Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Ctfmon32.exe (coolwebsearch) Help


  • This topic is locked This topic is locked
10 replies to this topic

#1 abuser

abuser

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:11 PM

Posted 03 November 2006 - 11:57 AM

Here is my log file for 1 of my computers in my Domain. I have a process ctfmon32.exe that is effecting roughly 100 pc's on my net. I have multipe calls into Mcafee, which i am still awaiting a solution to this problem. I have tried multiple times to remove this pest with no success. Can someone analize my log and see if im missing something?

Logfile of HijackThis v1.99.1
Scan saved at 11:48:38 AM, on 11/3/2006
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\spoolsv.exe
C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe
C:\Program Files\Common Files\AOL\TopSpeed\2.0\aoltsmon.exe
C:\Program Files\LANDesk\Shared Files\residentagent.exe
C:\WINNT\System32\svchost.exe
C:\Program Files\LANDesk\LDClient\LocalSch.EXE
C:\WINNT\system32\CBA\pds.exe
C:\Program Files\LANDesk\LDClient\tmcsvc.exe
C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
C:\Program Files\Network Associates\VirusScan\Mcshield.exe
C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINNT\system32\mgabg.exe
C:\WINNT\system32\rcmdsvc.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\Program Files\LANDesk\LDClient\softmon.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\System32\mspmspsv.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\Explorer.EXE
C:\Program Files\Microsoft Hardware\Mouse\point32.exe
C:\WINNT\system32\PDesk\PDesk.exe
C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
C:\PROGRA~1\PESTPA~1\PPControl.exe
C:\PROGRA~1\PESTPA~1\PPMemCheck.exe
C:\PROGRA~1\PESTPA~1\CookiePatrol.exe
C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe
C:\Program Files\Common Files\AOL\1129123005\ee\AOLSoftware.exe
C:\Program Files\Real\RealPlayer\RealPlay.exe
C:\Program Files\LANDesk\LDClient\webportal\sdclientmonitor.exe
C:\WINNT\system32\winlogin32.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINNT\system32\ctfmon.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\PROGRA~1\WINZIP\wzqkpick.exe
C:\Documents and Settings\basilison\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.optonline.net/Home
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: AOL Toolbar Launcher - {7C554162-8CB7-45A4-B8F4-8EA1C75885F9} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\System32\msdxm.ocx
O3 - Toolbar: AOLToolBand Class - {DE9C389F-3316-41A7-809B-AA305ED9D922} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll
O4 - HKLM\..\Run: [POINTER] point32.exe
O4 - HKLM\..\Run: [Matrox Powerdesk] C:\WINNT\system32\PDesk\PDesk.exe /Autolaunch
O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
O4 - HKLM\..\Run: [DrvLsnr] C:\Program Files\Analog Devices\SoundMAX\DrvLsnr.exe
O4 - HKLM\..\Run: [PestPatrol Control Center] C:\PROGRA~1\PESTPA~1\PPControl.exe
O4 - HKLM\..\Run: [PPMemCheck] C:\PROGRA~1\PESTPA~1\PPMemCheck.exe
O4 - HKLM\..\Run: [CookiePatrol] C:\PROGRA~1\PESTPA~1\CookiePatrol.exe
O4 - HKLM\..\Run: [McAfeeUpdaterUI] "C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" /StartedFromRunKey
O4 - HKLM\..\Run: [HostManager] C:\Program Files\Common Files\AOL\1129123005\ee\AOLSoftware.exe
O4 - HKLM\..\Run: [AOLDialer] C:\Program Files\Common Files\AOL\ACS\AOLDial.exe
O4 - HKLM\..\Run: [RealTray] C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER
O4 - HKLM\..\Run: [IntelAPMClient] "C:\Program Files\LANDesk\LDClient\amclient.exe" /apm /s /ro
O4 - HKLM\..\Run: [LANDeskVulscanClient] "C:\Program Files\LANDesk\LDClient\vulScan.exe"
O4 - HKLM\..\Run: [SDClientMonitor] "C:\Program Files\LANDesk\LDClient\webportal\sdclientmonitor.exe"
O4 - HKLM\..\Run: [IPHSend] C:\Program Files\Common Files\AOL\IPHSend\IPHSend.exe
O4 - HKLM\..\Run: [cpanel] C:\WINNT\system32\winlogin32.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [User Input Services] C:\WINNT\system32\ctfmon32.exe
O4 - HKCU\..\Run: [ctfmon.exe] ctfmon.exe
O4 - HKCU\..\Run: [AIM] C:\PROGRA~1\AIM95\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [Spyware Cleaner] "C:\Program Files\Spyware Cleaner\SpywareCleaner.Exe" /boot
O4 - HKCU\..\Run: [cpanel] C:\WINNT\system32\winlogin32.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: WinZip Quick Pick.lnk = C:\Program Files\WinZip\WZQKPICK.EXE
O8 - Extra context menu item: &AOL Toolbar Search - c:\program files\aol\aol toolbar 2.0\resources\en-US\local\search.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\PROGRA~1\AIM95\aim.exe
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINNT\system32\Shdocvw.dll
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {14872CD9-4827-11D4-A6C0-0050047F8D50} (ActiveXPosition Control) - http://intranet.saccapital.com/positionser...veXPosition.ocx
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?LinkId=39204&clcid=0x409
O16 - DPF: {560E6A24-894D-11D4-A730-0050047F8D50} (ActiveXCC Control) - http://intranet.saccapital.com/positionserver/ActiveXCC.ocx
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/...b?1127939079359
O16 - DPF: {6D36D3DF-175C-46C3-A00C-63E87353E489} (ActiveXPosition Control) - http://intranet.saccapital.com/positionser...eXPosition4.ocx
O16 - DPF: {83EF1847-D835-490B-8D9D-90B2987D66E8} (AOL Pictures Uploader Class) - http://pictures.aolcdn.com/ap/Resources/1....der.9.3.2.3.cab
O16 - DPF: {88D969C0-F192-11D4-A65F-0040963251E5} (XML DOM Document 4.0) - http://intranet/msxml4.cab
O16 - DPF: {8A0019EB-51FA-4AE5-A40B-C0496BBFC739} (Verizon Wireless Media Upload) - http://www.vzwpix.com/activex/VerizonWirel...loadControl.cab
O16 - DPF: {AAA84C24-1518-441F-90F2-EC162AB6DF6C} (ActiveXCC_SAC Control) - http://intranet.saccapital.com/positionser...tiveXCC_SAC.ocx
O16 - DPF: {B8E71371-F7F7-11D2-A2CE-0060B0FB9D0D} (CDToolCtrl Class) - http://free.aol.com/tryaolfree/cdt175/aolcdt175.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = saccap.int
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = saccap.int
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = saccap.int
O20 - Winlogon Notify: igfxcui - C:\WINNT\SYSTEM32\igfxsrvc.dll
O23 - Service: AOL Connectivity Service (AOL ACS) - America Online - C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe
O23 - Service: AOL TopSpeed Monitor (AOL TopSpeedMonitor) - America Online, Inc - C:\Program Files\Common Files\AOL\TopSpeed\2.0\aoltsmon.exe
O23 - Service: LANDesk® Management Agent (CBA8) - LANDesk Software, Ltd. - C:\Program Files\LANDesk\Shared Files\residentagent.exe
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Intel Local Scheduler Service - LANDesk Software, Ltd. - C:\Program Files\LANDesk\LDClient\LocalSch.EXE
O23 - Service: Intel PDS - LANDesk Software Ltd. - C:\WINNT\system32\CBA\pds.exe
O23 - Service: LANDesk Targeted Multicast (Intel Targeted Multicast) - LANDesk Software, Ltd. - C:\Program Files\LANDesk\LDClient\tmcsvc.exe
O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LANDesk Remote Control Service (ISSUSER) - LANDesk Software, Ltd. - C:\PROGRA~1\LANDesk\LDClient\issuser.exe
O23 - Service: McAfee Framework Service (McAfeeFramework) - Unknown owner - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe" /ServiceStart (file missing)
O23 - Service: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\Mcshield.exe
O23 - Service: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
O23 - Service: MGABGEXE - Matrox Graphics Inc. - C:\WINNT\system32\mgabg.exe
O23 - Service: PsShutdown (PsShutdownSvc) - Systems Internals - C:\WINNT\System32\PSSDNSVC.EXE
O23 - Service: LANDesk® Software Monitoring Service (Softmon) - LANDesk Software, Ltd. - C:\Program Files\LANDesk\LDClient\softmon.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: SpywareCleanerService - Unknown owner - C:\Program Files\Spyware Cleaner\SCService.exe (file missing)
O23 - Service: WinTools for IE service (WinToolsSvc) - Unknown owner - C:\Program Files\Common files\WinTools\WToolsS.exe (file missing)
O23 - Service: VNC Server (winvnc) - Unknown owner - C:\Program Files\orl\vnc\WinVNC.exe" -service (file missing)

BC AdBot (Login to Remove)

 


#2 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:09:11 PM

Posted 03 November 2006 - 12:04 PM

Hi and welcome to Bleeping Computer! My name is Sam and I will be helping you. :thumbsup:

Please download ComboFix and save it to your desktop.
Double click combofix.exe and follow the prompts.
When it's done running it will produce a log for you. Please post that log in your next reply.

Important Note - Do not mouseclick combofix's window whilst it's running. That may cause it to stall.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#3 abuser

abuser
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:11 PM

Posted 03 November 2006 - 12:22 PM

basilison - Fri 11/03/2006 12:15:38.13 Service Pack 4
ComboFix 06.10.19 - Running from: "C:\Documents and Settings\basilison\Desktop"

((((((((((((((((((((((((((((((( Files Created from 2006-10-03 to 2006-11-03 ))))))))))))))))))))))))))))))))))


2006-11-03 11:11 99,840 --a------ C:\WINNT\system32\ctfmon32.exe
2006-11-03 10:32 47,104 --a------ C:\WINNT\system32\ctfmon32.dll
2006-10-19 19:57 32,256 --a------ C:\WINNT\system32\winlogin32.exe


(((((((((((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))))


2006-11-03 11:49 -------- d-------- C:\Program Files\PestPatrol
2006-11-03 11:05 -------- d-------- C:\Program Files\Uniblue
2006-11-02 22:12 65536 --a------ C:\WINNT\system32\PSSDNSVC.EXE
2006-10-25 12:05 -------- d-------- C:\Program Files\iTunes
2006-10-25 12:05 -------- d-------- C:\Program Files\iPod
2006-10-25 12:04 -------- d-------- C:\Program Files\QuickTime
2006-10-25 12:02 -------- d-------- C:\Program Files\Apple Software Update
2006-09-14 20:00 8448 --a------ C:\WINNT\system32\drivers\EntDrv50.sys
2006-09-14 20:00 58464 --a------ C:\WINNT\system32\drivers\mvstdi5x.sys
2006-09-14 20:00 36922 --a------ C:\WINNT\system32\EntAPI.dll
2006-09-14 20:00 116992 --a------ C:\WINNT\system32\drivers\naiavf5x.sys


(((((((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))

*Note* empty entries are not shown

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run]
"ctfmon.exe"="ctfmon.exe"
"AIM"="C:\\PROGRA~1\\AIM95\\aim.exe -cnetwait.odl"
"Spyware Cleaner"="\"C:\\Program Files\\Spyware Cleaner\\SpywareCleaner.Exe\" /boot"
"cpanel"="C:\\WINNT\\system32\\winlogin32.exe"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run]
"POINTER"="point32.exe"
"Matrox Powerdesk"="C:\\WINNT\\system32\\PDesk\\PDesk.exe /Autolaunch"
"ShStatEXE"="\"C:\\Program Files\\Network Associates\\VirusScan\\SHSTAT.EXE\" /STANDALONE"
"DrvLsnr"="C:\\Program Files\\Analog Devices\\SoundMAX\\DrvLsnr.exe"
"PestPatrol Control Center"="C:\\PROGRA~1\\PESTPA~1\\PPControl.exe"
"PPMemCheck"="C:\\PROGRA~1\\PESTPA~1\\PPMemCheck.exe"
"CookiePatrol"="C:\\PROGRA~1\\PESTPA~1\\CookiePatrol.exe"
"McAfeeUpdaterUI"="\"C:\\Program Files\\Network Associates\\Common Framework\\UpdaterUI.exe\" /StartedFromRunKey"
"HostManager"="C:\\Program Files\\Common Files\\AOL\\1129123005\\ee\\AOLSoftware.exe"
"AOLDialer"="C:\\Program Files\\Common Files\\AOL\\ACS\\AOLDial.exe"
"RealTray"="C:\\Program Files\\Real\\RealPlayer\\RealPlay.exe SYSTEMBOOTHIDEPLAYER"
"IntelAPMClient"="\"C:\\Program Files\\LANDesk\\LDClient\\amclient.exe\" /apm /s /ro"
"LANDeskVulscanClient"="\"C:\\Program Files\\LANDesk\\LDClient\\vulScan.exe\" "
"SDClientMonitor"="\"C:\\Program Files\\LANDesk\\LDClient\\webportal\\sdclientmonitor.exe\""
"IPHSend"="C:\\Program Files\\Common Files\\AOL\\IPHSend\\IPHSend.exe"
"cpanel"="C:\\WINNT\\system32\\winlogin32.exe"
"iTunesHelper"="\"C:\\Program Files\\iTunes\\iTunesHelper.exe\""
"Synchronization Manager"="mobsync.exe /logon"
"User Input Services"="C:\\WINNT\\system32\\ctfmon32.exe"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\IMAIL]
"Installed"="1"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\MAPI]
"NoChange"="1"
"Installed"="1"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\MSFS]
"Installed"="1"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonceex]
"PPClean RunOnce insertion"="\"C:\\Program Files\\LANDesk\\LDClient\\softmon.exe\" /r regedit /s \"C:\\PPCleanRunOnce.reg\""

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components]
"DeskHtmlVersion"=dword:00000110
"DeskHtmlMinorVersion"=dword:00000003
"Settings"=dword:00000001
"GeneralFlags"=dword:00000000

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\0]
"Source"="About:Home"
"SubscribedURL"="About:Home"
"FriendlyName"="My Current Home Page"
"Flags"=dword:00000002
"Position"=hex:2c,00,00,00,cc,00,00,00,00,00,00,00,34,03,00,00,e4,02,00,00,00,\
00,00,00,01,00,00,00,01,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00
"CurrentState"=dword:40000004
"OriginalStateInfo"=hex:18,00,00,00,ff,ff,00,00,ff,ff,00,00,ff,ff,ff,ff,ff,ff,\
ff,ff,04,00,00,00
"RestoredStateInfo"=hex:18,00,00,00,10,03,00,00,1f,00,00,00,e0,00,00,00,d6,00,\
00,00,01,00,00,00

[HKEY_USERS\.default\software\microsoft\windows\currentversion\run]
"cpanel"="C:\\WINNT\\system32\\winlogin32.exe"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\sharedtaskscheduler]
"{438755C2-A8BA-11D1-B96B-00A0C90312E1}"="Browseui preloader"
"{8C7461EF-2B13-11d2-BE35-3078302C2030}"="Component Categories cache daemon"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks]
"{AEB6717E-7E19-11d0-97EE-00C04FD91972}"=""

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"NoDriveTypeAutoRun"=dword:00000095

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer\Run]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"dontdisplaylastusername"=dword:00000000
"legalnoticecaption"=""
"legalnoticetext"=""
"shutdownwithoutlogon"=dword:00000001

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
"NoDriveTypeAutoRun"=dword:00000095

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shellserviceobjectdelayload]
"Network.ConnectionTray"="{7007ACCF-3202-11D1-AAD2-00805FC1270E}"
"WebCheck"="{E6FB5E20-DE35-11CF-9C87-00AA005127ED}"
"SysTray"="{35CEC8A3-2BE6-11D2-8773-92E220524153}"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\securityproviders]
"SecurityProviders"="msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll"


Contents of the 'Scheduled Tasks' folder
C:\WINNT\tasks\AppleSoftwareUpdate.job

Completion time: Fri 2006-11-03 12:16:56.09
C:\ComboFix.txt ... 06-11-03 12:16

#4 abuser

abuser
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:11 PM

Posted 03 November 2006 - 12:24 PM

thanks for your help SAM :thumbsup:

#5 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:09:11 PM

Posted 03 November 2006 - 02:57 PM

Open Notepad, and copy everything in the code box below and paste it into a new notepad file. Change the "Save As Type" to "All Files". Save it as fixme.reg on your Desktop. Make sure there is NO blank line above "REGEDIT4"!

REGEDIT4

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run]
"cpanel"=-

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run]
"cpanel"=-
"User Input Services"=-

[HKEY_USERS\.default\software\microsoft\windows\currentversion\run]
"cpanel"=-
Locate fixme.reg on your Desktop and double-click on it. When it asks if you want to merge with the registry, click YES.


=============



Please download the Killbox by Option^Explicit.

Note: In the event you already have Killbox, this is a new version that I need you to download.
  • Save it to your desktop.
  • Please double-click Killbox.exe to run it.
  • Select:
    • Delete on Reboot
    • then Click on the All Files button.
  • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):



    C:\WINNT\system32\ctfmon32.exe
    C:\WINNT\system32\ctfmon32.dll
    C:\WINNT\system32\winlogin32.exe



  • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
  • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt. Click OK at any PendingFileRenameOperations prompt (and please let me know if you receive this message!).

    If your computer does not restart automatically, please restart it manually.

  • After rebooting, open up Killbox again. Click File -> Logs -> Actions History Log
  • Post this log in your next reply.
==============



Please go HERE to run Panda's ActiveScan
  • Once you are on the Panda site click the Scan your PC button
  • A new window will open...click the Check Now button
  • Enter your Country
  • Enter your State/Province
  • Enter your e-mail address and click send
  • Select either Home User or Company
  • Click the big Scan Now button
  • If it wants to install an ActiveX component allow it
  • It will start downloading the files it requires for the scan (Note: It may take a couple of minutes)
  • When download is complete, click on My Computer to start the scan
  • When the scan completes, if anything malicious is detected, click the See Report button, then Save Report and save it to a convenient location. Post the contents of the ActiveScan report along with a new hijackthis log.

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#6 abuser

abuser
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:11 PM

Posted 03 November 2006 - 04:14 PM

Pocket Killbox version 2.0.0.881
Running on Windows 2000 as Administrator(Administrator)
was started @ Friday, November 03, 2006, 3:55 PM

# 1 [Delete on Reboot]
Path = C:\WINNT\system32\ctfmon32.exe


# 2 [Delete on Reboot]
Path = C:\WINNT\system32\ctfmon32.dll


I Rebooted @ 3:58:46 PM
Pocket Killbox version 2.0.0.881
Running on Windows 2000 as Administrator(Administrator)
was started @ Friday, November 03, 2006, 4:04 PM

# 1 [Delete on Reboot]
Path = C:\WINNT\system32\winlogin32.exe


# 2 [Delete on Reboot]
Path = C:\WINNT\system32\winlogin32.exe


PendingFileRenameOperations Registry Data has been Removed by External Process! @ 4:07:59 PM

#7 abuser

abuser
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:11 PM

Posted 03 November 2006 - 05:27 PM

Here you go Sam. Thank you very much for your time on this problem.





Logfile of HijackThis v1.99.1
Scan saved at 5:21:16 PM, on 11/3/2006
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\spoolsv.exe
C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe
C:\Program Files\Common Files\AOL\TopSpeed\2.0\aoltsmon.exe
C:\Program Files\LANDesk\Shared Files\residentagent.exe
C:\WINNT\System32\svchost.exe
C:\Program Files\LANDesk\LDClient\LocalSch.EXE
C:\WINNT\system32\CBA\pds.exe
C:\Program Files\LANDesk\LDClient\tmcsvc.exe
C:\PROGRA~1\LANDesk\LDClient\issuser.exe
C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
C:\Program Files\Network Associates\VirusScan\Mcshield.exe
C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINNT\system32\mgabg.exe
C:\WINNT\system32\rcmdsvc.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\Program Files\LANDesk\LDClient\softmon.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\System32\mspmspsv.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\Explorer.EXE
C:\Program Files\Microsoft Hardware\Mouse\point32.exe
C:\WINNT\system32\PDesk\PDesk.exe
C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
C:\PROGRA~1\PESTPA~1\PPControl.exe
C:\PROGRA~1\PESTPA~1\PPMemCheck.exe
C:\PROGRA~1\PESTPA~1\CookiePatrol.exe
C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe
C:\Program Files\Common Files\AOL\1129123005\ee\AOLSoftware.exe
C:\Program Files\Real\RealPlayer\RealPlay.exe
C:\Program Files\LANDesk\LDClient\vulScan.exe
C:\Program Files\LANDesk\LDClient\webportal\sdclientmonitor.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINNT\system32\ctfmon.exe
C:\Program Files\WinZip\WZQKPICK.EXE
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\LANDesk\Shared Files\proxyhost.exe
C:\Documents and Settings\basilison\Desktop\HijackThis.exe

O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: AOL Toolbar Launcher - {7C554162-8CB7-45A4-B8F4-8EA1C75885F9} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\System32\msdxm.ocx
O3 - Toolbar: AOLToolBand Class - {DE9C389F-3316-41A7-809B-AA305ED9D922} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll
O4 - HKLM\..\Run: [POINTER] point32.exe
O4 - HKLM\..\Run: [Matrox Powerdesk] C:\WINNT\system32\PDesk\PDesk.exe /Autolaunch
O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
O4 - HKLM\..\Run: [DrvLsnr] C:\Program Files\Analog Devices\SoundMAX\DrvLsnr.exe
O4 - HKLM\..\Run: [PestPatrol Control Center] C:\PROGRA~1\PESTPA~1\PPControl.exe
O4 - HKLM\..\Run: [PPMemCheck] C:\PROGRA~1\PESTPA~1\PPMemCheck.exe
O4 - HKLM\..\Run: [CookiePatrol] C:\PROGRA~1\PESTPA~1\CookiePatrol.exe
O4 - HKLM\..\Run: [McAfeeUpdaterUI] "C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" /StartedFromRunKey
O4 - HKLM\..\Run: [HostManager] C:\Program Files\Common Files\AOL\1129123005\ee\AOLSoftware.exe
O4 - HKLM\..\Run: [AOLDialer] C:\Program Files\Common Files\AOL\ACS\AOLDial.exe
O4 - HKLM\..\Run: [RealTray] C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER
O4 - HKLM\..\Run: [IntelAPMClient] "C:\Program Files\LANDesk\LDClient\amclient.exe" /apm /s /ro
O4 - HKLM\..\Run: [LANDeskVulscanClient] "C:\Program Files\LANDesk\LDClient\vulScan.exe"
O4 - HKLM\..\Run: [SDClientMonitor] "C:\Program Files\LANDesk\LDClient\webportal\sdclientmonitor.exe"
O4 - HKLM\..\Run: [IPHSend] C:\Program Files\Common Files\AOL\IPHSend\IPHSend.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKCU\..\Run: [ctfmon.exe] ctfmon.exe
O4 - HKCU\..\Run: [Uniblue Registry Booster] C:\Program Files\Uniblue\Registry Booster\RegistryBooster.exe /S
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: WinZip Quick Pick.lnk = C:\Program Files\WinZip\WZQKPICK.EXE
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\PROGRA~1\AIM95\aim.exe
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINNT\system32\Shdocvw.dll
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {14872CD9-4827-11D4-A6C0-0050047F8D50} (ActiveXPosition Control) - http://intranet.saccapital.com/positionser...veXPosition.ocx
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?LinkId=39204&clcid=0x409
O16 - DPF: {560E6A24-894D-11D4-A730-0050047F8D50} (ActiveXCC Control) - http://intranet.saccapital.com/positionserver/ActiveXCC.ocx
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/...b?1127939079359
O16 - DPF: {6D36D3DF-175C-46C3-A00C-63E87353E489} (ActiveXPosition Control) - http://intranet.saccapital.com/positionser...eXPosition4.ocx
O16 - DPF: {83EF1847-D835-490B-8D9D-90B2987D66E8} (AOL Pictures Uploader Class) - http://pictures.aolcdn.com/ap/Resources/1....der.9.3.2.3.cab
O16 - DPF: {88D969C0-F192-11D4-A65F-0040963251E5} (XML DOM Document 4.0) - http://intranet/msxml4.cab
O16 - DPF: {8A0019EB-51FA-4AE5-A40B-C0496BBFC739} (Verizon Wireless Media Upload) - http://www.vzwpix.com/activex/VerizonWirel...loadControl.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O16 - DPF: {AAA84C24-1518-441F-90F2-EC162AB6DF6C} (ActiveXCC_SAC Control) - http://intranet.saccapital.com/positionser...tiveXCC_SAC.ocx
O16 - DPF: {B8E71371-F7F7-11D2-A2CE-0060B0FB9D0D} (CDToolCtrl Class) - http://free.aol.com/tryaolfree/cdt175/aolcdt175.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = saccap.int
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = saccap.int
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = saccap.int
O20 - Winlogon Notify: igfxcui - C:\WINNT\SYSTEM32\igfxsrvc.dll
O23 - Service: AOL Connectivity Service (AOL ACS) - America Online - C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe
O23 - Service: AOL TopSpeed Monitor (AOL TopSpeedMonitor) - America Online, Inc - C:\Program Files\Common Files\AOL\TopSpeed\2.0\aoltsmon.exe
O23 - Service: LANDesk® Management Agent (CBA8) - LANDesk Software, Ltd. - C:\Program Files\LANDesk\Shared Files\residentagent.exe
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Intel Local Scheduler Service - LANDesk Software, Ltd. - C:\Program Files\LANDesk\LDClient\LocalSch.EXE
O23 - Service: Intel PDS - LANDesk Software Ltd. - C:\WINNT\system32\CBA\pds.exe
O23 - Service: LANDesk Targeted Multicast (Intel Targeted Multicast) - LANDesk Software, Ltd. - C:\Program Files\LANDesk\LDClient\tmcsvc.exe
O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LANDesk Remote Control Service (ISSUSER) - LANDesk Software, Ltd. - C:\PROGRA~1\LANDesk\LDClient\issuser.exe
O23 - Service: McAfee Framework Service (McAfeeFramework) - Unknown owner - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe" /ServiceStart (file missing)
O23 - Service: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\Mcshield.exe
O23 - Service: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
O23 - Service: MGABGEXE - Matrox Graphics Inc. - C:\WINNT\system32\mgabg.exe
O23 - Service: PsShutdown (PsShutdownSvc) - Systems Internals - C:\WINNT\System32\PSSDNSVC.EXE
O23 - Service: LANDesk® Software Monitoring Service (Softmon) - LANDesk Software, Ltd. - C:\Program Files\LANDesk\LDClient\softmon.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: SpywareCleanerService - Unknown owner - C:\Program Files\Spyware Cleaner\SCService.exe (file missing)
O23 - Service: WinTools for IE service (WinToolsSvc) - Unknown owner - C:\Program Files\Common files\WinTools\WToolsS.exe (file missing)
O23 - Service: VNC Server (winvnc) - Unknown owner - C:\Program Files\orl\vnc\WinVNC.exe" -service (file missing)


