win 32/nugel.e worm

View previous topic View next topic Go down

win 32/nugel.e worm

Post by JettPro Boss on 30th June 2010, 3:23 pm

Can you look this over for me....I do not know what to delete.
System is running XP, I have scanned system with malwarebytes-anti-malware and it remove some things to allow me to access the desktop. My mouse is now working but my keyboard is not. I have attached a Hijackthis log

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 10:50:05 AM, on 6/30/2010
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
E:\WINDOWS\System32\smss.exe
E:\WINDOWS\system32\csrss.exe
E:\WINDOWS\system32\winlogon.exe
E:\WINDOWS\system32\services.exe
E:\WINDOWS\system32\lsass.exe
E:\WINDOWS\system32\svchost.exe
E:\WINDOWS\system32\svchost.exe
e:\Program Files\Microsoft Security Essentials\MsMpEng.exe
E:\WINDOWS\System32\svchost.exe
E:\WINDOWS\System32\svchost.exe
E:\WINDOWS\System32\svchost.exe
E:\WINDOWS\system32\spoolsv.exe
E:\WINDOWS\Explorer.EXE
E:\Program Files\LogMeIn\x86\LogMeInSystray.exe
E:\Program Files\Common Files\Java\Java Update\jusched.exe
E:\WINDOWS\system32\ctfmon.exe
E:\Program Files\LogMeIn\x86\LMIGuardian.exe
E:\WINDOWS\System32\svchost.exe
E:\WINDOWS\System32\alg.exe
E:\Program Files\Java\jre6\bin\jqs.exe
E:\Program Files\LogMeIn\x86\RaMaint.exe
E:\Program Files\LogMeIn\x86\LogMeIn.exe
E:\Program Files\LogMeIn\x86\LMIGuardian.exe
E:\Program Files\Nero\Nero8\Nero BackItUp\NBService.exe
E:\WINDOWS\system32\IoctlSvc.exe
E:\WINDOWS\System32\HPZipm12.exe
E:\WINDOWS\System32\snmp.exe
E:\WINDOWS\System32\svchost.exe
E:\Program Files\Seagate Replica\bin\Seagate-Replica-Service.exe
E:\Program Files\Seagate Replica\bin\Seagate-Replica-SysMon.exe
E:\Program Files\Seagate Replica\bin\Seagate-Replica-AutoPlay.exe
E:\Program Files\Seagate Replica\bin\Seagate-Replica-Tray.exe
E:\WINDOWS\system32\wuauclt.exe
E:\Program Files\Mozilla Firefox\firefox.exe
E:\Program Files\Spyware Doctor\pctsAuxs.exe
E:\Program Files\Spyware Doctor\pctsSvc.exe
E:\Program Files\Spyware Doctor\pctsTray.exe
E:\Program Files\Spyware Doctor\pctsGui.exe
E:\WINDOWS\system32\wbem\wmiprvse.exe
E:\Program Files\Trend Micro\HijackThis\HijackThis.exe
E:\Program Files\Internet Explorer\IEXPLORE.EXE
E:\Program Files\Internet Explorer\IEXPLORE.EXE
E:\WINDOWS\system32\wbem\wmiprvse.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = [You must be registered and logged in to see this link.]
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,SearchAssistant = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,CustomizeSearch = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = [You must be registered and logged in to see this link.]
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = [You must be registered and logged in to see this link.]
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = [You must be registered and logged in to see this link.]
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = [You must be registered and logged in to see this link.]
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http=127.0.0.1:5577
O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]
O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]
O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]
O1 - Hosts: 217.20.175.74 reviews.toptenreviews.com
O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]
O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]
O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]
O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]
O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]
O1 - Hosts: 217.20.175.74 reviews.reevoo.com
O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]
O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - E:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - E:\Program Files\Microsoft Office\Office12\GrooveShellExtensions.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - E:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - E:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O2 - BHO: Cooliris Plug-In for Internet Explorer - {EAEE5C74-6D0D-4aca-9232-0DA4A7B866BA} - E:\Program Files\PicLensIE\cooliris.dll
O4 - HKLM\..\Run: [LogMeIn GUI] "E:\Program Files\LogMeIn\x86\LogMeInSystray.exe"
O4 - HKLM\..\Run: [QuickTime Task] "E:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [MSSE] "e:\Program Files\Microsoft Security Essentials\msseces.exe" -hide -runkey
O4 - HKLM\..\Run: [SunJavaUpdateSched] "E:\Program Files\Common Files\Java\Java Update\jusched.exe"
O4 - HKLM\..\Run: [ISTray] "E:\Program Files\Spyware Doctor\pctsTray.exe"
O4 - HKCU\..\Run: [ctfmon.exe] E:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [TomTomHOME.exe] "E:\Program Files\TomTom HOME 2\TomTomHOMERunner.exe"
O4 - HKUS\S-1-5-18\..\Run: [DWQueuedReporting] "E:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [DWQueuedReporting] "E:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'Default user')
O4 - Global Startup: HP Digital Imaging Monitor.lnk = E:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - [You must be registered and logged in to see this link.]
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - E:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - E:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra button: Launch Cooliris - {3437D640-C91A-458f-89F5-B9095EA4C28B} - E:\Program Files\PicLensIE\cooliris.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - E:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - E:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - E:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - E:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - E:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} (MSN Games Matchmaking) - [You must be registered and logged in to see this link.]
O16 - DPF: {15B782AF-55D8-11D1-B477-006097098764} (Macromedia Authorware Web Player Control) - [You must be registered and logged in to see this link.]
O16 - DPF: {238F6F83-B8B4-11CF-8771-00A024541EE3} (Citrix ICA Client) - [You must be registered and logged in to see this link.]
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - E:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} (MSN Games Buddy Invite) - [You must be registered and logged in to see this link.]
O16 - DPF: {3EA4FA88-E0BE-419A-A732-9B79B87A6ED0} (CTVUAxCtrl Object) - [You must be registered and logged in to see this link.]
O16 - DPF: {3FE16C08-D6A7-4133-84FC-D5BFB4F7D886} (WebGameLoader Class) - [You must be registered and logged in to see this link.]
O16 - DPF: {4788DE0A-3552-49EA-AC8C-233DA52523B9} (AxLoaderPassword Class) - [You must be registered and logged in to see this link.]
O16 - DPF: {48DD0448-9209-4F81-9F6D-D83562940134} (MySpace Uploader Control) - [You must be registered and logged in to see this link.]
O16 - DPF: {49232000-16E4-426C-A231-62846947304B} (SysData Class) - [You must be registered and logged in to see this link.]
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - [You must be registered and logged in to see this link.]
O16 - DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} (MSN Games Game Chat) - [You must be registered and logged in to see this link.]
O16 - DPF: {60F47E29-4A42-11D2-83ED-02608CA10990} (SmartLOOK CAD Viewer Control) - [You must be registered and logged in to see this link.]
O16 - DPF: {64D01C7F-810D-446E-A07E-16C764235644} (AtlAtomadersCtlAttrib Class) - [You must be registered and logged in to see this link.]
O16 - DPF: {6B75345B-AA36-438A-BBE6-4078B4C6984D} (HpProductDetection Class) - [You must be registered and logged in to see this link.]
O16 - DPF: {7E980B9B-8AE5-466A-B6D6-DA8CF814E78A} (MJLauncherCtrl Class) - [You must be registered and logged in to see this link.]
O16 - DPF: {809A6301-7B40-4436-A02C-87B8D3D7D9E3} (ZPA_DMNO Object) - [You must be registered and logged in to see this link.]
O16 - DPF: {80B626D6-BC34-4BCF-B5A1-7149E4FD9CFA} (UnoCtrl Class) - [You must be registered and logged in to see this link.]
O16 - DPF: {9059F30F-4EB1-4BD2-9FDC-36F43A218F4A} (Microsoft RDP Client Control (redist)) - [You must be registered and logged in to see this link.]
O16 - DPF: {9BDF4724-10AA-43D5-BD15-AEA0D2287303} (MSN Games Texas Holdem Poker) - [You must be registered and logged in to see this link.]
O16 - DPF: {A90A5822-F108-45AD-8482-9BC8B12DD539} (Crucial cpcScan) - [You must be registered and logged in to see this link.]
O16 - DPF: {A9C70AF0-0F2A-11D1-B230-0000C08C00C4} (SSDBCombo Control 3.1) - [You must be registered and logged in to see this link.]
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - [You must be registered and logged in to see this link.]
O16 - DPF: {C86FF4B0-AA1D-46D4-8612-025FB86583C7} (AstoundLauncher Control) - [You must be registered and logged in to see this link.]
O16 - DPF: {D77EF652-9A6B-40C8-A4B9-1C0697C6CF41} (TikGames Online Control) - [You must be registered and logged in to see this link.]
O16 - DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} (MSN Games Game Communicator) - [You must be registered and logged in to see this link.]
O16 - DPF: {E5D419D6-A846-4514-9FAD-97E826C84822} (HeartbeatCtl Class) - [You must be registered and logged in to see this link.]
O16 - DPF: {EAC139A9-D22D-4C29-8D1C-252BE63750F9} - [You must be registered and logged in to see this link.]
O16 - DPF: {FF3C5A9F-5A91-4930-80E8-4709194C2AD3} (CheckersZPA Object) - [You must be registered and logged in to see this link.]
O17 - HKLM\System\CCS\Services\Tcpip\..\{EE9101D2-9DFC-4797-95E5-02ADDDBC2E34}: NameServer = 68.94.156.1,68.94.157.1
O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - E:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll
O23 - Service: AOL Connectivity Service (AOL ACS) - Unknown owner - E:\PROGRA~1\COMMON~1\AOL\ACS\AOLacsd.exe (file missing)
O23 - Service: Google Update Service (gupdate1ca30ade55342f8) (gupdate1ca30ade55342f8) - Google Inc. - E:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - E:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: LogMeIn Maintenance Service (LMIMaint) - LogMeIn, Inc. - E:\Program Files\LogMeIn\x86\RaMaint.exe
O23 - Service: LogMeIn - LogMeIn, Inc. - E:\Program Files\LogMeIn\x86\LogMeIn.exe
O23 - Service: Nero BackItUp Scheduler 3 - Nero AG - E:\Program Files\Nero\Nero8\Nero BackItUp\NBService.exe
O23 - Service: NMIndexingService - Nero AG - E:\Program Files\Common Files\Nero\Lib\NMIndexingService.exe
O23 - Service: PLFlash DeviceIoControl Service - Prolific Technology Inc. - E:\WINDOWS\system32\IoctlSvc.exe
O23 - Service: Pml Driver HPZ12 - HP - E:\WINDOWS\System32\HPZipm12.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - E:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - E:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Seagate-Replica-Service - Unknown owner - E:\Program Files\Seagate Replica\bin\Seagate-Replica-Service.exe
O23 - Service: Seagate-Replica-SysMon - Unknown owner - E:\Program Files\Seagate Replica\bin\Seagate-Replica-SysMon.exe

--
End of file - 12551 bytes



JettPro Boss
Novice
Novice

Posts Posts : 11
Joined Joined : 2010-06-30
OS OS : windows xp
Points Points : 23703
# Likes # Likes : 0

View user profile

Back to top Go down

Re: win 32/nugel.e worm

Post by Belahzur on 30th June 2010, 3:28 pm

Hello.

  • Open HijackThis
  • Choose "Do a system scan only"
  • Check the boxes in front of these lines:


    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = [You must be registered and logged in to see this link.]
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,SearchAssistant = [You must be registered and logged in to see this link.]
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,CustomizeSearch = [You must be registered and logged in to see this link.]
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = [You must be registered and logged in to see this link.]
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = [You must be registered and logged in to see this link.]
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = [You must be registered and logged in to see this link.]
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http=127.0.0.1:5577
    O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]
    O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]
    O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]
    O1 - Hosts: 217.20.175.74 reviews.toptenreviews.com
    O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]
    O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]
    O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]
    O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]
    O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]
    O1 - Hosts: 217.20.175.74 reviews.reevoo.com
    O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]
    O1 - Hosts: 217.20.175.74 [You must be registered and logged in to see this link.]



  • Press "Fix Checked"
  • Close Hijack This.

Remove the Proxy setting in Internet Explorer and/or in FireFox.

    In Internet Explorer
  1. Tools Menu -> Internet Options -> Connections Tab ->Lan Settings > uncheck "use a proxy server" or reconfigure the Proxy server again in case you have set it previously.

    In Firefox
  1. Tools Menu -> Options... -> Advanced Tab -> Network Tab -> "Settings" under Connection > Choose "No Proxy"
  2. Click the apply button and restart that computer in normal mode.

Please download and run this tool.

Download Malwarebytes' Anti-Malware from [You must be registered and logged in to see this link.]

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.


Post the contents of the MBAM Log.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Re: win 32/nugel.e worm

Post by JettPro Boss on 30th June 2010, 4:52 pm

Malwarebytes' Anti-Malware 1.46
[You must be registered and logged in to see this link.]

Database version: 4052

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

6/30/2010 12:47:54 PM
mbam-log-2010-06-30 (12-47-54).txt

Scan type: Quick scan
Objects scanned: 145771
Time elapsed: 12 minute(s), 50 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 20
Registry Values Infected: 1
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{70880ce6-308c-4204-a89e-b266c3f7b7fa} (Adware.Softomate) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{8c788aa2-7530-43be-97b7-4d491f13bea3} (Adware.Softomate) -> Quarantined and deleted successfully.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{494e6cec-7483-a4ee-0938-895519a84bc7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{c48635ad-d6b5-3ee4-aaa2-540d5a173658} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{494e6cec-7483-a4ee-0938-895519a84bc7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{c48635ad-d6b5-3ee4-aaa2-540d5a173658} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\avsuite (Rogue.AntivirusSuite) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\avsuite (Rogue.AntivirusSuite) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\avsoft (Trojan.Fraudpack) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\cntntcntr.cntntdic (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\cntntcntr.cntntdic.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\cntntcntr.cntntdisp (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\cntntcntr.cntntdisp.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\AvScan (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\UACd.sys (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\avsoft (Trojan.Fraudpack) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{90b8b761-df2b-48ac-bbe0-bcc03a819b3b} (Adware.Zango) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32\aux (Trojan.JSRedir.H) -> Bad: (E:\WINDOWS\system32\..\cdhngnr.yuh) Good: (wdmaud.drv) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

JettPro Boss
Novice
Novice

Posts Posts : 11
Joined Joined : 2010-06-30
OS OS : windows xp
Points Points : 23703
# Likes # Likes : 0

View user profile

Back to top Go down

Re: win 32/nugel.e worm

Post by JettPro Boss on 30th June 2010, 5:21 pm

do I have to do anything else? It appears to be working.

JettPro Boss
Novice
Novice

Posts Posts : 11
Joined Joined : 2010-06-30
OS OS : windows xp
Points Points : 23703
# Likes # Likes : 0

View user profile

Back to top Go down

Re: win 32/nugel.e worm

Post by Belahzur on 30th June 2010, 6:57 pm

Please re-open Malwarebytes, click the Update tab, and click Check for Updates. Then, click the Scanner tab, select Perform Quick Scan, and press Scan.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

win32 nugel.e

Post by JettPro Boss on 30th June 2010, 7:00 pm

done, nothing else.

Malwarebytes' Anti-Malware 1.46
[You must be registered and logged in to see this link.]

Database version: 4052

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

6/30/2010 1:46:23 PM
mbam-log-2010-06-30 (13-46-23).txt

Scan type: Quick scan
Objects scanned: 145781
Time elapsed: 14 minute(s), 51 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

JettPro Boss
Novice
Novice

Posts Posts : 11
Joined Joined : 2010-06-30
OS OS : windows xp
Points Points : 23703
# Likes # Likes : 0

View user profile

Back to top Go down

Re: win 32/nugel.e worm

Post by Belahzur on 30th June 2010, 7:06 pm

Hello.
You didn't update it, the log still shows an old database. Goofy


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Re: win 32/nugel.e worm

Post by JettPro Boss on 30th June 2010, 7:20 pm

Sorry, I thought it was up to date. Now its good.


Malwarebytes' Anti-Malware 1.46
[You must be registered and logged in to see this link.]

Database version: 4262

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

6/30/2010 3:19:58 PM
mbam-log-2010-06-30 (15-19-58).txt

Scan type: Quick scan
Objects scanned: 156219
Time elapsed: 11 minute(s), 42 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

JettPro Boss
Novice
Novice

Posts Posts : 11
Joined Joined : 2010-06-30
OS OS : windows xp
Points Points : 23703
# Likes # Likes : 0

View user profile

Back to top Go down

Re: win 32/nugel.e worm

Post by Belahzur on 30th June 2010, 8:11 pm

Hello.

  • Download combofix from here
    [You must be registered and logged in to see this link.]
    [You must be registered and logged in to see this link.]

    1. If you are using Firefox, make sure that your download settings are as follows:

    * Tools->Options->Main tab
    * Set to "Always ask me where to Save the files".

    2. During the download, rename Combofix to Combo-Fix as follows:





    3. It is important you rename Combofix during the download, but not after.
    4. Please do not rename Combofix to other names, but only to the one indicated.
    5. Close any open browsers.
    6. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

  • We need to disable your local AV (Anti-virus) before running Combofix.
  • See [You must be registered and logged in to see this link.] for how to disable your AV.
  • Double click on ComboFix.exe.
  • Follow the prompts. NOTE:
  • ComboFix will check to see if the Microsoft Windows Recovery Console is installed.
    ***It's strongly recommended to have the Recovery Console installed before doing any malware removal.***

    **Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will automatically proceed with its scan.


  • The Recovery Console provides a recovery/repair mode should a problem occur during a Combofix run.



  • Allow ComboFix to download the Recovery Console.
  • Accept the End-User License Agreement.
  • The Recovery Console will be installed.
  • You will then get this next prompt that asks if you want to continue the malware scan, select yes



  • Allow combofix to run
  • Post C:\combofix.txt back here.

    Note:
    Do not mouseclick combofix's window whilst it's running. That may cause it to stall.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Re: win 32/nugel.e worm

Post by JettPro Boss on 2nd July 2010, 9:16 am

Sorry, took longer to get back to this problem than expected......had to conduct some biz....gotta make the money...


ComboFix 10-07-01.02 - Owner 07/02/2010 5:03.1.2 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2558.1963 [GMT -4:00]
Running from: e:\documents and settings\Owner\Desktop\Combo-Fix.exe
AV: Microsoft Security Essentials *On-access scanning disabled* (Updated) {BCF43643-A118-4432-AEDE-D861FCBCFCDF}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

e:\documents and settings\Owner\g2mdlhlpx.exe
e:\windows\Downloaded Program Files\f3initialsetup1.0.0.15-3.inf
e:\windows\Downloaded Program Files\popcaploader.inf
e:\windows\system32\hgQAHkkj.ini2
e:\windows\Tasks\cmcradtq.job
e:\windows\xpsp1hfm.log

.
((((((((((((((((((((((((( Files Created from 2010-06-02 to 2010-07-02 )))))))))))))))))))))))))))))))
.

2010-06-30 14:49 . 2010-06-30 14:49 -------- d-----w- e:\program files\Trend Micro
2010-06-30 14:38 . 2010-06-30 18:09 -------- d-----w- e:\program files\Spyware Doctor
2010-06-30 13:05 . 2010-06-30 13:06 -------- d-----w- e:\program files\SpywareBlaster
2010-06-30 12:54 . 2010-04-29 19:39 38224 ----a-w- e:\windows\system32\drivers\mbamswissarmy.sys
2010-06-30 12:54 . 2010-04-29 19:39 20952 ----a-w- e:\windows\system32\drivers\mbam.sys
2010-06-28 13:57 . 2010-06-28 13:57 282368 ----a-w- e:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\LocalCopy\{EAC76436-9BF6-ACF1-B14C-3BD5C69CE6C4}-svorxirtssd.exe
2010-06-28 13:43 . 2010-06-30 13:36 -------- d-----w- e:\documents and settings\Owner\Local Settings\Application Data\edhtdppjn
2010-06-22 11:47 . 2010-06-22 11:47 503808 ----a-w- e:\documents and settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-44d9a277-n\msvcp71.dll
2010-06-22 11:47 . 2010-06-22 11:47 499712 ----a-w- e:\documents and settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-44d9a277-n\jmc.dll
2010-06-22 11:47 . 2010-06-22 11:47 348160 ----a-w- e:\documents and settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-44d9a277-n\msvcr71.dll
2010-06-22 11:47 . 2010-06-22 11:47 61440 ----a-w- e:\documents and settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-7dcf6ade-n\decora-sse.dll
2010-06-22 11:47 . 2010-06-22 11:47 12800 ----a-w- e:\documents and settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-7dcf6ade-n\decora-d3d.dll
2010-06-22 11:47 . 2010-04-12 21:29 411368 ----a-w- e:\windows\system32\deployJava1.dll
2010-06-10 20:30 . 2010-06-10 20:30 -------- d-----w- e:\program files\Seagate Replica
2010-06-10 20:26 . 2010-06-10 20:26 -------- d-----w- e:\documents and settings\Owner\Application Data\Leadertech
2010-06-10 19:17 . 2010-05-06 10:41 743424 -c----w- e:\windows\system32\dllcache\iedvtool.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-07-02 08:36 . 2008-09-09 17:38 -------- d-----w- e:\program files\LogMeIn
2010-06-30 18:01 . 2006-04-26 18:10 -------- d-----w- e:\documents and settings\All Users\Application Data\Viewpoint
2010-06-30 18:00 . 2009-03-18 12:59 -------- d---a-w- e:\documents and settings\All Users\Application Data\TEMP
2010-06-30 17:47 . 2010-06-30 17:47 7396 ----a-w- e:\windows\system32\drivers\pctcore.cat
2010-06-30 17:08 . 2009-11-13 10:31 -------- d-----w- e:\program files\Microsoft Security Essentials
2010-06-30 16:32 . 2009-05-28 14:59 -------- d-----w- e:\program files\Malwarebytes' Anti-Malware
2010-06-22 11:47 . 2006-05-09 20:38 -------- d-----w- e:\program files\Common Files\Java
2010-06-22 11:47 . 2006-05-09 21:14 -------- d-----w- e:\program files\Java
2010-06-10 20:49 . 2008-08-15 17:17 -------- d-----w- e:\documents and settings\All Users\Application Data\Microsoft Help
2010-06-09 20:16 . 2008-09-09 17:39 83360 ----a-w- e:\windows\system32\LMIRfsClientNP.dll
2010-06-09 20:16 . 2008-09-09 17:39 29568 ----a-w- e:\windows\system32\LMIport.dll
2010-06-09 20:16 . 2008-09-09 17:38 87424 ----a-w- e:\windows\system32\LMIinit.dll
2010-06-04 17:04 . 2010-03-11 13:17 -------- d-----w- e:\program files\Microsoft Silverlight
2010-06-01 17:37 . 2009-10-03 12:15 221568 ------w- e:\windows\system32\MpSigStub.exe
2010-05-26 08:44 . 2007-12-28 09:24 -------- d-----w- e:\documents and settings\Owner\Application Data\Move Networks
2010-05-26 08:44 . 2008-03-28 11:36 -------- d-----w- e:\program files\Nero
2010-05-22 06:34 . 2007-01-12 22:11 -------- d-----w- e:\program files\Google
2010-05-22 00:51 . 2008-04-27 17:53 -------- d-----w- e:\program files\Windows Defender
2010-05-07 13:48 . 2010-05-07 08:43 -------- d-----w- e:\documents and settings\Owner\Application Data\HpUpdate
2010-05-07 13:47 . 2010-05-07 13:47 -------- d-----w- e:\documents and settings\All Users\Application Data\HP Product Assistant
2010-05-07 08:44 . 2006-04-26 17:58 -------- d-----w- e:\program files\HP
2010-05-06 10:41 . 2003-07-16 20:51 916480 ----a-w- e:\windows\system32\wininet.dll
2010-05-06 06:17 . 2010-05-06 04:40 117161 ----a-w- e:\windows\hpoins11.dat
2010-05-06 06:05 . 2008-02-07 09:49 -------- d-----w- e:\documents and settings\All Users\Application Data\HP
2010-05-06 04:19 . 2010-05-06 04:19 10134 ----a-r- e:\documents and settings\Owner\Application Data\Microsoft\Installer\{4CCC7F68-A437-4559-A840-F5E010934951}\ARPPRODUCTICON.exe
2010-05-05 09:39 . 2010-04-17 17:47 -------- d-----w- e:\documents and settings\All Users\Application Data\DivX
2010-05-02 05:22 . 2003-07-16 20:51 1851264 ----a-w- e:\windows\system32\win32k.sys
2010-04-20 05:30 . 2003-07-16 20:24 285696 ----a-w- e:\windows\system32\atmfd.dll
2010-04-17 17:50 . 2010-04-17 17:50 57344 ----a-w- e:\documents and settings\All Users\Application Data\DivX\RunAsUser\RUNASUSERPROCESS.dll
2010-04-17 17:47 . 2010-04-17 17:50 1180952 ----a-w- e:\documents and settings\All Users\Application Data\DivX\Setup\DivXSetup.exe
2003-07-16 20:48 . 2003-07-16 20:48 94784 --sh--w- e:\windows\twain.dll
2008-04-14 00:12 . 2003-07-16 20:48 50688 --sh--w- e:\windows\twain_32.dll
2008-04-14 00:11 . 2003-07-16 20:33 1028096 --sha-w- e:\windows\system32\mfc42.dll
2008-04-14 00:12 . 2003-07-16 20:36 57344 --sha-w- e:\windows\system32\msvcirt.dll
2008-04-14 00:12 . 2003-07-16 20:36 413696 --sha-w- e:\windows\system32\msvcp60.dll
2008-04-14 00:12 . 2003-07-16 20:36 343040 --sha-w- e:\windows\system32\msvcrt.dll
2008-04-14 00:12 . 2003-07-16 20:40 551936 --sha-w- e:\windows\system32\oleaut32.dll
2008-04-14 00:12 . 2003-07-16 20:40 84992 --sha-w- e:\windows\system32\olepro32.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"LogMeIn GUI"="e:\program files\LogMeIn\x86\LogMeInSystray.exe" [2008-02-28 63048]
"QuickTime Task"="e:\program files\QuickTime\qttask.exe" [2009-05-26 413696]
"MSSE"="e:\program files\Microsoft Security Essentials\msseces.exe" [2010-06-01 1093208]
"SunJavaUpdateSched"="e:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="e:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2008-11-04 435096]

e:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - e:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2006-2-19 288472]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "e:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-25 304128]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LMIinit]
2010-06-09 20:16 87424 ----a-w- e:\windows\system32\LMIinit.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"

[HKLM\~\startupfolder\E:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
path=e:\documents and settings\All Users\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
backup=e:\windows\pss\Adobe Reader Speed Launch.lnkCommon Startup

[HKLM\~\startupfolder\E:^Documents and Settings^All Users^Start Menu^Programs^Startup^AT&T Self Support Tool.lnk]
path=e:\documents and settings\All Users\Start Menu\Programs\Startup\AT&T Self Support Tool.lnk
backup=e:\windows\pss\AT&T Self Support Tool.lnkCommon Startup

[HKLM\~\startupfolder\E:^Documents and Settings^All Users^Start Menu^Programs^Startup^Google Updater.lnk]
path=e:\documents and settings\All Users\Start Menu\Programs\Startup\Google Updater.lnk
backup=e:\windows\pss\Google Updater.lnkCommon Startup

[HKLM\~\startupfolder\E:^Documents and Settings^All Users^Start Menu^Programs^Startup^Windows Search.lnk]
path=e:\documents and settings\All Users\Start Menu\Programs\Startup\Windows Search.lnk
backup=e:\windows\pss\Windows Search.lnkCommon Startup

[HKLM\~\startupfolder\E:^Documents and Settings^Owner^Start Menu^Programs^Startup^OneNote 2007 Screen Clipper and Launcher.lnk]
path=e:\documents and settings\Owner\Start Menu\Programs\Startup\OneNote 2007 Screen Clipper and Launcher.lnk
backup=e:\windows\pss\OneNote 2007 Screen Clipper and Launcher.lnkStartup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
2008-04-14 00:12 15360 ----a-w- e:\windows\system32\ctfmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\CXMon]
2001-08-09 21:06 45056 ----a-w- e:\program files\Hewlett-Packard\PhotoSmart\Photo Imaging\Hpi_monitor.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\GrooveMonitor]
2008-10-25 15:44 31072 ----a-w- e:\program files\Microsoft Office\Office12\GrooveMonitor.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\igfxhkcmd]
2005-09-20 13:32 77824 ----a-w- e:\windows\system32\hkcmd.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\igfxpers]
2005-09-20 13:36 114688 ----a-w- e:\windows\system32\igfxpers.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\igfxtray]
2005-09-20 13:35 94208 ----a-w- e:\windows\system32\igfxtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Motive SmartBridge]
2003-12-10 09:52 380928 ----a-w- e:\progra~1\SBCSEL~1\SMARTB~1\MotiveSB.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NBKeyScan]
2008-02-18 20:29 2221352 ----a-w- e:\program files\Nero\Nero8\Nero BackItUp\NBKeyScan.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
2008-02-28 13:59 570664 ----a-w- e:\program files\Common Files\Nero\Lib\NeroCheck.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2009-05-26 21:18 413696 ----a-w- e:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Share-to-Web Namespace Daemon]
2001-07-03 13:11 57344 ----a-w- e:\program files\Hewlett-Packard\PhotoSmart\HP Share-to-Web\hpgs2wnd.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMAXPnP]
2004-10-14 18:42 1404928 ----a-w- e:\program files\Analog Devices\Core\smax4pnp.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\YBrowser]
2006-07-21 21:19 129536 ----a-w- e:\progra~1\Yahoo!\browser\ybrwicon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"avg8wd"=2 (0x2)
"WSearch"=2 (0x2)
"ose"=3 (0x3)
"odserv"=3 (0x3)
"iPod Service"=3 (0x3)
"gusvc"=3 (0x3)
"getPlus(R) Helper"=3 (0x3)
"cisvc"=2 (0x2)
"Bonjour Service"=3 (0x3)
"BITS"=3 (0x3)
"Apple Mobile Device"=2 (0x2)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpqCopy.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpqnrs08.exe"=
"e:\\Program Files\\Common Files\\Nero\\Nero Web\\SetupX.exe"=
"e:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"e:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
"e:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"e:\\WINDOWS\\system32\\mmc.exe"=
"e:\\Program Files\\LogMeIn\\x86\\LogMeIn.exe"=
"e:\\Program Files\\Messenger\\msmsgs.exe"=
"e:\\StubInstaller.exe"=
"e:\\Program Files\\Malwarebytes' Anti-Malware\\mbam.exe"=

R2 LMIInfo;LogMeIn Kernel Information Provider;e:\program files\LogMeIn\x86\rainfo.sys [2/28/2008 3:31 PM 12856]
R2 Seagate-Replica-Service;Seagate-Replica-Service;e:\program files\Seagate Replica\bin\Seagate-Replica-Service.exe [6/10/2010 4:30 PM 1814016]
R2 Seagate-Replica-SysMon;Seagate-Replica-SysMon;e:\program files\Seagate Replica\bin\Seagate-Replica-SysMon.exe [6/10/2010 4:30 PM 162256]
S2 gupdate1ca30ade55342f8;Google Update Service (gupdate1ca30ade55342f8);e:\program files\Google\Update\GoogleUpdate.exe [9/8/2009 1:57 PM 133104]
S3 HTCAND32;HTC Device Driver;e:\windows\system32\drivers\ANDROIDUSB.sys [12/8/2009 1:18 PM 25728]
.
Contents of the 'Scheduled Tasks' folder

2010-07-01 e:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- e:\program files\Google\Update\GoogleUpdate.exe [2009-09-08 17:57]

2010-07-02 e:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- e:\program files\Google\Update\GoogleUpdate.exe [2009-09-08 17:57]

2010-06-30 e:\windows\Tasks\MP Scheduled Scan.job
- e:\program files\Microsoft Security Essentials\MpCmdRun.exe [2010-03-26 01:40]
.
.
------- Supplementary Scan -------
.
uStart Page = [You must be registered and logged in to see this link.]
uSearchMigratedDefaultURL = [You must be registered and logged in to see this link.]
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyServer = http=127.0.0.1:5577
uInternet Settings,ProxyOverride =
IE: E&xport to Microsoft Excel - e:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: {EE9101D2-9DFC-4797-95E5-02ADDDBC2E34} = 68.94.156.1,68.94.157.1
DPF: Microsoft XML Parser for Java - [You must be registered and logged in to see this link.]
DPF: {60F47E29-4A42-11D2-83ED-02608CA10990} - [You must be registered and logged in to see this link.]
DPF: {A9C70AF0-0F2A-11D1-B230-0000C08C00C4} - [You must be registered and logged in to see this link.]
DPF: {EAC139A9-D22D-4C29-8D1C-252BE63750F9} - [You must be registered and logged in to see this link.]
FF - ProfilePath - e:\documents and settings\Owner\Application Data\Mozilla\Firefox\Profiles\ovqqygfn.default\
FF - prefs.js: browser.startup.homepage - msn.com
FF - plugin: e:\program files\Google\Google Earth\plugin\npgeplugin.dll
FF - plugin: e:\program files\Google\Update\1.2.183.29\npGoogleOneClick8.dll
FF - plugin: e:\program files\Mozilla Firefox\plugins\np32neur.dll
FF - plugin: e:\program files\Mozilla Firefox\plugins\npdeployJava1.dll

---- FIREFOX POLICIES ----
e:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
e:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
e:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
e:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
.
- - - - ORPHANS REMOVED - - - -

HKCU-Run-TomTomHOME.exe - e:\program files\TomTom HOME 2\TomTomHOMERunner.exe
Notify-NavLogon - (no file)
MSConfigStartUp-AOLDialer - e:\program files\Common Files\AOL\ACS\AOLDial.exe
MSConfigStartUp-AVG8_TRAY - e:\progra~1\AVG\AVG8\avgtray.exe
MSConfigStartUp-iTunesHelper - e:\program files\iTunes\iTunesHelper.exe
MSConfigStartUp-SunJavaUpdateSched - e:\program files\Java\jre6\bin\jusched.exe
MSConfigStartUp-Windows Defender - e:\program files\Windows Defender\MSASCui.exe
AddRemove-SBC Self Support Tool - e:\docume~1\Owner\LOCALS~1\Temp\SST\CustomUninstall.exe
AddRemove-{E5A8DDAB-AE80-48C6-A75B-D0FAB83B299D} - e:\program files\HP\Digital Imaging\{E5A8DDAB-AE80-48C6-A75B-D0FAB83B299D}\setup\hpzscr01.exe



**************************************************************************
scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files:

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Seagate-Replica-Service]
"ImagePath"="e:\program files\Seagate Replica\bin\Seagate-Replica-Service.exe /startedbyscm:FE2355B7-40E2EE35-RebitSvcModule"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(696)
e:\windows\system32\LMIinit.dll
e:\windows\system32\LMIRfsClientNP.dll
.
Completion time: 2010-07-02 05:10:53
ComboFix-quarantined-files.txt 2010-07-02 09:10

Pre-Run: 91,962,433,536 bytes free
Post-Run: 93,880,778,752 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
e:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect /NoExecute=OptIn

- - End Of File - - F6D94490F50270099AB3DC88BE91B7C3

JettPro Boss
Novice
Novice

Posts Posts : 11
Joined Joined : 2010-06-30
OS OS : windows xp
Points Points : 23703
# Likes # Likes : 0

View user profile

Back to top Go down

Re: win 32/nugel.e worm

Post by JettPro Boss on 2nd July 2010, 7:06 pm

Belazhur, Please see above for the Combo-fix.txt

JettPro Boss
Novice
Novice

Posts Posts : 11
Joined Joined : 2010-06-30
OS OS : windows xp
Points Points : 23703
# Likes # Likes : 0

View user profile

Back to top Go down

Re: win 32/nugel.e worm

Post by Belahzur on 2nd July 2010, 9:06 pm

Hello.

  1. Close any open browsers.
  2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
  3. Open notepad and copy/paste the text in the quotebox below into it:
    Code:

    DDS::
    uInternet Settings,ProxyServer = http=127.0.0.1:5577
    uInternet Settings,ProxyOverride =
  4. Save this as CFScript.txt, in the same location as ComboFix.exe



  5. Referring to the picture above, drag CFScript into ComboFix.exe
  6. When finished, it shall produce a log for you at C:\ComboFix.txt
  7. Please post the contents of the log in your next reply.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Re: win 32/nugel.e worm

Post by JettPro Boss on 3rd July 2010, 7:13 pm

ComboFix 10-07-01.02 - Owner 07/03/2010 14:55:53.2.2 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2558.1963 [GMT -4:00]
Running from: e:\documents and settings\Owner\Desktop\Combo-Fix.exe
Command switches used :: e:\documents and settings\Owner\Desktop\CFScript.txt
AV: Microsoft Security Essentials *On-access scanning disabled* (Updated) {BCF43643-A118-4432-AEDE-D861FCBCFCDF}
.

((((((((((((((((((((((((( Files Created from 2010-06-03 to 2010-07-03 )))))))))))))))))))))))))))))))
.

2010-07-03 17:16 . 2010-07-03 17:16 -------- d-----w- e:\windows\system32\PowerTools
2010-07-03 17:16 . 2010-07-03 17:41 -------- d-----w- e:\windows\system32\sssys
2010-07-02 08:58 . 2010-07-02 09:10 -------- d-----w- E:\Combo-Fix
2010-06-30 14:49 . 2010-06-30 14:49 -------- d-----w- e:\program files\Trend Micro
2010-06-30 14:38 . 2010-06-30 18:09 -------- d-----w- e:\program files\Spyware Doctor
2010-06-30 13:05 . 2010-07-02 10:01 -------- d-----w- e:\program files\SpywareBlaster
2010-06-30 12:54 . 2010-04-29 19:39 38224 ----a-w- e:\windows\system32\drivers\mbamswissarmy.sys
2010-06-30 12:54 . 2010-04-29 19:39 20952 ----a-w- e:\windows\system32\drivers\mbam.sys
2010-06-28 13:57 . 2010-06-28 13:57 282368 ----a-w- e:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\LocalCopy\{EAC76436-9BF6-ACF1-B14C-3BD5C69CE6C4}-svorxirtssd.exe
2010-06-28 13:43 . 2010-06-30 13:36 -------- d-----w- e:\documents and settings\Owner\Local Settings\Application Data\edhtdppjn
2010-06-22 11:47 . 2010-06-22 11:47 503808 ----a-w- e:\documents and settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-44d9a277-n\msvcp71.dll
2010-06-22 11:47 . 2010-06-22 11:47 499712 ----a-w- e:\documents and settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-44d9a277-n\jmc.dll
2010-06-22 11:47 . 2010-06-22 11:47 348160 ----a-w- e:\documents and settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-44d9a277-n\msvcr71.dll
2010-06-22 11:47 . 2010-06-22 11:47 61440 ----a-w- e:\documents and settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-7dcf6ade-n\decora-sse.dll
2010-06-22 11:47 . 2010-06-22 11:47 12800 ----a-w- e:\documents and settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-7dcf6ade-n\decora-d3d.dll
2010-06-22 11:47 . 2010-04-12 21:29 411368 ----a-w- e:\windows\system32\deployJava1.dll
2010-06-10 20:30 . 2010-06-10 20:30 -------- d-----w- e:\program files\Seagate Replica
2010-06-10 20:26 . 2010-06-10 20:26 -------- d-----w- e:\documents and settings\Owner\Application Data\Leadertech
2010-06-10 19:17 . 2010-05-06 10:41 743424 -c----w- e:\windows\system32\dllcache\iedvtool.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-07-03 08:36 . 2008-09-09 17:38 -------- d-----w- e:\program files\LogMeIn
2010-07-02 10:02 . 2009-03-18 12:59 -------- d---a-w- e:\documents and settings\All Users\Application Data\TEMP
2010-06-30 18:01 . 2006-04-26 18:10 -------- d-----w- e:\documents and settings\All Users\Application Data\Viewpoint
2010-06-30 17:47 . 2010-06-30 17:47 7396 ----a-w- e:\windows\system32\drivers\pctcore.cat
2010-06-30 17:08 . 2009-11-13 10:31 -------- d-----w- e:\program files\Microsoft Security Essentials
2010-06-30 16:32 . 2009-05-28 14:59 -------- d-----w- e:\program files\Malwarebytes' Anti-Malware
2010-06-22 11:47 . 2006-05-09 20:38 -------- d-----w- e:\program files\Common Files\Java
2010-06-22 11:47 . 2006-05-09 21:14 -------- d-----w- e:\program files\Java
2010-06-10 20:49 . 2008-08-15 17:17 -------- d-----w- e:\documents and settings\All Users\Application Data\Microsoft Help
2010-06-09 20:16 . 2008-09-09 17:39 83360 ----a-w- e:\windows\system32\LMIRfsClientNP.dll
2010-06-09 20:16 . 2008-09-09 17:39 29568 ----a-w- e:\windows\system32\LMIport.dll
2010-06-09 20:16 . 2008-09-09 17:38 87424 ----a-w- e:\windows\system32\LMIinit.dll
2010-06-04 17:04 . 2010-03-11 13:17 -------- d-----w- e:\program files\Microsoft Silverlight
2010-06-01 17:37 . 2009-10-03 12:15 221568 ------w- e:\windows\system32\MpSigStub.exe
2010-05-26 08:44 . 2007-12-28 09:24 -------- d-----w- e:\documents and settings\Owner\Application Data\Move Networks
2010-05-26 08:44 . 2008-03-28 11:36 -------- d-----w- e:\program files\Nero
2010-05-22 06:34 . 2007-01-12 22:11 -------- d-----w- e:\program files\Google
2010-05-22 00:51 . 2008-04-27 17:53 -------- d-----w- e:\program files\Windows Defender
2010-05-07 13:48 . 2010-05-07 08:43 -------- d-----w- e:\documents and settings\Owner\Application Data\HpUpdate
2010-05-07 13:47 . 2010-05-07 13:47 -------- d-----w- e:\documents and settings\All Users\Application Data\HP Product Assistant
2010-05-07 08:44 . 2006-04-26 17:58 -------- d-----w- e:\program files\HP
2010-05-06 10:41 . 2003-07-16 20:51 916480 ----a-w- e:\windows\system32\wininet.dll
2010-05-06 06:17 . 2010-05-06 04:40 117161 ----a-w- e:\windows\hpoins11.dat
2010-05-06 06:05 . 2008-02-07 09:49 -------- d-----w- e:\documents and settings\All Users\Application Data\HP
2010-05-06 04:19 . 2010-05-06 04:19 10134 ----a-r- e:\documents and settings\Owner\Application Data\Microsoft\Installer\{4CCC7F68-A437-4559-A840-F5E010934951}\ARPPRODUCTICON.exe
2010-05-05 09:39 . 2010-04-17 17:47 -------- d-----w- e:\documents and settings\All Users\Application Data\DivX
2010-05-02 05:22 . 2003-07-16 20:51 1851264 ----a-w- e:\windows\system32\win32k.sys
2010-04-20 05:30 . 2003-07-16 20:24 285696 ----a-w- e:\windows\system32\atmfd.dll
2010-04-17 17:50 . 2010-04-17 17:50 57344 ----a-w- e:\documents and settings\All Users\Application Data\DivX\RunAsUser\RUNASUSERPROCESS.dll
2010-04-17 17:47 . 2010-04-17 17:50 1180952 ----a-w- e:\documents and settings\All Users\Application Data\DivX\Setup\DivXSetup.exe
2003-07-16 20:48 . 2003-07-16 20:48 94784 --sh--w- e:\windows\twain.dll
2008-04-14 00:12 . 2003-07-16 20:48 50688 --sh--w- e:\windows\twain_32.dll
2008-04-14 00:11 . 2003-07-16 20:33 1028096 --sha-w- e:\windows\system32\mfc42.dll
2008-04-14 00:12 . 2003-07-16 20:36 57344 --sha-w- e:\windows\system32\msvcirt.dll
2008-04-14 00:12 . 2003-07-16 20:36 413696 --sha-w- e:\windows\system32\msvcp60.dll
2008-04-14 00:12 . 2003-07-16 20:40 551936 --sha-w- e:\windows\system32\oleaut32.dll
.

((((((((((((((((((((((((((((( [You must be registered and logged in to see this link.] )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-07-02 21:20 . 2010-07-02 21:20 16384 e:\windows\Temp\Perflib_Perfdata_e4.dat
+ 2010-07-02 21:20 . 2010-07-02 21:20 16384 e:\windows\Temp\Perflib_Perfdata_498.dat
+ 2001-10-18 02:37 . 2001-10-18 02:37 11264 e:\windows\system32\sssys\pwd.dll
+ 2002-06-11 18:42 . 2002-06-11 18:42 46080 e:\windows\system32\sssys\Hook.dll
+ 2003-03-31 22:13 . 2003-03-31 22:13 136192 e:\windows\system32\sssys\uninstaller.exe
+ 2003-03-31 21:10 . 2003-03-31 21:10 940544 e:\windows\system32\sssys\tour.dll
+ 2003-03-31 21:18 . 2003-03-31 21:18 260096 e:\windows\system32\sssys\ssstray.exe
+ 2003-09-15 09:52 . 2003-09-15 09:52 407552 e:\windows\system32\sssys\RegDll.dll
+ 2003-12-12 15:21 . 2003-12-12 15:21 463360 e:\windows\system32\sssys\manager.exe
+ 2003-12-12 15:31 . 2003-12-12 15:31 229376 e:\windows\system32\sssys\explorer.exe
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"LogMeIn GUI"="e:\program files\LogMeIn\x86\LogMeInSystray.exe" [2008-02-28 63048]
"QuickTime Task"="e:\program files\QuickTime\qttask.exe" [2009-05-26 413696]
"MSSE"="e:\program files\Microsoft Security Essentials\msseces.exe" [2010-06-01 1093208]
"SunJavaUpdateSched"="e:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]
"sss"="e:\windows\system32\sssys\explorer.exe" [2003-12-12 229376]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="e:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2008-11-04 435096]

e:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - e:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2006-2-19 288472]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "e:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-25 304128]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LMIinit]
2010-06-09 20:16 87424 ----a-w- e:\windows\system32\LMIinit.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"

[HKLM\~\startupfolder\E:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
path=e:\documents and settings\All Users\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
backup=e:\windows\pss\Adobe Reader Speed Launch.lnkCommon Startup

[HKLM\~\startupfolder\E:^Documents and Settings^All Users^Start Menu^Programs^Startup^AT&T Self Support Tool.lnk]
path=e:\documents and settings\All Users\Start Menu\Programs\Startup\AT&T Self Support Tool.lnk
backup=e:\windows\pss\AT&T Self Support Tool.lnkCommon Startup

[HKLM\~\startupfolder\E:^Documents and Settings^All Users^Start Menu^Programs^Startup^Google Updater.lnk]
path=e:\documents and settings\All Users\Start Menu\Programs\Startup\Google Updater.lnk
backup=e:\windows\pss\Google Updater.lnkCommon Startup

[HKLM\~\startupfolder\E:^Documents and Settings^All Users^Start Menu^Programs^Startup^Windows Search.lnk]
path=e:\documents and settings\All Users\Start Menu\Programs\Startup\Windows Search.lnk
backup=e:\windows\pss\Windows Search.lnkCommon Startup

[HKLM\~\startupfolder\E:^Documents and Settings^Owner^Start Menu^Programs^Startup^OneNote 2007 Screen Clipper and Launcher.lnk]
path=e:\documents and settings\Owner\Start Menu\Programs\Startup\OneNote 2007 Screen Clipper and Launcher.lnk
backup=e:\windows\pss\OneNote 2007 Screen Clipper and Launcher.lnkStartup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
2008-04-14 00:12 15360 ----a-w- e:\windows\system32\ctfmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\CXMon]
2001-08-09 21:06 45056 ----a-w- e:\program files\Hewlett-Packard\PhotoSmart\Photo Imaging\Hpi_monitor.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\GrooveMonitor]
2008-10-25 15:44 31072 ----a-w- e:\program files\Microsoft Office\Office12\GrooveMonitor.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\igfxhkcmd]
2005-09-20 13:32 77824 ----a-w- e:\windows\system32\hkcmd.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\igfxpers]
2005-09-20 13:36 114688 ----a-w- e:\windows\system32\igfxpers.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\igfxtray]
2005-09-20 13:35 94208 ----a-w- e:\windows\system32\igfxtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Motive SmartBridge]
2003-12-10 09:52 380928 ----a-w- e:\progra~1\SBCSEL~1\SMARTB~1\MotiveSB.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NBKeyScan]
2008-02-18 20:29 2221352 ----a-w- e:\program files\Nero\Nero8\Nero BackItUp\NBKeyScan.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
2008-02-28 13:59 570664 ----a-w- e:\program files\Common Files\Nero\Lib\NeroCheck.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2009-05-26 21:18 413696 ----a-w- e:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Share-to-Web Namespace Daemon]
2001-07-03 13:11 57344 ----a-w- e:\program files\Hewlett-Packard\PhotoSmart\HP Share-to-Web\hpgs2wnd.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMAXPnP]
2004-10-14 18:42 1404928 ----a-w- e:\program files\Analog Devices\Core\smax4pnp.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\YBrowser]
2006-07-21 21:19 129536 ----a-w- e:\progra~1\Yahoo!\browser\ybrwicon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"avg8wd"=2 (0x2)
"WSearch"=2 (0x2)
"ose"=3 (0x3)
"odserv"=3 (0x3)
"iPod Service"=3 (0x3)
"gusvc"=3 (0x3)
"getPlus(R) Helper"=3 (0x3)
"cisvc"=2 (0x2)
"Bonjour Service"=3 (0x3)
"BITS"=3 (0x3)
"Apple Mobile Device"=2 (0x2)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpqCopy.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"e:\\Program Files\\HP\\Digital Imaging\\bin\\hpqnrs08.exe"=
"e:\\Program Files\\Common Files\\Nero\\Nero Web\\SetupX.exe"=
"e:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"e:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
"e:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"e:\\WINDOWS\\system32\\mmc.exe"=
"e:\\Program Files\\LogMeIn\\x86\\LogMeIn.exe"=
"e:\\Program Files\\Messenger\\msmsgs.exe"=
"e:\\StubInstaller.exe"=
"e:\\Program Files\\Malwarebytes' Anti-Malware\\mbam.exe"=

R2 LMIInfo;LogMeIn Kernel Information Provider;e:\program files\LogMeIn\x86\rainfo.sys [2/28/2008 3:31 PM 12856]
R2 Seagate-Replica-Service;Seagate-Replica-Service;e:\program files\Seagate Replica\bin\Seagate-Replica-Service.exe [6/10/2010 4:30 PM 1814016]
R2 Seagate-Replica-SysMon;Seagate-Replica-SysMon;e:\program files\Seagate Replica\bin\Seagate-Replica-SysMon.exe [6/10/2010 4:30 PM 162256]
S2 gupdate1ca30ade55342f8;Google Update Service (gupdate1ca30ade55342f8);e:\program files\Google\Update\GoogleUpdate.exe [9/8/2009 1:57 PM 133104]
S3 HTCAND32;HTC Device Driver;e:\windows\system32\drivers\ANDROIDUSB.sys [12/8/2009 1:18 PM 25728]
.
Contents of the 'Scheduled Tasks' folder

2010-07-03 e:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- e:\program files\Google\Update\GoogleUpdate.exe [2009-09-08 17:57]

2010-07-03 e:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- e:\program files\Google\Update\GoogleUpdate.exe [2009-09-08 17:57]

2010-07-02 e:\windows\Tasks\MP Scheduled Scan.job
- e:\program files\Microsoft Security Essentials\MpCmdRun.exe [2010-03-26 01:40]
.
.
------- Supplementary Scan -------
.
uStart Page = [You must be registered and logged in to see this link.]
uSearchMigratedDefaultURL = [You must be registered and logged in to see this link.]
uInternet Connection Wizard,ShellNext = iexplore
IE: E&xport to Microsoft Excel - e:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: {EE9101D2-9DFC-4797-95E5-02ADDDBC2E34} = 68.94.156.1,68.94.157.1
DPF: Microsoft XML Parser for Java - [You must be registered and logged in to see this link.]
DPF: {60F47E29-4A42-11D2-83ED-02608CA10990} - [You must be registered and logged in to see this link.]
DPF: {A9C70AF0-0F2A-11D1-B230-0000C08C00C4} - [You must be registered and logged in to see this link.]
DPF: {EAC139A9-D22D-4C29-8D1C-252BE63750F9} - [You must be registered and logged in to see this link.]
FF - ProfilePath - e:\documents and settings\Owner\Application Data\Mozilla\Firefox\Profiles\ovqqygfn.default\
FF - prefs.js: browser.startup.homepage - msn.com
FF - plugin: e:\program files\Google\Google Earth\plugin\npgeplugin.dll
FF - plugin: e:\program files\Google\Update\1.2.183.29\npGoogleOneClick8.dll
FF - plugin: e:\program files\Mozilla Firefox\plugins\np32neur.dll
FF - plugin: e:\program files\Mozilla Firefox\plugins\npdeployJava1.dll

---- FIREFOX POLICIES ----
e:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
e:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
e:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
e:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, [You must be registered and logged in to see this link.]
Rootkit scan 2010-07-03 15:03
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Seagate-Replica-Service]
"ImagePath"="e:\program files\Seagate Replica\bin\Seagate-Replica-Service.exe /startedbyscm:FE2355B7-40E2EE35-RebitSvcModule"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(696)
e:\windows\system32\LMIinit.dll

- - - - - - - > 'explorer.exe'(476)
e:\windows\system32\sssys\hook.dll

- - - - - - - > 'explorer.exe'(3880)
e:\windows\system32\WININET.dll
e:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.3053_x-ww_b80fa8ca\MSVCR80.dll
e:\windows\system32\sssys\hook.dll
e:\windows\system32\ieframe.dll
e:\windows\system32\webcheck.dll
e:\windows\system32\WPDShServiceObj.dll
e:\windows\system32\PortableDeviceTypes.dll
e:\windows\system32\PortableDeviceApi.dll
e:\windows\system32\LMIRfsClientNP.dll
.
Completion time: 2010-07-03 15:05:10
ComboFix-quarantined-files.txt 2010-07-03 19:05
ComboFix2.txt 2010-07-02 09:10

Pre-Run: 93,487,837,184 bytes free
Post-Run: 93,472,223,232 bytes free

- - End Of File - - 2D31D299D9136DDDAAE1CD246304542B

JettPro Boss
Novice
Novice

Posts Posts : 11
Joined Joined : 2010-06-30
OS OS : windows xp
Points Points : 23703
# Likes # Likes : 0

View user profile

Back to top Go down

Re: win 32/nugel.e worm

Post by Belahzur on 3rd July 2010, 11:01 pm

Hello.

  1. Close any open browsers.
  2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
  3. Open notepad and copy/paste the text in the quotebox below into it:
    Code:

    http://www.GeekPolice.net/virus-spyware-malware-removal-f11/win-32-nugele-worm-t22428.htm#148292

    KILLALL::

    Collect::
    e:\windows\system32\sssys\pwd.dll
    e:\windows\system32\sssys\Hook.dll
    e:\windows\system32\sssys\uninstaller.exe
    e:\windows\system32\sssys\tour.dll
    e:\windows\system32\sssys\ssstray.exe
    e:\windows\system32\sssys\RegDll.dll
    e:\windows\system32\sssys\manager.exe
    e:\windows\system32\sssys\explorer.exe

    Folder::
    e:\windows\system32\sssys

    Registry::
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "sss"=-
  4. Save this as CFScript.txt, in the same location as ComboFix.exe



  5. Referring to the picture above, drag CFScript into ComboFix.exe
  6. When finished, it shall produce a log for you at C:\ComboFix.txt
  7. Please post the contents of the log in your next reply.

    **Note**

    When CF finishes running, the ComboFix log will open along with a message box--do not be alarmed. With the above script, ComboFix will capture files to submit for analysis.

    Ensure you are connected to the internet and click OK on the message box.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Re: win 32/nugel.e worm

Post by JettPro Boss on 7th July 2010, 9:27 am

Belahzur,
This is new software the company installed to monitor employees and will not be removed. I believe that we (more you than I) have solved the issue. I appreciate all the assistance. Great Days Sir.

JettPro Boss
Novice
Novice

Posts Posts : 11
Joined Joined : 2010-06-30
OS OS : windows xp
Points Points : 23703
# Likes # Likes : 0

View user profile

Back to top Go down

View previous topic View next topic Back to top


 
Permissions in this forum:
You cannot reply to topics in this forum