hndcs96gqxdk.dll - Dangerous
hndcs96gqxdk.dll
Manual removal instructions:
Antivirus Report of hndcs96gqxdk.dll:
hndcs96gqxdk.dll
We suggest you to remove 08223B03.dll from your computer as soon as possible.
08223B03.dll is Trojan/Backdoor.
Kill the file 08223B03.dll and remove 08223B03.dll from Windows startup.
File: calc.exe (C:\sand-box\calc.exe)
-------------------------------------------------------------------------------------
Classification:
Code:
Antivirus Version Last Update Result
Avast 4.8.1335.0 2009.08.20 Win32:Trojan-gen {Other}
AVG 8.5.0.406 2009.08.21 KillAV.TZ.dropper
BitDefender 7.2 2009.08.21 Generic.Malware.SFP!BTkprn.D2045EE7
Comodo 2039 2009.08.21 TrojWare.Win32.PSW.OLGames.~EM
DrWeb 5.0.0.12182 2009.08.21 Trojan.Starter.1019
F-Secure 8.0.14470.0 2009.08.20 Trojan-Dropper.Win32.Agent.anko
Kaspersky 7.0.0.125 2009.08.21 Trojan-Dropper.Win32.Agent.anko
Microsoft 1.4903 2009.08.20 Trojan:Win32/Abndog.A
NOD32 4353 2009.08.20 a variant of Win32/TrojanDropper.Delf.NLY
Symantec 1.4.4.12 2009.08.21 Trojan Horse
Additional information
File size: 41624 bytes
MD5 : c50f801360cb2c23f56fd3e42221c2cc
SHA1 : e45c0ba2b4600fca6d68be5e3786b706c3150e40
-------------------------------------------------------------------------------------
Installation
When the program is executed, it creates the following registry subkeys and values:
----------------------------------
Keys added:150
----------------------------------
HKLM\SOFTWARE\Classes\CLSID\{08223B03-1B38-4A33-A83A-A4D3CC1D6E4E}
HKLM\SOFTWARE\Classes\CLSID\{08223B03-1B38-4A33-A83A-A4D3CC1D6E4E}\InprocServer32
HKLM\SOFTWARE\Classes\CLSID\{122B901E-493F-4AD9-BC69-7DE8C3E52FCC}
/.../
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adam.exe
/.../
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsstat.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webscanx.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WoptiClean.exe
HKLM\SOFTWARE\Microsoft\DownloadManager
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX\0000
HKLM\SYSTEM\CurrentControlSet\Services\ATICVVX
HKLM\SYSTEM\CurrentControlSet\Services\ATICVVX\Security
----------------------------------
Values added:200
----------------------------------
HKLM\SOFTWARE\Classes\CLSID\{08223B03-1B38-4A33-A83A-A4D3CC1D6E4E}\InprocServer32\: "C:\WINDOWS\system32\08223B03.dll"
HKLM\SOFTWARE\Classes\CLSID\{08223B03-1B38-4A33-A83A-A4D3CC1D6E4E}\InprocServer32\ThreadingModel: "Apartment"
HKLM\SOFTWARE\Classes\CLSID\{122B901E-493F-4AD9-BC69-7DE8C3E52FCC}\InprocServer32\: "C:\WINDOWS\system32\122B901E.dll"
/.../
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.exe\debugger: "ntsd -d"
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\debugger: "ntsd -d"
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\debugger: "ntsd -d"
/.../
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsstat.exe\debugger: "ntsd -d"
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webscanx.exe\debugger: "ntsd -d"
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WoptiClean.exe\debugger: "ntsd -d"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX\0000\Service: "ATICVVX"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX\0000\Legacy: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX\0000\ConfigFlags: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX\0000\Class: "LegacyDriver"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX\0000\ClassGUID: "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX\0000\DeviceDesc: "ATICVVX"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX\NextInstance: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\ATICVVX\Security\Security: 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 00 01 02 00 00 00 00 00 05 20 00 00 00 20 02 00 00 00 00 14 00 8D 01 02 00 01 01 00 00 00 00 00 05 0B 00 00 00 00 00 18 00 FD 01 02 00 01 02 00 00 00 00 00 05 20 00 00 00 23 02 00 00 01 01 00 00 00 00 00 05 12 00 00 00 01 01 00 00 00 00 00 05 12 00 00 00
HKLM\SYSTEM\CurrentControlSet\Services\ATICVVX\Type: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\ATICVVX\Start: 0x00000003
HKLM\SYSTEM\CurrentControlSet\Services\ATICVVX\ErrorControl: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\ATICVVX\ImagePath: "\??\C:\WINDOWS\system32\Drivers\acpiec.sys"
HKLM\SYSTEM\CurrentControlSet\Services\ATICVVX\DisplayName: "ATICVVX"
HKCU\Software\Microsoft\Notepad\lfEscapement: 0x00000000
HKCU\Software\Microsoft\Notepad\lfOrientation: 0x00000000
HKCU\Software\Microsoft\Notepad\lfWeight: 0x00000190
HKCU\Software\Microsoft\Notepad\lfItalic: 0x00000000
HKCU\Software\Microsoft\Notepad\lfUnderline: 0x00000000
HKCU\Software\Microsoft\Notepad\lfStrikeOut: 0x00000000
HKCU\Software\Microsoft\Notepad\lfCharSet: 0x00000000
HKCU\Software\Microsoft\Notepad\lfOutPrecision: 0x00000001
HKCU\Software\Microsoft\Notepad\lfClipPrecision: 0x00000002
HKCU\Software\Microsoft\Notepad\lfQuality: 0x00000002
HKCU\Software\Microsoft\Notepad\lfPitchAndFamily: 0x00000031
HKCU\Software\Microsoft\Notepad\iPointSize: 0x00000064
HKCU\Software\Microsoft\Notepad\fWrap: 0x00000000
HKCU\Software\Microsoft\Notepad\StatusBar: 0x00000000
HKCU\Software\Microsoft\Notepad\fSaveWindowPositions: 0x00000000
HKCU\Software\Microsoft\Notepad\lfFaceName: "Lucida Console"
HKCU\Software\Microsoft\Notepad\szHeader: "&f"
HKCU\Software\Microsoft\Notepad\szTrailer: "Page &p"
HKCU\Software\Microsoft\Notepad\iMarginTop: 0x000003E8
HKCU\Software\Microsoft\Notepad\iMarginBottom: 0x000003E8
HKCU\Software\Microsoft\Notepad\iMarginLeft: 0x000002EE
HKCU\Software\Microsoft\Notepad\iMarginRight: 0x000002EE
HKCU\Software\Microsoft\Notepad\fMLE_is_broken: 0x00000000
HKCU\Software\Microsoft\Notepad\iWindowPosX: 0x00000058
HKCU\Software\Microsoft\Notepad\iWindowPosY: 0x00000058
HKCU\Software\Microsoft\Notepad\iWindowPosDX: 0x00000258
HKCU\Software\Microsoft\Notepad\iWindowPosDY: 0x0000019A
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\E0C6D21: "C:\WINDOWS\system32\C3E3A56.exe"
----------------------------------
Values modified:0
----------------------------------
----------------------------------
Files added:32
----------------------------------
C:\WINDOWS\Fonts\6e6EUdxVeWUYJynN.Ttf
C:\WINDOWS\Fonts\CcKKcpwJmND4.Ttf
C:\WINDOWS\Fonts\cFDPmh3MDPjcHMPd.Ttf
C:\WINDOWS\Fonts\CSzZ3gVtf.Ttf
C:\WINDOWS\Fonts\e38H8kRkk.Ttf
C:\WINDOWS\Fonts\eCgMhGRkPUcdutd0.Ttf
C:\WINDOWS\Fonts\FCvvnT2B.Ttf
C:\WINDOWS\Fonts\NPPVWvYEyCe8H.fon
C:\WINDOWS\Fonts\pDuuqr4BgFn65AeW.Ttf
C:\WINDOWS\Fonts\qP2N8HTHkmGRq5.Ttf
C:\WINDOWS\Fonts\tHCsj3zT7wpspzWKuBu.Ttf
C:\WINDOWS\Fonts\vwuXtYbhj.fon
C:\WINDOWS\Fonts\yGMHUAj5Npydj8FZ.Ttf
C:\WINDOWS\Fonts\yHguCdqt6hp2.Ttf
C:\WINDOWS\Fonts\YywxhF7TSnkktrJw.Ttf
C:\WINDOWS\Fonts\Z3tcgfaZ.Ttf
C:\WINDOWS\Fonts\zEfE48cw9EmcFaR.fon
C:\WINDOWS\system32\08223B03.dll
C:\WINDOWS\system32\122B901E.dll
C:\WINDOWS\system32\A0C86020.dll
C:\WINDOWS\system32\C3E3A56.exe
C:\WINDOWS\system32\D6C0C32.dll
C:\WINDOWS\system32\dfc8ac3ed7da.dll
C:\WINDOWS\system32\ed78ab9.dll
C:\WINDOWS\system32\hNdcS96gQxDk.dll
C:\WINDOWS\system32\mFr9FPruEFZ9VNdrveJunw3.dll
C:\WINDOWS\system32\Qh6xX7VN48sVPnK.dll
C:\WINDOWS\system32\Rwad8sdv4e7V8xpKZ.dll
C:\WINDOWS\system32\skcfujQ5EDN.dll
C:\WINDOWS\system32\v54M9wWBuNGTf2m.dll
C:\WINDOWS\system32\Va7SpUWgCA5f.dll
C:\000D4C71\C_754.nls
----------------------------------
Files deleted:2
----------------------------------
C:\sand-box\calc.exe
C:\WINDOWS\system32\verclsid.exe
----------------------------------
Files [attributes?] modified:2
----------------------------------
C:\WINDOWS\system32\comres.dll
C:\WINDOWS\system32\drivers\acpiec.sys
----------------------------------
Folders added:1
----------------------------------
C:\000D4C71
----------------------------------
Folders deleted:0
----------------------------------
----------------------------------
Total changes:387
----------------------------------
-------------------------------------------------------------------------------------
Internet activity:
Code:
HTTP POST http://baidu.1cznn9.com.cn/tj/count.asp
HTTP GET http://baidu.1cznn9.com.cn/calc.txt
HTTP GET http://baidu.1cznn9.com.cn/down/zydnf.ex...
HTTP GET http://baidu.1cznn9.com.cn/down/lmwd.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmtlbb.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmmh.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmyh.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmcjsh.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmqqhx.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmqqsg.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmwmgj.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmzx.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmrxjh.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmjxsj.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmchuans...
HTTP GET http://baidu.1cznn9.com.cn/down/lmdh2.ex...
HTTP GET http://baidu.1cznn9.com.cn/calc.txt
HTTP GET http://baidu.1cznn9.com.cn/down/lmwd.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmtlbb.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmmh.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmyh.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmcjsh.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmqqhx.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmqqsg.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmwmgj.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmzx.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmrxjh.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmjxsj.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmchuans...
HTTP GET http://baidu.1cznn9.com.cn/down/lmdh2.ex...
HTTP GET http://baidu.1cznn9.com.cn/down/lmzt.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmxx.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmhx2.ex...
HTTP GET http://baidu.1cznn9.com.cn/down/jxdj.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/jxzh.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/jxsg.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmxc.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmdh3.ex...
HTTP GET http://baidu.1cznn9.com.cn/down/lmsx.exe...
HTTP GET http://baidu.1cznn9.com.cn/calc.txt
HTTP GET http://baidu.1cznn9.com.cn/down/zydnf.ex...
HTTP GET http://baidu.1cznn9.com.cn/down/lmwd.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmtlbb.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmmh.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmyh.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmcjsh.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmqqhx.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmqqsg.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmwmgj.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmzx.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmrxjh.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmjxsj.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmchuans...
HTTP GET http://baidu.1cznn9.com.cn/down/lmdh2.ex...
HTTP GET http://baidu.1cznn9.com.cn/down/lmzt.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmxx.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmhx2.ex...
HTTP GET http://baidu.1cznn9.com.cn/down/jxdj.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/jxzh.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/jxsg.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmxc.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmdh3.ex...
HTTP GET http://baidu.1cznn9.com.cn/down/lmsx.exe...
HTTP GET http://http//jun.wuming100.com:8080/vers...
HTTP GET http://baidu.1cznn9.com.cn/down/frjchuan...
HTTP GET http://http//jun.wuming100.com:8080/vers...
HTTP GET http://baidu.1cznn9.com.cn/down/frjwaizh...
-------------------------------------------------------------------------------------
Detected by RegRun Reanimator:
Item Name: {CEBB8F8A-308B-43E9-9789-B6FD6BE1BD97}
Author: Unknown
Related File: C:\WINDOWS\system32\v54M9wWBuNGTf2m.dll
Type: Shell Execute Hooks
Item Name: {9AD1DE62-196C-4C01-9A2F-0BEDEF727C59}
Author: Unknown
Related File: C:\WINDOWS\system32\mFr9FPruEFZ9VNdrveJunw3.dll
Type: Shell Execute Hooks
Item Name: {762D618C-E2CB-4217-8275-03302A93073F}
Author: Unknown
Related File: C:\WINDOWS\fonts\zEfE48cw9EmcFaR.fon
Type: Shell Execute Hooks
Item Name: {B8898C49-7B3A-4306-A9EF-8E186EDEE5EA}
Author: Unknown
Related File: C:\WINDOWS\system32\Qh6xX7VN48sVPnK.dll
Type: Shell Execute Hooks
Item Name: {F8C6B7B5-DAE0-4B78-BF2A-101C9A9CCA27}
Author: Unknown
Related File: C:\WINDOWS\system32\Va7SpUWgCA5f.dll
Type: Shell Execute Hooks
Item Name: {DA112397-5376-4E52-A333-A85284658DEA}
Author: Unknown
Related File: C:\WINDOWS\fonts\NPPVWvYEyCe8H.fon
Type: Shell Execute Hooks
Item Name: {16886058-6A31-4D53-B4AC-4CC7D2248D69}
Author: Unknown
Related File: C:\WINDOWS\fonts\vwuXtYbhj.fon
Type: Shell Execute Hooks
Item Name: {49043CF7-E4A4-47D7-B393-E1523D262189}
Author: Unknown
Related File: C:\WINDOWS\system32\hNdcS96gQxDk.dll
Type: Shell Execute Hooks
Item Name: {122B901E-493F-4AD9-BC69-7DE8C3E52FCC}
Author: Unknown
Related File: C:\WINDOWS\system32\122B901E.dll
Type: Shell Execute Hooks
Item Name: {A0C86020-5935-4B87-B20E-0B656D450264}
Author: Unknown
Related File: C:\WINDOWS\system32\A0C86020.dll
Type: Shell Execute Hooks
Item Name: {A5CA6C70-7185-4466-AB45-B1C34E7A37CA}
Author: Unknown
Related File: C:\WINDOWS\system32\ed78ab9.dll
Type: Shell Execute Hooks
Item Name: {76CBCF38-0583-44C7-A1AE-D463DFE625EC}
Author: Unknown
Related File: C:\WINDOWS\system32\skcfujQ5EDN.dll
Type: Shell Execute Hooks
Item Name: {08223B03-1B38-4A33-A83A-A4D3CC1D6E4E}
Author: Unknown
Related File: C:\WINDOWS\system32\08223B03.dll
Type: Shell Execute Hooks
Item Name: {F1455861-8C40-4095-ABD8-7BEAE5ADF92E}
Author: Unknown
Related File: C:\WINDOWS\system32\Rwad8sdv4e7V8xpKZ.dll
Type: Shell Execute Hooks
Item Name: COMRES.DLL
Author: Unknown
Related File: C:\WINDOWS\SYSTEM32\COMRES.DLL
Type: Infected System Files
Item Name: E0C6D21
Author: Unknown
Related File: C:\WINDOWS\system32\C3E3A56.exe
Type: Registry Run
Removal Results: Success
Number of reboot: 1
-------------------------------------------------------------------------------------
Recommended software:
UnHackMe anti-rootkit and anti-malware
http://www.unhackme.com
RegRun Security Suite (Good choice for removal and protection)
hndcs96gqxdk.dll | Malware |
hndcs96gqxdk.dll | Dangerous |
hndcs96gqxdk.dll | High Risk |
08223B03.dll is Trojan/Backdoor.
Kill the file 08223B03.dll and remove 08223B03.dll from Windows startup.
File: calc.exe (C:\sand-box\calc.exe)
-------------------------------------------------------------------------------------
Classification:
Code:
Antivirus Version Last Update Result
Avast 4.8.1335.0 2009.08.20 Win32:Trojan-gen {Other}
AVG 8.5.0.406 2009.08.21 KillAV.TZ.dropper
BitDefender 7.2 2009.08.21 Generic.Malware.SFP!BTkprn.D2045EE7
Comodo 2039 2009.08.21 TrojWare.Win32.PSW.OLGames.~EM
DrWeb 5.0.0.12182 2009.08.21 Trojan.Starter.1019
F-Secure 8.0.14470.0 2009.08.20 Trojan-Dropper.Win32.Agent.anko
Kaspersky 7.0.0.125 2009.08.21 Trojan-Dropper.Win32.Agent.anko
Microsoft 1.4903 2009.08.20 Trojan:Win32/Abndog.A
NOD32 4353 2009.08.20 a variant of Win32/TrojanDropper.Delf.NLY
Symantec 1.4.4.12 2009.08.21 Trojan Horse
Additional information
File size: 41624 bytes
MD5 : c50f801360cb2c23f56fd3e42221c2cc
SHA1 : e45c0ba2b4600fca6d68be5e3786b706c3150e40
-------------------------------------------------------------------------------------
Installation
When the program is executed, it creates the following registry subkeys and values:
----------------------------------
Keys added:150
----------------------------------
HKLM\SOFTWARE\Classes\CLSID\{08223B03-1B38-4A33-A83A-A4D3CC1D6E4E}
HKLM\SOFTWARE\Classes\CLSID\{08223B03-1B38-4A33-A83A-A4D3CC1D6E4E}\InprocServer32
HKLM\SOFTWARE\Classes\CLSID\{122B901E-493F-4AD9-BC69-7DE8C3E52FCC}
/.../
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adam.exe
/.../
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsstat.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webscanx.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WoptiClean.exe
HKLM\SOFTWARE\Microsoft\DownloadManager
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX\0000
HKLM\SYSTEM\CurrentControlSet\Services\ATICVVX
HKLM\SYSTEM\CurrentControlSet\Services\ATICVVX\Security
----------------------------------
Values added:200
----------------------------------
HKLM\SOFTWARE\Classes\CLSID\{08223B03-1B38-4A33-A83A-A4D3CC1D6E4E}\InprocServer32\: "C:\WINDOWS\system32\08223B03.dll"
HKLM\SOFTWARE\Classes\CLSID\{08223B03-1B38-4A33-A83A-A4D3CC1D6E4E}\InprocServer32\ThreadingModel: "Apartment"
HKLM\SOFTWARE\Classes\CLSID\{122B901E-493F-4AD9-BC69-7DE8C3E52FCC}\InprocServer32\: "C:\WINDOWS\system32\122B901E.dll"
/.../
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.exe\debugger: "ntsd -d"
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\debugger: "ntsd -d"
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\debugger: "ntsd -d"
/.../
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsstat.exe\debugger: "ntsd -d"
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webscanx.exe\debugger: "ntsd -d"
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WoptiClean.exe\debugger: "ntsd -d"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX\0000\Service: "ATICVVX"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX\0000\Legacy: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX\0000\ConfigFlags: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX\0000\Class: "LegacyDriver"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX\0000\ClassGUID: "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX\0000\DeviceDesc: "ATICVVX"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX\NextInstance: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\ATICVVX\Security\Security: 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 00 01 02 00 00 00 00 00 05 20 00 00 00 20 02 00 00 00 00 14 00 8D 01 02 00 01 01 00 00 00 00 00 05 0B 00 00 00 00 00 18 00 FD 01 02 00 01 02 00 00 00 00 00 05 20 00 00 00 23 02 00 00 01 01 00 00 00 00 00 05 12 00 00 00 01 01 00 00 00 00 00 05 12 00 00 00
HKLM\SYSTEM\CurrentControlSet\Services\ATICVVX\Type: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\ATICVVX\Start: 0x00000003
HKLM\SYSTEM\CurrentControlSet\Services\ATICVVX\ErrorControl: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\ATICVVX\ImagePath: "\??\C:\WINDOWS\system32\Drivers\acpiec.sys"
HKLM\SYSTEM\CurrentControlSet\Services\ATICVVX\DisplayName: "ATICVVX"
HKCU\Software\Microsoft\Notepad\lfEscapement: 0x00000000
HKCU\Software\Microsoft\Notepad\lfOrientation: 0x00000000
HKCU\Software\Microsoft\Notepad\lfWeight: 0x00000190
HKCU\Software\Microsoft\Notepad\lfItalic: 0x00000000
HKCU\Software\Microsoft\Notepad\lfUnderline: 0x00000000
HKCU\Software\Microsoft\Notepad\lfStrikeOut: 0x00000000
HKCU\Software\Microsoft\Notepad\lfCharSet: 0x00000000
HKCU\Software\Microsoft\Notepad\lfOutPrecision: 0x00000001
HKCU\Software\Microsoft\Notepad\lfClipPrecision: 0x00000002
HKCU\Software\Microsoft\Notepad\lfQuality: 0x00000002
HKCU\Software\Microsoft\Notepad\lfPitchAndFamily: 0x00000031
HKCU\Software\Microsoft\Notepad\iPointSize: 0x00000064
HKCU\Software\Microsoft\Notepad\fWrap: 0x00000000
HKCU\Software\Microsoft\Notepad\StatusBar: 0x00000000
HKCU\Software\Microsoft\Notepad\fSaveWindowPositions: 0x00000000
HKCU\Software\Microsoft\Notepad\lfFaceName: "Lucida Console"
HKCU\Software\Microsoft\Notepad\szHeader: "&f"
HKCU\Software\Microsoft\Notepad\szTrailer: "Page &p"
HKCU\Software\Microsoft\Notepad\iMarginTop: 0x000003E8
HKCU\Software\Microsoft\Notepad\iMarginBottom: 0x000003E8
HKCU\Software\Microsoft\Notepad\iMarginLeft: 0x000002EE
HKCU\Software\Microsoft\Notepad\iMarginRight: 0x000002EE
HKCU\Software\Microsoft\Notepad\fMLE_is_broken: 0x00000000
HKCU\Software\Microsoft\Notepad\iWindowPosX: 0x00000058
HKCU\Software\Microsoft\Notepad\iWindowPosY: 0x00000058
HKCU\Software\Microsoft\Notepad\iWindowPosDX: 0x00000258
HKCU\Software\Microsoft\Notepad\iWindowPosDY: 0x0000019A
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\E0C6D21: "C:\WINDOWS\system32\C3E3A56.exe"
----------------------------------
Values modified:0
----------------------------------
----------------------------------
Files added:32
----------------------------------
C:\WINDOWS\Fonts\6e6EUdxVeWUYJynN.Ttf
C:\WINDOWS\Fonts\CcKKcpwJmND4.Ttf
C:\WINDOWS\Fonts\cFDPmh3MDPjcHMPd.Ttf
C:\WINDOWS\Fonts\CSzZ3gVtf.Ttf
C:\WINDOWS\Fonts\e38H8kRkk.Ttf
C:\WINDOWS\Fonts\eCgMhGRkPUcdutd0.Ttf
C:\WINDOWS\Fonts\FCvvnT2B.Ttf
C:\WINDOWS\Fonts\NPPVWvYEyCe8H.fon
C:\WINDOWS\Fonts\pDuuqr4BgFn65AeW.Ttf
C:\WINDOWS\Fonts\qP2N8HTHkmGRq5.Ttf
C:\WINDOWS\Fonts\tHCsj3zT7wpspzWKuBu.Ttf
C:\WINDOWS\Fonts\vwuXtYbhj.fon
C:\WINDOWS\Fonts\yGMHUAj5Npydj8FZ.Ttf
C:\WINDOWS\Fonts\yHguCdqt6hp2.Ttf
C:\WINDOWS\Fonts\YywxhF7TSnkktrJw.Ttf
C:\WINDOWS\Fonts\Z3tcgfaZ.Ttf
C:\WINDOWS\Fonts\zEfE48cw9EmcFaR.fon
C:\WINDOWS\system32\08223B03.dll
C:\WINDOWS\system32\122B901E.dll
C:\WINDOWS\system32\A0C86020.dll
C:\WINDOWS\system32\C3E3A56.exe
C:\WINDOWS\system32\D6C0C32.dll
C:\WINDOWS\system32\dfc8ac3ed7da.dll
C:\WINDOWS\system32\ed78ab9.dll
C:\WINDOWS\system32\hNdcS96gQxDk.dll
C:\WINDOWS\system32\mFr9FPruEFZ9VNdrveJunw3.dll
C:\WINDOWS\system32\Qh6xX7VN48sVPnK.dll
C:\WINDOWS\system32\Rwad8sdv4e7V8xpKZ.dll
C:\WINDOWS\system32\skcfujQ5EDN.dll
C:\WINDOWS\system32\v54M9wWBuNGTf2m.dll
C:\WINDOWS\system32\Va7SpUWgCA5f.dll
C:\000D4C71\C_754.nls
----------------------------------
Files deleted:2
----------------------------------
C:\sand-box\calc.exe
C:\WINDOWS\system32\verclsid.exe
----------------------------------
Files [attributes?] modified:2
----------------------------------
C:\WINDOWS\system32\comres.dll
C:\WINDOWS\system32\drivers\acpiec.sys
----------------------------------
Folders added:1
----------------------------------
C:\000D4C71
----------------------------------
Folders deleted:0
----------------------------------
----------------------------------
Total changes:387
----------------------------------
-------------------------------------------------------------------------------------
Internet activity:
Code:
HTTP POST http://baidu.1cznn9.com.cn/tj/count.asp
HTTP GET http://baidu.1cznn9.com.cn/calc.txt
HTTP GET http://baidu.1cznn9.com.cn/down/zydnf.ex...
HTTP GET http://baidu.1cznn9.com.cn/down/lmwd.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmtlbb.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmmh.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmyh.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmcjsh.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmqqhx.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmqqsg.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmwmgj.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmzx.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmrxjh.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmjxsj.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmchuans...
HTTP GET http://baidu.1cznn9.com.cn/down/lmdh2.ex...
HTTP GET http://baidu.1cznn9.com.cn/calc.txt
HTTP GET http://baidu.1cznn9.com.cn/down/lmwd.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmtlbb.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmmh.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmyh.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmcjsh.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmqqhx.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmqqsg.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmwmgj.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmzx.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmrxjh.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmjxsj.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmchuans...
HTTP GET http://baidu.1cznn9.com.cn/down/lmdh2.ex...
HTTP GET http://baidu.1cznn9.com.cn/down/lmzt.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmxx.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmhx2.ex...
HTTP GET http://baidu.1cznn9.com.cn/down/jxdj.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/jxzh.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/jxsg.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmxc.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmdh3.ex...
HTTP GET http://baidu.1cznn9.com.cn/down/lmsx.exe...
HTTP GET http://baidu.1cznn9.com.cn/calc.txt
HTTP GET http://baidu.1cznn9.com.cn/down/zydnf.ex...
HTTP GET http://baidu.1cznn9.com.cn/down/lmwd.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmtlbb.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmmh.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmyh.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmcjsh.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmqqhx.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmqqsg.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmwmgj.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmzx.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmrxjh.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmjxsj.e...
HTTP GET http://baidu.1cznn9.com.cn/down/lmchuans...
HTTP GET http://baidu.1cznn9.com.cn/down/lmdh2.ex...
HTTP GET http://baidu.1cznn9.com.cn/down/lmzt.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmxx.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmhx2.ex...
HTTP GET http://baidu.1cznn9.com.cn/down/jxdj.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/jxzh.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/jxsg.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmxc.exe...
HTTP GET http://baidu.1cznn9.com.cn/down/lmdh3.ex...
HTTP GET http://baidu.1cznn9.com.cn/down/lmsx.exe...
HTTP GET http://http//jun.wuming100.com:8080/vers...
HTTP GET http://baidu.1cznn9.com.cn/down/frjchuan...
HTTP GET http://http//jun.wuming100.com:8080/vers...
HTTP GET http://baidu.1cznn9.com.cn/down/frjwaizh...
-------------------------------------------------------------------------------------
Detected by RegRun Reanimator:
Item Name: {CEBB8F8A-308B-43E9-9789-B6FD6BE1BD97}
Author: Unknown
Related File: C:\WINDOWS\system32\v54M9wWBuNGTf2m.dll
Type: Shell Execute Hooks
Item Name: {9AD1DE62-196C-4C01-9A2F-0BEDEF727C59}
Author: Unknown
Related File: C:\WINDOWS\system32\mFr9FPruEFZ9VNdrveJunw3.dll
Type: Shell Execute Hooks
Item Name: {762D618C-E2CB-4217-8275-03302A93073F}
Author: Unknown
Related File: C:\WINDOWS\fonts\zEfE48cw9EmcFaR.fon
Type: Shell Execute Hooks
Item Name: {B8898C49-7B3A-4306-A9EF-8E186EDEE5EA}
Author: Unknown
Related File: C:\WINDOWS\system32\Qh6xX7VN48sVPnK.dll
Type: Shell Execute Hooks
Item Name: {F8C6B7B5-DAE0-4B78-BF2A-101C9A9CCA27}
Author: Unknown
Related File: C:\WINDOWS\system32\Va7SpUWgCA5f.dll
Type: Shell Execute Hooks
Item Name: {DA112397-5376-4E52-A333-A85284658DEA}
Author: Unknown
Related File: C:\WINDOWS\fonts\NPPVWvYEyCe8H.fon
Type: Shell Execute Hooks
Item Name: {16886058-6A31-4D53-B4AC-4CC7D2248D69}
Author: Unknown
Related File: C:\WINDOWS\fonts\vwuXtYbhj.fon
Type: Shell Execute Hooks
Item Name: {49043CF7-E4A4-47D7-B393-E1523D262189}
Author: Unknown
Related File: C:\WINDOWS\system32\hNdcS96gQxDk.dll
Type: Shell Execute Hooks
Item Name: {122B901E-493F-4AD9-BC69-7DE8C3E52FCC}
Author: Unknown
Related File: C:\WINDOWS\system32\122B901E.dll
Type: Shell Execute Hooks
Item Name: {A0C86020-5935-4B87-B20E-0B656D450264}
Author: Unknown
Related File: C:\WINDOWS\system32\A0C86020.dll
Type: Shell Execute Hooks
Item Name: {A5CA6C70-7185-4466-AB45-B1C34E7A37CA}
Author: Unknown
Related File: C:\WINDOWS\system32\ed78ab9.dll
Type: Shell Execute Hooks
Item Name: {76CBCF38-0583-44C7-A1AE-D463DFE625EC}
Author: Unknown
Related File: C:\WINDOWS\system32\skcfujQ5EDN.dll
Type: Shell Execute Hooks
Item Name: {08223B03-1B38-4A33-A83A-A4D3CC1D6E4E}
Author: Unknown
Related File: C:\WINDOWS\system32\08223B03.dll
Type: Shell Execute Hooks
Item Name: {F1455861-8C40-4095-ABD8-7BEAE5ADF92E}
Author: Unknown
Related File: C:\WINDOWS\system32\Rwad8sdv4e7V8xpKZ.dll
Type: Shell Execute Hooks
Item Name: COMRES.DLL
Author: Unknown
Related File: C:\WINDOWS\SYSTEM32\COMRES.DLL
Type: Infected System Files
Item Name: E0C6D21
Author: Unknown
Related File: C:\WINDOWS\system32\C3E3A56.exe
Type: Registry Run
Removal Results: Success
Number of reboot: 1
-------------------------------------------------------------------------------------
Recommended software:
UnHackMe anti-rootkit and anti-malware
http://www.unhackme.com
RegRun Security Suite (Good choice for removal and protection)
Dmitry Sokolov:
I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.
Since that time I work every day to fix the issues that antiviruses cannot.
If your antivirus have not helped you solve the problem, you should try UnHackMe.
We are a small company and you can ask me directly, if you have any questions.