win32.Agent. ODG virus in operating memory

View previous topic View next topic Go down

win32.Agent. ODG virus in operating memory

Post by shiladitya_83 on 31st May 2009, 1:29 pm

This was detected by Nod32 but was unable to be cleaned. Please Help

shiladitya_83
Novice
Novice

Posts Posts : 9
Joined Joined : 2009-05-31
OS OS : Windows XP
Points Points : 27567
# Likes # Likes : 0

View user profile

Back to top Go down

Re: win32.Agent. ODG virus in operating memory

Post by shiladitya_83 on 31st May 2009, 1:30 pm

Hijack this log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 6:51:25 PM, on 5/31/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\ibmpmsvc.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\ESET\ESET Smart Security\ekrn.exe
C:\Program Files\IBM\IBM Rapid Restore Ultra\rrpcsb.exe
C:\WINDOWS\System32\QCONSVC.EXE
C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\TPHDEXLG.EXE
C:\WINDOWS\system32\TpKmpSVC.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\TpShocks.exe
C:\PROGRA~1\ThinkPad\PkgMgr\HOTKEY\TPHKMGR.exe
C:\PROGRA~1\ThinkPad\UTILIT~1\EzEjMnAp.Exe
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\IBM\Messages By IBM\ibmmessages.exe
C:\IBMTOOLS\UTILS\ibmprc.exe
C:\Program Files\ThinkPad\ConnectUtilities\QCTRAY.EXE
C:\Program Files\ThinkPad\ConnectUtilities\QCWLICON.EXE
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\ESET\ESET Smart Security\egui.exe
C:\Program Files\Adobe\Acrobat 9.0\Acrobat\Acrotray.exe
C:\Program Files\ScanSoft\OmniPageSE4.0\OpwareSE4.exe
C:\Program Files\ThinkPad\PkgMgr\HOTKEY\TPONSCR.exe
C:\Program Files\ThinkPad\PkgMgr\HOTKEY_1\TpScrex.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Internet Download Manager\IDMan.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\Internet Download Manager\IEMonitor.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = [You must be registered and logged in to see this link.]
O2 - BHO: IDM Helper - {0055C089-8582-441B-A0BF-17B458C2A3A8} - C:\Program Files\Internet Download Manager\IDMIECC.dll
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
O2 - BHO: Canon Easy Web Print Helper - {68F9551E-0411-48E4-9AAF-4BC42A6A46BE} - C:\Program Files\Canon\Easy-WebPrint\EWPBrowseLoader.dll
O2 - BHO: Adobe PDF Conversion Toolbar Helper - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll
O2 - BHO: SmartSelect - {F4971EE7-DAA0-4053-9964-665D8EE6A077} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll
O3 - Toolbar: Easy-WebPrint - {327C2873-E90D-4c37-AA9D-10AC9BABA46C} - C:\Program Files\Canon\Easy-WebPrint\Toolband.dll
O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [TPKMAPHELPER] C:\Program Files\ThinkPad\Utilities\TpKmapAp.exe -helper
O4 - HKLM\..\Run: [TpShocks] TpShocks.exe
O4 - HKLM\..\Run: [TPHOTKEY] C:\PROGRA~1\ThinkPad\PkgMgr\HOTKEY\TPHKMGR.exe
O4 - HKLM\..\Run: [TP4EX] tp4ex.exe
O4 - HKLM\..\Run: [EZEJMNAP] C:\PROGRA~1\ThinkPad\UTILIT~1\EzEjMnAp.Exe
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
O4 - HKLM\..\Run: [SoundMAX] C:\Program Files\Analog Devices\SoundMAX\Smax4.exe /tray
O4 - HKLM\..\Run: [UpdateManager] "C:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe" /r
O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
O4 - HKLM\..\Run: [ibmmessages] C:\Program Files\IBM\Messages By IBM\\ibmmessages.exe
O4 - HKLM\..\Run: [IBMPRC] C:\IBMTOOLS\UTILS\ibmprc.exe
O4 - HKLM\..\Run: [QCTRAY] C:\Program Files\ThinkPad\ConnectUtilities\QCTRAY.EXE
O4 - HKLM\..\Run: [QCWLICON] C:\Program Files\ThinkPad\ConnectUtilities\QCWLICON.EXE
O4 - HKLM\..\Run: [PWRMGRTR] rundll32 C:\PROGRA~1\ThinkPad\UTILIT~1\PWRMGRTR.DLL,PwrMgrBkGndMonitor
O4 - HKLM\..\Run: [BLOG] rundll32 C:\PROGRA~1\ThinkPad\UTILIT~1\BatLogEx.DLL,StartBattLog
O4 - HKLM\..\Run: [egui] "C:\Program Files\ESET\ESET Smart Security\egui.exe" /hide /waitservice
O4 - HKLM\..\Run: [Adobe Acrobat Speed Launcher] "C:\Program Files\Adobe\Acrobat 9.0\Acrobat\Acrobat_sl.exe"
O4 - HKLM\..\Run: [Acrobat Assistant 8.0] "C:\Program Files\Adobe\Acrobat 9.0\Acrobat\Acrotray.exe"
O4 - HKLM\..\Run: [SSBkgdUpdate] "C:\Program Files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" -Embedding -boot
O4 - HKLM\..\Run: [OpwareSE4] "C:\Program Files\ScanSoft\OmniPageSE4.0\OpwareSE4.exe"
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [IDMan] C:\Program Files\Internet Download Manager\IDMan.exe /onboot
O4 - HKCU\..\Run: [ibmmessages] C:\Program Files\IBM\Messages By IBM\ibmmessages.exe
O4 - Global Startup: Digital Line Detect.lnk = ?
O8 - Extra context menu item: Append Link Target to Existing PDF - [You must be registered and logged in to see this link.] Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Append to Existing PDF - [You must be registered and logged in to see this link.] Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert Link Target to Adobe PDF - [You must be registered and logged in to see this link.] Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert to Adobe PDF - [You must be registered and logged in to see this link.] Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Download all links with IDM - C:\Program Files\Internet Download Manager\IEGetAll.htm
O8 - Extra context menu item: Download FLV video content with IDM - C:\Program Files\Internet Download Manager\IEGetVL.htm
O8 - Extra context menu item: Download with IDM - C:\Program Files\Internet Download Manager\IEExt.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - [You must be registered and logged in to see this link.]
O8 - Extra context menu item: Easy-WebPrint Add To Print List - [You must be registered and logged in to see this link.] Files\Canon\Easy-WebPrint\Toolband.dll/RC_AddToList.html
O8 - Extra context menu item: Easy-WebPrint High Speed Print - [You must be registered and logged in to see this link.] Files\Canon\Easy-WebPrint\Toolband.dll/RC_HSPrint.html
O8 - Extra context menu item: Easy-WebPrint Preview - [You must be registered and logged in to see this link.] Files\Canon\Easy-WebPrint\Toolband.dll/RC_Preview.html
O8 - Extra context menu item: Easy-WebPrint Print - [You must be registered and logged in to see this link.] Files\Canon\Easy-WebPrint\Toolband.dll/RC_Print.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\IBM\Java142\jre\bin\NPJPI142.dll
O9 - Extra 'Tools' menuitem: IBM Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\IBM\Java142\jre\bin\NPJPI142.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Software Installer - {D1A4DEBD-C2EE-449f-B9FB-E8409F9A0BC5} - C:\Program Files\Lenovo\PkgMgr\\PkgMgr.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O11 - Options group: [JAVA_IBM] Java (IBM)
O20 - AppInit_DLLs: acaptuser32.dll
O23 - Service: ESET HTTP Server (EhttpSrv) - ESET - C:\Program Files\ESET\ESET Smart Security\EHttpSrv.exe
O23 - Service: ESET Service (ekrn) - ESET - C:\Program Files\ESET\ESET Smart Security\ekrn.exe
O23 - Service: EvtEng - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: IBM Rapid Restore Ultra Service - Unknown owner - C:\Program Files\IBM\IBM Rapid Restore Ultra\rrpcsb.exe
O23 - Service: IBM PM Service (IBMPMSVC) - Unknown owner - C:\WINDOWS\system32\ibmpmsvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: IBM PSA Access Driver Control (PsaSrv) - Unknown owner - C:\WINDOWS\system32\PsaSrv.exe (file missing)
O23 - Service: QCONSVC - IBM Corp. - C:\WINDOWS\System32\QCONSVC.EXE
O23 - Service: RegSrvc - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
O23 - Service: Spectrum24 Event Monitor (S24EventMonitor) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: IBM HDD APS Logging Service (TPHDEXLGSVC) - IBM Corporation - C:\WINDOWS\System32\TPHDEXLG.EXE
O23 - Service: IBM KCU Service (TpKmpSVC) - Unknown owner - C:\WINDOWS\system32\TpKmpSVC.exe

--
End of file - 9702 bytes

shiladitya_83
Novice
Novice

Posts Posts : 9
Joined Joined : 2009-05-31
OS OS : Windows XP
Points Points : 27567
# Likes # Likes : 0

View user profile

Back to top Go down

Re: win32.Agent. ODG virus in operating memory

Post by Belahzur on 31st May 2009, 1:36 pm

Hello.


  • Download combofix from here
    [You must be registered and logged in to see this link.]
    [You must be registered and logged in to see this link.]

    1. If you are using Firefox, make sure that your download settings are as follows:

    * Tools->Options->Main tab
    * Set to "Always ask me where to Save the files".

    2. During the download, rename Combofix to Combo-Fix as follows:





    3. It is important you rename Combofix during the download, but not after.
    4. Please do not rename Combofix to other names, but only to the one indicated.
    5. Close any open browsers.
    6. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

  • We need to disable your local AV (Anti-virus) before running Combofix.
  • See [You must be registered and logged in to see this link.] for how to disable your AV. (ESET Nod32)
  • Double click on ComboFix.exe.
  • Follow the prompts. NOTE:
  • ComboFix will check to see if the Microsoft Windows Recovery Console is installed.
    ***It's strongly recommended to have the Recovery Console installed before doing any malware removal.***

    **Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will automatically proceed with its scan.


  • The Recovery Console provides a recovery/repair mode should a problem occur during a Combofix run.



  • Allow ComboFix to download the Recovery Console.
  • Accept the End-User License Agreement.
  • The Recovery Console will be installed.
  • You will then get this next prompt that asks if you want to continue the malware scan, select yes



  • Allow combofix to run
  • Post C:\combofix.txt back here.

    Note:
    Do not mouseclick combofix's window whilst it's running. That may cause it to stall.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Re: win32.Agent. ODG virus in operating memory

Post by shiladitya_83 on 31st May 2009, 6:54 pm

ComboFix 09-05-30.06 - Shiladitya 06/01/2009 0:09.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.502.286 [GMT -7:00]
Running from: c:\documents and settings\Shiladitya\My Documents\Downloads\Programs\Combo-Fix.exe
AV: ESET Smart Security 4.0 *On-access scanning enabled* (Updated) {E5E70D32-0101-4F12-8FB0-D96ACA4F34C0}
FW: ESET Personal firewall *enabled* {E5E70D32-0101-4340-86A3-A7B0F1C8FFE0}
* Resident AV is active

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\drivers\kungsfmtppvjgo.sys
c:\windows\system32\kungsfjkwhqxsx.dat
c:\windows\system32\kungsfmlajkaoy.dat
c:\windows\system32\kungsfwktlwbrp.dll
c:\windows\system32\kungsfykytxrne.dll
c:\windows\system32\pwdmon.dll

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_kungsfwspyiien


((((((((((((((((((((((((( Files Created from 2009-05-01 to 2009-06-01 )))))))))))))))))))))))))))))))
.

2009-06-01 01:50 . 2009-06-01 01:50 -------- d-----w- c:\program files\Trend Micro
2009-05-31 06:17 . 2009-05-31 06:17 -------- d-----w- c:\documents and settings\All Users\Application Data\vsosdk
2009-05-30 16:59 . 2009-05-30 16:59 -------- d-----w- c:\documents and settings\Shiladitya\Application Data\Nero
2009-05-30 16:59 . 2009-05-30 16:59 -------- d-----w- c:\documents and settings\Shiladitya\Local Settings\Application Data\Xenocode
2009-05-29 07:58 . 2009-05-29 07:58 -------- d-----w- c:\documents and settings\Shiladitya\Application Data\Malwarebytes
2009-05-29 07:58 . 2009-05-26 20:20 40160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-05-29 07:58 . 2009-05-29 07:58 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-05-29 07:58 . 2009-05-29 07:58 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-05-29 07:58 . 2009-05-26 20:19 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-05-28 08:54 . 2009-05-28 08:54 -------- d-----w- c:\documents and settings\Shiladitya\Local Settings\Application Data\Scansoft
2009-05-28 08:16 . 2009-05-28 08:16 -------- d-----w- c:\documents and settings\All Users\Application Data\InstallShield
2009-05-28 08:16 . 2009-05-28 08:16 -------- d-----w- c:\documents and settings\Shiladitya\Application Data\ScanSoft
2009-05-28 08:16 . 2009-05-28 08:16 -------- d-----w- c:\documents and settings\All Users\Application Data\ScanSoft
2009-05-28 08:16 . 2009-05-28 08:16 -------- d-----w- c:\program files\Common Files\ScanSoft Shared
2009-05-28 08:15 . 2009-05-28 08:15 -------- d-----w- c:\program files\ScanSoft
2009-05-28 08:14 . 2009-05-28 08:14 -------- d-----w- c:\program files\Common Files\CANON
2009-05-28 08:12 . 2009-05-28 08:12 -------- d--h--w- c:\documents and settings\All Users\Application Data\CanonBJ
2009-05-28 08:12 . 2009-05-28 08:12 -------- d--h--w- c:\windows\system32\CanonIJ Uninstaller Information
2009-05-28 08:12 . 2006-07-20 15:51 57344 ----a-w- c:\windows\system32\CNCI160.DLL
2009-05-28 08:12 . 2006-06-29 14:29 106496 ----a-w- c:\windows\system32\cnco160.dll
2009-05-28 08:12 . 2006-05-26 10:54 135168 ----a-w- c:\windows\system32\CNCL160.DLL
2009-05-28 08:12 . 2006-07-20 15:51 1298432 ----a-w- c:\windows\system32\CNCC160.DLL
2009-05-28 08:11 . 2009-05-28 08:11 -------- d--h--w- c:\program files\CanonBJ
2009-05-28 08:03 . 2009-05-28 08:03 -------- d-----w- c:\program files\ArcSoft
2009-05-28 08:03 . 1995-07-31 20:44 212480 ----a-w- c:\windows\PCDLIB32.DLL
2009-05-28 08:00 . 2006-09-13 05:00 197632 ----a-w- c:\windows\system32\CNMLM83.DLL
2009-05-28 07:59 . 2009-05-28 08:13 -------- d-----w- c:\program files\Canon
2009-05-28 07:58 . 2004-08-04 06:01 25856 ----a-w- c:\windows\system32\drivers\usbprint.sys
2009-05-28 07:58 . 2004-08-04 06:01 25856 ----a-w- c:\windows\system32\dllcache\usbprint.sys
2009-05-28 07:57 . 2004-08-04 06:08 31616 ----a-w- c:\windows\system32\drivers\usbccgp.sys
2009-05-28 07:57 . 2004-08-04 06:08 31616 ----a-w- c:\windows\system32\dllcache\usbccgp.sys
2009-05-27 19:10 . 2009-05-27 19:10 -------- d-----w- c:\program files\DVDFab 6
2009-05-27 16:29 . 2009-05-27 16:29 -------- d-----w- c:\documents and settings\Shiladitya\Local Settings\Application Data\Identities
2009-05-27 16:26 . 2009-05-27 16:26 -------- d-----w- c:\program files\DAMN NFO Viewer
2009-05-27 16:26 . 2009-05-27 16:26 269312 ----a-w- c:\documents and settings\Shiladitya\Application Data\DAMN_NFO_Viewer_v2-10-0032-RC3.exe
2009-05-27 16:20 . 2009-05-27 16:44 162816 ----a-w- c:\windows\system32\fmod.dll
2009-05-27 16:19 . 2005-06-15 10:00 102400 ----a-w- c:\windows\system32\tsccvid.dll
2009-05-27 16:19 . 2009-05-27 16:19 -------- d-----w- c:\program files\eXtreme Movie Manager
2009-05-27 08:42 . 2009-05-27 08:42 -------- d-----w- c:\documents and settings\Shiladitya\Local Settings\Application Data\CheapShareware
2009-05-27 08:40 . 2009-05-27 08:50 -------- d-----w- c:\windows\DVD Cover Searcher
2009-05-27 07:05 . 2009-05-27 07:05 -------- d-----w- c:\program files\Easy CD & DVD Cover Creator
2009-05-27 01:11 . 2009-05-27 01:12 -------- d-----w- c:\documents and settings\All Users\Application Data\DVD Shrink
2009-05-27 01:11 . 2009-05-27 01:11 -------- d-----w- c:\program files\DVD Shrink
2009-05-26 08:24 . 2009-05-26 08:24 -------- d-----w- c:\documents and settings\Shiladitya\Application Data\InterVideo
2009-05-25 23:37 . 2009-05-25 23:37 21112 ----a-w- c:\documents and settings\Shiladitya\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-05-25 07:10 . 2009-05-25 07:13 1915520 ----a-w- c:\documents and settings\Shiladitya\Application Data\Macromedia\Flash Player\[You must be registered and logged in to see this link.]
2009-05-25 01:37 . 2009-05-31 08:30 -------- d-----w- c:\documents and settings\Shiladitya\Application Data\vlc
2009-05-25 01:36 . 2009-05-25 01:36 -------- d-----w- c:\program files\VideoLAN
2009-05-23 15:02 . 2009-05-30 05:31 -------- d-----w- C:\Dudlu
2009-05-22 09:17 . 2009-05-22 09:17 -------- d-----w- c:\program files\Microsoft ActiveSync
2009-05-22 09:16 . 2009-05-22 09:17 -------- d-----w- c:\windows\SHELLNEW
2009-05-22 09:16 . 2009-05-22 09:16 -------- d-----w- c:\program files\Microsoft.NET
2009-05-22 08:53 . 2009-05-22 08:53 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\ESET
2009-05-22 08:53 . 2004-08-04 06:08 26496 ----a-w- c:\windows\system32\dllcache\usbstor.sys
2009-05-21 17:47 . 2009-05-21 17:47 -------- d-----w- c:\documents and settings\All Users\Application Data\FLEXnet
2009-05-21 17:45 . 2009-05-21 17:45 -------- d-----w- c:\program files\Common Files\Macrovision Shared
2009-05-21 17:45 . 2009-05-21 17:47 -------- d-----w- c:\documents and settings\Shiladitya\Local Settings\Application Data\Adobe
2009-05-21 17:44 . 2008-04-07 12:38 22872 ----a-r- c:\windows\system32\AdobePDFUI.dll
2009-05-21 17:44 . 2008-04-07 12:38 45392 ----a-r- c:\windows\system32\AdobePDF.dll
2009-05-21 17:37 . 2009-05-21 17:45 -------- d-----w- c:\program files\Common Files\Adobe