Incident Status Location

Potentially unwanted tool:application/funweb Not disinfected c:\program files\FunWebProducts
Potentially unwanted tool:application/mywebsearch Not disinfected c:\program files\MyWebSearch
Adware:adware/wintools Not disinfected Windows Registry
Possible Virus. Not disinfected C:\!KillBox\ctfmon32.exe
Possible Virus. Not disinfected C:\Documents and Settings\Administrator\Local Settings\Temp\dl120843.exe
Possible Virus. Not disinfected C:\Documents and Settings\Administrator\Local Settings\Temp\dl1367453.exe
Possible Virus. Not disinfected C:\Documents and Settings\Administrator\Local Settings\Temp\dl584312.exe
Possible Virus. Not disinfected C:\Documents and Settings\Administrator\Local Settings\Temp\dl63238656.exe
Possible Virus. Not disinfected C:\Documents and Settings\Administrator\Local Settings\Temp\tmp63190328.exe
Possible Virus. Not disinfected C:\Documents and Settings\basilison\Local Settings\Temp\dl136625.exe
Possible Virus. Not disinfected C:\Documents and Settings\basilison\Local Settings\Temp\dl3798921.exe
Spyware:Cookie/Apmebf Not disinfected C:\Documents and Settings\brianh\Cookies\brianh@apmebf[2].txt
Spyware:Cookie/Cgi-bin Not disinfected C:\Documents and Settings\brianh\Cookies\brianh@cgi-bin[3].txt
Spyware:Cookie/BurstBeacon Not disinfected C:\Documents and Settings\brianh\Cookies\brianh@www.burstbeacon[1].txt
Spyware:Cookie/Buydomains Not disinfected C:\Documents and Settings\brianh\Cookies\brianh@www47.buydomains[1].txt
Spyware:Cookie/Seeq Not disinfected C:\Documents and Settings\brianh\Cookies\brianh@www48.seeq[1].txt
Possible Virus. Not disinfected C:\Documents and Settings\brianh\Local Settings\Temp\dl-1935624702.exe
Possible Virus. Not disinfected C:\Documents and Settings\brianh\Local Settings\Temp\dl-1935625467.exe
Possible Virus. Not disinfected C:\Documents and Settings\brianh\Local Settings\Temp\dl-1939285327.exe
Possible Virus. Not disinfected C:\Documents and Settings\brianh\Local Settings\Temp\dl-1939286280.exe
Virus:Bck/Diazom.C Disinfected C:\Documents and Settings\brianh\Local Settings\Temp\dl-1942948280.exe
Possible Virus. Not disinfected C:\Documents and Settings\brianh\Local Settings\Temp\dl-1942948796.exe
Possible Virus. Not disinfected C:\Documents and Settings\brianh\Local Settings\Temp\dl-1946614592.exe
Possible Virus. Not disinfected C:\Documents and Settings\brianh\Local Settings\Temp\dl-1946616467.exe
Possible Virus. Not disinfected C:\Documents and Settings\brianh\Local Settings\Temp\dl-1950751952.exe
Virus:Bck/Diazom.C Disinfected C:\Documents and Settings\brianh\Local Settings\Temp\dl-1950756467.exe
Spyware:Cookie/Apmebf Not disinfected C:\Documents and Settings\frankm\Cookies\frankm@apmebf[2].txt
Virus:Eicar.Mod Not disinfected C:\Program Files\PestPatrol\Help.chm[/HowCanITestDetection.html]
Adware:Adware/WinTools Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/locals~1/temp/WinTools.exe]
Adware:Adware/WinTools Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Program Files/common files/wintools/btiein.dll]
Adware:Adware/WinTools Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Program Files/common files/wintools/WSup.exe]
Adware:Adware/WinTools Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Program Files/common files/wintools/WToolsA.exe]
Adware:Adware/WinTools Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Program Files/common files/wintools/WToolsB.dll]
Adware:Adware/WinTools Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Program Files/common files/wintools/WToolsS.exe]
Adware:Adware/WinTools Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Program Files/common~1/wintools/wsup.exe]
Adware:Adware/WinTools Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Program Files/common~1/wintools/wtoolsa.exe]
Adware:Adware/WinTools Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Program Files/common~1/wintools/WToolsB.dll]
Adware:Adware/WinTools Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Program Files/common files/wintools/WinTools.exe]
Adware:Adware/WinTools Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Program Files/common files/wintools/WToolsB.to_be_deleted]
Adware:Adware/WinTools Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Program Files/common files/wintools/WToolsD.cfg]
Adware:Adware/WinTools Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Program Files/common files/wintools/WToolsS.to_be_deleted]
Adware:Adware/WinTools Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Local Settings/Temp/btiein.dll]
Adware:Adware/WinTools Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Program Files/common files/wintools/WToolsB.to_be_deleted_x]
Adware:Adware/WinTools Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Program Files/common files/wintools/WToolsS.to_be_deleted_x]
Potentially unwanted tool:Application/MyWebSearch Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Program Files/search toolbar/toolbar.dll]
Spyware:Cookie/Atlas DMT Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[documents and settings/administrator/cookies/administrator@atdmt[2].txt]
Spyware:Cookie/Atlas DMT Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@atdmt[2].txt]
Spyware:Cookie/Zedo Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@zedo[2].txt]
Spyware:Cookie/Adserver Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@z1.adserver[1].txt]
Spyware:Cookie/X10 Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@x10[1].txt]
Spyware:Cookie/Valueclick Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@valueclick[1].txt]
Spyware:Cookie/Tribalfusion Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@tribalfusion[1].txt]
Spyware:Cookie/Traffic Marketplace Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@trafficmp[2].txt]
Spyware:Cookie/Mammamediasolutions Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@targetnet[1].txt]
Spyware:Cookie/Server.iad.Liveperson Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@server.iad.liveperson[1].txt]
Spyware:Cookie/Advertising Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@servedby.advertising[1].txt]
Spyware:Cookie/RealMedia Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@realmedia[2].txt]
Spyware:Cookie/QuestionMarket Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@questionmarket[2].txt]
Spyware:Cookie/QkSrv Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@qksrv[2].txt]
Spyware:Cookie/Hitbox Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@phg.hitbox[1].txt]
Spyware:Cookie/Hitbox Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@hitbox[2].txt]
Spyware:Cookie/Hitbox Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@ehg-dig.hitbox[1].txt]
Spyware:Cookie/Peel Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@peel[2].txt]
Spyware:Cookie/Mediaplex Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@mediaplex[1].txt]
Spyware:Cookie/Maxserving Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@maxserving[1].txt]
Spyware:Cookie/Linksynergy Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@linksynergy[2].txt]
Spyware:Cookie/Humanclick Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@hc2.humanclick[1].txt]
Spyware:Cookie/Gator Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@gator[1].txt]
Spyware:Cookie/FastClick Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@fastclick[1].txt]
Spyware:Cookie/Doubleclick Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@doubleclick[1].txt]
Spyware:Cookie/Coremetrics Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@data.coremetrics[1].txt]
Spyware:Cookie/CentrPort Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@centrport[2].txt]
Spyware:Cookie/Serving-sys Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@bs.serving-sys[2].txt]
Spyware:Cookie/Bluestreak Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@bluestreak[1].txt]
Spyware:Cookie/Bilbo.counted Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@bilbo.counted[2].txt]
Spyware:Cookie/Bfast Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@bfast[1].txt]
Spyware:Cookie/Advertising Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@advertising[1].txt]
Spyware:Cookie/2o7 Not disinfected C:\Program Files\PestPatrol\Quarantine\20040805103137324.zip[Documents and Settings/MichaelR/Cookies/michaelr@2o7[2].txt]
Adware:Adware/WinTools Not disinfected C:\Program Files\PestPatrol\Quarantine\20041119112226578.zip[Program Files/common files/wintools/WToolsB.to_be_deleted_x]
Adware:Adware/WinTools Not disinfected C:\Program Files\PestPatrol\Quarantine\20041119112226578.zip[Program Files/common~1/wintools/wtoolsb.dll]
Potentially unwanted tool:Application/Psshutdown.B Not disinfected C:\WINNT\system32\PSSDNSVC.EXE

#8 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:09:11 PM

Posted 03 November 2006 - 11:02 PM

Delete this file.

C:\WINNT\system32\PSSDNSVC.EXE


Delete these folders.

c:\program files\FunWebProducts
c:\program files\MyWebSearch




Please download ATF Cleaner by Atribune.
This program is for XP and Windows 2000 onlyDouble-click ATF-Cleaner.exe to run the program.
Under Main choose: Select All
Click the Empty Selected button.
If you use Firefox browserClick Firefox at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browserClick Opera at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.



Reboot and post one more hijackthis log.
Let me know how your computer is running now.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#9 abuser

abuser
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:11 PM

Posted 08 November 2006 - 07:47 AM

Sam , thank you very much for your help. You have been a big help in cleaning this virus from my domain. You guys are true pros. :thumbsup:

#10 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:09:11 PM

Posted 08 November 2006 - 09:26 AM

Glad to help! :thumbsup:


Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  • Disable and Enable System Restore. - If you are using Windows ME or XP then you should disable and reenable system restore to make sure there are no infected files found in a restore point left over from what we have just cleaned.

    You can find instructions on how to enable and reenable system restore here:

    Managing Windows Millenium System Restore

    or

    Windows XP System Restore Guide

    Renable system restore with instructions from tutorial above

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    • From within Internet Explorer click on the Tools menu and then click on Options.
    • Click once on the Security tab
    • Click once on the Internet icon so it becomes highlighted.
    • Click once on the Custom Level button.
      • Change the Download signed ActiveX controls to Prompt
      • Change the Download unsigned ActiveX controls to Disable
      • Change the Initialize and script ActiveX controls not marked as safe to Disable
      • Change the Installation of desktop items to Prompt
      • Change the Launching programs and files in an IFRAME to Prompt
      • Change the Navigate sub-frames across different domains to Prompt
      • When all these settings have been made, click on the OK button.
      • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    • Next press the Apply button and then the OK to exit the Internet Properties page.
  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

    A tutorial on installing & using this product can be found here:

    Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  • Install Ad-Aware - Install and download Ad-Aware. ou should also scan your computer with program on a regular basis just as you would an antivirus software in conjunction with Spybot.

    A tutorial on installing & using this product can be found here:

    Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

:flowers: :huh:
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#11 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:09:11 PM

Posted 22 November 2006 - 06:02 AM

Now that your problem appears to be resolved, this thread will be closed. If you need this topic reopened, please contact a member of the HJT Team and we will reopen it for you. Include the address of this thread in your request.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users