1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Backdoor.win32.ultimatedefender.be - HELP

Discussion in 'Virus & Other Malware Removal' started by makomyday325, Oct 10, 2008.

Thread Status:
Not open for further replies.
Advertisement
  1. makomyday325

    makomyday325 Thread Starter

    Joined:
    Jul 19, 2005
    Messages:
    96
    Infected by a new trojan. Kaspersky doesn't even have it listed and cannot disinfect it.
    Please help. Below is the Hijack this results:

    Logfile of HijackThis v1.99.1
    Scan saved at 8:05:18 AM, on 10/10/2008
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16705)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
    C:\WINDOWS\System32\CTsvcCDA.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\nvsvc32.exe
    C:\WINDOWS\system32\HPZipm12.exe
    C:\PROGRA~1\Dantz\RETROS~1\retrorun.exe
    C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
    C:\WINDOWS\System32\MsPMSPSv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
    C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe
    C:\Program Files\internet explorer\iexplore.exe
    C:\Program Files\internet explorer\iexplore.exe
    C:\Program Files\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.myway.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
    O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll (file missing)
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O2 - BHO: (no name) - {AA58ED58-01DD-4d91-8333-CF10577473F7} - (no file)
    O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe"
    O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra button: Web Anti-Virus statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\SCIEPlgn.dll
    O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
    O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
    O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O11 - Options group: [INTERNATIONAL] International*
    O16 - DPF: {0742B9EF-8C83-41CA-BFBA-830A59E23533} -
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?LinkId=39204&clcid=0x409
    O16 - DPF: {193C772A-87BE-4B19-A7BB-445B226FE9A1} (ewidoOnlineScan Control) - http://download.ewido.net/ewidoOnlineScan.cab
    O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedContent/vc/bin/AvSniff.cab
    O16 - DPF: {3DCEC959-378A-4922-AD7E-FD5C925D927F} (Disney Online Games ActiveX Control) - http://disney.go.com/pirates/online/testActiveX/built/signed/DisneyOnlineGames.cab
    O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://www.yorkphoto.com/YorkActivia.cab
    O16 - DPF: {42C9E5EE-DA49-49B4-8ECC-1CAB1C51A2AB} (HomePrintingCtrl Class) - http://www.kodakgallery.com/downloads/hmpr/HMPR_WIN_IE_1/wiaaut.cab
    O16 - DPF: {549F957E-2F89-11D6-8CFE-00C04F52B225} (CMV5 Class) - http://coupons.smartsource.com/download/cscmv5X.cab
    O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedContent/common/bin/cabsa.cab
    O16 - DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} (Symantec Download Manager) - https://webdl.symantec.com/activex/symdlmgr.cab
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1134104301203
    O16 - DPF: {6F750202-1362-4815-A476-88533DE61D0C} (Kodak Gallery Easy Upload Manager Class) - http://www.kodakgallery.com/downloads/BUM/BUM_WIN_IE_2/axofupld.cab
    O16 - DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} (Groove Control) - http://www.nick.com/common/groove/gx/GrooveAX27.cab
    O16 - DPF: {78AF2F24-A9C3-11D3-BF8C-0060B0FCC122} (AcDcToday Control) - file://C:\Program Files\MDT5\AcDcToday.ocx
    O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.com/activescan/as5/asinst.cab
    O16 - DPF: {A662DA7E-CCB7-4743-B71A-D817F6D575DF} - http://www.nassaucountyny.gov/mynassauproperty/autodesk/DwfViewerSetup.exe
    O16 - DPF: {C6637286-300D-11D4-AE0A-0010830243BD} (InstaFred Control) - file://C:\Program Files\MDT5\InstFred.ocx
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - https://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
    O16 - DPF: {F281A59C-7B65-11D3-8617-0010830243BD} (AcPreview Control) - file://C:\Program Files\MDT5\AcPreview.ocx
    O18 - Protocol: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\GAPlugProtocol-8876480.dll
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O20 - Winlogon Notify: dimsntfy - %SystemRoot%\System32\dimsntfy.dll (file missing)
    O20 - Winlogon Notify: klogon - C:\WINDOWS\system32\klogon.dll
    O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
    O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
    O23 - Service: Kaspersky Anti-Virus 7.0 (AVP) - Unknown owner - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe" -r (file missing)
    O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\System32\CTsvcCDA.exe
    O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe
    O23 - Service: Intel NCS NetService (NetSvc) - Intel(R) Corporation - C:\Program Files\Intel\NCS\Sync\NetSvc.exe
    O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: Retrospect Launcher (RetroLauncher) - Dantz Development Corporation - C:\PROGRA~1\Dantz\RETROS~1\retrorun.exe
    O23 - Service: Retrospect Helper - Dantz Development Corporation - C:\Program Files\Dantz\Retrospect\rthlpsvc.exe
    O23 - Service: Retrospect WD Service (RetroWDSvc) - Dantz Development Corporation - C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
    O23 - Service: Symantec Core LC - Unknown owner - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe

    :mad:
     
  2. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Run HJT again and put a check in the following:

    O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
    O2 - BHO: (no name) - {AA58ED58-01DD-4d91-8333-CF10577473F7} - (no file)
    O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O16 - DPF: {549F957E-2F89-11D6-8CFE-00C04F52B225} (CMV5 Class) - http://coupons.smartsource.com/download/cscmv5X.cab
    O18 - Protocol: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\GAPlugProtocol-8876480.dll

    Close all applications and browser windows before you click "fix checked".


    What is Kaspersky finding?
     
  3. makomyday325

    makomyday325 Thread Starter

    Joined:
    Jul 19, 2005
    Messages:
    96
    Ok, prior to your response & subsequent to my initial post, I downloaded "adwarealert" and ran a to remove the "backdoor" virus. It seemed to remove 480 infections, but I don't think it removed in full the specific trojan I'm infected with. I ran hijack this and checked off 3 of 5 lines you mentioned above (both 02 and 018) because line 06 & 016 must have been removed with the adwarealert software.

    Below is a new HJT after I clicked "fix checked".


    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:47:13 AM, on 10/13/2008
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16705)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
    C:\WINDOWS\System32\CTsvcCDA.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\nvsvc32.exe
    C:\WINDOWS\system32\HPZipm12.exe
    C:\PROGRA~1\Dantz\RETROS~1\retrorun.exe
    C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
    C:\WINDOWS\System32\MsPMSPSv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
    C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe
    C:\Program Files\AdwareAlert\AdwareAlert.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.myway.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll (file missing)
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe"
    O4 - HKCU\..\Run: [AdwareAlert] C:\Program Files\AdwareAlert\AdwareAlert.exe -boot
    O4 - HKUS\S-1-5-18\..\Run: [Symantec Network Driver Update Warning] C:\PROGRA~1\Symantec\LIVEUP~1\SNDWarn.EXE (User 'SYSTEM')
    O4 - HKUS\S-1-5-18\..\Run: [Symantec NetDriver Warning] C:\PROGRA~1\SYMNET~1\SNDWarn.exe (User 'SYSTEM')
    O4 - HKUS\S-1-5-18\..\Run: [Norton SystemWorks] "C:\Program Files\Norton SystemWorks\cfgwiz.exe" /GUID {05858CFD-5CC4-4ceb-AAAF-CF00BF39736A} /MODE CfgWiz (User 'SYSTEM')
    O4 - HKUS\S-1-5-18\..\RunOnce: [SRUUninstall] "C:\WINDOWS\System32\msiexec.exe" /x {6AF90EF6-F7F9-466C-99F4-1774826FBB40} /qn REBOOT=ReallySuppress (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [Symantec Network Driver Update Warning] C:\PROGRA~1\Symantec\LIVEUP~1\SNDWarn.EXE (User 'Default user')
    O4 - HKUS\.DEFAULT\..\RunOnce: [SRUUninstall] "C:\WINDOWS\System32\msiexec.exe" /x {6AF90EF6-F7F9-466C-99F4-1774826FBB40} /qn REBOOT=ReallySuppress (User 'Default user')
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra button: Web Anti-Virus statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\SCIEPlgn.dll
    O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
    O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
    O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {0742B9EF-8C83-41CA-BFBA-830A59E23533} -
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?LinkId=39204&clcid=0x409
    O16 - DPF: {193C772A-87BE-4B19-A7BB-445B226FE9A1} (ewidoOnlineScan Control) - http://download.ewido.net/ewidoOnlineScan.cab
    O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedContent/vc/bin/AvSniff.cab
    O16 - DPF: {3DCEC959-378A-4922-AD7E-FD5C925D927F} (Disney Online Games ActiveX Control) - http://disney.go.com/pirates/online/testActiveX/built/signed/DisneyOnlineGames.cab
    O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://www.yorkphoto.com/YorkActivia.cab
    O16 - DPF: {42C9E5EE-DA49-49B4-8ECC-1CAB1C51A2AB} (HomePrintingCtrl Class) - http://www.kodakgallery.com/downloads/hmpr/HMPR_WIN_IE_1/wiaaut.cab
    O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedContent/common/bin/cabsa.cab
    O16 - DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} (Symantec Download Manager) - https://webdl.symantec.com/activex/symdlmgr.cab
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1134104301203
    O16 - DPF: {6F750202-1362-4815-A476-88533DE61D0C} (Kodak Gallery Easy Upload Manager Class) - http://www.kodakgallery.com/downloads/BUM/BUM_WIN_IE_2/axofupld.cab
    O16 - DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} (Groove Control) - http://www.nick.com/common/groove/gx/GrooveAX27.cab
    O16 - DPF: {78AF2F24-A9C3-11D3-BF8C-0060B0FCC122} (AcDcToday Control) - file://C:\Program Files\MDT5\AcDcToday.ocx
    O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.com/activescan/as5/asinst.cab
    O16 - DPF: {A662DA7E-CCB7-4743-B71A-D817F6D575DF} - http://www.nassaucountyny.gov/mynassauproperty/autodesk/DwfViewerSetup.exe
    O16 - DPF: {C6637286-300D-11D4-AE0A-0010830243BD} (InstaFred Control) - file://C:\Program Files\MDT5\InstFred.ocx
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - https://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
    O16 - DPF: {F281A59C-7B65-11D3-8617-0010830243BD} (AcPreview Control) - file://C:\Program Files\MDT5\AcPreview.ocx
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Kaspersky Anti-Virus 7.0 (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
    O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\System32\CTsvcCDA.exe
    O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe
    O23 - Service: Intel NCS NetService (NetSvc) - Intel(R) Corporation - C:\Program Files\Intel\NCS\Sync\NetSvc.exe
    O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: Retrospect Launcher (RetroLauncher) - Dantz Development Corporation - C:\PROGRA~1\Dantz\RETROS~1\retrorun.exe
    O23 - Service: Retrospect Helper - Dantz Development Corporation - C:\Program Files\Dantz\Retrospect\rthlpsvc.exe
    O23 - Service: Retrospect WD Service (RetroWDSvc) - Dantz Development Corporation - C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
    O23 - Service: Symantec Core LC - Unknown owner - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
    O24 - Desktop Component 0: Privacy Protection - (no file)

    --
    End of file - 8484 bytes
     
  4. ~Candy~

    ~Candy~ Retired Administrator

    Joined:
    Jan 27, 2001
    Messages:
    103,706
    I don't think adaware alert is a recommended program. I saw your other post where you mentioned regcure, I believe. You need to dump that as anything that "cleans" your registry usually breaks something.
     
  5. makomyday325

    makomyday325 Thread Starter

    Joined:
    Jul 19, 2005
    Messages:
    96
    Thanks for your advice. I'll wait for Cybertech's reply, clean up this trojan and then dump the regcure software. or, are you taking over for Cybertech? If so, what next?
     
  6. ~Candy~

    ~Candy~ Retired Administrator

    Joined:
    Jan 27, 2001
    Messages:
    103,706
    Nope, she'll be back. Those were just my observations :)
     
  7. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Adaware alert was previously listed on the rogue list, but has been removed. I still would not use it. There are many other products you could use.

    I agree with Candy on the registry cleaners. I would stay away from those as well.

    Please download ATF Cleaner by Atribune.

    • Double-click ATF-Cleaner.exe to run the program.
    • Under Main choose: Select All
    • Click the Empty Selected button.

    Click Exit on the Main menu to close the program.




    Please download Malwarebytes Anti-Malware and save it to your desktop.
    alternate download link 1 alternate download link 2
    • Make sure you are connected to the Internet.
    • Double-click on Download_mbam-setup.exe to install the application.
    • When the installation begins, follow the prompts and do not make any changes to default settings.
    • When installation has finished, make sure you leave both of these checked:
      • Update Malwarebytes' Anti-Malware
      • Launch Malwarebytes' Anti-Malware
    • Then click Finish.
    • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
    • On the Scanner tab:
      • Make sure the "Perform Quick Scan" option is selected.
      • Then click on the Scan button.
    • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
    • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
    • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
    • Click OK to close the message box and continue with the removal process.
    • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
    • Make sure that everything is checked, and click Remove Selected.
    • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
    • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
    • Copy and paste the contents of that report in your next reply with a new hijackthis log.
    Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.
     
  8. makomyday325

    makomyday325 Thread Starter

    Joined:
    Jul 19, 2005
    Messages:
    96
    Thanks,

    The Mbam log is as follows:


    Malwarebytes' Anti-Malware 1.28
    Database version: 1267
    Windows 5.1.2600 Service Pack 3

    10/14/2008 12:01:34 AM
    mbam-log-2008-10-14 (00-01-34).txt

    Scan type: Quick Scan
    Objects scanned: 56147
    Time elapsed: 4 minute(s), 39 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 3
    Registry Keys Infected: 10
    Registry Values Infected: 3
    Registry Data Items Infected: 0
    Folders Infected: 28
    Files Infected: 13

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    C:\Program Files\AdwareAlert\SpyCleaner.dll (Rogue.AdwareAlert) -> Delete on reboot.
    C:\Program Files\AdwareAlert\TCL.dll (Rogue.AdwareAlert) -> Delete on reboot.
    C:\Program Files\AdwareAlert\zlib.dll (Rogue.AdwareAlert) -> Delete on reboot.

    Registry Keys Infected:
    HKEY_CLASSES_ROOT\CLSID\{755c6bc2-a679-4025-84d3-4ae283a87b14} (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Installer\Features\cd526ce17ea2dd64f830011ae22b293c (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Installer\Products\cd526ce17ea2dd64f830011ae22b293c (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Installer\UpgradeCodes\7c673a5b871b8cd419f47dd0de5a6d18 (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{daed9266-8c28-4c1c-8b58-5c66eff1d302} (Search.Hijack) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\7c673a5b871b8cd419f47dd0de5a6d18 (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ControlPanel\NameSpace\{755c6bc2-a679-4025-84d3-4ae283a87b14} (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\9ee2330ae5f4470cac801baac83818c9 (Adware.Zango) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1ec625dc-2ae7-46dd-8f03-10a12eb292c3} (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\AdwareAlert (Rogue.AdwareAlert) -> Quarantined and deleted successfully.

    Registry Values Infected:
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdwareAlert (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders\c:\program files\adwarealert\ (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders\c:\documents and settings\all users\start menu\programs\adwarealert\ (Rogue.AdwareAlert) -> Quarantined and deleted successfully.

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    C:\Program Files\AdwareAlert (Rogue.AdwareAlert) -> Delete on reboot.
    C:\Documents and Settings\All Users\Start Menu\Programs\AdwareAlert (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul Dixxxxxxxx\Application Data\AdwareAlert (Rogue.AdwareAlert) -> Delete on reboot.
    C:\Documents and Settings\Paul Dxxxxxxxxx\Application Data\AdwareAlert\Log (Rogue.AdwareAlert) -> Delete on reboot.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03 (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03 (Rogue.AdwareAlert) -> Files: 908 -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\192.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\xxxxxxxxxxxxxni\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\218.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\248.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\281.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\282.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\283.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\284.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\286.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\287.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\288.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\290.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\298.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\300.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\304.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\307.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\309.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\311.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application xxxa\xxxxxxxxert\Quarantine\13-10-2008-10-04-03\312.qit (Rogue.AdwareAlert) -> Quarxntined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\313.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Quarantine\13-10-2008-10-04-03\314.qit (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\Settings (Rogue.AdwareAlert) -> Quarantined and deleted successfully.

    Files Infected:
    C:\Program Files\AdwareAlert\AdwareAlert.exe (Rogue.AdwareAlert) -> Delete on reboot.
    C:\Program Files\AdwareAlert\AdwareAlert.url (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Program Files\AdwareAlert\DataBase.ref (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Program Files\AdwareAlert\SpyCleaner.dll (Rogue.AdwareAlert) -> Delete on reboot.
    C:\Program Files\AdwareAlert\TCL.dll (Rogue.AdwareAlert) -> Delete on reboot.
    C:\Program Files\AdwareAlert\vistaCPtasks.xml (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Program Files\AdwareAlert\zlib.dll (Rogue.AdwareAlert) -> Delete on reboot.
    C:\Documents and Settings\All Users\Start Menu\Programs\AdwareAlert\AdwareAlert on the Web.lnk (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Start Menu\Programs\AdwareAlert\AdwareAlert.lnk (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxx\Application Data\AdwareAlert\rs.dat (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Paul xxxxxxxxxxx\Application Data\AdwareAlert\Log\2008 Oct 13 - 08_39_05 PM_578.log (Rogue.AdwareAlert) -> Delete on reboot.
    C:\WINDOWS\Tasks\AdwareAlert Scheduled Scan.job (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Desktop\AdwareAlert.lnk (Rogue.AdwareAlert) -> Quarantined and deleted successfully.


    ALSO, my new hjt report is as follows:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 12:11:36 AM, on 10/14/2008
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16705)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
    C:\WINDOWS\System32\CTsvcCDA.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\nvsvc32.exe
    C:\WINDOWS\system32\HPZipm12.exe
    C:\PROGRA~1\Dantz\RETROS~1\retrorun.exe
    C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
    C:\WINDOWS\System32\MsPMSPSv.exe
    C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
    C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.myway.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll (file missing)
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe"
    O4 - HKUS\S-1-5-18\..\Run: [Symantec Network Driver Update Warning] C:\PROGRA~1\Symantec\LIVEUP~1\SNDWarn.EXE (User 'SYSTEM')
    O4 - HKUS\S-1-5-18\..\Run: [Symantec NetDriver Warning] C:\PROGRA~1\SYMNET~1\SNDWarn.exe (User 'SYSTEM')
    O4 - HKUS\S-1-5-18\..\Run: [Norton SystemWorks] "C:\Program Files\Norton SystemWorks\cfgwiz.exe" /GUID {05858CFD-5CC4-4ceb-AAAF-CF00BF39736A} /MODE CfgWiz (User 'SYSTEM')
    O4 - HKUS\S-1-5-18\..\RunOnce: [SRUUninstall] "C:\WINDOWS\System32\msiexec.exe" /x {6AF90EF6-F7F9-466C-99F4-1774826FBB40} /qn REBOOT=ReallySuppress (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [Symantec Network Driver Update Warning] C:\PROGRA~1\Symantec\LIVEUP~1\SNDWarn.EXE (User 'Default user')
    O4 - HKUS\.DEFAULT\..\RunOnce: [SRUUninstall] "C:\WINDOWS\System32\msiexec.exe" /x {6AF90EF6-F7F9-466C-99F4-1774826FBB40} /qn REBOOT=ReallySuppress (User 'Default user')
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra button: Web Anti-Virus statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\SCIEPlgn.dll
    O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
    O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
    O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {0742B9EF-8C83-41CA-BFBA-830A59E23533} -
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?LinkId=39204&clcid=0x409
    O16 - DPF: {193C772A-87BE-4B19-A7BB-445B226FE9A1} (ewidoOnlineScan Control) - http://download.ewido.net/ewidoOnlineScan.cab
    O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedContent/vc/bin/AvSniff.cab
    O16 - DPF: {3DCEC959-378A-4922-AD7E-FD5C925D927F} (Disney Online Games ActiveX Control) - http://disney.go.com/pirates/online/testActiveX/built/signed/DisneyOnlineGames.cab
    O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://www.yorkphoto.com/YorkActivia.cab
    O16 - DPF: {42C9E5EE-DA49-49B4-8ECC-1CAB1C51A2AB} (HomePrintingCtrl Class) - http://www.kodakgallery.com/downloads/hmpr/HMPR_WIN_IE_1/wiaaut.cab
    O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedContent/common/bin/cabsa.cab
    O16 - DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} (Symantec Download Manager) - https://webdl.symantec.com/activex/symdlmgr.cab
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1134104301203
    O16 - DPF: {6F750202-1362-4815-A476-88533DE61D0C} (Kodak Gallery Easy Upload Manager Class) - http://www.kodakgallery.com/downloads/BUM/BUM_WIN_IE_2/axofupld.cab
    O16 - DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} (Groove Control) - http://www.nick.com/common/groove/gx/GrooveAX27.cab
    O16 - DPF: {78AF2F24-A9C3-11D3-BF8C-0060B0FCC122} (AcDcToday Control) - file://C:\Program Files\MDT5\AcDcToday.ocx
    O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.com/activescan/as5/asinst.cab
    O16 - DPF: {A662DA7E-CCB7-4743-B71A-D817F6D575DF} - http://www.nassaucountyny.gov/mynassauproperty/autodesk/DwfViewerSetup.exe
    O16 - DPF: {C6637286-300D-11D4-AE0A-0010830243BD} (InstaFred Control) - file://C:\Program Files\MDT5\InstFred.ocx
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - https://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
    O16 - DPF: {F281A59C-7B65-11D3-8617-0010830243BD} (AcPreview Control) - file://C:\Program Files\MDT5\AcPreview.ocx
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Kaspersky Anti-Virus 7.0 (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
    O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\System32\CTsvcCDA.exe
    O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe
    O23 - Service: Intel NCS NetService (NetSvc) - Intel(R) Corporation - C:\Program Files\Intel\NCS\Sync\NetSvc.exe
    O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: Retrospect Launcher (RetroLauncher) - Dantz Development Corporation - C:\PROGRA~1\Dantz\RETROS~1\retrorun.exe
    O23 - Service: Retrospect Helper - Dantz Development Corporation - C:\Program Files\Dantz\Retrospect\rthlpsvc.exe
    O23 - Service: Retrospect WD Service (RetroWDSvc) - Dantz Development Corporation - C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
    O23 - Service: Symantec Core LC - Unknown owner - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
    O24 - Desktop Component 0: Privacy Protection - (no file)

    --
    End of file - 8354 bytes
     
  9. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Run HJT again, Right click and Run as Administrator, put a check in the following:

    O24 - Desktop Component 0: Privacy Protection - (no file)

    Close all applications and browser windows before you click "fix checked".


    Are you having any problems now?
     
  10. makomyday325

    makomyday325 Thread Starter

    Joined:
    Jul 19, 2005
    Messages:
    96
    yes, can't run as administrator. When I right click the HJT shortcut, nothing happens. When I run the program, I don;t have any prompt to run as administrator. When I just scanned, I did get a line 024 as stated in your reply above, but when I clicked "fix checked" while exited from all applications & browsers, it did not get removed.

    Sorry for being ignorant. Am I missing something?
     
  11. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Don't worry about the run as administrator, my error. I was thinking you were using Vista.

    Download SDFix and save it to your Desktop.

    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix and remove some of its embedded files which may cause "unpredictable results".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
    • Remember to re-enable the protection again afterwards before connecting to the Internet.

    Double click SDFix.exe and choose Install to extract it to its own folder on the Desktop. Please then reboot your computer in Safe Mode by doing the following :
    • Restart your computer
    • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
    • Instead of Windows loading as normal, a menu with options should appear;
    • Select the first option, to run Windows in Safe Mode, then press "Enter".
    • Choose your usual account.
    • Open the c:\SDFix folder and double click RunThis.cmd to start the script.
    • Type Y to begin the script.
    • It will remove the Trojan Services then make some repairs to the registry and prompt you to press any key to Reboot.
    • Press any Key and it will restart the PC.
    • Your system will take longer that normal to restart as the fixtool will be running and removing files.
    • When the desktop loads the Fixtool will complete the removal and display Finished, then press any key to end the script and load your desktop icons.
    • Finally open the SDFix folder on your desktop and copy and paste the contents of the results file Report.txt back to the thread with a new HijackThis log.
     
  12. makomyday325

    makomyday325 Thread Starter

    Joined:
    Jul 19, 2005
    Messages:
    96
    Well, it didn't go down exactly how you described it; however, below is the SDFix report:


    SDFix: Version 1.235
    Run by Paul xxxxxxxxxx on Thu 10/16/2008 at 12:17 AM

    Microsoft Windows XP [Version 5.1.2600]
    Running From: C:\SDFix

    Checking Services :


    Restoring Default Security Values
    Restoring Default Hosts File

    Rebooting


    Checking Files :

    Trojan Files Found:

    C:\WINDOWS\SYSTEM32\ADDDL32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\ADDFB.EXE - Deleted
    C:\WINDOWS\SYSTEM32\ADDJM32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\ADDLX32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\ADDND.EXE - Deleted
    C:\WINDOWS\SYSTEM32\ADDPE32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\ADDQF.EXE - Deleted
    C:\WINDOWS\SYSTEM32\ADDQQ.EXE - Deleted
    C:\WINDOWS\SYSTEM32\ADDRP32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\ADDTU.EXE - Deleted
    C:\WINDOWS\SYSTEM32\ADDVP32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\ADDZK32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\APIII.EXE - Deleted
    C:\WINDOWS\SYSTEM32\APIIS.EXE - Deleted
    C:\WINDOWS\SYSTEM32\APIJD.EXE - Deleted
    C:\WINDOWS\SYSTEM32\APIKC32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\APIMP.EXE - Deleted
    C:\WINDOWS\SYSTEM32\APIOI32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\APIQQ.EXE - Deleted
    C:\WINDOWS\SYSTEM32\APIUB.EXE - Deleted
    C:\WINDOWS\SYSTEM32\APIYA.EXE - Deleted
    C:\WINDOWS\SYSTEM32\APPDQ.EXE - Deleted
    C:\WINDOWS\SYSTEM32\APPEV.EXE - Deleted
    C:\WINDOWS\SYSTEM32\APPHV32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\APPLS.EXE - Deleted
    C:\WINDOWS\SYSTEM32\APPMW.EXE - Deleted
    C:\WINDOWS\SYSTEM32\APPUE.EXE - Deleted
    C:\WINDOWS\SYSTEM32\APPZQ32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\ATLFE32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\ATLFL32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\ATLOM.EXE - Deleted
    C:\WINDOWS\SYSTEM32\ATLUV.EXE - Deleted
    C:\WINDOWS\SYSTEM32\ATLVA32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\ATLYG.EXE - Deleted
    C:\WINDOWS\SYSTEM32\ATLZG32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\CREX32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\CRIM32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\CRIR32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\CRLB.EXE - Deleted
    C:\WINDOWS\SYSTEM32\CRQK.EXE - Deleted
    C:\WINDOWS\SYSTEM32\CRSB32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\CRSO.EXE - Deleted
    C:\WINDOWS\SYSTEM32\CRST32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\CRSY32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\CRWZ32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\CRZG32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\D3AF.EXE - Deleted
    C:\WINDOWS\SYSTEM32\D3DL32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\D3ES32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\D3FA32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\D3HG.EXE - Deleted
    C:\WINDOWS\SYSTEM32\D3MS32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\D3NN.EXE - Deleted
    C:\WINDOWS\SYSTEM32\D3UB.EXE - Deleted
    C:\WINDOWS\SYSTEM32\D3WE32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\IEDO32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\IEED32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\IEPI.EXE - Deleted
    C:\WINDOWS\SYSTEM32\IPDP32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\IPFM32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\IPGV32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\IPIB.EXE - Deleted
    C:\WINDOWS\SYSTEM32\IPRL32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\IPYX32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\JAVAAQ32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\JAVADB32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\JAVAKN32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\JAVAMS32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\JAVARS32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\JAVASG32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\MFCBS32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\MFCET.EXE - Deleted
    C:\WINDOWS\SYSTEM32\MFCHO.EXE - Deleted
    C:\WINDOWS\SYSTEM32\MFCIF32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\MFCQG32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\MSCI.EXE - Deleted
    C:\WINDOWS\SYSTEM32\MSHB32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\MSJA32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\MSNL.EXE - Deleted
    C:\WINDOWS\SYSTEM32\MSPP32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\MSXI32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\MSZM.EXE - Deleted
    C:\WINDOWS\SYSTEM32\NETHV32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\NETLA.EXE - Deleted
    C:\WINDOWS\SYSTEM32\NETMA.EXE - Deleted
    C:\WINDOWS\SYSTEM32\NETOK.EXE - Deleted
    C:\WINDOWS\SYSTEM32\NETVR.EXE - Deleted
    C:\WINDOWS\SYSTEM32\NETYV.EXE - Deleted
    C:\WINDOWS\SYSTEM32\NTBZ32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\NTCJ.EXE - Deleted
    C:\WINDOWS\SYSTEM32\NTCQ32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\NTGO.EXE - Deleted
    C:\WINDOWS\SYSTEM32\NTGY32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\NTHU32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\NTXM32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\SDKAF32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\SDKBJ32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\SDKBO.EXE - Deleted
    C:\WINDOWS\SYSTEM32\SDKFU32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\SDKOD32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\SDKOL32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\SYSCL.EXE - Deleted
    C:\WINDOWS\SYSTEM32\SYSGM32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\SYSLP32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\SYSPD32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\SYSUX.EXE - Deleted
    C:\WINDOWS\SYSTEM32\WINGX32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\WINHW32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\WINJX.EXE - Deleted
    C:\WINDOWS\SYSTEM32\WINKI32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\WINLK32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\WINRU32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\WINTJ32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\WINUT.EXE - Deleted
    C:\WINDOWS\SYSTEM32\WINVE32.EXE - Deleted
    C:\WINDOWS\SYSTEM32\WINVF.EXE - Deleted
    C:\WINDOWS\ADDNP.EXE - Deleted
    C:\WINDOWS\ADDNX32.EXE - Deleted
    C:\WINDOWS\ADDTL32.EXE - Deleted
    C:\WINDOWS\ADDTZ32.EXE - Deleted
    C:\WINDOWS\ADDUP.EXE - Deleted
    C:\WINDOWS\ADDWM32.EXE - Deleted
    C:\WINDOWS\ADDXP32.EXE - Deleted
    C:\WINDOWS\ADDXS32.EXE - Deleted
    C:\WINDOWS\ADDYV32.EXE - Deleted
    C:\WINDOWS\ADDZU32.EXE - Deleted
    C:\WINDOWS\ADDZW.EXE - Deleted
    C:\WINDOWS\APIEG.EXE - Deleted
    C:\WINDOWS\APIJU32.EXE - Deleted
    C:\WINDOWS\APINQ32.EXE - Deleted
    C:\WINDOWS\APIQS32.EXE - Deleted
    C:\WINDOWS\APPET.EXE - Deleted
    C:\WINDOWS\APPNF.EXE - Deleted
    C:\WINDOWS\APPRY32.EXE - Deleted
    C:\WINDOWS\APPZC.EXE - Deleted
    C:\WINDOWS\ATLBC.EXE - Deleted
    C:\WINDOWS\ATLBX.EXE - Deleted
    C:\WINDOWS\ATLCI32.EXE - Deleted
    C:\WINDOWS\ATLDH32.EXE - Deleted
    C:\WINDOWS\ATLEL32.EXE - Deleted
    C:\WINDOWS\ATLVB.EXE - Deleted
    C:\WINDOWS\ATLWC32.EXE - Deleted
    C:\WINDOWS\ATLYP32.EXE - Deleted
    C:\WINDOWS\CRER32.EXE - Deleted
    C:\WINDOWS\CRHD.EXE - Deleted
    C:\WINDOWS\CRIJ.EXE - Deleted
    C:\WINDOWS\CRKE.EXE - Deleted
    C:\WINDOWS\CRLD32.EXE - Deleted
    C:\WINDOWS\CRUS32.EXE - Deleted
    C:\WINDOWS\CRVT.EXE - Deleted
    C:\WINDOWS\CRWY.EXE - Deleted
    C:\WINDOWS\D3BP32.EXE - Deleted
    C:\WINDOWS\D3KL.EXE - Deleted
    C:\WINDOWS\D3KY.EXE - Deleted
    C:\WINDOWS\D3NO.EXE - Deleted
    C:\WINDOWS\D3PZ32.EXE - Deleted
    C:\WINDOWS\D3RO.EXE - Deleted
    C:\WINDOWS\D3SJ32.EXE - Deleted
    C:\WINDOWS\D3YI32.EXE - Deleted
    C:\WINDOWS\IEBI.EXE - Deleted
    C:\WINDOWS\IEIL32.EXE - Deleted
    C:\WINDOWS\IEUR32.EXE - Deleted
    C:\WINDOWS\IEVJ32.EXE - Deleted
    C:\WINDOWS\IPEV.EXE - Deleted
    C:\WINDOWS\IPLB32.EXE - Deleted
    C:\WINDOWS\IPRT32.EXE - Deleted
    C:\WINDOWS\IPUD32.EXE - Deleted
    C:\WINDOWS\IPWQ.EXE - Deleted
    C:\WINDOWS\IPYC.EXE - Deleted
    C:\WINDOWS\IPYP32.EXE - Deleted
    C:\WINDOWS\JAVAAJ.EXE - Deleted
    C:\WINDOWS\JAVADD32.EXE - Deleted
    C:\WINDOWS\JAVAJK.EXE - Deleted
    C:\WINDOWS\JAVALN32.EXE - Deleted
    C:\WINDOWS\JAVAQS.EXE - Deleted
    C:\WINDOWS\JAVARC.EXE - Deleted
    C:\WINDOWS\MFCCV32.EXE - Deleted
    C:\WINDOWS\MFCFB.EXE - Deleted
    C:\WINDOWS\MFCMM.EXE - Deleted
    C:\WINDOWS\MFCNM32.EXE - Deleted
    C:\WINDOWS\MFCSE32.EXE - Deleted
    C:\WINDOWS\MSBC32.EXE - Deleted
    C:\WINDOWS\MSLU.EXE - Deleted
    C:\WINDOWS\MSTA32.EXE - Deleted
    C:\WINDOWS\MSTJ32.EXE - Deleted
    C:\WINDOWS\MSTS32.EXE - Deleted
    C:\WINDOWS\MSYL.EXE - Deleted
    C:\WINDOWS\MSYT.EXE - Deleted
    C:\WINDOWS\NETHL32.EXE - Deleted
    C:\WINDOWS\NETPF32.EXE - Deleted
    C:\WINDOWS\NETQL32.EXE - Deleted
    C:\WINDOWS\NETSM32.EXE - Deleted
    C:\WINDOWS\NETYO.EXE - Deleted
    C:\WINDOWS\NTDS.EXE - Deleted
    C:\WINDOWS\NTDX.EXE - Deleted
    C:\WINDOWS\NTJK32.EXE - Deleted
    C:\WINDOWS\NTUB32.EXE - Deleted
    C:\WINDOWS\NTZH32.EXE - Deleted
    C:\WINDOWS\SDKBJ.EXE - Deleted
    C:\WINDOWS\SDKIO.EXE - Deleted
    C:\WINDOWS\SDKJP32.EXE - Deleted
    C:\WINDOWS\SDKRA.EXE - Deleted
    C:\WINDOWS\SDKXD32.EXE - Deleted
    C:\WINDOWS\SYSDF32.EXE - Deleted
    C:\WINDOWS\SYSED.EXE - Deleted
    C:\WINDOWS\SYSER32.EXE - Deleted
    C:\WINDOWS\SYSKI.EXE - Deleted
    C:\WINDOWS\SYSPF.EXE - Deleted
    C:\WINDOWS\SYSQM32.EXE - Deleted
    C:\WINDOWS\SYSRW.EXE - Deleted
    C:\WINDOWS\SYSVR32.EXE - Deleted
    C:\WINDOWS\SYSWL.EXE - Deleted
    C:\WINDOWS\WINBE32.EXE - Deleted
    C:\WINDOWS\WINEB.EXE - Deleted
    C:\WINDOWS\WINFT.EXE - Deleted
    C:\WINDOWS\WINGU.EXE - Deleted
    C:\WINDOWS\WINIQ32.EXE - Deleted
    C:\WINDOWS\WINMO32.EXE - Deleted
    C:\WINDOWS\WINRC.EXE - Deleted
    C:\WINDOWS\WINSQ.EXE - Deleted
    C:\WINDOWS\WINZF32.EXE - Deleted





    Removing Temp Files

    ADS Check :



    Final Check :

    catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-10-16 00:29:10
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden services & system hive ...

    scanning hidden registry entries ...

    scanning hidden files ...

    scan completed successfully
    hidden processes: 0
    hidden services: 0
    hidden files: 0


    Remaining Services :




    Authorized Application Key Export:

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
    "C:\\Program Files\\Messenger\\msmsgs.exe"="C:\\Program Files\\Messenger\\msmsgs.exe:*:Enabled:Windows Messenger"
    "C:\\Program Files\\Microsoft ActiveSync\\rapimgr.exe"="C:\\Program Files\\Microsoft ActiveSync\\rapimgr.exe:*:Disabled:ActiveSync RAPI Manager"
    "C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"="C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe:*:Enabled:HP Digital Imaging Monitor"
    "C:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe"="C:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe:*:Enabled:Logitech Desktop Messenger"
    "C:\\Program Files\\Kaspersky Lab\\Kaspersky Anti-Virus 7.0\\avp.exe"="C:\\Program Files\\Kaspersky Lab\\Kaspersky Anti-Virus 7.0\\avp.exe:*:Enabled:Kaspersky Anti-Virus 7.0"
    "C:\\kav\\kav7\\setup.exe"="C:\\kav\\kav7\\setup.exe:*:Enabled:Kaspersky Anti-Virus 7.0 Setup"
    "C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"="C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe:*:Enabled:hpqscnvw"
    "C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"="C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe:*:Enabled:HP CUE-Scanning Flow Component"
    "C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqcopy.exe"="C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqcopy.exe:*:Enabled: "
    "C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqiscfg.exe"="C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqiscfg.exe:*:Enabled:HP Instant Share Setup"
    "C:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"="C:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe:*:Enabled:HP AiO Fax Manager"
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:mad:xpsp3res.dll,-20000"
    "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:mad:xpsp2res.dll,-22019"
    "C:\\Program Files\\Cartoon Network\\Ben 10 Bounty Hunters\\RT_Multiplayer.exe"="C:\\Program Files\\Cartoon Network\\Ben 10 Bounty Hunters\\RT_Multiplayer.exe:*:Enabled:RT_Multi Application"
    "C:\\Program Files\\TurboTax\\Deluxe 2007\\32bit\\ttax.exe"="C:\\Program Files\\TurboTax\\Deluxe 2007\\32bit\\ttax.exe:LocalSubNet:Enabled:TurboTax"
    "C:\\Program Files\\TurboTax\\Deluxe 2007\\32bit\\updatemgr.exe"="C:\\Program Files\\TurboTax\\Deluxe 2007\\32bit\\updatemgr.exe:LocalSubNet:Enabled:TurboTax Update Manager"

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
    "C:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe"="C:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe:*:Enabled:Logitech Desktop Messenger"
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:mad:xpsp3res.dll,-20000"
    "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:mad:xpsp2res.dll,-22019"

    Remaining Files :


    File Backups: - C:\SDFix\backups\backups.zip

    Files with Hidden Attributes :


    Finished!
     
  13. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Please do an online scan with Kaspersky WebScanner

    Kaspersky online scanner uses JAVA tecnology to perform the scan. If you do not have the latest JAVA version, follow the instrutions below under Upgrading Java, to download and install the latest vesion.

    • Read through the requirements and privacy statement and click on Accept button.
    • It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
    • When the downloads have finished, click on Settings.
    • Make sure the following is checked.
      • Spyware, Adware, Dialers, and other potentially dangerous programs
        [*]Archives
        [*]Mail databases
    • Click on My Computer under Scan.
    • Once the scan is complete, it will display the results. Click on View Scan Report.
    • You will see a list of infected items there. Click on Save Report As....
    • Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button.
    • Please post this log in your next reply.
     
  14. makomyday325

    makomyday325 Thread Starter

    Joined:
    Jul 19, 2005
    Messages:
    96
    I couldn't run Kaspersky online for some reason; however, I ran it directly from the desktop. Yes, I do have a more current version of Java. Kaspersky detects, but is not able to disinfect. Below I just selected all and copied and pasted for you to see. Where my name shows, I simply replaced my last name with "x"s.

    This trojan seems very resilient. What next doctor?


    deleted: Trojan program Backdoor.Win32.UltimateDefender.be File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP667\A0302417.exe//CryptFF//PE_Patch.UPX//UPX
    detected: Trojan program Backdoor.Win32.UltimateDefender.be File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP668\A0302423.exe//CryptFF//PE_Patch.UPX//UPX
    detected: Trojan program Backdoor.Win32.UltimateDefender.be File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP668\A0302424.exe//CryptFF//PE_Patch.UPX//UPX
    detected: Trojan program Backdoor.Win32.UltimateDefender.be File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP669\A0302429.exe//CryptFF//PE_Patch.UPX//UPX
    detected: Trojan program Backdoor.Win32.UltimateDefender.be File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP669\A0302430.exe//CryptFF//PE_Patch.UPX//UPX
    detected: new threat not-a-virus:FraudTool.Win32.AntiSpyware.ii File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP669\A0302458.exe//AdwareAlert/AdwareAlert.srv.exe
    detected: new threat not-a-virus:FraudTool.Win32.SpywareStop.gp File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP669\A0302458.exe//AdwareAlert/SpyCleaner.dll
    detected: new threat not-a-virus:FraudTool.Win32.SpywareStop.gp File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP669\A0302505.dll
    detected: virus Heur.Invader (modification) File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP672\A0303711.exe
    detected: virus Heur.Invader (modification) File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP672\A0303779.exe/SDFix\catchme.exe
    detected: virus Heur.Invader (modification) File: C:\System Volume Information\_restore{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP672\A0303779.exe/SDFix\apps\Cghtme.exe
    detected: new threat not-a-virus:FraudTool.Win32.AntiVirGear.e File: C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus\Quarantine\687D0368//CryptFF//Armadillo
    detected: virus Heur.Invader (modification) File: C:\Documents and Settings\Paul xxxxxxxxx\Desktop\SDFix.exe/SDFix\catchme.exe
    detected: virus Heur.Invader (modification) File: C:\Documents and Settings\Paul xxxxxxxxx\Desktop\SDFix.exe/SDFix\apps\Cghtme.exe
    detected: new threat not-a-virus:FraudTool.Win32.AntiSpyware.ii File: C:\Documents and Settings\Paul xxxxxxxxx\Local Settings\Temporary Internet Files\Content.IE5\BDLPA9TJ\setupxv[1].exe//AdwareAlert/AdwareAlert.srv.exe
    detected: new threat not-a-virus:FraudTool.Win32.SpywareStop.gp File: C:\Documents and Settings\Paul xxxxxxxxx\Local Settings\Temporary Internet Files\Content.IE5\BDLPA9TJ\setupxv[1].exe//AdwareAlert/SpyCleaner.dll
    detected: virus Heur.Invader (modification) File: C:\SDFix\catchme.exe
    detected: virus Heur.Invader (modification) File: C:\SDFix\apps\Cghtme.exe
     
  15. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    There is nothing there to be concerned about. Most of that is in system restore which you can purge by turning it off, restarting the machine and turning it back on.

    Norton quarantine can be emptied.

    To remove SDFix and associated files/folders download OTCleanIt. Save this application on your desktop. Once downloaded Double click on the OTCleanIt.exe. This should remove most malware tools you downloaded. A restart will be required.

    Clean your Temporary internet files and folders by downloading ATF Cleaner by Atribune.

    • Double-click ATF-Cleaner.exe to run the program.
    • Under Main choose: Select All
    • Click the Empty Selected button.

    Click Exit on the Main menu to close the program.
     
  16. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/757809

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice