AGOBOT/GAOBOT WORM (PC locks up)

edited November 2006 in Hardware
***********************************
Note: See Post #4

-Prof

***********************************


Hello there, I previously posted this problem in the malware forum, but then I reformatted and reinstalled windows. However, the problem persists, and Trogan_1000, who was assisting me referred me to the Emergency forum. Some description of my problem:


My computer status: It's a 2 and a half year-old machine, Windows XP Pro SP2 with 2 user accounts, I added one more after experiencing this problem. I have my reason for doing that. Please read on.

Problem description:
1. My computer was running fine. Then I installed something (i forgot what it was, my memory isn't that good, sorry) that required a reboot. So I rebooted the computer.

2. When it started up (i was using my primary account), the start bar won't load, actually nothing loaded, just my firewall and desktop background.

3. I waited a while since the cpu process light was flickering. But then nothing but an error box loaded. It has the title "dr watson debugger crash", roughly. Then it had a send report or don't send option. I viewed the report, haha, it was just plain Gibberish for me...

4. I switched users by using the windows+L key, the mouse was completely useless. Then I logged in to another user and it worked fine.

5. Eventually I rebooted the computer again. The problem recurred with my primary user account.

6. Then I created a new account to see if the problem happens there. Nothing happened.

7. Soon (after several times of logging in and out), the problem happened in the newest account. I was very afraid, I started backing up everything...well, almost.

8. The only "safe" account was the second one. But that didn't last very long.

9. The thing is if the problem happens in user account #1, it may happen to #2 OR #3, not both. However, it happens most in my primary user account.

10. I reformatted logical drives, reinstalled windows but problem still occurs.

Thanks for reading.

Comments

  • profdlpprofdlp The Holy City Of Westlake, Ohio
    edited November 2006
    Find the Dr Watson log and attach it to a reply here. If you need help, check this out.
    Any detailed information about the error will be helpful, so if you can make it happen again, try and write down all the "gibberish" or take a screenshot and post it here. :)
  • edited November 2006
    Ok, I found the Dr Watson log. I'll attach it.

    If you need me to make it happen again so you could see all the Gibberish, let me know, I'll just need to restart, maybe a few times. :)
  • profdlpprofdlp The Holy City Of Westlake, Ohio
    edited November 2006
    It looks like you have a virus:
    *----> Task List <----*
    0 System Process
    4 System
    464 smss.exe
    520 csrss.exe
    544 winlogon.exe
    588 services.exe
    600 lsass.exe
    752 svchost.exe
    808 svchost.exe
    872 svchost.exe
    928 svchost.exe
    1020 svchost.exe
    1188 spoolsv.exe
    1376 Explorer.EXE
    1480 ctfmon.exe
    308 alg.exe
    1004 wscntfy.exe
    1012 iexplore.exe
    1316 av81_en.exe
    1772 setup.exe
    1276 wmiprvse.exe
    516 CCUpdate.exe*
    784 dwwin.exe
    1820 drwtsn32.exe
    * Added by a variant of the AGOBOT/GAOBOT WORM!

    Since the error is causing a problem with Internet Explorer, it would seem that the infection is trying to gain access to a remote site.

    I'm going to send this over to our Spyware/Virus/Trojan experts, who will help get your computer cleaned up. :)
  • TroganTrogan London, UK
    edited November 2006
    DeprivedSoul, could you post a new HijackThis log please?

    Please RIGHT-CLICK HERE and Save As (in IE it's "Save Target As") to download Silent Runners.
    • Save it to the desktop.
    • Run Silent Runner's by doubleclicking the "Silent Runners" icon on your desktop.
    • You will receive a prompt: "Do you want to skip supplementary searches?" - click NO
    • If your antivirus has a script blocker, you will get a warning asking if you want to allow SilentRunners.vbs to run.
    • This script is not malicious so please allow it.
    • You will see a text file appear on the desktop - it's not done, let it run (it won't appear to be doing anything!)
    • Once you receive the prompt "All Done!", double-click the new text file on the desktop, copy that entire log, and paste it here.
    *NOTE* If you receive any warning message about scripts, please choose to allow the script to run.
  • edited November 2006
    This is new, wow, viruses are scary...

    The SilentRunners file:

    "Silent Runners.vbs", revision 49, http://www.silentrunners.org/
    Operating System: Windows XP SP2
    Output limited to non-default values, except where indicated by "{++}"


    Startup items buried in registry:

    HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ {++}
    "CTFMON.EXE" = "C:\WINDOWS\system32\ctfmon.exe" [MS]
    "SpybotSD TeaTimer" = "C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe" ["Safer Networking Limited"]

    HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ {++}
    "IMJPMIG8.1" = ""C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32" [MS]
    "PHIME2002ASync" = "C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC" [MS]
    "PHIME2002A" = "C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName" [MS]
    "cctray" = ""C:\Program Files\CA\CA Internet Security Suite\cctray\cctray.exe"" ["CA, Inc."]
    "CAVRID" = ""C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\CAVRID.exe"" ["CA, Inc."]
    "TotalRecorderScheduler" = ""C:\Program Files\HighCriteria\TotalRecorder\TotRecSched.exe"" ["High Criteria inc."]
    "AlcxMonitor" = "ALCXMNTR.EXE" ["Realtek Semiconductor Corp."]
    "Zone Labs Client" = ""C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"" ["Zone Labs, LLC"]
    "RAMBooster.Net" = "C:\Program Files\RAMBooster.Net\RAMBooster.exe -m" ["RAMBooster.Net Corporation."]
    "NeroFilterCheck" = "C:\WINDOWS\system32\NeroCheck.exe" ["Ahead Software Gmbh"]
    "InCD" = "C:\Program Files\Ahead\InCD\InCD.exe" ["Ahead Software AG"]

    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
    {089FD14D-132B-48FC-8861-0048AE113215}\(Default) = (no title provided)
    -> {HKLM...CLSID} = (no title provided)
    \InProcServer32\(Default) = "C:\Program Files\SiteAdvisor\4144\SiteAdv.dll" ["McAfee, Inc."]
    {2F364306-AA45-47B5-9F9D-39A8B94E7EF7}\(Default) = (no title provided)
    -> {HKLM...CLSID} = "IeCatch5 Class"
    \InProcServer32\(Default) = "C:\Program Files\FlashGet\jccatch.dll" ["FlashGet"]
    {4A368E80-174F-4872-96B5-0B27DDD11DB2}\(Default) = "SpywareGuard Download Protection"
    -> {HKLM...CLSID} = "SpywareGuardDLBLOCK.CBrowserHelper"
    \InProcServer32\(Default) = "C:\Program Files\SpywareGuard\dlprotect.dll" [null data]
    {53707962-6F74-2D53-2644-206D7942484F}\(Default) = (no title provided)
    -> {HKLM...CLSID} = (no title provided)
    \InProcServer32\(Default) = "C:\PROGRA~1\SPYBOT~1\SDHelper.dll" ["Safer Networking Limited"]
    {761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\(Default) = (no title provided)
    -> {HKLM...CLSID} = "SSVHelper Class"
    \InProcServer32\(Default) = "C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll" ["Sun Microsystems, Inc."]
    {F156768E-81EF-470C-9057-481BA8380DBA}\(Default) = (no title provided)
    -> {HKLM...CLSID} = "gFlash Class"
    \InProcServer32\(Default) = "C:\PROGRA~1\FlashGet\getflash.dll" [null data]

    HKLM\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\
    "{42071714-76d4-11d1-8b24-00a0c9068ff3}" = "Display Panning CPL Extension"
    -> {HKLM...CLSID} = "Display Panning CPL Extension"
    \InProcServer32\(Default) = "deskpan.dll" [file not found]
    "{88895560-9AA2-1069-930E-00AA0030EBC8}" = "HyperTerminal Icon Ext"
    -> {HKLM...CLSID} = "HyperTerminal Icon Ext"
    \InProcServer32\(Default) = "C:\WINDOWS\system32\hticons.dll" ["Hilgraeve, Inc."]
    "{1CE2AA40-1317-11D3-9922-00104B0AD431}" = "CA_AntiVirus"
    -> {HKLM...CLSID} = "CA_AntiVirus"
    \InProcServer32\(Default) = "C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\avshlext.dll" ["CA, Inc."]
    "{FED7043D-346A-414D-ACD7-550D052499A7}" = "dBpowerAMP Music Converter 1"
    -> {HKLM...CLSID} = "dBpShell Class"
    \InProcServer32\(Default) = "C:\Program Files\Illustrate\dBpowerAMP\dBShell.dll" [empty string]
    "{2C49B5D0-ACE7-4D17-9DF0-A254A6C5A0C5}" = "dBpowerAMP Music Converter"
    -> {HKLM...CLSID} = "dMCIShell Class"
    \InProcServer32\(Default) = "C:\Program Files\Illustrate\dBpowerAMP\dMCShell.dll" [empty string]
    "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" = "WinRAR shell extension"
    -> {HKLM...CLSID} = "WinRAR"
    \InProcServer32\(Default) = "C:\Program Files\WinRAR\rarext.dll" [null data]
    "{81559C35-8464-49F7-BB0E-07A383BEF910}" = (no title provided)
    -> {HKLM...CLSID} = "SpywareGuard.Handler"
    \InProcServer32\(Default) = "C:\Program Files\SpywareGuard\spywareguard.dll" [null data]
    "{950FF917-7A57-46BC-8017-59D9BF474000}" = "Shell Extension for CDRW"
    -> {HKLM...CLSID} = "Shell Extension for CDRW"
    \InProcServer32\(Default) = "C:\Program Files\Ahead\InCD\incdshx.dll" ["Ahead Software AG"]
    "{C52AF81D-F7A0-4AAB-8E87-F80A60CCD396}" = "OpenOffice.org Column Handler"
    -> {HKLM...CLSID} = (no title provided)
    \InProcServer32\(Default) = ""C:\Program Files\OpenOffice.org 2.0\program\shlxthdl.dll"" ["Sun Microsystems, Inc."]
    "{087B3AE3-E237-4467-B8DB-5A38AB959AC9}" = "OpenOffice.org Infotip Handler"
    -> {HKLM...CLSID} = (no title provided)
    \InProcServer32\(Default) = ""C:\Program Files\OpenOffice.org 2.0\program\shlxthdl.dll"" ["Sun Microsystems, Inc."]
    "{63542C48-9552-494A-84F7-73AA6A7C99C1}" = "OpenOffice.org Property Sheet Handler"
    -> {HKLM...CLSID} = (no title provided)
    \InProcServer32\(Default) = ""C:\Program Files\OpenOffice.org 2.0\program\shlxthdl.dll"" ["Sun Microsystems, Inc."]
    "{3B092F0C-7696-40E3-A80F-68D74DA84210}" = "OpenOffice.org Thumbnail Viewer"
    -> {HKLM...CLSID} = (no title provided)
    \InProcServer32\(Default) = ""C:\Program Files\OpenOffice.org 2.0\program\shlxthdl.dll"" ["Sun Microsystems, Inc."]
    "{DDE4BEEB-DDE6-48fd-8EB5-035C09923F83}" = "UnlockerShellExtension"
    -> {HKLM...CLSID} = "UnlockerShellExtension"
    \InProcServer32\(Default) = "C:\Program Files\Unlocker\UnlockerCOM.dll" [null data]

    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\
    <<!>> "{81559C35-8464-49F7-BB0E-07A383BEF910}" = (no title provided)
    -> {HKLM...CLSID} = "SpywareGuard.Handler"
    \InProcServer32\(Default) = "C:\Program Files\SpywareGuard\spywareguard.dll" [null data]

    HKLM\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\
    "WPDShServiceObj" = "{AAA288BA-9A4C-45B0-95D7-94D524869DB5}"
    -> {HKLM...CLSID} = "WPDShServiceObj Class"
    \InProcServer32\(Default) = "C:\WINDOWS\system32\WPDShServiceObj.dll" [MS]

    HKLM\Software\Classes\Folder\shellex\ColumnHandlers\
    {C52AF81D-F7A0-4AAB-8E87-F80A60CCD396}\(Default) = "OpenOffice.org Column Handler"
    -> {HKLM...CLSID} = (no title provided)
    \InProcServer32\(Default) = ""C:\Program Files\OpenOffice.org 2.0\program\shlxthdl.dll"" ["Sun Microsystems, Inc."]
    {FED7043D-346A-414D-ACD7-550D052499A7}\(Default) = "dBpowerAMP Column Handler"
    -> {HKLM...CLSID} = "dBpShell Class"
    \InProcServer32\(Default) = "C:\Program Files\Illustrate\dBpowerAMP\dBShell.dll" [empty string]

    HKLM\Software\Classes\*\shellex\ContextMenuHandlers\
    CA_AntiVirus\(Default) = "{1CE2AA40-1317-11D3-9922-00104B0AD431}"
    -> {HKLM...CLSID} = "CA_AntiVirus"
    \InProcServer32\(Default) = "C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\avshlext.dll" ["CA, Inc."]
    WinRAR\(Default) = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}"
    -> {HKLM...CLSID} = "WinRAR"
    \InProcServer32\(Default) = "C:\Program Files\WinRAR\rarext.dll" [null data]

    HKLM\Software\Classes\Directory\shellex\ContextMenuHandlers\
    WinRAR\(Default) = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}"
    -> {HKLM...CLSID} = "WinRAR"
    \InProcServer32\(Default) = "C:\Program Files\WinRAR\rarext.dll" [null data]

    HKLM\Software\Classes\Folder\shellex\ContextMenuHandlers\
    CA_AntiVirus\(Default) = "{1CE2AA40-1317-11D3-9922-00104B0AD431}"
    -> {HKLM...CLSID} = "CA_AntiVirus"
    \InProcServer32\(Default) = "C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\avshlext.dll" ["CA, Inc."]
    UnlockerShellExtension\(Default) = "{DDE4BEEB-DDE6-48fd-8EB5-035C09923F83}"
    -> {HKLM...CLSID} = "UnlockerShellExtension"
    \InProcServer32\(Default) = "C:\Program Files\Unlocker\UnlockerCOM.dll" [null data]
    WinRAR\(Default) = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}"
    -> {HKLM...CLSID} = "WinRAR"
    \InProcServer32\(Default) = "C:\Program Files\WinRAR\rarext.dll" [null data]

    HKLM\Software\Classes\AllFilesystemObjects\shellex\ContextMenuHandlers\
    UnlockerShellExtension\(Default) = "{DDE4BEEB-DDE6-48fd-8EB5-035C09923F83}"
    -> {HKLM...CLSID} = "UnlockerShellExtension"
    \InProcServer32\(Default) = "C:\Program Files\Unlocker\UnlockerCOM.dll" [null data]


    Group Policies {GPedit.msc branch and setting}:

    Note: detected settings may not have any effect.

    HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\

    "shutdownwithoutlogon" = (REG_DWORD) hex:0x00000001
    {Computer Configuration|Windows Settings|Security Settings|Local Policies|Security Options|
    Shutdown: Allow system to be shut down without having to log on}

    "undockwithoutlogon" = (REG_DWORD) hex:0x00000001
    {Computer Configuration|Windows Settings|Security Settings|Local Policies|Security Options|
    Devices: Allow undock without having to log on}


    Active Desktop and Wallpaper:

    Active Desktop may be disabled at this entry:
    HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellState

    Displayed if Active Desktop enabled and wallpaper not set by Group Policy:
    HKCU\Software\Microsoft\Internet Explorer\Desktop\General\
    "Wallpaper" = "C:\WINDOWS\system32\config\systemprofile\Local Settings\Application Data\Microsoft\Wallpaper1.bmp"

    Displayed if Active Desktop disabled and wallpaper not set by Group Policy:
    HKCU\Control Panel\Desktop\
    "Wallpaper" = "C:\Documents and Settings\Deprived Soul\Local Settings\Application Data\Microsoft\Wallpaper1.bmp"


    Enabled Screen Saver:

    HKCU\Control Panel\Desktop\
    "SCRNSAVE.EXE" = "C:\WINDOWS\system32\logon.scr" [MS]


    Startup items in "Deprived Soul" & "All Users" startup folders:

    C:\Documents and Settings\Deprived Soul\Start Menu\Programs\Startup
    "OpenOffice.org 2.0" -> shortcut to: "C:\Program Files\OpenOffice.org 2.0\program\quickstart.exe" [null data]
    "Shortcut to TeaTimer" -> shortcut to: "C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe" ["Safer Networking Limited"]
    "SpywareGuard" -> shortcut to: "C:\Program Files\SpywareGuard\sgmain.exe" [null data]


    Winsock2 Service Provider DLLs:

    Namespace Service Providers

    HKLM\System\CurrentControlSet\Services\Winsock2\Parameters\NameSpace_Catalog5\Catalog_Entries\ {++}
    000000000001\LibraryPath = "%SystemRoot%\System32\mswsock.dll" [MS]
    000000000002\LibraryPath = "%SystemRoot%\System32\winrnr.dll" [MS]
    000000000003\LibraryPath = "%SystemRoot%\System32\mswsock.dll" [MS]

    Transport Service Providers

    HKLM\System\CurrentControlSet\Services\Winsock2\Parameters\Protocol_Catalog9\Catalog_Entries\ {++}
    0000000000##\PackedCatalogItem (contains) DLL [Company Name], (at) ## range:
    C:\WINDOWS\system32\VetRedir.dll ["Computer Associates International, Inc."], 01 - 03, 21
    %SystemRoot%\system32\mswsock.dll [MS], 04 - 06, 09 - 20
    %SystemRoot%\system32\rsvpsp.dll [MS], 07 - 08


    Toolbars, Explorer Bars, Extensions:

    Toolbars

    HKLM\Software\Microsoft\Internet Explorer\Toolbar\
    "{E0E899AB-F487-11D5-8D29-0050BA6940E3}" = "FlashGet Bar"
    -> {HKLM...CLSID} = "FlashGet Bar"
    \InProcServer32\(Default) = "C:\PROGRA~1\FlashGet\fgiebar.dll" ["Amaze Soft"]
    "{0BF43445-2F28-4351-9252-17FE6E806AA0}" = "McAfee SiteAdvisor"
    -> {HKLM...CLSID} = "McAfee SiteAdvisor"
    \InProcServer32\(Default) = "C:\Program Files\SiteAdvisor\4144\SiteAdv.dll" ["McAfee, Inc."]

    Extensions (Tools menu items, main toolbar menu buttons)

    HKLM\Software\Microsoft\Internet Explorer\Extensions\
    {08B0E5C0-4FCB-11CF-AAA5-00401C608501}\
    "MenuText" = "Sun Java Console"
    "CLSIDExtension" = "{CAFEEFAC-0015-0000-0009-ABCDEFFEDCBC}"
    -> {HKCU...CLSID} = "Java Plug-in 1.5.0_09"
    \InProcServer32\(Default) = "C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll" ["Sun Microsystems, Inc."]
    -> {HKLM...CLSID} = "Java Plug-in 1.5.0_09"
    \InProcServer32\(Default) = "C:\Program Files\Java\jre1.5.0_09\bin\npjpi150_09.dll" ["Sun Microsystems, Inc."]

    {D6E814A0-E0C5-11D4-8D29-0050BA6940E3}\
    "ButtonText" = "FlashGet"
    "MenuText" = "&FlashGet"
    "Exec" = "C:\Program Files\FlashGet\flashget.exe" ["FlashGet.com"]

    {FB5F1910-F110-11D2-BB9E-00C04F795683}\
    "ButtonText" = "Messenger"
    "MenuText" = "Windows Messenger"
    "Exec" = "C:\Program Files\Messenger\msmsgs.exe" [MS]


    Running Services (Display Name, Service Name, Path {Service DLL}):

    CAISafe, CAISafe, "C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\ISafe.exe" ["Computer Associates International, Inc."]
    InCD Helper, InCDsrv, "C:\Program Files\Ahead\InCD\InCDsrv.exe" ["Ahead Software AG"]
    TrueVector Internet Monitor, vsmon, "C:\WINDOWS\system32\ZoneLabs\vsmon.exe -service" ["Zone Labs, LLC"]
    VET Message Service, VETMSGNT, "C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\VetMsg.exe" ["CA, Inc."]


    <<!>>: Suspicious data at a malware launch point.

    + This report excludes default entries except where indicated.
    + To see *everywhere* the script checks and *everything* it finds,
    launch it from a command prompt or a shortcut with the -all parameter.
    + The search for DESKTOP.INI DLL launch points on all local fixed drives
    took 65 seconds.
    (total run time: 112 seconds)



    New HJT log:

    Logfile of HijackThis v1.99.1
    Scan saved at 12:20:40, on 19/11/2006
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Ahead\InCD\InCDsrv.exe
    C:\WINDOWS\system32\ZoneLabs\vsmon.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\ISafe.exe
    C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\VetMsg.exe
    C:\Program Files\CA\CA Internet Security Suite\cctray\cctray.exe
    C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\CAVRID.exe
    C:\Program Files\HighCriteria\TotalRecorder\TotRecSched.exe
    C:\WINDOWS\ALCXMNTR.EXE
    C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
    C:\Program Files\RAMBooster.Net\RAMBooster.exe
    C:\Program Files\Ahead\InCD\InCD.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\SpywareGuard\sgmain.exe
    C:\Program Files\OpenOffice.org 2.0\program\soffice.exe
    C:\Program Files\OpenOffice.org 2.0\program\soffice.BIN
    C:\Program Files\SpywareGuard\sgbhp.exe
    C:\Program Files\FlashGet\flashget.exe
    C:\Program Files\Maxthon\Maxthon.exe
    C:\Documents and Settings\Deprived Soul\My Documents\Amature\utorrent.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\system32\NOTEPAD.EXE
    C:\Documents and Settings\Deprived Soul\My Documents\Security\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    O2 - BHO: (no name) - {089FD14D-132B-48FC-8861-0048AE113215} - C:\Program Files\SiteAdvisor\4144\SiteAdv.dll
    O2 - BHO: IeCatch5 Class - {2F364306-AA45-47B5-9F9D-39A8B94E7EF7} - C:\Program Files\FlashGet\jccatch.dll
    O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
    O2 - BHO: gFlash Class - {F156768E-81EF-470C-9057-481BA8380DBA} - C:\PROGRA~1\FlashGet\getflash.dll
    O3 - Toolbar: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\fgiebar.dll
    O3 - Toolbar: McAfee SiteAdvisor - {0BF43445-2F28-4351-9252-17FE6E806AA0} - C:\Program Files\SiteAdvisor\4144\SiteAdv.dll
    O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
    O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
    O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
    O4 - HKLM\..\Run: [cctray] "C:\Program Files\CA\CA Internet Security Suite\cctray\cctray.exe"
    O4 - HKLM\..\Run: [CAVRID] "C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\CAVRID.exe"
    O4 - HKLM\..\Run: [TotalRecorderScheduler] "C:\Program Files\HighCriteria\TotalRecorder\TotRecSched.exe"
    O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE
    O4 - HKLM\..\Run: [Zone Labs Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
    O4 - HKLM\..\Run: [RAMBooster.Net] C:\Program Files\RAMBooster.Net\RAMBooster.exe -m
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [InCD] C:\Program Files\Ahead\InCD\InCD.exe
    O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - Startup: OpenOffice.org 2.0.lnk = C:\Program Files\OpenOffice.org 2.0\program\quickstart.exe
    O4 - Startup: Shortcut to TeaTimer.lnk = C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
    O8 - Extra context menu item: Download All by FlashGet - C:\Program Files\FlashGet\jc_all.htm
    O8 - Extra context menu item: Download using FlashGet - C:\Program Files\FlashGet\jc_link.htm
    O8 - Extra context menu item: Furl It - http://www.furl.net/resources/rightClick.jsp
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
    O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\Program Files\FlashGet\flashget.exe
    O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\Program Files\FlashGet\flashget.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O17 - HKLM\System\CCS\Services\Tcpip\..\{A7C2E048-C8CF-41F2-A565-8949B97C2BB9}: NameServer = 202.188.0.133 202.188.1.5
    O18 - Protocol: siteadvisor - {3A5DC592-7723-4EAA-9EE6-AF4222BCF879} - C:\Program Files\SiteAdvisor\4144\SiteAdv.dll
    O18 - Protocol: textwareilluminatorbase - {CE5CD329-1650-414A-8DB0-4CBF72FAED87} - C:\WINDOWS\system32\textwareilluminatorbaseProtocol.dll
    O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
    O23 - Service: CAISafe - Computer Associates International, Inc. - C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\ISafe.exe
    O23 - Service: InCD Helper (InCDsrv) - Ahead Software AG - C:\Program Files\Ahead\InCD\InCDsrv.exe
    O23 - Service: InCD Helper (read only) (InCDsrvR) - Ahead Software AG - C:\Program Files\Ahead\InCD\InCDsrv.exe
    O23 - Service: VET Message Service (VETMSGNT) - CA, Inc. - C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\VetMsg.exe
    O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe
  • TroganTrogan London, UK
    edited November 2006
    Your running CA Internet Security Suite which has a Personal Firewall included and ZoneAlarm. Running multiple Firewalls is never a good idea as they can conflict and cause more problems. You need to either uninstall ZoneAlarm or disable the CA Personal Firewall.
    ____________________

    Both the SilentRunners and HijackThis logs are clean.

    I wonder if that file exists; lets check:

    Click Start > Search > All Files and Folders.
    Expand More advanced options and make sure these boxes are checked

    Search system folders
    Search hidden files and folders
    Search subfolders


    Paste this into the Search box at the top:

    CCUpdate.exe

    Let me know if it is found and in what location.


    Also, do an online scan with Panda ActiveScan

    - Once you are on the Panda site, click the Scan your PC button
    - A new window will open...click the Check Now button
    - Enter your Country
    - Enter your State/Province
    - Enter your e-mail address and click send
    - Select either Home User or Company
    - Click the big Scan Now button
    - If it wants to install an ActiveX component allow it
    - It will start downloading the files it requires for the scan (Note: It may take a couple of minutes)
    - When download is complete, click on Local Disks to start the scan
    - When the scan completes, if anything malicious is detected, click the See Report button, then Save Report and save it to a convenient location.

    Post the contents of the Panda scan report, along with a new HijackThis Log
  • edited November 2006
    No no, the CA Personal Firewall is not installed, I'm only running CA Antivirus, the free one year trial.


    CCUpdate.exe (it has a CA icon) is in this folder:

    C:\Program Files\CA\CA Internet Security Suite\ccupdate



    Panda ActiveScan Report:



    Incident Status Location

    Spyware:Cookie/2o7 Not disinfected C:\Documents and Settings\Deprived Soul\Cookies\deprived [email]soul@2o7[2].txt[/email]
    Spyware:Cookie/Advertising Not disinfected C:\Documents and Settings\Deprived Soul\Cookies\deprived [email]soul@advertising[2].txt[/email]
    Spyware:Cookie/Apmebf Not disinfected C:\Documents and Settings\Deprived Soul\Cookies\deprived [email]soul@apmebf[1].txt[/email]
    Spyware:Cookie/Falkag Not disinfected C:\Documents and Settings\Deprived Soul\Cookies\deprived [email]soul@as-eu.falkag[1].txt[/email]
    Spyware:Cookie/Atlas DMT Not disinfected C:\Documents and Settings\Deprived Soul\Cookies\deprived [email]soul@atdmt[2].txt[/email]
    Spyware:Cookie/Cgi-bin Not disinfected C:\Documents and Settings\Deprived Soul\Cookies\deprived [email]soul@cgi-bin[1].txt[/email]
    Spyware:Cookie/Com.com Not disinfected C:\Documents and Settings\Deprived Soul\Cookies\deprived [email]soul@com[2].txt[/email]
    Spyware:Cookie/cs.sexcounter Not disinfected C:\Documents and Settings\Deprived Soul\Cookies\deprived [email]soul@cs.sexcounter[2].txt[/email]
    Spyware:Cookie/Doubleclick Not disinfected C:\Documents and Settings\Deprived Soul\Cookies\deprived [email]soul@doubleclick[1].txt[/email]
    Spyware:Cookie/Mediaplex Not disinfected C:\Documents and Settings\Deprived Soul\Cookies\deprived [email]soul@mediaplex[1].txt[/email]
    Spyware:Cookie/Overture Not disinfected C:\Documents and Settings\Deprived Soul\Cookies\deprived [email]soul@overture[2].txt[/email]
    Spyware:Cookie/Overture Not disinfected C:\Documents and Settings\Deprived Soul\Cookies\deprived [email]soul@perf.overture[1].txt[/email]
    Spyware:Cookie/QuestionMarket Not disinfected C:\Documents and Settings\Deprived Soul\Cookies\deprived [email]soul@questionmarket[2].txt[/email]
    Spyware:Cookie/Server.iad.Liveperson Not disinfected C:\Documents and Settings\Deprived Soul\Cookies\deprived [email]soul@server.iad.liveperson[2].txt[/email]
    Spyware:Cookie/Com.com Not disinfected C:\Documents and Settings\Deprived Soul\Cookies\deprived [email]soul@terra.com[2].txt[/email]
    Spyware:Cookie/Tickle Not disinfected C:\Documents and Settings\Deprived Soul\Cookies\deprived [email]soul@tickle[1].txt[/email]
    Spyware:Cookie/Yadro Not disinfected C:\Documents and Settings\Deprived Soul\Cookies\deprived [email]soul@yadro[2].txt[/email]
    Adware:Adware/Gmter Not disinfected C:\Documents and Settings\Deprived Soul\Local Settings\Temporary Internet Files\Content.IE5\KP2TYXOP\popup[1].htm
    Adware:Adware/Gmter Not disinfected C:\Documents and Settings\Deprived Soul\Local Settings\Temporary Internet Files\Content.IE5\KP2TYXOP\popup[2].htm
    Adware:Adware/Gmter Not disinfected C:\Documents and Settings\Deprived Soul\Local Settings\Temporary Internet Files\Content.IE5\QFQPGDM7\popup[1].htm
    Adware:Adware/Gmter Not disinfected C:\Documents and Settings\Deprived Soul\Local Settings\Temporary Internet Files\Content.IE5\QFQPGDM7\popup[2].htm
    Adware:Adware/Gmter Not disinfected C:\Documents and Settings\Deprived Soul\Local Settings\Temporary Internet Files\Content.IE5\QFQPGDM7\popup[3].htm
    Adware:Adware/Gmter Not disinfected C:\Documents and Settings\Deprived Soul\Local Settings\Temporary Internet Files\Content.IE5\SZGRWBU3\popup[1].htm
    Adware:Adware/Gmter Not disinfected C:\Documents and Settings\Deprived Soul\Local Settings\Temporary Internet Files\Content.IE5\SZGRWBU3\popup[2].htm


    New HJT log:


    Logfile of HijackThis v1.99.1
    Scan saved at 17:19:20, on 19/11/2006
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Ahead\InCD\InCDsrv.exe
    C:\WINDOWS\system32\ZoneLabs\vsmon.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\ISafe.exe
    C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\VetMsg.exe
    C:\Program Files\CA\CA Internet Security Suite\cctray\cctray.exe
    C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\CAVRID.exe
    C:\Program Files\HighCriteria\TotalRecorder\TotRecSched.exe
    C:\WINDOWS\ALCXMNTR.EXE
    C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
    C:\Program Files\RAMBooster.Net\RAMBooster.exe
    C:\Program Files\Ahead\InCD\InCD.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\SpywareGuard\sgmain.exe
    C:\Program Files\OpenOffice.org 2.0\program\soffice.exe
    C:\Program Files\OpenOffice.org 2.0\program\soffice.BIN
    C:\Program Files\SpywareGuard\sgbhp.exe
    C:\Program Files\FlashGet\flashget.exe
    C:\Program Files\Maxthon\Maxthon.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Media Player\wmplayer.exe
    C:\Documents and Settings\Deprived Soul\My Documents\Amature\utorrent.exe
    C:\Documents and Settings\Deprived Soul\My Documents\Security\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    O2 - BHO: (no name) - {089FD14D-132B-48FC-8861-0048AE113215} - C:\Program Files\SiteAdvisor\4144\SiteAdv.dll
    O2 - BHO: IeCatch5 Class - {2F364306-AA45-47B5-9F9D-39A8B94E7EF7} - C:\Program Files\FlashGet\jccatch.dll
    O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
    O2 - BHO: gFlash Class - {F156768E-81EF-470C-9057-481BA8380DBA} - C:\PROGRA~1\FlashGet\getflash.dll
    O3 - Toolbar: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\fgiebar.dll
    O3 - Toolbar: McAfee SiteAdvisor - {0BF43445-2F28-4351-9252-17FE6E806AA0} - C:\Program Files\SiteAdvisor\4144\SiteAdv.dll
    O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
    O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
    O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
    O4 - HKLM\..\Run: [cctray] "C:\Program Files\CA\CA Internet Security Suite\cctray\cctray.exe"
    O4 - HKLM\..\Run: [CAVRID] "C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\CAVRID.exe"
    O4 - HKLM\..\Run: [TotalRecorderScheduler] "C:\Program Files\HighCriteria\TotalRecorder\TotRecSched.exe"
    O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE
    O4 - HKLM\..\Run: [Zone Labs Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
    O4 - HKLM\..\Run: [RAMBooster.Net] C:\Program Files\RAMBooster.Net\RAMBooster.exe -m
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [InCD] C:\Program Files\Ahead\InCD\InCD.exe
    O4 - HKLM\..\Run: [Picasa Media Detector] C:\Program Files\Picasa2\PicasaMediaDetector.exe
    O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - Startup: OpenOffice.org 2.0.lnk = C:\Program Files\OpenOffice.org 2.0\program\quickstart.exe
    O4 - Startup: Shortcut to TeaTimer.lnk = C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
    O8 - Extra context menu item: Download All by FlashGet - C:\Program Files\FlashGet\jc_all.htm
    O8 - Extra context menu item: Download using FlashGet - C:\Program Files\FlashGet\jc_link.htm
    O8 - Extra context menu item: Furl It - http://www.furl.net/resources/rightClick.jsp
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
    O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\Program Files\FlashGet\flashget.exe
    O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\Program Files\FlashGet\flashget.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{A7C2E048-C8CF-41F2-A565-8949B97C2BB9}: NameServer = 202.188.0.133 202.188.1.5
    O18 - Protocol: siteadvisor - {3A5DC592-7723-4EAA-9EE6-AF4222BCF879} - C:\Program Files\SiteAdvisor\4144\SiteAdv.dll
    O18 - Protocol: textwareilluminatorbase - {CE5CD329-1650-414A-8DB0-4CBF72FAED87} - C:\WINDOWS\system32\textwareilluminatorbaseProtocol.dll
    O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
    O23 - Service: CAISafe - Computer Associates International, Inc. - C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\ISafe.exe
    O23 - Service: InCD Helper (InCDsrv) - Ahead Software AG - C:\Program Files\Ahead\InCD\InCDsrv.exe
    O23 - Service: InCD Helper (read only) (InCDsrvR) - Ahead Software AG - C:\Program Files\Ahead\InCD\InCDsrv.exe
    O23 - Service: VET Message Service (VETMSGNT) - CA, Inc. - C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\VetMsg.exe
    O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe
  • TroganTrogan London, UK
    edited November 2006
    Hi,
    No no, the CA Personal Firewall is not installed, I'm only running CA Antivirus, the free one year trial.
    That's fine! Thanks for letting me know.
    CCUpdate.exe (it has a CA icon) is in this folder:

    C:\Program Files\CA\CA Internet Security Suite\ccupdate
    It looks like the CCUpdate.exe is not the malicious worm, but rather it belongs to CA Internet Security Suite. Also, the Panda scan would have caught the worm and it hasn't.


    Run ATF Cleaner to remove Adware file found by Panda.
    Download ATF (Atribune Temp File) Cleaner© by Atribune to your desktop.

    Double-click ATF Cleaner.exe to open it.

    Under Main select the following:
      Windows Temp
      Current User Temp
      All Users Temp
      Temporary Internet Files
      Prefetch
      Java Cache

      *The other boxes are optional*
      Then click the Empty Selected button.

      Click Exit on the Main menu to close the program.


      Open HijackThis
      - Click the Do a system scan only button
      - Check the following entries (below)

      R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =

      O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE


      - Close ALL open windows (especially Internet Explorer!)
      - Click Fix Checked
      Close HiajckThis


      Apart from that, I don't think your computer is infected.
    • profdlpprofdlp The Holy City Of Westlake, Ohio
      edited November 2006
      ...1. My computer was running fine. Then I installed something (i forgot what it was, my memory isn't that good, sorry) that required a reboot. So I rebooted the computer.

      2. When it started up (i was using my primary account), the start bar won't load, actually nothing loaded, just my firewall and desktop background...
      Since it seems that the problem began with the new software, let's see if we can figure out what it was and get rid of it.

      Making sure that hidden files and folders are set to "Show...", go to the folder Program Files and arrange the icons by date modified. You should see the oldest one at one end of the list and the newest one at the other. If that program rings any bells as being the possible culprit you should uninstall it via Control Panel>>Add or Remove Programs.

      NOTE: The very newest one(s) might be there as a result of your recent virus scans. If that's the case, leave them alone and work your way back up the list.

      I'll move this back to Emergency Help to allow others to chime in if they have any other ideas. :)
    • edited November 2006
      Adware removed.


      Deleted:


      R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =

      O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE


      Problem persists. Sigh.
    • edited November 2006
      It happened again and there's always the "send report" or "don't send" option, and I clicked "view report". It says, the following files will be included in the report. I found those files and they are some kind of minidump abd hexdump files. Do you guys wanna take a look at it?
    • TroganTrogan London, UK
      edited November 2006
      Adware removed.


      Deleted:


      R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =

      O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE


      Problem persists. Sigh.
      DeprivedSoul, those two entries I asked you to remove were not going to solve your problem. Since you formatted your computer, that would have wiped your hard drive clean and removed any infection present. So its seems to be a hardware problem of some sort.
    Sign In or Register to comment.