Help with spyware and pc

edited September 2008 in Spyware & Virus Removal
Hi, here is the virus report and hj report, and the symptoms of my computer.

my computer does not display the c:/ drive,

can't get windows update to work,

and my desktop has been inactive, and won't restore,

plus is very slow - due to some infected files, and virus.

Please, let me know what to do next.

give 2 get = life.

virus report 82808.txt


hijackthis log.txt


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 6:22:46 PM, on 8/28/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\system32\crypserv.exe
C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Spyware Doctor\pctsAuxs.exe
C:\Program Files\Spyware Doctor\pctsSvc.exe
C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Trend Micro\BM\TMBMSRV.exe
C:\WINDOWS\System32\alg.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
C:\Program Files\Trend Micro\Internet Security\TmProxy.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
C:\Program Files\SMSC\Seticon.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe
C:\Program Files\Spyware Doctor\pctsTray.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
C:\Program Files\Registry Mechanic\RegMech.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\WINDOWS\System32\wbem\wmiprvse.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\Userinit.exe
O2 - BHO: (no name) - {4433DF0D-7B52-4F26-A6D6-DC085259E117} - C:\WINDOWS\system32\qoMgfETl.dll (file missing)
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {FFB64CFE-B832-48FC-980D-5B9BB2198F39} - C:\WINDOWS\system32\mLExuTKd.dll (file missing)
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
O4 - HKLM\..\Run: [SetRefresh] C:\Program Files\COMPAQ\SetRefresh\\SetRefresh.exe
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [SetIcon] \Program Files\SMSC\Seticon.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [UfSeAgnt.exe] "C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe"
O4 - HKLM\..\Run: [ISTray] "C:\Program Files\Spyware Doctor\pctsTray.exe"
O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [RegistryMechanic] C:\Program Files\Registry Mechanic\RegMech.exe /H
O4 - HKUS\S-1-5-18\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'Default user')
O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1173988543843
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - (no file)
O20 - AppInit_DLLs: karina.dat
O20 - Winlogon Notify: mLExuTKd - mLExuTKd.dll (file missing)
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Crypkey License - CrypKey (Canada) Ltd. - C:\WINDOWS\SYSTEM32\crypserv.exe
O23 - Service: Google Desktop Manager 5.7.802.22438 (GoogleDesktopManager-022208-143751) - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Trend Micro Central Control Component (SfCtlCom) - Trend Micro Inc. - C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
O23 - Service: Trend Micro Unauthorized Change Prevention Service (TMBMServer) - Trend Micro Inc. - C:\Program Files\Trend Micro\BM\TMBMSRV.exe
O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\Program Files\Trend Micro\Internet Security\TmProxy.exe

--
End of file - 8185 bytes

KASPERSKY ONLINE SCANNER 7 REPORT
Thursday, August 28, 2008
Operating System: Microsoft Windows XP Professional Service Pack 2 (build 2600)
Kaspersky Online Scanner 7 version: 7.0.25.0
Program database last update: Thursday, August 28, 2008 21:44:06
Records in database: 1158226

Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes

Scan area - My Computer:
C:\
D:\
E:\
F:\
G:\
H:\

Scan statistics:
Files scanned: 52191
Threat name: 7
Infected objects: 21
Suspicious objects: 0
Duration of the scan: 01:36:07


File name / Threat name / Threats count
C:\Documents and Settings\SCS\Local Settings\Temp\Rar$DR18.562\AllData9.7_crack\Ace.exe Infected: Trojan-Downloader.Win32.Zlob.toy 1
C:\Documents and Settings\SCS\Local Settings\Temp\Rar$EX02.844\AllData9.7_crack\Ace.exe Infected: Trojan-Downloader.Win32.Zlob.toy 1
C:\Documents and Settings\SCS\My Documents\video cd\support.exe Infected: not-a-virus:RemoteAdmin.Win32.WinVNC-based.c 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\A0066796.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\A0066805.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\A0067855.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\buritos.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr_c4c.VIR Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr_c74.VIR Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP135\A0063941.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP135\A0063942.exe Infected: Trojan-Downloader.Win32.Zlob.toy 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064303.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064304.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064305.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064306.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP140\A0066475.exe Infected: Trojan-Downloader.Win32.Zlob.toy 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP142\A0067838.dll Infected: Trojan.Win32.Monder.gmm 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP146\A0069962.dll Infected: Trojan.Win32.Monder.gqc 1
C:\WINDOWS\system32\tbexoo.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.cut 1
C:\WINDOWS\system32\yiqhyhyt.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.cut 1

