Search Engine Virus

View previous topic View next topic Go down

Search Engine Virus

Post by murs on Tue May 12, 2009 7:00 am

Hi, not sure what the virus is called but it is basically giving me a problem with every search engine I use by redirecting me to spam sites. I tried downloading malwarebytes but it won't open so I can't use it. Here is my log-
Thanks for any help.


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:51:21 PM, on 5/11/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\brsvc01a.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\brss01a.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe
C:\Program Files\Brother\ControlCenter2\brctrcen.exe
C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe
C:\Program Files\Common Files\AOL\1226138630\ee\AOLSoftware.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Insight\Tools\aiclient.exe
C:\Program Files\ADP\TimeclockMgr\Dcm\Sentinel.exe
C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe
C:\Program Files\Symantec\pcAnywhere\awhost32.exe
C:\Program Files\BigFix Enterprise\BES Client\BESClient.exe
c:\WINDOWS\system32\nfsclnt.exe
C:\Program Files\Common Files\Kronos\DCMCommon\dbsrv6.exe
C:\Program Files\Executive Software\Diskeeper\DkService.exe
C:\Program Files\Marriott\Installation Gatekeeper\IGK.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
C:\WINDOWS\system32\svchost.exe
c:\SFU\Mapper\mapsvc.exe
C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
C:\Program Files\ADP\TimeclockMgr\Dcm\DCMStateMngr.exe
C:\Program Files\ADP\TimeclockMgr\Dcm\httpsvr.exe
C:\Program Files\ADP\TimeclockMgr\Dcm\appclnt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\SecureCRT\SecureCRT.EXE
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\TEMP\YHFE93.EXE
C:\Program Files\Trend Micro\OfficeScan Client\CNTAoSMgr.exe
C:\Program Files\Internet Explorer\Iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = [You must be registered and logged in to see this link.]
O1 - Hosts: ::1 localhost
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\ActiveX\AcroIEHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_02\bin\ssv.dll
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [ScrewDrivers Client Executable] "C:\Program Files\triCerat\Simplify Printing\ScrewDrivers Client v3\sdclient.exe" -i
O4 - HKLM\..\Run: [DiskeeperSystray] "C:\Program Files\Executive Software\Diskeeper\DkIcon.exe"
O4 - HKLM\..\Run: [SSBkgdUpdate] "C:\Program Files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" -Embedding -boot
O4 - HKLM\..\Run: [PaperPort PTD] C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe
O4 - HKLM\..\Run: [IndexSearch] C:\Program Files\ScanSoft\PaperPort\IndexSearch.exe
O4 - HKLM\..\Run: [SetDefPrt] C:\Program Files\Brother\Brmfl05b\BrStDvPt.exe
O4 - HKLM\..\Run: [ControlCenter2.0] C:\Program Files\Brother\ControlCenter2\brctrcen.exe /autorun
O4 - HKLM\..\Run: [OfficeScanNT Monitor] "C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe" -HideWindow
O4 - HKLM\..\Run: [HostManager] C:\Program Files\Common Files\AOL\1226138630\ee\AOLSoftware.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [AOL Fast Start] "C:\Program Files\AOL 9.0\AOL.EXE" -b
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Reader\reader_sl.exe
O4 - Global Startup: ADP Event Manager.lnk = C:\Program Files\ADP\TimeclockMgr\Dcm\EventMgr.exe
O4 - Global Startup: ADP Sentinel.lnk = C:\Program Files\ADP\TimeclockMgr\Dcm\Sentinel.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - [You must be registered and logged in to see this link.]
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_02\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_02\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O15 - Trusted Zone: [You must be registered and logged in to see this link.]
O16 - DPF: PackageCab - [You must be registered and logged in to see this link.]
O23 - Service: Asset Insight Client (AICLIENT) - Unknown owner - C:\Program Files\Insight\Tools\aiclient.exe
O23 - Service: AOL Connectivity Service (AOL ACS) - AOL LLC - C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: BES Client (BESClient) - BigFix Inc. - C:\Program Files\BigFix Enterprise\BES Client\BESClient.exe
O23 - Service: BrSplService (Brother XP spl Service) - brother Industries Ltd - C:\WINDOWS\system32\brsvc01a.exe
O23 - Service: DCM - TimeclockMgr - Unknown owner - C:\Program Files\Common Files\Kronos\DCMCommon\dbsrv6.exe
O23 - Service: Diskeeper - Executive Software International, Inc. - C:\Program Files\Executive Software\Diskeeper\DkService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe
O23 - Service: Installation Gatekeeper - Marriott International - C:\Program Files\Marriott\Installation Gatekeeper\IGK.exe
O23 - Service: OfficeScanNT RealTime Scan (ntrtscan) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
O23 - Service: PictureTaker - LANovation - C:\WINDOWS\system32\PCTKRNT.SYS
O23 - Service: OfficeScan NT Listener (tmlisten) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
O23 - Service: OfficeScan NT Proxy Service (TmProxy) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\TmProxy.exe

--
End of file - 6896 bytes

murs
Novice
Novice

Status :
Online
Offline


Posts Posts : 20
Joined Joined : 2009-05-12
OS OS : XP

View user profile

Back to top Go down

Re: Search Engine Virus

Post by Belahzur on Tue May 12, 2009 1:16 pm

1. Please download The Avenger by Swandog46 to your Desktop
Link: [You must be registered and logged in to see this link.] or [You must be registered and logged in to see this link.].

  • Click on Avenger.zip to open the file
  • Extract avenger.exe to your desktop

Note: This tool was posted specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


2. Now, start The Avenger program by clicking on its icon on your desktop.

  • Leave the script box empty.
  • Leave the ticked box "Scan for rootkit" ticked.
  • Then tick "Disable any rootkits found"
  • Now click on the Execute to begin execution of the script.
  • Answer "Yes" twice when prompted.

    The Avenger will automatically do the following:

  • It will Restart your computer.
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avengerís actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
3. Please copy/paste the content of c:\avenger.txt into your reply.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline


Posts Posts : 34916
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : XP SP3 Media Centre

View user profile

Back to top Go down

Re: Search Engine Virus

Post by murs on Wed May 13, 2009 6:39 am

Here is what I got-

Logfile of The Avenger Version 2.0, (c) by Swandog46
[You must be registered and logged in to see this link.]

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!


Completed script processing.

*******************

Finished! Terminate.

murs
Novice
Novice

Status :
Online
Offline


Posts Posts : 20
Joined Joined : 2009-05-12
OS OS : XP

View user profile

Back to top Go down

Re: Search Engine Virus

Post by Belahzur on Wed May 13, 2009 11:42 am

Please close all anti virus, anti malware and any other open programs/windows so they do not interfere with the running of RootRepeal.

  • Please download RootRepeal.zip from [You must be registered and logged in to see this link.].
  • Extract the program file to your Desktop.
  • Run the program RootRepeal.exe and go to the Report tab and click on the Scan button.


  • Select ALL of the checkboxes and then click OK and it will start scanning your system.

  • If you have multiple drives you only need to check the C: drive or the one Windows is installed on.
  • When done, click on Save Report
  • Save it to the Desktop.
  • Please copy/paste the contents of the report in your next reply.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline


Posts Posts : 34916
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : XP SP3 Media Centre

View user profile

Back to top Go down

Re: Search Engine Virus

Post by murs on Wed May 13, 2009 12:06 pm

Here's the part 1 of the report, when i tried posting the whole thing it said it was too big-

ROOTREPEAL (c) AD, 2007-2008
==================================================
Scan Time: 2009/05/13 04:56
Program Version: Version 1.2.3.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xAA37B000 Size: 98304 File Visible: No
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7BB7000 Size: 8192 File Visible: No
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA8EC8000 Size: 45056 File Visible: No
Status: -

Name: UACbommavjqdxhqorb.sys
Image Path: C:\WINDOWS\system32\drivers\UACbommavjqdxhqorb.sys
Address: 0xAA5E8000 Size: 77824 File Visible: -
Status: Hidden from Windows API!

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: C:\WINDOWS\system32\UACeiglqurkaqjstgy.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\uacinit.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACmagbxnhytybbraw.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACmenqnauppuiqdon.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACnvgxvwxpsshvwed.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACrcscgnjcmskjief.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACsdyrhllyhwyxhgg.log
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\uactmp.db
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACurdaejikvtfoxbd.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACwrwfpgauklwcqrq.db
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACygdlbfhgysojwkp.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\asat0000.tmp
Status: Allocation size mismatch (API: 1064960, Raw: 0)

Path: C:\WINDOWS\system32\drivers\UACbommavjqdxhqorb.sys
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\UAC5616.tmp
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\UAC5645.tmp
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\UACbad0.tmp
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\94P12M47\fgANyEsOwiAQANDxQGWA4esVujYuDWmRYqydFEw8mwfyAl5A3_Kd9897hBFO3wNMe7r2S3sy32tusPTOR8S5atGWjbk-ipi2FeuaSm7_R5LoLFqNNhGZ7LSJNpAj5SJJUl662XvjjTLZBO8HHdSLYhzkIMWNC8AP[1].jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\94P12M47\fgAVyEEOgjAQAMD6ILrt0t1Sv8DZxJtBwFIjsLE18VU-wg958APicebzOr5b1arDd6f6e3cpp_wQuaUxq6kU2QMMCXWeVpG0RN2vM6S5i2PeHnAAj8BnYHSOvUOyhOw3BXKM3NT_M0zknSdboQ3PugmVqYy-SlTqBw__[1].jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\94P12M47\activity;src=1785639;met=1;v=1;pid=32736609;aid=211206853;ko=0;cid=31380194;rid=31398070;rv=1;&timestamp=1242151888687;eid1=2;ecn1=1;etm1=8;eid2=12;ecn2=1;etm2=0;eid3=11[1].gif
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\94P12M47\v=5;m=2;l=4830;cxt=;kw=;ts=528066;smuid=FsvDr-ROLSEbR_mhbNkVxBYwHDZW7xz-7P8w6rPR;p=ui%3DFsvDr-ROLSEbR_mhbNkVxBYwHDZW7xz-7P8w6rPR%3Btr%3DAbMp6qSw9do%3Btm%3D0-0[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\94P12M47\realhousewivesnyc_blogs;site=bravo;sect=realhousewivesnyc;sub=blogs;pageid=37702;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\94P12M47\realhousewivesnyc_home;site=bravo;sect=realhousewivesnyc;sub=home;pageid=1474;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewivesny[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\94P12M47\ads%253Fcorrelator%253D1242166309562%2526output%253Dhtml%2526impl%253Difr%2526client%253Dca-pub-5440138744487553%2526slotname%253DVideo_Main_728x90%2526page_slots%253DVid[1].36
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\realhousewivesnyc_blogs;site=bravo;sect=realhousewivesnyc;sub=blogs;pageid=32855;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\default;sz=160x600;in=und;news=default;site=shopping.hollywoodlife.net;host=www.hollywoodlife.net;siteurl=http%3a%2f%2fwww.hollywoodlife.net%2flayoutengine[1].htm
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\fgANyEsOwiAQAFDiUk_igs6Ezke8Qg9haK2AsS0RTDyC1_Jm-pZv_0nfwQzmeNiZ6Rlu7VJfpTzyXE1qrZwBrtl1NW2l5DV207ZAXkKc6_-BBGgEciBOUTwTn4R6pMCelFUCI7N6DeJkVLWE-O69t2ixu5dozA8_[1].jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\fgANyLsNwjAQANBjIPscch_CCqmpkZU4jhEhFjYSezEEI7AEHQuQ5hXv9f58e-jh9NvBcPdTPZdHztcUCsy15iPimPa2zGvO6RbtsC6YFh9D2R6ZsRVURmH1MoonUSekDXnuNomdBJmItWERNS0dntR1xhlnLzkC_AE_[1].jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\fgANyMsRwiAQANC1IFgSlk9sIWfPDiZAyBizIzhjDRZlT44N6Du-1_uzjjDC6XuA6R5SO9cH87XECktrfEScSy_rsjOXW5bTvmHZQo71_2h61APSjLqzySa6UHCkjVFmcMFGItuRt0Y7MkTOic6rp_YklFBy5QzwAw__[1].jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\v=5;m=2;l=239;cxt=;kw=;ts=78094;smuid=uAxmgmTxp_NfbZwAAa8S5m9BAEBos2vbuxN3yJ3_;p=ui%3DuAxmgmTxp_NfbZwAAa8S5m9BAEBos2vbuxN3yJ3_%3Btr%3DDSORuA10XME%3Btm%3D0-0[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\default;sz=728x90;in=und;news=default;site=shopping.hollywoodlife.net;host=www.hollywoodlife.net;siteurl=http%3a%2f%2fwww.hollywoodlife.net%2flayoutengine[1].htm
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\dgANyMERwiAQAMAbv1biAw7k7gBbyNcGFAnBmQgzycMqLMfafMpz9_f5XieY4HQ8QJvnmjIs-94viI9q9ba03uur6NRWrOut5G08Oot0Ry_I7NlHDo6FhFwYPHMQ8lYcZUnjM1tFxrxdjMooo5-9APwB[1].jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\realhousewivesnyc_blogs;site=bravo;sect=realhousewivesnyc;sub=blogs;pageid=37653;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\realhousewivesnyc_blogs;site=bravo;sect=realhousewivesnyc;sub=blogs;pageid=37653;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[2]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\realhousewivesnyc_home;site=bravo;sect=realhousewivesnyc;sub=home;pageid=1474;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewivesny[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\realhousewivesnyc_home;site=bravo;sect=realhousewivesnyc;sub=home;pageid=1474;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewivesny[2]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\realhousewivesnyc_video;site=bravo;sect=realhousewivesnyc;sub=video;pageid=37714;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\realhousewivesnyc_blogs;site=bravo;sect=realhousewivesnyc;sub=blogs;pageid=32855;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[2]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\OY884PFE\;kw=Buick,Buick_Enclave,Buick_LaCrosse,Buick_Lucerne,Cadillac,Cadillac_CTS,Cadillac_DTS,Cadillac_Escalade,Cadillac_SRX,Cadillac_STS,Cadillac_XLR,Chevrolet,Chevrolet_Aval[1].htm
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\OY884PFE\realhousewivesnyc_video;site=bravo;sect=realhousewivesnyc;sub=video;pageid=37712;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\OY884PFE\pixel;r=74969121;fpan=1;fpa=1242136988-56813026-73876337;fpbn=1;fpb=436485067;ns=0;url=http%3A%2F%2Fwww.heavy.com%2F%3Fpartner%3Daff180;ref=http%3A%2F%2Fwww[1].gif
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\OY884PFE\realhousewivesnyc_home;site=bravo;sect=realhousewivesnyc;sub=home;pageid=1474;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewivesny[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\OY884PFE\fgANyEEOwiAQAEB8ECzQZQl-oWePxpAWKMbaTcHEt_gMv-XRD-gc5_z-vEYxitP3IKY95n5pD-ZbTU0svfMRYK5WtWVjrveipm2FusaS2v8BESgDJaAZA1lMRJ5cdtplMmQwDQ4TWgw-eu-MtD48hxCkllpduQjxAw__[1].jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\OY884PFE\fgAVyUEOgjAQAMD1JSbe26WU7VK_wNmzqVBKDcjG1sR_-wH1OrOejmmAAS6fA4zPMNdreYmsORZYapUz4pRbXZZdJD-SHvcN8xZSLD9HZrSEZJBa9u5G7MhFN3HfBTbW2d7N_yHuPAVmZax9W-9Voxp9lwTwBQ__[1].jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\OY884PFE\default;sz=300x250;in=und;news=default;site=shopping.hollywoodlife.net;host=www.hollywoodlife.net;siteurl=http%3a%2f%2fwww.hollywoodlife.net%2flayoutengine[1].htm
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\;kw=Buick,Buick_Enclave,Buick_LaCrosse,Buick_Lucerne,Cadillac,Cadillac_CTS,Cadillac_DTS,Cadillac_Escalade,Cadillac_SRX,Cadillac_STS,Cadillac_XLR,Chevrolet,Chevrolet_Aval[1].htm
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\fgANiEEOwiAQADdee_MXHmDB3UDxC32EIS1SjLUbwcQXevNPcpnJzPE7_CaY4DQcYH7FW7vWt8ijpApra3JBXIrVdd1FyjPred-wbDGn2j9SQE9IvtOPFHhxic7smMmw7abe7KyLjv3ovWJjPhSCMsrou2SAPw__[1].jpg
Status: Locked to the Windows API!

murs
Novice
Novice

Status :
Online
Offline


Posts Posts : 20
Joined Joined : 2009-05-12
OS OS : XP

View user profile

Back to top Go down

Re: Search Engine Virus

Post by murs on Wed May 13, 2009 12:06 pm

Part 2 of report-

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\%2Fserve%2Fv%3D5%3Bm%3D3%3Bl%3D4831%3Bc%3D13998%3Bb%3D81666%3Bts%3D20090512120303%3Bp%3Dui%253DFsvDr-ROLSEbR_mhbNkVxBYwHDZW7xz-7P8w6rPR%253Btr%253DHRsAi0StuvG%253Btm%253D0-0&r=0
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\v=5;m=2;l=4831;cxt=;kw=;ts=488025;smuid=FsvDr-ROLSEbR_mhbNkVxBYwHDZW7xz-7P8w6rPR;p=ui%3DFsvDr-ROLSEbR_mhbNkVxBYwHDZW7xz-7P8w6rPR%3Btr%3DHRsAi0StuvG%3Btm%3D0-0[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\v=5;m=2;l=4832;cxt=;kw=;ts=214113;smuid=FsvDr-ROLSEbR_mhbNkVxBYwHDZW7xz-7P8w6rPR;p=ui%3DFsvDr-ROLSEbR_mhbNkVxBYwHDZW7xz-7P8w6rPR%3Btr%3DFdtXfgC5Qab%3Btm%3D0-0[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\realhousewivesnyc_blogs;site=bravo;sect=realhousewivesnyc;sub=blogs;pageid=37702;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\realhousewivesnyc_video;site=bravo;sect=realhousewivesnyc;sub=video;pageid=37714;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\realhousewivesnyc_video;site=bravo;sect=realhousewivesnyc;sub=video;pageid=37714;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[2]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\dref=http%253A%252F%25[1].jsp%253Fsid%253D12213%2526S%253Dca%2526search%253DFind+It%2526T%253Dmodesto%2526PG%253DL%2526SRC%253Dcomwp%2526C%253DTaxis%2526R%253DN%2526STYPE%253DS
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\fgANykEOwiAQAMCNN-NDjAdY7MKu-IXe_IAhtFIaa4lg4lf9jb1O5rj_3Xro4XTYQXyHR7vXTynPPFaYWitXxCGfdZ3WUvIr6bgumJeQxro5OoPkUAhtFOaOmMUGttSJYxLhQS6OxNtIvA1R1pgvea-MMnouCeAP[1].jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\fgANyNENwiAUBVAcCF6h9F3pCv322xCkFGMtEUycwJmcwbiNC-j5PO_n6zOJSRy-OxFufm7Hei_lkmMVS2tlJDplreqylZKvSYVtpbz6FOv_CXuygcDEETxoGGh4DmA4NnbGwGDLHq4Ha4Y0zj5652QnO3UuSYgf[1].jpg
Status: Locked to the Windows API!

Stealth Objects
-------------------
Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: winlogon.exe (PID: 468) Address: 0x006b0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: winlogon.exe (PID: 468) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: services.exe (PID: 512) Address: 0x00730000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: services.exe (PID: 512) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: lsass.exe (PID: 524) Address: 0x00880000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: lsass.exe (PID: 524) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: svchost.exe (PID: 724) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: svchost.exe (PID: 724) Address: 0x00800000 Size: 45056

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: svchost.exe (PID: 772) Address: 0x00800000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: svchost.exe (PID: 772) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: svchost.exe (PID: 840) Address: 0x00800000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: svchost.exe (PID: 840) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: svchost.exe (PID: 928) Address: 0x00800000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: svchost.exe (PID: 928) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: svchost.exe (PID: 968) Address: 0x00800000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: svchost.exe (PID: 968) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: brsvc01a.exe (PID: 1152) Address: 0x00950000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: brsvc01a.exe (PID: 1152) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: spoolsv.exe (PID: 1200) Address: 0x00aa0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: spoolsv.exe (PID: 1200) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: Explorer.EXE (PID: 1356) Address: 0x00ae0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: Explorer.EXE (PID: 1356) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: brss01a.exe (PID: 1476) Address: 0x00a60000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: brss01a.exe (PID: 1476) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: hkcmd.exe (PID: 1628) Address: 0x00a00000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: hkcmd.exe (PID: 1628) Address: 0x00ac0000 Size: 45056

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: igfxpers.exe (PID: 1636) Address: 0x00a60000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: igfxpers.exe (PID: 1636) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: pptd40nt.exe (PID: 1792) Address: 0x00c60000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: pptd40nt.exe (PID: 1792) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: pccntmon.exe (PID: 1832) Address: 0x00bd0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: pccntmon.exe (PID: 1832) Address: 0x00b00000 Size: 40960

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: AOLSoftware.exe (PID: 1840) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: AOLSoftware.exe (PID: 1840) Address: 0x00950000 Size: 45056

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: ctfmon.exe (PID: 1864) Address: 0x009b0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: ctfmon.exe (PID: 1864) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: Sentinel.exe (PID: 1980) Address: 0x00e10000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: Sentinel.exe (PID: 1980) Address: 0x00ee0000 Size: 45056

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: svchost.exe (PID: 152) Address: 0x00800000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: svchost.exe (PID: 152) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: aiclient.exe (PID: 212) Address: 0x008c0000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: aiclient.exe (PID: 212) Address: 0x00990000 Size: 45056

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: AOLAcsd.exe (PID: 224) Address: 0x00a50000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: AOLAcsd.exe (PID: 224) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: awhost32.exe (PID: 284) Address: 0x01060000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: awhost32.exe (PID: 284) Address: 0x00fa0000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: BESClient.exe (PID: 332) Address: 0x00ce0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: BESClient.exe (PID: 332) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: nfsclnt.exe (PID: 112) Address: 0x00900000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: nfsclnt.exe (PID: 112) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: dbsrv6.exe (PID: 424) Address: 0x00ae0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: dbsrv6.exe (PID: 424) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: DkService.exe (PID: 148) Address: 0x008b0000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: DkService.exe (PID: 148) Address: 0x00a80000 Size: 45056

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: IGK.exe (PID: 832) Address: 0x00830000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: IGK.exe (PID: 832) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: System.ServiceProcess.dll]
Process: IGK.exe (PID: 832) Address: 0x00ee0000 Size: 126976

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: MDM.EXE (PID: 1068) Address: 0x00ad0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: MDM.EXE (PID: 1068) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: ntrtscan.exe (PID: 1284) Address: 0x009e0000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: ntrtscan.exe (PID: 1284) Address: 0x00ab0000 Size: 45056

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: svchost.exe (PID: 1520) Address: 0x00800000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: svchost.exe (PID: 1520) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: tmlisten.exe (PID: 1740) Address: 0x00dc0000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: tmlisten.exe (PID: 1740) Address: 0x00e80000 Size: 45056

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: mapsvc.exe (PID: 2168) Address: 0x00a40000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: mapsvc.exe (PID: 2168) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: DCMStateMngr.exe (PID: 2208) Address: 0x00e10000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: DCMStateMngr.exe (PID: 2208) Address: 0x00ee0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: httpsvr.exe (PID: 2256) Address: 0x00e30000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: httpsvr.exe (PID: 2256) Address: 0x00f00000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: appclnt.exe (PID: 2328) Address: 0x00e10000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: appclnt.exe (PID: 2328) Address: 0x00ee0000 Size: 45056

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: svchost.exe (PID: 2484) Address: 0x00a90000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: svchost.exe (PID: 2484) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: UE16F1.EXE (PID: 2628) Address: 0x00770000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: UE16F1.EXE (PID: 2628) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: alg.exe (PID: 2924) Address: 0x007a0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: alg.exe (PID: 2924) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: CNTAoSMgr.exe (PID: 3460) Address: 0x00860000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: CNTAoSMgr.exe (PID: 3460) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: RootRepeal.exe (PID: 1424) Address: 0x00f00000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: RootRepeal.exe (PID: 1424) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: IEXPLORE.EXE (PID: 3364) Address: 0x00ab0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: IEXPLORE.EXE (PID: 3364) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: Iexplore.exe (PID: 1664) Address: 0x00ab0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: Iexplore.exe (PID: 1664) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: wmiprvse.exe (PID: 1352) Address: 0x00880000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: wmiprvse.exe (PID: 1352) Address: 0x10000000 Size: 40960

Hidden Services
-------------------
Service Name: UACd.sys
Image Path: C:\WINDOWS\system32\drivers\UACbommavjqdxhqorb.sys

murs
Novice
Novice

Status :
Online
Offline


Posts Posts : 20
Joined Joined : 2009-05-12
OS OS : XP

View user profile

Back to top Go down

Re: Search Engine Virus

Post by Belahzur on Wed May 13, 2009 12:08 pm

Hello.
That found the troublemaker, so we can kill it now. We'll need to use the avenger again.

1. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+CCrying


Drivers to delete:
UACd.sys

Files to delete:
C:\WINDOWS\system32\drivers\UACbommavjqdxhqorb.sys

Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


2. Now, start The Avenger program by clicking on its icon on your desktop.

  • Under "Input script here:", paste in the script from the quote box above.
  • Leave the ticked box "Scan for rootkit" ticked.
  • Then tick "Disable any rootkits found"
  • Now click on the Execute to begin execution of the script.
  • Answer "Yes" twice when prompted.

    The Avenger will automatically do the following:

  • It will Restart your computer.
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avengerís actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
3. Please copy/paste the content of c:\avenger.txt into your reply.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline


Posts Posts : 34916
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : XP SP3 Media Centre

View user profile

Back to top Go down

Thank you

Post by murs on Wed May 13, 2009 12:30 pm

Worked out perfectly, thanks for all your help, I'll be sending a donation soon thanks again. Thank You!

murs
Novice
Novice

Status :
Online
Offline


Posts Posts : 20
Joined Joined : 2009-05-12
OS OS : XP

View user profile

Back to top Go down

Re: Search Engine Virus

Post by Belahzur on Wed May 13, 2009 12:32 pm

We aren't done here, all we did so far was kill the main driver.

Please download and run this tool.

Download Malwarebytes' Anti-Malware from [You must be registered and logged in to see this link.]

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.


Post the contents of the MBAM Log.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline


Posts Posts : 34916
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : XP SP3 Media Centre

View user profile

Back to top Go down

Re: Search Engine Virus

Post by murs on Thu May 14, 2009 6:08 am

I downloaded malwarebytes but it's not opening.

murs
Novice
Novice

Status :
Online
Offline


Posts Posts : 20
Joined Joined : 2009-05-12
OS OS : XP

View user profile

Back to top Go down

Re: Search Engine Virus

Post by murs on Thu May 14, 2009 8:20 am

Got it going here's the report-

alwarebytes' Anti-Malware 1.36
Database version: 1945
Windows 5.1.2600 Service Pack 2

5/14/2009 1:17:58 AM
mbam-log-2009-05-14 (01-17-58).txt

Scan type: Full Scan (C:\|)
Objects scanned: 121296
Time elapsed: 25 minute(s), 27 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> Quarantined and deleted successfully.

murs
Novice
Novice

Status :
Online
Offline


Posts Posts : 20
Joined Joined : 2009-05-12
OS OS : XP

View user profile

Back to top Go down

Re: Search Engine Virus

Post by Belahzur on Thu May 14, 2009 8:44 am


  • Please download DDS by sUBs to your Desktop (Important!!) from one of these locations:
    [You must be registered and logged in to see this link.]
    [You must be registered and logged in to see this link.]
  • Double click DDS.scr to run.
  • When complete, two logs will open. Save both of the report to your Desktop.
  • Copy and paste DDS.txt back here, I don't need to see attach.txt.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline


Posts Posts : 34916
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : XP SP3 Media Centre

View user profile

Back to top Go down

Re: Search Engine Virus

Post by murs on Fri May 15, 2009 6:03 am

Here is the DDS.txt-


DDS (Ver_09-05-14.01) - NTFSx86
Run by Administrator at 23:00:13.46 on Thu 05/14/2009
Internet Explorer: 6.0.2900.2180
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1014.448 [GMT -7:00]

AV: Trend Micro OfficeScan Antivirus *On-access scanning enabled* (Updated) {4E214C56-2E1F-450F-A2B8-81256A6BDB98}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\brsvc01a.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\brss01a.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe
C:\Program Files\Brother\ControlCenter2\brctrcen.exe
C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe
C:\Program Files\Common Files\AOL\1226138630\ee\AOLSoftware.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\ADP\TimeclockMgr\Dcm\Sentinel.exe
svchost.exe
C:\Program Files\Insight\Tools\aiclient.exe
C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe
C:\Program Files\Symantec\pcAnywhere\awhost32.exe
C:\Program Files\BigFix Enterprise\BES Client\BESClient.exe
c:\WINDOWS\system32\nfsclnt.exe
C:\Program Files\Common Files\Kronos\DCMCommon\dbsrv6.exe
C:\Program Files\Executive Software\Diskeeper\DkService.exe
C:\Program Files\Marriott\Installation Gatekeeper\IGK.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
c:\SFU\Mapper\mapsvc.exe
C:\Program Files\ADP\TimeclockMgr\Dcm\DCMStateMngr.exe
C:\Program Files\ADP\TimeclockMgr\Dcm\httpsvr.exe
C:\Program Files\ADP\TimeclockMgr\Dcm\appclnt.exe
svchost
C:\WINDOWS\TEMP\AR983D.EXE
C:\Program Files\Trend Micro\OfficeScan Client\CNTAoSMgr.exe
C:\Program Files\SecureCRT\SecureCRT.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\XXYZCDY7\dds[1].scr

============== Pseudo HJT Report ===============

uStart Page = [You must be registered and logged in to see this link.]
uInternet Connection Wizard,ShellNext = iexplore
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\activex\AcroIEHelper.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0_02\bin\ssv.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [AOL Fast Start] "c:\program files\aol 9.0\AOL.EXE" -b
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [IMJPMIG8.1] "c:\windows\ime\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
mRun: [MSPY2002] c:\windows\system32\ime\pintlgnt\ImScInst.exe /SYNC
mRun: [PHIME2002ASync] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /SYNC
mRun: [PHIME2002A] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /IMEName
mRun: [ScrewDrivers Client Executable] "c:\program files\tricerat\simplify printing\screwdrivers client v3\sdclient.exe" -i
mRun: [DiskeeperSystray] "c:\program files\executive software\diskeeper\DkIcon.exe"
mRun: [SSBkgdUpdate] "c:\program files\common files\scansoft shared\ssbkgdupdate\SSBkgdupdate.exe" -Embedding -boot
mRun: [PaperPort PTD] c:\program files\scansoft\paperport\pptd40nt.exe
mRun: [IndexSearch] c:\program files\scansoft\paperport\IndexSearch.exe
mRun: [SetDefPrt] c:\program files\brother\brmfl05b\BrStDvPt.exe
mRun: [ControlCenter2.0] c:\program files\brother\controlcenter2\brctrcen.exe /autorun
mRun: [OfficeScanNT Monitor] "c:\program files\trend micro\officescan client\pccntmon.exe" -HideWindow
mRun: [HostManager] c:\program files\common files\aol\1226138630\ee\AOLSoftware.exe
mRun: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adpeve~1.lnk - c:\program files\adp\timeclockmgr\dcm\EventMgr.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adpsen~1.lnk - c:\program files\adp\timeclockmgr\dcm\Sentinel.exe
uPolicies-explorer: NoActiveDesktopChanges = 00000000
uPolicies-system: EnableProfileQuota = 1 (0x1)
mPolicies-explorer: NoSMConfigurePrograms = 1 (0x1)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_02\bin\ssv.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
Trusted Zone: MySodexho.com
Trusted Zone: MySodexho.com\www
DPF: Microsoft XML Parser for Java - [You must be registered and logged in to see this link.]
DPF: PackageCab - [You must be registered and logged in to see this link.]
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - [You must be registered and logged in to see this link.]
DPF: {CAFEEFAC-0015-0000-0011-ABCDEFFEDCBA} - [You must be registered and logged in to see this link.]
DPF: {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA} - [You must be registered and logged in to see this link.]
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - [You must be registered and logged in to see this link.]
Notify: igfxcui - igfxdev.dll
Notify: PCANotify - PCANotify.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
LSA: Authentication Packages = msv1_0 c:\windows\system32\nnnlmMgd

============= SERVICES / DRIVERS ===============

R1 AW_HOST;AW_HOST;c:\windows\system32\drivers\AW_HOST5.sys [2002-2-11 33496]
R1 awlegacy;awlegacy;c:\windows\system32\drivers\AWLEGACY.sys [2000-9-11 10816]
R2 awhost32;pcAnywhere Host Service;c:\program files\symantec\pcanywhere\awhost32.exe [2002-2-15 114749]
R2 Client for NFS;Client for NFS;c:\windows\system32\nfsclnt.exe [2005-12-16 53408]
R2 DCM - TimeclockMgr;DCM - TimeclockMgr;c:\program files\common files\kronos\dcmcommon\dbsrv6.exe [2007-8-7 38912]
R2 Installation Gatekeeper;Installation Gatekeeper;c:\program files\marriott\installation gatekeeper\IGK.exe [2003-7-21 7168]
R2 Mapsvc;User Name Mapping;c:\sfu\mapper\mapsvc.exe [2005-12-16 111728]
R2 TmFilter;Trend Micro Filter;c:\program files\trend micro\officescan client\TmXPFlt.sys [2008-5-27 225296]
R2 TmPreFilter;Trend Micro PreFilter;c:\program files\trend micro\officescan client\tmpreflt.sys [2008-5-27 36368]
R3 NfsRdr;NfsRdr;c:\windows\system32\drivers\nfsrdr.sys [2005-12-16 305664]
R3 Portmap;Portmap;c:\windows\system32\drivers\portmap.sys [2005-12-16 35072]
R3 RpcXdr;RpcXdr;c:\windows\system32\drivers\rpcxdr.sys [2005-12-16 55872]
S2 zkvjoynct;zkvjoynct;c:\windows\system32\drivers\znptynsz.sys [2009-5-13 60288]
S3 S3Inc;S3Inc;c:\windows\system32\drivers\s3mt3d.sys [2006-5-31 41216]
S3 TmProxy;OfficeScan NT Proxy Service;c:\program files\trend micro\officescan client\TmProxy.exe [2008-6-4 652552]

=============== Created Last 30 ================

2009-05-13 23:03 15,504 a------- c:\windows\system32\drivers\mbam.sys
2009-05-13 23:03 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-05-13 23:03 --d----- c:\program files\Malwarebytes' Anti-Malware
2009-05-13 01:02 60,288 a------- c:\windows\system32\drivers\znptynsz.sys
2009-05-09 11:06 0 a------- C:\LOG67.tmp
2009-05-08 14:59 0 a------- C:\LOG4D6.tmp
2009-05-08 12:33 0 a------- C:\LOG4A1.tmp
2009-05-06 03:02 3,794,557 a------- c:\windows\system32\uactmp.db
2009-05-06 00:39 1,077,198 a------- c:\windows\system32\UACwrwfpgauklwcqrq.db
2009-05-06 00:39 224 a------- c:\windows\system32\UACnvgxvwxpsshvwed.dat
2009-05-06 00:39 52,224 a------- c:\windows\system32\drivers\UACbommavjqdxhqorb.sys
2009-05-06 00:39 24,064 a------- c:\windows\system32\UACmenqnauppuiqdon.dll
2009-05-05 15:08 0 a------- C:\LOG933.tmp
2009-05-04 16:49 0 a------- C:\LOG7F7.tmp
2009-05-04 10:16 0 a------- C:\LOG715.tmp
2009-05-01 16:24 0 a------- C:\LOG39A.tmp
2009-04-30 16:54 0 a------- C:\LOG263.tmp
2009-04-28 13:13 0 a------- C:\LOG8AE.tmp
2009-04-27 10:58 0 a------- C:\LOG719.tmp
2009-04-24 10:37 0 a------- C:\LOG126.tmp
2009-04-20 15:15 0 a------- C:\LOG6B5.tmp

==================== Find3M ====================

2009-03-06 07:44 283,648 a------- c:\windows\system32\pdh.dll
2009-02-20 01:30 659,456 a------- c:\windows\system32\wininet.dll
2009-02-20 01:30 81,920 a------- c:\windows\system32\ieencode.dll
2008-06-30 22:41 255,401 a--sh--- c:\windows\system32\dgMmlnnn.ini2
2008-11-26 19:12 869,880 a--sh--- c:\windows\system32\nqrCLkkj.ini2

============= FINISH: 23:00:24.25 ===============

murs
Novice
Novice

Status :
Online
Offline


Posts Posts : 20
Joined Joined : 2009-05-12
OS OS : XP

View user profile

Back to top Go down

Re: Search Engine Virus

Post by Belahzur on Fri May 15, 2009 8:28 am

Please download the [You must be registered and logged in to see this link.].

  • Save it to your desktop.
  • Please double-click OTMoveIt3.exe to run it.
  • Copy the bolded text below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose CopyCrying


    :services
    zkvjoynct
    UACd.sys

    :files
    c:\windows\system32\drivers\znptynsz.sys
    C:\LOG*.tmp
    c:\windows\system32\uactmp.db
    c:\windows\system32\UACwrwfpgauklwcqrq.db
    c:\windows\system32\UACnvgxvwxpsshvwed.dat
    c:\windows\system32\drivers\UACbommavjqdxhqorb.sys
    c:\windows\system32\UACmenqnauppuiqdon.dll
    c:\windows\system32\dgMmlnnn.ini2
    c:\windows\system32\nqrCLkkj.ini2

    :reg
    [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
    "Authentication Packages"=hex(7):6d,73,76,31,5f,30,00,00


  • Return to OTMoveIt3, right click in the "Paste instructions for items to be Moved" window (under the light blue bar) and choose Paste.
  • Click the red Moveit! button.
  • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
  • Close OTMoveIt3
If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.

Please post the OTMoveIt log.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline


Posts Posts : 34916
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : XP SP3 Media Centre

View user profile

Back to top Go down

Re: Search Engine Virus

Post by murs on Fri May 15, 2009 8:55 am

========== SERVICES/DRIVERS ==========

Service\Driver zkvjoynct deleted successfully.
Service\Driver UACd.sys not found.
Service\Driver key UACd.sys deleted successfully.
========== FILES ==========
c:\windows\system32\drivers\znptynsz.sys moved successfully.
C:\LOG10A0.tmp moved successfully.
C:\LOG10E.tmp moved successfully.
C:\LOG10F.tmp moved successfully.
C:\LOG11A8.tmp moved successfully.
C:\LOG1204.tmp moved successfully.
C:\LOG120B.tmp moved successfully.
C:\LOG126.tmp moved successfully.
C:\LOG1346.tmp moved successfully.
C:\LOG145B.tmp moved successfully.
C:\LOG1B.tmp moved successfully.
C:\LOG1C8.tmp moved successfully.
C:\LOG25A.tmp moved successfully.
C:\LOG261.tmp moved successfully.
C:\LOG263.tmp moved successfully.
C:\LOG2D6.tmp moved successfully.
C:\LOG351.tmp moved successfully.
C:\LOG39A.tmp moved successfully.
C:\LOG3F3.tmp moved successfully.
C:\LOG421.tmp moved successfully.
C:\LOG423.tmp moved successfully.
C:\LOG4A1.tmp moved successfully.
C:\LOG4D6.tmp moved successfully.
C:\LOG526.tmp moved successfully.
C:\LOG552.tmp moved successfully.
C:\LOG59.tmp moved successfully.
C:\LOG5B5.tmp moved successfully.
C:\LOG5F.tmp moved successfully.
C:\LOG62C.tmp moved successfully.
C:\LOG67.tmp moved successfully.
C:\LOG6B5.tmp moved successfully.
C:\LOG70.tmp moved successfully.
C:\LOG70F.tmp moved successfully.
C:\LOG715.tmp moved successfully.
C:\LOG719.tmp moved successfully.
C:\LOG738.tmp moved successfully.
C:\LOG7F7.tmp moved successfully.
C:\LOG80.tmp moved successfully.
C:\LOG8AE.tmp moved successfully.
C:\LOG933.tmp moved successfully.
C:\LOG969.tmp moved successfully.
C:\LOG98C.tmp moved successfully.
C:\LOG9A0.tmp moved successfully.
C:\LOG9AC.tmp moved successfully.
C:\LOG9D2.tmp moved successfully.
C:\LOGA7.tmp moved successfully.
C:\LOGB0.tmp moved successfully.
C:\LOGB4.tmp moved successfully.
C:\LOGB8.tmp moved successfully.
C:\LOGBA.tmp moved successfully.
C:\LOGC1.tmp moved successfully.
C:\LOGCA6.tmp moved successfully.
C:\LOGCAC.tmp moved successfully.
C:\LOGCB5.tmp moved successfully.
C:\LOGCBD.tmp moved successfully.
C:\LOGCC4.tmp moved successfully.
C:\LOGCDE.tmp moved successfully.
C:\LOGCE1.tmp moved successfully.
C:\LOGCF.tmp moved successfully.
C:\LOGD8.tmp moved successfully.
C:\LOGDF2.tmp moved successfully.
C:\LOGE2D.tmp moved successfully.
C:\LOGE8.tmp moved successfully.
C:\LOGF2.tmp moved successfully.
C:\LOGFA.tmp moved successfully.
C:\LOGFB.tmp moved successfully.
c:\windows\system32\uactmp.db moved successfully.
c:\windows\system32\UACwrwfpgauklwcqrq.db moved successfully.
c:\windows\system32\UACnvgxvwxpsshvwed.dat moved successfully.
c:\windows\system32\drivers\UACbommavjqdxhqorb.sys moved successfully.
LoadLibrary failed for c:\windows\system32\UACmenqnauppuiqdon.dll
c:\windows\system32\UACmenqnauppuiqdon.dll NOT unregistered.
c:\windows\system32\UACmenqnauppuiqdon.dll moved successfully.
c:\windows\system32\dgMmlnnn.ini2 moved successfully.
c:\windows\system32\nqrCLkkj.ini2 moved successfully.
========== REGISTRY ==========
HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa\\"Authentication Packages"|hex(7):6d,73,76,31,5f,30,00,00 /E : value set successfully!

OTMoveIt3 by OldTimer - Version 1.0.11.0 log created on 05152009_015252

murs
Novice
Novice

Status :
Online
Offline


Posts Posts : 20
Joined Joined : 2009-05-12
OS OS : XP

View user profile

Back to top Go down

Re: Search Engine Virus

Post by Belahzur on Fri May 15, 2009 9:02 am

Hello.
Try updating MBAM now, hopefully it will update. If it does update, then run a scan with it to make sure we got it all.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline


Posts Posts : 34916
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : XP SP3 Media Centre

View user profile

Back to top Go down

Re: Search Engine Virus

Post by murs on Fri May 15, 2009 11:16 am

Malwarebytes' Anti-Malware 1.36
Database version: 2133
Windows 5.1.2600 Service Pack 2

5/15/2009 4:13:58 AM
mbam-log-2009-05-15 (04-13-58).txt

Scan type: Full Scan (C:\|)
Objects scanned: 131154
Time elapsed: 24 minute(s), 14 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Documents and Settings\Administrator\Local Settings\Temp\c.exe (Trojan.Downloader) -> Quarantined and deleted successfully.

murs
Novice
Novice

Status :
Online
Offline


Posts Posts : 20
Joined Joined : 2009-05-12
OS OS : XP

View user profile

Back to top Go down

Re: Search Engine Virus

Post by Belahzur on Fri May 15, 2009 11:17 am

This looks good now, how is the machine running?


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline


Posts Posts : 34916
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : XP SP3 Media Centre

View user profile

Back to top Go down

Re: Search Engine Virus

Post by murs on Fri May 15, 2009 11:45 am

My comp is running very well and Malwarebytes is also running normal, thanks so much for help.

murs
Novice
Novice

Status :
Online
Offline


Posts Posts : 20
Joined Joined : 2009-05-12
OS OS : XP

View user profile

Back to top Go down

Re: Search Engine Virus

Post by Belahzur on Fri May 15, 2009 12:57 pm

We need to make a new restore point.

To turn off System Restore, follow these steps:
1. Click Start, right-click My Computer, and then click Properties.
2. Click the System Restore tab.
3. Click the Turn off System Restore check box (or the Turn off System Restore on all drives check box), and then click OK.
4. Click Yes when you receive the prompt to the turn off System Restore.

Now we need to make a new restore point.
To turn on System Restore, follow these steps:
1. Click Start, right-click My Computer, and then click Properties.
2. Click the System Restore tab.
3. Click the Turn off System Restore check box (To turn on System Restore), and then click OK.

Below I have included a number of recommendations for how to protect your computer in order to prevent future malware infections. Please take these recommendations seriously; these few simple steps can stave off the vast majority of spyware problems. As happy as we are to help you, for your sake we would rather not have repeat customers. Goofy

1) Please navigate to [You must be registered and logged in to see this link.] and download all the "critical updates" for Windows. This can patch many of the security holes through which attackers can gain access to your computer.

Please either enable Automatic Updates under Start -> Control Panel -> Automatic Updates , or get into the habit of checking for Windows updates regularly. I cannot stress enough how important this is.

2) In order to protect yourself against spyware, you should consider installing and running the following free programs:

[You must be registered and logged in to see this link.]
A tutorial on using Ad-Aware to remove spyware from your computer may be found [You must be registered and logged in to see this link.].

[You must be registered and logged in to see this link.]
A tutorial on using Spybot to remove spyware from your computer may be found [You must be registered and logged in to see this link.]. Please also remember to enable Spybot's "Immunize" and "TeaTimer" features.

[You must be registered and logged in to see this link.]
A tutorial on using SpywareBlaster to prevent spyware from ever installing on your computer may be found [You must be registered and logged in to see this link.].

[You must be registered and logged in to see this link.]
A tutorial on using SpywareGuard for realtime protection against spyware and hijackers may be found [You must be registered and logged in to see this link.].

Make sure to keep these programs up-to-date and to run them regularly, as this can prevent a great deal of spyware hassle.

3) Please consider using an alternate browser. Mozilla's Firefox browser is fantastic; it is much more secure than Internet Explorer, immune to almost all known browser hijackers, and also has the best built-in popup blocker (as an added benefit!) that I have ever seen. If you are interested, Firefox may be downloaded from here:
[You must be registered and logged in to see this link.]
I also recommand the following add-ons for Firefox, they will help keep you safe from malicious scripts or activeX exploits.
[You must be registered and logged in to see this link.]
[You must be registered and logged in to see this link.]
[You must be registered and logged in to see this link.]

4) Also make sure to run your antivirus software regularly, and to keep it up-to-date.

To help you keep your software updated, please considering using this free software program that will check for program updates.
[You must be registered and logged in to see this link.]

5) Finally, consider maintaining a firewall. Some good free firewalls are [You must be registered and logged in to see this link.], or
[You must be registered and logged in to see this link.]
A tutorial on understanding and using firewalls may be found [You must be registered and logged in to see this link.].

Please also read Tony Klein's excellent article: [You must be registered and logged in to see this link.]

If you would take a moment to fill out our feedback form, we would appreciate it.
The link can be found [You must be registered and logged in to see this link.].

Hopefully this should take care of your problems! Good luck. Big Grin


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline


Posts Posts : 34916
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : XP SP3 Media Centre

View user profile

Back to top Go down

View previous topic View next topic Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum