This is a nasty new infection which can be very difficult
to get rid of,This thing seems to be the latest from the
same People who brought us Vx2. The Transponder
gang.Deleting the filenames related to this often make
new ones appear with random names plus theres usually a
part of this running as a windows service.The windows
service file could be C:\WINDOWS\svcproc.exe but posting
a hijack this log would show the name if its not this.
To check for this go to the run command and type
services.msc.
In the services window that opens,press name to sort into
alphabetical order,check for System Startup Service,if
you find it right click it and choose disable in the
dropdown box. Then hit the Stop button.
Download and run MWavScan(From Microworld):
http://www.mwti.net/antivirus/free_utilities.asp
Choose to scan all files and folders it will produce a
log in the lower section... Scroll down to the part with
bad files left click and scroll over text and use Ctrl-C
to copy it and then paste it here to show the other
filenames running with this.Typically they will be
similar to these but could be a random filenames.
Registry Entry
HKLM\..\Run: [kmajdf] c:windows\system32\eccclq.exe
This is a random name and will change each time you
delete it
System Startup Service (SvcProc)
C:\WINDOWS\svcproc.exe
c:\windows\system32\wvobdmu.exe
c:\windows\system32\eccclq.exe
C:\WINDOWS\hliytirdjmo.exe
C:\WINDOWS\htstgki.exe
C:\WINDOWS\Nail.exe
C:\WINDOWS\system32\nse37.dll
C:\WINDOWS\system32\nsk43.dll
C:\WINDOWS\system32\nsl49.dll
C:\WINDOWS\system32\nso4F.dll
C:\WINDOWS\system32\nss3D.dll
C:\WINDOWS\system32\nsx69.dll
C:\WINDOWS\system32\rtneg.dll
The other way to do this is by running hijack this and
posting the logfile to reveal the same entries but
microworlds escan would be the best start as that will
also scan for any virus entries.Once you know the
filenames connected to this you can use killbox to delete
the files or hijack this in safe mode.
Hijack This
http://www.spywareinfo.com/~merijn/files/hijackthis.zip
Post the microworld scan results or a hijack log and then
we can take it from there
Regards
Andy