The selected area was scanned.

thanks

Comments

  • edited August 2008
    Hello, and welcome to Icrontic Forums! smiley.gif

    Please download Malwarebytes' Anti-Malware by clicking the link below:
    http://www.besttechie.net/tools/mbam-setup.exe

    Double Click mbam-setup.exe to install the application.

    * Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    * If an update is found, it will download and install the latest version.
    * Once the program has loaded, select "Perform Quick Scan", then click Scan.
    * The scan may take some time to finish,so please be patient.
    * When the scan is complete, click OK, then Show Results to view the results.
    * Make sure that everything is checked, and click Remove Selected.
    * When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
    * The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
    * You'll be required to post the contents of this log later.

    Please Note:
    If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediately.


    ==============================================


    Ok. Let's have you download ComboFix.exe. This will give me a better view to the files running and also hidden on your computer and also those in the registry..Please visit this webpage for downloading and instructions for running the tool:

    Go here ======> A guide and tutorial on using ComboFix <====== Go here

    Please ensure you read this guide carefully and install the Recovery Console first.This applies to XP Pro and XP Home users only.If you have SP3 installed you will need to use SP2

    The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

    Once installed, you should get a prompt that says:

    The Recovery Console was successfully installed.

    Please continue as follows:

    (1) Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
    (2) Click Yes to allow ComboFix to continue scanning for malware.

    When the tool is finished, it will produce a report for you.

    Please include the following reports for further review, and so we may continue cleansing the system:

    MBAM log
    C:\ComboFix.txt
    New HijackThis log

    Caution: Never run and remove files with Combofix unless supervised by a qualified security analyst who is experienced in the use of Combofix. Misuse can cause serious computer problems.
  • edited August 2008
    new logs:

    HijackThis:
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 11:33:47 AM, on 8/30/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16705)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\WINDOWS\system32\crypserv.exe
    C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
    C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
    C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    C:\Program Files\SMSC\Seticon.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe
    C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Registry Mechanic\RegMech.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\Program Files\Spyware Doctor\pctsAuxs.exe
    C:\Program Files\Spyware Doctor\pctsSvc.exe
    C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
    C:\Program Files\Spyware Doctor\pctsTray.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Trend Micro\BM\TMBMSRV.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\WINDOWS\System32\alg.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    C:\Program Files\Trend Micro\Internet Security\TmProxy.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\system32\notepad.exe
    C:\WINDOWS\SoftwareDistribution\Download\fd0264849c01086f3c6b505dc02dbd44\update\update.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    C:\WINDOWS\System32\wbem\wmiprvse.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
    O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe
    O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
    O4 - HKLM\..\Run: [SetRefresh] C:\Program Files\COMPAQ\SetRefresh\\SetRefresh.exe
    O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
    O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
    O4 - HKLM\..\Run: [SetIcon] \Program Files\SMSC\Seticon.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [UfSeAgnt.exe] "C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe"
    O4 - HKLM\..\Run: [ISTray] "C:\Program Files\Spyware Doctor\pctsTray.exe"
    O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [RegistryMechanic] C:\Program Files\Registry Mechanic\RegMech.exe /H
    O4 - HKUS\S-1-5-18\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'Default user')
    O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1173988543843
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - (no file)
    O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
    O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: Crypkey License - CrypKey (Canada) Ltd. - C:\WINDOWS\SYSTEM32\crypserv.exe
    O23 - Service: Google Desktop Manager 5.7.802.22438 (GoogleDesktopManager-022208-143751) - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
    O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
    O23 - Service: Trend Micro Central Control Component (SfCtlCom) - Trend Micro Inc. - C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
    O23 - Service: Trend Micro Unauthorized Change Prevention Service (TMBMServer) - Trend Micro Inc. - C:\Program Files\Trend Micro\BM\TMBMSRV.exe
    O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\Program Files\Trend Micro\Internet Security\TmProxy.exe

