Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Cant Get Rid Of Fake Wuauclt.exe(?) And Svchost.exe


  • This topic is locked This topic is locked
9 replies to this topic

#1 robsamui

robsamui

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:06:46 PM

Posted 04 February 2007 - 03:15 AM

Everything slowed down - all sorts of odd programs are looking for internet access and there a copy of wuauclt and svchost that can't be deleted in the windows temp folder. Lotls of strange dlls being created in system32 folder, too (ddcyy.dll, urqqqpo.dll). Winlogon.exe keeps being modified each time I run the computer.

Please help!

Logfile of HijackThis v1.99.1
Scan saved at 2:14:43 PM, on 2/4/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\LEXPPS.EXE
d:\AVG7\avgamsvr.exe
d:\AVG7\avgupsvc.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
D:\WS_FTP Pro\ftpsched.exe
D:\HistorySweep\HSSvc.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe
C:\WINDOWS\System32\sistray.EXE
C:\WINDOWS\System32\khooker.exe
C:\WINDOWS\Hcontrol.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
D:\ZoneAlarm\zlclient.exe
C:\WINDOWS\ATKOSD.exe
D:\Spybot - Search & Destroy\TeaTimer.exe
D:\online-timer\olmtr.exe
C:\Documents and Settings\bunker\Desktop\virus\HijackThis.exe

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\SYSTEM\blank.htm
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer
O2 - BHO: (no name) - {2A3E649D-BCB8-49ED-AA97-BF384F4AEEE5} - C:\WINDOWS\System32\ddcyy.dll
O2 - BHO: IE 4.x-6.x BHO for Internet Download Accelerator - {2A646672-9C3A-4C28-9A7A-1FB0F63F28B6} - d:\InternetDownAcceler\idaiehlp.dll
O2 - BHO: (no name) - {B22CE870-2D05-4FDA-99EE-7A101875189A} - C:\WINDOWS\system32\urqqqpo.dll
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [SiS Tray] C:\WINDOWS\System32\sistray.EXE
O4 - HKLM\..\Run: [SiS KHooker] C:\WINDOWS\System32\khooker.exe
O4 - HKLM\..\Run: [SiSUSBRG] C:\WINDOWS\sisUSBrg.exe
O4 - HKLM\..\Run: [Hcontrol] C:\WINDOWS\Hcontrol.exe
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKLM\..\Run: [Zone Labs Client] "D:\ZoneAlarm\zlclient.exe"
O4 - HKCU\..\Run: [freeonlinemeter] D:\online-timer\config\flink
O4 - Startup: TeaTimer.exe.lnk = D:\Spybot - Search & Destroy\TeaTimer.exe
O4 - Startup: Free Online-meter.lnk = D:\online-timer\olmtr.exe
O8 - Extra context menu item: Download ALL with IDA - d:\InternetDownAcceler\idaieall.htm
O8 - Extra context menu item: Download with IDA - d:\InternetDownAcceler\idaie.htm
O9 - Extra button: Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - d:\InternetDownAcceler\ida.exe
O9 - Extra 'Tools' menuitem: &Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - d:\InternetDownAcceler\ida.exe
O20 - Winlogon Notify: ddcyy - C:\WINDOWS\System32\ddcyy.dll
O20 - Winlogon Notify: urqqqpo - C:\WINDOWS\SYSTEM32\urqqqpo.dll
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - d:\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - d:\AVG7\avgupsvc.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: Windows Host Services (DLLHOST32) - Unknown owner - C:\WINDOWS\system\dllhost.exe (file missing)
O23 - Service: Ipswitch WS_FTP Queue (ftpqueue) - Ipswitch, Inc., 81 Hartwell Ave, Lexington MA 02421 - D:\WS_FTP Pro\ftpsched.exe
O23 - Service: HistorySweepService - Unknown owner - D:\HistorySweep\HSSvc.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: Network Windows Service (MSWindows) - Unknown owner - C:\WINDOWS\System32\urdvxc.exe" /service (file missing)
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs Inc. - C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe

BC AdBot (Login to Remove)

 


m

#2 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:01:46 AM

Posted 04 February 2007 - 09:36 AM

Welcome robsamui :thumbsup:

Please download VundoFix.exe to your desktop.
Double-click VundoFix.exe to run it.
When VundoFix re-opens,click the "Scan for Vundo" button.
Once it's done scanning,click the "Remove Vundo" button.
You will receive a prompt asking if you want to remove the files, click "YES".
Once you click yes, your desktop will go blank as it starts removing Vundo.
When completed,it will prompt that it will reboot your computer,click "OK".
Please post the contents of C:\vundofix.txt into your next reply.

Note:
It is possible that VundoFix encountered a file it could not remove.
In this case,VundoFix will run on reboot,simply follow the above instructions starting from "Click the Scan for Vundo button." when VundoFix appears at reboot.

=========================

Download SDFix and save it to your desktop.
http://downloads.andymanchesta.com/RemovalTools/SDFix.zip

Please then reboot your computer into Safe Mode by doing the following :

* Restart your computer
* After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
* Instead of Windows loading as normal, a menu with options should appear;
* Select the first option, to run Windows in Safe Mode, then press "Enter".
* Choose your usual account.

* In Safe Mode, right click the SDFix.zip folder and choose Extract All,
* Open the extracted folder and double click RunThis.bat to start the script.
* Type Y to begin the script.
* It will remove the Trojan Services then make some repairs to the registry and prompt you to press any key to Reboot.
* Press any Key and it will restart the PC.
* Your system will take longer that normal to restart as the fixtool will be running and removing files.
* When the desktop loads the Fixtool will complete the removal and display Finished, then press any key to end the script and load your desktop icons.
* Finally open the SDFix folder on your desktop and copy and paste the contents of the results file Report.txt,the C:\vundofix.txt,and a new HijackThis log into your next reply.

Edited by RichieUK, 04 February 2007 - 09:36 AM.

Posted Image
Posted Image

#3 robsamui

robsamui
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:06:46 PM

Posted 05 February 2007 - 02:18 AM

Hi Richie, and thanks for the help.
Ho hum! Not successful, I'm afraid.

VundoFix.exe couldn't remove 4 files. I ran it over and over, about 8 times, but it still didn't take them out.
ddcyy.dll
tbijivgr.dll
urqqqpo.dll
yycdd.ini

There's a lot of stuff been removed, but the dodgy winlogon and modifiers just keep re-creating themselves
every time I try to remove them with HJT.

And further ideas to disinfect me?

Cheers!

Rob



-----------------------------------------------------------------------------------------------------------------
SDFix: Version 1.63

Mon 02/05/2007 - 13:01:59.50

Microsoft Windows XP [Version 5.1.2600]

Running From: C:\SDFix

Safe Mode:
Checking Services:

Name:
DLLHOST32
icrss
MSWindows

Path:
"C:\WINDOWS\system\dllhost.exe"
"C:\WINDOWS\system\icrss.exe"
"C:\WINDOWS\System32\urdvxc.exe" /service

DLLHOST32 Deleted
icrss Deleted
MSWindows Deleted

Restoring Windows Registry Entries
Restoring Default Hosts File


Rebooting...

Normal Mode:
Checking Files:

No Trojan Files Found..




ADS Check:

C:\WINDOWS\system32
No streams found.

Final Check:

Remaining Services:
------------------



Remaining Files:
---------------

Backups Folder: - C:\SDFix\backups\backups.zip


Checking For Files with Hidden Attributes :

C:\WINDOWS\SYSTEM32\_awvtu.dll
C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP5\A0023893.dll
C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP5\A0023894.dll
C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP5\A0023895.dll
C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP5\A0023896.dll
C:\WINDOWS\LastGood.Tmp\INF\oem3.inf
C:\WINDOWS\LastGood.Tmp\INF\oem3.PNF

Finished








----------------------------------------------------------------------------------------------------------------------

Logfile of HijackThis v1.99.1
Scan saved at 1:26:35 PM, on 2/5/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\sistray.EXE
d:\AVG7\avgamsvr.exe
C:\WINDOWS\System32\khooker.exe
C:\WINDOWS\Hcontrol.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
D:\ZoneAlarm\zlclient.exe
d:\AVG7\avgupsvc.exe
D:\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
D:\online-timer\olmtr.exe
D:\WS_FTP Pro\ftpsched.exe
C:\WINDOWS\ATKOSD.exe
D:\HistorySweep\HSSvc.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe
C:\Documents and Settings\bunker\Desktop\virus\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\SYSTEM\blank.htm
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer
O2 - BHO: IE 4.x-6.x BHO for Internet Download Accelerator - {2A646672-9C3A-4C28-9A7A-1FB0F63F28B6} - d:\InternetDownAcceler\idaiehlp.dll
O2 - BHO: (no name) - {58FE85B5-4A6A-4517-A865-469000559401} - C:\WINDOWS\System32\ddcyy.dll
O2 - BHO: (no name) - {B22CE870-2D05-4FDA-99EE-7A101875189A} - C:\WINDOWS\system32\urqqqpo.dll
O4 - HKLM\..\Run: [SiS Tray] C:\WINDOWS\System32\sistray.EXE
O4 - HKLM\..\Run: [SiS KHooker] C:\WINDOWS\System32\khooker.exe
O4 - HKLM\..\Run: [SiSUSBRG] C:\WINDOWS\sisUSBrg.exe
O4 - HKLM\..\Run: [Hcontrol] C:\WINDOWS\Hcontrol.exe
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKLM\..\Run: [Zone Labs Client] "D:\ZoneAlarm\zlclient.exe"
O4 - HKCU\..\Run: [freeonlinemeter] D:\online-timer\config\flink
O4 - Startup: TeaTimer.exe.lnk = D:\Spybot - Search & Destroy\TeaTimer.exe
O4 - Startup: Free Online-meter.lnk = D:\online-timer\olmtr.exe
O8 - Extra context menu item: Download ALL with IDA - d:\InternetDownAcceler\idaieall.htm
O8 - Extra context menu item: Download with IDA - d:\InternetDownAcceler\idaie.htm
O9 - Extra button: Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - d:\InternetDownAcceler\ida.exe
O9 - Extra 'Tools' menuitem: &Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - d:\InternetDownAcceler\ida.exe
O20 - Winlogon Notify: ddcyy - C:\WINDOWS\System32\ddcyy.dll
O20 - Winlogon Notify: urqqqpo - C:\WINDOWS\SYSTEM32\urqqqpo.dll
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - d:\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - d:\AVG7\avgupsvc.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: Ipswitch WS_FTP Queue (ftpqueue) - Ipswitch, Inc., 81 Hartwell Ave, Lexington MA 02421 - D:\WS_FTP Pro\ftpsched.exe
O23 - Service: HistorySweepService - Unknown owner - D:\HistorySweep\HSSvc.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec

Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs Inc. - C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe

#4 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:01:46 AM

Posted 05 February 2007 - 03:47 AM

Please disable Spybot S&Dís protection,or it will interfere.
You can enable it after you're clean.
Open Spybot and click on 'Mode' and check 'Advanced Mode'.
Click on 'Tools' in bottom left hand corner.
Click on the 'System Startup' icon.
Uncheck 'Teatimer' box and/or uncheck 'Resident'.
Click the 'Allow Change' box.
Then, check next to the computer clock to see if the icon for Spybot is still there.
If it is, right click it and choose 'exit Spybot-S&D Resident'.
Reboot the computer.

===================

Please download DrWeb-CureIt & save it to your desktop. DO NOT perform a scan yet.

You should copy/print the following because you need to be in Safe Mode from here on.

Reboot your computer into SAFE MODE" using the F8 method.
To do this,restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly.
A menu will appear with several options.
Use the arrow keys on your keyboard to navigate and select the option to run Windows in "Safe Mode".

Scan with DrWeb-CureIt as follows:
* Double-click on drweb-cureit.exe to start the program. An "Express Scan of your PC" notice will appear.
* Under "Start the Express Scan Now", Click "OK" to start. This is a short scan that will scan the files currently running in memory and when something is found, click the Yes button when it asks you if you want to cure it.
* Once the short scan has finished, Click Options > Change settings
* Choose the "Scan tab" and UNcheck "Heuristic analysis"
* Back at the main window, click "Select drives" (a red dot will show which drives have been chosen)
* Then click the "Start/Stop Scanning" button (green arrow on the right) and the scan will start.
* When done, a message will be displayed at the bottom advising if any viruses were found.
* Click "Yes to all" if it asks if you want to cure/move the file.
* When the scan has finished, look if you can see the icon next to the files found. If so, click it, then click the next icon right below and select "Move incurable".
(This will move it to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if it can't be cured)
* Next, in the Dr.Web CureIt menu on top, click file and choose save report list.
* Save the DrWeb.csv report to your desktop.
* Exit Dr.Web Cureit when done.
* Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
* After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)

===================

Please download Combofix and save to the desktop:
http://download.bleepingcomputer.com/sUBs/combofix.exe
http://www.techsupportforum.com/sectools/combofix.exe
Note:
It is important that it is saved directly to your desktop

Close any open browsers.
Double click on combofix.exe & follow the prompts.
When finished, it will produce a log.
Post the C:\ComboFix.txt in your next reply.
Note:
Do not mouseclick combofix's window whilst it's running.
That may cause the program to freeze/hang.


Reboot,post the DrWeb.cvs report,the C:\ComboFix.txt,and a new Hijackthis log into your next reply.
Posted Image
Posted Image

#5 robsamui

robsamui
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:06:46 PM

Posted 06 February 2007 - 12:58 AM

Hi again - followed your comprehensive instructions (thanks) and there was a real nest of snakes. Lots of stuff removed, but ddcyy.dll and urqqqpo.dll
are still there! Something is still spawning them!

Rob

logs enclosed



-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ddcyy.dll;c:\windows\system32;Trojan.Virtumod;Will be cured after reboot.;
urqqqpo.dll;c:\windows\system32;Trojan.Virtumod;Will be cured after reboot.;
urqqqpo.dll;C:\WINDOWS\SYSTEM32;Trojan.Virtumod;Will be cured after reboot.;
ddcyy.dll;C:\WINDOWS\SYSTEM32;Trojan.Virtumod;Will be cured after reboot.;
_byxwwwv.dll.bad;C:\VundoFix Backups;Trojan.Virtumod;Deleted.;
ddcyy.dll.bad;C:\VundoFix Backups;Trojan.Virtumod;Deleted.;
urqqqpo.dll.bad;C:\VundoFix Backups;Trojan.Virtumod;Deleted.;
Process.exe;C:\SDFix\apps;Tool.Prockill;;
backup-20070203-133851-201.dll;C:\Documents and Settings\bunker\Desktop\virus\backups;Trojan.Virtumod;Deleted.;
backup-20070113-164736-821-Uninstall.exe;C:\Documents and Settings\bunker\Desktop\virus\backups;Trojan.DownLoader.17651;Incurable.Moved.;
backup-20070203-121939-400.dll;C:\Documents and Settings\bunker\Desktop\virus\backups;Trojan.Virtumod;Deleted.;
backup-20070203-121951-878.dll;C:\Documents and Settings\bunker\Desktop\virus\backups;Trojan.Virtumod;Deleted.;
backup-20070203-133840-739.dll;C:\Documents and Settings\bunker\Desktop\virus\backups;Trojan.Virtumod;Deleted.;
backup-20070204-140345-888.dll;C:\Documents and Settings\bunker\Desktop\virus\backups;Trojan.Virtumod;Deleted.;
backup-20070204-140345-422.dll;C:\Documents and Settings\bunker\Desktop\virus\backups;Trojan.Virtumod;Deleted.;
backup-20070205-131427-786.dll;C:\Documents and Settings\bunker\Desktop\virus\backups;Trojan.Virtumod;Deleted.;
backup-20070205-131428-160.dll;C:\Documents and Settings\bunker\Desktop\virus\backups;Trojan.Virtumod;Deleted.;
A0001027.DLL;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP1;Trojan.MulDrop.5450;Deleted.;
A0001032.sys;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP1;Trojan.MulDrop.5450;Deleted.;
A0003049.sys;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP1;Trojan.MulDrop.5450;Deleted.;
A0003068.sys;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP1;Trojan.MulDrop.5450;Deleted.;
A0006135.sys;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP3;Trojan.MulDrop.5450;Deleted.;
A0012325.DLL;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP3;Trojan.MulDrop.5450;Deleted.;
A0012331.sys;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP3;Trojan.MulDrop.5450;Deleted.;
A0013352.DLL;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP4;Trojan.MulDrop.5450;Deleted.;
A0013357.sys;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP4;Trojan.MulDrop.5450;Deleted.;
A0014397.DLL;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP4;Trojan.MulDrop.5450;Deleted.;
A0014402.sys;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP4;Trojan.MulDrop.5450;Deleted.;
A0016397.DLL;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP4;Trojan.MulDrop.5450;Deleted.;
A0016403.SYS;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP4;Trojan.MulDrop.5450;Deleted.;
A0016420.DLL;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP4;Trojan.MulDrop.5450;Deleted.;
A0016426.SYS;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP4;Trojan.MulDrop.5450;Deleted.;
A0017618.exe;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP5;BackDoor.IRC.Sdbot.1052;Deleted.;
A0017619.exe;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP5;BackDoor.IRC.Sdbot.936;Deleted.;
A0017620.exe;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP5;Trojan.MulDrop.5016;Deleted.;
A0017621.dll;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP5;Trojan.DownLoader.17097;Deleted.;
A0017622.exe;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP5;BackDoor.IRC.Sdbot.1052;Deleted.;
A0023893.dll;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP5;Trojan.Virtumod;Deleted.;
A0023894.dll;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP5;Trojan.Virtumod;Deleted.;
A0023895.dll;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP5;Trojan.Virtumod;Deleted.;
A0023896.dll;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP5;Trojan.Virtumod;Deleted.;
A0023920.dll;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP6;Trojan.Virtumod;Deleted.;
A0024063.dll;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP7;Trojan.Virtumod;Deleted.;
A0024064.exe;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP7;Trojan.DownLoader.17651;Incurable.Moved.;
A0024065.dll;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP7;Trojan.Virtumod;Deleted.;
A0024066.dll;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP7;Trojan.Virtumod;Deleted.;
A0024067.dll;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP7;Trojan.Virtumod;Deleted.;
A0024068.dll;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP7;Trojan.Virtumod;Deleted.;
A0024069.dll;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP7;Trojan.Virtumod;Deleted.;
A0024070.dll;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP7;Trojan.Virtumod;Deleted.;
A0024071.dll;C:\System Volume Information\_restore{FD0DEAC4-1524-4896-A52F-C769F5FDEB68}\RP7;Trojan.Virtumod;Deleted.;
Dc11.dll;C:\Recycled;Trojan.MulDrop.5450;Deleted.;
Dc12.dll;C:\Recycled;Trojan.Virtumod;Deleted.;
Dc15.dll;C:\Recycled;Trojan.Virtumod;Deleted.;
Dc18.exe;C:\Recycled;Trojan.MulDrop.5502;Deleted.;
Dc19.exe;C:\Recycled;Trojan.DownLoader.18295;Deleted.;

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

ComboFix 07.02.04 - Running from: "C:\Documents and Settings\bunker\Desktop"

(((((((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))


C:\WINDOWS\start.exe


((((((((((((((((((((((((((((((( Files Created from 2007-01-06 to 2007-02-06 ))))))))))))))))))))))))))))))))))


2007-02-06 10:36 <DIR> d-------- C:\DOCUME~1\bunker\DoctorWeb
2007-02-05 12:56 <DIR> d-------- C:\SDFix
2007-02-05 11:28 <DIR> d-------- C:\VundoFix Backups
2007-02-04 12:02 <DIR> d--hs---- C:\FOUND.000
2007-02-02 19:33 <DIR> dr-h----- C:\$VAULT$.AVG
2007-02-02 17:43 <DIR> d-------- C:\WINDOWS\LastGood
2007-02-02 17:28 816,672 --a------ C:\WINDOWS\SYSTEM32\DRIVERS\avg7core.sys
2007-02-02 17:28 4,224 --a------ C:\WINDOWS\SYSTEM32\DRIVERS\avg7rsw.sys
2007-02-02 17:28 3,968 --a------ C:\WINDOWS\SYSTEM32\DRIVERS\avgclean.sys
2007-02-02 17:28 28,416 --a------ C:\WINDOWS\SYSTEM32\DRIVERS\avg7rsxp.sys
2007-02-02 17:28 18,240 --a------ C:\WINDOWS\SYSTEM32\DRIVERS\avgmfx86.sys
2007-02-02 17:28 <DIR> d-------- C:\Program Files\Grisoft
2007-02-02 17:28 <DIR> d-------- C:\DOCUME~1\LOCALS~1\Application Data\AVG7
2007-02-02 17:28 <DIR> d-------- C:\DOCUME~1\bunker\Application Data\AVG7
2007-02-02 17:28 <DIR> d-------- C:\DOCUME~1\ALLUSE~1\Application Data\Grisoft
2007-01-31 14:23 277,141 --------- C:\WINDOWS\SYSTEM32\ddcyy.dll
2007-01-31 13:14 22,029 --------- C:\WINDOWS\SYSTEM32\urqqqpo.dll
2007-01-31 13:14 2,816 --a------ C:\WINDOWS\SYSTEM32\_reg.sys
2007-01-31 00:31 92,704 -ra------ C:\WINDOWS\SYSTEM32\DRIVERS\HPUATA.sys
2007-01-31 00:31 <DIR> d-------- C:\WINDOWS\LastGood.Tmp
2007-01-07 13:52 83,168 --a------ C:\WINDOWS\SYSTEM32\S32EVNT1.DLL
2007-01-07 13:52 82,832 --a------ C:\WINDOWS\SYSTEM32\DRIVERS\SYMEVENT.SYS
2007-01-07 13:51 <DIR> d-------- C:\Program Files\Symantec AntiVirus


(((((((((((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))))


2007-02-06 11:45 1930896 --ah----- C:\DOCUME~1\bunker\Application Data\iconcache.db
2007-02-04 11:44 219 --ah----- C:\AUTOEXEC.BAT
2007-02-02 17:59 431616 --a------ C:\WINDOWS\SYSTEM32\winlogon.exe
2007-02-02 17:22 2816 --a------ C:\WINDOWS\SYSTEM32\_reg.sys
2007-01-25 13:14 14848 --a------ C:\DOCUME~1\bunker\Application Data\dcbc2a71-70d8-4dan-ehr8-e0d61dea3fdf.ini
2006-12-20 21:24 52088 --a------ C:\DOCUME~1\bunker\Application Data\gdipfontcachev1.dat
2006-12-08 16:56 -------- d-------- C:\Program Files\ie protector and tracks eraser
2006-11-14 15:18 78848 --a------ C:\WINDOWS\SYSTEM32\inloader.dll
2006-11-14 15:18 27136 --a------ C:\WINDOWS\SYSTEM32\pubdlg.dll
2006-11-14 15:18 161552 --a------ C:\WINDOWS\SYSTEM32\asycpict.dll
2006-11-14 15:18 12288 --a------ C:\WINDOWS\SYSTEM32\picstore.dll
2006-11-12 16:02 144896 --a------ C:\WINDOWS\SYSTEM32\migicons.exe
2006-11-12 15:51 62 --ahs---- C:\DOCUME~1\bunker\Application Data\desktop.ini
2006-11-12 14:39 0 --a------ C:\CONFIG.SYS
2006-11-12 14:35 271 ---hs---- C:\Program Files\desktop.ini
2006-11-12 14:35 23357 ---h----- C:\Program Files\folder.htt
2006-11-12 14:34 1660 -r-hs---- C:\MSDOS.SYS
2006-11-12 14:24 18939 --a------ C:\WINDOWS\setver.exe


(((((((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))

*Note* empty entries & legit default entries are not shown

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run]
"freeonlinemeter"="D:\\online-timer\\config\\flink"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run]
"SiS Tray"="C:\\WINDOWS\\System32\\sistray.EXE"
"SiS KHooker"="C:\\WINDOWS\\System32\\khooker.exe"
"SiSUSBRG"="C:\\WINDOWS\\sisUSBrg.exe"
"Hcontrol"="C:\\WINDOWS\\Hcontrol.exe"
"vptray"="C:\\PROGRA~1\\SYMANT~1\\VPTray.exe"
"Zone Labs Client"="\"D:\\ZoneAlarm\\zlclient.exe\""

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\IMAIL]
"Installed"="1"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\MAPI]
"Installed"="1"
"NoChange"="1"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\MSFS]
"Installed"="1"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\setup\disabledrunkeys]
"SiS Tray"="C:\\WINDOWS\\SYSTEM32\\sistray.exe"
"SiS KHooker"="C:\\WINDOWS\\SYSTEM32\\KHOOKER.EXE"
"LTSMMSG"="LTSMMSG.exe"
"Hcontrol"="C:\\WINDOWS\\Hcontrol.exe"
"SoundMan"="SOUNDMAN.EXE"
"LoadPowerProfile"="Rundll32.exe powrprof.dll,LoadCurrentPwrScheme"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"wuauserv"=dword:00000002
"SLService"=dword:00000002
"LiveUpdate"=dword:00000003
"ERSvc"=dword:00000002
"BITS"=dword:00000003
"Avg7UpdSvc"=dword:00000002
"Automatic LiveUpdate Scheduler"=dword:00000002
"icrss"=dword:00000002


[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks]
"{FBF23B40-E3F0-101B-8488-00AA003E56F8}"=""
"{B22CE870-2D05-4FDA-99EE-7A101875189A}"=""

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shellserviceobjectdelayload]
"UPnPMonitor"="{e57ce738-33e8-4c51-8354-bb4de9d215d1}"

[HKEY_USERS\.default\software\microsoft\windows\currentversion\run]
"AVG7_Run"="d:\\AVG7\\avgw.exe /RUNONCE"

[HKEY_USERS\s-1-5-18\software\microsoft\windows\currentversion\run]
"AVG7_Run"="d:\\AVG7\\avgw.exe /RUNONCE"

HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\ddcyy
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\urqqqpo

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\securityproviders]
"SecurityProviders"="msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll"

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Svchost]
LocalService REG_MULTI_SZ Alerter\0WebClient\0LmHosts\0RemoteRegistry\0upnphost\0SSDPSRV\0\0
NetworkService REG_MULTI_SZ DnsCache\0\0
rpcss REG_MULTI_SZ RpcSs\0\0
imgsvc REG_MULTI_SZ StiSvc\0\0
termsvcs REG_MULTI_SZ TermService\0\0



********************************************************************

catchme 0.1 W2K/XP - userland rootkit detector by Gmer, 17 October 2006
http://www.gmer.net

scanning hidden processes ...

scanning hidden services ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0

********************************************************************

Completion time: 07-02-06 11:54:07

-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Logfile of HijackThis v1.99.1
Scan saved at 11:59:33 AM, on 2/6/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\LEXPPS.EXE
d:\AVG7\avgamsvr.exe
C:\WINDOWS\System32\sistray.EXE
C:\WINDOWS\System32\khooker.exe
C:\WINDOWS\Hcontrol.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
d:\AVG7\avgupsvc.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
D:\ZoneAlarm\zlclient.exe
C:\WINDOWS\ATKOSD.exe
D:\WS_FTP Pro\ftpsched.exe
D:\HistorySweep\HSSvc.exe
D:\online-timer\olmtr.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\WINDOWS\NOTEPAD.EXE
C:\Documents and Settings\bunker\Desktop\virus\HijackThis.exe

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\SYSTEM\blank.htm
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer
O2 - BHO: (no name) - {08CC8474-C4BD-4ED0-B5BF-F6D590A6FF9F} - C:\WINDOWS\System32\ddcyy.dll
O2 - BHO: IE 4.x-6.x BHO for Internet Download Accelerator - {2A646672-9C3A-4C28-9A7A-1FB0F63F28B6} - d:\InternetDownAcceler\idaiehlp.dll
O2 - BHO: (no name) - {B22CE870-2D05-4FDA-99EE-7A101875189A} - C:\WINDOWS\system32\urqqqpo.dll
O4 - HKLM\..\Run: [SiS Tray] C:\WINDOWS\System32\sistray.EXE
O4 - HKLM\..\Run: [SiS KHooker] C:\WINDOWS\System32\khooker.exe
O4 - HKLM\..\Run: [SiSUSBRG] C:\WINDOWS\sisUSBrg.exe
O4 - HKLM\..\Run: [Hcontrol] C:\WINDOWS\Hcontrol.exe
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKLM\..\Run: [Zone Labs Client] "D:\ZoneAlarm\zlclient.exe"
O4 - HKCU\..\Run: [freeonlinemeter] D:\online-timer\config\flink
O4 - Startup: TeaTimer.exe.lnk = D:\Spybot - Search & Destroy\TeaTimer.exe
O4 - Startup: Free Online-meter.lnk = D:\online-timer\olmtr.exe
O8 - Extra context menu item: Download ALL with IDA - d:\InternetDownAcceler\idaieall.htm
O8 - Extra context menu item: Download with IDA - d:\InternetDownAcceler\idaie.htm
O9 - Extra button: Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - d:\InternetDownAcceler\ida.exe
O9 - Extra 'Tools' menuitem: &Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - d:\InternetDownAcceler\ida.exe
O20 - Winlogon Notify: ddcyy - C:\WINDOWS\System32\ddcyy.dll
O20 - Winlogon Notify: urqqqpo - C:\WINDOWS\SYSTEM32\urqqqpo.dll
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - d:\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - d:\AVG7\avgupsvc.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: Ipswitch WS_FTP Queue (ftpqueue) - Ipswitch, Inc., 81 Hartwell Ave, Lexington MA 02421 - D:\WS_FTP Pro\ftpsched.exe
O23 - Service: HistorySweepService - Unknown owner - D:\HistorySweep\HSSvc.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs Inc. - C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe

#6 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:01:46 AM

Posted 06 February 2007 - 04:32 AM

First make sure Spybot's Resident TeaTimer is still disabled.

Download SysProtect Remover to your desktop:
http://www.atribune.org/ccount/click.php?id=10
Launch the program by clicking on SysProtect Remover icon.
Click 'Remove Now',follow the onscreen prompts.
=======================

Copy and paste the following bold blue text below into Notepad.
Click on File(in the menu at the top)>Save as..Save as Type: 'All Files' File name: fix.reg to your desktop.
Then double click on the fix.reg file on your desktop and agree to merge it into the registry,then reboot.
==============================================
Windows Registry Editor Version 5.00

[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\ddcyy]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\urqqqpo]
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"icrss"=-

==============================================

If you're not able to run the registry fix above,carry on here please.

Download Killbox by Option^Explicit:
http://www.killbox.net/downloads/KillBox.exe
Save it to your desktop.
Please double-click Killbox.exe to run it.
Select: 'Delete on Reboot'.
Then Click on the 'All Files' button.
Please copy ALL the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

C:\WINDOWS\SYSTEM32\ddcyy.dll
C:\WINDOWS\SYSTEM32\urqqqpo.dll
C:\WINDOWS\SYSTEM32\yycdd.dll
C:\WINDOWS\SYSTEM32\opqqqru.dll

Return to Killbox,go to the File menu,and choose 'Paste from Clipboard'.
Click the red-and-white Delete File button.
Click 'Yes' at the 'Delete on Reboot' prompt.
Click OK at any 'PendingFileRenameOperations' prompt.
If your computer does not restart automatically,please restart it manually.

========================

Download VirtumundoBeGone.exe from:
http://secured2k.home.comcast.net/tools/VirtumundoBeGone.exe
1. Save it to your Desktop.
2. Locate and double-click VirtumundoBeGone.exe to run it.
3. Follow the instructions.
4. When the tool has finished reboot your pc.

========================

Please run VundoFix you downloaded and ran earlier.
Double-click VundoFix.exe again to run it.
When VundoFix re-opens,click the "Scan for Vundo" button.
Once it's done scanning,click the "Remove Vundo" button.
You will receive a prompt asking if you want to remove the files, click "YES".
Once you click yes, your desktop will go blank as it starts removing Vundo.
When completed,it will prompt that it will reboot your computer,click "OK".
Please post the contents of C:\vundofix.txt into your next reply.

Note:
It is possible that VundoFix encountered a file it could not remove.
In this case,VundoFix will run on reboot,simply follow the above instructions starting from "Click the Scan for Vundo button." when VundoFix appears at reboot.

Please post the contents of C:\vundofix.txt and a new Hijack This log into your next reply.

Edited by RichieUK, 06 February 2007 - 07:15 AM.

Posted Image
Posted Image

#7 robsamui

robsamui
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:06:46 PM

Posted 07 February 2007 - 01:18 AM

Happy grin!

That was some radical surgery, but it looks like all is now clean!

Thanks for all the time and help - this was a nasty one!

Best wishes

Rob


-----------------------------------------------------------------------------------------------

VundoFix V6.3.5

Checking Java version...

Sun Java not detected
Scan started at 12:10:42 PM 2/7/2007

Listing files found while scanning....

C:\WINDOWS\System32\tbijivgv.dll

Beginning removal...

Performing Repairs to the registry.
Done!


------------------------------------------------------------------------------------------------

Logfile of HijackThis v1.99.1
Scan saved at 12:26:29 PM, on 2/7/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\system32\spoolsv.exe
d:\AVG7\avgamsvr.exe
C:\WINDOWS\System32\sistray.EXE
C:\WINDOWS\System32\khooker.exe
C:\WINDOWS\Hcontrol.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
D:\ZoneAlarm\zlclient.exe
d:\AVG7\avgupsvc.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
D:\Spybot - Search & Destroy\TeaTimer.exe
C:\WINDOWS\ATKOSD.exe
D:\WS_FTP Pro\ftpsched.exe
D:\online-timer\olmtr.exe
D:\HistorySweep\HSSvc.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Documents and Settings\bunker\Desktop\virus\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\SYSTEM\blank.htm
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer
O2 - BHO: IE 4.x-6.x BHO for Internet Download Accelerator - {2A646672-9C3A-4C28-9A7A-1FB0F63F28B6} - d:\InternetDownAcceler\idaiehlp.dll
O4 - HKLM\..\Run: [SiS Tray] C:\WINDOWS\System32\sistray.EXE
O4 - HKLM\..\Run: [SiS KHooker] C:\WINDOWS\System32\khooker.exe
O4 - HKLM\..\Run: [SiSUSBRG] C:\WINDOWS\sisUSBrg.exe
O4 - HKLM\..\Run: [Hcontrol] C:\WINDOWS\Hcontrol.exe
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKLM\..\Run: [Zone Labs Client] "D:\ZoneAlarm\zlclient.exe"
O4 - HKCU\..\Run: [freeonlinemeter] D:\online-timer\config\flink
O4 - Startup: TeaTimer.exe.lnk = D:\Spybot - Search & Destroy\TeaTimer.exe
O4 - Startup: Free Online-meter.lnk = D:\online-timer\olmtr.exe
O8 - Extra context menu item: Download ALL with IDA - d:\InternetDownAcceler\idaieall.htm
O8 - Extra context menu item: Download with IDA - d:\InternetDownAcceler\idaie.htm
O9 - Extra button: Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - d:\InternetDownAcceler\ida.exe
O9 - Extra 'Tools' menuitem: &Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - d:\InternetDownAcceler\ida.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - d:\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - d:\AVG7\avgupsvc.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: Ipswitch WS_FTP Queue (ftpqueue) - Ipswitch, Inc., 81 Hartwell Ave, Lexington MA 02421 - D:\WS_FTP Pro\ftpsched.exe
O23 - Service: HistorySweepService - Unknown owner - D:\HistorySweep\HSSvc.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs Inc. - C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe

#8 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:01:46 AM

Posted 07 February 2007 - 03:32 AM

You're most welcome Rob :thumbsup:

Have Hijack This fix the following by placing a check in the appropriate boxes and selecting 'Fix checked'.
Make sure all browser and all Windows Explorer windows are closed before fixing:
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\SYSTEM\blank.htm
Exit Hijackthis.
================================
Other than the above your log is clean.
If all's ok,please do the following:

Turn off System Restore,then turn it back on again:
Help if needed:
http://www.pchell.com/virus/systemrestore.shtml

Create a new System Restore Point:
Help if needed:
Click on Start/All Programs/Accessories/System Tools/System Restore.
In the System Restore window,click "Create a Restore Point" button,then click 'Next'.
In the window that appears,enter a description,then click on "Create", then "Close".
The date and time is created automatically.

You should now go to Windows Update and install any available critical/high priority updates.

Read through the info found here,to help you prevent any possible future infections.
How did I get infected?
http://www.bleepingcomputer.com/forums/t/2520/how-did-i-get-infected/
Posted Image
Posted Image

#9 robsamui

robsamui
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:06:46 PM

Posted 07 February 2007 - 06:59 AM

Hi again.

I've taken note of your comments and will do what you suggest immediately.

Thanks a lot once again,

Cheers!

Rob

#10 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:01:46 AM

Posted 07 February 2007 - 07:01 AM

You're welcome Rob :thumbsup:

This thread will now be closed.
If you need this topic reopened, please contact a member of the HJT Team and we will reopen it for you. Include the address of this thread in your request. If you should have a new issue, please start a new topic. This applies only to the original topic starter. Everyone else please begin a New Topic.
Posted Image
Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users