WiredWX Christian Hobby Weather Tools
Would you like to react to this message? Create an account in a few clicks or log in to continue.

WiredWX Christian Hobby Weather ToolsLog in

 


descriptionInfected with Win32/Cryptor EmptyInfected with Win32/Cryptor

more_horiz
I have recently scanned with avg and it showed that i have a virus called Win32/Cryptor. iexplore.exe runs in the background, and when i end the process it comes back up a few minutes later. Also, usb mass storage devices don't work on my computer. Device manager lists it, but doesn't show up in disk management.

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 1:03:00 PM, on 5/9/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18241)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
G:\AVG8~1\avgwdsvc.exe
G:\AVG8~1\avgfws8.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Mediafour\iPod\M4iPodWPDService.exe
C:\Program Files\Mediafour\MacDrive 7\MacDriveService.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
G:\AVG8~1\avgam.exe
G:\AVG8~1\avgrsx.exe
G:\AVG8~1\avgnsx.exe
C:\PROGRA~1\COMMON~1\Stardock\SDMCP.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ctfmon.exe
G:\AVG8~1\avgtray.exe
G:\Wizet\MapleStory\HI\Safari\Safari.exe
C:\Program Files\Internet Explorer\Iexplore.exe
C:\Program Files\Internet Explorer\Iexplore.exe
C:\WINDOWS\system32\wuauclt.exe
G:\Backup\HiJack(GP)This.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.plusnetwork.com
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - G:\AVG 8\avgssie.dll
O2 - BHO: Click-to-Call BHO - {5C255C8A-E604-49b4-9D64-90988571CECB} - C:\Program Files\Windows Live\Messenger\wlchtc.dll
O4 - HKLM\..\Run: [AVG8_TRAY] G:\AVG8~1\avgtray.exe
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKUS\S-1-5-18\..\RunOnce: [RunNarrator] Narrator.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\RunOnce: [RunNarrator] Narrator.exe (User 'Default user')
O8 - Extra context menu item: Append Link Target to Existing PDF - res://C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Append to Existing PDF - res://C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert Link Target to Adobe PDF - res://C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert to Adobe PDF - res://C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://G:\Wizet\MAPLES~1\HI\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cab
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - G:\AVG 8\avgpp.dll
O20 - AppInit_DLLs: acaptuser32.dll
O20 - Winlogon Notify: avgrsstarter - C:\WINDOWS\SYSTEM32\avgrsstx.dll
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: AVG8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - G:\AVG8~1\avgwdsvc.exe
O23 - Service: AVG8 Firewall (avgfws8) - AVG Technologies CZ, s.r.o. - G:\AVG8~1\avgfws8.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: M4iPodWPDService - Mediafour Corporation - C:\Program Files\Common Files\Mediafour\iPod\M4iPodWPDService.exe
O23 - Service: MacDrive service (MacDriveService) - Mediafour Corporation - C:\Program Files\Mediafour\MacDrive 7\MacDriveService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Pml Driver HPH11 - HP - C:\WINDOWS\System32\HPHipm11.exe

--
End of file - 4837 bytes

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
1. Please download The Avenger by Swandog46 to your Desktop
Link: HERE or HERE.

  • Click on Avenger.zip to open the file
  • Extract avenger.exe to your desktop

Note: This tool was posted specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


2. Now, start The Avenger program by clicking on its icon on your desktop.

  • Leave the script box empty.
  • Leave the ticked box "Scan for rootkit" ticked.
  • Then tick "Disable any rootkits found"
  • Now click on the Execute to begin execution of the script.
  • Answer "Yes" twice when prompted.

    The Avenger will automatically do the following:

  • It will Restart your computer.
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
3. Please copy/paste the content of c:\avenger.txt into your reply.

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
After the reboot, avg caught some infected files, but there was an error removing them

Logfile of The Avenger Version 2.0, (c) by Swandog46
http://swandog46.geekstogo.com

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.

Hidden driver "UACd.sys" found!
ImagePath: \systemroot\system32\drivers\UACebdeulha.sys
Driver disabled successfully.

Rootkit scan completed.


Completed script processing.

*******************

Finished! Terminate.

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
1. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+C):


Drivers to delete:
UACd.sys

Files to delete:
C:\WINDOWS\system32\drivers\UACebdeulha.sys


Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


2. Now, start The Avenger program by clicking on its icon on your desktop.

  • Under "Input script here:", paste in the script from the quote box above.
  • Leave the ticked box "Scan for rootkit" ticked.
  • Then tick "Disable any rootkits found"
  • Now click on the Execute to begin execution of the script.
  • Answer "Yes" twice when prompted.

    The Avenger will automatically do the following:

  • It will Restart your computer.
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
3. Please copy/paste the content of c:\avenger.txt into your reply.

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
Logfile of The Avenger Version 2.0, (c) by Swandog46
http://swandog46.geekstogo.com

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!

Driver "UACd.sys" deleted successfully.
File "C:\WINDOWS\system32\drivers\UACebdeulha.sys" deleted successfully.

Completed script processing.

*******************

Finished! Terminate.

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz

  • Open HijackThis
  • Choose "Do a system scan only"
  • Check the boxes in front of these lines:


    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.plusnetwork.com
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O20 - AppInit_DLLs: acaptuser32.dll



  • Press "Fix Checked"
  • Close Hijack This.




Please download and run this tool.

Download Malwarebytes' Anti-Malware from Here

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.


Post the contents of the MBAM Log.

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
Malwarebytes' Anti-Malware 1.36
Database version: 2100
Windows 5.1.2600 Service Pack 3

5/9/2009 2:21:16 PM
mbam-log-2009-05-09 (14-21-16).txt

Scan type: Quick Scan
Objects scanned: 120954
Time elapsed: 8 minute(s), 11 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 2
Files Infected: 21

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\UID (Malware.Trace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\save (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\twain32 (Backdoor.Bot) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\UACvcjyepir.dll (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\Program Files\save\record_00.sav (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\Program Files\save\record_10.sav (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\twain32\local.ds.rmv (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\twain32\user.ds.lll.rmv (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\twain32\user.ds.rmv (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\Explorer1.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\RWBomb.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Program Files\RWDisc.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Program Files\RWGold.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Program Files\RWGuess.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Program Files\RWNum.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Program Files\RWRab.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Program Files\RWRiv.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Program Files\RWSho.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Program Files\setup.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\UACdualplcj.log (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\UACfyevmlxo.dat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\UACrpxbcrjg.log (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\UACtydrtyky.dll (Trojan.Agent) -> Quarantined and deleted successfully.

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz

  • Please download DDS by sUBs to your Desktop (Important!!) from one of these locations:
    Link 1
    Link 2
  • Double click DDS.scr to run
  • When complete, two logs will open. Save both of the report to your Desktop.
  • Copy and paste DDS.txt back here, I don't need to see attach.txt.

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
DDS (Ver_09-03-16.01) - NTFSx86
Run by Hi at 14:35:23.95 on Sat 05/09/2009
Internet Explorer: 8.0.6001.18241 BrowserJavaVersion: 1.6.0_13
Microsoft Windows XP Professional 5.1.2600.3.1252.2.1033.18.767.267 [GMT -4:00]

AV: AVG Internet Security *On-access scanning enabled* (Updated)
FW: AVG Firewall *disabled*

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\COMMON~1\Stardock\SDMCP.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
G:\AVG8~1\avgwdsvc.exe
C:\WINDOWS\Explorer.EXE
G:\AVG8~1\avgfws8.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Mediafour\iPod\M4iPodWPDService.exe
C:\Program Files\Mediafour\MacDrive 7\MacDriveService.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe -k imgsvc
G:\AVG8~1\avgam.exe
G:\AVG8~1\avgrsx.exe
G:\AVG8~1\avgnsx.exe
G:\AVG8~1\avgtray.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\WINDOWS\system32\NOTEPAD.EXE
G:\Wizet\MapleStory\HI\Safari\Safari.exe
G:\Backup\dds.scr

============== Pseudo HJT Report ===============

mStart Page = about:blank
mSearchAssistant = hxxp://www.google.com/ie
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - g:\avg 8\avgssie.dll
BHO: Click-to-Call BHO: {5c255c8a-e604-49b4-9d64-90988571cecb} - c:\program files\windows live\messenger\wlchtc.dll
TB: Adobe PDF: {47833539-d0c5-4125-9fa8-0819e2eaac93} - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [msnmsgr] "c:\program files\windows live\messenger\msnmsgr.exe" /background
mRun: [AVG8_TRAY] g:\avg8~1\avgtray.exe
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
dRunOnce: [RunNarrator] Narrator.exe
IE: Append Link Target to Existing PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Append to Existing PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert Link Target to Adobe PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert to Adobe PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIECapture.html
IE: E&xport to Microsoft Excel - g:\wizet\maples~1\hi\micros~2\office12\EXCEL.EXE/3000
IE: {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/8/b/d/8bd77752-5704-4d68-a152-f7252adaa4f2/LegitCheckControl.cab
DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} - hxxp://download.bitdefender.com/resources/scan8/oscan8.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - g:\avg 8\avgpp.dll
Notify: avgrsstarter - avgrsstx.dll
Notify: MCPClient - c:\progra~1\common~1\stardock\mcpstub.dll
SSODL: 0aMCPClient - {F5DF91F9-15E9-416B-A7C3-7519B11ECBFC} - c:\progra~1\common~1\stardock\MCPCore.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - g:\wizet\maplestory\hi\microsoft office enterprise 2007\office12\GrooveShellExtensions.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\hi\applic~1\mozilla\firefox\profiles\hx9ywwka.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.plusnetwork.com
FF - component: g:\avg 8\firefox\components\avgssff.dll
FF - plugin: c:\program files\google\google updater\2.4.1536.6592\npCIDetect13.dll
FF - plugin: c:\program files\microsoft\office live\npOLW.dll
FF - HiddenExtension: XUL Cache: {D67D3FBB-146C-47B2-8FF2-48C145244376} - c:\documents and settings\timmy simons\local settings\application data\{D67D3FBB-146C-47B2-8FF2-48C145244376}
FF - HiddenExtension: XUL Cache: {D5CFFD77-5A03-4CAA-AF47-80ED8E998942} - c:\documents and settings\rykin\local settings\application data\{D5CFFD77-5A03-4CAA-AF47-80ED8E998942}
FF - HiddenExtension: XUL Cache: {ADA85526-EEAD-4418-A418-58B356971096} - c:\documents and settings\hi\local settings\application data\{ada85526-eead-4418-a418-58b356971096}\

============= SERVICES / DRIVERS ===============

R0 AvgRkx86;avgrkx86.sys;c:\windows\system32\drivers\avgrkx86.sys [2009-3-20 12552]
R0 MDFSYSNT;MacDrive file system driver;c:\windows\system32\drivers\MDFSYSNT.SYS [2008-7-22 288768]
R0 MDPMGRNT;MacDrive partition driver;c:\windows\system32\drivers\MDPMGRNT.sys [2007-2-28 19072]
R0 PQV2i;PQV2i;c:\windows\system32\drivers\PQV2i.sys [2004-7-29 138801]
R1 AvgLdx86;AVG AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2009-3-20 325896]
R1 AvgMfx86;AVG On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2009-3-20 27784]
R1 AvgTdiX;AVG8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2009-3-20 108552]
R1 Ext2fs;Ext2fs;c:\windows\system32\drivers\ext2fs.sys [2008-9-17 179584]
R1 IfsMount;IfsMount;c:\windows\system32\drivers\ifsmount.sys [2008-9-17 49536]
R1 oreans32;oreans32;c:\windows\system32\drivers\oreans32.sys [2007-9-8 33824]
R1 PQIMount;PQIMount;c:\windows\system32\drivers\PQIMount.sys [2004-7-29 46800]
R2 avg8wd;AVG8 WatchDog;g:\avg8~1\avgwdsvc.exe [2009-3-20 298776]
R2 avgfws8;AVG8 Firewall;g:\avg8~1\avgfws8.exe [2009-4-29 1366904]
R2 M4iPodWPDService;M4iPodWPDService;c:\program files\common files\mediafour\ipod\M4iPodWPDService.exe [2008-1-23 114688]
R2 MacDriveService;MacDrive service;c:\program files\mediafour\macdrive 7\MacDriveService.exe [2008-5-2 150528]
R3 Avgfwdx;Avgfwdx;c:\windows\system32\drivers\avgfwdx.sys [2009-3-20 29208]
S0 cfadisk;CompactFlash Filter Driver;c:\windows\system32\drivers\cfadisk.sys [2008-10-31 3712]
S2 IcRecUsb;IC Recorder Driver;c:\windows\system32\drivers\IcRecUsb.sys [2008-11-11 17432]
S3 Avgfwfd;AVG network filter service;c:\windows\system32\drivers\avgfwdx.sys [2009-3-20 29208]
S3 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [2007-11-6 34064]
S3 npkycryp;npkycryp;\??\g:\finalstory\npkycryp.sys --> g:\finalstory\npkycryp.sys [?]

=============== Created Last 30 ================


==================== Find3M ====================

2009-04-29 21:18 11,952 a------- c:\windows\system32\avgrsstx.dll
2009-04-29 21:18 325,896 a------- c:\windows\system32\drivers\avgldx86.sys
2009-04-29 21:17 50,968 a------- c:\windows\system32\avgfwdx.dll
2009-04-29 21:17 29,208 a------- c:\windows\system32\drivers\avgfwdx.sys
2009-04-29 21:17 12,552 a------- c:\windows\system32\drivers\avgrkx86.sys
2009-04-29 21:17 108,552 a------- c:\windows\system32\drivers\avgtdix.sys
2009-04-14 20:46 15,440 a------- c:\windows\system32\drivers\hamachi.sys
2009-03-21 22:18 93,492 a---h--- c:\windows\system32\mlfcache.dat
2009-03-09 05:19 410,984 a------- c:\windows\system32\deploytk.dll
2009-02-27 12:55 111,992 a------- c:\windows\system32\acaptuser32.dll
2009-01-30 16:28 8 -c--h--- c:\program files\wiimiistat.dat
2006-08-22 18:40 76 ac------ c:\program files\gameinfo.bin
2006-08-22 18:17 354 ac------ c:\program files\errlog.txt
2006-08-16 21:27 565 a------- c:\program files\uninstall.lnk
2006-08-16 21:25 3,262 -c------ c:\program files\uninstall.ico
2004-11-19 04:22 9,044,298 -c------ c:\program files\r7plus.dll
2004-11-19 04:17 1,424,384 -c------ c:\program files\r7plus.exe
2004-11-17 16:13 15,787,724 -c------ c:\program files\R7plus.msi
2004-11-17 08:13 494,260,334 ac------ c:\program files\texture.pck
2004-11-17 03:34 56,762,267 ac------ c:\program files\map.pck
2004-11-17 02:47 6,055,046 ac------ c:\program files\model.pck
2004-11-04 10:26 169,810,418 ac------ c:\program files\sound.pck
2003-02-13 19:47 377,856 ac------ c:\program files\binkw32.dll
2002-07-21 19:17 349,696 ac------ c:\program files\mss32.dll
1999-07-06 20:00 6 -c-shr-- c:\windows\@@desktop.dat
2006-05-03 06:06 163,328 ---shr-- c:\windows\system32\flvDX.dll
2007-02-21 07:47 31,232 ---shr-- c:\windows\system32\msfDX.dll
2008-03-16 09:30 216,064 ---shr-- c:\windows\system32\nbDX.dll
2008-09-11 19:13 32,768 ac-sh--- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008091120080912\index.dat

============= FINISH: 14:36:21.46 ===============

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
Hello the DDS log is incomplete, the "created last 30" part was removed, can you please do a new scan and post it.

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
DDS (Ver_09-03-16.01) - NTFSx86
Run by Hi at 14:52:19.50 on Sat 05/09/2009
Internet Explorer: 8.0.6001.18241 BrowserJavaVersion: 1.6.0_13
Microsoft Windows XP Professional 5.1.2600.3.1252.2.1033.18.767.269 [GMT -4:00]

AV: AVG Internet Security *On-access scanning enabled* (Updated)
FW: AVG Firewall *disabled*

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\COMMON~1\Stardock\SDMCP.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
G:\AVG8~1\avgwdsvc.exe
C:\WINDOWS\Explorer.EXE
G:\AVG8~1\avgfws8.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Mediafour\iPod\M4iPodWPDService.exe
C:\Program Files\Mediafour\MacDrive 7\MacDriveService.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe -k imgsvc
G:\AVG8~1\avgam.exe
G:\AVG8~1\avgrsx.exe
G:\AVG8~1\avgnsx.exe
G:\AVG8~1\avgtray.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
G:\Wizet\MapleStory\HI\Safari\Safari.exe
G:\Backup\dds.scr

============== Pseudo HJT Report ===============

mStart Page = about:blank
mSearchAssistant = hxxp://www.google.com/ie
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - g:\avg 8\avgssie.dll
BHO: Click-to-Call BHO: {5c255c8a-e604-49b4-9d64-90988571cecb} - c:\program files\windows live\messenger\wlchtc.dll
TB: Adobe PDF: {47833539-d0c5-4125-9fa8-0819e2eaac93} - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [msnmsgr] "c:\program files\windows live\messenger\msnmsgr.exe" /background
mRun: [AVG8_TRAY] g:\avg8~1\avgtray.exe
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
dRunOnce: [RunNarrator] Narrator.exe
IE: Append Link Target to Existing PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Append to Existing PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert Link Target to Adobe PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert to Adobe PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIECapture.html
IE: E&xport to Microsoft Excel - g:\wizet\maples~1\hi\micros~2\office12\EXCEL.EXE/3000
IE: {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/8/b/d/8bd77752-5704-4d68-a152-f7252adaa4f2/LegitCheckControl.cab
DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} - hxxp://download.bitdefender.com/resources/scan8/oscan8.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - g:\avg 8\avgpp.dll
Notify: avgrsstarter - avgrsstx.dll
Notify: MCPClient - c:\progra~1\common~1\stardock\mcpstub.dll
SSODL: 0aMCPClient - {F5DF91F9-15E9-416B-A7C3-7519B11ECBFC} - c:\progra~1\common~1\stardock\MCPCore.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - g:\wizet\maplestory\hi\microsoft office enterprise 2007\office12\GrooveShellExtensions.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\hi\applic~1\mozilla\firefox\profiles\hx9ywwka.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.plusnetwork.com
FF - component: g:\avg 8\firefox\components\avgssff.dll
FF - plugin: c:\program files\google\google updater\2.4.1536.6592\npCIDetect13.dll
FF - plugin: c:\program files\microsoft\office live\npOLW.dll
FF - HiddenExtension: XUL Cache: {D67D3FBB-146C-47B2-8FF2-48C145244376} - c:\documents and settings\timmy simons\local settings\application data\{D67D3FBB-146C-47B2-8FF2-48C145244376}
FF - HiddenExtension: XUL Cache: {D5CFFD77-5A03-4CAA-AF47-80ED8E998942} - c:\documents and settings\rykin\local settings\application data\{D5CFFD77-5A03-4CAA-AF47-80ED8E998942}
FF - HiddenExtension: XUL Cache: {ADA85526-EEAD-4418-A418-58B356971096} - c:\documents and settings\hi\local settings\application data\{ada85526-eead-4418-a418-58b356971096}\

============= SERVICES / DRIVERS ===============

R0 AvgRkx86;avgrkx86.sys;c:\windows\system32\drivers\avgrkx86.sys [2009-3-20 12552]
R0 MDFSYSNT;MacDrive file system driver;c:\windows\system32\drivers\MDFSYSNT.SYS [2008-7-22 288768]
R0 MDPMGRNT;MacDrive partition driver;c:\windows\system32\drivers\MDPMGRNT.sys [2007-2-28 19072]
R0 PQV2i;PQV2i;c:\windows\system32\drivers\PQV2i.sys [2004-7-29 138801]
R1 AvgLdx86;AVG AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2009-3-20 325896]
R1 AvgMfx86;AVG On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2009-3-20 27784]
R1 AvgTdiX;AVG8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2009-3-20 108552]
R1 Ext2fs;Ext2fs;c:\windows\system32\drivers\ext2fs.sys [2008-9-17 179584]
R1 IfsMount;IfsMount;c:\windows\system32\drivers\ifsmount.sys [2008-9-17 49536]
R1 oreans32;oreans32;c:\windows\system32\drivers\oreans32.sys [2007-9-8 33824]
R1 PQIMount;PQIMount;c:\windows\system32\drivers\PQIMount.sys [2004-7-29 46800]
R2 avg8wd;AVG8 WatchDog;g:\avg8~1\avgwdsvc.exe [2009-3-20 298776]
R2 avgfws8;AVG8 Firewall;g:\avg8~1\avgfws8.exe [2009-4-29 1366904]
R2 M4iPodWPDService;M4iPodWPDService;c:\program files\common files\mediafour\ipod\M4iPodWPDService.exe [2008-1-23 114688]
R2 MacDriveService;MacDrive service;c:\program files\mediafour\macdrive 7\MacDriveService.exe [2008-5-2 150528]
R3 Avgfwdx;Avgfwdx;c:\windows\system32\drivers\avgfwdx.sys [2009-3-20 29208]
S0 cfadisk;CompactFlash Filter Driver;c:\windows\system32\drivers\cfadisk.sys [2008-10-31 3712]
S2 IcRecUsb;IC Recorder Driver;c:\windows\system32\drivers\IcRecUsb.sys [2008-11-11 17432]
S3 Avgfwfd;AVG network filter service;c:\windows\system32\drivers\avgfwdx.sys [2009-3-20 29208]
S3 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [2007-11-6 34064]
S3 npkycryp;npkycryp;\??\g:\finalstory\npkycryp.sys --> g:\finalstory\npkycryp.sys [?]

=============== Created Last 30 ================

2009-05-09 14:11 --d----- c:\docume~1\hi\applic~1\Malwarebytes
2009-05-09 14:11 15,504 a------- c:\windows\system32\drivers\mbam.sys
2009-05-09 14:11 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-05-09 14:11 -cd----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-05-05 20:20 --d----- c:\docume~1\hi\applic~1\JGsoft
2009-04-22 18:55 --d----- c:\program files\Ask Search Assistant
2009-04-18 17:17 --d----- c:\docume~1\hi\applic~1\Nexon
2009-04-18 17:14 --d----- c:\docume~1\hi\applic~1\InfraRecorder
2009-04-14 22:48 --d----- c:\documents and settings\hi\Tracing
2009-04-14 22:47 --dsh--- c:\documents and settings\hi\PrivacIE
2009-04-14 20:57 266,360 a------- c:\windows\system32\TweakUI.exe
2009-04-14 20:57 160,217 a------- c:\windows\system32\PowerToysLicense.rtf
2009-04-14 19:04 --d----- c:\docume~1\hi\applic~1\uTorrent
2009-04-11 21:47 --d----- c:\documents and settings\Hi

==================== Find3M ====================

2009-04-29 21:18 11,952 a------- c:\windows\system32\avgrsstx.dll
2009-04-29 21:18 325,896 a------- c:\windows\system32\drivers\avgldx86.sys
2009-04-29 21:17 50,968 a------- c:\windows\system32\avgfwdx.dll
2009-04-29 21:17 29,208 a------- c:\windows\system32\drivers\avgfwdx.sys
2009-04-29 21:17 12,552 a------- c:\windows\system32\drivers\avgrkx86.sys
2009-04-29 21:17 108,552 a------- c:\windows\system32\drivers\avgtdix.sys
2009-04-14 20:46 15,440 a------- c:\windows\system32\drivers\hamachi.sys
2009-03-21 22:18 93,492 a---h--- c:\windows\system32\mlfcache.dat
2009-03-09 05:19 410,984 a------- c:\windows\system32\deploytk.dll
2009-02-27 12:55 111,992 a------- c:\windows\system32\acaptuser32.dll
2009-01-30 16:28 8 -c--h--- c:\program files\wiimiistat.dat
2006-08-22 18:40 76 ac------ c:\program files\gameinfo.bin
2006-08-22 18:17 354 ac------ c:\program files\errlog.txt
2006-08-16 21:27 565 a------- c:\program files\uninstall.lnk
2006-08-16 21:25 3,262 -c------ c:\program files\uninstall.ico
2004-11-19 04:22 9,044,298 -c------ c:\program files\r7plus.dll
2004-11-19 04:17 1,424,384 -c------ c:\program files\r7plus.exe
2004-11-17 16:13 15,787,724 -c------ c:\program files\R7plus.msi
2004-11-17 08:13 494,260,334 ac------ c:\program files\texture.pck
2004-11-17 03:34 56,762,267 ac------ c:\program files\map.pck
2004-11-17 02:47 6,055,046 ac------ c:\program files\model.pck
2004-11-04 10:26 169,810,418 ac------ c:\program files\sound.pck
2003-02-13 19:47 377,856 ac------ c:\program files\binkw32.dll
2002-07-21 19:17 349,696 ac------ c:\program files\mss32.dll
1999-07-06 20:00 6 -c-shr-- c:\windows\@@desktop.dat
2006-05-03 06:06 163,328 ---shr-- c:\windows\system32\flvDX.dll
2007-02-21 07:47 31,232 ---shr-- c:\windows\system32\msfDX.dll
2008-03-16 09:30 216,064 ---shr-- c:\windows\system32\nbDX.dll
2008-09-11 19:13 32,768 ac-sh--- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008091120080912\index.dat

============= FINISH: 14:52:42.29 ===============

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
Please download the OTMoveIt3 by OldTimer.

  • Save it to your desktop.
  • Please double-click OTMoveIt3.exe to run it.
  • Copy the bolded text below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):


    :Services
    npkycryp


  • Return to OTMoveIt3, right click in the "Paste instructions for items to be Moved" window (under the light blue bar) and choose Paste.
  • Click the red Moveit! button.
  • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
  • Close OTMoveIt3
If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.

Please post the OTMoveIt log.



I see that you are running uTorrent.
P2P(Peer to peer) applications are designed to help you easily share and distribute files between you and a group of people. But they can also be used to distribute malware, and thus are not considered safe.
The removal of these programs is optional, but highly recommended.

If uTorrent is not removed, then I won't help you.

Go to Start > Control Panel > Add/Remove Programs and remove the following programs.

  • uTorrent

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
I have removed uTorrent before posting

========== SERVICES/DRIVERS ==========

Service\Driver npkycryp deleted successfully.

OTMoveIt3 by OldTimer - Version 1.0.11.0 log created on 05092009_150756

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
We can remove OTMoveIt now.

  • Please double-click OTMoveIt3.exe to run it again.
  • Press the green CleanUp! button.
  • Press Yes cleanup process prompt, do the same for the reboot prompt.
How is the machine running now?


Please post a new HijackThis log

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
My computer has almost all it's symptoms cleared, but my usb flashdisk is not working on my computer. AVG reports a virus in it, and moves it to the virus vault, but i cannot open it. It results in a 'choose what program to open this file' dialog.

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 3:17:10 PM, on 5/9/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18241)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\COMMON~1\Stardock\SDMCP.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
G:\AVG8~1\avgwdsvc.exe
G:\AVG8~1\avgfws8.exe
G:\AVG8~1\avgtray.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Mediafour\iPod\M4iPodWPDService.exe
C:\Program Files\Mediafour\MacDrive 7\MacDriveService.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
G:\AVG8~1\avgam.exe
G:\AVG8~1\avgrsx.exe
G:\AVG8~1\avgnsx.exe
C:\WINDOWS\system32\wuauclt.exe
G:\Wizet\MapleStory\HI\Safari\Safari.exe
G:\Backup\HiJack(GP)This.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - G:\AVG 8\avgssie.dll
O2 - BHO: Click-to-Call BHO - {5C255C8A-E604-49b4-9D64-90988571CECB} - C:\Program Files\Windows Live\Messenger\wlchtc.dll
O4 - HKLM\..\Run: [AVG8_TRAY] G:\AVG8~1\avgtray.exe
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKUS\S-1-5-18\..\RunOnce: [RunNarrator] Narrator.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\RunOnce: [RunNarrator] Narrator.exe (User 'Default user')
O8 - Extra context menu item: Append Link Target to Existing PDF - res://C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Append to Existing PDF - res://C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert Link Target to Adobe PDF - res://C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert to Adobe PDF - res://C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://G:\Wizet\MAPLES~1\HI\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cab
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - G:\AVG 8\avgpp.dll
O20 - Winlogon Notify: avgrsstarter - C:\WINDOWS\SYSTEM32\avgrsstx.dll
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: AVG8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - G:\AVG8~1\avgwdsvc.exe
O23 - Service: AVG8 Firewall (avgfws8) - AVG Technologies CZ, s.r.o. - G:\AVG8~1\avgfws8.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: M4iPodWPDService - Mediafour Corporation - C:\Program Files\Common Files\Mediafour\iPod\M4iPodWPDService.exe
O23 - Service: MacDrive service (MacDriveService) - Mediafour Corporation - C:\Program Files\Mediafour\MacDrive 7\MacDriveService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Pml Driver HPH11 - HP - C:\WINDOWS\System32\HPHipm11.exe

--
End of file - 4662 bytes

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
Your HijackThis log is clean but lets deal with the USB infection:


Please download USBNoRisk to your Desktop and run it by double clicking the program's icon.

  1. Wait a couple of seconds for initial scan to finish.
  2. Connect all of your USB storage devices to the PC, one at a time, and keep each one connected at least for 10 seconds.
  3. If there are more USB storage devices to scan, please take a note about the order in which these were connected.
  4. After all the devices are scanned, right click in the Monitor tab, and choose "Save log". That will open the log in Notepad. Please copy and paste the log into this thread.
Explanation: USB storage devices are all the USB devices that get their own partition letter at connecting to the PC, e.g. flash drives (thumb/pen drives, USB sticks), external HDDs, MP3/MP4 players, digital cameras, memory cards (SD cards, Sony Memory Stick, MultiMedia Cards etc.), some mobile phones, some GPS navigation devices etc.

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
Just wondering, should i scan the other computer that I use this usb flash disk with?

USBNoRisk 2.2 09 May 2009 by bobby

Started at 5/9/2009 3:24:12 PM

Searching for connected USB Mass storage...
----------------------------------------
K: {121a68c6-3cce-11de-843b-005056c00008}
========================================

Searching for other storage...
----------------------------------------
C: {5a28158d-f036-11d8-855b-806d6172696f}
E: {5a28158e-f036-11d8-855b-806d6172696f}
D: {5a28158f-f036-11d8-855b-806d6172696f}
G: {6c5e8141-182d-11dc-b28b-806d6172696f}
H: {6c5e8142-182d-11dc-b28b-806d6172696f}
========================================

Scanning removable storage...
----------------------------------------

No blocked files found on K:
autorun.inf found on K:
----------------------------------------
File K:\autorun.inf renamed successfully

Content of K:\autorun.inf.blocked
----------------------------------------
[AutoRun]
;
open=3ds.cmd
;K2Kwk0djwAk24ZsL
shell\open\Command=3ds.cmd
----------------------------------------

Files referenced from K:\autorun.inf.blocked
----------------------------------------
None
----------------------------------------

Sanitized mountpoint for 121a68c6-3cce-11de-843b-005056c00008
No Desktop.ini files found on K:
No mimics found on drive K:
----------------------------------------


Scanning fixed storage...
----------------------------------------

No blocked files found on C:
No Autorun.inf files found on C:
No mountpoint found for C:
No mountpoint found for 5a28158d-f036-11d8-855b-806d6172696f
No Desktop.ini files found on C:
----------------------------------------

No blocked files found on D:
No Autorun.inf files found on D:
No mountpoint found for D:
No mountpoint found for 5a28158f-f036-11d8-855b-806d6172696f
No Desktop.ini files found on D:
----------------------------------------

No blocked files found on E:
No Autorun.inf files found on E:
No mountpoint found for E:
No mountpoint found for 5a28158e-f036-11d8-855b-806d6172696f
No Desktop.ini files found on E:
----------------------------------------

No blocked files found on G:
No Autorun.inf files found on G:
No mountpoint found for G:
No mountpoint found for 6c5e8141-182d-11dc-b28b-806d6172696f
No Desktop.ini files found on G:
----------------------------------------

No blocked files found on H:
No Autorun.inf files found on H:
No mountpoint found for H:
No mountpoint found for 6c5e8142-182d-11dc-b28b-806d6172696f
----------------------------------------
Desktop.ini found at H:\Recycled\ contains interesting CLSID string
----------------------------------------
[.ShellClassInfo]
CLSID={645FF040-5081-101B-9F08-00AA002F954E}
----------------------------------------
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E},InfoTip = @%SystemRoot%\system32\SHELL32.dll,-22915
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E},IntroText = @%SystemRoot%\system32\SHELL32.dll,-31748
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E},LocalizedString = @%SystemRoot%\system32\SHELL32.dll,-8964
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon,@ = %SystemRoot%\System32\shell32.dll,31
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon,Empty = C:\WINDOWS\System32\shell32.dll,31
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon,Full = C:\WINDOWS\System32\shell32.dll,32
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\InProcServer32,@ = shell32.dll
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\Shell\IObit\Command,@ = G:\IObit\Advanced SystemCare 3\AutoSweep.exe /all
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E},InfoTip = @%SystemRoot%\system32\SHELL32.dll,-22915
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E},IntroText = @%SystemRoot%\system32\SHELL32.dll,-31748
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E},LocalizedString = @%SystemRoot%\system32\SHELL32.dll,-8964
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon,@ = %SystemRoot%\System32\shell32.dll,31
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon,Empty = C:\WINDOWS\System32\shell32.dll,31
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon,Full = C:\WINDOWS\System32\shell32.dll,32
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\InProcServer32,@ = shell32.dll
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\Shell\IObit\Command,@ = G:\IObit\Advanced SystemCare 3\AutoSweep.exe /all
----------------------------------------

========================================
Initial scan finished!
========================================

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
Please open USBNoRisk again, we need to use a custom script to delete the malicious autorun.inf files.

  1. When USBNoRisk opens, go into the Script tab, and insert the bolded script below.

    {121a68c6-3cce-11de-843b-005056c00008}
    delete: K:\autorun.inf.blocked
    delete: K:\3ds.cmd
    protect:




  2. Then press the Run Script button.
  3. Copy and paste the report back here.

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
After I unplugged my flash disk, it switched the drive letter to M, so i fixed the script a bit.

USBNoRisk 2.2 09 May 2009 by bobby

Started at 5/9/2009 4:42:14 PM

Searching for connected USB Mass storage...
----------------------------------------
M: {121a68c6-3cce-11de-843b-005056c00008}
K: {121a68c7-3cce-11de-843b-005056c00008}
L: {d4c85914-3b91-11dc-a107-001bfc0ba53f}
========================================

Searching for other storage...
----------------------------------------
C: {5a28158d-f036-11d8-855b-806d6172696f}
E: {5a28158e-f036-11d8-855b-806d6172696f}
D: {5a28158f-f036-11d8-855b-806d6172696f}
G: {6c5e8141-182d-11dc-b28b-806d6172696f}
H: {6c5e8142-182d-11dc-b28b-806d6172696f}
========================================

Scanning removable storage...
----------------------------------------

No blocked files found on K:
No Autorun.inf files found on K:
No mountpoint found for 121a68c7-3cce-11de-843b-005056c00008
No Desktop.ini files found on K:
No mimics found on drive K:
----------------------------------------

No blocked files found on L:
No Autorun.inf files found on L:
No mountpoint found for d4c85914-3b91-11dc-a107-001bfc0ba53f
No Desktop.ini files found on L:
No mimics found on drive L:
----------------------------------------

No blocked files found on M:
autorun.inf found on M:
----------------------------------------
File M:\autorun.inf renamed successfully

Content of M:\autorun.inf.blocked
----------------------------------------
[AutoRun]
;
open=3ds.cmd
;K2Kwk0djwAk24ZsL
shell\open\Command=3ds.cmd
----------------------------------------

Files referenced from M:\autorun.inf.blocked
----------------------------------------
M:\3ds.cmd -r-hs 105988
----------------------------------------

Sanitized mountpoint for 121a68c6-3cce-11de-843b-005056c00008
No Desktop.ini files found on M:
No mimics found on drive M:
----------------------------------------


Scanning fixed storage...
----------------------------------------

No blocked files found on C:
No Autorun.inf files found on C:
No mountpoint found for C:
No mountpoint found for 5a28158d-f036-11d8-855b-806d6172696f
No Desktop.ini files found on C:
----------------------------------------

No blocked files found on D:
No Autorun.inf files found on D:
No mountpoint found for D:
No mountpoint found for 5a28158f-f036-11d8-855b-806d6172696f
No Desktop.ini files found on D:
----------------------------------------

No blocked files found on E:
No Autorun.inf files found on E:
No mountpoint found for E:
No mountpoint found for 5a28158e-f036-11d8-855b-806d6172696f
No Desktop.ini files found on E:
----------------------------------------

No blocked files found on G:
No Autorun.inf files found on G:
No mountpoint found for G:
No mountpoint found for 6c5e8141-182d-11dc-b28b-806d6172696f
No Desktop.ini files found on G:
----------------------------------------

No blocked files found on H:
No Autorun.inf files found on H:
No mountpoint found for H:
No mountpoint found for 6c5e8142-182d-11dc-b28b-806d6172696f
----------------------------------------
Desktop.ini found at H:\Recycled\ contains interesting CLSID string
----------------------------------------
[.ShellClassInfo]
CLSID={645FF040-5081-101B-9F08-00AA002F954E}
----------------------------------------
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E},InfoTip = @%SystemRoot%\system32\SHELL32.dll,-22915
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E},IntroText = @%SystemRoot%\system32\SHELL32.dll,-31748
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E},LocalizedString = @%SystemRoot%\system32\SHELL32.dll,-8964
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon,@ = %SystemRoot%\System32\shell32.dll,31
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon,Empty = C:\WINDOWS\System32\shell32.dll,31
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon,Full = C:\WINDOWS\System32\shell32.dll,32
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\InProcServer32,@ = shell32.dll
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\Shell\IObit\Command,@ = G:\IObit\Advanced SystemCare 3\AutoSweep.exe /all
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E},InfoTip = @%SystemRoot%\system32\SHELL32.dll,-22915
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E},IntroText = @%SystemRoot%\system32\SHELL32.dll,-31748
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E},LocalizedString = @%SystemRoot%\system32\SHELL32.dll,-8964
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon,@ = %SystemRoot%\System32\shell32.dll,31
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon,Empty = C:\WINDOWS\System32\shell32.dll,31
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon,Full = C:\WINDOWS\System32\shell32.dll,32
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\InProcServer32,@ = shell32.dll
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\Shell\IObit\Command,@ = G:\IObit\Advanced SystemCare 3\AutoSweep.exe /all
----------------------------------------

========================================
Initial scan finished!
========================================

Processing script
----------------------------------------
121a68c6-3cce-11de-843b-005056c00008
Drive letter for GUID: M:
SectionStart = 0
SectionEnd = 3
Delete: M:\autorun.inf.blocked > Done!
File lock detected:
USBNoRisk cannot find what locked the file
Delete: M:\3ds.cmd > Error!
----------------------------------------
Protect M:
----------------------------------------
FAT32 root: autorun.inf found. Doing magic...
Magic is done
----------------------------------------

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
Hello.
Origin is still learning to use USBNoRisk, so I am stepping for a second, because that malicious bat file is locked. We are going to use another USBNoRisk script which will override the lock and brute-force delete the file. Keep the drive in the machine.

Please open USBNoRisk again, we need to use a custom script to delete the malicious autorun.inf files.

  1. When USBNoRisk opens, go into the Script tab, and insert the bolded script below.


    {121a68c6-3cce-11de-843b-005056c00008}
    f_delete: M:\3ds.cmd


  2. Then press the Run Script button.
  3. Copy and paste the report back here.

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
thanks for helping me

USBNoRisk 2.2 09 May 2009 by bobby

Started at 5/9/2009 4:55:37 PM

Searching for connected USB Mass storage...
----------------------------------------
M: {121a68c6-3cce-11de-843b-005056c00008}
K: {121a68c7-3cce-11de-843b-005056c00008}
L: {d4c85914-3b91-11dc-a107-001bfc0ba53f}
========================================

Searching for other storage...
----------------------------------------
C: {5a28158d-f036-11d8-855b-806d6172696f}
E: {5a28158e-f036-11d8-855b-806d6172696f}
D: {5a28158f-f036-11d8-855b-806d6172696f}
G: {6c5e8141-182d-11dc-b28b-806d6172696f}
H: {6c5e8142-182d-11dc-b28b-806d6172696f}
========================================

Scanning removable storage...
----------------------------------------

No blocked files found on K:
No Autorun.inf files found on K:
No mountpoint found for 121a68c7-3cce-11de-843b-005056c00008
No Desktop.ini files found on K:
No mimics found on drive K:
----------------------------------------

No blocked files found on L:
No Autorun.inf files found on L:
No mountpoint found for d4c85914-3b91-11dc-a107-001bfc0ba53f
No Desktop.ini files found on L:
No mimics found on drive L:
----------------------------------------

No blocked files found on M:
No Autorun.inf files found on M:
No mountpoint found for 121a68c6-3cce-11de-843b-005056c00008
No Desktop.ini files found on M:
No mimics found on drive M:
----------------------------------------


Scanning fixed storage...
----------------------------------------

No blocked files found on C:
No Autorun.inf files found on C:
No mountpoint found for C:
No mountpoint found for 5a28158d-f036-11d8-855b-806d6172696f
No Desktop.ini files found on C:
----------------------------------------

No blocked files found on D:
No Autorun.inf files found on D:
No mountpoint found for D:
No mountpoint found for 5a28158f-f036-11d8-855b-806d6172696f
No Desktop.ini files found on D:
----------------------------------------

No blocked files found on E:
No Autorun.inf files found on E:
No mountpoint found for E:
No mountpoint found for 5a28158e-f036-11d8-855b-806d6172696f
No Desktop.ini files found on E:
----------------------------------------

No blocked files found on G:
No Autorun.inf files found on G:
No mountpoint found for G:
No mountpoint found for 6c5e8141-182d-11dc-b28b-806d6172696f
No Desktop.ini files found on G:
----------------------------------------

No blocked files found on H:
No Autorun.inf files found on H:
No mountpoint found for H:
No mountpoint found for 6c5e8142-182d-11dc-b28b-806d6172696f
----------------------------------------
Desktop.ini found at H:\Recycled\ contains interesting CLSID string
----------------------------------------
[.ShellClassInfo]
CLSID={645FF040-5081-101B-9F08-00AA002F954E}
----------------------------------------
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E},InfoTip = @%SystemRoot%\system32\SHELL32.dll,-22915
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E},IntroText = @%SystemRoot%\system32\SHELL32.dll,-31748
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E},LocalizedString = @%SystemRoot%\system32\SHELL32.dll,-8964
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon,@ = %SystemRoot%\System32\shell32.dll,31
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon,Empty = C:\WINDOWS\System32\shell32.dll,31
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon,Full = C:\WINDOWS\System32\shell32.dll,32
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\InProcServer32,@ = shell32.dll
HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\Shell\IObit\Command,@ = G:\IObit\Advanced SystemCare 3\AutoSweep.exe /all
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E},InfoTip = @%SystemRoot%\system32\SHELL32.dll,-22915
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E},IntroText = @%SystemRoot%\system32\SHELL32.dll,-31748
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E},LocalizedString = @%SystemRoot%\system32\SHELL32.dll,-8964
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon,@ = %SystemRoot%\System32\shell32.dll,31
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon,Empty = C:\WINDOWS\System32\shell32.dll,31
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon,Full = C:\WINDOWS\System32\shell32.dll,32
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\InProcServer32,@ = shell32.dll
HKLM\Software\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\Shell\IObit\Command,@ = G:\IObit\Advanced SystemCare 3\AutoSweep.exe /all
----------------------------------------

========================================
Initial scan finished!
========================================

Processing script
----------------------------------------
121a68c6-3cce-11de-843b-005056c00008
Drive letter for GUID: M:
SectionStart = 0
SectionEnd = 1
f_delete:
file "M:\3ds.cmd" deleted successfully
----------------------------------------

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
Hello.
That did it, just one infection left to remove.

Please download GooredFix and save it to your Desktop. Please double-click GooredFix.exe on your Desktop to run it. Select 2. Fix Goored by typing 2 and pressing Enter. Make sure all instances of Firefox are closed at this point. Type y at the prompt and press Enter again. A log will open, please post the contents of that log in your next reply (it can also be found on your desktop, called GooredLog.txt).

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
GooredFix v1.92 by jpshortstuff
Log created at 17:05 on 09/05/2009 running Option #2 (Hi)
Firefox version 3.0.8 (en-US)

=====Goored Deletions=====

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extensions]
"{ADA85526-EEAD-4418-A418-58B356971096}"="C:\Documents and Settings\Hi\Local Settings\Application Data\{ADA85526-EEAD-4418-A418-58B356971096}\"
->Backing up value... Done.
->Deleting value... Done.

C:\Documents and Settings\Hi\Local Settings\Application Data\{ADA85526-EEAD-4418-A418-58B356971096}
->Backing up folder... Done.
->Emptying folder... Done.
->Deleting folder... Done.

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extensions]
"{D5CFFD77-5A03-4CAA-AF47-80ED8E998942}"="C:\Documents and Settings\Rykin\Local Settings\Application Data\{D5CFFD77-5A03-4CAA-AF47-80ED8E998942}"
->Backing up value... Done.
->Deleting value... Done.

C:\Documents and Settings\Rykin\Local Settings\Application Data\{D5CFFD77-5A03-4CAA-AF47-80ED8E998942}
->Backing up folder... Done.
->Emptying folder... Done.
->Deleting folder... Done.

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extensions]
"{D67D3FBB-146C-47B2-8FF2-48C145244376}"="C:\Documents and Settings\Timmy Simons\Local Settings\Application Data\{D67D3FBB-146C-47B2-8FF2-48C145244376}"
->Backing up value... Done.
->Deleting value... Done.

C:\Documents and Settings\Timmy Simons\Local Settings\Application Data\{D67D3FBB-146C-47B2-8FF2-48C145244376}
->Backing up folder... Done.
->Emptying folder... Done.
->Deleting folder... Done.

=====Dumping Registry Values=====

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.8\extensions]
"Plugins"="G:\Program Files\Mozilla Firefox\plugins"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.8\extensions]
"Components"="G:\Program Files\Mozilla Firefox\components"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.5\extensions]
"Plugins"="C:\Program Files\Mozilla Firefox RC2\plugins"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.5\extensions]
"Components"="C:\Program Files\Mozilla Firefox RC2\components"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extensions]
"jqs@sun.com"="C:\Program Files\Java\jre6\lib\deploy\jqs\ff"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extensions]
"{3f963a5b-e555-4543-90e2-c3908898db71}"="G:\AVG 8\Firefox"

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
Hello.

Please uninstall USBNoRisk by doing the following.

Please open USBNoRisk one more time
Click on "Uninstall" button on "Monitor" tab. That will delete all the logs made by USBNoRisk. After closing the program you can also delete USBNoRisk.exe from your Desktop.

Click Start >> Run and then copy/paste the following into the box and hit Enter:
"%userprofile%\Desktop\GooredFix.exe" /uninstall
note the space between " /
If any of your security programs query a new Registry/AutoStart value being added please allow the changes.

You have an old version of Firefox installed.

Please download Firefox 3.0.10 and install it. It will install over the old version you currently have installed, so you won't lose any bookmarked websites.

Your stick should be fine now and any browser search hijack you had should be gone.

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
thank you and origin for your help! if i have a problem i'll come back here.

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
We need to make a new restore point.

To turn off System Restore, follow these steps:
1. Click Start, right-click My Computer, and then click Properties.
2. Click the System Restore tab.
3. Click the Turn off System Restore check box (or the Turn off System Restore on all drives check box), and then click OK.
4. Click Yes when you receive the prompt to the turn off System Restore.

Now we need to make a new restore point.
To turn on System Restore, follow these steps:
1. Click Start, right-click My Computer, and then click Properties.
2. Click the System Restore tab.
3. Click the Turn off System Restore check box (To turn on System Restore), and then click OK.

Below I have included a number of recommendations for how to protect your computer in order to prevent future malware infections. Please take these recommendations seriously; these few simple steps can stave off the vast majority of spyware problems. As happy as we are to help you, for your sake we would rather not have repeat customers. Goofy

1) Please navigate to http://windowsupdate.microsoft.com and download all the "critical updates" for Windows. This can patch many of the security holes through which attackers can gain access to your computer.

Please either enable Automatic Updates under Start -> Control Panel -> Automatic Updates , or get into the habit of checking for Windows updates regularly. I cannot stress enough how important this is.

2) In order to protect yourself against spyware, you should consider installing and running the following free programs:

Ad-Aware SE
A tutorial on using Ad-Aware to remove spyware from your computer may be found here.

Spybot-Search & Destroy
A tutorial on using Spybot to remove spyware from your computer may be found here. Please also remember to enable Spybot's "Immunize" and "TeaTimer" features.

SpywareBlaster
A tutorial on using SpywareBlaster to prevent spyware from ever installing on your computer may be found here.

SpywareGuard
A tutorial on using SpywareGuard for realtime protection against spyware and hijackers may be found here.

Make sure to keep these programs up-to-date and to run them regularly, as this can prevent a great deal of spyware hassle.

3) Please consider using an alternate browser. Mozilla's Firefox browser is fantastic; it is much more secure than Internet Explorer, immune to almost all known browser hijackers, and also has the best built-in popup blocker (as an added benefit!) that I have ever seen. If you are interested, Firefox may be downloaded from here:
http://www.mozilla.org/products/firefox/
I also recommand the following add-ons for Firefox, they will help keep you safe from malicious scripts or activeX exploits.
https://addons.mozilla.org/en-US/firefox/addon/722
https://addons.mozilla.org/en-US/firefox/addon/1865
https://addons.mozilla.org/en-US/firefox/addon/433

4) Also make sure to run your antivirus software regularly, and to keep it up-to-date.

To help you keep your software updated, please considering using this free software program that will check for program updates.
Update Checker

5) Finally, consider maintaining a firewall. Some good free firewalls are Kerio, or
Outpost
A tutorial on understanding and using firewalls may be found here.

Please also read Tony Klein's excellent article: How I got Infected in the First Place

If you would take a moment to fill out our feedback form, we would appreciate it.
The link can be found here.

Hopefully this should take care of your problems! Good luck. Big Grin

descriptionInfected with Win32/Cryptor EmptyRe: Infected with Win32/Cryptor

more_horiz
privacy_tip Permissions in this forum:
You cannot reply to topics in this forum