Options
Infected With Trojan.avkillers And Win32/wigon
Very persistent wigon trojan. If I boot up without internet connectivity it won't appear. As soon as I plug in the network cable I see in tcpview winlogon.exe spawning a single www connection, and upon that smtp connections from svchost.exe to multiple remote mail servers.
SDFix: Version 1.188
Run by Diaman on ˜¨ 06/06/2008 at 00:06
Microsoft Windows XP [Version 5.1.2600]
Running From: F:\utils\sdfix\SDFix
Checking Services :
Name :
msupdate
Path :
f:\windows\system32\mssrv32.exe
msupdate - Deleted
Restoring Windows Registry Values
Restoring Windows Default Hosts File
Rebooting
Checking Files :
Trojan Files Found:
F:\WINDOWS\system32\WinCtrl32.dl_ - Deleted
F:\WINDOWS\xbqmfsed.exe - Deleted
Could Not Remove F:\WINDOWS\system32\mssrv32.exe
Could Not Remove F:\WINDOWS\system32\WinCtrl32.dll
Removing Temp Files
ADS Check :
Final Check :
catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-06-06 00:11:52
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
F:\WINDOWS\system32\svchost.exe [1412] 0x88246DA0
scanning hidden services & system hive ...
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Eventlog\Application\ESENT]
"EventMessageFile"=str(2):"f:\windows\system32\ESENT.dll"
"CategoryMessageFile"=str(2):"f:\windows\system32\ESENT.dll"
scanning hidden registry entries ...
scanning hidden files ...
scan completed successfully
hidden processes: 1
hidden services: 0
hidden files: 0
Remaining Services :
msupdate
Authorized Application Key Export:
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"F:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"="F:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE:*:Enabled:Microsoft Office Outlook"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
Remaining Files :
F:\WINDOWS\system32\mssrv32.exe Found
F:\WINDOWS\system32\WinCtrl32.dll Found
File Backups: - F:\utils\sdfix\SDFix\backups\backups.zip
Files with Hidden Attributes :
Mon 28 Jan 2008 1,404,240 A.SHR --- F:\PROGRA~1\SPYBOT~1\SDUPDATE.EXE
Mon 28 Jan 2008 5,146,448 A.SHR --- F:\PROGRA~1\SPYBOT~1\SPYBOTSD.EXE
Mon 28 Jan 2008 2,097,488 A.SHR --- F:\PROGRA~1\SPYBOT~1\TEATIMER.EXE
Tue 15 Nov 2005 78,104 ..SHR --- F:\PROGRA~1\AUTODESK\AUTODE~1\SETUP.EXE
Tue 15 Nov 2005 12,912 A.SHR --- F:\PROGRA~1\AUTODESK\AUTODE~1\_SETUPX.DLL
Thu 23 Jan 2003 65,952 ..SHR --- F:\PROGRA~1\AUTODESK\AUTODE~2\SETUP.EXE
Thu 8 May 2008 0 A..H. --- F:\WINDOWS\SOFTWA~1\DOWNLOAD\385CB6~1\BIT1.TMP
Thu 24 Jan 2008 0 A..H. --- F:\WINDOWS\SOFTWA~1\DOWNLOAD\523D05~1\BIT2.TMP
Mon 12 Feb 2007 3,096,576 A..H. --- F:\DOCUME~1\DIAMAN\APPLIC~1\U3\TEMP\LAUNCH~1.EXE
Finished!
Logfile of HijackThis v1.99.1
Scan saved at 00:21:58, on 6/6/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16640)
Running processes:
F:\WINDOWS\System32\smss.exe
F:\WINDOWS\system32\csrss.exe
F:\WINDOWS\system32\winlogon.exe
F:\WINDOWS\system32\services.exe
F:\WINDOWS\system32\lsass.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\System32\svchost.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\system32\svchost.exe
F:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
F:\WINDOWS\Explorer.EXE
F:\WINDOWS\system32\spoolsv.exe
F:\WINDOWS\system32\drivers\CDAC11BA.EXE
F:\WINDOWS\system32\svchost.exe
F:\Program Files\Microsoft SQL Server\MSSQL\Binn\sqlservr.exe
F:\Program Files\Eset\nod32krn.exe
F:\WINDOWS\system32\nvsvc32.exe
F:\Program Files\Spyware Doctor\pctsAuxs.exe
F:\Program Files\Spyware Doctor\pctsSvc.exe
F:\Program Files\Logiciel\eCM\scktsrvr.exe
F:\Program Files\Spyware Doctor\pctsTray.exe
F:\WINDOWS\System32\alg.exe
F:\WINDOWS\system32\notepad.exe
F:\Program Files\HP\HP Software Update\HPWuSchd2.exe
F:\WINDOWS\RTHDCPL.EXE
F:\WINDOWS\system32\RUNDLL32.EXE
F:\Program Files\Java\jre1.5.0_01\bin\jusched.exe
F:\Program Files\Eset\nod32kui.exe
F:\WINDOWS\system32\ctfmon.exe
F:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
F:\Program Files\FotoStation Easy\FotoStation Easy AutoLaunch.exe
F:\Program Files\Nikon\NkView5\NkvMon.exe
F:\Program Files\Sony Corporation\Picture Package\Picture Package Menu\SonyTray.exe
F:\Program Files\Sony Corporation\Picture Package\Picture Package Applications\Residence.exe
F:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe
F:\WINDOWS\system32\svchost.exe
F:\utils\FirefoxPortable\App\firefox\firefox.exe
F:\Program Files\Spyware Doctor\pctsGui.exe
F:\Program Files\HijackThis\HijackThis.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: (no name) - AutorunsDisabled - (no file)
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - F:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {189A78B1-CEB8-45FD-9C12-4B9C8A965A58} - (no file)
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - F:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {7156D971-86B9-447F-BB5B-F3DF97A83F79} - (no file)
O2 - BHO: (no name) - {E0026215-403B-41C2-8874-BD288321446C} - (no file)
O4 - HKLM\..\Run: [HP Software Update] "F:\Program Files\HP\HP Software Update\HPWuSchd2.exe"
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [QuickTime Task] "F:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [NvCplDaemon] "RUNDLL32.EXE" F:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] "nwiz.exe" /install
O4 - HKLM\..\Run: [NvMediaCenter] "RUNDLL32.EXE" F:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "F:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "F:\Program Files\Java\jre1.5.0_01\bin\jusched.exe"
O4 - HKLM\..\Run: [nod32kui] "F:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
O4 - HKLM\..\Run: [ISTray] "F:\Program Files\Spyware Doctor\pctsTray.exe"
O4 - HKCU\..\Run: [CTFMON.EXE] F:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] "F:\Program Files\Spybot - Search & Destroy\TeaTimer.exe"
O4 - HKCU\..\Run: [SUPERAntiSpyware] "F:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"
O4 - Global Startup: FotoStation Easy AutoLaunch.lnk = ?
O4 - Global Startup: NkvMon.exe.lnk = F:\Program Files\Nikon\NkView5\NkvMon.exe
O4 - Global Startup: Picture Package Menu.lnk = ?
O4 - Global Startup: Picture Package VCD Maker.lnk = ?
O4 - Global Startup: Service Manager.lnk = F:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://F:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - AutorunsDisabled - (no file)
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - F:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - F:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - F:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - F:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - F:\PROGRA~1\SPYBOT~1\SDHelper.dll
O11 - Options group: [INTERNATIONAL] International*
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cab
O16 - DPF: {BDBDE413-7B1C-4C68-A8FF-C5B2B4090876} (F-Secure Online Scanner 3.3) - http://support.f-secure.com/ols/fscax.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - F:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
O18 - Filter hijack: text/xml - {807563E5-5146-11D5-A672-00B0D022E945} - F:\PROGRA~1\COMMON~1\MICROS~1\OFFICE12\MSOXMLMF.DLL
O20 - Winlogon Notify: !SASWinLogon - F:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O20 - Winlogon Notify: mlJbArpP - F:\WINDOWS\
O20 - Winlogon Notify: WgaLogon - F:\WINDOWS\SYSTEM32\WgaLogon.dll
O20 - Winlogon Notify: WinCtrl32 - F:\WINDOWS\SYSTEM32\WinCtrl32.dll
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - F:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: C-DillaCdaC11BA - Macrovision - F:\WINDOWS\system32\drivers\CDAC11BA.EXE
O23 - Service: Microsoft security update service (msupdate) - Unknown owner - f:\windows\system32\mssrv32.exe
O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - F:\Program Files\Eset\nod32krn.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - F:\WINDOWS\system32\nvsvc32.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - F:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - F:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Borland Socket server (SocketServer) - Borland Software Corporation - F:\Program Files\Logiciel\eCM\scktsrvr.exe
SDFix: Version 1.188
Run by Diaman on ˜¨ 06/06/2008 at 00:06
Microsoft Windows XP [Version 5.1.2600]
Running From: F:\utils\sdfix\SDFix
Checking Services :
Name :
msupdate
Path :
f:\windows\system32\mssrv32.exe
msupdate - Deleted
Restoring Windows Registry Values
Restoring Windows Default Hosts File
Rebooting
Checking Files :
Trojan Files Found:
F:\WINDOWS\system32\WinCtrl32.dl_ - Deleted
F:\WINDOWS\xbqmfsed.exe - Deleted
Could Not Remove F:\WINDOWS\system32\mssrv32.exe
Could Not Remove F:\WINDOWS\system32\WinCtrl32.dll
Removing Temp Files
ADS Check :
Final Check :
catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-06-06 00:11:52
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
F:\WINDOWS\system32\svchost.exe [1412] 0x88246DA0
scanning hidden services & system hive ...
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Eventlog\Application\ESENT]
"EventMessageFile"=str(2):"f:\windows\system32\ESENT.dll"
"CategoryMessageFile"=str(2):"f:\windows\system32\ESENT.dll"
scanning hidden registry entries ...
scanning hidden files ...
scan completed successfully
hidden processes: 1
hidden services: 0
hidden files: 0
Remaining Services :
msupdate
Authorized Application Key Export:
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"F:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"="F:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE:*:Enabled:Microsoft Office Outlook"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
Remaining Files :
F:\WINDOWS\system32\mssrv32.exe Found
F:\WINDOWS\system32\WinCtrl32.dll Found
File Backups: - F:\utils\sdfix\SDFix\backups\backups.zip
Files with Hidden Attributes :
Mon 28 Jan 2008 1,404,240 A.SHR --- F:\PROGRA~1\SPYBOT~1\SDUPDATE.EXE
Mon 28 Jan 2008 5,146,448 A.SHR --- F:\PROGRA~1\SPYBOT~1\SPYBOTSD.EXE
Mon 28 Jan 2008 2,097,488 A.SHR --- F:\PROGRA~1\SPYBOT~1\TEATIMER.EXE
Tue 15 Nov 2005 78,104 ..SHR --- F:\PROGRA~1\AUTODESK\AUTODE~1\SETUP.EXE
Tue 15 Nov 2005 12,912 A.SHR --- F:\PROGRA~1\AUTODESK\AUTODE~1\_SETUPX.DLL
Thu 23 Jan 2003 65,952 ..SHR --- F:\PROGRA~1\AUTODESK\AUTODE~2\SETUP.EXE
Thu 8 May 2008 0 A..H. --- F:\WINDOWS\SOFTWA~1\DOWNLOAD\385CB6~1\BIT1.TMP
Thu 24 Jan 2008 0 A..H. --- F:\WINDOWS\SOFTWA~1\DOWNLOAD\523D05~1\BIT2.TMP
Mon 12 Feb 2007 3,096,576 A..H. --- F:\DOCUME~1\DIAMAN\APPLIC~1\U3\TEMP\LAUNCH~1.EXE
Finished!
Logfile of HijackThis v1.99.1
Scan saved at 00:21:58, on 6/6/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16640)
Running processes:
F:\WINDOWS\System32\smss.exe
F:\WINDOWS\system32\csrss.exe
F:\WINDOWS\system32\winlogon.exe
F:\WINDOWS\system32\services.exe
F:\WINDOWS\system32\lsass.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\System32\svchost.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\system32\svchost.exe
F:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
F:\WINDOWS\Explorer.EXE
F:\WINDOWS\system32\spoolsv.exe
F:\WINDOWS\system32\drivers\CDAC11BA.EXE
F:\WINDOWS\system32\svchost.exe
F:\Program Files\Microsoft SQL Server\MSSQL\Binn\sqlservr.exe
F:\Program Files\Eset\nod32krn.exe
F:\WINDOWS\system32\nvsvc32.exe
F:\Program Files\Spyware Doctor\pctsAuxs.exe
F:\Program Files\Spyware Doctor\pctsSvc.exe
F:\Program Files\Logiciel\eCM\scktsrvr.exe
F:\Program Files\Spyware Doctor\pctsTray.exe
F:\WINDOWS\System32\alg.exe
F:\WINDOWS\system32\notepad.exe
F:\Program Files\HP\HP Software Update\HPWuSchd2.exe
F:\WINDOWS\RTHDCPL.EXE
F:\WINDOWS\system32\RUNDLL32.EXE
F:\Program Files\Java\jre1.5.0_01\bin\jusched.exe
F:\Program Files\Eset\nod32kui.exe
F:\WINDOWS\system32\ctfmon.exe
F:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
F:\Program Files\FotoStation Easy\FotoStation Easy AutoLaunch.exe
F:\Program Files\Nikon\NkView5\NkvMon.exe
F:\Program Files\Sony Corporation\Picture Package\Picture Package Menu\SonyTray.exe
F:\Program Files\Sony Corporation\Picture Package\Picture Package Applications\Residence.exe
F:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe
F:\WINDOWS\system32\svchost.exe
F:\utils\FirefoxPortable\App\firefox\firefox.exe
F:\Program Files\Spyware Doctor\pctsGui.exe
F:\Program Files\HijackThis\HijackThis.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: (no name) - AutorunsDisabled - (no file)
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - F:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {189A78B1-CEB8-45FD-9C12-4B9C8A965A58} - (no file)
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - F:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {7156D971-86B9-447F-BB5B-F3DF97A83F79} - (no file)
O2 - BHO: (no name) - {E0026215-403B-41C2-8874-BD288321446C} - (no file)
O4 - HKLM\..\Run: [HP Software Update] "F:\Program Files\HP\HP Software Update\HPWuSchd2.exe"
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [QuickTime Task] "F:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [NvCplDaemon] "RUNDLL32.EXE" F:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] "nwiz.exe" /install
O4 - HKLM\..\Run: [NvMediaCenter] "RUNDLL32.EXE" F:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "F:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "F:\Program Files\Java\jre1.5.0_01\bin\jusched.exe"
O4 - HKLM\..\Run: [nod32kui] "F:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
O4 - HKLM\..\Run: [ISTray] "F:\Program Files\Spyware Doctor\pctsTray.exe"
O4 - HKCU\..\Run: [CTFMON.EXE] F:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] "F:\Program Files\Spybot - Search & Destroy\TeaTimer.exe"
O4 - HKCU\..\Run: [SUPERAntiSpyware] "F:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"
O4 - Global Startup: FotoStation Easy AutoLaunch.lnk = ?
O4 - Global Startup: NkvMon.exe.lnk = F:\Program Files\Nikon\NkView5\NkvMon.exe
O4 - Global Startup: Picture Package Menu.lnk = ?
O4 - Global Startup: Picture Package VCD Maker.lnk = ?
O4 - Global Startup: Service Manager.lnk = F:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://F:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - AutorunsDisabled - (no file)
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - F:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - F:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - F:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - F:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - F:\PROGRA~1\SPYBOT~1\SDHelper.dll
O11 - Options group: [INTERNATIONAL] International*
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cab
O16 - DPF: {BDBDE413-7B1C-4C68-A8FF-C5B2B4090876} (F-Secure Online Scanner 3.3) - http://support.f-secure.com/ols/fscax.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - F:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
O18 - Filter hijack: text/xml - {807563E5-5146-11D5-A672-00B0D022E945} - F:\PROGRA~1\COMMON~1\MICROS~1\OFFICE12\MSOXMLMF.DLL
O20 - Winlogon Notify: !SASWinLogon - F:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O20 - Winlogon Notify: mlJbArpP - F:\WINDOWS\
O20 - Winlogon Notify: WgaLogon - F:\WINDOWS\SYSTEM32\WgaLogon.dll
O20 - Winlogon Notify: WinCtrl32 - F:\WINDOWS\SYSTEM32\WinCtrl32.dll
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - F:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: C-DillaCdaC11BA - Macrovision - F:\WINDOWS\system32\drivers\CDAC11BA.EXE
O23 - Service: Microsoft security update service (msupdate) - Unknown owner - f:\windows\system32\mssrv32.exe
O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - F:\Program Files\Eset\nod32krn.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - F:\WINDOWS\system32\nvsvc32.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - F:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - F:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Borland Socket server (SocketServer) - Borland Software Corporation - F:\Program Files\Logiciel\eCM\scktsrvr.exe
0
Comments
First of all, you are not running the correct version of HijackThis.
Please delete the one you have now.
Then:
Download HJTInstall.exe to your Desktop.
* Doubleclick HJTInstall.exe to install it.
* By default it will install to C:\Program Files\Trend Micro\HijackThis .
* Click on Install.
* It will create a HijackThis icon on the desktop.
* Once installed, it will launch Hijackthis.
* Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad.
* Post the log in your new reply.
Note:
1) Don't use the Analyse This button, its findings are dangerous if misinterpreted.
2) Don't have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.
Pasting logs below:
Malwarebytes' Anti-Malware 1.14
Database version: 829
4:52:47 μμ 8/6/2008
mbam-log-6-8-2008 (16-52-47).txt
Scan type: Quick Scan
Objects scanned: 38406
Time elapsed: 1 minute(s), 20 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 5
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 3
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
F:\WINDOWS\system32\WinCtrl32.dll (Trojan.Agent) -> Unloaded module successfully.
Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\winctrl32 (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\msupdate (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\msupdate (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\nmwegbsf.btqp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\nmwegbsf.toolbar.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Registry Values Infected:
(No malicious items detected)
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
(No malicious items detected)
Files Infected:
F:\WINDOWS\system32\WinCtrl32.dll (Trojan.Agent) -> Delete on reboot.
F:\WINDOWS\system32\Process.exe (Trojan.Agent) -> Quarantined and deleted successfully.
F:\WINDOWS\system32\mssrv32.exe (Rootkit.Agent) -> Delete on reboot.
Finally, Hijackthis after all the cleaning:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 17:29:21, on 8/6/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16640)
Boot mode: Normal
Running processes:
F:\WINDOWS\System32\smss.exe
F:\WINDOWS\system32\winlogon.exe
F:\WINDOWS\system32\services.exe
F:\WINDOWS\system32\lsass.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\System32\svchost.exe
F:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
F:\WINDOWS\system32\spoolsv.exe
F:\Program Files\HP\HP Software Update\HPWuSchd2.exe
F:\WINDOWS\RTHDCPL.EXE
F:\WINDOWS\system32\RUNDLL32.EXE
F:\Program Files\Java\jre1.5.0_01\bin\jusched.exe
F:\Program Files\Eset\nod32kui.exe
F:\WINDOWS\system32\ctfmon.exe
F:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
F:\Program Files\FotoStation Easy\FotoStation Easy AutoLaunch.exe
F:\Program Files\Nikon\NkView5\NkvMon.exe
F:\Program Files\Sony Corporation\Picture Package\Picture Package Menu\SonyTray.exe
F:\Program Files\Sony Corporation\Picture Package\Picture Package Applications\Residence.exe
F:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe
F:\WINDOWS\system32\drivers\CDAC11BA.EXE
F:\WINDOWS\system32\svchost.exe
F:\Program Files\Microsoft SQL Server\MSSQL\Binn\sqlservr.exe
F:\Program Files\Eset\nod32krn.exe
F:\WINDOWS\system32\nvsvc32.exe
F:\Program Files\Logiciel\eCM\scktsrvr.exe
F:\WINDOWS\system32\wuauclt.exe
F:\WINDOWS\explorer.exe
F:\WINDOWS\system32\notepad.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\system32\imapi.exe
F:\utils\FirefoxPortable\App\firefox\firefox.exe
F:\Program Files\Malwarebytes' Anti-Malware\mbam.exe
F:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: (no name) - AutorunsDisabled - (no file)
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - F:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {189A78B1-CEB8-45FD-9C12-4B9C8A965A58} - (no file)
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - F:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {7156D971-86B9-447F-BB5B-F3DF97A83F79} - (no file)
O2 - BHO: (no name) - {E0026215-403B-41C2-8874-BD288321446C} - (no file)
O4 - HKLM\..\Run: [HP Software Update] "F:\Program Files\HP\HP Software Update\HPWuSchd2.exe"
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [QuickTime Task] "F:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [NvCplDaemon] "RUNDLL32.EXE" F:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] "nwiz.exe" /install
O4 - HKLM\..\Run: [NvMediaCenter] "RUNDLL32.EXE" F:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "F:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "F:\Program Files\Java\jre1.5.0_01\bin\jusched.exe"
O4 - HKLM\..\Run: [nod32kui] "F:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
O4 - HKCU\..\Run: [CTFMON.EXE] F:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] "F:\Program Files\Spybot - Search & Destroy\TeaTimer.exe"
O4 - HKCU\..\Run: [SUPERAntiSpyware] "F:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] F:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] F:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] F:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] F:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: FotoStation Easy AutoLaunch.lnk = ?
O4 - Global Startup: NkvMon.exe.lnk = F:\Program Files\Nikon\NkView5\NkvMon.exe
O4 - Global Startup: Picture Package Menu.lnk = ?
O4 - Global Startup: Picture Package VCD Maker.lnk = ?
O4 - Global Startup: Service Manager.lnk = F:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://F:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - AutorunsDisabled - (no file)
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - F:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - F:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - F:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - F:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - F:\PROGRA~1\SPYBOT~1\SDHelper.dll
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cab
O16 - DPF: {BDBDE413-7B1C-4C68-A8FF-C5B2B4090876} (F-Secure Online Scanner 3.3) - http://support.f-secure.com/ols/fscax.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab
O20 - Winlogon Notify: !SASWinLogon - F:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O20 - Winlogon Notify: mlJbArpP - F:\WINDOWS\
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - F:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: C-DillaCdaC11BA - Macrovision - F:\WINDOWS\system32\drivers\CDAC11BA.EXE
O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - F:\Program Files\Eset\nod32krn.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - F:\WINDOWS\system32\nvsvc32.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - F:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - F:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Borland Socket server (SocketServer) - Borland Software Corporation - F:\Program Files\Logiciel\eCM\scktsrvr.exe
O24 - Desktop Component 0: Privacy Protection - (no file)
Please visit this webpage for download links, and instructions for running ComboFix
When the tool is finished, it will produce a report for you. Please copy and paste the "C:\ComboFix.txt" along with a new 'HijackThis' log so that we can continue to do any further cleaning that your system may require.
NOTE: Combofix prevents autorun of all CDs, floppies and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you - please let me know.
ComboFix 08-06-07.3 - Diaman 2008-06-09 13:52:35.3 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1253.1.1033.18.1624 [GMT 3:00]
Running from: F:\utils\ComboFix.exe
Command switches used :: F:\utils\CFScript-2.txt
* Created a new restore point
* Resident AV is active
FILE ::
F:\WINDOWS\eaps.exe
F:\WINDOWS\system32\phc788j0e98v.bmp
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
F:\Documents and Settings\Diaman\Application Data\shc188j0e98v
F:\WINDOWS\eaps.exe
F:\WINDOWS\system32\phc788j0e98v.bmp
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
\Legacy_WINBG40
\Legacy_WINEJ27
\Service_Winaf27
\Service_Winbg40
\Service_Windi62
\Service_Winej27
\Service_Winjo27
\Service_Winos61
\Service_Winqv16
\Service_Winqv72
\Service_Winua04
\Service_Winwc40
((((((((((((((((((((((((( Files Created from 2008-05-09 to 2008-06-09 )))))))))))))))))))))))))))))))
.
2008-06-08 18:10 . 2008-06-08 18:10 0 --a
F:\WINDOWS\nsreg.dat
2008-06-08 16:40 . 2008-06-08 16:40 <DIR> d
F:\Program Files\Trend Micro
2008-06-06 00:19 . 2005-08-25 18:19 115,920 --a
F:\WINDOWS\system32\MSINET.OCX
2008-06-06 00:18 . 2008-06-06 00:19 <DIR> d
F:\Program Files\SpywareBlaster
2008-06-06 00:05 . 2008-06-06 00:05 <DIR> d
F:\WINDOWS\ERUNT
2008-06-05 22:43 . 2008-06-05 22:43 <DIR> d
F:\Program Files\Malwarebytes' Anti-Malware
2008-06-05 22:43 . 2008-06-05 22:43 <DIR> d
F:\Documents and Settings\Diaman\Application Data\Malwarebytes
2008-06-05 22:43 . 2008-06-05 22:43 <DIR> d
F:\Documents and Settings\All Users\Application Data\Malwarebytes
2008-06-05 22:43 . 2008-05-30 01:06 34,296 --a
F:\WINDOWS\system32\drivers\mbamcatchme.sys
2008-06-05 22:43 . 2008-05-30 01:06 15,864 --a
F:\WINDOWS\system32\drivers\mbam.sys
2008-06-05 21:29 . 2007-09-06 00:22 289,144 --a
F:\WINDOWS\system32\VCCLSID.exe
2008-06-05 21:29 . 2006-04-27 17:49 288,417 --a
F:\WINDOWS\system32\SrchSTS.exe
2008-06-05 21:29 . 2008-05-29 09:35 86,528 --a
F:\WINDOWS\system32\VACFix.exe
2008-06-05 21:29 . 2008-05-18 21:40 82,944 --a
F:\WINDOWS\system32\IEDFix.exe
2008-06-05 21:29 . 2008-05-18 21:40 82,944 --a
F:\WINDOWS\system32\404Fix.exe
2008-06-05 21:29 . 2004-07-31 18:50 51,200 --a
F:\WINDOWS\system32\dumphive.exe
2008-06-05 21:29 . 2007-10-04 00:36 25,600 --a
F:\WINDOWS\system32\WS2Fix.exe
2008-06-05 21:09 . 2008-06-05 21:08 512,096 --a
F:\WINDOWS\system32\drivers\amon.sys
2008-06-05 21:09 . 2008-06-05 21:08 298,104 --a
F:\WINDOWS\system32\imon.dll
2008-06-05 21:09 . 2008-06-05 21:08 15,424 --a
F:\WINDOWS\system32\drivers\nod32drv.sys
2008-06-05 21:08 . 2008-06-05 21:18 <DIR> d
F:\Program Files\ESET
2008-06-05 21:00 . 2008-06-08 17:04 <DIR> d
F:\Program Files\Spyware Doctor
2008-06-05 21:00 . 2008-06-05 21:00 <DIR> d
F:\Documents and Settings\Diaman\Application Data\PC Tools
2008-06-05 21:00 . 2007-12-10 13:53 81,288 --a
F:\WINDOWS\system32\drivers\iksyssec.sys
2008-06-05 21:00 . 2007-12-10 13:53 66,952 --a
F:\WINDOWS\system32\drivers\iksysflt.sys
2008-06-05 21:00 . 2008-02-01 11:55 42,376 --a
F:\WINDOWS\system32\drivers\ikfilesec.sys
2008-06-05 21:00 . 2007-12-10 13:53 29,576 --a
F:\WINDOWS\system32\drivers\kcom.sys
2008-06-05 20:38 . 2008-06-05 20:39 <DIR> d
F:\Documents and Settings\All Users\Application Data\Lavasoft
2008-06-05 20:35 . 2008-06-05 20:35 <DIR> d
F:\Deckard
2008-06-05 20:34 . 2008-06-05 20:34 106 --a
F:\delete.bat
2008-06-05 20:07 . 2008-06-05 20:33 <DIR> d
F:\WINDOWS\BDOSCAN8
2008-06-05 18:52 . 2008-06-05 18:52 <DIR> d
F:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com
2008-06-05 18:35 . 2008-06-08 18:05 <DIR> d
F:\Program Files\SUPERAntiSpyware
2008-06-05 18:35 . 2008-06-08 18:05 <DIR> d
F:\Documents and Settings\Diaman\Application Data\SUPERAntiSpyware.com
2008-06-05 18:35 . 2008-06-05 18:35 <DIR> d
F:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
2008-06-05 18:25 . 2008-06-05 21:30 3,428 --a
F:\WINDOWS\system32\tmp.reg
2008-06-05 17:55 . 2008-06-05 17:54 102,664 --a
F:\WINDOWS\system32\drivers\tmcomm.sys
2008-06-05 17:54 . 2008-06-05 18:16 <DIR> d
F:\Documents and Settings\Diaman\.housecall6.6
2008-06-05 17:53 . 2008-06-09 13:52 <DIR> d
F:\utils
2008-06-05 17:52 . 2008-06-05 17:52 <DIR> d
F:\WINDOWS\Sun
2008-06-05 17:48 . 2004-12-06 21:31 49,265 --a
F:\WINDOWS\system32\jpicpl32.cpl
2008-06-05 17:47 . 2008-06-05 17:48 <DIR> d
F:\Program Files\Java
2008-06-05 17:47 . 2008-06-05 17:47 <DIR> d
F:\Program Files\Common Files\Java
2008-06-05 16:38 . 2008-06-08 17:20 <DIR> d-a
F:\Documents and Settings\All Users\Application Data\TEMP
2008-06-05 16:35 . 2008-06-05 16:35 78,240 --a
F:\WINDOWS\system32\drivers\FILEM701.SYS
2008-06-05 16:20 . 2008-06-05 16:20 <DIR> d
F:\Documents and Settings\Administrator
2008-06-05 15:53 . 2008-06-08 18:03 <DIR> d
F:\Program Files\Spybot - Search & Destroy
2008-06-05 15:53 . 2008-06-08 18:02 <DIR> d
F:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-06-06 11:26
d
w F:\Documents and Settings\Diaman\Application Data\U3
2008-06-06 11:06
d
w F:\Program Files\FotoStation Easy
2008-05-06 17:47
d
w F:\Documents and Settings\Diaman\Application Data\Apple Computer
2008-04-14 09:22
d
w F:\Program Files\Engineering Solutions
.
((((((((((((((((((((((((((((( snapshot@2008-06-08_17.24.41.32 )))))))))))))))))))))))))))))))))))))))))
.
- 2008-06-08 14:23:14 2,048 --s-a-w F:\WINDOWS\bootstat.dat
+ 2008-06-09 10:55:02 2,048 --s-a-w F:\WINDOWS\bootstat.dat
+ 2008-03-25 03:21:18 2,889,088 ----a-w F:\WINDOWS\system32\Macromed\Flash\NPSWF32.dll
+ 2008-03-25 03:21:20 218,496 ----a-w F:\WINDOWS\system32\Macromed\Flash\NPSWF32_FlashUtil.exe
+ 2008-06-08 16:06:55 70,264 ----a-w F:\WINDOWS\system32\Macromed\Flash\uninstall_plugin.exe
+ 2008-06-09 10:55:17 16,384 ----atw F:\WINDOWS\Temp\Perflib_Perfdata_750.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="F:\WINDOWS\system32\ctfmon.exe" [2004-08-04 15:00 15360]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"HP Software Update"="F:\Program Files\HP\HP Software Update\HPWuSchd2.exe" [2005-02-17 00:11 49152]
"RTHDCPL"="RTHDCPL.EXE" [2007-04-12 12:33 16132608 F:\WINDOWS\RTHDCPL.exe]
"QuickTime Task"="F:\Program Files\QuickTime\qttask.exe" [2007-06-29 07:24 286720]
"NvCplDaemon"="RUNDLL32.exe" [2004-08-04 15:00 33280 F:\WINDOWS\system32\rundll32.exe]
"nwiz"="nwiz.exe" [2007-10-05 16:25 1626112 F:\WINDOWS\system32\nwiz.exe]
"NvMediaCenter"="RUNDLL32.exe" [2004-08-04 15:00 33280 F:\WINDOWS\system32\rundll32.exe]
"Adobe Reader Speed Launcher"="F:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 23:16 39792]
"SunJavaUpdateSched"="F:\Program Files\Java\jre1.5.0_01\bin\jusched.exe" [2004-12-06 21:31 36975]
"nod32kui"="F:\Program Files\Eset\nod32kui.exe" [2008-06-05 21:08 949376]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="F:\WINDOWS\system32\CTFMON.EXE" [2004-08-04 15:00 15360]
F:\Documents and Settings\All Users\Start Menu\Programs\Startup\
FotoStation Easy AutoLaunch.lnk - F:\Program Files\FotoStation Easy\FotoStation Easy AutoLaunch.exe [2008-02-01 13:15:36 49152]
NkvMon.exe.lnk - F:\Program Files\Nikon\NkView5\NkvMon.exe [2008-02-01 13:15:11 233472]
Picture Package Menu.lnk - F:\Program Files\Sony Corporation\Picture Package\Picture Package Menu\SonyTray.exe [2008-02-01 11:13:38 151552]
Picture Package VCD Maker.lnk - F:\Program Files\Sony Corporation\Picture Package\Picture Package Applications\Residence.exe [2008-02-01 11:13:35 106496]
Service Manager.lnk - F:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe [2002-12-17 18:23:32 74308]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WebrootSpySweeperService]
@=""
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"F:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
R2 SocketServer;Borland Socket server;F:\Program Files\Logiciel\eCM\scktsrvr.exe [2007-04-04 16:50]
S3 gdrv;gdrv;F:\WINDOWS\gdrv.sys [2007-11-12 16:22]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc
.
**************************************************************************
catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-06-09 13:55:15
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
.
Other Running Processes
.
F:\WINDOWS\system32\drivers\CDAC11BA.EXE
F:\Program Files\Microsoft SQL Server\MSSQL\Binn\sqlservr.exe
F:\Program Files\ESET\nod32krn.exe
F:\WINDOWS\system32\nvsvc32.exe
.
**************************************************************************
.
Completion time: 2008-06-09 13:56:42 - machine was rebooted [Diaman]
ComboFix-quarantined-files.txt 2008-06-09 10:56:40
ComboFix2.txt 2008-06-08 14:24:52
Pre-Run: 7,834,357,760 bytes free
Post-Run: 7,828,860,928 bytes free
158 --- E O F --- 2008-05-28 11:49:56
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 14:07:39, on 9/6/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16640)
Boot mode: Normal
Running processes:
F:\WINDOWS\System32\smss.exe
F:\WINDOWS\system32\winlogon.exe
F:\WINDOWS\system32\services.exe
F:\WINDOWS\system32\lsass.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\System32\svchost.exe
F:\WINDOWS\system32\spoolsv.exe
F:\Program Files\HP\HP Software Update\HPWuSchd2.exe
F:\WINDOWS\RTHDCPL.EXE
F:\WINDOWS\system32\RUNDLL32.EXE
F:\Program Files\Java\jre1.5.0_01\bin\jusched.exe
F:\Program Files\Eset\nod32kui.exe
F:\WINDOWS\system32\ctfmon.exe
F:\Program Files\FotoStation Easy\FotoStation Easy AutoLaunch.exe
F:\Program Files\Nikon\NkView5\NkvMon.exe
F:\Program Files\Sony Corporation\Picture Package\Picture Package Menu\SonyTray.exe
F:\Program Files\Sony Corporation\Picture Package\Picture Package Applications\Residence.exe
F:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe
F:\WINDOWS\system32\drivers\CDAC11BA.EXE
F:\WINDOWS\system32\svchost.exe
F:\Program Files\Microsoft SQL Server\MSSQL\Binn\sqlservr.exe
F:\Program Files\Eset\nod32krn.exe
F:\WINDOWS\system32\nvsvc32.exe
F:\Program Files\Logiciel\eCM\scktsrvr.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\explorer.exe
F:\Program Files\Mozilla Firefox\firefox.exe
F:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://portal.tee.gr/portal/page/portal/TEE_HOME
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: (no name) - AutorunsDisabled - (no file)
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - F:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O4 - HKLM\..\Run: [HP Software Update] "F:\Program Files\HP\HP Software Update\HPWuSchd2.exe"
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [QuickTime Task] "F:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [NvCplDaemon] "RUNDLL32.EXE" F:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] "nwiz.exe" /install
O4 - HKLM\..\Run: [NvMediaCenter] "RUNDLL32.EXE" F:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "F:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "F:\Program Files\Java\jre1.5.0_01\bin\jusched.exe"
O4 - HKLM\..\Run: [nod32kui] "F:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
O4 - HKCU\..\Run: [CTFMON.EXE] F:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] F:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] F:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] F:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] F:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: FotoStation Easy AutoLaunch.lnk = ?
O4 - Global Startup: NkvMon.exe.lnk = F:\Program Files\Nikon\NkView5\NkvMon.exe
O4 - Global Startup: Picture Package Menu.lnk = ?
O4 - Global Startup: Picture Package VCD Maker.lnk = ?
O4 - Global Startup: Service Manager.lnk = F:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://F:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - AutorunsDisabled - (no file)
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - F:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - F:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - F:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cab
O16 - DPF: {BDBDE413-7B1C-4C68-A8FF-C5B2B4090876} (F-Secure Online Scanner 3.3) - http://support.f-secure.com/ols/fscax.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O23 - Service: C-DillaCdaC11BA - Macrovision - F:\WINDOWS\system32\drivers\CDAC11BA.EXE
O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - F:\Program Files\Eset\nod32krn.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - F:\WINDOWS\system32\nvsvc32.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - F:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - F:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Borland Socket server (SocketServer) - Borland Software Corporation - F:\Program Files\Logiciel\eCM\scktsrvr.exe
O24 - Desktop Component 0: Privacy Protection - (no file)
--
End of file - 5451 bytes
O2 - BHO: (no name) - AutorunsDisabled - (no file)
O9 - Extra button: (no name) - AutorunsDisabled - (no file)
O24 - Desktop Component 0: Privacy Protection - (no file)
Close all other windows except HijackThis and press "Fix checked". Then close HijackThis and reboot the computer.
Please run Panda ActiveScan.
Then restart the computer again, and run Panda ActiveScan.
Thanks alot for all your help, it is much appreciated!
This topic is now closed. If you wish it reopened, please send a Private Message to Trogan with a link to your thread.
If you are not the user who started this thread, you must start your own Thread instead (grin)
Meanwhile nexxer, please do the following....
This will clear away any of the files and folders that were created by ComboFix.
Go to :
Start > Run then copy and paste the following highlighted text below and click OK.
Finally,
I will now post a number of recommendations for additional protection to help prevent any malware infections in the future. These few simple steps can stave off the vast majority of malware problems.
You may have already taken some of these steps:
1. Watch what you download!
Do not download just anything you see on the web. Some may have spyware bundled into them.
2. Try not to use peer-to-peer programs.
P2P programs like Grokster, Imesh, Kazaa and others are amongst the most notorious, come with an enormous amount of bundled spyware that will eat system resources, slow down your system, clash with other installed software, or just plain crash your browser or even Windows itself. If you insist on using a P2P program, please read this article at MalwareRemoval.com. It is an updated and comprehensive article that gives in-depth detail about which P2P programs are "safe" to use.
3. Visit Windows Update:
Make sure that you have all the Critical Updates recommended for your operating system and IE. The first defense against infection is a properly patched OS.
Windows Update: http://v4.windowsupdate.microsoft.com/en/default.asp
If Automatic Updates is turned off, please turn it on.
4. Adjust your security settings for ActiveX:
Go to Internet Options/Security/Internet, press 'default level', then OK.
Now press "Custom Level."
In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to 'prompt', and 'Initialize and Script ActiveX controls not marked as safe" to 'disable'.
So why is ActiveX so dangerous that you have to increase the security for it?
When your browser runs an activex control, it is running an executable program. It's no different from doubleclicking an exe file on your hard drive. Would you run just any random file downloaded off a web site without knowing what it is and what it does?
5. Download and install the following free programs:
a. SpywareBlaster: http://www.javacoolsoftware.com/spywareblaster.html
b. SpywareGuard: http://www.javacoolsoftware.com/spywareguard.html
Periodically check for updates.
6. Use a firewall. If you don't have a firewall, I recommend the free version of ZoneAlarm. It is one of the most-used firewalls around the world, and is truly dependable.
Other alternatives are: Comodo firewall, Sunbelt Kerio firewall
A tutorial on understanding and using firewalls may be found here
7. IE-SPYAD puts over 5000 sites in your restricted zone, so you'll be protected when you visit innocent-looking sites that aren't actually innocent at all. Another good hosts program is mvpshosts. This little program packs a powerful punch as it block ads, banners, 3rd party Cookies, 3rd party page counters, web bugs, and many hijackers. For information on how to download and install, please read this tutorial.
8. You might consider installing Mozilla / Firefox. It has been said to be safer than Internet Explorer. Also it comes along with a good popup blocker.
http://www.mozilla.org/
9. Install spyware detection and removal programs:
SuperAntiSpyware:
http://www.superantispyware.com/downloadfi...ANTISPYWAREFREE
Spybot S&D:
http://www.safer-networking.org/en/download/index.html
Use SuperAntiSpyware and Spybot S&D to regularly scan your system for and remove many forms of spyware/malware.
10. Before using or purchasing any Spyware/Malware protection/removal program, always check the Rogue/Suspect Spyware List. It will save you a lot of grief, as well as money if you are thinking of purchasing. Here is the link: http://www.spywarewarrior.com/rogue_anti-spyware.htm
If you want to know just how effective your anti-spyware program is, or how well any of the "rogue" programs listed at the above link work, check this for an independent comparison of several anti-spyware programs: http://www.spywarewarrior.com/asw-test-guide.htm
11. If I have helped you, you may consider donating a sum of money through Paypal to parasite@parasitedb.com to keep up my efforts. Note that this is entirely voluntary, and have no bearing on any future help that you may require.
12. You may also consider Joining Team 93 and fold for a cure.
Good luck, and happy and safe surfing!