1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

HELP...Trojan

Discussion in 'Virus & Other Malware Removal' started by XeqTr, Jan 26, 2007.

Thread Status:
Not open for further replies.
Advertisement
  1. XeqTr

    XeqTr Thread Starter

    Joined:
    Jan 26, 2007
    Messages:
    6
    My computer was infected with the last version of PSW.X-Vir trojan...I visited some forums ,i downloaded "Hijacjthis!", i did a full scan and this is what i came up with...Please tell me if i can do something about that trojan or do a format on my hard disk...i think the trojan's name is "[email protected]" or something like that...

    Hyjackthis...


    Logfile of HijackThis v1.99.1
    Scan saved at 11:23:18 AM, on 1/27/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Video ActiveX Object\pmsngr.exe
    C:\Program Files\Video ActiveX Object\isamonitor.exe
    C:\Program Files\Eset\nod32kui.exe
    C:\Program Files\Video ActiveX Object\pmmon.exe
    C:\WINDOWS\system32\RUNDLL32.EXE
    C:\Program Files\Video ActiveX Object\isamini.exe
    C:\WINDOWS\system32\devldr32.exe
    C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe
    C:\Program Files\Eset\nod32krn.exe
    C:\Program Files\Norton Utilities\NPROTECT.EXE
    C:\WINDOWS\system32\nvsvc32.exe
    C:\Program Files\Speed Disk\nopdb.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Hijackthis\HijackThis.exe

    O2 - BHO: (no name) - {67982BB7-0F95-44C5-92DC-E3AF3DC19D6D} - C:\Program Files\Video ActiveX Object\isaddon.dll
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKLM\..\Run: [nod32kui] "C:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
    O4 - HKCU\..\Run: [CyberDefender Early Detection Center] "C:\Program Files\CyberDefender\AntiSpyware\cdascc.exe" /minimize
    O4 - HKCU\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet
    O17 - HKLM\System\CCS\Services\Tcpip\..\{D866F051-0039-460A-910F-3B0E5100FC90}: NameServer = 193.231.100.2,193.231.100.3
    O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - C:\Program Files\Eset\nod32krn.exe
    O23 - Service: Norton Unerase Protection (NProtectService) - Symantec Corporation - C:\Program Files\Norton Utilities\NPROTECT.EXE
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: RapApp - Internet Security Systems, Inc. - C:\Program Files\ISS\BlackICE\rapapp.exe
    O23 - Service: Speed Disk service - Symantec Corporation - C:\Program Files\Speed Disk\nopdb.exe
     
  2. Cheeseball81

    Cheeseball81 Retired Moderator

    Joined:
    Mar 3, 2004
    Messages:
    84,315
    Please download SmitfraudFix (by S!Ri)
    Extract the content (a folder named SmitfraudFix) to your Desktop.

    Open the SmitfraudFix folder and double-click smitfraudfix.cmd
    Select option #1 - Search by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present).
    Please copy/paste the content of that report into your next reply.

    Note : process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
    http://www.beyondlogic.org/consulting/proc...processutil.htm
     
  3. XeqTr

    XeqTr Thread Starter

    Joined:
    Jan 26, 2007
    Messages:
    6
    SmitFraudFix v2.136

    Scan done at 17:06:26.68, Sun 01/28/2007
    Run from C:\Documents and Settings\xp\Desktop\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    The filesystem type is NTFS
    Fix run in normal mode

    »»»»»»»»»»»»»»»»»»»»»»»» C:\


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\xp


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\xp\Application Data


    »»»»»»»»»»»»»»»»»»»»»»»» Start Menu

    C:\DOCUME~1\ALLUSE~1\STARTM~1\Online Security Guide.url FOUND !
    C:\DOCUME~1\ALLUSE~1\STARTM~1\Security Troubleshooting.url FOUND !

    »»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\xp\FAVORI~1

    C:\DOCUME~1\xp\FAVORI~1\Online Security Test.url FOUND !

    »»»»»»»»»»»»»»»»»»»»»»»» Desktop


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files

    C:\Program Files\Video ActiveX Object\ FOUND !

    »»»»»»»»»»»»»»»»»»»»»»»» Corrupted keys


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop Components

    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
    "Source"="About:Home"
    "SubscribedURL"="About:Home"
    "FriendlyName"="My Current Home Page"


    »»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
    "{fa19bd7e-50bc-4203-80ac-c4edc81ca9a3}"="hirtellous"



    »»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
    "AppInit_DLLs"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "System"=""


    »»»»»»»»»»»»»»»»»»»»»»»» pe386-msguard-lzx32-huy32


    »»»»»»»»»»»»»»»»»»»»»»»» Scanning wininet.dll infection


    »»»»»»»»»»»»»»»»»»»»»»»» End
     
  4. Cheeseball81

    Cheeseball81 Retired Moderator

    Joined:
    Mar 3, 2004
    Messages:
    84,315
    You should print out these instructions, or copy them to a NotePad file for reading while in Safe Mode, because you will not be able to connect to the Internet to read from this site.

    Next, please reboot your computer in Safe Mode by doing the following :
    • Restart your computer
    • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
    • Instead of Windows loading as normal, a menu with options should appear;
    • Select the first option, to run Windows in Safe Mode, then press "Enter".
    • Choose your usual account.
    Once in Safe Mode, open the SmitfraudFix folder again and double-click smitfraudfix.cmd
    Select option #2 - Clean by typing 2 and press "Enter" to delete infected files.

    You will be prompted: "Registry cleaning - Do you want to clean the registry?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.

    The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".

    The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart it into Normal Windows.

    A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply.

    The report can also be found at the root of the system drive, usually at C:\rapport.txt

    Warning: running option #2 on a non infected computer will remove your Desktop background.
     
  5. XeqTr

    XeqTr Thread Starter

    Joined:
    Jan 26, 2007
    Messages:
    6
    SmitFraudFix v2.136

    Scan done at 0:04:10.89, Mon 01/29/2007
    Run from C:\Documents and Settings\xp\Desktop\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    The filesystem type is NTFS
    Fix run in safe mode

    »»»»»»»»»»»»»»»»»»»»»»»» Before SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
    "{fa19bd7e-50bc-4203-80ac-c4edc81ca9a3}"="hirtellous"


    »»»»»»»»»»»»»»»»»»»»»»»» Killing process


    »»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

    GenericRenosFix by S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files

    C:\DOCUME~1\ALLUSE~1\STARTM~1\Online Security Guide.url Deleted
    C:\DOCUME~1\ALLUSE~1\STARTM~1\Security Troubleshooting.url Deleted
    C:\DOCUME~1\xp\FAVORI~1\Online Security Test.url Deleted
    C:\Program Files\Video ActiveX Object\ Deleted

    »»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


    »»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "System"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

    Registry Cleaning done.

    »»»»»»»»»»»»»»»»»»»»»»»» After SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll


    »»»»»»»»»»»»»»»»»»»»»»»» End
     
  6. Cheeseball81

    Cheeseball81 Retired Moderator

    Joined:
    Mar 3, 2004
    Messages:
    84,315
    Download AVG Anti-Spyware from HERE and save that file to your desktop.

    When the trial period expires it becomes feature-limited freeware but is still worth keeping as a good on-demand scanner.


    1. Once you have downloaded AVG Anti-Spyware, locate the icon on the desktop and double click it to launch the set up program.
    2. Once the setup is complete you will need run AVG Anti-Spyware and update the definition files.
    3. On the main screen select the icon "Update" then select the "Update now" link.
      • Next select the "Start Update" button. The update will start and a progress bar will show the updates being installed.
    4. Once the update has completed, select the "Scanner" icon at the top of the screen, then select the "Settings" tab.
    5. Once in the Settings screen click on "Recommended actions" and then select "Quarantine".
    6. Under "Reports"
      • Select "Automatically generate report after every scan"
      • Un-Select "Only if threats were found"
    Close AVG Anti-Spyware. Do Not run a scan just yet, we will run it in safe mode.
    1. Reboot your computer into Safe Mode. You can do this by restarting your computer and continually tapping the F8 key until a menu appears. Use your up arrow key to highlight Safe Mode then hit enter.

      IMPORTANT: Do not open any other windows or programs while AVG Anti-Spyware is scanning as it may interfere with the scanning process:
    2. Launch AVG Anti-Spyware by double clicking the icon on your desktop.
    3. Select the "Scanner" icon at the top and then the "Scan" tab then click on "Complete System Scan".
    4. AVG will now begin the scanning process. Please be patient as this may take a little time.
      Once the scan is complete, do the following:
    5. If you have any infections you will be prompted. Then select "Apply all actions."
    6. Next select the "Reports" icon at the top.
    7. Select the "Save report as" button in the lower lef- hand of the screen and save it to a text file on your system (make sure to remember where you saved that file. This is important).
    8. Close AVG Anti-Spyware and reboot your system back into Normal Mode.


    Please go HERE to run Panda's ActiveScan
    • Once you are on the Panda site click the Scan your PC button
    • A new window will open...click the Check Now button
    • Enter your Country
    • Enter your State/Province
    • Enter your e-mail address and click send
    • Select either Home User or Company
    • Click the big Scan Now button
    • If it wants to install an ActiveX component allow it
    • It will start downloading the files it requires for the scan (Note: It may take a couple of minutes)
    • When download is complete, click on My Computer to start the scan
    • When the scan completes, if anything malicious is detected, click the See Report button, then Save Report and save it to a convenient location. Post the contents of the ActiveScan report


    Come back here and post a new HijackThis log along with the logs from the AVG and Panda scans.
     
  7. XeqTr

    XeqTr Thread Starter

    Joined:
    Jan 26, 2007
    Messages:
    6
    First i ran avg. Note that i first saved the rapport then i selected "apply all actions"...

    ---------------------------------------------------------
    AVG Anti-Spyware - Scan Report
    ---------------------------------------------------------

    + Created at: 12:19:15 PM 1/30/2007

    + Scan result:



    D:\Games\GTA-SA\GTA San Andreas\HLM-INTR.EXE -> Backdoor.Hupigon.kg : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP54\A0014980.EXE -> Downloader.Zlob.bkn : No action taken.
    C:\Program Files\Hijackthis\backups\backup-20070125-233247-714.dll -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP51\A0013776.dll -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP51\A0013777.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP51\A0013778.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0013833.dll -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0013834.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0013835.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0014833.dll -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0014834.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0014835.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0014864.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0014865.dll -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0014866.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0014926.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0014927.dll -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0014928.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP54\A0015038.EXE -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP54\A0015039.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0015969.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0015970.dll -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0015971.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0015981.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0015982.dll -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0015983.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0016077.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0016078.dll -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0016079.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0016095.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0016096.dll -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0016097.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016117.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016118.dll -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016119.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016131.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016132.dll -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016133.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016194.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016195.dll -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016196.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016223.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016224.dll -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016225.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP57\A0016421.dll -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP57\A0016422.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP57\A0016423.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP57\A0016424.exe -> Downloader.Zlob.bls : No action taken.
    C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP57\A0016425.exe -> Downloader.Zlob.bls : No action taken.
    C:\Documents and Settings\xp\Cookies\[email protected][1].txt -> TrackingCookie.Trafic : No action taken.


    ::Report end



    Second i ran panda...


    Incident Status Location

    Potentially unwanted tool:Application/Processor Not disinfected C:\Documents and Settings\xp\Desktop\SmitfraudFix\Process.exe
    Potentially unwanted tool:Application/Processor Not disinfected C:\Documents and Settings\xp\Desktop\SmitfraudFix.zip[SmitfraudFix/Process.exe]
    Potentially unwanted tool:Application/Processor Not disinfected D:\Kitt\pt spyware\SmitfraudFix.zip[SmitfraudFix/Process.exe]


    Finally i ran hijackthis...

    Logfile of HijackThis v1.99.1
    Scan saved at 1:13:53 PM, on 1/30/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Eset\nod32kui.exe
    C:\WINDOWS\system32\RUNDLL32.EXE
    C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
    C:\WINDOWS\system32\devldr32.exe
    C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
    C:\Program Files\Eset\nod32krn.exe
    C:\Program Files\Norton Utilities\NPROTECT.EXE
    C:\WINDOWS\system32\nvsvc32.exe
    C:\Program Files\Speed Disk\nopdb.exe
    C:\WINDOWS\system32\NOTEPAD.EXE
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe
    C:\Program Files\Hijackthis\HijackThis.exe

    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKLM\..\Run: [nod32kui] "C:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
    O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
    O4 - HKCU\..\Run: [CyberDefender Early Detection Center] "C:\Program Files\CyberDefender\AntiSpyware\cdascc.exe" /minimize
    O4 - HKCU\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet
    O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{D866F051-0039-460A-910F-3B0E5100FC90}: NameServer = 193.231.100.2,193.231.100.3
    O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
    O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - C:\Program Files\Eset\nod32krn.exe
    O23 - Service: Norton Unerase Protection (NProtectService) - Symantec Corporation - C:\Program Files\Norton Utilities\NPROTECT.EXE
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: RapApp - Internet Security Systems, Inc. - C:\Program Files\ISS\BlackICE\rapapp.exe
    O23 - Service: Speed Disk service - Symantec Corporation - C:\Program Files\Speed Disk\nopdb.exe
     
  8. XeqTr

    XeqTr Thread Starter

    Joined:
    Jan 26, 2007
    Messages:
    6
    nod32 detected Win32/trojanDownloader.Zlob.AQG trojan...It's quarantined
     
  9. Cheeseball81

    Cheeseball81 Retired Moderator

    Joined:
    Mar 3, 2004
    Messages:
    84,315
    What location was it found in?
     
  10. XeqTr

    XeqTr Thread Starter

    Joined:
    Jan 26, 2007
    Messages:
    6
    D:\system Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP58\A0016436.EXE.
     
  11. Cheeseball81

    Cheeseball81 Retired Moderator

    Joined:
    Mar 3, 2004
    Messages:
    84,315
    Turn off System Restore:

    On the Desktop, right-click My Computer.
    Click Properties.
    Click the System Restore tab.
    Check Turn off System Restore.
    Click Apply, and then click OK.

    Restart your computer.

    Turn System Restore back on and create a restore point.

    To create a restore point:

    Single-click Start and point to All Programs.
    Mouse over Accessories, then System Tools, and select System Restore.
    In the System Restore wizard, select the box next the text labeled "Create a restore point" and click the Next button.
    Type a description for your new restore point. Something like "After trojan/spyware cleanup". Click Create and you're done.
     
  12. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/538494

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice