Jump to content

Recommended Posts

search and destroy is producing a 216 run time error,so i decided to to a online scan.

ive unilstalled search and destroy atm (tried reinstalling/checkdisk to no avail)

(however a few pps are saying the same thing since its latest updates,been waiting for a reply for 5 days,hence unistalling till i know more)

still panda online scanner found;

found;Bck/IRCBot.CPW Virus Latent

1. C:\WINDOWS\system32\bingoo.exe

Adware/Cres Adware Latent

1. C:\WINDOWS\STK02N\STK02NK.exe

i also installed java to check but nothing came up with kaspery after removing the trojan.

however panda did find entries in my system restore point witch kaspery didnt.

i since removed java.

the adaware comes with my cam software (ArcSoft\PhotoImpression) i forgot to remove it when i installed it,i ussaly do,but this time i forgot.

i was given the chance to "disinfect" C:\WINDOWS\system32\bingoo.exe

basicly it removed the file,dont think it removed the reg entries.

the adaware i would of had to pay for its removal so i simply removed the file,and delted the system restore points,because there was traces of the adaware there witch again i would have to pay for its removal.

my hi-jack logs looks clean still best post it.

where do i go from here?

ive used a online scanner and bar any reg entries i dont think i have probs however i am no expert at all,and dont know how much damage this has done,appertly it changes the hosts file,so i cant goto sites like kaspery however i could after removing the trojan,not sure if i could or couldnt before so i dont know about if the hosts file was changed or not.

i havent done a online scan in a while as i ive been rembering the webroot of old witch used to be a great product;however ive come to the conculusion its bloatware nowadays as it found nothing and has never alerted me to the adaware let alone finding the trojan.imo think i will change to nod32

does malwarebytes look for this trojan,i.e has my sytem been changed to hide this trojan,i know it uses stealth tactics.

do i have problems beyond this trojan is why i ask.

i know this is spread via e,mail however is it possible to it to attached to a pm?

i ask as i recived a pm (on another forum) witch was very suspected alou i am part of a med listery so it could of easily come from there however that pm was sent to all (piad) members of that forum so if thats possible i would be best to advise the others that also recived it,if its possible.

hijack-log;

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 11:19:19, on 02/08/2009

Platform: Windows XP SP3 (WinNT 5.01.2600)

MSIE: Internet Explorer v8.00 (8.00.6001.18702)

Boot mode: Normal

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\Program Files\Webroot\WebrootSecurity\WRConsumerService.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\ZoneLabs\vsmon.exe

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\system32\lxdncoms.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Webroot\WebrootSecurity\SpySweeper.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\SOUNDMAN.EXE

C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe

C:\Program Files\Webroot\WebrootSecurity\SpySweeperUI.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Lexmark 2600 Series\lxdnMsdMon.exe

C:\Program Files\Mozilla Firefox\firefox.exe

C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://*.update.microsoft.com

O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupd...b?1235536745111

O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1236469625250

O23 - Service: lxdnCATSCustConnectService - Lexmark International, Inc. - C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxdnserv.exe

O23 - Service: lxdn_device - - C:\WINDOWS\system32\lxdncoms.exe

O23 - Service: TrueVector Internet Monitor (vsmon) - Check Point Software Technologies LTD - C:\WINDOWS\system32\ZoneLabs\vsmon.exe

O23 - Service: Webroot Spy Sweeper Engine (WebrootSpySweeperService) - Webroot Software, Inc. (www.webroot.com) - C:\Program Files\Webroot\WebrootSecurity\SpySweeper.exe

O23 - Service: Webroot Client Service (WRConsumerService) - Webroot Software, Inc. - C:\Program Files\Webroot\WebrootSecurity\WRConsumerService.exe

--

End of file - 4170 bytes

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.