|
Answer» Below are my logs i have so far
Logfile of TREND Micro HijackThis v2.0.2 Scan SAVED at 12:34:44 AM, on 5/6/2009 Platform: Windows XP SP3 (WinNT 5.01.2600) MSIE: Internet EXPLORER v7.00 (7.00.6000.16827) Boot mode: Normal
Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\system32\spoolsv.exe C:\Program Files\Java\jre6\bin\jqs.exe C:\WINDOWS\Explorer.EXE C:\WINDOWS\system32\wscntfy.exe C:\Program Files\Java\jre6\bin\jusched.exe C:\WINDOWS\svcwinra.exe C:\WINDOWS\system32\ctfmon.exe C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe C:\WINDOWS\resfilter32.exe C:\Program Files\Internet Explorer\iexplore.exe C:\WINDOWS\system32\NOTEPAD.EXE C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe" O4 - HKLM\..\Run: [CTFMon] C:\WINDOWS\system32\CTF\ctfmon.exe O4 - HKLM\..\Run: [tcrinit] C:\WINDOWS\svcwinra.exe O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
-- End of file - 2914 bytes Malwarebytes' Anti-Malware 1.36 Database version: 2079 Windows 5.1.2600 Service Pack 3
5/5/2009 11:49:59 PM mbam-log-2009-05-05 (23-49-59).txt
Scan type: Full Scan (C:\|) Objects scanned: 120191 Time elapsed: 32 minute(s), 21 SECOND(s)
Memory Processes Infected: 0 Memory Modules Infected: 0 Registry Keys Infected: 9 Registry VALUES Infected: 0 Registry Data Items Infected: 0 Folders Infected: 2 Files Infected: 5
Memory Processes Infected: (No malicious items detected)
Memory Modules Infected: (No malicious items detected)
Registry Keys Infected: HKEY_CLASSES_ROOT\xml.xml (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\xml.xml.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Typelib\{a44b024a-ce32-4bda-0075-c799a4bff141} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\RegTool (Rogue.RegTool) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\RegTool (Rogue.RegTool) -> Quarantined and deleted successfully.
Registry Values Infected: (No malicious items detected)
Registry Data Items Infected: (No malicious items detected)
Folders Infected: C:\Documents and Settings\topi\Application Data\RegTool (Rogue.RegTool) -> Quarantined and deleted successfully. C:\Documents and Settings\topi\Application Data\RegTool\Logs (Rogue.RegTool) -> Quarantined and deleted successfully.
Files Infected: C:\Documents and Settings\topi\Local Settings\Temp\5783.exe (Rogue.Installer) -> Quarantined and deleted successfully. C:\Documents and Settings\topi\Application Data\RegTool\Logs\2009-03-17 21-20-220.log (Rogue.RegTool) -> Quarantined and deleted successfully. C:\WINDOWS\system32\E80Lr441.exe.a_a (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\Tasks\{5B57CF47-0BFA-43c6-ACF9-3B3653DCADBA}.job (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\Tasks\RegTool Scan.job (Rogue.RegTool) -> Quarantined and deleted successfully. SUPERAntiSpyware Scan Log http://www.superantispyware.com
Generated 05/06/2009 at 01:01 AM
Application Version : 4.26.1002
Core Rules Database Version : 3877 Trace Rules Database Version: 1825
Scan type : Complete Scan Total Scan Time : 00:41:22
Memory items scanned : 354 Memory threats detected : 2 Registry items scanned : 3541 Registry threats detected : 1 File items scanned : 28626 File threats detected : 22
Trojan.SVCWINRA C:\WINDOWS\SVCWINRA.EXE C:\WINDOWS\SVCWINRA.EXE C:\WINDOWS\RESFILTER32.EXE C:\WINDOWS\RESFILTER32.EXE [tcrinit] C:\WINDOWS\SVCWINRA.EXE
Adware.Tracking Cookie C:\Documents and Settings\topi\Cookies\[emailprotected][1].txt C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt C:\Documents and Settings\topi\Cookies\[emailprotected][1].txt C:\Documents and Settings\topi\Cookies\[emailprotected][1].txt C:\Documents and Settings\topi\Cookies\[emailprotected][1].txt C:\Documents and Settings\topi\Cookies\[emailprotected]dtech[1].txt C:\Documents and Settings\topi\Cookies\[emailprotected][1].txt C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt C:\Documents and Settings\topi\Cookies\[emailprotected][1].txt C:\Documents and Settings\topi\Cookies\[emailprotected][1].txt C:\Documents and Settings\topi\Cookies\[emailprotected][1].txt
Keylogger.Actual Spy C:\WINDOWS\system\actualspystart.lnk
|