Virus called seneka!!

View previous topic View next topic Go down

Solved Virus called seneka!!

Post by Vladimir on Mon Feb 09, 2009 2:58 pm

Hi,

For a long time I had dissabled my anti-virus program named "Panda antivirus 2009" but now I got it back, although I thought it didn't do it job and I installed kaspersky instead of panda.

At the time where I was without anti-virus I got multiple viruses which I deleted by using kaspersky. The only virus that still exists and I can't do anything is the virus called "seneka", which doesn't allow your anti-virus to get updates, nor to get on sites where you can get free scan for malware,spyware and all that has to do with viruses.

So, by saying all that I would please to give me a solution regarding on that virus, but please don't send me pages, because I can't open all of them ( especially anti-viruses ones ). Any drastic solution? Can I get stolen by this program from another person?

Help me Honored

Vladimir
Senior
Senior

Status :
Online
Offline

Posts : 219
Joined : 2009-02-09
Gender : Male
OS : Windows XP SP3

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Belahzur on Mon Feb 09, 2009 3:04 pm

1. Please download The Avenger by Swandog46 to your Desktop
Link: [You must be registered and logged in to see this link.] or [You must be registered and logged in to see this link.].

  • Click on Avenger.zip to open the file
  • Extract avenger.exe to your desktop

2. Now, start The Avenger program by clicking on its icon on your desktop.

  • Leave the script box blank.
  • Leave the ticked box "Scan for rootkit" ticked.
  • Then tick "Disable any rootkits found"
  • Now click on the Execute to begin execution of the script.
  • Answer "Yes" twice when prompted.

    The Avenger will automatically do the following:

  • It will Restart your computer.
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avengerís actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
3. Please copy/paste the content of c:\avenger.txt into your reply.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline

Posts : 34916
Joined : 2008-08-03
Gender : Male
OS : XP SP3 Media Centre

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Vladimir on Mon Feb 09, 2009 3:19 pm

Uff, I thought that I couldn't open the links but luckily I could open and download it via the 2nd link you gave me.

By the way, I can update my kaspersky as I couldn't before, it deleted the virus?

Here's the thing you wanted :

Logfile of The Avenger Version 2.0, (c) by Swandog46
[You must be registered and logged in to see this link.]

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.

Hidden driver "TDSSserv.sys" found!
ImagePath: \systemroot\system32\drivers\TDSSpqlt.sys
Driver disabled successfully.

Rootkit scan completed.


Completed script processing.

*******************

Finished! Terminate.
Shocking Whoa

Vladimir
Senior
Senior

Status :
Online
Offline

Posts : 219
Joined : 2009-02-09
Gender : Male
OS : Windows XP SP3

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Belahzur on Mon Feb 09, 2009 3:25 pm

Hello.
The first link is an official link uploaded by the creator of the tool, where as the second link is our link, it's a file hosting website we uploaded the tool at. Wink

Not deleted it yet, only stopped it running, one more run and this should kill it, then we have to make sure it's files are gone with it.

2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+CCrying


Drivers to delete:
TDSSserv.sys

Files to delete:
C:\WINDOWS\system32\drivers\TDSSpqlt.sys

Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


3. Now, start The Avenger program by clicking on its icon on your desktop.

  • Under "Input script here:", paste in the script from the quote box above.
  • Leave the ticked box "Scan for rootkit" ticked.
  • Then tick "Disable any rootkits found"
  • Now click on the Execute to begin execution of the script.
  • Answer "Yes" twice when prompted.

    The Avenger will automatically do the following:

  • It will Restart your computer.
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avengerís actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
4. Please copy/paste the content of c:\avenger.txt into your reply.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline

Posts : 34916
Joined : 2008-08-03
Gender : Male
OS : XP SP3 Media Centre

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Vladimir on Mon Feb 09, 2009 3:43 pm

Here it is : Logfile of The Avenger Version 2.0, (c) by Swandog46
[You must be registered and logged in to see this link.]

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!

Driver "TDSSserv.sys" deleted successfully.
File "C:\WINDOWS\system32\drivers\TDSSpqlt.sys" deleted successfully.

Completed script processing.

*******************

Finished! Terminate.

If it's done, let me know please!!!!!111

Vladimir
Senior
Senior

Status :
Online
Offline

Posts : 219
Joined : 2009-02-09
Gender : Male
OS : Windows XP SP3

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Belahzur on Mon Feb 09, 2009 3:44 pm

Okay, lets have a look around.

  • Please download DDS by sUBs to your Desktop (Important!!) from one of these locations:
    [You must be registered and logged in to see this link.]
    [You must be registered and logged in to see this link.]
    [You must be registered and logged in to see this link.]
  • Double click DDS.scr to run
  • When complete, DDS.txt will open.
  • Save the report to your Desktop.
  • Copy and paste DDS.txt back here, I don't need to see attach.txt.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline

Posts : 34916
Joined : 2008-08-03
Gender : Male
OS : XP SP3 Media Centre

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Vladimir on Mon Feb 09, 2009 3:49 pm

Here it is :


DDS (Ver_09-02-01.01) - NTFSx86
Run by User at 17:48:09,96 on Éœ¨ 09/02/2009
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_05
Microsoft Windows XP Professional 5.1.2600.3.1253.30.1032.18.2046.1472 [GMT 2:00]

AV: Kaspersky Anti-Virus *On-access scanning enabled* (Updated)

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2009\avp.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\system32\infolearnasrv.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\PDF Complete\pdfsvc.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\Explorer.EXE
C:\Program Files\TortoiseSVN\bin\TSVNCache.exe
C:\Program Files\PDF Complete\pdfsty.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd.exe
C:\Program Files\HP\hpcoretech\hpcmpmgr.exe
C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb09.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpotdd01.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2009\avp.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\DAEMON Tools Lite\daemon.exe
C:\Program Files\Common Files\Teleca Shared\Generic.exe
C:\Program Files\Sony Ericsson\Mobile2\Mobile Phone Monitor\epmworker.exe
C:\Program Files\Common Files\InstallShield\UpdateService\isuspm.exe
C:\Program Files\InterVideo\Common\Bin\WinCinemaMgr.exe
C:\Program Files\WinZip\WZQKPICK.EXE
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Documents and Settings\User\Επιφάνεια εργασίας\dds.scr

============== Pseudo HJT Report ===============

uStart Page = [You must be registered and logged in to see this link.]
uSearchMigratedDefaultURL = [You must be registered and logged in to see this link.]
uInternet Connection Wizard,ShellNext = [You must be registered and logged in to see this link.]
uInternet Settings,ProxyOverride = *.local
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: NoExplorer - No File
BHO: ShoppingReport: {100eb1fd-d03e-47fd-81f3-ee91287f9465} - c:\program files\shoppingreport\bin\2.5.0\ShoppingReport.dll
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: IEVkbdBHO Class: {59273ab4-e7d3-40f9-a1a8-6fa9cca1862c} - c:\program files\kaspersky lab\kaspersky anti-virus 2009\ievkbd.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0_05\bin\ssv.dll
BHO: {7E853D72-626A-48EC-A868-BA8D5E23E045} - No File
BHO: Βοηθός εισόδου του Windows Live: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: ExSearchView: {d786fe7f-a933-4719-b8e7-a1c693d80a4d} - c:\windows\system32\vosext.dll
EB: ShopperReports: {a7cddcdc-beeb-4685-a062-978f5e07ceee} - c:\program files\shoppingreport\bin\2.5.0\ShoppingReport.dll
uRun: [CTFMON.EXE] c:\windows\system32\ctfmon.exe
uRun: [DAEMON Tools Lite] "c:\program files\daemon tools lite\daemon.exe" -autorun
uRun: [5af13bb2cb0f6b114e8b1135748975e9] /r
uRun: [ISUSPM] "c:\program files\common files\installshield\updateservice\isuspm.exe" -scheduler
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [PDF Complete] "c:\program files\pdf complete\pdfsty.exe"
mRun: [SetRefresh] c:\program files\compaq\setrefresh\SetRefresh.exe
mRun: [NeroFilterCheck] c:\windows\system32\NeroCheck.exe
mRun: [RemoteControl] "c:\program files\cyberlink\powerdvd\PDVDServ.exe"
mRun: [ISUSPM Startup] c:\progra~1\common~1\instal~1\update~1\isuspm.exe -startup
mRun: [ISUSScheduler] "c:\program files\common files\installshield\updateservice\issch.exe" -start
mRun: [HP Software Update] "c:\program files\hewlett-packard\hp software update\HPWuSchd.exe"
mRun: [HP Component Manager] "c:\program files\hp\hpcoretech\hpcmpmgr.exe"
mRun: [HPDJ Taskbar Utility] c:\windows\system32\spool\drivers\w32x86\3\hpztsb09.exe
mRun: [DeviceDiscovery] c:\program files\hewlett-packard\digital imaging\bin\hpotdd01.exe
mRun: [TkBellExe] "c:\program files\vistacodecpack\rm\update_ob\realsched.exe" -osboot
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [Sony Ericsson PC Suite] "c:\program files\sony ericsson\mobile2\application launcher\Application Launcher.exe" /startoptions
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /install
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [NWEReboot]
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [APVXDWIN] "c:\program files\panda security\panda antivirus pro 2009\APVXDWIN.EXE" /s
mRun: [SCANINICIO] "c:\program files\panda security\panda antivirus pro 2009\Inicio.exe"
mRun: [ASPMonitor] c:\program files\antispyware protector\AntiSpyMon.exe
mRun: [AVP] "c:\program files\kaspersky lab\kaspersky anti-virus 2009\avp.exe"
dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
StartupFolder: c:\docume~1\user\startm~1\f2da~1\599a~1\antisp~1.lnk - c:\program files\antispyware protector\AntiSpyProt.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\f2da~1\599a~1\interv~1.lnk - c:\program files\intervideo\common\bin\WinCinemaMgr.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\f2da~1\599a~1\winzip~1.lnk - c:\program files\winzip\WZQKPICK.EXE
mPolicies-system: DisableTaskMgr = 1 (0x1)
mPolicies-system: DisableRegistrytools = 1 (0x1)
IE: Ε&ξαγωγή στο Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_05\bin\ssv.dll
IE: {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - {85E0B171-04FA-11D1-B7DA-00A0C90348D6} - c:\program files\kaspersky lab\kaspersky anti-virus 2009\SCIEPlgn.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
IE: {C5428486-50A0-4a02-9D20-520B59A9F9B2} - {C9CCBB35-D123-4a31-AFFC-9B2933132116} - c:\program files\shoppingreport\bin\2.5.0\ShoppingReport.dll
IE: {C5428486-50A0-4a02-9D20-520B59A9F9B3} - {A16AD1E9-F69A-45af-9462-B1C286708842} - c:\program files\shoppingreport\bin\2.5.0\ShoppingReport.dll
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - [You must be registered and logged in to see this link.]
DPF: {CAFEEFAC-0016-0000-0001-ABCDEFFEDCBA} - [You must be registered and logged in to see this link.]
DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - [You must be registered and logged in to see this link.]
DPF: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - [You must be registered and logged in to see this link.]
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - [You must be registered and logged in to see this link.]
Handler: cetihpz - {CF184AD3-CDCB-4168-A3F7-8E447D129300} - c:\program files\hp\hpcoretech\comp\hpuiprot.dll
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Notify: avldr - avldr.dll
Notify: igfxcui - igfxdev.dll
Notify: klogon - c:\windows\system32\klogon.dll
AppInit_DLLs: c:\progra~1\kasper~1\kasper~1\mzvkbd.dll,c:\progra~1\kasper~1\kasper~1\mzvkbd3.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\user\applic~1\mozilla\firefox\profiles\cu6zhwsp.default\
FF - prefs.js: browser.search.defaulturl - [You must be registered and logged in to see this link.]
FF - prefs.js: browser.search.selectedEngine - isoHunt Customized Web Search
FF - prefs.js: browser.startup.homepage - [You must be registered and logged in to see this link.]
FF - prefs.js: keyword.URL - [You must be registered and logged in to see this link.]
FF - plugin: c:\program files\mozilla firefox\plugins\npbittorrent.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npff_gdm.dll
FF - plugin: c:\program files\vistacodecpack\rm\browser\plugins\nppl3260.dll
FF - plugin: c:\program files\vistacodecpack\rm\browser\plugins\nprpjplug.dll

============= SERVICES / DRIVERS ===============

R0 kl1;Kl1;c:\windows\system32\drivers\kl1.sys [2008-7-21 121872]
R0 klbg;Kaspersky Lab Boot Guard Driver;c:\windows\system32\drivers\klbg.sys [2008-1-29 33808]
R1 KLIF;Kaspersky Lab Driver;c:\windows\system32\drivers\klif.sys [2009-2-9 213520]
R1 SSHDRV65;SSHDRV65;c:\windows\system32\drivers\SSHDRV65.sys [2008-3-29 120320]
R1 SSHDRV79;SSHDRV79;c:\windows\system32\drivers\SSHDRV79.sys [2008-5-4 75264]
R2 AVP;Kaspersky Anti-Virus;c:\program files\kaspersky lab\kaspersky anti-virus 2009\avp.exe [2008-7-29 206088]
R2 INFOlearn_admin_srv;INFOlearn Admin Service;c:\windows\system32\infolearnasrv.exe [2006-10-6 49152]

Vladimir
Senior
Senior

Status :
Online
Offline

Posts : 219
Joined : 2009-02-09
Gender : Male
OS : Windows XP SP3

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Vladimir on Mon Feb 09, 2009 3:49 pm

Continues here :

R2 pdfcDispatcher;PDF Document Manager;c:\program files\pdf complete\pdfsvc.exe [2008-1-10 540184]
R3 NETIMFLT01060034;PANDA NDIS IM Filter Miniport v1.6.0.34;c:\windows\system32\drivers\neti1634.sys [2009-2-7 197888]
S0 pavboot;Panda boot driver;c:\windows\system32\drivers\pavboot.sys --> c:\windows\system32\drivers\pavboot.sys [?]
S2 Gwmsrv;Panda Goodware Cache Manager;c:\windows\system32\svchost -k panda --> c:\windows\system32\svchost -k Panda [?]
S2 odbcasvc;ODBC Administration Service;c:\windows\system32\odbcasvc.exe --> c:\windows\system32\odbcasvc.EXE [?]
S2 Panda Software Controller;Panda Software Controller;"c:\program files\panda security\panda antivirus pro 2009\psctrls.exe" --> c:\program files\panda security\panda antivirus pro 2009\PsCtrls.exe [?]
S2 PAVDRV;pavdrv;c:\windows\system32\drivers\pavdrv51.sys --> c:\windows\system32\drivers\pavdrv51.sys [?]
S2 PAVFNSVR;Panda Function Service;"c:\program files\panda security\panda antivirus pro 2009\pavfnsvr.exe" --> c:\program files\panda security\panda antivirus pro 2009\PavFnSvr.exe [?]
S2 PAVSRV;Panda On-Access Anti-Malware Service;"c:\program files\panda security\panda antivirus pro 2009\pavsrv51.exe" --> c:\program files\panda security\panda antivirus pro 2009\pavsrv51.exe [?]
S2 PSGenUn;Panda Security Generic Uninstaller;c:\progra~1\instal~1\{e55fb~1\smcl\smclpav.exe --> c:\progra~1\instal~1\{e55fb~1\smcl\SMCLpav.exe [?]
S2 PskSvcRetail;Panda PSK service;"c:\program files\panda security\panda antivirus pro 2009\psksvc.exe" --> c:\program files\panda security\panda antivirus pro 2009\PskSvc.exe [?]
S3 AvFlt;Antivirus Filter Driver;c:\windows\system32\drivers\av5flt.sys --> c:\windows\system32\drivers\av5flt.sys [?]
S3 ComFiltr;Panda Anti-Dialer;\??\c:\windows\system32\drivers\comfiltr.sys --> c:\windows\system32\drivers\COMFiltr.sys [?]
S3 P1130VID;Creative WebCam NX Pro;c:\windows\system32\drivers\P1130Vid.sys [2008-2-4 90357]
S3 PavSRK.sys;PavSRK.sys;\??\c:\windows\system32\pavsrk.sys --> c:\windows\system32\PavSRK.sys [?]
S3 PavTPK.sys;PavTPK.sys;\??\c:\windows\system32\pavtpk.sys --> c:\windows\system32\PavTPK.sys [?]
S3 PCD65X2;PCD65X2;c:\docume~1\user\locals~1\temp\PCD65X2.sys [2008-3-29 124416]
S3 PCD65X3;PCD65X3;c:\docume~1\user\locals~1\temp\PCD65X3.sys [2008-3-29 124416]
S3 PCD65X4;PCD65X4;c:\docume~1\user\locals~1\temp\PCD65X4.sys [2008-5-3 124416]

=============== Created Last 30 ================

2009-02-09 17:14 3,017,760 a--sh--- c:\windows\system32\drivers\fidbox.dat
2009-02-09 17:14 303,136 a--sh--- c:\windows\system32\drivers\fidbox2.dat
2009-02-09 17:14 25,704 a--sh--- c:\windows\system32\drivers\fidbox.idx
2009-02-09 17:14 2,116 a--sh--- c:\windows\system32\drivers\fidbox2.idx
2009-02-09 15:48 0 a------- c:\windows\RAVTC.TMP
2009-02-09 15:42 101,287 a------- c:\windows\system32\drivers\klin.dat
2009-02-09 15:42 89,601 a------- c:\windows\system32\drivers\klick.dat
2009-02-09 15:41 --d----- c:\docume~1\alluse~1\applic~1\Kaspersky Lab
2009-02-09 14:01 --d----- c:\docume~1\user\applic~1\Recruitment Viewer
2009-02-09 13:52 248 a------- c:\windows\RomeTW.ini
2009-02-07 18:07 446,464 a------- c:\windows\system32\HHActiveX.dll
2009-02-07 18:06 197,888 a------- c:\windows\system32\drivers\neti1634.sys
2009-02-07 18:06 58,672 a------- c:\windows\system32\avldr.dll
2009-02-07 18:06 --d----- c:\docume~1\user\applic~1\Panda Security
2009-02-07 18:06 --d----- c:\docume~1\alluse~1\applic~1\Panda Security
2009-02-07 17:58 168 a------- c:\windows\AvDetected.ini
2009-02-06 16:00 19,214 a------- c:\windows\system32\sf.ico
2009-02-06 16:00 13,942 a------- c:\windows\system32\m3.ico
2009-02-06 16:00 13,942 a------- c:\windows\system32\c.ico
2009-02-06 16:00 11,062 a------- c:\windows\system32\p.ico
2009-02-06 16:00 7,662 a------- c:\windows\system32\m.ico
2009-02-06 16:00 4,286 a------- c:\windows\system32\s.ico
2009-02-06 16:00 3,182 a------- c:\windows\ios.dat
2009-02-06 16:00 98,304 a------- c:\windows\system32\vosext.dll
2009-02-06 15:59 2,199 a------- c:\windows\system32\TDSSlxwp.dll
2009-02-06 15:59 61,440 a------- c:\windows\system32\TDSSxfum.dll
2009-02-06 15:59 31,232 a------- c:\windows\system32\TDSSrtqp.dll
2009-02-06 15:59 29,696 a------- c:\windows\system32\TDSShrsr.dll
2009-02-06 15:58 441 a------- c:\windows\system32\TDSSorvd.dat
2009-02-06 15:58 35,840 a------- c:\windows\system32\TDSSoiqn.dll
2009-02-05 17:56 --d----- C:\RTWGE
2009-01-28 15:28 --d----- c:\program files\Vidmex
2009-01-28 15:16 --d----- c:\program files\SubDownloader2
2009-01-24 18:42 --d----- c:\docume~1\user\applic~1\Subversion
2009-01-24 18:41 --d----- c:\program files\TortoiseSVN
2009-01-12 21:03 5,632 a------- c:\windows\system32\ptpusb.dll
2009-01-12 21:03 159,232 a------- c:\windows\system32\ptpusd.dll
2009-01-12 21:03 15,104 a------- c:\windows\system32\drivers\usbscan.sys
2009-01-12 21:03 15,104 a------- c:\windows\system32\dllcache\usbscan.sys

==================== Find3M ====================

2009-02-09 17:23 33,808 a------- c:\windows\system32\drivers\klbg.sys
2008-12-26 10:58 98,304 a------- c:\windows\system32\CmdLineExt.dll
2008-12-13 08:37 3,593,216 -------- c:\windows\system32\dllcache\mshtml.dll
2008-12-11 12:57 333,952 -------- c:\windows\system32\dllcache\srv.sys
2008-02-05 14:25 32 a------- c:\docume~1\alluse~1\applic~1\ezsid.dat
2008-01-15 15:12 80 ---shr-- c:\windows\system32\6689857412.dll
2008-09-16 00:00 32,768 a--sh--- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008091620080917\index.dat

============= FINISH: 17:48:40,12 ===============

Vladimir
Senior
Senior

Status :
Online
Offline

Posts : 219
Joined : 2009-02-09
Gender : Male
OS : Windows XP SP3

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Belahzur on Mon Feb 09, 2009 3:57 pm

This should do it.

Please download the [You must be registered and logged in to see this link.].

  • Save it to your desktop.
  • Please double-click OTMoveIt3.exe to run it.
  • Copy the bolded text below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose CopyCrying


    :services
    PCD65X2
    PCD65X3
    PCD65X4

    :files
    c:\windows\system32\sf.ico
    c:\windows\system32\m3.ico
    c:\windows\system32\c.ico
    c:\windows\system32\p.ico
    c:\windows\system32\m.ico
    c:\windows\system32\s.ico
    c:\windows\ios.dat
    c:\windows\system32\vosext.dll
    c:\windows\system32\TDSSlxwp.dll
    c:\windows\system32\TDSSxfum.dll
    c:\windows\system32\TDSSrtqp.dll
    c:\windows\system32\TDSShrsr.dll
    c:\windows\system32\TDSSorvd.dat
    c:\windows\system32\TDSSoiqn.dll
    c:\program files\shoppingreport

    :reg
    [HKEY_Local_Machine\Software\Microsoft\Windows\CurrentVersion\Policies\System]
    "DisableTaskMgr"=-
    "DisableRegistrytools"=-


  • Return to OTMoveIt3, right click in the "Paste instructions for items to be Moved" window (under the light blue bar) and choose Paste.
  • Click the red Moveit! button.
  • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
  • Close OTMoveIt3
If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.

Please post the OTMoveIt log.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline

Posts : 34916
Joined : 2008-08-03
Gender : Male
OS : XP SP3 Media Centre

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Vladimir on Mon Feb 09, 2009 4:10 pm

Before I do this which you say I am getting this :

[You must be registered and logged in to see this link.]
[You must be registered and logged in to see this link.]

Now, I'm trying the one you said up although I didn't restart when I was told by the program, I did after it, is that ok? I didn't get any txt opened.. So I paste here the things under the green bar :

========== SERVICES/DRIVERS ==========
Unable to stop service PCD65X2 .
Unable to stop service PCD65X3 .
Unable to stop service PCD65X4 .
========== FILES ==========
File/Folder c:\windows\system32\sf.ico not found.
File/Folder c:\windows\system32\m3.ico not found.
File/Folder c:\windows\system32\c.ico not found.
File/Folder c:\windows\system32\p.ico not found.
File/Folder c:\windows\system32\m.ico not found.
File/Folder c:\windows\system32\s.ico not found.
File/Folder c:\windows\ios.dat not found.
File/Folder c:\windows\system32\vosext.dll not found.
File/Folder c:\windows\system32\TDSSlxwp.dll not found.
File/Folder c:\windows\system32\TDSSxfum.dll not found.
File/Folder c:\windows\system32\TDSSrtqp.dll not found.
File/Folder c:\windows\system32\TDSShrsr.dll not found.
File/Folder c:\windows\system32\TDSSorvd.dat not found.
File/Folder c:\windows\system32\TDSSoiqn.dll not found.
File/Folder c:\program files\shoppingreport not found.
========== REGISTRY ==========
Registry value HKEY_Local_Machine\Software\Microsoft\Windows\CurrentVersion\Policies\System\\DisableTaskMgr not found.
Registry value HKEY_Local_Machine\Software\Microsoft\Windows\CurrentVersion\Policies\System\\DisableRegistrytools not found.

OTMoveIt3 by OldTimer - Version 1.0.8.0 log created on 02092009_180908

Vladimir
Senior
Senior

Status :
Online
Offline

Posts : 219
Joined : 2009-02-09
Gender : Male
OS : Windows XP SP3

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Belahzur on Mon Feb 09, 2009 4:29 pm

Okay, lets run a scan with this.


  • Download combofix from here [You must be registered and logged in to see this link.]
  • Please disable your local AV (Anti-virus) by right clicking it's icon in the tray, and exit it. See [You must be registered and logged in to see this link.] for how to disable your AV.
  • Double click on ComboFix.exe.
  • Follow the prompts. NOTE:
  • ComboFix will check to see if the Microsoft Windows Recovery Console is installed.
    ***It's strongly recommended to have the Recovery Console installed before doing any malware removal.***

    **Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will automatically proceed with its scan.


  • The Recovery Console provides a recovery/repair mode should a problem occur during a Combofix run.



  • Allow ComboFix to download the Recovery Console.
  • Accept the End-User License Agreement.
  • The Recovery Console will be installed.
  • You will then get this next prompt that asks if you want to continue the malware scan, select yes



  • Allow combofix to run
  • Post C:\combofix.txt back here.

    Note:
    Do not mouseclick combofix's window whilst it's running. That may cause it to stall.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline

Posts : 34916
Joined : 2008-08-03
Gender : Male
OS : XP SP3 Media Centre

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Vladimir on Mon Feb 09, 2009 4:44 pm

It didn't say anything about recovery console, it just opened the program, was doing some things there and then rebooted.

Here are the thing you wanted :

ComboFix 09-02-08.02 - User 2009-02-09 18:32:30.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.3.1253.1.1032.18.2046.1524 [GMT 2:00]
Running from: c:\documents and settings\User\Επιφάνεια εργασίας\Combo-Fix.exe
AV: Kaspersky Anti-Virus *On-access scanning disabled* (Updated)
* Created a new restore point

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\User\Application Data\ShoppingReport
c:\documents and settings\User\Application Data\ShoppingReport\cs\Config.xml
c:\documents and settings\User\Application Data\ShoppingReport\cs\db\Aliases.dbs
c:\documents and settings\User\Application Data\ShoppingReport\cs\db\Sites.dbs
c:\documents and settings\User\Application Data\ShoppingReport\cs\dwld\WhiteList.xip
c:\documents and settings\User\Application Data\ShoppingReport\cs\report\aggr_storage.xml
c:\documents and settings\User\Application Data\ShoppingReport\cs\report\send_storage.xml
c:\documents and settings\User\Application Data\ShoppingReport\cs\res1\WhiteList.dbs
c:\documents and settings\User\Favorites\Cheap Pharmacy Online.url
c:\documents and settings\User\Favorites\Download programs.url
c:\documents and settings\User\Favorites\Games.url
c:\documents and settings\User\Favorites\Search Online.url
c:\documents and settings\User\Favorites\SMS TRAP.url
c:\documents and settings\User\Favorites\Translator.url
c:\documents and settings\User\Favorites\Videos.url
c:\documents and settings\User\Favorites\VIP Casino.url
c:\documents and settings\User\Start Menu\Προγράμματα\Download programs.url
c:\documents and settings\User\Start Menu\Προγράμματα\Games.url
c:\documents and settings\User\Start Menu\Προγράμματα\Translator.url
c:\documents and settings\User\Start Menu\Προγράμματα\Videos.url
c:\documents and settings\User\Start Menu\Cheap Pharmacy Online.url
c:\documents and settings\User\Start Menu\Search Online.url
c:\documents and settings\User\Start Menu\SMS TRAP.url
c:\documents and settings\User\Start Menu\VIP Casino.url
c:\windows\admintxt.txt
c:\windows\system32\x64

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_ODBCASVC
-------\Legacy_TDSSSERV.SYS
-------\Service_odbcasvc


((((((((((((((((((((((((( Files Created from 2009-01-09 to 2009-02-09 )))))))))))))))))))))))))))))))
.

2009-02-09 18:02 . 2009-02-09 18:02 d-------- C:\_OTMoveIt
2009-02-09 17:14 . 2009-02-09 18:36 3,075,104 --ahs---- c:\windows\system32\drivers\fidbox.dat
2009-02-09 17:14 . 2009-02-09 18:36 319,520 --ahs---- c:\windows\system32\drivers\fidbox2.dat
2009-02-09 17:14 . 2009-02-09 18:36 26,152 --ahs---- c:\windows\system32\drivers\fidbox.idx
2009-02-09 17:14 . 2009-02-09 18:36 2,172 --ahs---- c:\windows\system32\drivers\fidbox2.idx
2009-02-09 15:48 . 2009-02-09 15:48 0 --a------ c:\windows\RAVTC.TMP
2009-02-09 15:42 . 2009-02-09 17:23 101,287 --a------ c:\windows\system32\drivers\klin.dat
2009-02-09 15:42 . 2009-02-09 17:23 89,601 --a------ c:\windows\system32\drivers\klick.dat
2009-02-09 15:41 . 2009-02-09 18:38 d-------- c:\documents and settings\All Users\Application Data\Kaspersky Lab
2009-02-09 14:01 . 2009-02-09 14:01 d-------- c:\documents and settings\User\Application Data\Recruitment Viewer
2009-02-09 13:52 . 2009-02-09 13:52 248 --a------ c:\windows\RomeTW.ini
2009-02-07 18:07 . 2003-10-22 18:23 446,464 --a------ c:\windows\system32\HHActiveX.dll
2009-02-07 18:06 . 2009-02-07 18:06 d-------- c:\documents and settings\User\Application Data\Panda Security
2009-02-07 18:06 . 2009-02-07 18:06 d-------- c:\documents and settings\All Users\Application Data\Panda Security
2009-02-07 18:06 . 2008-06-26 11:25 197,888 --a------ c:\windows\system32\drivers\neti1634.sys
2009-02-07 18:06 . 2008-03-18 16:58 58,672 --a------ c:\windows\system32\avldr.dll
2009-02-07 17:58 . 2009-02-07 17:58 168 --a------ c:\windows\AvDetected.ini
2009-02-06 15:29 . 2009-02-06 17:41 d-a------ c:\documents and settings\All Users\Application Data\TEMP
2009-02-05 17:56 . 2009-02-05 18:21 d-------- C:\RTWGE
2009-01-28 15:28 . 2009-01-28 15:48 d-------- c:\program files\Vidmex
2009-01-28 15:16 . 2009-01-28 15:17 d-------- c:\program files\SubDownloader2
2009-01-24 18:42 . 2009-01-24 18:42 d-------- c:\documents and settings\User\Application Data\Subversion
2009-01-24 18:41 . 2009-01-24 18:42 d-------- c:\program files\TortoiseSVN
2009-01-12 21:03 . 2008-04-14 19:29 159,232 --a------ c:\windows\system32\ptpusd.dll
2009-01-12 21:03 . 2008-04-13 21:45 15,104 --a------ c:\windows\system32\drivers\usbscan.sys
2009-01-12 21:03 . 2008-04-13 21:45 15,104 --a------ c:\windows\system32\dllcache\usbscan.sys
2009-01-12 21:03 . 2001-11-26 23:29 5,632 --a------ c:\windows\system32\ptpusb.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-02-09 15:23 33,808 ----a-w c:\windows\system32\drivers\klbg.sys
2009-02-09 12:14 --------- d--h--w c:\program files\InstallShield Installation Information
2009-02-09 11:22 --------- d-----w c:\documents and settings\User\Application Data\uTorrent
2009-02-05 11:40 --------- d-----w c:\program files\Common Files\Adobe
2009-02-01 20:54 --------- d-----w c:\documents and settings\User\Application Data\LimeWire
2009-01-25 13:01 --------- d-----w c:\program files\Activision
2009-01-25 12:54 --------- d-----w c:\program files\Sierra
2009-01-25 12:47 --------- d-----w c:\documents and settings\User\Application Data\InstallShield
2009-01-24 15:30 --------- d-----w c:\program files\LimeWire
2008-12-29 14:50 --------- d-----w c:\documents and settings\All Users\Application Data\POPWWPROFILES
2008-12-29 14:43 --------- d-----w c:\program files\Ubisoft
2008-12-26 08:58 --------- d-----w c:\program files\Tomb Raider - Legend
2008-12-18 23:21 --------- d-----w c:\documents and settings\User\Application Data\Skype
2008-12-18 19:43 --------- d-----w c:\documents and settings\User\Application Data\skypePM
2008-12-11 10:57 333,952 ----a-w c:\windows\system32\drivers\srv.sys
2008-02-05 12:25 32 ----a-w c:\documents and settings\All Users\Application Data\ezsid.dat
2008-01-15 13:12 80 --sh--r c:\windows\system32\6689857412.dll
2008-09-15 22:00 32,768 --sha-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012008091620080917\index.dat
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\1TortoiseSVN]
@="{30351346-7B7D-4FCC-81B4-1E394CA267EB}"
[HKEY_CLASSES_ROOT\CLSID\{30351346-7B7D-4FCC-81B4-1E394CA267EB}]
2007-12-21 21:53 536576 --a------ c:\program files\TortoiseSVN\bin\tortoisesvn.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\2TortoiseSVN]
@="{30351347-7B7D-4FCC-81B4-1E394CA267EB}"
[HKEY_CLASSES_ROOT\CLSID\{30351347-7B7D-4FCC-81B4-1E394CA267EB}]
2007-12-21 21:53 536576 --a------ c:\program files\TortoiseSVN\bin\tortoisesvn.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\3TortoiseSVN]
@="{30351348-7B7D-4FCC-81B4-1E394CA267EB}"
[HKEY_CLASSES_ROOT\CLSID\{30351348-7B7D-4FCC-81B4-1E394CA267EB}]
2007-12-21 21:53 536576 --a------ c:\program files\TortoiseSVN\bin\tortoisesvn.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\4TortoiseSVN]
@="{3035134B-7B7D-4FCC-81B4-1E394CA267EB}"
[HKEY_CLASSES_ROOT\CLSID\{3035134B-7B7D-4FCC-81B4-1E394CA267EB}]
2007-12-21 21:53 536576 --a------ c:\program files\TortoiseSVN\bin\tortoisesvn.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\5TortoiseSVN]
@="{3035134C-7B7D-4FCC-81B4-1E394CA267EB}"
[HKEY_CLASSES_ROOT\CLSID\{3035134C-7B7D-4FCC-81B4-1E394CA267EB}]
2007-12-21 21:53 536576 --a------ c:\program files\TortoiseSVN\bin\tortoisesvn.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\6TortoiseSVN]
@="{3035134D-7B7D-4FCC-81B4-1E394CA267EB}"
[HKEY_CLASSES_ROOT\CLSID\{3035134D-7B7D-4FCC-81B4-1E394CA267EB}]
2007-12-21 21:53 536576 --a------ c:\program files\TortoiseSVN\bin\tortoisesvn.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\7TortoiseSVN]
@="{3035134E-7B7D-4FCC-81B4-1E394CA267EB}"
[HKEY_CLASSES_ROOT\CLSID\{3035134E-7B7D-4FCC-81B4-1E394CA267EB}]
2007-12-21 21:53 536576 --a------ c:\program files\TortoiseSVN\bin\tortoisesvn.dll

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"5af13bb2cb0f6b114e8b1135748975e9"="/r" [X]
"CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"DAEMON Tools Lite"="c:\program files\DAEMON Tools Lite\daemon.exe" [2008-04-01 486856]
"ISUSPM"="c:\program files\Common Files\InstallShield\UpdateService\isuspm.exe" [2006-09-10 218032]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2007-06-13 142104]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2007-06-13 162584]
"Persistence"="c:\windows\system32\igfxpers.exe" [2007-06-13 138008]
"PDF Complete"="c:\program files\PDF Complete\pdfsty.exe" [2007-08-07 331288]
"SetRefresh"="c:\program files\Compaq\SetRefresh\SetRefresh.exe" [2003-11-20 525824]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe" [2004-11-02 32768]
"ISUSPM Startup"="c:\progra~1\COMMON~1\INSTAL~1\UPDATE~1\isuspm.exe" [2006-09-10 218032]
"ISUSScheduler"="c:\program files\Common Files\InstallShield\UpdateService\issch.exe" [2006-09-10 86960]
"HP Software Update"="c:\program files\Hewlett-Packard\HP Software Update\HPWuSchd.exe" [2003-06-25 49152]
"HP Component Manager"="c:\program files\HP\hpcoretech\hpcmpmgr.exe" [2003-10-23 233472]
"HPDJ Taskbar Utility"="c:\windows\system32\spool\drivers\w32x86\3\hpztsb09.exe" [2003-09-01 176128]
"DeviceDiscovery"="c:\program files\Hewlett-Packard\Digital Imaging\bin\hpotdd01.exe" [2003-05-21 229437]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2008-01-31 385024]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2008-02-04 267048]
"Sony Ericsson PC Suite"="c:\program files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" [2007-03-28 593920]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2007-04-12 8429568]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2007-04-12 81920]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2008-06-12 34672]
"AVP"="c:\program files\Kaspersky Lab\Kaspersky Anti-Virus 2009\avp.exe" [2009-02-09 206088]
"nwiz"="nwiz.exe" [2007-04-12 c:\windows\system32\nwiz.exe]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]

c:\documents and settings\All Users\Start Menu\Ź®¶š®α££˜ę˜\Ą΅΅ε§ž©ž\
InterVideo WinCinema Manager.lnk - c:\program files\InterVideo\Common\Bin\WinCinemaMgr.exe [2008-03-07 131072]
WinZip Quick Pick.lnk - c:\program files\WinZip\WZQKPICK.EXE [2008-05-23 122880]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avldr]
2008-03-18 16:58 58672 c:\windows\system32\avldr.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"msacm.l3acm"= l3codecp.acm
"msacm.divxa32"= divxa32.acm
"msacm.l3codec"= l3codecp.acm

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\PskSvcRetail]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\KasperskyAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

Vladimir
Senior
Senior

Status :
Online
Offline

Posts : 219
Joined : 2009-02-09
Gender : Male
OS : Windows XP SP3

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Vladimir on Mon Feb 09, 2009 4:45 pm

It continues here :

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"=
"c:\\Program Files\\BitTorrent\\bittorrent.exe"=
"c:\\Program Files\\DNA\\btdna.exe"=
"c:\\Documents and Settings\\User\\Επιφάνεια εργασίας\\Guns 'N' Roses\\uTorrent.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3389:TCP"= 3389:TCP:*:Disabled:@xpsp2res.dll,-22009

R0 klbg;Kaspersky Lab Boot Guard Driver;c:\windows\system32\drivers\klbg.sys [2008-01-29 33808]
R1 SSHDRV65;SSHDRV65;c:\windows\system32\drivers\SSHDRV65.sys [2008-03-29 120320]
R1 SSHDRV79;SSHDRV79;c:\windows\system32\drivers\SSHDRV79.sys [2008-05-04 75264]
R2 INFOlearn_admin_srv;INFOlearn Admin Service;c:\windows\system32\infolearnasrv.exe [2006-10-06 49152]
R2 pdfcDispatcher;PDF Document Manager;c:\program files\PDF Complete\pdfsvc.exe [2008-01-10 540184]
R3 NETIMFLT01060034;PANDA NDIS IM Filter Miniport v1.6.0.34;c:\windows\system32\drivers\neti1634.sys [2009-02-07 197888]
S0 pavboot;Panda boot driver;c:\windows\system32\Drivers\pavboot.sys --> c:\windows\system32\Drivers\pavboot.sys [?]
S2 Gwmsrv;Panda Goodware Cache Manager;c:\windows\system32\svchost -k Panda --> c:\windows\system32\svchost -k Panda [?]
S2 PSGenUn;Panda Security Generic Uninstaller;c:\progra~1\INSTAL~1\{E55FB~1\SMCL\SMCLpav.exe --> c:\progra~1\INSTAL~1\{E55FB~1\SMCL\SMCLpav.exe [?]
S2 PskSvcRetail;Panda PSK service;"c:\program files\Panda Security\Panda Antivirus Pro 2009\PskSvc.exe" --> c:\program files\Panda Security\Panda Antivirus Pro 2009\PskSvc.exe [?]
S3 AvFlt;Antivirus Filter Driver;c:\windows\system32\drivers\av5flt.sys --> c:\windows\system32\drivers\av5flt.sys [?]
S3 ComFiltr;Panda Anti-Dialer;\??\c:\windows\system32\DRIVERS\COMFiltr.sys --> c:\windows\system32\DRIVERS\COMFiltr.sys [?]
S3 P1130VID;Creative WebCam NX Pro;c:\windows\system32\drivers\P1130Vid.sys [2008-02-04 90357]
S3 PavSRK.sys;PavSRK.sys;\??\c:\windows\system32\PavSRK.sys --> c:\windows\system32\PavSRK.sys [?]
S3 PavTPK.sys;PavTPK.sys;\??\c:\windows\system32\PavTPK.sys --> c:\windows\system32\PavTPK.sys [?]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
panda REG_MULTI_SZ Gwmsrv

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{18ad9fac-1d01-11dd-830e-001d92227a93}]
\Shell\Auto\command - E:\auto.exe
\Shell\AutoRun\command - E:\auto.exe

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{c8433d60-73a9-11dd-840b-001d92227a93}]
\Shell\auto\command - Knight.exe open
\Shell\AutoRun\command - c:\windows\system32\RunDLL32.EXE Shell32.DLL,ShellExec_RunDLL Knight.exe open
\Shell\explore\command - Knight.exe open
\Shell\find\command - Knight.exe open
\Shell\install\command - Knight.exe open
\Shell\open\command - Knight.exe open
.
- - - - ORPHANS REMOVED - - - -

HKLM-Run-TkBellExe - c:\program files\VistaCodecPack\rm\Update_OB\realsched.exe
HKLM-Run-APVXDWIN - c:\program files\Panda Security\Panda Antivirus Pro 2009\APVXDWIN.EXE
HKLM-Run-SCANINICIO - c:\program files\Panda Security\Panda Antivirus Pro 2009\Inicio.exe
HKLM-Run-ASPMonitor - c:\program files\AntiSpyware Protector\AntiSpyMon.exe
HKLM-Run-NWEReboot - (no file)


.
------- Supplementary Scan -------
.
uStart Page = [You must be registered and logged in to see this link.]
uSearchMigratedDefaultURL = [You must be registered and logged in to see this link.]
uInternet Connection Wizard,ShellNext = [You must be registered and logged in to see this link.]
uInternet Settings,ProxyOverride = *.local
IE: Ε&ξαγωγή στο Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: {{C5428486-50A0-4a02-9D20-520B59A9F9B3} - {A16AD1E9-F69A-45af-9462-B1C286708842} -
FF - ProfilePath - c:\documents and settings\User\Application Data\Mozilla\Firefox\Profiles\cu6zhwsp.default\
FF - prefs.js: browser.search.defaulturl - [You must be registered and logged in to see this link.]
FF - prefs.js: browser.search.selectedEngine - isoHunt Customized Web Search
FF - prefs.js: browser.startup.homepage - [You must be registered and logged in to see this link.]
FF - prefs.js: keyword.URL - [You must be registered and logged in to see this link.]
FF - plugin: c:\program files\Mozilla Firefox\plugins\npbittorrent.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npff_gdm.dll
FF - plugin: c:\program files\VistaCodecPack\rm\browser\plugins\nppl3260.dll
FF - plugin: c:\program files\VistaCodecPack\rm\browser\plugins\nprpjplug.dll
.

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, [You must be registered and logged in to see this link.]
Rootkit scan 2009-02-09 18:38:41
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\pdfcDispatcher]
"ImagePath"="c:\program files\PDF Complete\pdfsvc.exe /startedbyscm:66B66708-40E2BE4D-pdfcService"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(612)
c:\windows\system32\avldr.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
c:\windows\system32\nvsvc32.exe
c:\program files\TortoiseSVN\bin\TSVNCache.exe
c:\windows\system32\rundll32.exe
c:\program files\iPod\bin\iPodService.exe
c:\progra~1\WinZip\WZQKPICK.EXE
c:\program files\Common Files\Teleca Shared\Generic.exe
c:\program files\Sony Ericsson\Mobile2\Mobile Phone Monitor\epmworker.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2009-02-09 18:41:55 - machine was rebooted
ComboFix-quarantined-files.txt 2009-02-09 16:41:52

Pre-Run: 9.002.188.800 διαθέσιμα byte
Post-Run: 25 Κατάλογοι 17,820,704,768 διαθέσιμα byte

280 --- E O F --- 2009-01-14 20:10:49

Vladimir
Senior
Senior

Status :
Online
Offline

Posts : 219
Joined : 2009-02-09
Gender : Male
OS : Windows XP SP3

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Belahzur on Mon Feb 09, 2009 4:51 pm

This looks okay again.

  • Now open a new notepad file.
  • Input this into the notepad file:

    Windows Registry Editor Version 5.00

    [-HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{18ad9fac-1d01-11dd-830e-001d92227a93}]
    [-HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{c8433d60-73a9-11dd-840b-001d92227a93}]

  • Save this as fix.reg, save it to your desktop.
  • Double click fix.reg to run it.
  • Select yes to the registry merge prompt.

Click Start > Run and copy/paste the following bolded text into the Run box and click OK:

ComboFix /u



This will also reset your restore points.

How is the machine now?


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline

Posts : 34916
Joined : 2008-08-03
Gender : Male
OS : XP SP3 Media Centre

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Vladimir on Mon Feb 09, 2009 5:33 pm

By " notepad" file what do you mean? I looked up for notepad on "right click>new>etc" but I don't have notepad... Let me think

Vladimir
Senior
Senior

Status :
Online
Offline

Posts : 219
Joined : 2009-02-09
Gender : Male
OS : Windows XP SP3

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Belahzur on Mon Feb 09, 2009 5:42 pm

Press Start > Run.
Type in Notepad and hit enter.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline

Posts : 34916
Joined : 2008-08-03
Gender : Male
OS : XP SP3 Media Centre

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Vladimir on Mon Feb 09, 2009 5:46 pm

It runs fine and without the thing I showed you on the pic before!!!!

Many many thanks my friend Cheers Mate

Problem and virus solved!

Vladimir
Senior
Senior

Status :
Online
Offline

Posts : 219
Joined : 2009-02-09
Gender : Male
OS : Windows XP SP3

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Belahzur on Mon Feb 09, 2009 5:51 pm

Your version of Java is outdated and needs to be updated to take advantage of fixes that have eliminated security vulnerabilities.
Updating Java:

  • Download the latest version of [You must be registered and logged in to see this link.].
  • Select the first option where it says "This release includes the highly anticipated...".
  • Click the "Download" button to the right.
  • In the Window that opens, select your platform and language, check the "agree" box, and click Continue.
  • Click on the link to download Windows Offline Installation and save to your desktop.
  • Close any programs you may have running - especially your web browser.
  • Go to Start > Control Panel double-click on Add or Remove Programs and remove all older versions of Java.
  • Check any item with Java Runtime Environment (JRE or J2SE) in the name.
    - Examples of older versions in Add or Remove Programs:
    - Java 2 Runtime Environment, SE v1.4.2
    - J2SE Runtime Environment 5.0
    - J2SE Runtime Environment 5.0 Update 2
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java versions.
  • Then from your desktop double-click on jre-6u11-windows-i586-p.exe that you downloaded to install the newest version.
Please make sure the new version of Java is installed before you run JavaRa.

Please download JavaRa from [You must be registered and logged in to see this link.]

  • First, unzip it.
  • Then run JavaRa.
  • Select English from the drop down menu and press Select.
  • This will open JavaRa.
  • Press Remove older versions
  • Press yes to the prompt.
  • It will make a log file of what it's removed.
  • Copy and paste the log back here.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline

Posts : 34916
Joined : 2008-08-03
Gender : Male
OS : XP SP3 Media Centre

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Vladimir on Mon Feb 09, 2009 5:59 pm

I can't run "Java SE Runtime Environment (JRE) 6 Update 12." because I don't have any such program to open it. Any suggestions?

Vladimir
Senior
Senior

Status :
Online
Offline

Posts : 219
Joined : 2009-02-09
Gender : Male
OS : Windows XP SP3

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Belahzur on Mon Feb 09, 2009 6:06 pm

The exe file doesn't run?


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline

Posts : 34916
Joined : 2008-08-03
Gender : Male
OS : XP SP3 Media Centre

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Vladimir on Mon Feb 09, 2009 6:15 pm

Sorry, by mistake I must have downloaded something else...

Now, concerning this, I press the thing to remove all the others but I get an error that it can't be done :/

Vladimir
Senior
Senior

Status :
Online
Offline

Posts : 219
Joined : 2009-02-09
Gender : Male
OS : Windows XP SP3

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Belahzur on Mon Feb 09, 2009 6:26 pm

Okay, skip removing and JavaRa will do this for us.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline

Posts : 34916
Joined : 2008-08-03
Gender : Male
OS : XP SP3 Media Centre

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Vladimir on Mon Feb 09, 2009 6:29 pm

It doesn't have anything else to do.. So are we done or we miss anything?

Vladimir
Senior
Senior

Status :
Online
Offline

Posts : 219
Joined : 2009-02-09
Gender : Male
OS : Windows XP SP3

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Belahzur on Mon Feb 09, 2009 6:30 pm

Aslong as the new version is installed, it should be fine now.

We need to make a new restore point.

To turn off System Restore, follow these steps:
1. Click Start, right-click My Computer, and then click Properties.
2. Click the System Restore tab.
3. Click the Turn off System Restore check box (or the Turn off System Restore on all drives check box), and then click OK.
4. Click Yes when you receive the prompt to the turn off System Restore.

Now we need to make a new restore point.
To turn on System Restore, follow these steps:
1. Click Start, right-click My Computer, and then click Properties.
2. Click the System Restore tab.
3. Click the Turn off System Restore check box (To turn on System Restore), and then click OK.

Below I have included a number of recommendations for how to protect your computer in order to prevent future malware infections. Please take these recommendations seriously; these few simple steps can stave off the vast majority of spyware problems. As happy as we are to help you, for your sake we would rather not have repeat customers. Goofy

1) Please navigate to [You must be registered and logged in to see this link.] and download all the "critical updates" for Windows. This can patch many of the security holes through which attackers can gain access to your computer.

Please either enable Automatic Updates under Start -> Control Panel -> Automatic Updates , or get into the habit of checking for Windows updates regularly. I cannot stress enough how important this is.

2) In order to protect yourself against spyware, you should consider installing and running the following free programs:

[You must be registered and logged in to see this link.]
A tutorial on using Ad-Aware to remove spyware from your computer may be found [You must be registered and logged in to see this link.].

[You must be registered and logged in to see this link.]
A tutorial on using Spybot to remove spyware from your computer may be found [You must be registered and logged in to see this link.]. Please also remember to enable Spybot's "Immunize" and "TeaTimer" features.

[You must be registered and logged in to see this link.]
A tutorial on using SpywareBlaster to prevent spyware from ever installing on your computer may be found [You must be registered and logged in to see this link.].

[You must be registered and logged in to see this link.]
A tutorial on using SpywareGuard for realtime protection against spyware and hijackers may be found [You must be registered and logged in to see this link.].

Make sure to keep these programs up-to-date and to run them regularly, as this can prevent a great deal of spyware hassle.

3) Please consider using an alternate browser. Mozilla's Firefox browser is fantastic; it is much more secure than Internet Explorer, immune to almost all known browser hijackers, and also has the best built-in popup blocker (as an added benefit!) that I have ever seen. If you are interested, Firefox may be downloaded from here:
[You must be registered and logged in to see this link.]
I also recommand the following add-ons for Firefox, they will help keep you safe from malicious scripts or activeX exploits.
[You must be registered and logged in to see this link.]
[You must be registered and logged in to see this link.]
[You must be registered and logged in to see this link.]

4) Also make sure to run your antivirus software regularly, and to keep it up-to-date.

To help you keep your software updated, please considering using this free software program that will check for program updates.
[You must be registered and logged in to see this link.]

5) Finally, consider maintaining a firewall. Some good free firewalls are [You must be registered and logged in to see this link.], or
[You must be registered and logged in to see this link.]
A tutorial on understanding and using firewalls may be found [You must be registered and logged in to see this link.].

Please also read Tony Klein's excellent article: [You must be registered and logged in to see this link.]

If you would take a moment to fill out our feedback form, we would appreciate it.
The link can be found [You must be registered and logged in to see this link.].

Hopefully this should take care of your problems! Good luck. Big Grin


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline

Posts : 34916
Joined : 2008-08-03
Gender : Male
OS : XP SP3 Media Centre

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Vladimir on Mon Feb 09, 2009 6:39 pm

Already did Right On! Thanks for your help !!!

Vladimir
Senior
Senior

Status :
Online
Offline

Posts : 219
Joined : 2009-02-09
Gender : Male
OS : Windows XP SP3

View user profile

Back to top Go down

Solved Re: Virus called seneka!!

Post by Doctor Inferno on Mon Jul 06, 2009 3:18 am

Since this issue has been addressed, a "solved" tag will be added and this topic will be closed.

If you need this topic reopened, please contact a staff member. This applies only to the original topic starter.

Everyone else, please open a [You must be registered and logged in to see this link.] for your questions.


Please be a GeekPolice fan on [You must be registered and logged in to see this link.]



Have we helped you? [You must be registered and logged in to see this link.] | Doctor by day, ninja by night.

Doctor Inferno
Administrator
Administrator

Status :
Online
Offline

Posts : 12017
Joined : 2007-12-26
Gender : Male
OS : Windows 7 Home Premium and Ultimate X64

View user profile

Back to top Go down

View previous topic View next topic Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum