1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Solved: zinblog.com infected... please help....

Discussion in 'Virus & Other Malware Removal' started by bursoysoy, Mar 15, 2007.

Thread Status:
Not open for further replies.
Advertisement
  1. bursoysoy

    bursoysoy Thread Starter

    Joined:
    Mar 15, 2007
    Messages:
    11
    i am infected by zinblog and i fomatted my hard drive. i backed up my files to an external hard drive. when i formatted my hard drive everything was cool, but when i put my files back, zinblog came back again. please help me remove infections on my C: and D: drives... thanks...
     
  2. bursoysoy

    bursoysoy Thread Starter

    Joined:
    Mar 15, 2007
    Messages:
    11
    Logfile of HijackThis v1.99.1
    Scan saved at 8:56:23 PM, on 3/15/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    C:\Program Files\Alwil Software\Avast4\ashServ.exe
    C:\WINDOWS\eHome\ehRecvr.exe
    C:\WINDOWS\eHome\ehSched.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
    C:\WINDOWS\system32\dllhost.exe
    C:\WINDOWS\ehome\ehtray.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\WINDOWS\System32\WScript.exe
    C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    C:\Program Files\Java\jre1.5.0_11\bin\jusched.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\WINDOWS\eHome\ehmsas.exe
    C:\WINDOWS\system32\wpabaln.exe
    C:\WINDOWS\system32\wscript.exe
    C:\WINDOWS\system32\wscript.exe
    C:\WINDOWS\system32\wscript.exe
    D:\Maxis\The Sims 8 in 1\The Sims\Sims.exe
    C:\WINDOWS\explorer.exe
    C:\Program Files\AntiVir PersonalEdition Classic\sched.exe
    C:\Program Files\AntiVir PersonalEdition Classic\avguard.exe
    C:\Program Files\AntiVir PersonalEdition Classic\avgnt.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    C:\Program Files\Hijackthis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://zinblog.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://zinblog.com
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Hacked by Godzilla
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    F2 - REG:system.ini: Shell=explorer.exe C:\WINDOWS\system\lsass.exe
    F2 - REG:system.ini: UserInit=userinit.exe,C:\WINDOWS\system\lsass.exe
    O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_11\bin\ssv.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [MS32DLL] C:\WINDOWS\MS32DLL.dll.vbs
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [WinampAgent] C:\Program Files\Winamp\winampa.exe
    O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.5.0_11\bin\jusched.exe"
    O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
    O4 - HKLM\..\Run: [Task Manager] C:\WINDOWS\svhost32.exe
    O4 - HKLM\..\Run: [avgnt] "C:\Program Files\AntiVir PersonalEdition Classic\avgnt.exe" /min
    O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [ChikkaDefault] C:\PROGRA~1\CHIKKA~1\CHIKKA~1.4\ChikkaLauncher.exe
    O4 - HKCU\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet
    O4 - Startup: LimeWire On Startup.lnk = C:\Program Files\LimeWire\LimeWire.exe
    O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O7 - HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
    O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
    O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycmap.htm
    O8 - Extra context menu item: Yahoo! &SMS - file:///C:\Program Files\Yahoo!\Common/ycsms.htm
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_11\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_11\bin\ssv.dll
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
    O23 - Service: AntiVir PersonalEdition Classic Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\AntiVir PersonalEdition Classic\sched.exe
    O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - AVIRA GmbH - C:\Program Files\AntiVir PersonalEdition Classic\avguard.exe
    O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - Unknown owner - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    O23 - Service: avast! Antivirus - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashServ.exe
    O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
    O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
     
  3. bursoysoy

    bursoysoy Thread Starter

    Joined:
    Mar 15, 2007
    Messages:
    11
    my task manager and registry editor has been disabled also... i appreciate the help... thanks...
     
  4. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    You have Avast and Antivir - remove one - only one active AV on a system

    Download http://downloads.andymanchesta.com/RemovalTools/SDFix.exe and save it to your Desktop.

    Double click SDFix.exe and it will extract the files to %systemdrive%
    (Drive that contains the Windows Directory, typically C:\SDFix)

    Please then reboot your computer in Safe Mode by doing the following :
    · Restart your computer
    · After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
    · Instead of Windows loading as normal, the Advanced Options Menu should appear;
    · Select the first option, to run Windows in Safe Mode, then press Enter.
    · Choose your usual account.
    · Open the extracted SDFix folder and double click RunThis.bat to start the script.
    · Type Y to begin the cleanup process.
    · It will remove any Trojan Services and Registry Entries that it finds then prompt you to press any key to Reboot.
    · Press any Key and it will restart the PC.
    · When the PC restarts the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
    · Once the desktop icons load the SDFix report will open on screen and also save into the SDFix folder as Report.txt
    (Report.txt will also be copied to Clipboard ready for posting back on the forum).
    · Finally paste the contents of the Report.txt back on the forum with a new HijackThis log
    ===================
    Download Superantispyware (SAS)

    http://www.superantispyware.com/superantispywarefreevspro.html

    Install it and double-click the icon on your desktop to run it.
    · It will ask if you want to update the program definitions, click Yes.
    · Under Configuration and Preferences, click the Preferences button.
    · Click the Scanning Control tab.
    · Under Scanner Options make sure the following are checked:
    o Close browsers before scanning
    o Scan for tracking cookies
    o Terminate memory threats before quarantining.
    o Please leave the others unchecked.
    o Click the Close button to leave the control center screen.
    · On the main screen, under Scan for Harmful Software click Scan your computer.
    · On the left check C:\Fixed Drive.
    · On the right, under Complete Scan, choose Perform Complete Scan.
    · Click Next to start the scan. Please be patient while it scans your computer.
    · After the scan is complete a summary box will appear. Click OK.
    · Make sure everything in the white box has a check next to it, then click Next.
    · It will quarantine what it found and if it asks if you want to reboot, click Yes.
    · To retrieve the removal information for me please do the following:
    o After reboot, double-click the SUPERAntispyware icon on your desktop.
    o Click Preferences. Click the Statistics/Logs tab.
    o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    o It will open in your default text editor (such as Notepad/Wordpad).
    o Please highlight everything in the notepad, then right-click and choose copy.
    · Click close and close again to exit the program.
    · Please paste that information here for me with a new HijackThis log.
     
  5. bursoysoy

    bursoysoy Thread Starter

    Joined:
    Mar 15, 2007
    Messages:
    11
    SDFix log:


    SDFix: Version 1.72

    Run by x - Fri 03/16/2007 / 0:40:03.17

    Microsoft Windows XP [Version 5.1.2600]

    Running From: C:\Documents and Settings\x\Desktop\SDFix

    Safe Mode:
    Checking Services:






    Restoring Windows Registry Entries
    Restoring Default Hosts File


    Rebooting...

    Normal Mode:
    Checking Files:

    No Trojan Files Found...




    ADS Check:

    C:\WINDOWS\system32
    No streams found.


    Final Check:

    Remaining Services:
    ------------------



    Authorized Application Key Export:

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:mad:xpsp2res.dll,-22019"
    "C:\\WINDOWS\\system32\\dpvsetup.exe"="C:\\WINDOWS\\system32\\dpvsetup.exe:*:Enabled:Microsoft DirectPlay Voice Test"
    "C:\\WINDOWS\\system32\\rundll32.exe"="C:\\WINDOWS\\system32\\rundll32.exe:*:Enabled:Run a DLL as an App"
    "C:\\Program Files\\LimeWire\\LimeWire.exe"="C:\\Program Files\\LimeWire\\LimeWire.exe:*:Enabled:LimeWire"
    "C:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"="C:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe:*:Enabled:Yahoo! Messenger"
    "C:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"="C:\\Program Files\\Yahoo!\\Messenger\\YServer.exe:*:Enabled:Yahoo! FT Server"


    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:mad:xpsp2res.dll,-22019"


    Remaining Files:
    ---------------


    Checking For Files with Hidden Attributes :

    C:\MS32DLL.dll.vbs
    C:\WINDOWS\MS32DLL.dll.vbs
    C:\WINDOWS\SoftwareDistribution\Download\S-1-5-18\7f9ed00b8ab9f384a670920f20096ec5\BIT1.tmp
    C:\WINDOWS\SoftwareDistribution\Download\S-1-5-18\ca1c9a5f6bfb5c940f7b592a816e164e\BIT2.tmp

    Finished




    hijackthis log:

    Logfile of HijackThis v1.99.1
    Scan saved at 12:47:26 AM, on 3/16/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    C:\Program Files\Alwil Software\Avast4\ashServ.exe
    C:\WINDOWS\eHome\ehRecvr.exe
    C:\WINDOWS\eHome\ehSched.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
    C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    C:\WINDOWS\system32\dllhost.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\ehome\ehtray.exe
    C:\WINDOWS\eHome\ehmsas.exe
    C:\WINDOWS\SOUNDMAN.EXE
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\WINDOWS\System32\WScript.exe
    C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    C:\Program Files\Java\jre1.5.0_11\bin\jusched.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\WINDOWS\system32\wpabaln.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Hijackthis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Hacked by Godzilla
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_11\bin\ssv.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [MS32DLL] C:\WINDOWS\MS32DLL.dll.vbs
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.5.0_11\bin\jusched.exe"
    O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
    O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [ChikkaDefault] C:\PROGRA~1\CHIKKA~1\CHIKKA~1.4\ChikkaLauncher.exe
    O4 - HKCU\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet
    O4 - Startup: LimeWire On Startup.lnk = C:\Program Files\LimeWire\LimeWire.exe
    O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
    O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycmap.htm
    O8 - Extra context menu item: Yahoo! &SMS - file:///C:\Program Files\Yahoo!\Common/ycsms.htm
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_11\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_11\bin\ssv.dll
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
    O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - Unknown owner - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    O23 - Service: avast! Antivirus - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashServ.exe
    O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
    O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe


    now doing a SAS scan...
     
  6. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Run sas and post the logs
     
  7. bursoysoy

    bursoysoy Thread Starter

    Joined:
    Mar 15, 2007
    Messages:
    11
    SAS log:

    SUPERAntiSpyware Scan Log
    Generated 03/16/2007 at 01:11 AM

    Application Version : 3.6.1000

    Core Rules Database Version : 3200
    Trace Rules Database Version: 1210

    Scan type : Complete Scan
    Total Scan Time : 00:15:57

    Memory items scanned : 366
    Memory threats detected : 0
    Registry items scanned : 4122
    Registry threats detected : 1
    File items scanned : 27580
    File threats detected : 84

    Trojan.Downloader-Gen/Win
    [MS32DLL] C:\WINDOWS\MS32DLL.DLL.VBS
    C:\WINDOWS\MS32DLL.DLL.VBS
    C:\MS32DLL.DLL.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP10\A0000365.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP10\A0000366.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP10\A0000382.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP10\A0000383.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP10\A0001449.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP10\A0001450.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP10\A0001479.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP10\A0001480.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP10\A0001503.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP10\A0001504.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001530.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001531.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001587.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001588.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001693.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001694.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001754.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001756.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001782.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001783.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001849.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001850.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001878.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001879.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001904.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001905.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001930.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001931.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP12\A0001941.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP12\A0001942.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP13\A0001965.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP13\A0001966.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP14\A0001984.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP14\A0001985.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP14\A0001999.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP14\A0002000.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP14\A0002038.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP14\A0002039.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP15\A0002118.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP15\A0002119.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP16\A0002124.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP16\A0002125.VBS
    D:\MS32DLL.DLL.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP10\A0000117.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP10\A0000368.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP10\A0000385.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP10\A0001452.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP10\A0001482.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP10\A0001506.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001533.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001590.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001696.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001758.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001785.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001852.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001881.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001907.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP11\A0001933.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP12\A0001944.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP13\A0001968.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP14\A0001987.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP14\A0002002.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP14\A0002041.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP15\A0002121.VBS
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{A1F85470-154C-4A60-B169-52B6A3A7694B}\RP16\A0002127.VBS

    Adware.Tracking Cookie
    C:\Documents and Settings\x\Cookies\[email protected][2].txt
    C:\Documents and Settings\x\Cookies\[email protected][1].txt
    C:\Documents and Settings\x\Cookies\[email protected][2].txt
    C:\Documents and Settings\x\Cookies\[email protected][1].txt
    C:\Documents and Settings\x\Cookies\[email protected][3].txt
    C:\Documents and Settings\x\Cookies\[email protected][2].txt
    C:\Documents and Settings\x\Cookies\[email protected][1].txt
    C:\Documents and Settings\x\Cookies\[email protected][1].txt
    C:\Documents and Settings\x\Cookies\[email protected][2].txt
    C:\Documents and Settings\x\Cookies\[email protected][2].txt
    C:\Documents and Settings\x\Cookies\[email protected][1].txt
    C:\Documents and Settings\x\Cookies\[email protected][2].txt
    C:\Documents and Settings\x\Cookies\[email protected][1].txt
    C:\Documents and Settings\x\Cookies\[email protected][1].txt
    C:\Documents and Settings\x\Cookies\[email protected][1].txt
    C:\Documents and Settings\x\Cookies\[email protected][1].txt
    C:\Documents and Settings\x\Cookies\[email protected][1].txt


    HJT log:


    Logfile of HijackThis v1.99.1
    Scan saved at 7:53:41 AM, on 3/16/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    C:\Program Files\Alwil Software\Avast4\ashServ.exe
    C:\WINDOWS\eHome\ehRecvr.exe
    C:\WINDOWS\eHome\ehSched.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    C:\WINDOWS\ehome\ehtray.exe
    C:\WINDOWS\SOUNDMAN.EXE
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    C:\WINDOWS\eHome\ehmsas.exe
    C:\Program Files\Java\jre1.5.0_11\bin\jusched.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\system32\dllhost.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\system32\wpabaln.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Hijackthis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Hacked by Godzilla
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_11\bin\ssv.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.5.0_11\bin\jusched.exe"
    O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
    O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [ChikkaDefault] C:\PROGRA~1\CHIKKA~1\CHIKKA~1.4\ChikkaLauncher.exe
    O4 - HKCU\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - Startup: LimeWire On Startup.lnk = C:\Program Files\LimeWire\LimeWire.exe
    O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
    O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycmap.htm
    O8 - Extra context menu item: Yahoo! &SMS - file:///C:\Program Files\Yahoo!\Common/ycsms.htm
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_11\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_11\bin\ssv.dll
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - Unknown owner - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    O23 - Service: avast! Antivirus - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashServ.exe
    O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
    O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
     
  8. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
  9. bursoysoy

    bursoysoy Thread Starter

    Joined:
    Mar 15, 2007
    Messages:
    11
    everything seems to be ok, but there is still Hacked by Godzilla in my IE but i don't care i use firefox anyway.

    hey, thanks man, i owe you one, really appreciate the help...


    more power to the forum...
     
  10. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Fix this entry in hijack - mark it - close IE - click fix checked

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Hacked by Godzilla
     
  11. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/551886

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice