Options

New Vundo variant?

Hello. I'm not sure if this is a new Vundo or some older version. I have successfully completed some partial fixes, but am still having problems. The depth of knowledge here at Icrontic is impressive. It is that which I seek. Thank you in advance for your assistance.

From what I am still noticing:
-iexplore.exe likes to run itself- somtimes a couple at a time.
-my desktop is gone every time I reboot.
- windows.explorer is always asking permission to touch out (God knows where)

For the record, I cannot stomach Microsoft at all, nor do I trust anything that bears their name. Thus, with this suspicious activity, I will not give ie access to the internet until this problem is resolved. I did not do a Panda or Karpersky scan. I did a VundoFix.exe scan. There is now nothing in its log.

Here is a recent HJT log:

Logfile of HijackThis v1.99.1
Scan saved at 5:45:00 PM, on 4/11/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.5730.0013)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\WINDOWS\Explorer.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Program Files\ewido anti-spyware 4.0\guard.exe
C:\Program Files\Nero\Nero8\Nero BackItUp\NBService.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\IoctlSvc.exe
C:\WINDOWS\system32\tcpsvcs.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\SYSTEM32\ZoneLabs\vsmon.exe
C:\WINDOWS\System32\WLTRYSVC.EXE
C:\WINDOWS\System32\bcmwltry.exe
C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
C:\WINDOWS\system32\taskmgr.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Common Files\Logitech\QCDriver\LVCOMS.EXE
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\Microsoft ActiveSync\WCESCOMM.EXE
C:\Program Files\Lavasoft\Ad-aware 6\Ad-watch.exe
C:\Program Files\Zone Labs\ZoneAlarm\zapro.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\WINDOWS\System32\svchost.exe
C:\X-Comp Temp\Download1\F I X E S\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.dell4me.com/myway
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
F2 - REG:system.ini: Shell=Explorer.exe
F3 - REG:win.ini: run=""
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {0689A3DC-5F77-4B0E-9749-F09C733BDF93} - (no file)
O2 - BHO: CCHelper Class - {0CF0B8EE-6596-11D5-A98E-0003470BB48E} - C:\Program Files\Panicware\Pop-Up Stopper Companion\CCHelper.dll
O2 - BHO: (no name) - {20CEBB54-33ED-4474-ACCC-579559B5175C} - (no file)
O2 - BHO: (no name) - {22D07D69-197F-4E65-9FB3-148D8620DAF8} - (no file)
O2 - BHO: (no name) - {2B56DFCB-E5A3-4B9B-8879-36EB1CFB52DF} - (no file)
O2 - BHO: QFX Software KeyScrambler - {2B9F5787-88A5-4945-90E7-C4B18563BC5E} - C:\Program Files\KeyScrambler\KeyScramblerIE.dll
O2 - BHO: (no name) - {3DFECD91-16C3-47A2-81F5-A6E18B96B623} - (no file)
O2 - BHO: (no name) - {416AA0B7-2CBF-4E12-80C5-631C06F0E59B} - (no file)
O2 - BHO: (no name) - {4F20C67B-8BCE-47C4-8211-7BF514706566} - (no file)
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {60F7E3FF-CEDD-493E-8993-FF99520DDDCF} - (no file)
O2 - BHO: (no name) - {64FEFDDC-FEA6-4032-9997-001798B275E0} - (no file)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_15\bin\ssv.dll
O2 - BHO: (no name) - {79593EA4-5DFD-439F-901A-F06E97F1ECEB} - (no file)
O2 - BHO: (no name) - {7CE67716-5803-4FB7-B344-0C7A17F93B5D} - C:\WINDOWS\system32\urqoNgeC.dll
O2 - BHO: (no name) - {872EEA82-0072-4E4D-9CA9-DC5FB7538319} - (no file)
O2 - BHO: (no name) - {87D38348-933A-41C3-89F8-4C6B990F705A} - C:\WINDOWS\system32\jkkjj.dll (file missing)
O2 - BHO: (no name) - {988C2F44-64F5-4ED6-8764-703F1DF1B4CD} - (no file)
O2 - BHO: (no name) - {AC1E2845-303D-4D85-853C-2D1A8E98390C} - (no file)
O2 - BHO: (no name) - {ADE4C40E-F537-4DE8-9020-554570EF6727} - (no file)
O2 - BHO: (no name) - {B40CCC5B-BE43-4EB9-BF30-8B053D8F6A59} - (no file)
O2 - BHO: (no name) - {BCCB7002-0E18-450F-B477-383EA11CDB22} - (no file)
O2 - BHO: (no name) - {C6F80791-3C01-4D51-986A-31B51AAB0B7D} - (no file)
O2 - BHO: (no name) - {D61E7438-F7F0-4AF0-8FE1-DD65CDCC7293} - (no file)
O2 - BHO: (no name) - {DC02D646-64A6-41CB-91BA-A7EC76772062} - (no file)
O2 - BHO: (no name) - {F74A7136-2FD7-49BB-B3F9-4158F872EDAE} - (no file)
O3 - Toolbar: Pop-Up Stopper &Companion - {8F05B1A8-9D77-4B8F-AF54-6B2202066F95} - C:\Program Files\Panicware\Pop-Up Stopper Companion\popupus.dll
O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [BCWipeTM Startup] "C:\Program Files\Jetico\BCWipe\BCWipeTM.exe" startup
O4 - HKLM\..\Run: [LVCOMS] C:\Program Files\Common Files\Logitech\QCDriver\LVCOMS.EXE
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [NBKeyScan] "C:\Program Files\Nero\Nero8\Nero BackItUp\NBKeyScan.exe"
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKCU\..\Run: [H/PC Connection Agent] "C:\Program Files\Microsoft ActiveSync\WCESCOMM.EXE"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Global Startup: Ad-watch.lnk = C:\Program Files\Lavasoft\Ad-aware 6\Ad-watch.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: ZoneAlarm Pro.lnk = C:\Program Files\Zone Labs\ZoneAlarm\zapro.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MI3851~1\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_15\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_15\bin\ssv.dll
O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\inetrepl.dll
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\inetrepl.dll
O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\inetrepl.dll
O9 - Extra button: (no name) - {5C106A59-CC3C-4caa-81A4-6D909B5ACE23} - C:\Program Files\KeyScrambler\KeyScramblerIE.dll
O9 - Extra 'Tools' menuitem: &KeyScrambler... - {5C106A59-CC3C-4caa-81A4-6D909B5ACE23} - C:\Program Files\KeyScrambler\KeyScramblerIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MI3851~1\Office12\REFIEBAR.DLL
O9 - Extra button: Share in Hello - {B13B4423-2647-4cfc-A4B3-C7D56CB83487} - C:\Program Files\Hello\PicasaCapture.dll
O9 - Extra 'Tools' menuitem: Share in H&ello - {B13B4423-2647-4cfc-A4B3-C7D56CB83487} - C:\Program Files\Hello\PicasaCapture.dll
O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O11 - Options group: [INTERNATIONAL] International*
O15 - Trusted Zone: *.myitlab.com
O15 - Trusted Zone: *.pearsoncmg.com
O15 - Trusted Zone: *.pearsoned.com
O16 - DPF: {B3E32D88-8E7F-468F-B0E2-3A300FD4A82C} (Enlite 2.x Simulation Engine Installer) - http://myitlab.pearsoned.com/Pegasus/Modules/SIMIntegration/Resources/ax/stub.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{45F52B4F-028D-49DE-812F-61D0A003ACBB}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CCS\Services\Tcpip\..\{A824733E-4116-420C-9C3A-A57B1116655A}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CCS\Services\Tcpip\..\{F7E267FC-CE0D-4DFF-92FC-384E06570480}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS3\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS4\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
O18 - Filter hijack: text/xml - {807563E5-5146-11D5-A672-00B0D022E945} - C:\PROGRA~1\COMMON~1\MICROS~1\OFFICE12\MSOXMLMF.DLL
O20 - AppInit_DLLs: c:\windows\system32\ddcyxyw.dll
O20 - Winlogon Notify: urqoNgeC - C:\WINDOWS\SYSTEM32\urqoNgeC.dll
O20 - Winlogon Notify: winubg32 - winubg32.dll (file missing)
O21 - SSODL: AvpAvp - {40f11934-d320-4352-b5e8-ef2f104147c3} - C:\WINDOWS\Installer\{40f11934-d320-4352-b5e8-ef2f104147c3}\AvpAvp.dll (file missing)
O23 - Service: AntiVir PersonalEdition Classic Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: ewido anti-spyware 4.0 guard - Anti-Malware Development a.s. - C:\Program Files\ewido anti-spyware 4.0\guard.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Nero BackItUp Scheduler 3 - Nero AG - C:\Program Files\Nero\Nero8\Nero BackItUp\NBService.exe
O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Nero\Lib\NMIndexingService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: PLFlash DeviceIoControl Service - Prolific Technology Inc. - C:\WINDOWS\system32\IoctlSvc.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - %ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini (file missing)
O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs Inc. - C:\WINDOWS\SYSTEM32\ZoneLabs\vsmon.exe
O23 - Service: WLTRYSVC - Unknown owner - C:\WINDOWS\System32\WLTRYSVC.EXE

Cheers!

Comments

  • edited April 2008
    Here are the logs for the Vundofix:
    I don't know where urqoNgeC.dll came from. I can't find any information on it.



    Scan started at 4:18:56 PM 4/10/2008

    Listing files found while scanning....

    C:\WINDOWS\SYSTEM32\fcccCuss.dll
    C:\windows\SYSTEM32\jjkkj.ini
    C:\windows\SYSTEM32\jjkkj.ini2
    C:\windows\SYSTEM32\jkkjj.dll
    C:\WINDOWS\system32\ljjjhed.dll

    Beginning removal...

    Beginning removal...

    Beginning removal...

    Attempting to delete C:\WINDOWS\SYSTEM32\fcccCuss.dll
    C:\WINDOWS\SYSTEM32\fcccCuss.dll Has been deleted!

    Attempting to delete C:\windows\SYSTEM32\jjkkj.ini
    C:\windows\SYSTEM32\jjkkj.ini Has been deleted!

    Attempting to delete C:\windows\SYSTEM32\jjkkj.ini2
    C:\windows\SYSTEM32\jjkkj.ini2 Has been deleted!

    Attempting to delete C:\windows\SYSTEM32\jkkjj.dll
    C:\windows\SYSTEM32\jkkjj.dll Has been deleted!

    Attempting to delete C:\WINDOWS\system32\ljjjhed.dll
    C:\WINDOWS\system32\ljjjhed.dll Could not be deleted.

    Performing Repairs to the registry.
    Done!

    VundoFix V7.0.3

    Scan started at 4:42:06 PM 4/10/2008

    Listing files found while scanning....

    C:\windows\SYSTEM32\ljjjhed.dll

    Beginning removal...

    Attempting to delete C:\windows\SYSTEM32\ljjjhed.dll
    C:\windows\SYSTEM32\ljjjhed.dll Has been deleted!

    Performing Repairs to the registry.
    Done!

    VundoFix V7.0.3

    Scan started at 3:08:48 PM 4/11/2008

    Listing files found while scanning....

    No infected files were found.


    VundoFix V7.0.3

    Scan started at 3:17:55 PM 4/11/2008

    Listing files found while scanning....


    VundoFix V7.0.3

    Scan started at 6:15:30 PM 4/11/2008

    Listing files found while scanning....

    C:\WINDOWS\SYSTEM32\urqoNgeC.dll

    Beginning removal...

    Attempting to delete C:\WINDOWS\SYSTEM32\urqoNgeC.dll
    C:\WINDOWS\SYSTEM32\urqoNgeC.dll Could not be deleted.

    Performing Repairs to the registry.
    Done!

    Beginning removal...

    Performing Repairs to the registry.
    Done!
  • VekaVeka Finland
    edited April 2008
    Hi notsoSterile1. Good job! :)

    Step 1:

    Please download OTMoveIt2 and MBAM to your desktop.

    Step 2:

    Re-open HiJackThis and scan. Check the boxes next to all the entries listed below.

    F3 - REG:win.ini: run=""
    O2 - BHO: (no name) - {0689A3DC-5F77-4B0E-9749-F09C733BDF93} - (no file)
    O2 - BHO: (no name) - {20CEBB54-33ED-4474-ACCC-579559B5175C} - (no file)
    O2 - BHO: (no name) - {22D07D69-197F-4E65-9FB3-148D8620DAF8} - (no file)
    O2 - BHO: (no name) - {2B56DFCB-E5A3-4B9B-8879-36EB1CFB52DF} - (no file)
    O2 - BHO: (no name) - {3DFECD91-16C3-47A2-81F5-A6E18B96B623} - (no file)
    O2 - BHO: (no name) - {416AA0B7-2CBF-4E12-80C5-631C06F0E59B} - (no file)
    O2 - BHO: (no name) - {4F20C67B-8BCE-47C4-8211-7BF514706566} - (no file)
    O2 - BHO: (no name) - {60F7E3FF-CEDD-493E-8993-FF99520DDDCF} - (no file)
    O2 - BHO: (no name) - {64FEFDDC-FEA6-4032-9997-001798B275E0} - (no file)
    O2 - BHO: (no name) - {79593EA4-5DFD-439F-901A-F06E97F1ECEB} - (no file)
    O2 - BHO: (no name) - {7CE67716-5803-4FB7-B344-0C7A17F93B5D} - C:\WINDOWS\system32\urqoNgeC.dll
    O2 - BHO: (no name) - {872EEA82-0072-4E4D-9CA9-DC5FB7538319} - (no file)
    O2 - BHO: (no name) - {87D38348-933A-41C3-89F8-4C6B990F705A} - C:\WINDOWS\system32\jkkjj.dll (file missing)
    O2 - BHO: (no name) - {988C2F44-64F5-4ED6-8764-703F1DF1B4CD} - (no file)
    O2 - BHO: (no name) - {AC1E2845-303D-4D85-853C-2D1A8E98390C} - (no file)
    O2 - BHO: (no name) - {ADE4C40E-F537-4DE8-9020-554570EF6727} - (no file)
    O2 - BHO: (no name) - {B40CCC5B-BE43-4EB9-BF30-8B053D8F6A59} - (no file)
    O2 - BHO: (no name) - {BCCB7002-0E18-450F-B477-383EA11CDB22} - (no file)
    O2 - BHO: (no name) - {C6F80791-3C01-4D51-986A-31B51AAB0B7D} - (no file)
    O2 - BHO: (no name) - {D61E7438-F7F0-4AF0-8FE1-DD65CDCC7293} - (no file)
    O2 - BHO: (no name) - {DC02D646-64A6-41CB-91BA-A7EC76772062} - (no file)
    O2 - BHO: (no name) - {F74A7136-2FD7-49BB-B3F9-4158F872EDAE} - (no file)
    O20 - AppInit_DLLs: c:\windows\system32\ddcyxyw.dll
    O20 - Winlogon Notify: urqoNgeC - C:\WINDOWS\SYSTEM32\urqoNgeC.dll
    O20 - Winlogon Notify: winubg32 - winubg32.dll (file missing)
    O21 - SSODL: AvpAvp - {40f11934-d320-4352-b5e8-ef2f104147c3} - C:\WINDOWS\Installer\{40f11934-d320-4352-b5e8-ef2f104147c3}\AvpAvp.dll (file missing)
    O23 - Service: ewido anti-spyware 4.0 guard - Anti-Malware Development a.s. - C:\Program Files\ewido anti-spyware 4.0\guard.exe


    Now close all windows other than HiJackThis, then click Fix Checked. Close HiJackThis.

    Click Start > Run. Type (or copy & paste) sc delete "ewido anti-spyware 4.0 guard" and hit Enter.

    Step 3:
    • Please double-click OTMoveIt2.exe to run it. (Vista users, please right click on OTMoveit2.exe and select "Run as an Administrator")
    • Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):
      C:\WINDOWS\system32\winubg32.dll
      C:\WINDOWS\system32\urqoNgeC.dll
      C:\WINDOWS\system32\ddcyxyw.dll
      C:\WINDOWS\Installer\{40f11934-d320-4352-b5e8-ef2f104147c3}\AvpAvp.dll
      
    • Return to OTMoveIt2, right click in the "Paste List of Files/Folders to Move" window (under the light Yellow bar) and choose Paste.
    • Click the red Moveit! button.
    • A log of files and folders moved will be created in the c:\_OTMoveIt\MovedFiles folder in the form of Date and Time (mmddyyyy_hhmmss.log). Please open this log in Notepad and post its contents in your next reply.
    • Close OTMoveIt2
    If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.

    Step 4:

    Scan your computer with MBAM

    Double Click mbam-setup.exe to install the application.
    • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    • If an update is found, it will download and install the latest version.
    • Once the program has loaded, select "Perform Quick Scan", then click Scan.
    • The scan may take some time to finish,so please be patient.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Make sure that everything is checked, and click Remove Selected.
    • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
    • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
    • Copy&Paste the entire report in your next reply.
    Extra Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediatly.

    Step 5:

    Please post the contents of the OTMoveIT2 and MBAM's logs.
  • edited April 2008
    vekarppe,
    Thank you for your assistance! I did what you suggested. Here are the logs from OTMoveIT2 and MBAM. I also added a fresh HJT log which you may or may not need.

    [FONT=&quot]OTMoveIt File[/FONT][FONT=&quot]:[/FONT]
    File/Folder C:\WINDOWS\system32\winubg32.dll not found.
    DllUnregisterServer procedure not found in C:\WINDOWS\system32\urqoNgeC.dll
    C:\WINDOWS\system32\urqoNgeC.dll NOT unregistered.
    C:\WINDOWS\system32\urqoNgeC.dll moved successfully.
    File/Folder C:\WINDOWS\system32\ddcyxyw.dll not found.
    File/Folder C:\WINDOWS\Installer\{40f11934-d320-4352-b5e8-ef2f104147c3}\AvpAvp.dll not found.

    OTMoveIt2 by OldTimer - Version 1.0.4.1 log created on 04132008_112938

    Malwarebytes Log:

    Malwarebytes' Anti-Malware 1.11
    Database version: 599

    Scan type: Quick Scan
    Objects scanned: 29879
    Time elapsed: 7 minute(s), 0 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 3
    Registry Values Infected: 1
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 7

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    HKEY_CLASSES_ROOT\CLSID\{2b96d5cc-c5b5-49a5-a69d-cc0a30f9028c} (Adware.Minibug) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DataDisp32 (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSMGR (Trojan.Downloader) -> Quarantined and deleted successfully.

    Registry Values Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{182b90a3-f372-438a-800c-6814b4de417b} (Trojan.Vundo) -> Quarantined and deleted successfully.

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    C:\WINDOWS\SYSTEM32\khfGxxXo.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\SYSTEM32\ntload.dll (Trojan.Qqpass) -> Quarantined and deleted successfully.
    C:\WINDOWS\SYSTEM32\mljgg.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\SYSTEM32\mlljh.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\SYSTEM32\mllmn.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\SYSTEM32\ljjgdcc.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\SYSTEM32\qoMfecYr.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

    Logfile of HijackThis v1.99.1
    Scan saved at 5:28:12 PM, on 4/13/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.5730.0013)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
    C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
    C:\Program Files\Nero\Nero8\Nero BackItUp\NBService.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\WINDOWS\system32\IoctlSvc.exe
    C:\WINDOWS\system32\tcpsvcs.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\Explorer.exe
    C:\WINDOWS\SYSTEM32\ZoneLabs\vsmon.exe
    C:\WINDOWS\System32\WLTRYSVC.EXE
    C:\WINDOWS\System32\bcmwltry.exe
    C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
    C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\Program Files\Common Files\Logitech\QCDriver\LVCOMS.EXE
    C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
    C:\Program Files\Microsoft ActiveSync\WCESCOMM.EXE
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Lavasoft\Ad-aware 6\Ad-watch.exe
    C:\Program Files\Zone Labs\ZoneAlarm\zapro.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\SYSTEM32\NOTEPAD.EXE
    C:\X-Comp Temp\Download1\F I X E S\HijackThis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.dell4me.com/myway
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    F2 - REG:system.ini: Shell=Explorer.exe
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: CCHelper Class - {0CF0B8EE-6596-11D5-A98E-0003470BB48E} - C:\Program Files\Panicware\Pop-Up Stopper Companion\CCHelper.dll
    O2 - BHO: QFX Software KeyScrambler - {2B9F5787-88A5-4945-90E7-C4B18563BC5E} - C:\Program Files\KeyScrambler\KeyScramblerIE.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_15\bin\ssv.dll
    O3 - Toolbar: Pop-Up Stopper &Companion - {8F05B1A8-9D77-4B8F-AF54-6B2202066F95} - C:\Program Files\Panicware\Pop-Up Stopper Companion\popupus.dll
    O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [BCWipeTM Startup] "C:\Program Files\Jetico\BCWipe\BCWipeTM.exe" startup
    O4 - HKLM\..\Run: [LVCOMS] C:\Program Files\Common Files\Logitech\QCDriver\LVCOMS.EXE
    O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
    O4 - HKLM\..\Run: [NBKeyScan] "C:\Program Files\Nero\Nero8\Nero BackItUp\NBKeyScan.exe"
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
    O4 - HKCU\..\Run: [H/PC Connection Agent] "C:\Program Files\Microsoft ActiveSync\WCESCOMM.EXE"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - Global Startup: Ad-watch.lnk = C:\Program Files\Lavasoft\Ad-aware 6\Ad-watch.exe
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    O4 - Global Startup: ZoneAlarm Pro.lnk = C:\Program Files\Zone Labs\ZoneAlarm\zapro.exe
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MI3851~1\Office12\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_15\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_15\bin\ssv.dll
    O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\inetrepl.dll
    O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\inetrepl.dll
    O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\inetrepl.dll
    O9 - Extra button: (no name) - {5C106A59-CC3C-4caa-81A4-6D909B5ACE23} - C:\Program Files\KeyScrambler\KeyScramblerIE.dll
    O9 - Extra 'Tools' menuitem: &KeyScrambler... - {5C106A59-CC3C-4caa-81A4-6D909B5ACE23} - C:\Program Files\KeyScrambler\KeyScramblerIE.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MI3851~1\Office12\REFIEBAR.DLL
    O9 - Extra button: Share in Hello - {B13B4423-2647-4cfc-A4B3-C7D56CB83487} - C:\Program Files\Hello\PicasaCapture.dll
    O9 - Extra 'Tools' menuitem: Share in H&ello - {B13B4423-2647-4cfc-A4B3-C7D56CB83487} - C:\Program Files\Hello\PicasaCapture.dll
    O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
    O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O11 - Options group: [INTERNATIONAL] International*
    O15 - Trusted Zone: *.myitlab.com
    O15 - Trusted Zone: *.pearsoncmg.com
    O15 - Trusted Zone: *.pearsoned.com
    O16 - DPF: {B3E32D88-8E7F-468F-B0E2-3A300FD4A82C} (Enlite 2.x Simulation Engine Installer) - http://myitlab.pearsoned.com/Pegasus/Modules/SIMIntegration/Resources/ax/stub.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{45F52B4F-028D-49DE-812F-61D0A003ACBB}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CCS\Services\Tcpip\..\{A824733E-4116-420C-9C3A-A57B1116655A}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CCS\Services\Tcpip\..\{F7E267FC-CE0D-4DFF-92FC-384E06570480}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CS3\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CS4\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
    O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
    O18 - Filter hijack: text/xml - {807563E5-5146-11D5-A672-00B0D022E945} - C:\PROGRA~1\COMMON~1\MICROS~1\OFFICE12\MSOXMLMF.DLL
    O23 - Service: AntiVir PersonalEdition Classic Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
    O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Nero BackItUp Scheduler 3 - Nero AG - C:\Program Files\Nero\Nero8\Nero BackItUp\NBService.exe
    O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Nero\Lib\NMIndexingService.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: PLFlash DeviceIoControl Service - Prolific Technology Inc. - C:\WINDOWS\system32\IoctlSvc.exe
    O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - %ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini (file missing)
    O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
    O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs Inc. - C:\WINDOWS\SYSTEM32\ZoneLabs\vsmon.exe
    O23 - Service: WLTRYSVC - Unknown owner - C:\WINDOWS\System32\WLTRYSVC.EXE
  • VekaVeka Finland
    edited April 2008
    Hi, looks good! :)

    Please do the following...

    Click Start and then Run
    Type (or copy & paste) sc stop SymWSC and hit OK

    Click Start and then Run
    Type (or copy & paste) sc delete SymWSC and hit OK

    This will stop and remove the service related to Norton/Symantec AntiVirus.


    Freedom Networks is your ISP, isn't it?


    Please do a scan with Kaspersky Online Virus Scan

    Click on Kaspersky Online Scanner

    You will be promted to install an ActiveX component from Kaspersky, Click Yes.

    Note for Internet Explorer 7 users: If at any time you have trouble with the accept button of the licence, click on the Zoom tool located at the right bottom of the IE window and set the zoom to 75 %. Once the license accepted, reset to 100%.
    • The program will launch and then begin downloading the latest definition files:
    • Once the files have been downloaded click on NEXT
    • Now click on Scan Settings
    • In the scan settings make that the following are selected:
      • Scan using the following Anti-Virus database:
      • Extended (if available otherwise Standard)
      • Scan Options:
      • Scan Archives
        Scan Mail Bases
    • Click OK
    • Now under select a target to scan:
      • Select My Computer
    • This will program will start and scan your system.
    • The scan will take a while so be patient and let it run.
    • Once the scan is complete it will display if your system has been infected.
      • Now click on the Save as Text button:
    • Save the file to your desktop.
    How is your computer running now?
  • edited April 2008
    verkarppe,

    I did as you suggested. Here is the very interesting Kaspersky log:
    ~Thanks again!

    KASPERSKY ONLINE SCANNER REPORT
    Monday, April 14, 2008 5:30:03 PM
    Operating System: Microsoft Windows XP Home Edition, Service Pack 2 (Build 2600)
    Kaspersky Online Scanner version: 5.0.98.0
    Kaspersky Anti-Virus database last update: 14/04/2008
    Kaspersky Anti-Virus database records: 703811

    Scan Settings:
    Scan using the following antivirus database: extended
    Scan Archives: true
    Scan Mail Bases: true

    Scan Target - My Computer:
    C:\
    D:\

    Scan Statistics:
    Total number of scanned objects: 72001
    Number of viruses found: 14
    Number of infected objects: 86
    Number of suspicious objects: 0
    Duration of the scan process: 05:01:09

    Infected Object Name / Virus Name / Last Action
    C:\Documents and Settings\All Users\Application Data\Nero\Nero8\Nero BackItUp\Cache\NeroBackItUpScheduler3.log Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudCgp.zip/autorun.exe Infected: Trojan.Win32.Qhost.aes skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudCgp.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde1.zip/tuvvttu.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ho skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde1.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde10.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde10.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde11.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde11.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde12.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde12.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde13.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde13.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde14.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde14.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde15.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde15.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde16.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde16.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde17.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde17.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde19.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde19.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde2.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde2.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde20.zip/winjrs32.dll Infected: Trojan.Win32.Dialer.yv skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde20.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde22.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde22.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde23.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde23.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde25.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde25.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde27.zip/winupdate.exe Infected: not-virus:Hoax.Win32.Renos.bja skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde27.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde3.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde3.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde4.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde4.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde5.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde5.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde6.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde6.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde7.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde7.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde8.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde8.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde9.zip/ljjjhed.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.id skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde9.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\VirtumondeCrack1.zip/shell.exe Infected: Trojan.Win32.Qhost.aes skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\VirtumondeCrack1.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\VirtumondeCrack2.zip/spoolvs.exe Infected: Trojan.Win32.Qhost.aes skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\VirtumondeCrack2.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\VirtumondeCrack3.zip/findfast.exe Infected: Trojan.Win32.Qhost.aes skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\VirtumondeCrack3.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\VirtumondeCrack4.zip/printer.exe Infected: Trojan.Win32.Qhost.aes skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\VirtumondeCrack4.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinQhostabh.zip/wowfx.dll Infected: Trojan.Win32.Qhost.abh skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinQhostabh.zip ZIP: infected - 1 skipped
    C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\INDEX.DAT Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
    C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
    C:\Documents and Settings\NetworkService\Cookies\index.dat Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\History\History.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
    C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
    C:\Documents and Settings\Wisdom\Application Data\Microsoft\Templates\Normal.dotm Object is locked skipped
    C:\Documents and Settings\Wisdom\Application Data\Microsoft\Word\AutoRecovery save of Fixes Directions.asd Object is locked skipped
    C:\Documents and Settings\Wisdom\Cookies\index.dat Object is locked skipped
    C:\Documents and Settings\Wisdom\Local Settings\Application Data\Microsoft\Feeds Cache\index.dat Object is locked skipped
    C:\Documents and Settings\Wisdom\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\Wisdom\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\Wisdom\Local Settings\History\History.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\Wisdom\Local Settings\History\History.IE5\MSHist012008041420080415\index.dat Object is locked skipped
    C:\Documents and Settings\Wisdom\Local Settings\Temp\WCESCOMM.LOG Object is locked skipped
    C:\Documents and Settings\Wisdom\Local Settings\Temp\~DFD6AD.tmp Object is locked skipped
    C:\Documents and Settings\Wisdom\Local Settings\Temp\~DFF71.tmp Object is locked skipped
    C:\Documents and Settings\Wisdom\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\Wisdom\Local Settings\Temporary Internet Files\Content.Word\~WRS{0375DEB3-906F-4E55-900C-3D6EC42C2842}.tmp Object is locked skipped
    C:\Documents and Settings\Wisdom\Local Settings\Temporary Internet Files\Content.Word\~WRS{0A15C3E5-12F0-4968-AAD3-3ED525C63993}.tmp Object is locked skipped
    C:\Documents and Settings\Wisdom\Local Settings\Temporary Internet Files\Content.Word\~WRS{9D599ED8-2265-460E-9165-53B0CADC0F49}.tmp Object is locked skipped
    C:\Documents and Settings\Wisdom\ntuser.dat Object is locked skipped
    C:\Documents and Settings\Wisdom\ntuser.dat.LOG Object is locked skipped
    C:\Program Files\Morpheus\Morpheus32.exe/data0002 Infected: not-a-virus:AdWare.Win32.MyWay.o skipped
    C:\Program Files\Morpheus\Morpheus32.exe NSIS: infected - 1 skipped
    C:\Program Files\Morpheus\Morpheus32.exe UPX: infected - 1 skipped
    C:\Program Files\Nero\Nero8\Nero BackItUp\BIU1.txt Object is locked skipped
    C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
    C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP11\A0002398.dll Infected: Trojan.Win32.Qhost.abh skipped
    C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP14\A0002432.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.mde skipped
    C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP15\A0002459.exe/Toolbar.exe Infected: not-a-virus:AdTool.Win32.MyWebSearch.bm skipped
    C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP15\A0002459.exe 7-Zip: infected - 1 skipped
    C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP15\A0002483.exe Infected: not-a-virus:AdTool.Win32.MyWebSearch.bm skipped
    C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP16\change.log Object is locked skipped
    C:\VundoFix Backups\fcccCuss.dll.bad Infected: not-a-virus:AdWare.Win32.Virtumonde.mde skipped
    C:\VundoFix Backups\urqoNgeC.dll.bad Infected: not-a-virus:AdWare.Win32.Virtumonde.mde skipped
    C:\WINDOWS\$_hpcst$.hpc Object is locked skipped
    C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
    C:\WINDOWS\Internet Logs\BROTHER2.ldb Object is locked skipped
    C:\WINDOWS\Internet Logs\IAMDB.RDB Object is locked skipped
    C:\WINDOWS\Internet Logs\tvDebug.log Object is locked skipped
    C:\WINDOWS\SchedLgU.Txt Object is locked skipped
    C:\WINDOWS\Sti_Trace.log Object is locked skipped
    C:\WINDOWS\SYSTEM32\CatRoot2\edb.log Object is locked skipped
    C:\WINDOWS\SYSTEM32\CatRoot2\tmp.edb Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\AppEvent.Evt Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\DEFAULT Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\DEFAULT.LOG Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\Internet.evt Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\ODiag.evt Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\OSession.evt Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SAM Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SAM.LOG Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SecEvent.Evt Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SECURITY Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SECURITY.LOG Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SOFTWARE Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SOFTWARE.LOG Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SysEvent.Evt Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SYSTEM Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SYSTEM.LOG Object is locked skipped
    C:\WINDOWS\SYSTEM32\ddaya.exe Infected: not-a-virus:AdWare.Win32.Virtumonde.dhu skipped
    C:\WINDOWS\SYSTEM32\ddccc.exe Infected: not-a-virus:AdWare.Win32.Virtumonde.dhu skipped
    C:\WINDOWS\SYSTEM32\ddcyy.exe Infected: not-a-virus:AdWare.Win32.Virtumonde.dhu skipped
    C:\WINDOWS\SYSTEM32\gebcc.exe Infected: not-a-virus:AdWare.Win32.Virtumonde.dhu skipped
    C:\WINDOWS\SYSTEM32\H323LOG.TXT Object is locked skipped
    C:\WINDOWS\SYSTEM32\khfGwUlK.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.lrg skipped
    C:\WINDOWS\SYSTEM32\pmkhh.exe Infected: not-a-virus:AdWare.Win32.Virtumonde.dhu skipped
    C:\WINDOWS\SYSTEM32\sstqo.exe Infected: not-a-virus:AdWare.Win32.Virtumonde.dhu skipped
    C:\WINDOWS\SYSTEM32\urqRJCSm.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.lrg skipped
    C:\WINDOWS\SYSTEM32\WBEM\Repository\FS\INDEX.BTR Object is locked skipped
    C:\WINDOWS\SYSTEM32\WBEM\Repository\FS\INDEX.MAP Object is locked skipped
    C:\WINDOWS\SYSTEM32\WBEM\Repository\FS\MAPPING.VER Object is locked skipped
    C:\WINDOWS\SYSTEM32\WBEM\Repository\FS\MAPPING1.MAP Object is locked skipped
    C:\WINDOWS\SYSTEM32\WBEM\Repository\FS\MAPPING2.MAP Object is locked skipped
    C:\WINDOWS\SYSTEM32\WBEM\Repository\FS\OBJECTS.DATA Object is locked skipped
    C:\WINDOWS\SYSTEM32\WBEM\Repository\FS\OBJECTS.MAP Object is locked skipped
    C:\WINDOWS\Temp\ZLT068b2.TMP Object is locked skipped
    C:\WINDOWS\WIADEBUG.LOG Object is locked skipped
    C:\WINDOWS\WIASERVC.LOG Object is locked skipped
    C:\X-Comp Temp\download\ccproxysetup.exe/data0002 Infected: not-a-virus:Server-Proxy.Win32.CCProxy.53b skipped
    C:\X-Comp Temp\download\ccproxysetup.exe/data0003 Infected: not-a-virus:Server-Proxy.Win32.CCProxy.63 skipped
    C:\X-Comp Temp\download\ccproxysetup.exe Inno: infected - 2 skipped
    C:\X-Comp Temp\Download1\dxdsetup.exe Infected: not-a-virus:FraudTool.Win32.SpywareDetector.d skipped
    C:\X-Comp Temp\Download1\F I X E S\Fixes Directions.doc Object is locked skipped
    C:\X-Comp Temp\Download1\F I X E S\HijackThis\backups\backup-20080413-102132-640.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.mde skipped
    C:\X-Comp Temp\Download1\Nero-8.3.2.1_eng_trial(5).exe/Toolbar.exe Infected: not-a-virus:AdTool.Win32.MyWebSearch.bm skipped
    C:\X-Comp Temp\Download1\Nero-8.3.2.1_eng_trial(5).exe 7-Zip: infected - 1 skipped
    C:\X-Comp Temp\Download1\spywaredetectorb.exe/file56 Infected: not-a-virus:FraudTool.Win32.SpywareDetector.d skipped
    C:\X-Comp Temp\Download1\spywaredetectorb.exe Inno: infected - 1 skipped
    C:\_OTMoveIt\MovedFiles\04132008_112938\WINDOWS\system32\urqoNgeC.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.mde skipped

    Scan process completed.
  • VekaVeka Finland
    edited April 2008
    Step 1:
    • Please double-click OTMoveIt2.exe to run it. (Vista users, please right click on OTMoveit2.exe and select "Run as an Administrator")
    • Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):
      C:\Program Files\Morpheus\Morpheus32.exe
      C:\VundoFix Backups\fcccCuss.dll.bad
      C:\VundoFix Backups\urqoNgeC.dll.bad
      C:\WINDOWS\SYSTEM32\ddaya.exe
      C:\WINDOWS\SYSTEM32\ddccc.exe
      C:\WINDOWS\SYSTEM32\ddcyy.exe
      C:\WINDOWS\SYSTEM32\gebcc.exe
      C:\WINDOWS\SYSTEM32\khfGwUlK.dll
      C:\WINDOWS\SYSTEM32\pmkhh.exe
      C:\WINDOWS\SYSTEM32\sstqo.exe
      C:\WINDOWS\SYSTEM32\urqRJCSm.dll
      C:\X-Comp Temp\download\ccproxysetup.exe
      C:\X-Comp Temp\Download1\dxdsetup.exe
      C:\X-Comp Temp\Download1\F I X E S\HijackThis\backups\backup-20080413-102132-640.dll
      C:\X-Comp Temp\Download1\Nero-8.3.2.1_eng_trial(5).exe
      C:\X-Comp Temp\Download1\spywaredetectorb.exe
      
    • Return to OTMoveIt2, right click in the "Paste List of Files/Folders to Move" window (under the light Yellow bar) and choose Paste.
    • Click the red Moveit! button.
    • A log of files and folders moved will be created in the c:\_OTMoveIt\MovedFiles folder in the form of Date and Time (mmddyyyy_hhmmss.log). Please open this log in Notepad and post its contents in your next reply.
    • Close OTMoveIt2
    If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.

    Step 2:

    Clean up System Restore
    1. Right-click My Computer, and then click Properties.
    2. On the "Performance tab", click File System, or press ALT+F.
    3. On the "Troubleshooting tab", click to select the Disable System Restore check box.
    4. Click OK twice, and then click Yes when you are prompted to restart the computer.
    5. To re-enable System Restore, follow steps 1-3, but in step 3, click to clear the Disable System Restore check box.
    Step 3:

    Clean up the Spybot quarantine
    1. Open Spybot.
    2. If you have a shortcut on your desktop, double click it.
      or
    3. Click Start, then All Programs, then Spybot - Search & DestroySpybot - Search & Destroy and then .
    4. On the left side, click "Recovery".
      NOTE: If this window is empty, you may skip the remaining steps. Exit Spybot. Go to the next section.
    5. Select (place a check) beside ALL the backup files that contain quarantined
    6. Click on the Purge Selected Items button.
    7. A dialog will appear, stating that the backup will be removed. Click Yes.
    8. When the Recovery window is empty, Exit Spybot.
    How is your computer doing? :)
  • edited April 2008
    vekarppe,

    My computer seems to be functioning okay. When I reboot, the Active Desktop Recovery always comes up. Would you know why it does that? Also, from your experience, would a fully functioning Kaspersky program effectively eliminate all the threats it detects?
    To the best of your knowledge, is my computer uninfected now?

    ~I appreciate it!

    Here is the OTMoveIt2 log:

    C:\Program Files\Morpheus\Morpheus32.exe moved successfully.
    C:\VundoFix Backups\fcccCuss.dll.bad moved successfully.
    C:\VundoFix Backups\urqoNgeC.dll.bad moved successfully.
    C:\WINDOWS\SYSTEM32\ddaya.exe moved successfully.
    C:\WINDOWS\SYSTEM32\ddccc.exe moved successfully.
    C:\WINDOWS\SYSTEM32\ddcyy.exe moved successfully.
    C:\WINDOWS\SYSTEM32\gebcc.exe moved successfully.
    DllUnregisterServer procedure not found in C:\WINDOWS\SYSTEM32\khfGwUlK.dll
    C:\WINDOWS\SYSTEM32\khfGwUlK.dll NOT unregistered.
    C:\WINDOWS\SYSTEM32\khfGwUlK.dll moved successfully.
    C:\WINDOWS\SYSTEM32\pmkhh.exe moved successfully.
    C:\WINDOWS\SYSTEM32\sstqo.exe moved successfully.
    DllUnregisterServer procedure not found in C:\WINDOWS\SYSTEM32\urqRJCSm.dll
    C:\WINDOWS\SYSTEM32\urqRJCSm.dll NOT unregistered.
    C:\WINDOWS\SYSTEM32\urqRJCSm.dll moved successfully.
    C:\X-Comp Temp\download\ccproxysetup.exe moved successfully.
    C:\X-Comp Temp\Download1\dxdsetup.exe moved successfully.
    DllUnregisterServer procedure not found in C:\X-Comp Temp\Download1\F I X E S\HijackThis\backups\backup-20080413-102132-640.dll
    C:\X-Comp Temp\Download1\F I X E S\HijackThis\backups\backup-20080413-102132-640.dll NOT unregistered.
    C:\X-Comp Temp\Download1\F I X E S\HijackThis\backups\backup-20080413-102132-640.dll moved successfully.
    C:\X-Comp Temp\Download1\Nero-8.3.2.1_eng_trial(5).exe moved successfully.
    C:\X-Comp Temp\Download1\spywaredetectorb.exe moved successfully.

    OTMoveIt2 by OldTimer - Version 1.0.4.1 log created on 04152008_135326
  • VekaVeka Finland
    edited April 2008
    When I reboot, the Active Desktop Recovery always comes up. Would you know why it does that?
    I'm not sure about that, but please check if these helps you to fix this problem

    http://www.daniweb.com/forums/thread63865.html
    http://theofficecubicle.com/2008/01/18/active-desktop-recovery-object-doesnt-support-this-action/

    (use these guides on your own responsibility)
    Also, from your experience, would a fully functioning Kaspersky program effectively eliminate all the threats it detects?
    I think it would, probably. But it also depend on what kind of threat you have. There are bad malwares that can disable antivirus programs.
    To the best of your knowledge, is my computer uninfected now?
    Yes, that's what I believe.

    ==============================================

    Let's remove all used tools:
    • Make sure you have an Internet Connection.
    • Double-click OTMoveIt2.exe to run it. (Vista users, please right click on OTMoveit2.exe and select "Run as an Administrator")
    • Click on the CleanUp! button
    • A list of tool components used in the Cleanup of malware will be downloaded.
    • If your Firewall or Real Time protection attempts to block OtMoveit2 to reach the Internet, please allow the application to do so.
    • Click Yes to begin the Cleanup process and remove these components, including this application.
    • You will be asked to reboot the machine to finish the Cleanup process. If you are asked to reboot the machine choose Yes.
    ==============================================

    Finally, please post a fresh HijackThis log. :)
  • edited April 2008
    vekarppe,

    I have the rebooting thing fixed. It no longer does that. Thank you again for all your help. You've been great! Here is a fresh HJT log:

    Logfile of HijackThis v1.99.1
    Scan saved at 1:40:08 PM, on 4/16/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.5730.0013)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
    C:\Program Files\Nero\Nero8\Nero BackItUp\NBService.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\WINDOWS\system32\IoctlSvc.exe
    C:\WINDOWS\system32\tcpsvcs.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\SYSTEM32\ZoneLabs\vsmon.exe
    C:\WINDOWS\Explorer.exe
    C:\WINDOWS\System32\WLTRYSVC.EXE
    C:\WINDOWS\System32\bcmwltry.exe
    C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\Program Files\Common Files\Logitech\QCDriver\LVCOMS.EXE
    C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
    C:\Program Files\Zone Labs\ZoneAlarm\zapro.exe
    C:\Program Files\Microsoft ActiveSync\WCESCOMM.EXE
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Lavasoft\Ad-aware 6\Ad-watch.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\WINDOWS\System32\svchost.exe
    C:\X-Comp Temp\Download1\F I X E S\HijackThis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.dell4me.com/myway
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    F2 - REG:system.ini: Shell=Explorer.exe
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: CCHelper Class - {0CF0B8EE-6596-11D5-A98E-0003470BB48E} - C:\Program Files\Panicware\Pop-Up Stopper Companion\CCHelper.dll
    O2 - BHO: QFX Software KeyScrambler - {2B9F5787-88A5-4945-90E7-C4B18563BC5E} - C:\Program Files\KeyScrambler\KeyScramblerIE.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_15\bin\ssv.dll
    O3 - Toolbar: Pop-Up Stopper &Companion - {8F05B1A8-9D77-4B8F-AF54-6B2202066F95} - C:\Program Files\Panicware\Pop-Up Stopper Companion\popupus.dll
    O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [BCWipeTM Startup] "C:\Program Files\Jetico\BCWipe\BCWipeTM.exe" startup
    O4 - HKLM\..\Run: [LVCOMS] C:\Program Files\Common Files\Logitech\QCDriver\LVCOMS.EXE
    O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
    O4 - HKLM\..\Run: [NBKeyScan] "C:\Program Files\Nero\Nero8\Nero BackItUp\NBKeyScan.exe"
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
    O4 - HKLM\..\Run: [Ad-watch] C:\Program Files\Lavasoft\Ad-aware 6\Ad-watch.exe
    O4 - HKLM\..\Run: [zapro] C:\Program Files\Zone Labs\ZoneAlarm\zapro.exe
    O4 - HKCU\..\Run: [H/PC Connection Agent] "C:\Program Files\Microsoft ActiveSync\WCESCOMM.EXE"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - Startup: ZoneAlarm Pro.lnk = C:\Program Files\Zone Labs\ZoneAlarm\zapro.exe
    O4 - Global Startup: Ad-watch.lnk = C:\Program Files\Lavasoft\Ad-aware 6\Ad-watch.exe
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    O4 - Global Startup: zapro.lnk = C:\Program Files\Zone Labs\ZoneAlarm\zapro.exe
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MI3851~1\Office12\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_15\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_15\bin\ssv.dll
    O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\inetrepl.dll
    O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\inetrepl.dll
    O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\inetrepl.dll
    O9 - Extra button: (no name) - {5C106A59-CC3C-4caa-81A4-6D909B5ACE23} - C:\Program Files\KeyScrambler\KeyScramblerIE.dll
    O9 - Extra 'Tools' menuitem: &KeyScrambler... - {5C106A59-CC3C-4caa-81A4-6D909B5ACE23} - C:\Program Files\KeyScrambler\KeyScramblerIE.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MI3851~1\Office12\REFIEBAR.DLL
    O9 - Extra button: Share in Hello - {B13B4423-2647-4cfc-A4B3-C7D56CB83487} - C:\Program Files\Hello\PicasaCapture.dll
    O9 - Extra 'Tools' menuitem: Share in H&ello - {B13B4423-2647-4cfc-A4B3-C7D56CB83487} - C:\Program Files\Hello\PicasaCapture.dll
    O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
    O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O11 - Options group: [INTERNATIONAL] International*
    O15 - Trusted Zone: http://www.kaspersky.com
    O15 - Trusted Zone: *.myitlab.com
    O15 - Trusted Zone: *.pearsoncmg.com
    O15 - Trusted Zone: *.pearsoned.com
    O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/eng/partner/us/kavwebscan_unicode.cab
    O16 - DPF: {B3E32D88-8E7F-468F-B0E2-3A300FD4A82C} (Enlite 2.x Simulation Engine Installer) - http://myitlab.pearsoned.com/Pegasus/Modules/SIMIntegration/Resources/ax/stub.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{45F52B4F-028D-49DE-812F-61D0A003ACBB}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CCS\Services\Tcpip\..\{A824733E-4116-420C-9C3A-A57B1116655A}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CCS\Services\Tcpip\..\{F7E267FC-CE0D-4DFF-92FC-384E06570480}: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CS3\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CS4\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
    O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
    O18 - Filter hijack: text/xml - {807563E5-5146-11D5-A672-00B0D022E945} - C:\PROGRA~1\COMMON~1\MICROS~1\OFFICE12\MSOXMLMF.DLL
    O23 - Service: AntiVir PersonalEdition Classic Scheduler (AntiVirScheduler) - Unknown owner - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe (file missing)
    O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Nero BackItUp Scheduler 3 - Nero AG - C:\Program Files\Nero\Nero8\Nero BackItUp\NBService.exe
    O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Nero\Lib\NMIndexingService.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: PLFlash DeviceIoControl Service - Prolific Technology Inc. - C:\WINDOWS\system32\IoctlSvc.exe
    O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - %ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini (file missing)
    O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs Inc. - C:\WINDOWS\SYSTEM32\ZoneLabs\vsmon.exe
    O23 - Service: WLTRYSVC - Unknown owner - C:\WINDOWS\System32\WLTRYSVC.EXE
  • VekaVeka Finland
    edited April 2008
    Everything looks good. :)


    Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:

    Make Your Internet Explorer More Secure

    This can be done by following these simple instructions:
    • From within Internet Explorer click on the tools menu and then click on Options
    • Click once on the "Security" tab
    • Click once on the "Internet" icon so it becomes highlighted
    • Click once on the Custom Level button.
      • Change the "Download signed ActiveX" controls to Prompt
      • Change the "Download unsigned ActiveX" controls to Disable
      • Change the "Initialize and script ActiveX controls" not marked as safe to Disable
      • Change the "Launching programs and files in an IFRAME" to Prompt
      • Change the "Navigate sub-frames across different domains" to Prompt
      • When all these settings have been made, click on the OK button.
      • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    • Next press the Apply button and then the OK to exit the Internet Properties page.
    Note that Internet Explorer is not the most secure browser. There are safer (and better) alternatives available like Opera and Firefox.

    Keep Your System Up to date

    It is imperative that you keep your Windows, Antivirus, and other softwares up to date. Otherwise you are not protected against new threats and your system is vulnerable and unsafe. Update your Antivirus software at least once a week, and visit Microsoft Windows Update site regularly.

    Install SpywareBlaster

    SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware, Hijackers, and Malware

    Additional Utilities and Tips to Enhance Your Safety
    • MVPS Hosts file --- The MVPS Hosts file replaces your current HOSTS file with one containing well know ad sites etc. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer.
    • Comodo BOCLEAN --- Stop identity thieves from getting personal information. Instantly detects well over 1,000,000 unique, variant and repack malware in total. And it's free.
    • Winpatrol --- Download and install the free version of Winpatrol. A tutorial for this product is located here: Using Winpatrol to protect your computer from malicious software
    Get more knowledge about how to protecet your computer and prevent malware issues by reading these short articles: Happy surfing and stay clean!
  • VekaVeka Finland
    edited April 2008
    Glad we could be of assistance! The help you received here was free.

    This topic is now closed. If you wish it reopened, please send a Private Message to Trogan with a link to your thread.

    If you are not the user who started this thread, you must start your own Thread instead :)
    _______________________________
    Have we helped you with any issues you have had with your PCs or other items? If so, you can now help us by Joining Team 93 and fold for a cure.
Sign In or Register to comment.