Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 18:28:27, on 29.3.2008 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v7.00 (7.00.6000.16608) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\Program Files\Ahead\InCD\InCDsrv.exe C:\WINDOWS\system32\ZoneLabs\vsmon.exe C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe C:\WINDOWS\system32\LEXBCES.EXE C:\WINDOWS\system32\LEXPPS.EXE C:\WINDOWS\system32\spoolsv.exe C:\Program Files\AntiVir PersonalEdition Classic\avguard.exe C:\Program Files\AntiVir PersonalEdition Classic\sched.exe C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe C:\WINDOWS\system32\Ati2evxx.exe C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindService.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\Explorer.EXE C:\Program Files\NetProject\scit.exe C:\Program Files\NetProject\sbmntr.exe C:\WINDOWS\vsnpstd3.exe C:\Program Files\NetProject\scm.exe C:\Program Files\AntiVir PersonalEdition Classic\avgnt.exe C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe C:\Program Files\NetProject\sbsm.exe C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe C:\Program Files\Lexmark 1200 Series\lxczbmgr.exe C:\Program Files\Ahead\InCD\InCD.exe C:\WINDOWS\system32\ctfmon.exe C:\Program Files\Lexmark 1200 Series\lxczbmon.exe C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe C:\Program Files\MSN Messenger\msnmsgr.exe C:\Program Files\PC Connectivity Solution\ServiceLayer.exe C:\Program Files\Rainlendar\Rainlendar.exe C:\Program Files\MSN Messenger\usnsvc.exe C:\Program Files\Internet Explorer\IEXPLORE.EXE C:\Program Files\Trend Micro\HijackThis\HijackThis.exe R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://home.sweetim.com R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Linkit O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll O2 - BHO: 375013 helper - {74F7DB6B-86E9-4B91-9D9F-B0D954D7AA5B} - C:\WINDOWS\system32\375013\375013.dll (file missing) O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll O2 - BHO: (no name) - {7C109800-A5D5-438F-9640-18D17E168B88} - C:\Program Files\NetProject\sbmdl.dll O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file) O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar3.dll O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.0.301.7164\swg.dll O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar3.dll O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe O4 - HKLM\..\Run: [snpstd3] C:\WINDOWS\vsnpstd3.exe O4 - HKLM\..\Run: [avgnt] "C:\Program Files\AntiVir PersonalEdition Classic\avgnt.exe" /min O4 - HKLM\..\Run: [ZoneAlarm Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe" O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe O4 - HKLM\..\Run: [SweetIM] C:\Program Files\Macrogaming\SweetIM\SweetIM.exe O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe" O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe" O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe -startup O4 - HKLM\..\Run: [Lexmark 1200 Series] "C:\Program Files\Lexmark 1200 Series\lxczbmgr.exe" O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k O4 - HKLM\..\Run: [InCD] C:\Program Files\Ahead\InCD\InCD.exe O4 - HKLM\..\Run: [F-Secure Manager] "C:\Program Files\F-Secure Internet Security\Common\FSM32.EXE" /splash O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe" O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe O4 - HKCU\..\Run: [updateMgr] "C:\Program Files\Adobe\Acrobat 7.0\Reader\AdobeUpdateManager.exe" AcRdB7_0_8 -reboot 1 O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background O4 - HKLM\..\Policies\Explorer\Run: [some] C:\Program Files\NetProject\scit.exe O4 - HKLM\..\Policies\Explorer\Run: [start] C:\Program Files\NetProject\sbmntr.exe O4 - HKUS\S-1-5-18\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'SYSTEM') O4 - HKUS\S-1-5-18\..\Run: [Nokia.PCSync] C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe /NoDialog (User 'SYSTEM') O4 - HKUS\S-1-5-18\..\Run: [Picasa Media Detector] C:\Program Files\Picasa2\PicasaMediaDetector.exe (User 'SYSTEM') O4 - HKUS\.DEFAULT\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'Default user') O4 - Startup: Rainlendar.lnk = C:\Program Files\Rainlendar\Rainlendar.exe O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe O8 - Extra context menu item: Vie Microsoft E&xceliin - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000 O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll O9 - Extra button: (no name) - {9034A523-D068-4BE8-A284-9DF278BE776E} - http://www.iefixgate.com/redirect.php (file missing) O9 - Extra 'Tools' menuitem: IE Anti-Spyware - {9034A523-D068-4BE8-A284-9DF278BE776E} - http://www.iefixgate.com/redirect.php (file missing) O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} (QuickTime Object) - http://a1540.g.akamai.net/7/1540/52/20061205/qtinstall.info.apple.com/qtactivex/qtplugin.cab O16 - DPF: {0F2F3121-75E2-4C60-9977-C1ADC3D5F3DC} (IFIUploader Control) - http://web01.ifi.fi/Webupload/app_support/ActiveX/IfiUploader.cab O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204 O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://by122fd.bay122.hotmail.msn.com/resources/MsnPUpld.cab O16 - DPF: {5C6698D9-7BE4-4122-8EC5-291D84DBD4A0} - http://upload.facebook.com/controls/FacebookPhotoUploader2.cab O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL O22 - SharedTaskScheduler: dustuck - {4a9e875b-d032-45e4-8294-789fe3be5b19} - (no file) O22 - SharedTaskScheduler: bimaculate - {d70e9b0f-aabc-4066-8176-c6de84d92fa1} - (no file) O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe O23 - Service: AntiVir PersonalEdition Classic Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\AntiVir PersonalEdition Classic\sched.exe O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - Avira GmbH - C:\Program Files\AntiVir PersonalEdition Classic\avguard.exe O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe O23 - Service: F-Secure Management Agent (FSMA) - Unknown owner - C:\Program Files\F-Secure Internet Security\Common\FSMA32.EXE (file missing) O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe O23 - Service: InCD Helper (InCDsrv) - Nero AG - C:\Program Files\Ahead\InCD\InCDsrv.exe O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE O23 - Service: ServiceLayer - Nokia. - C:\Program Files\PC Connectivity Solution\ServiceLayer.exe O23 - Service: StarWind iSCSI Service (StarWindService) - Rocket Division Software - C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindService.exe O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe -- End of file - 10738 bytes
Lataa Malwarebytes' Anti-Malware työpöydällesi. 1. Tuplaklikkaa mbam-setup.exe ja seuraa ohjeita asentaaksesi ohjelman. 2. Lopuksi varmistu, että seuraavat on valittu: Update Malwarebytes', Anti-Malwareja Launch Malwarebytes' Anti-Malware ja sen jälkeen klikkaaFinish. 3. Jos päivitys löytyy. ohjelma lataa ja asentaa uusimman version. 4. Kun ohjelma on latautunut, valitse Perform full scan ja klikkaa Scan. 5. Kun skanni on valmis, klikkaa OK ja sitten Show Results nähdäksesi tulokset. 6. Varmistu, että kaikki on merkitty ja klikkaa Remove Selected. 7. Tämän jälkeen loki avautuu muistioon. Tallenna se paikkaan, josta löydät sen helposti. Loki löytyy myös täältä: C:\Documents and Settings\Käyttäjänimi\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-päiväys.txt 8. Lähetä lokin sisältö seuraavassa viestissäsi. ============= Lataa SmitfraudFix (c) S!Ri Pura sisältö (kansio nimeltä SmitfraudFix) työpöydällesi: Avaa SmitfraudFix kansio ja tupla-klikkaa smitfraudfix.cmd Valitse optio #1 - Search kirjoittamalla 1 ja painamalla "Enter"; tekstitiedosto avautuu, joka listaa tarttuneet tiedostot (jos olemassa). Postita ponnahtava rapport – muistion sisältö viestiketjuusi. Löytyy myös C:\rapport.txt Huomaa : process.exe filun tunnistaa jotkut Anti-virus ohjelmat (AntiVir, Dr.Web, Kaspersky) "Haittakaluna"; se ei ole virus, vaan ohjelma joka pysäyttää prosesseja. A/V ohjelmat eivät pysty tunnistamaan hyvän ja pahan käytön tälläisten ohjelmian väliltä, silloin ne saattavat varoittaa käyttäjää.
Malwarebytes' Anti-Malware 1.09 Tietokantaversio: 568 Tarkistustyyppi: Täysi tarkistus (C:\|D:\|G:\|) Tarkistetut kohteet: 167798 Kulunut aika: 2 hour(s), 35 minute(s), 14 second(s) Saastuneita muistiprosesseja: 4 Saastuneita muistimoduuleja: 1 Saastuneita rekisteriavaimia: 20 Saastuneita rekisteriarvoja: 3 Saastuneita rekisterikohteita: 0 Saastuneita hakemistoja: 5 Saastuneita tiedostoja: 52 Saastuneita muistiprosesseja: c:\program files\netproject\sbmntr.exe (Trojan.Zlob) -> Unloaded process successfully. c:\program files\netproject\scm.exe (Trojan.Zlob) -> Unloaded process successfully. c:\program files\netproject\sbsm.exe (Trojan.Zlob) -> Unloaded process successfully. c:\program files\netproject\scit.exe (Trojan.Zlob) -> Unloaded process successfully. Saastuneita muistimoduuleja: c:\program files\netproject\sbmdl.dll (Trojan.Zlob) -> Unloaded module successfully. Saastuneita rekisteriavaimia: HKEY_CLASSES_ROOT\CLSID\{7c109800-a5d5-438f-9640-18d17e168b88} (Trojan.Zlob) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7c109800-a5d5-438f-9640-18d17e168b88} (Trojan.Zlob) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{9034a523-d068-4be8-a284-9df278be776e} (Trojan.Zlob) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{5d4348fb-df43-0334-69b8-dad6ca156781} (Rogue.MalwareCore) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{018fdba7-1999-415f-9bed-df47e0b818bd} (Rogue.MalwareCore) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{02d4863e-154f-40c3-9ff1-31f2f0f62a47} (Rogue.MalwareCore) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{5e4f85e7-e6ac-4bc3-8c04-0a62d65c4278} (Rogue.MalwareCore) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{852bac69-85c1-4e22-a9f5-4a6d9100b6a4} (Rogue.MalwareCore) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{d2dccd86-f9b5-49c4-b4e2-481df99e44ab} (Rogue.MalwareCore) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{ecfa7321-14d6-4b33-8106-273e71ed05e8} (Rogue.MalwareCore) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{daed9266-8c28-4c1c-8b58-5c66eff1d302} (Search.Hijack) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\e404.e404mgr.1 (Trojan.Zlob) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{74f7db6b-86e9-4b91-9d9f-b0d954d7aa5b} (Trojan.Zlob) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{74f7db6b-86e9-4b91-9d9f-b0d954d7aa5b} (Trojan.Zlob) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Trymedia Systems (Adware.Trymedia) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\NetProject (Trojan.Zlob) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Secure Browsing (Trojan.Zlob) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\E404.e404mgr (Trojan.BHO) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Video AX Object (Trojan.Zlob) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Messenger Service (Trojan.Zlob) -> Quarantined and deleted successfully. Saastuneita rekisteriarvoja: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\start (Trojan.Zlob) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\some (Trojan.Zlob) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{d70e9b0f-aabc-4066-8176-c6de84d92fa1} (Trojan.Zlob) -> Quarantined and deleted successfully. Saastuneita rekisterikohteita: (Haitallisia kohteita ei löydetty) Saastuneita hakemistoja: C:\Program Files\NetProject (Trojan.Zlob) -> Delete on reboot. C:\Program Files\Hotbar (Adware.Hotbar) -> Quarantined and deleted successfully. C:\Program Files\VirusProtectPro 3.4 (Rogue.VirusProtectPro) -> Quarantined and deleted successfully. C:\Program Files\MalwareCore 7.4 (Rogue.MalwareCore) -> Quarantined and deleted successfully. C:\WINDOWS\system32\375013 (Trojan.Zlob) -> Quarantined and deleted successfully. Saastuneita tiedostoja: c:\program files\netproject\sbmntr.exe (Trojan.Zlob) -> Quarantined and deleted successfully. c:\program files\netproject\scm.exe (Trojan.Zlob) -> Quarantined and deleted successfully. c:\program files\netproject\sbsm.exe (Trojan.Zlob) -> Quarantined and deleted successfully. c:\program files\netproject\scit.exe (Trojan.Zlob) -> Quarantined and deleted successfully. c:\program files\netproject\sbmdl.dll (Trojan.Zlob) -> Delete on reboot. C:\Program Files\NetProject\ot.ico (Trojan.Zlob) -> Quarantined and deleted successfully. C:\Program Files\NetProject\sbun.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\Program Files\NetProject\scu.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\Program Files\NetProject\ts.ico (Trojan.Zlob) -> Quarantined and deleted successfully. C:\Program Files\NetProject\waun.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\Program Files\Ahead\Nero\WaveEditor\AudioControl.ocx (Rogue.MalwareCore) -> Quarantined and deleted successfully. C:\Documents and Settings\Mikko\Local Settings\Temp\zfe2.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0165265.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0165266.dll (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0165267.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0165352.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0165353.dll (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0165354.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0166352.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0166353.dll (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0166354.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0166526.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0166527.dll (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0166528.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0166539.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0166540.dll (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0166541.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0166552.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0166553.dll (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0166554.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0166559.dll (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0166573.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0166574.dll (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0166575.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0166592.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0166593.dll (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP603\A0166594.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP604\A0166729.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP604\A0166736.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP604\A0166737.dll (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP604\A0166738.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP604\A0166751.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP604\A0166752.dll (Trojan.Zlob) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{F9836754-704A-4057-8F14-BF6EE5C3836B}\RP604\A0166753.exe (Trojan.Zlob) -> Quarantined and deleted successfully. C:\Program Files\VirusProtectPro 3.4\ignored.lst (Rogue.VirusProtectPro) -> Quarantined and deleted successfully. C:\Program Files\VirusProtectPro 3.4\vpp.ini (Rogue.VirusProtectPro) -> Quarantined and deleted successfully. C:\Program Files\MalwareCore 7.4\ignorelist.dat (Rogue.MalwareCore) -> Quarantined and deleted successfully. C:\Program Files\MalwareCore 7.4\MalwareCore 7.4.exe (Rogue.MalwareCore) -> Quarantined and deleted successfully. C:\Program Files\MalwareCore 7.4\MalwareCore.ini (Rogue.MalwareCore) -> Quarantined and deleted successfully. C:\Documents and Settings\All Users\Käynnistä-valikko\Online Security Guide.url (Rogue.Link) -> Quarantined and deleted successfully. C:\Documents and Settings\All Users\Käynnistä-valikko\Security Troubleshooting.url (Rogue.Link) -> Quarantined and deleted successfully. C:\Documents and Settings\Mikko\Suosikit\Online Security Test.url (Rogue.Link) -> Quarantined and deleted successfully.
SmitFraudFix v2.309 Scan done at 17:43:28,75, ma 31.03.2008 Run from C:\Documents and Settings\Jaana\Ty”p”yt„\SmitfraudFix\SmitfraudFix OS: Microsoft Windows XP [versio 5.1.2600] - Windows_NT The filesystem type is NTFS Fix run in normal mode »»»»»»»»»»»»»»»»»»»»»»»» Process C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\Program Files\Ahead\InCD\InCDsrv.exe C:\WINDOWS\system32\ZoneLabs\vsmon.exe C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe C:\WINDOWS\system32\LEXBCES.EXE C:\WINDOWS\system32\LEXPPS.EXE C:\WINDOWS\system32\spoolsv.exe C:\Program Files\AntiVir PersonalEdition Classic\avguard.exe C:\Program Files\AntiVir PersonalEdition Classic\sched.exe C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe C:\WINDOWS\system32\Ati2evxx.exe C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindService.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\Explorer.EXE C:\WINDOWS\vsnpstd3.exe C:\Program Files\AntiVir PersonalEdition Classic\avgnt.exe C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe C:\Program Files\Lexmark 1200 Series\lxczbmgr.exe C:\Program Files\Ahead\InCD\InCD.exe C:\Program Files\Lexmark 1200 Series\lxczbmon.exe C:\WINDOWS\system32\ctfmon.exe C:\Program Files\PC Connectivity Solution\ServiceLayer.exe C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe C:\Program Files\MSN Messenger\msnmsgr.exe C:\Program Files\Rainlendar\Rainlendar.exe C:\Program Files\Internet Explorer\IEXPLORE.EXE C:\Program Files\Lavasoft\Ad-Aware 2007\Ad-Aware2007.exe C:\WINDOWS\system32\cmd.exe »»»»»»»»»»»»»»»»»»»»»»»» hosts »»»»»»»»»»»»»»»»»»»»»»»» C:\ »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32 »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Jaana »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Jaana\Application Data »»»»»»»»»»»»»»»»»»»»»»»» Start Menu »»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\Jaana\Suosikit »»»»»»»»»»»»»»»»»»»»»»»» Desktop »»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files »»»»»»»»»»»»»»»»»»»»»»»» Corrupted keys »»»»»»»»»»»»»»»»»»»»»»»» Desktop Components [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0] "Source"="About:Home" "SubscribedURL"="About:Home" "FriendlyName"="Nykyinen kotisivu" »»»»»»»»»»»»»»»»»»»»»»»» IEDFix !!!Attention, following keys are not inevitably infected!!! IEDFix Credits: Malware Analysis & Diagnostic Code: S!Ri »»»»»»»»»»»»»»»»»»»»»»»» VACFix !!!Attention, following keys are not inevitably infected!!! VACFix Credits: Malware Analysis & Diagnostic Code: S!Ri »»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler !!!Attention, following keys are not inevitably infected!!! SrchSTS.exe by S!Ri Search SharedTaskScheduler's .dll [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler] "{4a9e875b-d032-45e4-8294-789fe3be5b19}"="dustuck" »»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs !!!Attention, following keys are not inevitably infected!!! [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows] "AppInit_DLLs"="" »»»»»»»»»»»»»»»»»»»»»»»» Winlogon !!!Attention, following keys are not inevitably infected!!! [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] "Userinit"="C:\\WINDOWS\\system32\\userinit.exe," "System"="" »»»»»»»»»»»»»»»»»»»»»»»» Rustock »»»»»»»»»»»»»»»»»»»»»»»» DNS Description: National Semiconductor DP83815-Based PCI Fast Ethernet Adapter - Paketinajoituksen miniportti DNS Server Search Order: 193.229.0.40 DNS Server Search Order: 193.229.0.42 HKLM\SYSTEM\CCS\Services\Tcpip\..\{29118C1B-9BB7-4799-85E8-11449122B55E}: DhcpNameServer=193.229.0.40 193.229.0.42 HKLM\SYSTEM\CCS\Services\Tcpip\..\{8DF83E3C-5918-4ADF-B5A8-367BABFAC69C}: DhcpNameServer=193.210.18.18 193.210.19.19 HKLM\SYSTEM\CCS\Services\Tcpip\..\{9D4E6B23-9AC0-4424-8FD7-DE70286971CC}: DhcpNameServer=193.210.18.18 193.210.19.19 HKLM\SYSTEM\CCS\Services\Tcpip\..\{B5F10B05-D0AA-44A0-AAE7-DE1B03A12AB3}: DhcpNameServer=193.210.18.18 193.210.19.19 HKLM\SYSTEM\CS1\Services\Tcpip\..\{29118C1B-9BB7-4799-85E8-11449122B55E}: DhcpNameServer=193.229.0.40 193.229.0.42 HKLM\SYSTEM\CS1\Services\Tcpip\..\{8DF83E3C-5918-4ADF-B5A8-367BABFAC69C}: DhcpNameServer=193.210.18.18 193.210.19.19 HKLM\SYSTEM\CS1\Services\Tcpip\..\{9D4E6B23-9AC0-4424-8FD7-DE70286971CC}: DhcpNameServer=193.210.18.18 193.210.19.19 HKLM\SYSTEM\CS1\Services\Tcpip\..\{B5F10B05-D0AA-44A0-AAE7-DE1B03A12AB3}: DhcpNameServer=193.210.18.18 193.210.19.19 HKLM\SYSTEM\CS3\Services\Tcpip\..\{29118C1B-9BB7-4799-85E8-11449122B55E}: DhcpNameServer=193.229.0.40 193.229.0.42 HKLM\SYSTEM\CS3\Services\Tcpip\..\{8DF83E3C-5918-4ADF-B5A8-367BABFAC69C}: DhcpNameServer=193.210.18.18 193.210.19.19 HKLM\SYSTEM\CS3\Services\Tcpip\..\{9D4E6B23-9AC0-4424-8FD7-DE70286971CC}: DhcpNameServer=193.210.18.18 193.210.19.19 HKLM\SYSTEM\CS3\Services\Tcpip\..\{B5F10B05-D0AA-44A0-AAE7-DE1B03A12AB3}: DhcpNameServer=193.210.18.18 193.210.19.19 HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=193.229.0.40 193.229.0.42 HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=193.229.0.40 193.229.0.42 HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=193.229.0.40 193.229.0.42 »»»»»»»»»»»»»»»»»»»»»»»» Scanning for wininet.dll infection »»»»»»»»»»»»»»»»»»»»»»»» End
Printtaa ohjeet ulos Käynnistä koneesi vikasietotilaan ja valitse tavallinen käyttäjätilisi. Vikasietotilaan: sammuta ja käynnistä käynnistyksen yhteydessä hakkaa F8 nappia valitse nuolinäppäimellä vikasietotila paina enter ja enter valitse käyttäjätilisi paina kyllä Jossakin koneissa hakataan F8:sin sijasta F5:tä Kun vikasietotilassa, avaa SmitfraudFix kansio ja tupla-klikkaa smitfraudfix.cmd Valitse optio #2 - Clean kirjoittamalla 2 ja painamalla "Enter" poistaaksesi tarttuneet tiedostot. Sinulta kysytään: "Registry cleaning - Do you want to clean the registry ?"; vastaa "Yes" kirjoittamalla Y ja paina "Enter" poistaaksesi työpöydän taustakuvan ja puhdistaaksesi tarttuneet rekisteriavaimet. Työkalu tarkistaa jos wininet.dll on tarttunut. Sinua saatetaan pyytää korvaamaan tarttunut .dll (jos löytyy); vastaa "Yes" kirjoittamalla Y ja painamalla "Enter". Työkalun saattaa tarvita käynnistää kone uudelleen; jos ei tee niin, käynnistä normaaliin Windowsiin. Tekstitiedosto ilmestyy, puhdistusprosessin jäljiltä; kopioi & liitä tämän raportin tulokset vastaukseesi. Raportti löytyy paikalliselta levyltäsi, useimmiten C:\rapport.txt. Varoitus : Ajamalla optio 2:n EI-tarttuneessa tietokoneessa, poistaa sinun työpöytäsi taustakuvan. ============= scannaa uusi hjt:n loki viimisenä