Sorry about the delay
SmitFraudFix v2.61
Scan done at 14:19:43.04, 17/06/2006
Run from C:\Documents and Settings\Stewart Davis\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
Fix ran in normal mode
»»»»»»»»»»»»»»»»»»»»»»»» C:\
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32
C:\WINDOWS\system32\atmclk.exe FOUND !
C:\WINDOWS\system32\dcomcfg.exe FOUND !
C:\WINDOWS\system32\ld????.tmp FOUND !
C:\WINDOWS\system32\ot.ico FOUND !
C:\WINDOWS\system32\regperf.exe FOUND !
C:\WINDOWS\system32\simpole.tlb FOUND !
C:\WINDOWS\system32\stdole3.tlb FOUND !
»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Stewart Davis\Application Data
»»»»»»»»»»»»»»»»»»»»»»»» Start Menu
»»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\STEWAR~1\FAVORI~1
C:\DOCUME~1\STEWAR~1\FAVORI~1\Antivirus Test Online.url FOUND !
»»»»»»»»»»»»»»»»»»»»»»»» Desktop
»»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files
»»»»»»»»»»»»»»»»»»»»»»»» Corrupted keys
»»»»»»»»»»»»»»»»»»»»»»»» Desktop Components
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
"Source"="About:Home"
"SubscribedURL"="About:Home"
"FriendlyName"="My Current Home Page"
»»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
!!!Attention, following keys are not inevitably infected!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
"{05a91164-3c96-47d6-aa74-2c855791b2d0}"="incaged"
[HKEY_CLASSES_ROOT\CLSID\{05a91164-3c96-47d6-aa74-2c855791b2d0}\InProcServer32]
@="C:\WINDOWS\system32\ofcukiz.dll"
[HKEY_CURRENT_USER\Software\Classes\CLSID\{05a91164-3c96-47d6-aa74-2c855791b2d0}\InProcServer32]
@="C:\WINDOWS\system32\ofcukiz.dll"
»»»»»»»»»»»»»»»»»»»»»»»» Scanning wininet.dll infection
»»»»»»»»»»»»»»»»»»»»»»»» End
---------------------------------------------------------
ewido anti-malware - Scan report
---------------------------------------------------------
+ Created on: 19:10:17, 16/06/2006
+ Report-Checksum: 5B8B33D
+ Scan result:
C:\IRAS\RAS Search.exe -> Heuristic.Win32.Dialer : Cleaned with backup
C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP64\A0009878.dll -> Adware.Minibug : Cleaned with backup
C:\WINDOWS\SYSTEM32\1024 -> Trojan.Small : Cleaned with backup
C:\WINDOWS\SYSTEM32\1024\ld11B5.tmp -> Trojan.Small : Cleaned with backup
C:\WINDOWS\SYSTEM32\1024\ld7D44.tmp -> Trojan.Small : Cleaned with backup
C:\WINDOWS\SYSTEM32\1024\ld80D6.tmp -> Trojan.Small : Cleaned with backup
C:\WINDOWS\SYSTEM32\1024\ldBAE3.tmp -> Trojan.Small : Cleaned with backup
C:\WINDOWS\SYSTEM32\1024\ldD9DE.tmp -> Trojan.Small : Cleaned with backup
C:\WINDOWS\SYSTEM32\1024\ldEEC2.tmp -> Trojan.Small : Cleaned with backup
C:\WINDOWS\SYSTEM32\atmclk.exe -> Trojan.Small : Error during cleaning
C:\WINDOWS\SYSTEM32\hp100.tmp -> Downloader.Zlob.so : Cleaned with backup
C:\WINDOWS\SYSTEM32\hp101.tmp -> Downloader.Zlob.so : Cleaned with backup
C:\WINDOWS\SYSTEM32\hp102.tmp -> Downloader.Zlob.so : Cleaned with backup
C:\WINDOWS\SYSTEM32\hp103.tmp -> Downloader.Zlob.so : Cleaned with backup
::Report End
********
11:40: | Start of Session, 15 June 2006 |
11:40: Spy Sweeper started
11:40: Sweep initiated using definitions version 699
11:40: Starting Memory Sweep
11:43: Found Adware: spyware quake fakealert
11:43: Detected running threat: C:\WINDOWS\SYSTEM32\ofcukiz.dll (ID = 411)
11:45: Memory Sweep Complete, Elapsed Time: 00:04:30
11:45: Starting Registry Sweep
11:45: Found Adware: multidial
11:45: HKLM\software\microsoft\windows\currentversion\moduleusage\c:/windows/downloaded program files/muldist.ocx\ (2 subtraces) (ID = 135367)
11:45: Found Adware: security2k hijacker
11:45: HKLM\software\microsoft\windows\currentversion\explorer\browser helper objecta\ (2 subtraces) (ID = 735573)
11:45: Found Trojan Horse: trojan-downloader-zlob
11:45: HKLM\software\microsoft\windows\currentversion\policies\explorer\run\ || kernel32.dll (ID = 796421)
11:45: HKLM\software\microsoft\windows\currentversion\moduleusage\c:/windows/system32/mfc42.dll\ || {e8edb60c-951e-4130-93dc-faf1ad25f8e7} (ID = 956093)
11:45: HKLM\software\microsoft\windows\currentversion\moduleusage\c:/windows/system32/mfc42.dll\ || {fc87a650-207d-4392-a6a1-82adbc56fa64} (ID = 956094)
11:45: HKLM\software\microsoft\windows\currentversion\moduleusage\c:/windows/system32/msvcrt.dll\ || {e8edb60c-951e-4130-93dc-faf1ad25f8e7} (ID = 956095)
11:45: HKLM\software\microsoft\windows\currentversion\moduleusage\c:/windows/system32/msvcrt.dll\ || {fc87a650-207d-4392-a6a1-82adbc56fa64} (ID = 956096)
11:45: HKLM\software\microsoft\windows\currentversion\moduleusage\c:/windows/system32/olepro32.dll\ || {e8edb60c-951e-4130-93dc-faf1ad25f8e7} (ID = 956097)
11:45: HKLM\software\microsoft\windows\currentversion\moduleusage\c:/windows/system32/olepro32.dll\ || {fc87a650-207d-4392-a6a1-82adbc56fa64} (ID = 956098)
11:45: HKLM\software\microsoft\windows\currentversion\policies\explorer\run\ || wininet.dll (ID = 1497178)
11:45: Found Trojan Horse: mitglieder_trojan
11:45: HKU\S-1-5-21-506438728-1626635386-2531684854-1006\software\datetime\ (118 subtraces) (ID = 135123)
11:45: Registry Sweep Complete, Elapsed Time:00:00:24
11:45: Starting Cookie Sweep
11:45: Found Spy Cookie: clickbank cookie
11:45: stewart davis@clickbank[1].txt (ID = 2398)
11:45: Cookie Sweep Complete, Elapsed Time: 00:00:00
11:45: Starting File Sweep
13:00: muldist.inf (ID = 70204)
13:01: Warning: Invalid file - not a PKZip file
13:03: Warning: Invalid file - not a PKZip file
13:03: Warning: Invalid file - not a PKZip file
13:03: Warning: Invalid file - not a PKZip file
13:03: Warning: Invalid file - not a PKZip file
13:03: Warning: Invalid file - not a PKZip file
13:03: Warning: Invalid file - not a PKZip file
13:03: Warning: Invalid Stream
13:03: Warning: Invalid file - not a PKZip file
13:03: Warning: Invalid file - not a PKZip file
13:03: Warning: Invalid file - not a PKZip file
13:03: File Sweep Complete, Elapsed Time: 01:18:10
13:03: Full Sweep has completed. Elapsed time 01:23:12
13:03: Traces Found: 136
13:07: Removal process initiated
13:07: Quarantining All Traces: mitglieder_trojan
13:07: Quarantining All Traces: security2k hijacker
13:07: Quarantining All Traces: spyware quake fakealert
13:07: Quarantining All Traces: trojan-downloader-zlob
13:07: Quarantining All Traces: multidial
13:07: Quarantining All Traces: clickbank cookie
13:07: Warning: Timed out waiting for explorer.exe
13:07: Warning: Timed out waiting for explorer.exe
13:07: Warning: Launched explorer.exe
13:07: Warning: Quarantine process could not restart Explorer.
13:08: Preparing to restart your computer. Please wait...
13:08: Removal process completed. Elapsed time 00:01:26
13:15: Processing Startup Alerts
13:15: Removed Startup entry: TkBellExe
********
11:35: | Start of Session, 15 June 2006 |
11:35: Spy Sweeper started
11:36: Your spyware definitions have been updated.
11:40: | End of Session, 15 June 2006 |
Logfile of HijackThis v1.99.1
Scan saved at 22:51:43, on 19/06/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\SYSTEM32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\System32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\Program Files\ewido anti-malware\ewidoctrl.exe
C:\Program Files\ewido anti-malware\ewidoguard.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\Program Files\BillP Studios\WinPatrol\winpatrol.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\WINDOWS\System32\snmp.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
C:\WINDOWS\SYSTEM32\ZoneLabs\vsmon.exe
C:\WINDOWS\System32\wbem\wmiapsrv.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXE
C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Stewart Davis\Desktop\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
http://www.02.ie/
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
http://www.02.ie
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [WinPatrol] C:\Program Files\BillP Studios\WinPatrol\winpatrol.exe
O4 - HKLM\..\Run: [Zone Labs Client] C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
O4 - HKLM\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe" /startintray
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) -
http://go.microsoft....k/?linkid=39204
O16 - DPF: {193C772A-87BE-4B19-A7BB-445B226FE9A1} (ewidoOnlineScan Control) -
http://download.ewid...oOnlineScan.cab
O16 - DPF: {1ED48504-8834-11D5-AC75-0008C73FD642} (ProductView Express) - file://C:\Program Files\ProENGINEER Student Edition\i486_nt\obj\pvx_install.exe
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) -
http://update.micros...b?1147559256976
O20 - Winlogon Notify: WRNotifier - C:\WINDOWS\SYSTEM32\WRLogonNTF.dll
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido anti-malware\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido anti-malware\ewidoguard.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Webroot Spy Sweeper Engine (svcWRSSSDK) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\SYSTEM32\ZoneLabs\vsmon.exe