Backdoor.win32.ultimatedefender.be - HELP

Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

makomyday325

Thread Starter
Joined
Jul 19, 2005
Messages
96
Infected by a new trojan. Kaspersky doesn't even have it listed and cannot disinfect it.
Please help. Below is the Hijack this results:

Logfile of HijackThis v1.99.1
Scan saved at 8:05:18 AM, on 10/10/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
C:\WINDOWS\System32\CTsvcCDA.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\PROGRA~1\Dantz\RETROS~1\retrorun.exe
C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe
C:\Program Files\internet explorer\iexplore.exe
C:\Program Files\internet explorer\iexplore.exe
C:\Program Files\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.myway.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll (file missing)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O2 - BHO: (no name) - {AA58ED58-01DD-4d91-8333-CF10577473F7} - (no file)
O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe"
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Web Anti-Virus statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\SCIEPlgn.dll
O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O11 - Options group: [INTERNATIONAL] International*
O16 - DPF: {0742B9EF-8C83-41CA-BFBA-830A59E23533} -
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?LinkId=39204&clcid=0x409
O16 - DPF: {193C772A-87BE-4B19-A7BB-445B226FE9A1} (ewidoOnlineScan Control) - http://download.ewido.net/ewidoOnlineScan.cab
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedContent/vc/bin/AvSniff.cab
O16 - DPF: {3DCEC959-378A-4922-AD7E-FD5C925D927F} (Disney Online Games ActiveX Control) - http://disney.go.com/pirates/online/testActiveX/built/signed/DisneyOnlineGames.cab
O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://www.yorkphoto.com/YorkActivia.cab
O16 - DPF: {42C9E5EE-DA49-49B4-8ECC-1CAB1C51A2AB} (HomePrintingCtrl Class) - http://www.kodakgallery.com/downloads/hmpr/HMPR_WIN_IE_1/wiaaut.cab
O16 - DPF: {549F957E-2F89-11D6-8CFE-00C04F52B225} (CMV5 Class) - http://coupons.smartsource.com/download/cscmv5X.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedContent/common/bin/cabsa.cab
O16 - DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} (Symantec Download Manager) - https://webdl.symantec.com/activex/symdlmgr.cab
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1134104301203
O16 - DPF: {6F750202-1362-4815-A476-88533DE61D0C} (Kodak Gallery Easy Upload Manager Class) - http://www.kodakgallery.com/downloads/BUM/BUM_WIN_IE_2/axofupld.cab
O16 - DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} (Groove Control) - http://www.nick.com/common/groove/gx/GrooveAX27.cab
O16 - DPF: {78AF2F24-A9C3-11D3-BF8C-0060B0FCC122} (AcDcToday Control) - file://C:\Program Files\MDT5\AcDcToday.ocx
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.com/activescan/as5/asinst.cab
O16 - DPF: {A662DA7E-CCB7-4743-B71A-D817F6D575DF} - http://www.nassaucountyny.gov/mynassauproperty/autodesk/DwfViewerSetup.exe
O16 - DPF: {C6637286-300D-11D4-AE0A-0010830243BD} (InstaFred Control) - file://C:\Program Files\MDT5\InstFred.ocx
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - https://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
O16 - DPF: {F281A59C-7B65-11D3-8617-0010830243BD} (AcPreview Control) - file://C:\Program Files\MDT5\AcPreview.ocx
O18 - Protocol: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\GAPlugProtocol-8876480.dll
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O20 - Winlogon Notify: dimsntfy - %SystemRoot%\System32\dimsntfy.dll (file missing)
O20 - Winlogon Notify: klogon - C:\WINDOWS\system32\klogon.dll
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
O23 - Service: Kaspersky Anti-Virus 7.0 (AVP) - Unknown owner - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe" -r (file missing)
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\System32\CTsvcCDA.exe
O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe
O23 - Service: Intel NCS NetService (NetSvc) - Intel(R) Corporation - C:\Program Files\Intel\NCS\Sync\NetSvc.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: Retrospect Launcher (RetroLauncher) - Dantz Development Corporation - C:\PROGRA~1\Dantz\RETROS~1\retrorun.exe
O23 - Service: Retrospect Helper - Dantz Development Corporation - C:\Program Files\Dantz\Retrospect\rthlpsvc.exe
O23 - Service: Retrospect WD Service (RetroWDSvc) - Dantz Development Corporation - C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
O23 - Service: Symantec Core LC - Unknown owner - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe

:mad:
 

cybertech

Retired Moderator
Joined
Apr 16, 2002
Messages
72,115
Run HJT again and put a check in the following:

O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: (no name) - {AA58ED58-01DD-4d91-8333-CF10577473F7} - (no file)
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O16 - DPF: {549F957E-2F89-11D6-8CFE-00C04F52B225} (CMV5 Class) - http://coupons.smartsource.com/download/cscmv5X.cab
O18 - Protocol: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\GAPlugProtocol-8876480.dll

Close all applications and browser windows before you click "fix checked".


What is Kaspersky finding?
 

makomyday325

Thread Starter
Joined
Jul 19, 2005
Messages
96
Ok, prior to your response & subsequent to my initial post, I downloaded "adwarealert" and ran a to remove the "backdoor" virus. It seemed to remove 480 infections, but I don't think it removed in full the specific trojan I'm infected with. I ran hijack this and checked off 3 of 5 lines you mentioned above (both 02 and 018) because line 06 & 016 must have been removed with the adwarealert software.

Below is a new HJT after I clicked "fix checked".


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 10:47:13 AM, on 10/13/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
C:\WINDOWS\System32\CTsvcCDA.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\PROGRA~1\Dantz\RETROS~1\retrorun.exe
C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe
C:\Program Files\AdwareAlert\AdwareAlert.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.myway.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll (file missing)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe"
O4 - HKCU\..\Run: [AdwareAlert] C:\Program Files\AdwareAlert\AdwareAlert.exe -boot
O4 - HKUS\S-1-5-18\..\Run: [Symantec Network Driver Update Warning] C:\PROGRA~1\Symantec\LIVEUP~1\SNDWarn.EXE (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\Run: [Symantec NetDriver Warning] C:\PROGRA~1\SYMNET~1\SNDWarn.exe (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\Run: [Norton SystemWorks] "C:\Program Files\Norton SystemWorks\cfgwiz.exe" /GUID {05858CFD-5CC4-4ceb-AAAF-CF00BF39736A} /MODE CfgWiz (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [SRUUninstall] "C:\WINDOWS\System32\msiexec.exe" /x {6AF90EF6-F7F9-466C-99F4-1774826FBB40} /qn REBOOT=ReallySuppress (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [Symantec Network Driver Update Warning] C:\PROGRA~1\Symantec\LIVEUP~1\SNDWarn.EXE (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [SRUUninstall] "C:\WINDOWS\System32\msiexec.exe" /x {6AF90EF6-F7F9-466C-99F4-1774826FBB40} /qn REBOOT=ReallySuppress (User 'Default user')
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Web Anti-Virus statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\SCIEPlgn.dll
O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0742B9EF-8C83-41CA-BFBA-830A59E23533} -
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?LinkId=39204&clcid=0x409
O16 - DPF: {193C772A-87BE-4B19-A7BB-445B226FE9A1} (ewidoOnlineScan Control) - http://download.ewido.net/ewidoOnlineScan.cab
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedContent/vc/bin/AvSniff.cab
O16 - DPF: {3DCEC959-378A-4922-AD7E-FD5C925D927F} (Disney Online Games ActiveX Control) - http://disney.go.com/pirates/online/testActiveX/built/signed/DisneyOnlineGames.cab
O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://www.yorkphoto.com/YorkActivia.cab
O16 - DPF: {42C9E5EE-DA49-49B4-8ECC-1CAB1C51A2AB} (HomePrintingCtrl Class) - http://www.kodakgallery.com/downloads/hmpr/HMPR_WIN_IE_1/wiaaut.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedContent/common/bin/cabsa.cab
O16 - DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} (Symantec Download Manager) - https://webdl.symantec.com/activex/symdlmgr.cab
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1134104301203
O16 - DPF: {6F750202-1362-4815-A476-88533DE61D0C} (Kodak Gallery Easy Upload Manager Class) - http://www.kodakgallery.com/downloads/BUM/BUM_WIN_IE_2/axofupld.cab
O16 - DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} (Groove Control) - http://www.nick.com/common/groove/gx/GrooveAX27.cab
O16 - DPF: {78AF2F24-A9C3-11D3-BF8C-0060B0FCC122} (AcDcToday Control) - file://C:\Program Files\MDT5\AcDcToday.ocx
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.com/activescan/as5/asinst.cab
O16 - DPF: {A662DA7E-CCB7-4743-B71A-D817F6D575DF} - http://www.nassaucountyny.gov/mynassauproperty/autodesk/DwfViewerSetup.exe
O16 - DPF: {C6637286-300D-11D4-AE0A-0010830243BD} (InstaFred Control) - file://C:\Program Files\MDT5\InstFred.ocx
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - https://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
O16 - DPF: {F281A59C-7B65-11D3-8617-0010830243BD} (AcPreview Control) - file://C:\Program Files\MDT5\AcPreview.ocx
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Kaspersky Anti-Virus 7.0 (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\System32\CTsvcCDA.exe
O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe
O23 - Service: Intel NCS NetService (NetSvc) - Intel(R) Corporation - C:\Program Files\Intel\NCS\Sync\NetSvc.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: Retrospect Launcher (RetroLauncher) - Dantz Development Corporation - C:\PROGRA~1\Dantz\RETROS~1\retrorun.exe
O23 - Service: Retrospect Helper - Dantz Development Corporation - C:\Program Files\Dantz\Retrospect\rthlpsvc.exe
O23 - Service: Retrospect WD Service (RetroWDSvc) - Dantz Development Corporation - C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
O23 - Service: Symantec Core LC - Unknown owner - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
O24 - Desktop Component 0: Privacy Protection - (no file)

--
End of file - 8484 bytes
 

~Candy~

Retired Administrator
Joined
Jan 27, 2001
Messages
103,706
I don't think adaware alert is a recommended program. I saw your other post where you mentioned regcure, I believe. You need to dump that as anything that "cleans" your registry usually breaks something.
 

makomyday325

Thread Starter
Joined
Jul 19, 2005
Messages
96
Thanks for your advice. I'll wait for Cybertech's reply, clean up this trojan and then dump the regcure software. or, are you taking over for Cybertech? If so, what next?
 

~Candy~

Retired Administrator
Joined
Jan 27, 2001
Messages
103,706
Nope, she'll be back. Those were just my observations :)
 

cybertech

Retired Moderator
Joined
Apr 16, 2002
Messages
72,115
Adaware alert was previously listed on the rogue list, but has been removed. I still would not use it. There are many other products you could use.

I agree with Candy on the registry cleaners. I would stay away from those as well.

Please download ATF Cleaner by Atribune.

  • Double-click ATF-Cleaner.exe to run the program.
  • Under Main choose: Select All
  • Click the Empty Selected button.

Click Exit on the Main menu to close the program.




Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1 alternate download link 2
  • Make sure you are connected to the Internet.
  • Double-click on Download_mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Quick Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply with a new hijackthis log.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.
 

makomyday325

Thread Starter
Joined
Jul 19, 2005
Messages
96
Thanks,

The Mbam log is as follows:


Malwarebytes' Anti-Malware 1.28
Database version: 1267
Windows 5.1.2600 Service Pack 3

10/14/2008 12:01:34 AM
mbam-log-2008-10-14 (00-01-34).txt

Scan type: Quick Scan
Objects scanned: 56147
Time elapsed: 4 minute(s), 39 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 3
Registry Keys Infected: 10
Registry Values Infected: 3
Registry Data Items Infected: 0
Folders Infected: 28
Files Infected: 13

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\Program Files\AdwareAlert\SpyCleaner.dll (Rogue.AdwareAlert) -> Delete on reboot.
C:\Program Files\AdwareAlert\TCL.dll (Rogue.AdwareAlert) -> Delete on reboot.
C:\Program Files\AdwareAlert\zlib.dll (Rogue.AdwareAlert) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{755c6bc2-a679-4025-84d3-4ae283a87b14} (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Installer\Features\cd526ce17ea2dd64f830011ae22b293c (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Installer\Products\cd526ce17ea2dd64f830011ae22b293c (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Installer\UpgradeCodes\7c673a5b871b8cd419f47dd0de5a6d18 (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{daed9266-8c28-4c1c-8b58-5c66eff1d302} (Search.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\7c673a5b871b8cd419f47dd0de5a6d18 (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ControlPanel\NameSpace\{755c6bc2-a679-4025-84d3-4ae283a87b14} (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\9ee2330ae5f4470cac801baac83818c9 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1ec625dc-2ae7-46dd-8f03-10a12eb292c3} (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\AdwareAlert (Rogue.AdwareAlert) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdwareAlert (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders\c:\program files\adwarealert\ (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders\c:\documents and settings\all users\start menu\programs\adwarealert\ (Rogue.AdwareAlert) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\AdwareAlert (Rogue.AdwareAlert) -> Delete on reboot.
C:\Documents and Settings\All Users\Start Menu\Programs\AdwareAlert (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul Dixxxxxxxx\Application Data\AdwareAlert (Rogue.AdwareAlert) -> Delete on reboot.
C:\Documents and Settings\Paul Dxxxxxxxxx\Application Data\AdwareAlert\Log (Rogue.AdwareAlert) -> Delete on reboot.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03 (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03 (Rogue.AdwareAlert) -> Files: 908 -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\192.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\xxxxxxxxxxxxxni\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\218.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\248.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\281.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\282.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\283.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\284.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\286.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\287.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\288.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\290.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\298.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\300.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\304.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\307.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\309.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\311.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application xxxa\xxxxxxxxert\Quarantine\13-10-2008-10-04-03\312.qit (Rogue.AdwareAlert) -> Quarxntined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\313.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\314.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Settings (Rogue.AdwareAlert) -> Quarantined and deleted successfully.

Files Infected:
C:\Program Files\AdwareAlert\AdwareAlert.exe (Rogue.AdwareAlert) -> Delete on reboot.
C:\Program Files\AdwareAlert\AdwareAlert.url (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Program Files\AdwareAlert\DataBase.ref (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Program Files\AdwareAlert\SpyCleaner.dll (Rogue.AdwareAlert) -> Delete on reboot.
C:\Program Files\AdwareAlert\TCL.dll (Rogue.AdwareAlert) -> Delete on reboot.
C:\Program Files\AdwareAlert\vistaCPtasks.xml (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Program Files\AdwareAlert\zlib.dll (Rogue.AdwareAlert) -> Delete on reboot.
C:\Documents and Settings\All Users\Start Menu\Programs\AdwareAlert\AdwareAlert on the Web.lnk (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\AdwareAlert\AdwareAlert.lnk (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\rs.dat (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul xxxxxxxxxxx\Application Data\AdwareAlert\Log\2008 Oct 13 - 08_39_05 PM_578.log (Rogue.AdwareAlert) -> Delete on reboot.
C:\WINDOWS\Tasks\AdwareAlert Scheduled Scan.job (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Desktop\AdwareAlert.lnk (Rogue.AdwareAlert) -> Quarantined and deleted successfully.


ALSO, my new hjt report is as follows:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:11:36 AM, on 10/14/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
C:\WINDOWS\System32\CTsvcCDA.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\PROGRA~1\Dantz\RETROS~1\retrorun.exe
C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.myway.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll (file missing)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe"
O4 - HKUS\S-1-5-18\..\Run: [Symantec Network Driver Update Warning] C:\PROGRA~1\Symantec\LIVEUP~1\SNDWarn.EXE (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\Run: [Symantec NetDriver Warning] C:\PROGRA~1\SYMNET~1\SNDWarn.exe (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\Run: [Norton SystemWorks] "C:\Program Files\Norton SystemWorks\cfgwiz.exe" /GUID {05858CFD-5CC4-4ceb-AAAF-CF00BF39736A} /MODE CfgWiz (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [SRUUninstall] "C:\WINDOWS\System32\msiexec.exe" /x {6AF90EF6-F7F9-466C-99F4-1774826FBB40} /qn REBOOT=ReallySuppress (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [Symantec Network Driver Update Warning] C:\PROGRA~1\Symantec\LIVEUP~1\SNDWarn.EXE (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [SRUUninstall] "C:\WINDOWS\System32\msiexec.exe" /x {6AF90EF6-F7F9-466C-99F4-1774826FBB40} /qn REBOOT=ReallySuppress (User 'Default user')
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Web Anti-Virus statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\SCIEPlgn.dll
O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0742B9EF-8C83-41CA-BFBA-830A59E23533} -
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?LinkId=39204&clcid=0x409
O16 - DPF: {193C772A-87BE-4B19-A7BB-445B226FE9A1} (ewidoOnlineScan Control) - http://download.ewido.net/ewidoOnlineScan.cab
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedContent/vc/bin/AvSniff.cab
O16 - DPF: {3DCEC959-378A-4922-AD7E-FD5C925D927F} (Disney Online Games ActiveX Control) - http://disney.go.com/pirates/online/testActiveX/built/signed/DisneyOnlineGames.cab
O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://www.yorkphoto.com/YorkActivia.cab
O16 - DPF: {42C9E5EE-DA49-49B4-8ECC-1CAB1C51A2AB} (HomePrintingCtrl Class) - http://www.kodakgallery.com/downloads/hmpr/HMPR_WIN_IE_1/wiaaut.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedContent/common/bin/cabsa.cab
O16 - DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} (Symantec Download Manager) - https://webdl.symantec.com/activex/symdlmgr.cab
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1134104301203
O16 - DPF: {6F750202-1362-4815-A476-88533DE61D0C} (Kodak Gallery Easy Upload Manager Class) - http://www.kodakgallery.com/downloads/BUM/BUM_WIN_IE_2/axofupld.cab
O16 - DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} (Groove Control) - http://www.nick.com/common/groove/gx/GrooveAX27.cab
O16 - DPF: {78AF2F24-A9C3-11D3-BF8C-0060B0FCC122} (AcDcToday Control) - file://C:\Program Files\MDT5\AcDcToday.ocx
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.com/activescan/as5/asinst.cab
O16 - DPF: {A662DA7E-CCB7-4743-B71A-D817F6D575DF} - http://www.nassaucountyny.gov/mynassauproperty/autodesk/DwfViewerSetup.exe
O16 - DPF: {C6637286-300D-11D4-AE0A-0010830243BD} (InstaFred Control) - file://C:\Program Files\MDT5\InstFred.ocx
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - https://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
O16 - DPF: {F281A59C-7B65-11D3-8617-0010830243BD} (AcPreview Control) - file://C:\Program Files\MDT5\AcPreview.ocx
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Kaspersky Anti-Virus 7.0 (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\System32\CTsvcCDA.exe
O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe
O23 - Service: Intel NCS NetService (NetSvc) - Intel(R) Corporation - C:\Program Files\Intel\NCS\Sync\NetSvc.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: Retrospect Launcher (RetroLauncher) - Dantz Development Corporation - C:\PROGRA~1\Dantz\RETROS~1\retrorun.exe
O23 - Service: Retrospect Helper - Dantz Development Corporation - C:\Program Files\Dantz\Retrospect\rthlpsvc.exe
O23 - Service: Retrospect WD Service (RetroWDSvc) - Dantz Development Corporation - C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
O23 - Service: Symantec Core LC - Unknown owner - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
O24 - Desktop Component 0: Privacy Protection - (no file)

--
End of file - 8354 bytes
 

cybertech

Retired Moderator
Joined
Apr 16, 2002
Messages
72,115
Run HJT again, Right click and Run as Administrator, put a check in the following:

O24 - Desktop Component 0: Privacy Protection - (no file)

Close all applications and browser windows before you click "fix checked".


Are you having any problems now?
 

makomyday325

Thread Starter
Joined
Jul 19, 2005
Messages
96
yes, can't run as administrator. When I right click the HJT shortcut, nothing happens. When I run the program, I don;t have any prompt to run as administrator. When I just scanned, I did get a line 024 as stated in your reply above, but when I clicked "fix checked" while exited from all applications & browsers, it did not get removed.

Sorry for being ignorant. Am I missing something?
 

cybertech

Retired Moderator
Joined
Apr 16, 2002
Messages
72,115
Don't worry about the run as administrator, my error. I was thinking you were using Vista.

Download SDFix and save it to your Desktop.

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix and remove some of its embedded files which may cause "unpredictable results".
  • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
  • Remember to re-enable the protection again afterwards before connecting to the Internet.

Double click SDFix.exe and choose Install to extract it to its own folder on the Desktop. Please then reboot your computer in Safe Mode by doing the following :
  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
  • Instead of Windows loading as normal, a menu with options should appear;
  • Select the first option, to run Windows in Safe Mode, then press "Enter".
  • Choose your usual account.
  • Open the c:\SDFix folder and double click RunThis.cmd to start the script.
  • Type Y to begin the script.
  • It will remove the Trojan Services then make some repairs to the registry and prompt you to press any key to Reboot.
  • Press any Key and it will restart the PC.
  • Your system will take longer that normal to restart as the fixtool will be running and removing files.
  • When the desktop loads the Fixtool will complete the removal and display Finished, then press any key to end the script and load your desktop icons.
  • Finally open the SDFix folder on your desktop and copy and paste the contents of the results file Report.txt back to the thread with a new HijackThis log.
 

makomyday325

Thread Starter
Joined
Jul 19, 2005
Messages
96
Well, it didn't go down exactly how you described it; however, below is the SDFix report:


SDFix: Version 1.235
Run by Paul xxxxxxxxxx on Thu 10/16/2008 at 12:17 AM

Microsoft Windows XP [Version 5.1.2600]
Running From: C:\SDFix

Checking Services :


Restoring Default Security Values
Restoring Default Hosts File

Rebooting


Checking Files :

Trojan Files Found:

C:\WINDOWS\SYSTEM32\ADDDL32.EXE - Deleted
C:\WINDOWS\SYSTEM32\ADDFB.EXE - Deleted
C:\WINDOWS\SYSTEM32\ADDJM32.EXE - Deleted
C:\WINDOWS\SYSTEM32\ADDLX32.EXE - Deleted
C:\WINDOWS\SYSTEM32\ADDND.EXE - Deleted
C:\WINDOWS\SYSTEM32\ADDPE32.EXE - Deleted
C:\WINDOWS\SYSTEM32\ADDQF.EXE - Deleted
C:\WINDOWS\SYSTEM32\ADDQQ.EXE - Deleted
C:\WINDOWS\SYSTEM32\ADDRP32.EXE - Deleted
C:\WINDOWS\SYSTEM32\ADDTU.EXE - Deleted
C:\WINDOWS\SYSTEM32\ADDVP32.EXE - Deleted
C:\WINDOWS\SYSTEM32\ADDZK32.EXE - Deleted
C:\WINDOWS\SYSTEM32\APIII.EXE - Deleted
C:\WINDOWS\SYSTEM32\APIIS.EXE - Deleted
C:\WINDOWS\SYSTEM32\APIJD.EXE - Deleted
C:\WINDOWS\SYSTEM32\APIKC32.EXE - Deleted
C:\WINDOWS\SYSTEM32\APIMP.EXE - Deleted
C:\WINDOWS\SYSTEM32\APIOI32.EXE - Deleted
C:\WINDOWS\SYSTEM32\APIQQ.EXE - Deleted
C:\WINDOWS\SYSTEM32\APIUB.EXE - Deleted
C:\WINDOWS\SYSTEM32\APIYA.EXE - Deleted
C:\WINDOWS\SYSTEM32\APPDQ.EXE - Deleted
C:\WINDOWS\SYSTEM32\APPEV.EXE - Deleted
C:\WINDOWS\SYSTEM32\APPHV32.EXE - Deleted
C:\WINDOWS\SYSTEM32\APPLS.EXE - Deleted
C:\WINDOWS\SYSTEM32\APPMW.EXE - Deleted
C:\WINDOWS\SYSTEM32\APPUE.EXE - Deleted
C:\WINDOWS\SYSTEM32\APPZQ32.EXE - Deleted
C:\WINDOWS\SYSTEM32\ATLFE32.EXE - Deleted
C:\WINDOWS\SYSTEM32\ATLFL32.EXE - Deleted
C:\WINDOWS\SYSTEM32\ATLOM.EXE - Deleted
C:\WINDOWS\SYSTEM32\ATLUV.EXE - Deleted
C:\WINDOWS\SYSTEM32\ATLVA32.EXE - Deleted
C:\WINDOWS\SYSTEM32\ATLYG.EXE - Deleted
C:\WINDOWS\SYSTEM32\ATLZG32.EXE - Deleted
C:\WINDOWS\SYSTEM32\CREX32.EXE - Deleted
C:\WINDOWS\SYSTEM32\CRIM32.EXE - Deleted
C:\WINDOWS\SYSTEM32\CRIR32.EXE - Deleted
C:\WINDOWS\SYSTEM32\CRLB.EXE - Deleted
C:\WINDOWS\SYSTEM32\CRQK.EXE - Deleted
C:\WINDOWS\SYSTEM32\CRSB32.EXE - Deleted
C:\WINDOWS\SYSTEM32\CRSO.EXE - Deleted
C:\WINDOWS\SYSTEM32\CRST32.EXE - Deleted
C:\WINDOWS\SYSTEM32\CRSY32.EXE - Deleted
C:\WINDOWS\SYSTEM32\CRWZ32.EXE - Deleted
C:\WINDOWS\SYSTEM32\CRZG32.EXE - Deleted
C:\WINDOWS\SYSTEM32\D3AF.EXE - Deleted
C:\WINDOWS\SYSTEM32\D3DL32.EXE - Deleted
C:\WINDOWS\SYSTEM32\D3ES32.EXE - Deleted
C:\WINDOWS\SYSTEM32\D3FA32.EXE - Deleted
C:\WINDOWS\SYSTEM32\D3HG.EXE - Deleted
C:\WINDOWS\SYSTEM32\D3MS32.EXE - Deleted
C:\WINDOWS\SYSTEM32\D3NN.EXE - Deleted
C:\WINDOWS\SYSTEM32\D3UB.EXE - Deleted
C:\WINDOWS\SYSTEM32\D3WE32.EXE - Deleted
C:\WINDOWS\SYSTEM32\IEDO32.EXE - Deleted
C:\WINDOWS\SYSTEM32\IEED32.EXE - Deleted
C:\WINDOWS\SYSTEM32\IEPI.EXE - Deleted
C:\WINDOWS\SYSTEM32\IPDP32.EXE - Deleted
C:\WINDOWS\SYSTEM32\IPFM32.EXE - Deleted
C:\WINDOWS\SYSTEM32\IPGV32.EXE - Deleted
C:\WINDOWS\SYSTEM32\IPIB.EXE - Deleted
C:\WINDOWS\SYSTEM32\IPRL32.EXE - Deleted
C:\WINDOWS\SYSTEM32\IPYX32.EXE - Deleted
C:\WINDOWS\SYSTEM32\JAVAAQ32.EXE - Deleted
C:\WINDOWS\SYSTEM32\JAVADB32.EXE - Deleted
C:\WINDOWS\SYSTEM32\JAVAKN32.EXE - Deleted
C:\WINDOWS\SYSTEM32\JAVAMS32.EXE - Deleted
C:\WINDOWS\SYSTEM32\JAVARS32.EXE - Deleted
C:\WINDOWS\SYSTEM32\JAVASG32.EXE - Deleted
C:\WINDOWS\SYSTEM32\MFCBS32.EXE - Deleted
C:\WINDOWS\SYSTEM32\MFCET.EXE - Deleted
C:\WINDOWS\SYSTEM32\MFCHO.EXE - Deleted
C:\WINDOWS\SYSTEM32\MFCIF32.EXE - Deleted
C:\WINDOWS\SYSTEM32\MFCQG32.EXE - Deleted
C:\WINDOWS\SYSTEM32\MSCI.EXE - Deleted
C:\WINDOWS\SYSTEM32\MSHB32.EXE - Deleted
C:\WINDOWS\SYSTEM32\MSJA32.EXE - Deleted
C:\WINDOWS\SYSTEM32\MSNL.EXE - Deleted
C:\WINDOWS\SYSTEM32\MSPP32.EXE - Deleted
C:\WINDOWS\SYSTEM32\MSXI32.EXE - Deleted
C:\WINDOWS\SYSTEM32\MSZM.EXE - Deleted
C:\WINDOWS\SYSTEM32\NETHV32.EXE - Deleted
C:\WINDOWS\SYSTEM32\NETLA.EXE - Deleted
C:\WINDOWS\SYSTEM32\NETMA.EXE - Deleted
C:\WINDOWS\SYSTEM32\NETOK.EXE - Deleted
C:\WINDOWS\SYSTEM32\NETVR.EXE - Deleted
C:\WINDOWS\SYSTEM32\NETYV.EXE - Deleted
C:\WINDOWS\SYSTEM32\NTBZ32.EXE - Deleted
C:\WINDOWS\SYSTEM32\NTCJ.EXE - Deleted
C:\WINDOWS\SYSTEM32\NTCQ32.EXE - Deleted
C:\WINDOWS\SYSTEM32\NTGO.EXE - Deleted
C:\WINDOWS\SYSTEM32\NTGY32.EXE - Deleted
C:\WINDOWS\SYSTEM32\NTHU32.EXE - Deleted
C:\WINDOWS\SYSTEM32\NTXM32.EXE - Deleted
C:\WINDOWS\SYSTEM32\SDKAF32.EXE - Deleted
C:\WINDOWS\SYSTEM32\SDKBJ32.EXE - Deleted
C:\WINDOWS\SYSTEM32\SDKBO.EXE - Deleted
C:\WINDOWS\SYSTEM32\SDKFU32.EXE - Deleted
C:\WINDOWS\SYSTEM32\SDKOD32.EXE - Deleted
C:\WINDOWS\SYSTEM32\SDKOL32.EXE - Deleted
C:\WINDOWS\SYSTEM32\SYSCL.EXE - Deleted
C:\WINDOWS\SYSTEM32\SYSGM32.EXE - Deleted
C:\WINDOWS\SYSTEM32\SYSLP32.EXE - Deleted
C:\WINDOWS\SYSTEM32\SYSPD32.EXE - Deleted
C:\WINDOWS\SYSTEM32\SYSUX.EXE - Deleted
C:\WINDOWS\SYSTEM32\WINGX32.EXE - Deleted
C:\WINDOWS\SYSTEM32\WINHW32.EXE - Deleted
C:\WINDOWS\SYSTEM32\WINJX.EXE - Deleted
C:\WINDOWS\SYSTEM32\WINKI32.EXE - Deleted
C:\WINDOWS\SYSTEM32\WINLK32.EXE - Deleted
C:\WINDOWS\SYSTEM32\WINRU32.EXE - Deleted
C:\WINDOWS\SYSTEM32\WINTJ32.EXE - Deleted
C:\WINDOWS\SYSTEM32\WINUT.EXE - Deleted
C:\WINDOWS\SYSTEM32\WINVE32.EXE - Deleted
C:\WINDOWS\SYSTEM32\WINVF.EXE - Deleted
C:\WINDOWS\ADDNP.EXE - Deleted
C:\WINDOWS\ADDNX32.EXE - Deleted
C:\WINDOWS\ADDTL32.EXE - Deleted
C:\WINDOWS\ADDTZ32.EXE - Deleted
C:\WINDOWS\ADDUP.EXE - Deleted
C:\WINDOWS\ADDWM32.EXE - Deleted
C:\WINDOWS\ADDXP32.EXE - Deleted
C:\WINDOWS\ADDXS32.EXE - Deleted
C:\WINDOWS\ADDYV32.EXE - Deleted
C:\WINDOWS\ADDZU32.EXE - Deleted
C:\WINDOWS\ADDZW.EXE - Deleted
C:\WINDOWS\APIEG.EXE - Deleted
C:\WINDOWS\APIJU32.EXE - Deleted
C:\WINDOWS\APINQ32.EXE - Deleted
C:\WINDOWS\APIQS32.EXE - Deleted
C:\WINDOWS\APPET.EXE - Deleted
C:\WINDOWS\APPNF.EXE - Deleted
C:\WINDOWS\APPRY32.EXE - Deleted
C:\WINDOWS\APPZC.EXE - Deleted
C:\WINDOWS\ATLBC.EXE - Deleted
C:\WINDOWS\ATLBX.EXE - Deleted
C:\WINDOWS\ATLCI32.EXE - Deleted
C:\WINDOWS\ATLDH32.EXE - Deleted
C:\WINDOWS\ATLEL32.EXE - Deleted
C:\WINDOWS\ATLVB.EXE - Deleted
C:\WINDOWS\ATLWC32.EXE - Deleted
C:\WINDOWS\ATLYP32.EXE - Deleted
C:\WINDOWS\CRER32.EXE - Deleted
C:\WINDOWS\CRHD.EXE - Deleted
C:\WINDOWS\CRIJ.EXE - Deleted
C:\WINDOWS\CRKE.EXE - Deleted
C:\WINDOWS\CRLD32.EXE - Deleted
C:\WINDOWS\CRUS32.EXE - Deleted
C:\WINDOWS\CRVT.EXE - Deleted
C:\WINDOWS\CRWY.EXE - Deleted
C:\WINDOWS\D3BP32.EXE - Deleted
C:\WINDOWS\D3KL.EXE - Deleted
C:\WINDOWS\D3KY.EXE - Deleted
C:\WINDOWS\D3NO.EXE - Deleted
C:\WINDOWS\D3PZ32.EXE - Deleted
C:\WINDOWS\D3RO.EXE - Deleted
C:\WINDOWS\D3SJ32.EXE - Deleted
C:\WINDOWS\D3YI32.EXE - Deleted
C:\WINDOWS\IEBI.EXE - Deleted
C:\WINDOWS\IEIL32.EXE - Deleted
C:\WINDOWS\IEUR32.EXE - Deleted
C:\WINDOWS\IEVJ32.EXE - Deleted
C:\WINDOWS\IPEV.EXE - Deleted
C:\WINDOWS\IPLB32.EXE - Deleted
C:\WINDOWS\IPRT32.EXE - Deleted
C:\WINDOWS\IPUD32.EXE - Deleted
C:\WINDOWS\IPWQ.EXE - Deleted
C:\WINDOWS\IPYC.EXE - Deleted
C:\WINDOWS\IPYP32.EXE - Deleted
C:\WINDOWS\JAVAAJ.EXE - Deleted
C:\WINDOWS\JAVADD32.EXE - Deleted
C:\WINDOWS\JAVAJK.EXE - Deleted
C:\WINDOWS\JAVALN32.EXE - Deleted
C:\WINDOWS\JAVAQS.EXE - Deleted
C:\WINDOWS\JAVARC.EXE - Deleted
C:\WINDOWS\MFCCV32.EXE - Deleted
C:\WINDOWS\MFCFB.EXE - Deleted
C:\WINDOWS\MFCMM.EXE - Deleted
C:\WINDOWS\MFCNM32.EXE - Deleted
C:\WINDOWS\MFCSE32.EXE - Deleted
C:\WINDOWS\MSBC32.EXE - Deleted
C:\WINDOWS\MSLU.EXE - Deleted
C:\WINDOWS\MSTA32.EXE - Deleted
C:\WINDOWS\MSTJ32.EXE - Deleted
C:\WINDOWS\MSTS32.EXE - Deleted
C:\WINDOWS\MSYL.EXE - Deleted
C:\WINDOWS\MSYT.EXE - Deleted
C:\WINDOWS\NETHL32.EXE - Deleted
C:\WINDOWS\NETPF32.EXE - Deleted
C:\WINDOWS\NETQL32.EXE - Deleted
C:\WINDOWS\NETSM32.EXE - Deleted
C:\WINDOWS\NETYO.EXE - Deleted
C:\WINDOWS\NTDS.EXE - Deleted
C:\WINDOWS\NTDX.EXE - Deleted
C:\WINDOWS\NTJK32.EXE - Deleted
C:\WINDOWS\NTUB32.EXE - Deleted
C:\WINDOWS\NTZH32.EXE - Deleted
C:\WINDOWS\SDKBJ.EXE - Deleted
C:\WINDOWS\SDKIO.EXE - Deleted
C:\WINDOWS\SDKJP32.EXE - Deleted
C:\WINDOWS\SDKRA.EXE - Deleted
C:\WINDOWS\SDKXD32.EXE - Deleted
C:\WINDOWS\SYSDF32.EXE - Deleted
C:\WINDOWS\SYSED.EXE - Deleted
C:\WINDOWS\SYSER32.EXE - Deleted
C:\WINDOWS\SYSKI.EXE - Deleted
C:\WINDOWS\SYSPF.EXE - Deleted
C:\WINDOWS\SYSQM32.EXE - Deleted
C:\WINDOWS\SYSRW.EXE - Deleted
C:\WINDOWS\SYSVR32.EXE - Deleted
C:\WINDOWS\SYSWL.EXE - Deleted
C:\WINDOWS\WINBE32.EXE - Deleted
C:\WINDOWS\WINEB.EXE - Deleted
C:\WINDOWS\WINFT.EXE - Deleted
C:\WINDOWS\WINGU.EXE - Deleted
C:\WINDOWS\WINIQ32.EXE - Deleted
C:\WINDOWS\WINMO32.EXE - Deleted
C:\WINDOWS\WINRC.EXE - Deleted
C:\WINDOWS\WINSQ.EXE - Deleted
C:\WINDOWS\WINZF32.EXE - Deleted





Removing Temp Files

ADS Check :



Final Check :

catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-10-16 00:29:10
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden services & system hive ...

scanning hidden registry entries ...

scanning hidden files ...

scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0


Remaining Services :




Authorized Application Key Export:

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"C:\\Program Files\\Messenger\\msmsgs.exe"="C:\\Program Files\\Messenger\\msmsgs.exe:*:Enabled:Windows Messenger"
"C:\\Program Files\\Microsoft ActiveSync\\rapimgr.exe"="C:\\Program Files\\Microsoft ActiveSync\\rapimgr.exe:*:Disabled:ActiveSync RAPI Manager"
"C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"="C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe:*:Enabled:HP Digital Imaging Monitor"
"C:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe"="C:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe:*:Enabled:Logitech Desktop Messenger"
"C:\\Program Files\\Kaspersky Lab\\Kaspersky Anti-Virus 7.0\\avp.exe"="C:\\Program Files\\Kaspersky Lab\\Kaspersky Anti-Virus 7.0\\avp.exe:*:Enabled:Kaspersky Anti-Virus 7.0"
"C:\\kav\\kav7\\setup.exe"="C:\\kav\\kav7\\setup.exe:*:Enabled:Kaspersky Anti-Virus 7.0 Setup"
"C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"="C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe:*:Enabled:hpqscnvw"
"C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"="C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe:*:Enabled:HP CUE-Scanning Flow Component"
"C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqcopy.exe"="C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqcopy.exe:*:Enabled: "
"C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqiscfg.exe"="C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqiscfg.exe:*:Enabled:HP Instant Share Setup"
"C:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"="C:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe:*:Enabled:HP AiO Fax Manager"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:mad:xpsp3res.dll,-20000"
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:mad:xpsp2res.dll,-22019"
"C:\\Program Files\\Cartoon Network\\Ben 10 Bounty Hunters\\RT_Multiplayer.exe"="C:\\Program Files\\Cartoon Network\\Ben 10 Bounty Hunters\\RT_Multiplayer.exe:*:Enabled:RT_Multi Application"
"C:\\Program Files\\TurboTax\\Deluxe 2007\\32bit\\ttax.exe"="C:\\Program Files\\TurboTax\\Deluxe 2007\\32bit\\ttax.exe:LocalSubNet:Enabled:TurboTax"
"C:\\Program Files\\TurboTax\\Deluxe 2007\\32bit\\updatemgr.exe"="C:\\Program Files\\TurboTax\\Deluxe 2007\\32bit\\updatemgr.exe:LocalSubNet:Enabled:TurboTax Update Manager"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"C:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe"="C:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe:*:Enabled:Logitech Desktop Messenger"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:mad:xpsp3res.dll,-20000"
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:mad:xpsp2res.dll,-22019"

Remaining Files :


File Backups: - C:\SDFix\backups\backups.zip

Files with Hidden Attributes :


Finished!
 

cybertech

Retired Moderator
Joined
Apr 16, 2002
Messages
72,115
Please do an online scan with Kaspersky WebScanner

Kaspersky online scanner uses JAVA tecnology to perform the scan. If you do not have the latest JAVA version, follow the instrutions below under Upgrading Java, to download and install the latest vesion.

  • Read through the requirements and privacy statement and click on Accept button.
  • It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
  • When the downloads have finished, click on Settings.
  • Make sure the following is checked.
    • Spyware, Adware, Dialers, and other potentially dangerous programs
      [*]Archives
      [*]Mail databases
  • Click on My Computer under Scan.
  • Once the scan is complete, it will display the results. Click on View Scan Report.
  • You will see a list of infected items there. Click on Save Report As....
  • Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button.
  • Please post this log in your next reply.
 

makomyday325

Thread Starter
Joined
Jul 19, 2005
Messages
96
I couldn't run Kaspersky online for some reason; however, I ran it directly from the desktop. Yes, I do have a more current version of Java. Kaspersky detects, but is not able to disinfect. Below I just selected all and copied and pasted for you to see. Where my name shows, I simply replaced my last name with "x"s.

This trojan seems very resilient. What next doctor?


deleted: Trojan program Backdoor.Win32.UltimateDefender.be File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP667\A0302417.exe//CryptFF//PE_Patch.UPX//UPX
detected: Trojan program Backdoor.Win32.UltimateDefender.be File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP668\A0302423.exe//CryptFF//PE_Patch.UPX//UPX
detected: Trojan program Backdoor.Win32.UltimateDefender.be File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP668\A0302424.exe//CryptFF//PE_Patch.UPX//UPX
detected: Trojan program Backdoor.Win32.UltimateDefender.be File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP669\A0302429.exe//CryptFF//PE_Patch.UPX//UPX
detected: Trojan program Backdoor.Win32.UltimateDefender.be File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP669\A0302430.exe//CryptFF//PE_Patch.UPX//UPX
detected: new threat not-a-virus:FraudTool.Win32.AntiSpyware.ii File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP669\A0302458.exe//AdwareAlert/AdwareAlert.srv.exe
detected: new threat not-a-virus:FraudTool.Win32.SpywareStop.gp File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP669\A0302458.exe//AdwareAlert/SpyCleaner.dll
detected: new threat not-a-virus:FraudTool.Win32.SpywareStop.gp File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP669\A0302505.dll
detected: virus Heur.Invader (modification) File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP672\A0303711.exe
detected: virus Heur.Invader (modification) File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP672\A0303779.exe/SDFix\catchme.exe
detected: virus Heur.Invader (modification) File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP672\A0303779.exe/SDFix\apps\Cghtme.exe
detected: new threat not-a-virus:FraudTool.Win32.AntiVirGear.e File: C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus\Quarantine\687D0368//CryptFF//Armadillo
detected: virus Heur.Invader (modification) File: C:\Documents and Settings\Paul xxxxxxxxx\Desktop\SDFix.exe/SDFix\catchme.exe
detected: virus Heur.Invader (modification) File: C:\Documents and Settings\Paul xxxxxxxxx\Desktop\SDFix.exe/SDFix\apps\Cghtme.exe
detected: new threat not-a-virus:FraudTool.Win32.AntiSpyware.ii File: C:\Documents and Settings\Paul xxxxxxxxx\Local Settings\Temporary Internet Files\Content.IE5\BDLPA9TJ\setupxv[1].exe//AdwareAlert/AdwareAlert.srv.exe
detected: new threat not-a-virus:FraudTool.Win32.SpywareStop.gp File: C:\Documents and Settings\Paul xxxxxxxxx\Local Settings\Temporary Internet Files\Content.IE5\BDLPA9TJ\setupxv[1].exe//AdwareAlert/SpyCleaner.dll
detected: virus Heur.Invader (modification) File: C:\SDFix\catchme.exe
detected: virus Heur.Invader (modification) File: C:\SDFix\apps\Cghtme.exe
 

cybertech

Retired Moderator
Joined
Apr 16, 2002
Messages
72,115
There is nothing there to be concerned about. Most of that is in system restore which you can purge by turning it off, restarting the machine and turning it back on.

Norton quarantine can be emptied.

To remove SDFix and associated files/folders download OTCleanIt. Save this application on your desktop. Once downloaded Double click on the OTCleanIt.exe. This should remove most malware tools you downloaded. A restart will be required.

Clean your Temporary internet files and folders by downloading ATF Cleaner by Atribune.

  • Double-click ATF-Cleaner.exe to run the program.
  • Under Main choose: Select All
  • Click the Empty Selected button.

Click Exit on the Main menu to close the program.
 
Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 807,865 other people just like you!

Latest posts

Members online

Top