2009-05-21 17:02 . 2009-05-21 17:02 -------- d-----w- c:\documents and settings\Shiladitya\Local Settings\Application Data\ESET
2009-05-21 16:57 . 2009-05-21 16:57 -------- d-----w- c:\documents and settings\Shiladitya\Application Data\ESET
2009-05-21 16:57 . 2009-05-21 16:57 -------- d-----w- c:\windows\IBM
2009-05-21 16:56 . 2009-05-21 16:56 -------- d-----w- c:\program files\ESET
2009-05-21 16:56 . 2009-05-21 16:56 -------- d-----w- c:\documents and settings\All Users\Application Data\ESET
2009-05-21 06:16 . 2009-05-21 05:50 -------- d-----w- c:\documents and settings\Shiladitya\Application Data\IBM
2009-05-21 06:16 . 2009-05-21 05:48 136 ----a-w- c:\documents and settings\Shiladitya\Local Settings\Application Data\fusioncache.dat
2009-05-21 06:03 . 2005-04-14 08:01 16384 ----a-w- c:\windows\PWMBTHLP.EXE
2009-05-21 06:03 . 2005-04-14 08:01 4442 ----a-w- c:\windows\system32\drivers\TPPWRIF.SYS
2009-05-21 06:00 . 2005-03-18 10:07 77824 ----a-w- c:\windows\system32\QCONSVC.EXE
2009-05-21 06:00 . 2005-03-18 10:07 577536 ----a-w- c:\windows\system32\tvt_gina.dll
2009-05-21 06:00 . 2005-03-18 10:07 282624 ----a-w- c:\windows\system32\tvt_gina_api.dll
2009-05-21 06:00 . 2005-03-18 10:07 262144 ----a-w- c:\windows\system32\QConGina.dll
2009-05-21 06:00 . 2005-03-18 10:07 2432 ----a-w- c:\windows\system32\drivers\IBMBLDID.SYS
2009-05-21 06:00 . 2005-03-18 10:07 12288 ----a-w- c:\windows\system32\drivers\qcndisif.sys
2009-05-21 06:00 . 2005-03-18 10:07 11520 ----a-w- c:\windows\system32\drivers\ANC.sys
2009-05-21 05:58 . 2009-05-28 08:53 -------- d-----w- C:\IBMSHARE
2009-05-21 05:57 . 2009-05-21 05:57 32256 ----a-w- c:\windows\system32\drivers\psasrv.exe
2009-05-21 05:57 . 2009-05-21 05:57 13184 ----a-w- c:\windows\system32\drivers\psadd.sys
2009-05-21 05:53 . 2009-05-21 05:53 -------- d-----w- c:\documents and settings\Administrator\Application Data\Symantec
2009-05-21 05:53 . 2009-05-21 16:50 -------- d-----w- c:\documents and settings\All Users\Application Data\Symantec
2009-05-21 05:53 . 2002-11-21 17:57 204800 ----a-w- c:\windows\system32\IVIresizeW7.dll
2009-05-21 05:53 . 2002-11-21 17:57 200704 ----a-w- c:\windows\system32\IVIresizeA6.dll
2009-05-21 05:53 . 2002-11-21 17:57 192512 ----a-w- c:\windows\system32\IVIresizeP6.dll
2009-05-21 05:53 . 2002-11-21 17:57 192512 ----a-w- c:\windows\system32\IVIresizeM6.dll
2009-05-21 05:53 . 2002-11-21 17:57 188416 ----a-w- c:\windows\system32\IVIresizePX.dll
2009-05-21 05:53 . 2002-11-21 17:57 20480 ----a-w- c:\windows\system32\IVIresize.dll
2009-05-21 05:53 . 2009-05-21 05:53 -------- d-----w- c:\program files\InterVideo
2009-05-21 05:53 . 2009-05-21 05:53 -------- d-----w- c:\documents and settings\All Users\Application Data\ibm
2009-05-21 05:52 . 2009-05-21 05:52 -------- d-----w- C:\icons
2009-05-21 05:52 . 2005-02-02 00:00 12416 ----a-w- c:\windows\system32\drivers\PcdrNdisuio.sys
2009-05-21 05:50 . 2009-05-21 05:50 -------- d-----w- c:\windows\system32\thinkpad_features
2009-05-21 05:50 . 2009-05-21 05:50 -------- d-----w- c:\documents and settings\Administrator\Application Data\IBM
2009-05-21 05:50 . 2009-05-21 05:50 -------- d-----w- c:\program files\IBM
2009-05-21 05:48 . 2009-05-21 05:48 136 ----a-w- c:\documents and settings\Administrator\Local Settings\Application Data\fusioncache.dat
2009-05-21 05:48 . 2009-05-21 05:48 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\ApplicationHistory
2009-05-21 05:47 . 2009-05-21 05:48 -------- d-----w- c:\program files\Windows Media Connect
2009-05-21 05:46 . 2005-05-04 18:47 163840 ----a-w- c:\windows\system32\igfxres.dll
2009-05-21 05:44 . 2009-05-21 05:44 -------- d-----w- c:\program files\Digital Line Detect
2009-05-21 05:44 . 2009-05-21 05:44 -------- d-----w- c:\program files\NetWaiting
2009-05-21 05:44 . 2009-05-21 05:44 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\BVRP Software
2009-05-21 05:44 . 2009-05-21 05:44 -------- d-----w- c:\program files\CONEXANT
2009-05-21 05:43 . 2009-05-21 05:43 -------- d-----w- c:\program files\Analog Devices
2009-05-21 05:43 . 2004-11-19 17:00 49152 ----a-w- c:\windows\system32\DSndUp.exe
2009-05-21 05:43 . 2002-04-17 21:05 45056 ----a-w- c:\windows\system32\CleanUp.exe
2009-05-21 05:43 . 2001-09-11 21:20 30208 ----a-w- c:\windows\system32\wdmioctl.dll
2009-05-21 05:43 . 2001-09-11 21:20 1285632 ----a-w- c:\windows\system32\SMMedia.dll
2009-05-21 05:43 . 2009-05-21 05:43 -------- d-----w- c:\program files\Lenovo
2009-05-21 05:43 . 2005-05-25 19:39 131072 ----a-w- c:\windows\_tpiu000.exe
2009-05-21 05:43 . 2004-11-12 08:07 45056 ----a-w- c:\windows\system32\FPCALL.dll
2009-05-21 05:43 . 2004-11-12 08:07 40960 ----a-w- c:\windows\system32\TP4HOOK.dll
2009-05-21 05:43 . 2004-11-12 08:07 40960 ----a-w- c:\windows\system32\TP4EX.exe
2009-05-21 05:43 . 2004-11-12 08:07 40960 ----a-w- c:\windows\system32\tp4cross.exe
2009-05-21 05:42 . 2005-05-17 09:34 7168 ----a-w- c:\windows\system32\drivers\TSMAPIP.SYS
2009-05-21 05:42 . 2009-05-21 05:42 17119 ----a-w- c:\windows\system32\drivers\AegisP.sys
2009-05-21 05:42 . 2009-05-21 05:42 -------- d-----w- c:\documents and settings\All Users\Application Data\Intel
2009-05-21 05:41 . 2005-02-14 13:48 1671168 ----a-w- c:\windows\system32\W29MLRES.DLL
2009-05-21 05:41 . 2009-05-21 05:41 -------- d-----w- c:\program files\Intel
2009-05-21 05:39 . 2005-01-21 08:40 9340 ----a-w- c:\windows\system32\drivers\TDSMAPI.SYS
2009-05-21 05:39 . 2005-01-21 08:40 14848 ----a-w- c:\windows\system32\drivers\SMAPINT.SYS
2009-05-21 05:34 . 2009-05-21 05:34 -------- d-----w- c:\windows\system32\URTTemp
2009-05-21 05:34 . 2009-05-21 05:34 -------- d--h--w- c:\windows\$hf_mig$
2009-05-21 05:31 . 2001-08-17 20:58 9344 ----a-w- c:\windows\system32\drivers\compbatt.sys
2009-05-21 05:31 . 2004-08-04 06:07 14080 ----a-w- c:\windows\system32\drivers\CmBatt.sys
2009-05-21 05:31 . 2001-08-17 20:57 14080 ----a-w- c:\windows\system32\drivers\battc.sys

.

shiladitya_83
Novice
Novice

Posts Posts : 9
Joined Joined : 2009-05-31
OS OS : Windows XP
Points Points : 27567
# Likes # Likes : 0

View user profile

Back to top Go down

Re: win32.Agent. ODG virus in operating memory

Post by shiladitya_83 on 31st May 2009, 6:55 pm

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-05-31 18:39 . 2009-05-21 06:15 -------- d-----w- c:\documents and settings\Shiladitya\Application Data\Sonic
2009-05-28 08:16 . 2009-05-21 05:38 -------- d-----w- c:\program files\Common Files\InstallShield
2009-05-28 08:03 . 2009-05-21 05:38 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-05-21 06:16 . 2009-05-21 06:16 47 ----a-w- c:\windows\system32\drivers\IBM_1861_AB3.MRK
2009-05-21 05:53 . 2009-05-21 06:15 -------- d-----w- c:\documents and settings\Shiladitya\Application Data\Symantec
2009-05-21 05:52 . 2004-08-09 17:54 86695 ----a-w- c:\windows\pchealth\helpctr\OfflineCache\index.dat
2009-05-21 05:51 . 2009-05-21 05:51 -------- d-----w- c:\program files\PC-Doctor for Windows
2009-05-21 05:51 . 2009-05-21 05:51 -------- d-----w- c:\program files\IBM DLA
2009-05-21 05:51 . 2009-05-21 05:51 -------- d-----w- c:\documents and settings\Administrator\Application Data\Sonic
2009-05-21 05:51 . 2009-05-21 05:51 -------- d-----w- c:\program files\Common Files\Sonic
2009-05-21 05:51 . 2009-05-21 05:51 -------- d-----w- c:\program files\Common Files\SureThing Shared
2009-05-21 05:51 . 2009-05-21 05:51 -------- d-----w- c:\program files\Sonic
2009-05-21 05:51 . 2009-05-21 05:51 -------- d-----w- c:\program files\IBM RecordNow!
2009-05-21 05:41 . 2009-05-21 05:41 0 ---ha-r- c:\windows\system32\drivers\IBM_1861_AB3_TP.MRK
2009-05-21 05:38 . 2009-05-21 05:38 2086 ----a-w- c:\windows\system32\SMBIOS.bin
2009-05-21 05:38 . 2009-05-21 05:38 -------- d-----w- c:\program files\ThinkPad
2009-04-09 22:21 . 2009-04-09 22:21 55768 ----a-w- c:\windows\system32\drivers\epfwtdi.sys
2009-04-09 22:21 . 2009-04-09 22:21 33096 ----a-w- c:\windows\system32\drivers\epfwndis.sys
2009-04-09 22:21 . 2009-04-09 22:21 133000 ----a-w- c:\windows\system32\drivers\epfw.sys
2009-04-09 22:18 . 2009-04-09 22:18 107256 ----a-w- c:\windows\system32\drivers\ehdrv.sys
2009-04-09 22:10 . 2009-04-09 22:10 113960 ----a-w- c:\windows\system32\drivers\eamon.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2004-08-04 1667584]
"IDMan"="c:\program files\Internet Download Manager\IDMan.exe" [2009-05-20 2811312]
"ibmmessages"="c:\program files\IBM\Messages By IBM\ibmmessages.exe" [2004-08-06 442368]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPLpr"="c:\program files\Synaptics\SynTP\SynTPLpr.exe" [2004-11-08 110592]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2004-11-08 512000]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2005-05-04 155648]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2005-05-04 126976]
"TPKMAPHELPER"="c:\program files\ThinkPad\Utilities\TpKmapAp.exe" [2004-02-05 897024]
"TPHOTKEY"="c:\progra~1\ThinkPad\PkgMgr\HOTKEY\TPHKMGR.exe" [2005-04-04 94208]
"EZEJMNAP"="c:\progra~1\ThinkPad\UTILIT~1\EzEjMnAp.Exe" [2005-03-23 217088]
"SoundMAXPnP"="c:\program files\Analog Devices\SoundMAX\SMax4PNP.exe" [2004-10-14 1388544]
"UpdateManager"="c:\program files\Common Files\Sonic\Update Manager\sgtray.exe" [2003-08-19 110592]
"dla"="c:\windows\system32\dla\tfswctrl.exe" [2004-09-02 127035]
"ibmmessages"="c:\program files\IBM\Messages By IBM\\ibmmessages.exe" [2004-08-06 442368]
"IBMPRC"="c:\ibmtools\UTILS\ibmprc.exe" [2005-04-27 90112]
"QCTRAY"="c:\program files\ThinkPad\ConnectUtilities\QCTRAY.EXE" [2005-03-18 745472]
"QCWLICON"="c:\program files\ThinkPad\ConnectUtilities\QCWLICON.EXE" [2005-03-18 86016]
"PWRMGRTR"="c:\progra~1\ThinkPad\UTILIT~1\PWRMGRTR.DLL" [2005-04-14 139264]
"BLOG"="c:\progra~1\ThinkPad\UTILIT~1\BatLogEx.DLL" [2005-04-14 208896]
"egui"="c:\program files\ESET\ESET Smart Security\egui.exe" [2009-04-09 2029640]
"Adobe Acrobat Speed Launcher"="c:\program files\Adobe\Acrobat 9.0\Acrobat\Acrobat_sl.exe" [2008-06-12 37232]
"Acrobat Assistant 8.0"="c:\program files\Adobe\Acrobat 9.0\Acrobat\Acrotray.exe" [2008-06-12 640376]
"SSBkgdUpdate"="c:\program files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" [2006-09-28 185896]
"OpwareSE4"="c:\program files\ScanSoft\OmniPageSE4.0\OpwareSE4.exe" [2006-10-11 75304]
"TpShocks"="TpShocks.exe" - c:\windows\system32\TpShocks.exe [2005-04-05 106496]
"TP4EX"="tp4ex.exe" - c:\windows\system32\TP4EX.exe [2004-11-12 40960]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2009-5-20 24576]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\QConGina]
2005-03-18 10:07 262144 ----a-w- c:\windows\system32\QConGina.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\tphotkey]
2004-08-13 03:11 24576 ----a-w- c:\windows\system32\tphklock.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\windows\system32\acaptuser32.dll

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=

R0 Shockprf;Shockprf;c:\windows\system32\drivers\shockprf.sys [5/20/2009 10:38 PM 59776]
R0 TPDiskPM;TPDiskPM;c:\windows\system32\drivers\TPDiskPM.sys [5/20/2009 10:38 PM 14208]
R1 ehdrv;ehdrv;c:\windows\system32\drivers\ehdrv.sys [4/9/2009 3:18 PM 107256]
R1 ShockMgr;ShockMgr;c:\windows\system32\drivers\ShockMgr.sys [5/20/2009 10:38 PM 4608]
R1 TPPWRIF;TPPWRIF;c:\windows\system32\drivers\TPPWRIF.SYS [5/20/2009 11:03 PM 4442]
R2 ekrn;ESET Service;c:\program files\ESET\ESET Smart Security\ekrn.exe [4/9/2009 3:19 PM 731840]
R2 ibmfilter;ibmfilter;c:\windows\system32\drivers\ibmfilter.sys [4/27/2005 10:27 AM 63616]
R3 TPInput;TPInput;c:\windows\system32\drivers\TPInput.sys [5/20/2009 10:38 PM 6016]
R3 TPM11;NSC Integrated Trusted Platform Module 1.1;c:\windows\system32\drivers\nsctpm11.sys [1/1/1980 14336]
S3 QCNDISIF;QCNDISIF;c:\windows\system32\drivers\qcndisif.sys [5/20/2009 11:00 PM 12288]
.
Contents of the 'Scheduled Tasks' folder

2009-05-30 c:\windows\Tasks\PMTask.job
- c:\progra~1\ThinkPad\UTILIT~1\PWMIDTSK.EXE [2009-05-21 08:01]
.
- - - - ORPHANS REMOVED - - - -
SafeBoot-procexp90.Sys


.
------- Supplementary Scan -------
.
uStart Page = [You must be registered and logged in to see this link.]
IE: Append Link Target to Existing PDF - c:\program files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Append to Existing PDF - c:\program files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert Link Target to Adobe PDF - c:\program files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert to Adobe PDF - c:\program files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECapture.html
IE: Download all links with IDM - c:\program files\Internet Download Manager\IEGetAll.htm
IE: Download FLV video content with IDM - c:\program files\Internet Download Manager\IEGetVL.htm
IE: Download with IDM - c:\program files\Internet Download Manager\IEExt.htm
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: Easy-WebPrint Add To Print List - c:\program files\Canon\Easy-WebPrint\Toolband.dll/RC_AddToList.html
IE: Easy-WebPrint High Speed Print - c:\program files\Canon\Easy-WebPrint\Toolband.dll/RC_HSPrint.html
IE: Easy-WebPrint Preview - c:\program files\Canon\Easy-WebPrint\Toolband.dll/RC_Preview.html
IE: Easy-WebPrint Print - c:\program files\Canon\Easy-WebPrint\Toolband.dll/RC_Print.html
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, [You must be registered and logged in to see this link.]
Rootkit scan 2009-06-01 00:14
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(1312)
c:\windows\system32\tphklock.dll

- - - - - - - > 'explorer.exe'(3140)
c:\program files\ScanSoft\OmniPageSE4.0\OpHookSE4.dll
c:\progra~1\ThinkPad\UTILIT~1\PWRMGRTR.DLL
c:\progra~1\ThinkPad\UTILIT~1\US\PWRMGRRT.DLL
c:\progra~1\ThinkPad\UTILIT~1\PWRMGRIF.DLL
c:\windows\system32\Sensor.dll
c:\windows\system32\OEMDSPIF.DLL
c:\windows\system32\igfxdev.dll
c:\windows\system32\browselc.dll
c:\program files\Internet Download Manager\IDMIECC.dll
c:\windows\system32\dla\tfswshx.dll
c:\windows\system32\tfswapi.dll
c:\windows\system32\dla\tfswcres.dll
c:\program files\Internet Download Manager\idmmkb.dll
c:\program files\Microsoft Office\OFFICE11\msohev.dll
c:\program files\Common Files\Adobe\Acrobat\ActiveX\PDFShell.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\ibmpmsvc.exe
c:\program files\Intel\Wireless\Bin\EvtEng.exe
c:\program files\Intel\Wireless\Bin\S24EvMon.exe
c:\windows\system32\rundll32.exe
c:\program files\ThinkPad\PkgMgr\HOTKEY\TPONSCR.exe
c:\program files\ThinkPad\PkgMgr\HOTKEY_1\TpScrex.exe
c:\program files\IBM\IBM Rapid Restore Ultra\rrpcsb.exe
c:\windows\system32\QCONSVC.EXE
c:\program files\Intel\Wireless\Bin\RegSrvc.exe
c:\program files\Analog Devices\SoundMAX\SMAgent.exe
c:\windows\system32\TPHDEXLG.exe
c:\windows\system32\TpKmpSvc.exe
c:\windows\system32\wdfmgr.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2009-06-01 0:16 - machine was rebooted
ComboFix-quarantined-files.txt 2009-06-01 07:16

Pre-Run: 26,671,624,192 bytes free
Post-Run: 26,770,259,968 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fastdetect

311

shiladitya_83
Novice
Novice

Posts Posts : 9
Joined Joined : 2009-05-31
OS OS : Windows XP
Points Points : 27567
# Likes # Likes : 0

View user profile

Back to top Go down

Re: win32.Agent. ODG virus in operating memory

Post by Belahzur on 31st May 2009, 7:13 pm

Click Start > Run and copy/paste the following bolded text into the Run box and click OK:

ComboFix /u



This will also reset your restore points.

How is the machine running now?


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Re: win32.Agent. ODG virus in operating memory

Post by shiladitya_83 on 1st June 2009, 5:24 pm

Hey thanks a lot. The trojan is gone now. Great help mate. Cheers

shiladitya_83
Novice
Novice

Posts Posts : 9
Joined Joined : 2009-05-31
OS OS : Windows XP
Points Points : 27567
# Likes # Likes : 0

View user profile

Back to top Go down

Re: win32.Agent. ODG virus in operating memory

Post by Belahzur on 1st June 2009, 5:50 pm

Below I have included a number of recommendations for how to protect your computer in order to prevent future malware infections. Please take these recommendations seriously; these few simple steps can stave off the vast majority of spyware problems. As happy as we are to help you, for your sake we would rather not have repeat customers. Goofy

1) Please navigate to [You must be registered and logged in to see this link.] and download all the "critical updates" for Windows. This can patch many of the security holes through which attackers can gain access to your computer.

Please either enable Automatic Updates under Start -> Control Panel -> Automatic Updates , or get into the habit of checking for Windows updates regularly. I cannot stress enough how important this is.

2) In order to protect yourself against spyware, you should consider installing and running the following free programs:

[You must be registered and logged in to see this link.]
A tutorial on using Ad-Aware to remove spyware from your computer may be found [You must be registered and logged in to see this link.].

[You must be registered and logged in to see this link.]
A tutorial on using Spybot to remove spyware from your computer may be found [You must be registered and logged in to see this link.]. Please also remember to enable Spybot's "Immunize" and "TeaTimer" features.

[You must be registered and logged in to see this link.]
A tutorial on using SpywareBlaster to prevent spyware from ever installing on your computer may be found [You must be registered and logged in to see this link.].

[You must be registered and logged in to see this link.]
A tutorial on using SpywareGuard for realtime protection against spyware and hijackers may be found [You must be registered and logged in to see this link.].

Make sure to keep these programs up-to-date and to run them regularly, as this can prevent a great deal of spyware hassle.

3) Please consider using an alternate browser. Mozilla's Firefox browser is fantastic; it is much more secure than Internet Explorer, immune to almost all known browser hijackers, and also has the best built-in popup blocker (as an added benefit!) that I have ever seen. If you are interested, Firefox may be downloaded from here:
[You must be registered and logged in to see this link.]
I also recommand the following add-ons for Firefox, they will help keep you safe from malicious scripts or activeX exploits.
[You must be registered and logged in to see this link.]
[You must be registered and logged in to see this link.]
[You must be registered and logged in to see this link.]

4) Also make sure to run your antivirus software regularly, and to keep it up-to-date.

To help you keep your software updated, please considering using this free software program that will check for program updates.
[You must be registered and logged in to see this link.]

5) Finally, consider maintaining a firewall. Some good free firewalls are [You must be registered and logged in to see this link.], or
[You must be registered and logged in to see this link.]
A tutorial on understanding and using firewalls may be found [You must be registered and logged in to see this link.].

Please also read Tony Klein's excellent article: [You must be registered and logged in to see this link.]

If you would take a moment to fill out our feedback form, we would appreciate it.
The link can be found [You must be registered and logged in to see this link.].

Hopefully this should take care of your problems! Good luck. Big Grin


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Re: win32.Agent. ODG virus in operating memory

Post by shiladitya_83 on 10th January 2010, 4:04 pm

Hi Belahzur,

I'm back and have obviously not learnt from my mistake the last time round. My laptop is again infected with olmarik. Please help!

Im pasting the log file after running HIjackthis.

Thanks a lot!

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 9:35:56 PM, on 1/10/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.20583)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
C:\WINDOWS\Explorer.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Internet Download Manager\IDMan.exe
C:\Program Files\REALTEK USB Wireless LAN Driver and Utility\RtWLan.exe
C:\Program Files\Internet Download Manager\IEMonitor.exe
C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = [You must be registered and logged in to see this link.]
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = [You must be registered and logged in to see this link.]
F2 - REG:system.ini: Shell=Explorer.exe rundll32.exe beforeglav
O2 - BHO: IDM Helper - {0055C089-8582-441B-A0BF-17B458C2A3A8} - C:\Program Files\Internet Download Manager\IDMIECC.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Canon Easy Web Print Helper - {68F9551E-0411-48E4-9AAF-4BC42A6A46BE} - C:\Program Files\Canon\Easy-WebPrint\EWPBrowseLoader.dll
O2 - BHO: Adobe PDF Conversion Toolbar Helper - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: Easy-WebPrint - {327C2873-E90D-4c37-AA9D-10AC9BABA46C} - C:\Program Files\Canon\Easy-WebPrint\Toolband.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [MediaFace Integration] C:\Program Files\Fellowes\MediaFACE 5.0\SetHook.exe
O4 - HKLM\..\Run: [egui] "C:\Program Files\ESET\ESET NOD32 Antivirus\egui.exe" /hide /waitservice
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [NVIDIA nTune] "C:\Program Files\NVIDIA Corporation\nTune\nTuneCmd.exe" clear
O4 - HKCU\..\Run: [IDMan] C:\Program Files\Internet Download Manager\IDMan.exe /onboot
O4 - HKUS\S-1-5-19\..\RunOnce: [ShowDeskFix] regsvr32 /s /n /i:u shell32 (User '?')
O4 - HKUS\S-1-5-20\..\RunOnce: [ShowDeskFix] regsvr32 /s /n /i:u shell32 (User '?')
O4 - HKUS\S-1-5-21-57989841-1220945662-682003330-1003\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User '?')
O4 - HKUS\S-1-5-18\..\Run: [Nokia.PCSync] C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe /NoDialog (User '?')
O4 - HKUS\S-1-5-18\..\RunOnce: [ShowDeskFix] regsvr32 /s /n /i:u shell32 (User '?')
O4 - HKUS\.DEFAULT\..\Run: [Nokia.PCSync] C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe /NoDialog (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [ShowDeskFix] regsvr32 /s /n /i:u shell32 (User 'Default user')
O4 - Global Startup: REALTEK USB Wireless LAN Utility.lnk = ?
O8 - Extra context menu item: Append to existing PDF - [You must be registered and logged in to see this link.] Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert link target to Adobe PDF - [You must be registered and logged in to see this link.] Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert link target to existing PDF - [You must be registered and logged in to see this link.] Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert selected links to Adobe PDF - [You must be registered and logged in to see this link.] Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert selected links to existing PDF - [You must be registered and logged in to see this link.] Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Convert selection to Adobe PDF - [You must be registered and logged in to see this link.] Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert selection to existing PDF - [You must be registered and logged in to see this link.] Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert to Adobe PDF - [You must be registered and logged in to see this link.] Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Download all links with IDM - C:\Program Files\Internet Download Manager\IEGetAll.htm
O8 - Extra context menu item: Download FLV video content with IDM - C:\Program Files\Internet Download Manager\IEGetVL.htm
O8 - Extra context menu item: Download with IDM - C:\Program Files\Internet Download Manager\IEExt.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - [You must be registered and logged in to see this link.]
O8 - Extra context menu item: Easy-WebPrint Add To Print List - [You must be registered and logged in to see this link.] Files\Canon\Easy-WebPrint\Toolband.dll/RC_AddToList.html
O8 - Extra context menu item: Easy-WebPrint High Speed Print - [You must be registered and logged in to see this link.] Files\Canon\Easy-WebPrint\Toolband.dll/RC_HSPrint.html
O8 - Extra context menu item: Easy-WebPrint Preview - [You must be registered and logged in to see this link.] Files\Canon\Easy-WebPrint\Toolband.dll/RC_Preview.html
O8 - Extra context menu item: Easy-WebPrint Print - [You must be registered and logged in to see this link.] Files\Canon\Easy-WebPrint\Toolband.dll/RC_Print.html
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} (Facebook Photo Uploader 5 Control) - [You must be registered and logged in to see this link.]
O23 - Service: ESET HTTP Server (EhttpSrv) - ESET - C:\Program Files\ESET\ESET NOD32 Antivirus\EHttpSrv.exe
O23 - Service: ESET Service (ekrn) - ESET - C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: hpqwmiex - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
O23 - Service: Microsoft security update service (msupdate) - Unknown owner - c:\windows\system32\mssrv32.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: ServiceLayer - Nokia. - C:\Program Files\PC Connectivity Solution\ServiceLayer.exe

--
End of file - 7577 bytes

shiladitya_83
Novice
Novice

Posts Posts : 9
Joined Joined : 2009-05-31
OS OS : Windows XP
Points Points : 27567
# Likes # Likes : 0

View user profile

Back to top Go down

Re: win32.Agent. ODG virus in operating memory

Post by Belahzur on 10th January 2010, 7:23 pm

Hello.

  • Open HijackThis
  • Choose "Do a system scan only"
  • Check the boxes in front of these lines:


    F2 - REG:system.ini: Shell=Explorer.exe rundll32.exe beforeglav
    O23 - Service: Microsoft security update service (msupdate) - Unknown owner - c:\windows\system32\mssrv32.exe


  • Press "Fix Checked"
  • Close Hijack This.

Please download and run this tool.

Download Malwarebytes' Anti-Malware from [You must be registered and logged in to see this link.]

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.


Post the contents of the MBAM Log.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Re: win32.Agent. ODG virus in operating memory

Post by shiladitya_83 on 25th January 2010, 4:47 pm

Malwarebytes' Anti-Malware 1.44
Database version: 3510
Windows 5.1.2600 Service Pack 2
Internet Explorer 7.0.5730.11

1/1/2006 12:23:54 AM
mbam-log-2006-01-01 (00-23-54).txt

Scan type: Quick Scan
Objects scanned: 108545
Time elapsed: 9 minute(s), 21 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 3
Registry Values Infected: 0
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 121

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
\\?\globalroot\systemroot\system32\kbiwkmhtpjtnqt.dll (Trojan.FakeAlert) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\msupdate (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\synsend (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\idid (Trojan.Sasfix) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\CheckedValue (Hijack.System.hȋdden) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
\\?\globalroot\systemroot\system32\kbiwkmhtpjtnqt.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\kbiwkmbybsjcjg.dll (Rootkit.TDSS) -> Delete on reboot.
C:\WINDOWS\system32\kbiwkmfjwbscvn.dll (Rootkit.TDSS) -> Delete on reboot.
C:\WINDOWS\system32\kbiwkmfyxmpfeb.dll (Rootkit.TDSS) -> Delete on reboot.
C:\WINDOWS\system32\kbiwkmhtpjtnqt.dll (Trojan.FakeAlert) -> Delete on reboot.
C:\WINDOWS\system32\kbiwkmuthempux.dll (Rootkit.TDSS) -> Delete on reboot.
C:\WINDOWS\system32\kbiwkmwjleestn.dll (Rootkit.TDSS) -> Delete on reboot.
C:\WINDOWS\system32\kbiwkmxylqimep.dll (Rootkit.TDSS) -> Delete on reboot.
C:\WINDOWS\system32\kbiwkmyribithw.dll (Rootkit.TDSS) -> Delete on reboot.
C:\WINDOWS\system32\drivers\kbiwkmcrrnoctf.sys (Rootkit.TDSS) -> Delete on reboot.
C:\WINDOWS\Temp\pqmiwrjpcv.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\qnrdtqknng.exe (Backdoor.Syrutrk) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\qpsdvsblic.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\rtcyrvnnca.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\syufvtxtyw.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\upttrgpnha.exe (Backdoor.Syrutrk) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\wgeykhjabv.exe (Trojan.Buzus) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\wgjxqimsjk.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\yhypgjbtxm.exe (Trojan.Buzus) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmwcfjuleotr.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmwlatgitknj.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmwmbrgudlop.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmwmuhrkeyoa.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmwqvcdieeis.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmwuttnpihou.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmxmaxevbwyg.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmxusprqbsef.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmxybueyxgvb.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmycvituwqec.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmyfuyrjtkbj.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmygclfmtnyo.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmynefwbnbcs.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmyqpbhvrrfi.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmyuxhancoqe.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmyvwfmcxynv.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmywyxtkimgo.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmyxmbfgerlc.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmeectqithsp.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmmxnfclxjkt.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmsbrqnbgscj.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmwcbtjhgnur.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\nobkbqmhrs.exe (Backdoor.Syrutrk) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmnfrtqvwich.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmnfthxjipmb.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmnhrooexclt.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmnoqghootvs.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmohyykbcfoc.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmpbvfwbymxg.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmpexwbmoptv.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmpivvpuyrwe.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmpjusybsskf.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmplqhjhevvh.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmpreneiitdq.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmpxgncegybv.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmqadheeixjx.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmqhelsvnswl.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmqitxfqbwtd.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmqvbnyuiwdh.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmqvoqhorweb.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmriwwostijx.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmrpqhudfdei.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmrviuxyjwts.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\mdejfarsdf.exe (Backdoor.Syrutrk) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\mwkfyuasfp.exe (Backdoor.Syrutrk) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmemjjeyvfix.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmexnlnkicxj.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmftirdnptnt.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmgjbfrvkdkv.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmgwgipwhvdx.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmhisjuddurd.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmhpngbdrqli.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmhwpxchleuq.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmiaatpsqpxa.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmiovkoenqsv.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmitddhxwipr.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmivxhclwpaa.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmiytdnjvrkl.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmjqkdloxhmn.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmkdccjdmeqh.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmkgiseciqjd.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmleotxxwofw.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmlmtwsuoebj.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmlrqqaxhkkj.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmmakjkkhcev.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmmiatexhtpl.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmmwptseotbw.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmshpfvlrynn.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmsmnchtckcx.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmsuuajdighv.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmsvbqorirti.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmtefoqhcgir.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmthfpxsdfxg.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmtiqwyiotif.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmtmejvouvkq.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmtmwoftikce.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmtpoastporp.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmtuulqpfshu.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmuaxfggvypi.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmujvropsuxl.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmunkrymyccn.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmusayjfjqie.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmvhdywfeiuc.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmvjkbyqrxta.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmvkfykdqbrq.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmvrxtirxvbv.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmaodcvttvmb.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmaoqledenub.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmapikpmtsvi.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmawhdprhgib.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmbcjhjlyklx.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmbrmiimdkpb.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmchrcdhnvha.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\kbiwkmctatvkfobr.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\npcyeaytik.exe (Backdoor.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\Drivers\str.sys (Rootkit.Agent) -> Delete on reboot.
C:\WINDOWS\system32\dxvars.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ipcmd.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\sysdiag.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\winntcmd_2_0.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\kbiwkmddvalltu.dat (Rootkit.TDSS) -> Delete on reboot.
C:\WINDOWS\system32\kbiwkmwjbotvgr.dat (Rootkit.TDSS) -> Delete on reboot.

shiladitya_83
Novice
Novice

Posts Posts : 9
Joined Joined : 2009-05-31
OS OS : Windows XP
Points Points : 27567
# Likes # Likes : 0

View user profile

Back to top Go down

Re: win32.Agent. ODG virus in operating memory

Post by shiladitya_83 on 25th January 2010, 5:18 pm

Hi,

Apologies for the delayed reply. Was out of town for a while.

shiladitya_83
Novice
Novice

Posts Posts : 9
Joined Joined : 2009-05-31
OS OS : Windows XP
Points Points : 27567
# Likes # Likes : 0

View user profile

Back to top Go down

Re: win32.Agent. ODG virus in operating memory

Post by Belahzur on 25th January 2010, 9:32 pm

Please download a new copy of Combofix.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Re: win32.Agent. ODG virus in operating memory

Post by shiladitya_83 on 26th January 2010, 5:10 pm

hey thanks a lot!

shiladitya_83
Novice
Novice

Posts Posts : 9
Joined Joined : 2009-05-31
OS OS : Windows XP
Points Points : 27567
# Likes # Likes : 0

View user profile

Back to top Go down

Re: win32.Agent. ODG virus in operating memory

Post by Belahzur on 26th January 2010, 6:06 pm

Please post the new log.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

View previous topic View next topic Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum