Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected With Trojans And I Think Virtumonde


  • This topic is locked This topic is locked
7 replies to this topic

#1 wmvs

wmvs

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:12:59 AM

Posted 25 June 2007 - 08:10 AM

I have many trojans in my computer and tons of malware. I followed the intstructions using Spybot and Adware and have also tried VirtuoFix,Killbox and Unlocker. Maybe I'm not doing things in the right order. Instead of making things worse, I really need some help. Please HELP me!! My HijackThis log is attached:

Logfile of HijackThis v1.99.1
Scan saved at 9:12:21 AM, on 6/25/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\Rtvscan.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\slpservice.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\SYSTEM32\slpmonx.exe
C:\windows\system\hpsysdrv.exe
C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe
C:\Program Files\Unlocker\UnlockerAssistant.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\WINDOWS\Seiko\slpcap.exe
C:\Documents and Settings\Administrator\Desktop\HiJackThis_v2.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://us4.hpwis.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://srch-us4.hpwis.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://srch-us4.hpwis.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://srch-us4.hpwis.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://google.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://srch-us4.hpwis.com/
F3 - REG:win.ini: load=,slpmonx.exe
O2 - BHO: (no name) - AutorunsDisabled - (no file)
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {09CD2F17-4563-4332-AF87-AB3642A6EBE7} - C:\WINDOWS\system32\ddcyy.dll (file missing)
O2 - BHO: (no name) - {22E58089-6DB5-45D9-BF87-6C8975246D26} - C:\WINDOWS\system32\vtuttts.dll (file missing)
O2 - BHO: msdn_lib.msdn_hlp - {38847C4B-1AB1-4A47-9026-9A6CF7B43D31} - C:\WINDOWS\system32\msdn_lib.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: (no name) - {9A03B8AC-0540-492B-B111-FAF0B503BF7F} - (no file)
O2 - BHO: (no name) - {E3159E9D-9877-418B-8A5A-D16794E2D90C} - C:\Program Files\HP Instant Support\qudofej83122.dll
O4 - HKLM\..\Run: [hpsysdrv] c:\windows\system\hpsysdrv.exe
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\System32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [PS2] C:\WINDOWS\system32\ps2.exe
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe
O4 - HKLM\..\Run: [Synchronization Manager] %SystemRoot%\system32\mobsync.exe /logon
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [usyrofiA] C:\WINDOWS\usyrofiA.exe
O4 - HKLM\..\Run: [Configuration Manager] C:\WINDOWS\cfg32.exe
O4 - HKLM\..\Run: [{AC-CF-F6-63-ZN}] C:\windows\system32\mndsregs.exe CHD001
O4 - HKLM\..\Run: [UnlockerAssistant] "C:\Program Files\Unlocker\UnlockerAssistant.exe"
O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: SmartCapture.lnk = C:\WINDOWS\Seiko\slpcap.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - c:\Program Files\Microsoft Money\System\mnyviewer.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {0246ECA8-996F-11D1-BE2F-00A0C9037DFE} (TDServer Control) - http://www.bagan.net.mm/emfont/tdserver.cab
O16 - DPF: {0E5F0222-96B9-11D3-8997-00104BD12D94} (PCPitstop Utility) - http://www.pcpitstop.com/pcpitstop/PCPitStop.CAB
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {2253F320-AB68-4A07-917D-4F12D8884A06} (ChainCast VMR Client Proxy) - http://64.124.45.181/downloads/ccpm_0237.cab
O16 - DPF: {2E12FB00-546B-4EE3-9CC2-057BF02E1C17} (Webshots Multiple Media Uploader - Container) - http://community.webshots.com/html/atx/wsaxcontrol.cab
O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akamai.net/7/1540/52/200207...meInstaller.exe
O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} - http://207.188.7.150/26f05a045ec020eb7105/netzip/RdxIE2.cab
O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} (DivXBrowserPlugin Object) - http://go.divx.com/plugin/DivXBrowserPlugin.cab
O16 - DPF: {7CF052DE-C74F-421B-B04A-3B3037EF5887} (CCMPGui Class) - http://64.124.45.181/chaincast/proxy/CCMP.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.es/activescan/as/asinst.cab
O16 - DPF: {9FC5238F-12C4-454F-B1B5-74599A21DE47} (Webshots Photo Uploader) - http://community.webshots.com/html/WSPhotoUploader.CAB
O16 - DPF: {A17E30C4-A9BA-11D4-8673-60DB54C10000} (YahooYMailTo Class) - http://us.dl1.yimg.com/download.yahoo.com/.../ymmapi_416.dll
O16 - DPF: {CC05BC12-2AA2-4AC7-AC81-0E40F83B1ADF} (Live365Player Class) - http://www.live365.com/players/play365.cab
O16 - DPF: {F7DC2A2E-FC34-11D3-B1D9-00A0C99B41BB} (Zoom Class) - http://www.zoomify.com/download/zoomify305.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = Schmidt.com
O17 - HKLM\Software\..\Telephony: DomainName = Schmidt.com
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = Schmidt.com
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = Schmidt.com
O20 - Winlogon Notify: AutorunsDisabled - C:\WINDOWS\
O20 - Winlogon Notify: NavLogon - C:\WINDOWS\System32\NavLogon.dll
O20 - Winlogon Notify: PCANotify - C:\WINDOWS\SYSTEM32\PCANotify.dll
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\DefWatch.exe
O23 - Service: DomainService - Unknown owner - C:\WINDOWS\system32\nvqyovgs.exe (file missing)
O23 - Service: Symantec AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\Rtvscan.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: SLPMONX - ProdEx Technologies - C:\WINDOWS\System32\slpservice.exe

BC AdBot (Login to Remove)

 


m

#2 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:05:59 AM

Posted 25 June 2007 - 08:35 AM

Welcome to the BleepingComputer HijackThis Logs and Analysis forum wmvs :thumbsup:

Please download VundoFix.exe to your desktop.
Double-click VundoFix.exe to run it.
When VundoFix re-opens,click the "Scan for Vundo" button.
Once it's done scanning,click the "Remove Vundo" button.
You will receive a prompt asking if you want to remove the files, click "YES".
Once you click yes, your desktop will go blank as it starts removing Vundo.
When completed,it will prompt that it will reboot your computer,click "OK".
Post the contents of C:\vundofix.txt into your next reply.

Note:
It is possible that VundoFix encountered a file it could not remove.
In this case,VundoFix will run on reboot,simply follow the above instructions starting from "Click the Scan for Vundo button." when VundoFix appears at reboot.

******************************

Please download Combofix and save to your desktop:
http://download.bleepingcomputer.com/sUBs/Beta/ComboFix.exe
Note:
It is important that it is saved directly to your desktop

Close any open browsers.
Double click on combofix.exe and follow the prompts.
When it's finished it will produce a log.
Post the entire contents of C:\ComboFix.txt into your next reply.
Note:
Do not mouseclick combofix's window while it's running.
That may cause the program to freeze/hang.


******************************

Download SmitfraudFix (by S!Ri), to your desktop.
Double click on Smitfraudfix.cmd
Select option 1 Search, by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present).
Please copy and paste the content of that report into your next reply.

*IMPORTANT*
Do NOT run any other options until you are asked to do so!

Also post a new Hijackthis log please.
Posted Image
Posted Image

#3 wmvs

wmvs
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:12:59 AM

Posted 25 June 2007 - 09:21 AM

Below you will find my VundoFix,ComboFix,Smitfraud & Hijackthis Logs. I think I may be infected with a func.exe and func.js virus. Those kep popping up on my screen. Whats next??


VundoFix V6.5.1

Checking Java version...

Scan started at 9:25:11 AM 6/22/2007

Listing files found while scanning....

C:\windows\system32\bggqdhjd.dll
C:\WINDOWS\system32\djhdqggb.ini
C:\WINDOWS\system32\hfdglner.dll
C:\windows\system32\hhifyqss.exe
C:\windows\system32\ickxypex.exe
C:\windows\system32\mmowgcoq.ini
C:\windows\system32\qocgwomm.dll
C:\windows\system32\qtstv.bak1
C:\windows\system32\qtstv.bak2
C:\windows\system32\qtstv.ini
C:\WINDOWS\system32\vtstq.dll

Beginning removal...

Attempting to delete C:\windows\system32\bggqdhjd.dll
C:\windows\system32\bggqdhjd.dll Has been deleted!

Attempting to delete C:\WINDOWS\system32\djhdqggb.ini
C:\WINDOWS\system32\djhdqggb.ini Has been deleted!

Attempting to delete C:\WINDOWS\system32\hfdglner.dll
C:\WINDOWS\system32\hfdglner.dll Has been deleted!

Attempting to delete C:\windows\system32\hhifyqss.exe
C:\windows\system32\hhifyqss.exe Has been deleted!

Attempting to delete C:\windows\system32\ickxypex.exe
C:\windows\system32\ickxypex.exe Has been deleted!

Attempting to delete C:\windows\system32\mmowgcoq.ini
C:\windows\system32\mmowgcoq.ini Has been deleted!

Attempting to delete C:\windows\system32\qocgwomm.dll
C:\windows\system32\qocgwomm.dll Has been deleted!

Attempting to delete C:\windows\system32\qtstv.bak1
C:\windows\system32\qtstv.bak1 Has been deleted!

Attempting to delete C:\windows\system32\qtstv.bak2
C:\windows\system32\qtstv.bak2 Has been deleted!

Attempting to delete C:\windows\system32\qtstv.ini
C:\windows\system32\qtstv.ini Has been deleted!

Attempting to delete C:\WINDOWS\system32\vtstq.dll
C:\WINDOWS\system32\vtstq.dll Has been deleted!

Performing Repairs to the registry.
Done!

VundoFix V6.5.1

Checking Java version...

Scan started at 10:09:35 AM 6/22/2007

Listing files found while scanning....

C:\WINDOWS\system32\ddcyy.dll
C:\WINDOWS\system32\yycdd.bak1
C:\WINDOWS\system32\yycdd.ini

Beginning removal...

Attempting to delete C:\WINDOWS\system32\ddcyy.dll
C:\WINDOWS\system32\ddcyy.dll Could not be deleted.

Attempting to delete c:\windows\system32\vtuttts.dll
c:\windows\system32\vtuttts.dll Has been deleted!

Attempting to delete C:\WINDOWS\system32\yycdd.bak1
C:\WINDOWS\system32\yycdd.bak1 Has been deleted!

Attempting to delete C:\WINDOWS\system32\yycdd.ini
C:\WINDOWS\system32\yycdd.ini Has been deleted!

Performing Repairs to the registry.
Done!

Beginning removal...

Attempting to delete C:\WINDOWS\system32\ddcyy.dll
C:\WINDOWS\system32\ddcyy.dll Has been deleted!

Performing Repairs to the registry.
Done!

VundoFix V6.5.1

Checking Java version...

Scan started at 1:35:37 PM 6/22/2007

Listing files found while scanning....

No infected files were found.


VundoFix V6.5.1

Checking Java version...

Scan started at 9:53:35 AM 6/25/2007

Listing files found while scanning....

No infected files were found.



"LIN" - 2007-06-25 10:00:37 - ComboFix 07-06-23.5 - Service Pack 2 NTFS


(((((((((((((((((((((((((((((((((((((((((((( V Log )))))))))))))))))))))))))))))))))))))))))))))))))))))))


C:\WINDOWS\system32\rqromli.dll
C:\WINDOWS\system32\wvuvtsp.dll


* * * POST RUN FILES/FOLDERS * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *


((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))


C:\DOCUME~1\Lin\APPLIC~1.\.rdr.ini
C:\DOCUME~1\Lin\MYDOCU~1.\appatc~1
C:\DOCUME~1\Lin\MYDOCU~1.\icroso~1.net
C:\Program Files\mbols~1
C:\Program Files\outerinfo
C:\Program Files\outerinfo\Terms.rtf
C:\Program Files\ssembl~1
C:\Temp\0b9
C:\Temp\0b9\tmpTF.log
C:\Temp\iee
C:\Temp\iee\tmpZTF.log
C:\Temp\tn3
C:\WINDOWS\180ax.exe
C:\WINDOWS\764.exe
C:\WINDOWS\7search.dll
C:\WINDOWS\bjam.dll
C:\WINDOWS\bokja.exe
C:\WINDOWS\cdsm32.dll
C:\WINDOWS\cs_cache.ini
C:\WINDOWS\flt.dll
C:\WINDOWS\mspphe.dll
C:\WINDOWS\pbar.dll
C:\WINDOWS\rau001978.exe
C:\WINDOWS\saiemod.dll
C:\WINDOWS\salm.exe
C:\WINDOWS\satmat.exe
C:\WINDOWS\stcloader.exe
C:\WINDOWS\susp.exe
C:\WINDOWS\swin32.dll
C:\WINDOWS\system32\~.exe
C:\WINDOWS\system32\gtv_sd.bin
C:\WINDOWS\system32\msdn_lib.dll
C:\WINDOWS\system32\msixu.dll
C:\WINDOWS\system32\o05PrEz
C:\WINDOWS\system32\S1
C:\WINDOWS\system32\S2
C:\WINDOWS\system32\S2\mwspasrt83122.exe
C:\WINDOWS\system32\S4
C:\WINDOWS\system32\S4\wen2.exe
C:\WINDOWS\system32\S7
C:\WINDOWS\system32\S7\wr620.exe
C:\WINDOWS\system32\vxddsk.exe
C:\WINDOWS\system32\wer8274.dll
C:\WINDOWS\system32\win
C:\WINDOWS\system32\wml.exe
C:\WINDOWS\system32\wmvds32.dll
C:\WINDOWS\temp\salm.exe
C:\WINDOWS\updatetc.exe
C:\WINDOWS\voiceip.dll
C:\WINDOWS\wml.exe
C:\WINDOWS\wr.txt


((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))


-------\LEGACY_CORE
-------\LEGACY_DOMAINSERVICE
-------\LEGACY_WINDOWS_OVERLAY_COMPONENTS
-------\DomainService


((((((((((((((((((((((((( Files Created from 2007-05-25 to 2007-06-25 )))))))))))))))))))))))))))))))


2007-06-25 10:00 49,152 --a------ C:\WINDOWS\nircmd.exe
2007-06-22 10:07 <DIR> d-------- C:\Program Files\Windows Defender
2007-06-22 09:25 <DIR> d-------- C:\VundoFix Backups
2007-06-22 08:32 <DIR> d-------- C:\!KillBox
2007-06-21 15:36 <DIR> d-------- C:\Program Files\GiPo@Utilities
2007-06-21 15:36 <DIR> d-------- C:\Program Files\Common Files\Gibinsoft Shared
2007-06-21 15:15 <DIR> dr-h----- C:\DOCUME~1\ADMINI~1\APPLIC~1\yahoo!
2007-06-21 13:50 <DIR> d---s---- C:\DOCUME~1\ADMINI~1\UserData
2007-06-21 13:41 <DIR> d-------- C:\Program Files\Autoruns
2007-06-21 13:40 2 --a------ C:\WINDOWS\SYSTEM32\wtsisvit32.exe
2007-06-21 12:14 <DIR> d-------- C:\DOCUME~1\ADMINI~1\APPLIC~1\?racle
2007-06-21 11:39 <DIR> d-------- C:\DOCUME~1\ADMINI~1\APPLIC~1\Lavasoft
2007-06-21 11:37 <DIR> d-------- C:\DOCUME~1\ALLUSE~1\APPLIC~1\Spybot - Search & Destroy
2007-06-21 10:40 12 --a------ C:\WINDOWS\SYSTEM32\sl.bin
2007-06-21 10:39 4 --a------ C:\WINDOWS\SYSTEM32\stfv.bin
2007-06-21 10:39 19,456 --a------ C:\WINDOWS\vxddsk.exe
2007-06-15 15:43 53,248 --a------ C:\WINDOWS\uni_eh43.exe


(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

2007-06-25 13:31:00 -------- d-----w C:\Program Files\Hewlett-Packard
2007-06-22 16:17:45 -------- d--h--w C:\Program Files\InstallShield Installation Information
2007-06-22 13:59:38 -------- d-----w C:\Program Files\Microsoft AntiSpyware
2007-06-21 14:56:24 -------- d-----w C:\Program Files\HP Instant Support
2007-06-21 14:23:25 -------- d-----w C:\Program Files\RightClick Wholesale 5.00
2007-06-18 20:19:59 -------- d-----w C:\Program Files\mIRC
2007-06-11 19:12:54 -------- d-----w C:\DOCUME~1\Lin\APPLIC~1\Canon
2007-05-29 13:13:31 -------- d-----w C:\DOCUME~1\Lin\APPLIC~1\AdobeUM
2007-05-22 14:15:59 -------- d-----w C:\Program Files\DivX
2007-05-16 15:12:02 683,520 ----a-w C:\WINDOWS\system32\inetcomm.dll
2007-04-25 14:21:15 144,896 ----a-w C:\WINDOWS\system32\schannel.dll
2007-04-18 16:12:23 2,854,400 ----a-w C:\WINDOWS\system32\msi.dll
2007-04-17 02:47:36 33,624 ----a-w C:\WINDOWS\system32\wups.dll
2007-04-17 02:45:54 1,710,936 ----a-w C:\WINDOWS\system32\wuaueng.dll
2007-04-17 02:45:48 549,720 ----a-w C:\WINDOWS\system32\wuapi.dll
2007-04-17 02:45:42 325,976 ----a-w C:\WINDOWS\system32\wucltui.dll
2007-04-17 02:45:36 203,096 ----a-w C:\WINDOWS\system32\wuweb.dll
2007-04-17 02:45:28 92,504 ----a-w C:\WINDOWS\system32\cdm.dll
2007-04-17 02:45:20 53,080 ----a-w C:\WINDOWS\system32\wuauclt.exe
2007-04-17 02:45:20 43,352 ----a-w C:\WINDOWS\system32\wups2.dll


((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))


*Note* empty entries & legit default entries are not shown

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects]
{06849E9F-C8D7-4D59-B87D-784B7D6BE0B3}=C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll [2006-01-12 20:38]
{09CD2F17-4563-4332-AF87-AB3642A6EBE7}=C:\WINDOWS\system32\ddcyy.dll []
{22E58089-6DB5-45D9-BF87-6C8975246D26}=C:\WINDOWS\system32\vtuttts.dll []
{38847C4B-1AB1-4A47-9026-9A6CF7B43D31}=C:\WINDOWS\system32\msdn_lib.dll []
{53707962-6F74-2D53-2644-206D7942484F}=C:\Program Files\Spybot - Search & Destroy\SDHelper.dll [2005-05-31 01:04]
{E3159E9D-9877-418B-8A5A-D16794E2D90C}=C:\Program Files\HP Instant Support\qudofej83122.dll [2007-06-18 14:59]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvCplDaemon"="NvQTwk" []
"vptray"="C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe" [2002-07-30 12:35]
"Synchronization Manager"="%SystemRoot%\system32\mobsync.exe" []
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2006-09-01 16:57]
"UnlockerAssistant"="C:\Program Files\Unlocker\UnlockerAssistant.exe" [2006-09-07 13:19]
"Windows Defender"="C:\Program Files\Windows Defender\MSASCui.exe" [2006-11-03 19:20]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Yahoo! Pager"="C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" [2006-11-30 22:49]

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\0]
Source= C:\Program Files\EMusic\xuxemodib.html
FriendlyName=

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
"{22E58089-6DB5-45D9-BF87-6C8975246D26}"="C:\WINDOWS\system32\vtuttts.dll" []

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\AutorunsDisabled]
C:\WINDOWS\system32\vtstq.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\PCANotify]
PCANotify.dll


[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{41285461-19c4-11dc-9595-00e0185e159b}]
AutoRun\command- E:\wd_windows_tools\setup.exe


Contents of the 'Scheduled Tasks' folder
2002-06-19 20:28:04 C:\WINDOWS\tasks\ISP signup reminder 3.job
2007-06-25 14:12:21 C:\WINDOWS\tasks\MP Scheduled Scan.job

**************************************************************************

catchme 0.3.721 W2K/XP/Vista - userland rootkit detector by Gmer, http://www.gmer.net
Rootkit scan 2007-06-25 10:10:38
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

**************************************************************************

Completion time: 2007-06-25 10:15:14 - machine was rebooted
C:\ComboFix-quarantined-files.txt ... 2007-06-25 10:14

--- E O F ---

SmitFraudFix v2.195

Scan done at 10:19:00.31, 2007-06-25
Run from C:\Documents and Settings\Lin\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in normal mode

Process

C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\Rtvscan.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\slpservice.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\slpmonx.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe
C:\Program Files\Unlocker\UnlockerAssistant.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\WINDOWS\Seiko\slpcap.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\ComboFix\catchme.cfexe
C:\WINDOWS\system32\cmd.exe
C:\WINDOWS\system32\cmd.exe

hosts


H:\


C:\WINDOWS


C:\WINDOWS\system


C:\WINDOWS\Web


C:\WINDOWS\system32


C:\WINDOWS\system32\LogFiles


C:\Documents and Settings\Lin


C:\Documents and Settings\Lin\Application Data


Start Menu


C:\DOCUME~1\Lin\FAVORI~1


Desktop


C:\Program Files


Corrupted keys


Desktop Components

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
"Source"="C:\\Program Files\\EMusic\\xuxemodib.html"
"SubscribedURL"=""
"FriendlyName"=""

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\1]
"Source"="About:Home"
"SubscribedURL"="About:Home"
"FriendlyName"="My Current Home Page"

Sharedtaskscheduler
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


AppInit_DLLs
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"=""


Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""


Rustock



DNS

Description: SiS 900-Based PCI Fast Ethernet Adapter - Packet Scheduler Miniport
DNS Server Search Order: 151.202.0.85
DNS Server Search Order: 151.203.0.85

HKLM\SYSTEM\CCS\Services\Tcpip\..\{5D2D0F5F-34DE-418D-87A8-1A1D057504C7}: DhcpNameServer=151.202.0.85 151.203.0.85
HKLM\SYSTEM\CS1\Services\Tcpip\..\{5D2D0F5F-34DE-418D-87A8-1A1D057504C7}: DhcpNameServer=151.202.0.85 151.203.0.85
HKLM\SYSTEM\CS2\Services\Tcpip\..\{5D2D0F5F-34DE-418D-87A8-1A1D057504C7}: DhcpNameServer=151.202.0.85 151.203.0.85
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=151.202.0.85 151.203.0.85
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=151.202.0.85 151.203.0.85
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=151.202.0.85 151.203.0.85


Scanning for wininet.dll infection


End


Logfile of HijackThis v1.99.1
Scan saved at 10:25, on 2007-06-25
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\Rtvscan.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\slpservice.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\slpmonx.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe
C:\Program Files\Unlocker\UnlockerAssistant.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\WINDOWS\Seiko\slpcap.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\ComboFix\catchme.cfexe
C:\WINDOWS\system32\cmd.exe
C:\WINDOWS\notepad.exe
C:\WINDOWS\system32\notepad.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://srch-us4.hpwis.com/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O2 - BHO: (no name) - AutorunsDisabled - (no file)
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {09CD2F17-4563-4332-AF87-AB3642A6EBE7} - C:\WINDOWS\system32\ddcyy.dll (file missing)
O2 - BHO: (no name) - {22E58089-6DB5-45D9-BF87-6C8975246D26} - C:\WINDOWS\system32\vtuttts.dll (file missing)
O2 - BHO: msdn_lib.msdn_hlp - {38847C4B-1AB1-4A47-9026-9A6CF7B43D31} - C:\WINDOWS\system32\msdn_lib.dll (file missing)
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: (no name) - {9A03B8AC-0540-492B-B111-FAF0B503BF7F} - (no file)
O2 - BHO: (no name) - {E3159E9D-9877-418B-8A5A-D16794E2D90C} - C:\Program Files\HP Instant Support\qudofej83122.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe
O4 - HKLM\..\Run: [Synchronization Manager] %SystemRoot%\system32\mobsync.exe /logon
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [UnlockerAssistant] "C:\Program Files\Unlocker\UnlockerAssistant.exe"
O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: SmartCapture.lnk = C:\WINDOWS\Seiko\slpcap.exe
O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycmap.htm
O8 - Extra context menu item: Yahoo! &SMS - file:///C:\Program Files\Yahoo!\Common/ycsms.htm
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - c:\Program Files\Microsoft Money\System\mnyviewer.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {0246ECA8-996F-11D1-BE2F-00A0C9037DFE} (TDServer Control) - http://www.bagan.net.mm/emfont/tdserver.cab
O16 - DPF: {0E5F0222-96B9-11D3-8997-00104BD12D94} (PCPitstop Utility) - http://www.pcpitstop.com/pcpitstop/PCPitStop.CAB
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {2253F320-AB68-4A07-917D-4F12D8884A06} (ChainCast VMR Client Proxy) - http://64.124.45.181/downloads/ccpm_0237.cab
O16 - DPF: {2E12FB00-546B-4EE3-9CC2-057BF02E1C17} (Webshots Multiple Media Uploader - Container) - http://community.webshots.com/html/atx/wsaxcontrol.cab
O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akamai.net/7/1540/52/200207...meInstaller.exe
O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} - http://207.188.7.150/26f05a045ec020eb7105/netzip/RdxIE2.cab
O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} (DivXBrowserPlugin Object) - http://go.divx.com/plugin/DivXBrowserPlugin.cab
O16 - DPF: {7CF052DE-C74F-421B-B04A-3B3037EF5887} (CCMPGui Class) - http://64.124.45.181/chaincast/proxy/CCMP.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.es/activescan/as/asinst.cab
O16 - DPF: {9FC5238F-12C4-454F-B1B5-74599A21DE47} (Webshots Photo Uploader) - http://community.webshots.com/html/WSPhotoUploader.CAB
O16 - DPF: {A17E30C4-A9BA-11D4-8673-60DB54C10000} (YahooYMailTo Class) - http://us.dl1.yimg.com/download.yahoo.com/.../ymmapi_416.dll
O16 - DPF: {CC05BC12-2AA2-4AC7-AC81-0E40F83B1ADF} (Live365Player Class) - http://www.live365.com/players/play365.cab
O16 - DPF: {F7DC2A2E-FC34-11D3-B1D9-00A0C99B41BB} (Zoom Class) - http://www.zoomify.com/download/zoomify305.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = Schmidt.com
O17 - HKLM\Software\..\Telephony: DomainName = Schmidt.com
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = Schmidt.com
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = Schmidt.com
O20 - Winlogon Notify: AutorunsDisabled - C:\WINDOWS\
O20 - Winlogon Notify: NavLogon - C:\WINDOWS\System32\NavLogon.dll
O20 - Winlogon Notify: PCANotify - C:\WINDOWS\SYSTEM32\PCANotify.dll
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\DefWatch.exe
O23 - Service: Symantec AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\Rtvscan.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: SLPMONX - ProdEx Technologies - C:\WINDOWS\System32\slpservice.exe

Edited by wmvs, 25 June 2007 - 09:39 AM.


#4 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:05:59 AM

Posted 25 June 2007 - 09:50 AM

Download Killbox by Option^Explicit:
http://download.bleepingcomputer.com/spyware/KillBox.exe
Save it to your desktop.
Please double-click Killbox.exe to run it.
Select: 'Delete on Reboot'.
Then Click on the 'All Files' button.
Please copy ALL the file paths inside the quote box below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

C:\WINDOWS\SYSTEM32\wtsisvit32.exe
C:\WINDOWS\vxddsk.exe
C:\WINDOWS\uni_eh43.exe
C:\WINDOWS\SYSTEM32\stfv.bin


Return to Killbox,go to the File menu,and choose 'Paste from Clipboard'.
Click the red-and-white Delete File button.
Click 'Yes' at the 'Delete on Reboot' prompt.
Click OK at any 'PendingFileRenameOperations' prompt.
If your computer does not restart automatically,please restart it manually.

After rebooting, open up Killbox again.
Click 'File'>'Logs'>'Actions History Log'.
Post this log in your next reply.

****************************

Download\install 'SuperAntiSpyware Home Edition Free Version' from here:
http://www.superantispyware.com/downloadfi...ANTISPYWAREFREE

Launch SuperAntiSpyware and click on 'Check for updates'.
Once the updates have been installed,exit SuperAntiSpyware.

Have Hijack This fix the following by placing a check in the appropriate boxes and selecting 'Fix checked'.
Make sure all browser and all Windows Explorer windows are closed before fixing:
O2 - BHO: (no name) - AutorunsDisabled - (no file)
O2 - BHO: (no name) - {09CD2F17-4563-4332-AF87-AB3642A6EBE7} - C:\WINDOWS\system32\ddcyy.dll (file missing)
O2 - BHO: (no name) - {22E58089-6DB5-45D9-BF87-6C8975246D26} - C:\WINDOWS\system32\vtuttts.dll (file missing)
O2 - BHO: msdn_lib.msdn_hlp - {38847C4B-1AB1-4A47-9026-9A6CF7B43D31} - C:\WINDOWS\system32\msdn_lib.dll (file missing)
O2 - BHO: (no name) - {9A03B8AC-0540-492B-B111-FAF0B503BF7F} - (no file)
O16 - DPF: {0246ECA8-996F-11D1-BE2F-00A0C9037DFE} (TDServer Control) - http://www.bagan.net.mm/emfont/tdserver.cab
O16 - DPF: {2253F320-AB68-4A07-917D-4F12D8884A06} (ChainCast VMR Client Proxy) - http://64.124.45.181/downloads/ccpm_0237.cab
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akamai.net/7/1540/52/200207...meInstaller.exe
O16 - DPF: {7CF052DE-C74F-421B-B04A-3B3037EF5887} (CCMPGui Class) - http://64.124.45.181/chaincast/proxy/CCMP.cab
O20 - Winlogon Notify: AutorunsDisabled - C:\WINDOWS\

Exit Hijackthis.

Start SuperAntiSpyware.
On the main screen click on 'Scan your computer'.
Check: 'Perform Complete Scan'.
Click 'Next' to start the scan.

Superantispyware will now scan your computer,when it's finished it will list all/any infections found.
Make sure everything found has a checkmark next to it,then press 'Next'.
Click on 'Finish' when you've done.

It's possible that the program will ask you to reboot in order to delete some files.

Obtain the SuperAntiSpyware log as follows:
Click on 'Preferences'.
Click on the 'Statistics/Logs' tab.
Under 'Scanner Logs' double click on 'SuperAntiSpyware Scan Log'.
It will then open in your default text editor,such as Notepad.
Copy and paste the contents of that report into your next reply.
Also post a new Hijackthis log,let me know how your pc is running now.

Posted Image
Posted Image

#5 wmvs

wmvs
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:12:59 AM

Posted 25 June 2007 - 12:10 PM

Below are my Killbox, SuperAntiSpyware and HijackThis logs. So far nothing has popped up, and I guess everything is ok, but I'm not sure. Should this be a final fix?? Does everything look ok? Thanks so much for your help.

Pocket Killbox version 2.0.0.881
Running on Windows XP as Administrator(Administrator)
was started @ Friday, June 22, 2007, 8:32 AM

Killbox Closed(Exit) @ 8:36:02 AM
__________________________________________________

Pocket Killbox version 2.0.0.881
Running on Windows XP as Administrator(Administrator)
was started @ Friday, June 22, 2007, 8:44 AM

Pocket Killbox version 2.0.0.881
Running on Windows XP as Administrator(Administrator)
was started @ Friday, June 22, 2007, 8:48 AM

# 1 [Files to Delete]
Path = C:\WINDOWS\SYSTEM32\vtstq.dll
*This File could not be Deleted

# 2 [Delete on Reboot]
Path = C:\WINDOWS\SYSTEM32\vtuttts.dll
*This File could not be Deleted

# 3 [Delete on Reboot]
Path = C:\WINDOWS\SYSTEM32\vtstq.dll
*This File could not be Deleted

PendingFileRenameOperations Registry Data has been Removed by External Process! @ 8:50:43 AM
# 4 [Delete on Reboot]
Path = C:\WINDOWS\SYSTEM32\vtuttts.dll
*This File could not be Deleted

# 5 [Delete on Reboot]
Path = C:\WINDOWS\SYSTEM32\vtstq.dll
*This File could not be Deleted

PendingFileRenameOperations Registry Data has been Removed by External Process! @ 8:51:02 AM
Killbox Closed(Exit) @ 8:51:03 AM
__________________________________________________

Pocket Killbox version 2.0.0.881
Running on Windows XP as Administrator(Administrator)
was started @ Friday, June 22, 2007, 9:02 AM

# 1 [Delete on Reboot]
Path = C:\WINDOWS\SYSTEM32\vtuttts.dll


# 2 [Delete on Reboot]
Path = C:\WINDOWS\SYSTEM32\vtstq.dll


PendingFileRenameOperations Registry Data has been Removed by External Process! @ 9:04:02 AM
# 3 [Files to Delete]
Path = C:\WINDOWS\SYSTEM32\vtstq.dll
*This File could not be Deleted

# 4 [Files to Delete]
Path = C:\WINDOWS\SYSTEM32\vtuttts.dll
*This File could not be Deleted

Killbox Closed(Exit) @ 9:04:45 AM
__________________________________________________

Pocket Killbox version 2.0.0.881
Running on Windows XP as LIN(Administrator)
was started @ Monday, June 25, 2007, 11:26 AM

# 1 [Delete on Reboot]
Path = C:\WINDOWS\SYSTEM32\wtsisvit32.exe


# 2 [Delete on Reboot]
Path = C:\WINDOWS\vxddsk.exe


# 3 [Delete on Reboot]
Path = C:\WINDOWS\uni_eh43.exe


# 4 [Delete on Reboot]
Path = C:\WINDOWS\SYSTEM32\stfv.bin


I Rebooted @ 11:27:07 AM
Killbox Closed(Exit) @ 11:27:09 AM
__________________________________________________

Pocket Killbox version 2.0.0.881
Running on Windows XP as Lin(Administrator)
was started @ Monday, June 25, 2007, 11:30 AM

Killbox Closed(Exit) @ 11:30:58 AM
__________________________________________________

Pocket Killbox version 2.0.0.881
Running on Windows XP as LIN(Administrator)
was started @ Monday, June 25, 2007, 1:09 PM


SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 06/25/2007 at 12:48 PM

Application Version : 3.8.1002

Core Rules Database Version : 3260
Trace Rules Database Version: 1271

Scan type : Complete Scan
Total Scan Time : 01:11:47

Memory items scanned : 358
Memory threats detected : 0
Registry items scanned : 4934
Registry threats detected : 22
File items scanned : 44879
File threats detected : 235

Transponder Variant BHO
HKLM\Software\Classes\CLSID\{00000250-0320-4dd4-be4f-7566d2314352}
HKCR\CLSID\{00000250-0320-4DD4-BE4F-7566D2314352}
HKCR\CLSID\{00000250-0320-4DD4-BE4F-7566D2314352}\InprocServer32

Adware.2020Search
HKLM\Software\Classes\CLSID\{4e1075f4-eec4-4a86-add7-cd5f52858c31}
HKCR\CLSID\{4E1075F4-EEC4-4A86-ADD7-CD5F52858C31}
HKCR\CLSID\{4E1075F4-EEC4-4A86-ADD7-CD5F52858C31}\InprocServer32

Adware.180solutions/SurfAssistant
HKLM\Software\Classes\CLSID\{5dafd089-24b1-4c5e-bd42-8ca72550717b}
HKCR\CLSID\{5DAFD089-24B1-4C5E-BD42-8CA72550717B}
HKCR\CLSID\{5DAFD089-24B1-4C5E-BD42-8CA72550717B}\InprocServer32

Trojan.PBar
HKLM\Software\Classes\CLSID\{ca1d1b05-9c66-11d5-a009-000103c1e50b}
HKCR\CLSID\{CA1D1B05-9C66-11D5-A009-000103C1E50B}
HKCR\CLSID\{CA1D1B05-9C66-11D5-A009-000103C1E50B}\InprocServer32

Adware.Vundo Variant
HKLM\Software\Classes\CLSID\{F4930014-663B-4A12-A485-E2B05D53584A}
HKCR\CLSID\{F4930014-663B-4A12-A485-E2B05D53584A}
HKCR\CLSID\{F4930014-663B-4A12-A485-E2B05D53584A}\InprocServer32
HKCR\CLSID\{F4930014-663B-4A12-A485-E2B05D53584A}\InprocServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\VTSTQ.DLL

Trojan.ZQuest
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E3159E9D-9877-418B-8A5A-D16794E2D90C}
HKCR\CLSID\{E3159E9D-9877-418B-8A5A-D16794E2D90C}
HKCR\CLSID\{E3159E9D-9877-418B-8A5A-D16794E2D90C}
HKCR\CLSID\{E3159E9D-9877-418B-8A5A-D16794E2D90C}\InProcServer32
HKCR\CLSID\{E3159E9D-9877-418B-8A5A-D16794E2D90C}\InProcServer32#ThreadingModel
C:\PROGRAM FILES\HP INSTANT SUPPORT\QUDOFEJ83122.DLL

Adware.Tracking Cookie
C:\Documents and Settings\Lin\Cookies\lin@metareward[2].txt
C:\Documents and Settings\Lin\Cookies\lin@electronicarts.112.2o7[2].txt
C:\Documents and Settings\Lin\Cookies\lin@click.porngurus[1].txt
C:\Documents and Settings\Lin\Cookies\lin@cgi-bin[8].txt
C:\Documents and Settings\Lin\Cookies\lin@adbrite[2].txt
C:\Documents and Settings\Lin\Cookies\lin@422[2].txt
C:\Documents and Settings\Lin\Cookies\lin@hitbox[2].txt
C:\Documents and Settings\Lin\Cookies\lin@cgi-bin[3].txt
C:\Documents and Settings\Lin\Cookies\lin@azjmp[1].txt
C:\Documents and Settings\Lin\Cookies\lin@starware[2].txt
C:\Documents and Settings\Lin\Cookies\lin@focalex[2].txt
C:\Documents and Settings\Lin\Cookies\lin@mb[4].txt
C:\Documents and Settings\Lin\Cookies\lin@atwola[2].txt
C:\Documents and Settings\Lin\Cookies\lin@icc.intellisrv[2].txt
C:\Documents and Settings\Lin\Cookies\lin@adserver[1].txt
C:\Documents and Settings\Lin\Cookies\lin@ad.yieldmanager[2].txt
C:\Documents and Settings\Lin\Cookies\lin@atdmt[2].txt
C:\Documents and Settings\Lin\Cookies\lin@rightmedia[1].txt
C:\Documents and Settings\Lin\Cookies\lin@adopt.specificclick[2].txt
C:\Documents and Settings\Lin\Cookies\lin@ad[3].txt
C:\Documents and Settings\Lin\Cookies\lin@ads.k8l[1].txt
C:\Documents and Settings\Lin\Cookies\lin@exitexchange[2].txt
C:\Documents and Settings\Lin\Cookies\lin@funwebproducts[1].txt
C:\Documents and Settings\Lin\Cookies\lin@www.metareward[2].txt
C:\Documents and Settings\Lin\Cookies\lin@4.adbrite[2].txt
C:\Documents and Settings\Lin\Cookies\lin@nextag[2].txt
C:\Documents and Settings\Lin\Cookies\lin@ads.z-quest[1].txt
C:\Documents and Settings\Lin\Cookies\lin@863[2].txt
C:\Documents and Settings\Lin\Cookies\lin@media.top-banners[1].txt
C:\Documents and Settings\Lin\Cookies\lin@74613876[1].txt
C:\Documents and Settings\Lin\Cookies\lin@adecn[2].txt
C:\Documents and Settings\Lin\Cookies\lin@pornkings[1].txt
C:\Documents and Settings\Lin\Cookies\lin@burstnet[1].txt
C:\Documents and Settings\Lin\Cookies\lin@image.masterstats[2].txt
C:\Documents and Settings\Lin\Cookies\lin@gostats[2].txt
C:\Documents and Settings\Lin\Cookies\lin@ads.addynamix[2].txt
C:\Documents and Settings\Lin\Cookies\lin@zedo[2].txt
C:\Documents and Settings\Lin\Cookies\lin@findwhat[1].txt
C:\Documents and Settings\Lin\Cookies\lin@cgi-bin[4].txt
C:\Documents and Settings\Lin\Cookies\lin@data4.perf.overture[2].txt
C:\Documents and Settings\Lin\Cookies\lin@specificclick[2].txt
C:\Documents and Settings\Lin\Cookies\lin@1[1].txt
C:\Documents and Settings\Lin\Cookies\lin@www.keepmedia[2].txt
C:\Documents and Settings\Lin\Cookies\lin@www.screensavers[2].txt
C:\Documents and Settings\Lin\Cookies\lin@cgi-bin[2].txt
C:\Documents and Settings\Lin\Cookies\lin@ads.mediaturf[1].txt
C:\Documents and Settings\Lin\Cookies\lin@ehg-veohnetworksinc.hitbox[1].txt
C:\Documents and Settings\Lin\Cookies\lin@coolsavings[1].txt
C:\Documents and Settings\Lin\Cookies\lin@mediaplex[2].txt
C:\Documents and Settings\Lin\Cookies\lin@www.epilot[1].txt
C:\Documents and Settings\Lin\Cookies\lin@cz8.clickzs[2].txt
C:\Documents and Settings\Lin\Cookies\lin@clicksor[2].txt
C:\Documents and Settings\Lin\Cookies\lin@vhost.oddcast[2].txt
C:\Documents and Settings\Lin\Cookies\lin@ads.realtechnetwork[2].txt
C:\Documents and Settings\Lin\Cookies\lin@adknowledge[2].txt
C:\Documents and Settings\Lin\Cookies\lin@fastclick[2].txt
C:\Documents and Settings\Lin\Cookies\lin@sextv1[2].txt
C:\Documents and Settings\Lin\Cookies\lin@dist.belnk[1].txt
C:\Documents and Settings\Lin\Cookies\lin@ath.belnk[1].txt
C:\Documents and Settings\Lin\Cookies\lin@ads.allthatsearch[1].txt
C:\Documents and Settings\Lin\Cookies\lin@enhance[2].txt
C:\Documents and Settings\Lin\Cookies\lin@adopt.hbmediapro[1].txt
C:\Documents and Settings\Lin\Cookies\lin@xiti[1].txt
C:\Documents and Settings\Lin\Cookies\lin@ad.outerinfo[2].txt
C:\Documents and Settings\Lin\Cookies\lin@stats1.reliablestats[1].txt
C:\Documents and Settings\Lin\Cookies\lin@belnk[2].txt
C:\Documents and Settings\Lin\Cookies\lin@creativeby.viewpoint[1].txt
C:\Documents and Settings\Lin\Cookies\lin@www.burstbeacon[2].txt
C:\Documents and Settings\Lin\Cookies\lin@cz3.clickzs[2].txt
C:\Documents and Settings\Lin\Cookies\lin@a.websponsors[2].txt
C:\Documents and Settings\Lin\Cookies\lin@a[1].txt
C:\Documents and Settings\Lin\Cookies\lin@tracking.dsmmadvantage[1].txt
C:\Documents and Settings\Lin\Cookies\lin@free-banners[1].txt
C:\Documents and Settings\Lin\Cookies\lin@windowsmedia[2].txt
C:\Documents and Settings\Lin\Cookies\lin@bannerspace[1].txt
C:\Documents and Settings\Lin\Cookies\lin@hit.namimedia[1].txt
C:\Documents and Settings\Lin\Cookies\lin@422[1].txt
C:\Documents and Settings\Lin\Cookies\lin@ads.adbrite[2].txt
C:\Documents and Settings\Lin\Cookies\lin@1[2].txt
C:\Documents and Settings\Lin\Cookies\lin@casalemedia[1].txt
C:\Documents and Settings\Lin\Cookies\lin@ads.mediamayhemcorp[2].txt
C:\Documents and Settings\Lin\Cookies\lin@m1.webstats4u[2].txt
C:\Documents and Settings\Lin\Cookies\lin@indiads[1].txt
C:\Documents and Settings\Lin\Cookies\lin@s[1].txt
C:\Documents and Settings\Lin\Cookies\lin@count1.exitexchange[2].txt
C:\Documents and Settings\Lin\Cookies\lin@qnsr[2].txt
C:\Documents and Settings\Lin\Cookies\lin@ads.cnn[1].txt
C:\Documents and Settings\Lin\Cookies\lin@6395755[1].txt
C:\Documents and Settings\Lin\Cookies\lin@77060529[1].txt
C:\Documents and Settings\Lin\Cookies\lin@realmedia.co[1].txt
C:\Documents and Settings\Lin\Cookies\lin@sexysportschicks[1].txt
C:\Documents and Settings\Lin\Cookies\lin@realmedia[1].txt
C:\Documents and Settings\Lin\Cookies\lin@partner2profit[2].txt
C:\Documents and Settings\Lin\Cookies\lin@data2.perf.overture[1].txt
C:\Documents and Settings\Lin\Cookies\lin@anat.tacoda[1].txt
C:\Documents and Settings\Lin\Cookies\lin@toplist[1].txt
C:\Documents and Settings\Lin\Cookies\lin@cgi-bin[7].txt
C:\Documents and Settings\Lin\Cookies\lin@www.click2myanmar[1].txt
C:\Documents and Settings\Lin\Cookies\lin@advert.savvy[1].txt
C:\Documents and Settings\Lin\Cookies\lin@kanoodle[2].txt
C:\Documents and Settings\Lin\Cookies\lin@count4.exitexchange[1].txt
C:\Documents and Settings\Lin\Cookies\lin@adv.webmd[1].txt
C:\Documents and Settings\Lin\Cookies\lin@ad.ir[2].txt
C:\Documents and Settings\Lin\Cookies\lin@login.tracking101[2].txt
C:\Documents and Settings\Lin\Cookies\lin@tracking.foxnews[1].txt
C:\Documents and Settings\Lin\Cookies\lin@cpvfeed[2].txt
C:\Documents and Settings\Lin\Cookies\lin@mediamax[1].txt
C:\Documents and Settings\Lin\Cookies\lin@mb[3].txt
C:\Documents and Settings\Lin\Cookies\lin@trafficmp[1].txt
C:\Documents and Settings\Lin\Cookies\lin@server.cpmstar[1].txt
C:\Documents and Settings\Lin\Cookies\lin@mb[2].txt
C:\Documents and Settings\Lin\Cookies\lin@advertising[2].txt
C:\Documents and Settings\Lin\Cookies\lin@ads.as4x.tmcs[2].txt
C:\Documents and Settings\Lin\Cookies\lin@counter.fateback[1].txt
C:\Documents and Settings\Lin\Cookies\lin@yieldmanager[1].txt
C:\Documents and Settings\Lin\Cookies\lin@www.clickmanage[2].txt
C:\Documents and Settings\Lin\Cookies\lin@adverts.digitalspy.co[2].txt
C:\Documents and Settings\Lin\Cookies\lin@adinterax[1].txt
C:\Documents and Settings\Lin\Cookies\lin@ads.monster[2].txt
C:\Documents and Settings\Lin\Cookies\lin@33645339[1].txt
C:\Documents and Settings\Lin\Cookies\lin@admarketplace[1].txt
C:\Documents and Settings\Lin\Cookies\lin@drivecleaner[2].txt
C:\Documents and Settings\Lin\Cookies\lin@count3.exitexchange[2].txt
C:\Documents and Settings\Lin\Cookies\lin@66702201[1].txt
C:\Documents and Settings\Lin\Cookies\lin@goclick[2].txt
C:\Documents and Settings\Lin\Cookies\lin@anad.tacoda[2].txt
C:\Documents and Settings\Lin\Cookies\lin@www.zango[1].txt
C:\Documents and Settings\Lin\Cookies\lin@44037208[1].txt
C:\Documents and Settings\Lin\Cookies\lin@localsrv[2].txt
C:\Documents and Settings\Lin\Cookies\lin@ads.tbs[1].txt
C:\Documents and Settings\Lin\Cookies\lin@50881381[1].txt
C:\Documents and Settings\Lin\Cookies\lin@ads.uncoverthenet[1].txt
C:\Documents and Settings\Lin\Cookies\lin@angleinteractive.directtrack[2].txt
C:\Documents and Settings\Lin\Cookies\lin@serving.rpowermedia[1].txt
C:\Documents and Settings\Lin\Cookies\lin@www.windowsmedia[1].txt
C:\Documents and Settings\Lin\Cookies\lin@8667228[1].txt
C:\Documents and Settings\Lin\Cookies\lin@winantivirus[1].txt
C:\Documents and Settings\Lin\Cookies\lin@banners.kfmb[1].txt
C:\Documents and Settings\Lin\Cookies\lin@ads.tnt[1].txt
C:\Documents and Settings\Lin\Cookies\lin@winantispyware[2].txt
C:\Documents and Settings\Lin\Cookies\lin@adcentriconline[2].txt
C:\Documents and Settings\Lin\Cookies\lin@ads.rlcomics[2].txt
C:\Documents and Settings\Lin\Cookies\lin@ad1.clickhype[1].txt
C:\Documents and Settings\Lin\Cookies\lin@ads.pga[2].txt
C:\Documents and Settings\Lin\Cookies\lin@ad.firstadsolution[2].txt
C:\Documents and Settings\Lin\Cookies\lin@entrepreneur[1].txt
C:\Documents and Settings\Lin\Cookies\lin@adultadworld[1].txt
C:\Documents and Settings\Lin\Cookies\lin@directtrack[1].txt
C:\Documents and Settings\Lin\Cookies\lin@ads.pgatour[1].txt
C:\Documents and Settings\Lin\Cookies\lin@cgi-bin[5].txt
C:\Documents and Settings\Lin\Cookies\lin@publishers.clickbooth[2].txt
C:\Documents and Settings\Lin\Cookies\lin@2o7[2].txt
C:\Documents and Settings\Lin\Cookies\lin@www.jouwstats[2].txt
C:\Documents and Settings\Lin\Cookies\lin@adserver.softwareonline[1].txt
C:\Documents and Settings\Lin\Cookies\lin@jkearn.freestats[2].txt
C:\Documents and Settings\Lin\Cookies\lin@unitedmedia[1].txt
C:\Documents and Settings\Lin\Cookies\lin@sales.liveperson[1].txt
C:\Documents and Settings\Lin\Cookies\lin@yadro[1].txt
C:\Documents and Settings\Lin\Cookies\lin@netmediagroup[1].txt
C:\Documents and Settings\Lin\Cookies\lin@click.cybertvpartner[1].txt
C:\Documents and Settings\Lin\Cookies\lin@offers.intermediainteractive[2].txt
C:\Documents and Settings\Lin\Cookies\lin@uclick[1].txt
C:\Documents and Settings\Lin\Cookies\lin@html[2].txt
C:\Documents and Settings\Lin\Cookies\lin@ecnext.advertserve[1].txt
C:\Documents and Settings\Lin\Cookies\lin@www.rowise[1].txt
C:\Documents and Settings\Lin\Cookies\lin@overture[1].txt
C:\Documents and Settings\Lin\Cookies\lin@3.adbrite[2].txt
C:\Documents and Settings\Lin\Cookies\lin@jasminelennard.tripod[1].txt
C:\Documents and Settings\Lin\Cookies\lin@doubleclick[1].txt
C:\Documents and Settings\Lin\Cookies\lin@stats.privacyprotector[1].txt
C:\Documents and Settings\Lin\Cookies\lin@server.lon.liveperson[1].txt
C:\Documents and Settings\Lin\Cookies\lin@ads.worldgolfchampionships[2].txt
C:\Documents and Settings\Lin\Cookies\lin@hosts4porn[1].txt
C:\Documents and Settings\Lin\Cookies\lin@c5[1].txt
C:\Documents and Settings\Lin\Cookies\lin@www.ticketsnow[2].txt
C:\Documents and Settings\Lin\Cookies\lin@proadultlive[2].txt
C:\Documents and Settings\Lin\Cookies\lin@14704745[1].txt
C:\Documents and Settings\Lin\Cookies\lin@1071202926[1].txt
C:\Documents and Settings\Lin\Cookies\lin@hc2.humanclick[2].txt
C:\Documents and Settings\Lin\Cookies\lin@count2.exitexchange[2].txt
C:\Documents and Settings\Lin\Cookies\lin@09[1].txt
C:\Documents and Settings\Lin\Cookies\lin@www.xctrk[2].txt
C:\Documents and Settings\Lin\Cookies\lin@banners.nbcupromotes[1].txt
C:\Documents and Settings\Lin\Cookies\lin@www.winantispyware[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.k8l[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.z-quest[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@casalemedia[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@overture[1].txt
C:\Documents and Settings\Lin\Cookies\lin@adprofile[2].txt
C:\Documents and Settings\Lin\Cookies\lin@mediacenter[1].txt
C:\Documents and Settings\Lin\Cookies\lin@stats[1].txt
C:\Documents and Settings\Lin\Cookies\lin@stats[2].txt
C:\Documents and Settings\Owner\Cookies\owner@ads4.clearchannel[1].txt

Trojan.WinBo32/Enhance
HKU\S-1-5-21-1409082233-746137067-839522115-1113\Software\System\sysuid

Adware.ClickSpring/Outer Info Network
C:\Documents and Settings\Lin\Start Menu\Programs\Outerinfo\Terms.lnk
C:\Documents and Settings\Lin\Start Menu\Programs\Outerinfo\Uninstall.lnk
C:\Documents and Settings\Lin\Start Menu\Programs\Outerinfo

Trojan.Unknown Origin
C:\!KILLBOX\UNI_EH43.EXE
C:\!KILLBOX\WTSISVIT32.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1589\A0062752.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1589\A0062917.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1590\A0063990.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1590\A0063991.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1593\A0064149.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1600\A0064778.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1600\A0064780.EXE

Trojan.Downloader-Gen/HitItQuitIt
C:\!KILLBOX\VTUTTTS.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1590\A0064003.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1597\A0064564.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1600\A0064705.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1600\A0064706.DLL

Adware.RAC
C:\DOCUMENTS AND SETTINGS\LIN\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\7BSG6EZ3\ACDT-PID67N[1].EXE

Trojan.Downloader-FakeRX
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\MSDN_LIB.DLL.VIR
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1600\A0064683.DLL

Adware.WebBuying Assistant-Installer
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1589\A0062349.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1589\A0062753.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1589\A0062754.EXE

Trojan.Rootkit-TnCore/Installer
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1589\A0062350.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1600\A0064677.EXE

Trojan.TagASaurus
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1589\A0062352.EXE

Adware.ZenoSearch
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1589\A0062354.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1589\A0062846.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1589\A0062847.EXE

Adware.WebBuying-Installer
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1589\A0062661.EXE

Trojan.Downloader-WebBuying/PopEngine
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1589\A0062722.DLL

Trojan.ZenoSearch
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1589\A0062848.EXE

Trojan.Downloader-UltimateFixer
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1589\A0062914.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1590\A0064034.EXE

Adware.eZula
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1589\A0062916.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1597\A0064567.EXE

Adware.ClickSpring
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1590\A0064002.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0A438C3B-A487-4C6D-850C-C76CC3327FD0}\RP1597\A0064560.EXE

Torjan.SecondThoughtInstaller
C:\WINDOWS\INSTALLER\ID53.EXE

Trace.Known Threat Sources
C:\Documents and Settings\Lin\Local Settings\Temporary Internet Files\Content.IE5\RY0NNXOT\styles[1].css


Logfile of HijackThis v1.99.1
Scan saved at 13:13, on 2007-06-25
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\Rtvscan.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\slpservice.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\slpmonx.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe
C:\Program Files\Unlocker\UnlockerAssistant.exe
C:\WINDOWS\system32\mobsync.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\WINDOWS\Seiko\slpcap.exe
C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe
C:\WINDOWS\system32\msiexec.exe
C:\WINDOWS\notepad.exe
C:\WINDOWS\system32\notepad.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://srch-us4.hpwis.com/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe
O4 - HKLM\..\Run: [Synchronization Manager] %SystemRoot%\system32\mobsync.exe /logon
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [UnlockerAssistant] "C:\Program Files\Unlocker\UnlockerAssistant.exe"
O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: SmartCapture.lnk = C:\WINDOWS\Seiko\slpcap.exe
O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycmap.htm
O8 - Extra context menu item: Yahoo! &SMS - file:///C:\Program Files\Yahoo!\Common/ycsms.htm
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - c:\Program Files\Microsoft Money\System\mnyviewer.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {0E5F0222-96B9-11D3-8997-00104BD12D94} (PCPitstop Utility) - http://www.pcpitstop.com/pcpitstop/PCPitStop.CAB
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {2E12FB00-546B-4EE3-9CC2-057BF02E1C17} (Webshots Multiple Media Uploader - Container) - http://community.webshots.com/html/atx/wsaxcontrol.cab
O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} - http://207.188.7.150/26f05a045ec020eb7105/netzip/RdxIE2.cab
O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} (DivXBrowserPlugin Object) - http://go.divx.com/plugin/DivXBrowserPlugin.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.es/activescan/as/asinst.cab
O16 - DPF: {9FC5238F-12C4-454F-B1B5-74599A21DE47} (Webshots Photo Uploader) - http://community.webshots.com/html/WSPhotoUploader.CAB
O16 - DPF: {A17E30C4-A9BA-11D4-8673-60DB54C10000} (YahooYMailTo Class) - http://us.dl1.yimg.com/download.yahoo.com/.../ymmapi_416.dll
O16 - DPF: {CC05BC12-2AA2-4AC7-AC81-0E40F83B1ADF} (Live365Player Class) - http://www.live365.com/players/play365.cab
O16 - DPF: {F7DC2A2E-FC34-11D3-B1D9-00A0C99B41BB} (Zoom Class) - http://www.zoomify.com/download/zoomify305.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = Schmidt.com
O17 - HKLM\Software\..\Telephony: DomainName = Schmidt.com
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = Schmidt.com
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = Schmidt.com
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O20 - Winlogon Notify: NavLogon - C:\WINDOWS\System32\NavLogon.dll
O20 - Winlogon Notify: PCANotify - C:\WINDOWS\SYSTEM32\PCANotify.dll
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\DefWatch.exe
O23 - Service: Symantec AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\Rtvscan.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: SLPMONX - ProdEx Technologies - C:\WINDOWS\System32\slpservice.exe

#6 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:05:59 AM

Posted 25 June 2007 - 12:27 PM

Your log is clean :thumbsup:
If all's ok,please do the following:

Find and delete:
VundoFix.exe
Combofix
SmitfraudFix

C:\VundoFix Backups
C:\!KillBox
C:\QooBox

----------------------

Download ATF Cleaner by Atribune:
http://www.atribune.org/ccount/click.php?id=1

Double-click ATF-Cleaner.exe to run the program.
Click 'Select All' found at the bottom of the list.
Click the 'Empty Selected' button.

If you use Firefox browser, do this also:
Click Firefox at the top and choose 'Select All' from the list.
Click the 'Empty Selected' button.
NOTE:
If you would like to keep your saved passwords,please click 'No' at the prompt.

If you use Opera browser,do this also:
Click Opera at the top and choose 'Select All' from the list.
Click the 'Empty Selected' button.
NOTE:
If you would like to keep your saved passwords,please click 'No' at the prompt.

Click 'Exit' on the Main menu to close the program.

----------------------

Click on Start/All Programs/Accessories/System Tools/System Restore.
In the 'System Restore' window,click on the 'Create a Restore Point' button,then click 'Next'.
In the window that appears,enter a description\name for the Restore Point,then click on 'Create',wait,then click 'Close'.
The date and time will be created automatically.

Next click on Start/All Programs/Accessories/System Tools/Disk Cleanup.
The 'Select Drive' box will appear,click on Ok.
The 'Disk Cleanup for [C:]' box will appear,click on the 'More Options' tab.
At the bottom in the 'System Restore' window,click on the 'Clean up...' button.
A box will pop up 'Are you sure you want to delete all but the most recent restore point?',click on 'Yes'.
Click on 'Yes' at 'Are you sure you want to perform these actions?'.
Now wait until 'Disk Cleanup' finishes and the box disappears.

Read through the information found here,to help you prevent any possible future infections.
'How to prevent Malware' by miekiemoes:
http://users.telenet.be/bluepatchy/miekiem...prevention.html
Posted Image
Posted Image

#7 wmvs

wmvs
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:12:59 AM

Posted 26 June 2007 - 07:57 AM

I did everything you said and wanted to give it 24HRS. It seems as though everything is fine. THANK YOU SO MUCH!! You've saved me!!

#8 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:05:59 AM

Posted 26 June 2007 - 08:29 AM

You're welcome.

This thread will now be closed.
If you need this topic reopened, please contact a member of the HJT Team and we will reopen it for you.
Include the address of this thread in your request.
If you should have a new issue, please start a new topic.
This applies only to the original topic starter.
Everyone else please begin a New Topic.
Posted Image
Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users