\..\Run: [helptoc.bat] "C:\Program Files\IBM\UMS\httpserv\winspawn.exe" C:\PROGRA~1\IBM\UMS\httpserv\help\helptoc.bat
O4 - HKLM\..\Run: [dla] C:\WINNT\system32\dla\tfswctrl.exe
O4 - HKLM\..\Run: [PrinTray] C:\WINNT\System32\spool\DRIVERS\W32X86\2\printray.exe
O4 - HKLM\..\Run: [WinampAgent] "C:\Program Files\Winamp\Winampa.exe"
O4 - HKLM\..\Run: [ICONFIG] C:\PROGRA~1\COMMON~1\SCM\ICONFIG.EXE
O4 - HKLM\..\Run: [taskwms] C:\WINNT\Tasks\taskwms.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKLM\..\Run: [*wmsinet] C:\WINNT\Help\wmsinet.exe
O4 - HKLM\..\RunOnce: [*wmsinet] C:\WINNT\Help\wmsinet.exe rerun
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINNT\System32\Shdocvw.dll

Thanks, :thumbsup:

#4 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,502 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:10:44 AM

Posted 25 October 2004 - 03:15 PM

Definitely better than the last log :thumbsup:

Note, please read this carefully, as the steps do repeat a few times, but the last step does change a bit

Download killbox here:

KillBox


Unzip the folder to your desktop.

Start Killbox.exe

Select the Delete on reboot option.


In the field labeled "Full path of file to delete" enter C:\DOCUME~1\khaydenn\LOCALS~1\Temp\tenismw.dat

Then press the button that looks like a red circle with a white X in it.

When it asks if you would like to Reboot now, press the NO button.


Next In the field labeled "Full path of file to delete" enter C:\WINNT\Help\wmsinet.exe

Then press the button that looks like a red circle with a white X in it.

When it asks if you would like to Reboot now, press the NO button.


Next In the field labeled "Full path of file to delete" enter c:\windows\system32\bkinst.exe

Then press the button that looks like a red circle with a white X in it.

When it asks if you would like to Reboot now, press the NO button.


Next In the field labeled "Full path of file to delete" enter c:\windows\system32\hostx.exe

Then press the button that looks like a red circle with a white X in it.

When it asks if you would like to Reboot now, press the YES button.


Your computer will now reboot and check to see if the file is gone.


When it reboots, fix these entries in hijackthis:

O2 - BHO: CATLEvents Object - {55E301E5-BA44-4095-BB0B-14E0123CCF71} - C:\DOCUME~1\khaydenn\LOCALS~1\Temp\tenismw.dat
O4 - HKLM\..\Run: [*wmsinet] C:\WINNT\Help\wmsinet.exe
O4 - HKLM\..\RunOnce: [*wmsinet] C:\WINNT\Help\wmsinet.exe rerun
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present


Reboot and post a new log

#5 jot311

jot311
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:09:44 AM

Posted 25 October 2004 - 04:33 PM

Grinler,
Think it's closer, this is what is in my temp file now, tenismw.dat. One other thing too, you have asked me to type in a path that is not on my computer so I have change to path to match mine. I reference c:\windows\system32\bkinst.exe and hostx.exe. I have changed that path to c:\WINNT\system32\

Here's the new log:

Logfile of HijackThis v1.98.2
Scan saved at 2:18:21 PM, on 10/25/2004
Platform: Windows 2000 SP3 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\System32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINNT\system32\LEXBCES.EXE
C:\WINNT\system32\spoolsv.exe
C:\WINNT\system32\LEXPPS.EXE
C:\WINNT\System32\cisvc.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\WINNT\System32\svchost.exe
c:\fsapps\fssys\utilities\fsprint\FSPRNSTART.EXE
C:\WINNT\System32\Hummingbird\Connectivity\7.10\Jconfig\jconfigdnt.exe
C:\WINNT\System32\Hummingbird\Connectivity\7.10\Jconfig\hjavaw.exe
C:\Tivoli\lcf\bin\w32-ix86\mrt\LCFD.EXE
C:\Program Files\Java\j2re1.4.0\bin\javaw.exe
C:\WINNT\System32\mnmsrvc.exe
C:\lotus\notes\ntmulti.exe
C:\WINNT\System32\nvsvc32.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\system32\stisvc.exe
C:\fsapps\fssys\Utilities\fsres\suss.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
c:\perl\scripts\tivep\TivCLepHealth.exe
C:\WINNT\RCSERV.EXE
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\System32\mspmspsv.exe
C:\Tivoli\lcf\dat\1\mcast\mcast_receiver.exe
C:\WINNT\Explorer.EXE
C:\WINNT\system32\PELMICED.EXE
C:\WINNT\system32\dla\tfswctrl.exe
C:\WINNT\System32\spool\DRIVERS\W32X86\2\printray.exe
C:\Program Files\Winamp\Winampa.exe
C:\PROGRA~1\COMMON~1\SCM\ICONFIG.EXE
C:\Program Files\Common Files\Nokia\NCLTools\NclTray.exe
C:\Tivoli\lcf\bin\w32-ix86\mrt\lcfep.exe
C:\Program Files\Adobe\Adobe Version Cue\ControlPanel\VersionCueTray.exe
C:\PROGRA~1\COMMON~1\Nokia\Services\SERVIC~1.EXE
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\Program Files\Adobe\Adobe Acrobat 6.0\Distillr\acrotray.exe
C:\Program Files\Microsoft Office\Office\1033\msoffice.exe
C:\Hijack\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.microsoft.com/isapi/redir.dll?p....5&plcid=0x0409
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = <local>
O3 - Toolbar: @msdxmLC.dll,-1@1033,&Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\System32\msdxm.ocx
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
O4 - HKLM\..\Run: [Mouse Suite 98 Daemon] PELMICED.EXE
O4 - HKLM\..\Run: [dllInit ibmasstw.dll] "C:\Program Files\IBM\UMS\utils\DLLINIT.EXE" ibmasstw.dll
O4 - HKLM\..\Run: [helptoc.bat] "C:\Program Files\IBM\UMS\httpserv\winspawn.exe" C:\PROGRA~1\IBM\UMS\httpserv\help\helptoc.bat
O4 - HKLM\..\Run: [dla] C:\WINNT\system32\dla\tfswctrl.exe
O4 - HKLM\..\Run: [PrinTray] C:\WINNT\System32\spool\DRIVERS\W32X86\2\printray.exe
O4 - HKLM\..\Run: [WinampAgent] "C:\Program Files\Winamp\Winampa.exe"
O4 - HKLM\..\Run: [ICONFIG] C:\PROGRA~1\COMMON~1\SCM\ICONFIG.EXE
O4 - HKLM\..\Run: [taskwms] C:\WINNT\Tasks\taskwms.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINNT\System32\Shdocvw.dll

#6 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,502 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:10:44 AM

Posted 26 October 2004 - 11:48 AM

My aplogies...we are looking good though!

Fix this entry:

O4 - HKLM\..\Run: [taskwms] C:\WINNT\Tasks\taskwms.exe


Reboot into safe mode and delete:

C:\WINNT\Tasks\taskwms.exe

Reboot and post a last log.

#7 jot311

jot311
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:09:44 AM

Posted 26 October 2004 - 01:16 PM

Thanks Grinler :flowers:

That last HiJack run seams to have cleared this pesty nasty little thing. I really did not want to re-image and our folks at malware said that would be the only way to get rid of it.

On that last run I also added bkinst.exe to the Killbox. Bkinst showed up again this morning in another users temp file. You asked me to reboot in safe mode and delete C:\WINNT\Tasks\taskwms.exe, nothing was there to delete. I checked all the user temp dir's and they are all clean now.

Simply amizing stuff! Here's my last HiJack log file and again, thanks alot! :thumbsup:

Logfile of HijackThis v1.98.2
Scan saved at 11:03:54 AM, on 10/26/2004
Platform: Windows 2000 SP3 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\System32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINNT\system32\LEXBCES.EXE
C:\WINNT\system32\spoolsv.exe
C:\WINNT\system32\LEXPPS.EXE
C:\WINNT\System32\cisvc.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\WINNT\System32\svchost.exe
c:\fsapps\fssys\utilities\fsprint\FSPRNSTART.EXE
C:\WINNT\System32\Hummingbird\Connectivity\7.10\Jconfig\jconfigdnt.exe
C:\WINNT\System32\Hummingbird\Connectivity\7.10\Jconfig\hjavaw.exe
C:\Tivoli\lcf\bin\w32-ix86\mrt\LCFD.EXE
C:\Program Files\Java\j2re1.4.0\bin\javaw.exe
C:\WINNT\System32\mnmsrvc.exe
C:\lotus\notes\ntmulti.exe
C:\WINNT\System32\nvsvc32.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\system32\stisvc.exe
C:\fsapps\fssys\Utilities\fsres\suss.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
c:\perl\scripts\tivep\TivCLepHealth.exe
C:\WINNT\RCSERV.EXE
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\System32\mspmspsv.exe
C:\Tivoli\lcf\dat\1\mcast\mcast_receiver.exe
C:\WINNT\Explorer.EXE
C:\WINNT\system32\PELMICED.EXE
C:\Program Files\IBM\UMS\utils\DLLINIT.EXE
C:\WINNT\system32\dla\tfswctrl.exe
C:\WINNT\System32\spool\DRIVERS\W32X86\2\printray.exe
C:\Program Files\Winamp\Winampa.exe
C:\PROGRA~1\COMMON~1\SCM\ICONFIG.EXE
C:\Program Files\Common Files\Nokia\NCLTools\NclTray.exe
C:\Tivoli\lcf\bin\w32-ix86\mrt\lcfep.exe
C:\Program Files\Adobe\Adobe Version Cue\ControlPanel\VersionCueTray.exe
C:\PROGRA~1\COMMON~1\Nokia\Services\SERVIC~1.EXE
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\Program Files\Adobe\Adobe Acrobat 6.0\Distillr\acrotray.exe
C:\Program Files\Microsoft Office\Office\1033\msoffice.exe
C:\Hijack\HijackThis.exe

O3 - Toolbar: @msdxmLC.dll,-1@1033,&Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\System32\msdxm.ocx
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
O4 - HKLM\..\Run: [Mouse Suite 98 Daemon] PELMICED.EXE
O4 - HKLM\..\Run: [dllInit ibmasstw.dll] "C:\Program Files\IBM\UMS\utils\DLLINIT.EXE" ibmasstw.dll
O4 - HKLM\..\Run: [helptoc.bat] "C:\Program Files\IBM\UMS\httpserv\winspawn.exe" C:\PROGRA~1\IBM\UMS\httpserv\help\helptoc.bat
O4 - HKLM\..\Run: [dla] C:\WINNT\system32\dla\tfswctrl.exe
O4 - HKLM\..\Run: [PrinTray] C:\WINNT\System32\spool\DRIVERS\W32X86\2\printray.exe
O4 - HKLM\..\Run: [WinampAgent] "C:\Program Files\Winamp\Winampa.exe"
O4 - HKLM\..\Run: [ICONFIG] C:\PROGRA~1\COMMON~1\SCM\ICONFIG.EXE
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINNT\System32\Shdocvw.dll

#8 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,502 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:10:44 AM

Posted 26 October 2004 - 02:00 PM

Looks good to me. If other users use that computer and have their own logon, you may want to check their accounts as well.

Log looks clean...great job!

Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  • Disable and Enable System Restore. - If you are using Windows ME or XP then you should disable and reenable system restore to make sure there are no infected files found in a restore point.

    You can find instructions on how to enable and reenable system restore here:

    Managing Windows Millenium System Restore

    or

    Windows XP System Restore Guide

    Renable system restore with instructions from tutorial above

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    • From within Internet Explorer click on the Tools menu and then click on Options.
    • Click once on the Security tab
    • Click once on the Internet icon so it becomes highlighted.
    • Click once on the Custom Level button.
      • Change the Download signed ActiveX controls to Prompt
      • Change the Download unsigned ActiveX controls to Disable
      • Change the Initialize and script ActiveX controls not marked as safe to Disable
      • Change the Installation of desktop items to Prompt
      • Change the Launching programs and files in an IFRAME to Prompt
      • Change the Navigate sub-frames across different domains to Prompt
      • When all these settings have been made, click on the OK button.
      • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    • Next press the Apply button and then the OK to exit the Internet Properties page.
  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

    A tutorial on installing & using this product can be found here:

    Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  • Install Ad-Aware - Install and download Ad-Aware. ou should also scan your computer with program on a regular basis just as you would an antivirus software in conjunction with Spybot.

    A tutorial on installing & using this product can be found here:

    Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

Glad I was able to help.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users