tässä loki

Discussion in 'Virukset ja haittaohjelmat - HijackThis -logit' started by miksuu83, Mar 27, 2008.

  1. miksuu83

    miksuu83 Member

    Joined:
    Mar 27, 2008
    Messages:
    7
    Likes Received:
    0
    Trophy Points:
    11
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 21:24:44, on 27.3.2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.20696)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Sygate\SPF\smc.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    C:\Program Files\Alwil Software\Avast4\ashServ.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\WINDOWS\system32\oodag.exe
    C:\WINDOWS\system32\PnkBstrA.exe
    C:\WINDOWS\system32\PnkBstrB.exe
    C:\WINDOWS\System32\PAStiSvc.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    C:\WINDOWS\AGRSMMSG.exe
    C:\WINDOWS\system32\oodtray.exe
    C:\WINDOWS\system32\RUNDLL32.EXE
    C:\WINDOWS\ALCXMNTR.EXE
    C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
    C:\Program Files\Sonera\InternetAvustaja\bin\sprtcmd.exe
    C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    C:\WINDOWS\sysfbdgv.exe
    C:\WINDOWS\sysrswva.exe
    C:\WINDOWS\sysfdyev.exe
    C:\WINDOWS\sysjcyrq.exe
    C:\Program Files\SpyBurner\SpyBurner.exe
    C:\Program Files\SystemErrorFixer\SysRep.exe
    C:\Program Files\SystemErrorFixer\ucookw.exe
    C:\Program Files\Common Files\SystemErrorFixer\strpmon.exe
    C:\Program Files\DAEMON Tools\daemon.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\DOCUME~1\tomas\LOCALS~1\Temp\version_up.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    C:\WINDOWS\system32\wuauclt.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://g.msn.fi/0SEFIFI/SAOS01?FORM=TOOLBR
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://g.msn.fi/0SEFIFI/SAOS01?FORM=TOOLBR
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://g.msn.fi/0SEFIFI/SAOS01?FORM=TOOLBR
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://go.microsoft.com/fwlink/?LinkId=74005
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
    O2 - BHO: Windows Live Toolbar Helper - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
    O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
    O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
    O4 - HKLM\..\Run: [OODefragTray] C:\WINDOWS\system32\oodtray.exe
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
    O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE
    O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [Sonera] "C:\Program Files\Sonera\InternetAvustaja\bin\sprtcmd.exe" /P Sonera
    O4 - HKLM\..\Run: [SmcService] C:\PROGRA~1\Sygate\SPF\smc.exe -startgui
    O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    O4 - HKLM\..\Run: [{C2220120-1C24-4a79-BA7A-DDCBFC209DB3}] "C:\WINDOWS\sysfbdgv.exe"
    O4 - HKLM\..\Run: [{42562052-EE17-4197-82C7-91CB2E4B0666}] "C:\WINDOWS\sysrswva.exe"
    O4 - HKLM\..\Run: [{C599792D-C6D9-461d-93CA-B48BFF8E37B1}] "C:\WINDOWS\sysfdyev.exe"
    O4 - HKLM\..\Run: [{B3B48B54-C0EC-4705-8EE8-1981AEF656A7}] "C:\WINDOWS\sysjcyrq.exe"
    O4 - HKLM\..\Run: [SpyBurner] "C:\Program Files\SpyBurner\SpyBurner.exe"
    O4 - HKLM\..\Run: [SystemErrorFixer] C:\Program Files\SystemErrorFixer\SysRep.exe
    O4 - HKLM\..\Run: [cwriter] C:\Program Files\SystemErrorFixer\ucookw.exe
    O4 - HKLM\..\Run: [strpmon] "C:\Program Files\Common Files\SystemErrorFixer\strpmon.exe" dm=http://systemerrorfixer.com ad=http://systemerrorfixer.com sd=http://inspaid.systemerrorfixer.com
    O4 - HKLM\..\Run: [Salestart] "C:\Program Files\Common Files\SystemErrorFixer\strpmon.exe" dm=http://systemerrorfixer.com ad=http://systemerrorfixer.com sd=http://inspaid.systemerrorfixer.com
    O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
    O4 - HKCU\..\Run: [DAEMON Tools] "C:\Program Files\DAEMON Tools\daemon.exe" -lang 1033
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [AROReminder] C:\Program Files\Advanced Registry Optimizer\aro.exe -rem
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-19\..\RunOnce: [ShowDeskFix] regsvr32 /s /n /i:u shell32 (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-20\..\RunOnce: [ShowDeskFix] regsvr32 /s /n /i:u shell32 (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\S-1-5-18\..\RunOnce: [ShowDeskFix] regsvr32 /s /n /i:u shell32 (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    O4 - HKUS\.DEFAULT\..\RunOnce: [ShowDeskFix] regsvr32 /s /n /i:u shell32 (User 'Default user')
    O8 - Extra context menu item: &Windows Live Search - res://C:\Program Files\Windows Live Toolbar\msntb.dll/search.htm
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O20 - Winlogon Notify: Antiwpa - C:\WINDOWS\SYSTEM32\antiwpa.dll
    O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
    O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: O&O Defrag - O&O Software GmbH - C:\WINDOWS\system32\oodag.exe
    O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe
    O23 - Service: PnkBstrB - Unknown owner - C:\WINDOWS\system32\PnkBstrB.exe
    O23 - Service: ServiceLayer - Nokia. - C:\Program Files\PC Connectivity Solution\ServiceLayer.exe
    O23 - Service: Sygate Personal Firewall (SmcService) - Sygate Technologies, Inc. - C:\Program Files\Sygate\SPF\smc.exe
    O23 - Service: STI Simulator - Unknown owner - C:\WINDOWS\System32\PAStiSvc.exe

    --
    End of file - 9236 bytes
     
  2. Hujo

    Hujo Guest

    Lataa Malwarebytes' Anti-Malware työpöydällesi.

    1. Tuplaklikkaa mbam-setup.exe ja seuraa ohjeita asentaaksesi ohjelman.
    2. Lopuksi varmistu, että seuraavat on valittu: Update Malwarebytes', Anti-Malwareja
    Launch Malwarebytes' Anti-Malware ja sen jälkeen klikkaaFinish.
    3. Jos päivitys löytyy. ohjelma lataa ja asentaa uusimman version.
    4. Kun ohjelma on latautunut, valitse Perform full scan ja klikkaa Scan.
    5. Kun skanni on valmis, klikkaa OK ja sitten Show Results nähdäksesi tulokset.
    6. Varmistu, että kaikki on merkitty ja klikkaa Remove Selected.
    7. Tämän jälkeen loki avautuu muistioon. Tallenna se paikkaan, josta löydät sen helposti. Loki
    löytyy myös täältä: C:\Documents and Settings\Käyttäjänimi\Application
    Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-päiväys.txt
    8. Lähetä lokin sisältö seuraavassa viestissäsi.

    =========

    1.Lataa combofix.exe työpöydällesi yhdestä linkistä:
    combofix1
    combofix2

    2. Tuplaklikkaa combofix.exe tiedostoa ja seuraa ohjeistuksia.
    3. Kun työkalu on valmis, se tuottaa lokin. Lähetä tämä loki viesti ketjuusi.
    Huom! Älä klikkaile combofixin ikkunaa käytön aikana. Tämä saattaa aiheuttaa ohjelman jumiutumisen.

    =========

    Lataa SDFix by AndyManchesta ja tallenna se työpöydällesi.

    Käynnistä koneesi vikasietotilaan:

    sammuta ja käynnistä
    käynnistyksen yhteydessä hakkaa F8 nappia
    valitse nuolinäppäimellä vikasietotila
    paina enter ja enter
    valitse käyttäjätilisi
    paina kyllä

    Jossakin koneissa hakataan F8:sin sijasta F5:tä

    " Kun vikasietotilassa, pura tiedoston SDFix.zip sisältö (SDFix kansio) työpöydällesi. Työpöydälle pitäisi ilmestyä kansio nimeltä SDFix.
    " Avaa SDFix-kansio ja tuplaklikkaa tiedostoa RunThis.bat käynnistääksesi ohjelman.
    " Paina Y käynnistääksesi skriptin.
    " Työkalu puhdistaa troijalaisen palvelut ja tekee myös joitakin korjauksia rekisteriin. Lopuksi se pyytää käynnistämään koneen uudelleen, "Press any key to Reboot".
    " Paina mitä tahansa näppäintä ja kone käynnistyy uudelleen.
    " Käynnistyminen kestää normaalia kauemmin sillä SDFix puhdistaa konetta.
    " Kun kone on käynnistynyt ja työpöytä latautunut, SDFix kertoo että puhdistus on suoritettu, "Finished".
    " Paina sitten mitä tahansa näppäintä sulkeaksesi skriptin ja ladataksesi pikakuvakkeet työpöydälle.
    " Lopuksi avaa SDFix kansio (työpöydällä) ja kopioi & liitä tiedoston Report.txt sisältö viestiketjuusi uuden HijackThis:n lokin kera.
     
    Last edited by a moderator: Mar 28, 2008
  3. miksuu83

    miksuu83 Member

    Joined:
    Mar 27, 2008
    Messages:
    7
    Likes Received:
    0
    Trophy Points:
    11
    scannasin äsken läpi ja löytyi about 130 tiedostoa joissa oli jotain.laitoin remove selected ja katsoin,että kaikissa on ruksit.kun aloin poistamaan tuli joku teksti missä oli salli muokkaus tai kiellä muokkaus..laitoin salli muokkaus muutamaan kohtaan ja sitten tuli kysymys,että käynnistä restart jotain ja laitoin ok..sitten kun kone käynnistyi uudestaan ei päässytkään enään windowsiin..pääsin vikasietotilan kautta takaisin kuitenkin windowsiin.no scannasin äsken uudestaan läpi ja nyt oli vielä 55 tiedostoa joissa oli jotain..painanko taas remove selected niiden kohdalle ja mitä jos se kysyy taas,että salli tai kiellä muokkaus?mitäköhän siinä tapahtui kun windowsiin ei päässyt enään?..sori vähän kädetöntä touhua,mutta ei ole kokemusta tietokoneista paljoa..
     
  4. miksuu83

    miksuu83 Member

    Joined:
    Mar 27, 2008
    Messages:
    7
    Likes Received:
    0
    Trophy Points:
    11
    joo tässä lokini
    Malwarebytes' Anti-Malware 1.09
    Database version: 560

    Scan type: Full Scan (C:\|D:\|H:\|I:\|J:\|)
    Objects scanned: 70283
    Time elapsed: 13 minute(s), 46 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 1
    Registry Keys Infected: 6
    Registry Values Infected: 5
    Registry Data Items Infected: 0
    Folders Infected: 10
    Files Infected: 33

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    C:\WINDOWS\system32\antiwpa.dll (Malware.Tool) -> Unloaded module successfully.

    Registry Keys Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\antiwpa (Malware.Tool) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\Software\SpyBurner (Rogue.SpyBurner) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\spyburner_is1 (Rogue.SpyBurner) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\Software\NetProject (Trojan.Zlob) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Classes\videoPl.chl (Trojan.Zlob) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\Software\Sammsoft (Rogue.Advanced.Registry.Optimizer) -> Quarantined and deleted successfully.

    Registry Values Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{c2220120-1c24-4a79-ba7a-ddcbfc209db3} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{b3b48b54-c0ec-4705-8ee8-1981aef656a7} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{42562052-ee17-4197-82c7-91cb2e4b0666} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SpyBurner (Rogue.SpyBurner) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{C599792D-C6D9-461d-93CA-B48BFF8E37B1} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    C:\Program Files\Advanced Registry Optimizer (Rogue.Advanced.Registry.Optimizer) -> Quarantined and deleted successfully.
    C:\Program Files\SpyBurner (Rogue.SpyBurner) -> Quarantined and deleted successfully.
    C:\Program Files\SpyBurner\Languages (Rogue.SpyBurner) -> Quarantined and deleted successfully.
    C:\Program Files\SpyBurner\Reports (Rogue.SpyBurner) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Start Menu\Programs\Advanced Registry Optimizer (Rogue.Advanced.Registry.Optimizer) -> Quarantined and deleted successfully.
    C:\Documents and Settings\tomas\Application Data\Sammsoft (Rogue.Advanced.Registry.Optimizer) -> Quarantined and deleted successfully.
    C:\Documents and Settings\tomas\Application Data\Sammsoft\Advanced Registry Optimizer (Rogue.Advanced.Registry.Optimizer) -> Quarantined and deleted successfully.
    C:\Documents and Settings\tomas\Application Data\Sammsoft\Advanced Registry Optimizer\Version 50 (Rogue.Advanced.Registry.Optimizer) -> Quarantined and deleted successfully.
    C:\Documents and Settings\tomas\Application Data\Sammsoft\Advanced Registry Optimizer\Version 50\Partial Backups (Rogue.Advanced.Registry.Optimizer) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Start Menu\Programs\SpyBurner (Rogue.SpyBurner) -> Quarantined and deleted successfully.

    Files Infected:
    C:\Program Files\Advanced Registry Optimizer\ARO.exe (Rogue.Advanced.Registry.Optimizer) -> Quarantined and deleted successfully.
    C:\Program Files\Advanced Registry Optimizer\AROSS.dll (Rogue.Advanced.Registry.Optimizer) -> Quarantined and deleted successfully.
    C:\Program Files\Advanced Registry Optimizer\CheckForV4.dll (Rogue.Advanced.Registry.Optimizer) -> Quarantined and deleted successfully.
    C:\Program Files\Advanced Registry Optimizer\CleanSchedule.exe (Rogue.Advanced.Registry.Optimizer) -> Quarantined and deleted successfully.
    C:\Program Files\Advanced Registry Optimizer\EmailAddressCapture.hta (Rogue.Advanced.Registry.Optimizer) -> Quarantined and deleted successfully.
    C:\Program Files\Advanced Registry Optimizer\soref.dll (Rogue.Advanced.Registry.Optimizer) -> Quarantined and deleted successfully.
    C:\Program Files\Advanced Registry Optimizer\unins000.exe (Rogue.Advanced.Registry.Optimizer) -> Quarantined and deleted successfully.
    C:\Program Files\Advanced Registry Optimizer\uninstall.hta (Rogue.Advanced.Registry.Optimizer) -> Quarantined and deleted successfully.
    C:\Program Files\SpyBurner\kp.exe (Rogue.SpyBurner) -> Quarantined and deleted successfully.
    C:\Program Files\SpyBurner\SpyBurner.exe (Rogue.SpyBurner) -> Quarantined and deleted successfully.
    C:\Program Files\SpyBurner\unins000.exe (Rogue.SpyBurner) -> Quarantined and deleted successfully.
    C:\Program Files\SpyBurner\Languages\English.ini (Rogue.SpyBurner) -> Quarantined and deleted successfully.
    C:\Program Files\SpyBurner\Languages\German.ini (Rogue.SpyBurner) -> Quarantined and deleted successfully.
    C:\Program Files\SpyBurner\Languages\Spanish.ini (Rogue.SpyBurner) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Start Menu\Programs\Advanced Registry Optimizer\Advanced Registry Optimizer.lnk (Rogue.Advanced.Registry.Optimizer) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Start Menu\Programs\Advanced Registry Optimizer\Uninstall Advanced Registry Optimizer.lnk (Rogue.Advanced.Registry.Optimizer) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Start Menu\Programs\SpyBurner\SpyBurner Online Support.lnk (Rogue.SpyBurner) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Start Menu\Programs\SpyBurner\SpyBurner.lnk (Rogue.SpyBurner) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Start Menu\Programs\SpyBurner\Uninstall SpyBurner.lnk (Rogue.SpyBurner) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\antiwpa.dll (Malware.Tool) -> Delete on reboot.
    C:\WINDOWS\sysxrdpw.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\WINDOWS\sysrswva.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\WINDOWS\sysjcyrq.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\WINDOWS\sysfdyev.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\WINDOWS\sysfbdgv.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\WINDOWS\gwgzcy.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\WINDOWS\gvwjxr.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\WINDOWS\gntkqu.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\WINDOWS\gmucjk.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\tomas\Desktop\SpyBurner.lnk (Rogue.SpyBurner) -> Quarantined and deleted successfully.
    C:\Documents and Settings\tomas\Application Data\Microsoft\Internet Explorer\Quick Launch\SpyBurner.lnk (Rogue.SpyBurner) -> Quarantined and deleted successfully.
    C:\Documents and Settings\tomas\Desktop\Check PC For Errors.lnk (Rogue.Link) -> Quarantined and deleted successfully.
    C:\Documents and Settings\tomas\Application Data\Microsoft\Internet Explorer\Quick Launch\Check PC For Errors.lnk (Rogue.Link) -> Quarantined and deleted successfully.
     
  5. Hujo

    Hujo Guest

    Jatka vain lista lävitse.
     
  6. miksuu83

    miksuu83 Member

    Joined:
    Mar 27, 2008
    Messages:
    7
    Likes Received:
    0
    Trophy Points:
    11
    laitoin sen combofixin ja sit tuli vaan jotain harmaata..käynnistin koneen uudestaan ja nyt taustalta on poistunut se varaitus missä varoitettiin spywaresta.enään ei myöskään kone ilmoita,että computer is infected..onkohan se virus lähtenyt pois?tarviiko noi loputkin ohjelmat vielä ajaa?
     
  7. Hujo

    Hujo Guest

    Juu juu aja ne lävitse.
     
    Last edited by a moderator: Mar 29, 2008
  8. miksuu83

    miksuu83 Member

    Joined:
    Mar 27, 2008
    Messages:
    7
    Likes Received:
    0
    Trophy Points:
    11
    tässä loki
    SDFix: Version 1.166

    Run by tomas on 2008-04-06 at 11:52

    Microsoft Windows XP [Version 5.1.2600]
    Running From: C:\SDFix

    Checking Services :


    Restoring Windows Registry Values
    Restoring Windows Default Hosts File

    Rebooting


    Checking Files :

    No Trojan Files Found






    Removing Temp Files

    ADS Check :



    Final Check :

    catchme 0.3.1344.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-04-06 12:09:19
    Windows 5.1.2600 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden services & system hive ...

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg]
    "s1"=dword:2df9c43f
    "s2"=dword:110480d0
    "h0"=dword:00000001

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
    "p0"="C:\Program Files\DAEMON Tools\"
    "h0"=dword:00000000
    "khjeh"=hex:32,c5,4a,31,7c,97,8b,c0,8b,39,33,36,42,b6,8f,7d,68,16,6d,fb,fe,..

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001]
    "a0"=hex:20,01,00,00,39,b2,a0,fc,96,86,f4,92,59,1c,c2,16,c7,b9,60,c0,0f,..
    "khjeh"=hex:10,6a,5a,9b,87,e5,b9,5e,87,d6,9e,0e,9c,bb,4d,57,11,8b,a6,f8,48,..

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40]
    "khjeh"=hex:33,6a,f8,06,1a,07,47,ba,7b,de,c6,ce,59,7e,ea,a6,84,95,65,96,72,..

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf41]
    "khjeh"=hex:2f,68,ad,cd,a0,f1,83,38,a3,7e,29,31,e4,9b,e7,c4,be,5b,88,3b,3e,..

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf42]
    "khjeh"=hex:65,f5,80,7a,4b,63,43,1d,2d,5b,de,28,c7,b4,88,3d,e7,c5,ef,4e,a8,..
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
    "p0"="C:\Program Files\DAEMON Tools\"
    "h0"=dword:00000000
    "khjeh"=hex:32,c5,4a,31,7c,97,8b,c0,8b,39,33,36,42,b6,8f,7d,68,16,6d,fb,fe,..

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001]
    "a0"=hex:20,01,00,00,39,b2,a0,fc,96,86,f4,92,59,1c,c2,16,c7,b9,60,c0,0f,..
    "khjeh"=hex:10,6a,5a,9b,87,e5,b9,5e,87,d6,9e,0e,9c,bb,4d,57,11,8b,a6,f8,48,..

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40]
    "khjeh"=hex:33,6a,f8,06,1a,07,47,ba,7b,de,c6,ce,59,7e,ea,a6,84,95,65,96,72,..

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf41]
    "khjeh"=hex:2f,68,ad,cd,a0,f1,83,38,a3,7e,29,31,e4,9b,e7,c4,be,5b,88,3b,3e,..

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf42]
    "khjeh"=hex:65,f5,80,7a,4b,63,43,1d,2d,5b,de,28,c7,b4,88,3d,e7,c5,ef,4e,a8,..

    scanning hidden registry entries ...

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\System]
    "OODEFRAG10.00.00.01WORKSTATION"="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"
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
    "AppInit_DLLs"=""
    "DeviceNotSelectedTimeout"="15"
    "GDIProcessHandleQuota"=dword:00002710
    "Spooler"="yes"
    "swapdisk"=""
    "TransmissionRetryTimeout"="90"
    "USERProcessHandleQuota"=dword:00002710
    "NoPopUpsOnBoot"=dword:00000001

    scanning hidden files ...


    scan completed successfully
    hidden processes: 0
    hidden services: 0
    hidden files: 103


    Remaining Services :



    Authorized Application Key Export:

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:mad:xpsp3res.dll,-20000"
    "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:mad:xpsp2res.dll,-22019"
    "C:\\Documents and Settings\\tomas\\Desktop\\utorrent.exe"="C:\\Documents and Settings\\tomas\\Desktop\\utorrent.exe:*:Enabled:æTorrent"
    "C:\\Program Files\\Messenger\\msmsgs.exe"="C:\\Program Files\\Messenger\\msmsgs.exe:*:Enabled:Windows Messenger"
    "C:\\Program Files\\Nokia\\Nokia Software Updater\\nsu_ui_client.exe"="C:\\Program Files\\Nokia\\Nokia Software Updater\\nsu_ui_client.exe:*:Enabled:Nokia Software Updater"
    "C:\\Program Files\\Common Files\\Nokia\\Service Layer\\A\\nsl_host_process.exe"="C:\\Program Files\\Common Files\\Nokia\\Service Layer\\A\\nsl_host_process.exe:*:Enabled:Nokia Service Layer Host Process "
    "C:\\WINDOWS\\system32\\PnkBstrA.exe"="C:\\WINDOWS\\system32\\PnkBstrA.exe:*:Enabled:pnkBstrA"
    "C:\\WINDOWS\\system32\\PnkBstrB.exe"="C:\\WINDOWS\\system32\\PnkBstrB.exe:*:Enabled:pnkBstrB"
    "C:\\Program Files\\eMule\\eMule.exe"="C:\\Program Files\\eMule\\eMule.exe:*:Disabled:eMule Plus"
    "C:\\Program Files\\uTorrent\\uTorrent.exe"="C:\\Program Files\\uTorrent\\uTorrent.exe:*:Enabled:æTorrent"
    "C:\\Program Files\\Internet Explorer\\iexplore.exe"="C:\\Program Files\\Internet Explorer\\iexplore.exe:*:Disabled:Internet Explorer"

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:mad:xpsp3res.dll,-20000"
    "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:mad:xpsp2res.dll,-22019"
    "C:\\Program Files\\MSN Messenger\\msnmsgr.exe"="C:\\Program Files\\MSN Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger 8.1"
    "C:\\Program Files\\MSN Messenger\\livecall.exe"="C:\\Program Files\\MSN Messenger\\livecall.exe:*:Enabled:Windows Live Messenger 8.1 (Phone)"

    Remaining Files :


    File Backups: - C:\SDFix\backups\backups.zip

    Files with Hidden Attributes :


    Finished!

     
  9. Hujo

    Hujo Guest

    scannaa uusi hjt:n loki
     

Share This Page