    --
    End of file - 7749 bytes

    combofix log:
    ComboFix 08-08-29.02 - SCS 2008-08-30 11:14:22.1 - NTFSx86
    Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.131 [GMT -5:00]
    Running from: C:\Documents and Settings\SCS\Desktop\ComboFix.exe
    Command switches used :: C:\Documents and Settings\SCS\Desktop\WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
    * Created a new restore point
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\#SharedObjects\YBB8NC5B\bin.clearspring.com
    C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\#SharedObjects\YBB8NC5B\bin.clearspring.com\clearspring.sol
    C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\#SharedObjects\YBB8NC5B\interclick.com
    C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\#SharedObjects\YBB8NC5B\interclick.com\ud.sol
    C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\#SharedObjects\YBB8NC5B\static.youku.com
    C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\#SharedObjects\YBB8NC5B\static.youku.com\v1.0.0284\v\swf\qplayer.swf\qplayer.sol
    C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\#SharedObjects\YBB8NC5B\static.youku.com\v1.0.0288\v\swf\qplayer.swf\qplayer.sol
    C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#bin.clearspring.com
    C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#bin.clearspring.com\settings.sol
    C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com
    C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com\settings.sol
    C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#static.youku.com
    C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#static.youku.com\settings.sol
    C:\Documents and Settings\SCS\Local Settings\Temporary Internet Files\litogi.com
    C:\Documents and Settings\SCS\Local Settings\Temporary Internet Files\nufovafa.bin
    C:\Documents and Settings\SCS\Local Settings\Temporary Internet Files\puhetago.db
    C:\Documents and Settings\SCS\Local Settings\Temporary Internet Files\qujiva.lib
    C:\Documents and Settings\SCS\Local Settings\Temporary Internet Files\ykabybapi.dl
    C:\WINDOWS\system32\lTEfgMoq.ini
    C:\WINDOWS\system32\lTEfgMoq.ini2
    C:\WINDOWS\system32\nepsnhgm.ini

    .
    ((((((((((((((((((((((((( Files Created from 2008-07-28 to 2008-08-30 )))))))))))))))))))))))))))))))
    .

    2008-08-30 09:58 . 2008-08-30 09:58 <DIR> d
    C:\Program Files\Malwarebytes' Anti-Malware
    2008-08-30 09:58 . 2008-08-30 09:58 <DIR> d
    C:\Documents and Settings\SCS\Application Data\Malwarebytes
    2008-08-30 09:58 . 2008-08-30 09:58 <DIR> d
    C:\Documents and Settings\All Users\Application Data\Malwarebytes
    2008-08-30 09:58 . 2008-08-17 15:01 38,472 --a
    C:\WINDOWS\system32\drivers\mbamswissarmy.sys
    2008-08-30 09:58 . 2008-08-17 15:01 17,144 --a
    C:\WINDOWS\system32\drivers\mbam.sys
    2008-08-28 13:08 . 2008-08-28 13:08 <DIR> d
    C:\Program Files\Lavasoft
    2008-08-28 13:08 . 2008-08-28 13:10 <DIR> d
    C:\Documents and Settings\All Users\Application Data\Lavasoft
    2008-08-28 10:48 . 2008-08-28 10:48 5,759 --a
    C:\WINDOWS\system32\uyeijykj.dll
    2008-08-28 10:45 . 2008-08-28 10:45 5,761 --a
    C:\WINDOWS\system32\wyopsdeg.dll
    2008-08-28 10:17 . 2004-08-04 00:56 116,224 --a--c--- C:\WINDOWS\system32\dllcache\xrxwiadr.dll
    2008-08-28 10:17 . 2001-08-17 22:37 27,648 --a--c--- C:\WINDOWS\system32\dllcache\xrxftplt.exe
    2008-08-28 10:17 . 2001-08-17 22:36 23,040 --a--c--- C:\WINDOWS\system32\dllcache\xrxwbtmp.dll
    2008-08-28 10:17 . 2001-08-17 22:36 17,408 --a--c--- C:\WINDOWS\system32\dllcache\xrxscnui.dll
    2008-08-28 10:17 . 2001-08-17 22:37 4,608 --a--c--- C:\WINDOWS\system32\dllcache\xrxflnch.exe
    2008-08-28 10:15 . 2001-08-17 13:28 794,654 --a--c--- C:\WINDOWS\system32\dllcache\usr1801.sys
    2008-08-28 10:14 . 2001-08-17 12:18 285,760 --a--c--- C:\WINDOWS\system32\dllcache\stlnata.sys
    2008-08-28 10:13 . 2001-08-17 22:36 495,616 --a--c--- C:\WINDOWS\system32\dllcache\sblfx.dll
    2008-08-28 10:12 . 2001-08-17 13:28 899,146 --a--c--- C:\WINDOWS\system32\dllcache\r2mdkxga.sys
    2008-08-28 10:11 . 2001-08-17 14:05 351,616 --a--c--- C:\WINDOWS\system32\dllcache\ovcodek2.sys
    2008-08-28 10:10 . 2001-08-17 12:11 128,000 --a--c--- C:\WINDOWS\system32\dllcache\n100325.sys
    2008-08-28 10:09 . 2001-08-17 13:28 802,683 --a--c--- C:\WINDOWS\system32\dllcache\ltsm.sys
    2008-08-28 10:08 . 2004-08-04 00:56 152,576 --a--c--- C:\WINDOWS\system32\dllcache\irftp.exe
    2008-08-28 10:07 . 2004-08-04 00:56 702,845 --a--c--- C:\WINDOWS\system32\dllcache\i81xdnt5.dll
    2008-08-28 10:06 . 2001-08-17 14:56 1,733,120 --a--c--- C:\WINDOWS\system32\dllcache\g400d.dll
    2008-08-28 10:05 . 2001-08-17 13:28 634,134 --a--c--- C:\WINDOWS\system32\dllcache\el656ct5.sys
    2008-08-28 10:04 . 2001-08-17 12:14 952,007 --a--c--- C:\WINDOWS\system32\dllcache\diwan.sys
    2008-08-28 10:03 . 2001-08-17 12:13 980,034 --a--c--- C:\WINDOWS\system32\dllcache\cicap.sys
    2008-08-28 10:02 . 2001-08-17 14:05 314,752 --a--c--- C:\WINDOWS\system32\dllcache\camdro21.sys
    2008-08-28 10:01 . 2001-08-17 13:28 871,388 --a--c--- C:\WINDOWS\system32\dllcache\bcmdm.sys
    2008-08-28 10:00 . 2001-08-17 13:28 762,780 --a--c--- C:\WINDOWS\system32\dllcache\3cwmcru.sys
    2008-08-28 09:59 . 2001-08-17 14:56 66,048 --a--c--- C:\WINDOWS\system32\dllcache\s3legacy.dll
    2008-08-27 10:44 . 2008-08-27 10:44 5,761 --a
    C:\WINDOWS\system32\qtnydhsp.dll
    2008-08-26 10:43 . 2008-08-26 10:43 5,761 --a
    C:\WINDOWS\system32\kooegnfr.dll
    2008-08-26 10:43 . 2008-08-26 10:43 5,759 --a
    C:\WINDOWS\system32\gvqvagtw.dll
    2008-08-23 16:21 . 2008-08-23 16:21 <DIR> d
    C:\Program Files\Microsoft Silverlight
    2008-08-23 16:16 . 2008-08-23 16:16 <DIR> d
    C:\Program Files\Windows Defender
    2008-08-23 13:56 . 2007-12-10 14:53 81,288 --a
    C:\WINDOWS\system32\drivers\iksyssec.sys
    2008-08-23 13:56 . 2007-12-10 14:53 66,952 --a
    C:\WINDOWS\system32\drivers\iksysflt.sys
    2008-08-23 13:56 . 2008-08-23 14:04 42,376 --a
    C:\WINDOWS\system32\drivers\ikfilesec.sys
    2008-08-23 13:56 . 2007-12-10 14:53 29,576 --a
    C:\WINDOWS\system32\drivers\kcom.sys
    2008-08-23 13:55 . 2008-08-29 16:25 <DIR> d
    C:\Program Files\Spyware Doctor
    2008-08-23 13:55 . 2008-08-23 13:55 <DIR> d
    C:\Documents and Settings\SCS\Application Data\PC Tools
    2008-08-22 19:34 . 2008-08-22 19:34 5,761 --a
    C:\WINDOWS\system32\cgprpovy.dll
    2008-08-22 19:34 . 2008-08-22 19:34 5,759 --a
    C:\WINDOWS\system32\ndtwhcdw.dll
    2008-08-22 14:50 . 2008-08-30 11:22 <DIR> d-a
    C:\Documents and Settings\All Users\Application Data\TEMP
    2008-08-22 14:14 . 2008-02-15 23:39 138,384 --a
    C:\WINDOWS\system32\drivers\tmcomm.sys
    2008-08-22 14:14 . 2008-02-15 23:39 52,496 --a
    C:\WINDOWS\system32\drivers\tmactmon.sys
    2008-08-22 14:14 . 2008-02-15 23:39 52,240 --a
    C:\WINDOWS\system32\drivers\tmevtmgr.sys
    2008-08-22 14:11 . 2008-08-28 18:21 <DIR> d
    C:\Program Files\Trend Micro
    2008-08-22 13:49 . 2008-08-22 13:49 <DIR> d
    C:\Documents and Settings\SCS\.housecall6.6
    2008-08-22 13:35 . 2008-08-22 13:35 <DIR> d
    C:\Program Files\AVG
    2008-08-22 13:35 . 2008-08-22 13:35 <DIR> d
    C:\Documents and Settings\SCS\Application Data\AVGTOOLBAR
    2008-08-22 13:35 . 2008-08-22 13:41 <DIR> d
    C:\Documents and Settings\All Users\Application Data\avg8
    2008-08-22 13:30 . 2008-08-22 13:30 19,114 --a
    C:\Documents and Settings\SCS\Application Data\vuhewelo.vbs
    2008-08-22 13:30 . 2008-08-22 13:30 19,102 --a
    C:\Program Files\Common Files\sigy.sys
    2008-08-22 13:30 . 2008-08-22 13:30 18,919 --a
    C:\Documents and Settings\All Users\Application Data\ujigoj.reg
    2008-08-22 13:30 . 2008-08-22 13:30 17,623 --a
    C:\WINDOWS\ygexijewa.bat
    2008-08-22 13:30 . 2008-08-22 13:30 17,560 --a
    C:\WINDOWS\bitomep.lib
    2008-08-22 13:30 . 2008-08-22 13:30 16,642 --a
    C:\WINDOWS\ribeji.scr
    2008-08-22 13:30 . 2008-08-22 13:30 16,558 --a
    C:\Program Files\Common Files\iribyzag.bin
    2008-08-22 13:30 . 2008-08-22 13:30 16,519 --a
    C:\Program Files\Common Files\okogadapy.reg
    2008-08-22 13:30 . 2008-08-22 13:30 16,042 --a
    C:\WINDOWS\fixedyfu._sy
    2008-08-22 13:30 . 2008-08-22 13:30 14,420 --a
    C:\WINDOWS\asezutax._sy
    2008-08-22 13:30 . 2008-08-22 13:30 13,887 --a
    C:\WINDOWS\system32\siliwavuz.pif
    2008-08-22 13:30 . 2008-08-22 13:30 13,720 --a
    C:\WINDOWS\dabuzaf.bat
    2008-08-22 13:30 . 2008-08-22 13:30 10,704 --a
    C:\WINDOWS\owujygi.dl
    2008-08-22 13:30 . 2008-08-22 13:30 10,441 --a
    C:\WINDOWS\system32\yboguja.lib
    2008-08-22 13:03 . 2008-08-28 14:29 <DIR> d
    C:\Program Files\Spybot - Search & Destroy
    2008-08-22 13:03 . 2008-08-28 14:34 <DIR> d
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
    2008-08-21 18:48 . 2008-08-21 18:48 19,829 --a
    C:\Documents and Settings\SCS\Application Data\yjuf.vbs
    2008-08-21 18:48 . 2008-08-21 18:48 19,429 --a
    C:\WINDOWS\bohusona.inf
    2008-08-21 18:48 . 2008-08-21 18:48 18,407 --a
    C:\Documents and Settings\SCS\Application Data\fypybixuxo.reg
    2008-08-21 18:48 . 2008-08-21 18:48 17,574 --a
    C:\Documents and Settings\SCS\Application Data\atelal.dll
    2008-08-21 18:48 . 2008-08-21 18:48 17,545 --a
    C:\WINDOWS\ymegusiva.dat
    2008-08-21 18:48 . 2008-08-21 18:48 15,680 --a
    C:\WINDOWS\ujyge.db
    2008-08-21 18:48 . 2008-08-21 18:48 14,865 --a
    C:\WINDOWS\system32\redoqo.exe
    2008-08-21 18:48 . 2008-08-21 18:48 14,702 --a
    C:\WINDOWS\pojowalumi.reg
    2008-08-21 18:48 . 2008-08-21 18:48 13,399 --a
    C:\Documents and Settings\All Users\Application Data\onosycerad.com
    2008-08-21 18:48 . 2008-08-21 18:48 12,641 --a
    C:\WINDOWS\izixije.pif
    2008-08-21 18:48 . 2008-08-21 18:48 11,384 --a
    C:\WINDOWS\tabezof.bat
    2008-08-21 18:48 . 2008-08-21 18:48 10,620 --a
    C:\Documents and Settings\SCS\Application Data\inap.vbs
    2008-07-31 12:57 . 2008-07-31 12:57 <DIR> d
    C:\Program Files\Citrix
    2008-07-31 12:57 . 2008-07-31 12:57 60,744 --a
    C:\Documents and Settings\SCS\g2mdlhlpx.exe
    2008-07-23 13:05 . 2004-08-03 22:58 14,848 --a
    C:\WINDOWS\system32\drivers\kbdhid.sys
    2008-07-23 13:05 . 2004-08-03 22:58 14,848 --a--c--- C:\WINDOWS\system32\dllcache\kbdhid.sys
    2008-07-19 14:06 . 2008-08-15 12:44 23 --a
    C:\Documents and Settings\SCS\jagex_runescape_preferences.dat
    2008-07-16 17:53 . 2008-07-16 17:53 <DIR> d
    C:\Documents and Settings\SCS\Application Data\Media Player Classic
    2008-07-16 17:52 . 2008-07-16 17:52 <DIR> d
    C:\Program Files\K-Lite Codec Pack
    2008-07-14 20:51 . 2008-07-14 20:51 <DIR> d
    C:\Documents and Settings\All Users\Application Data\MSScanAppDataDir
    2008-07-03 18:55 . 2008-07-03 18:55 <DIR> d
    C:\Program Files\iPod
    2008-07-03 18:55 . 2008-07-03 18:55 <DIR> d
    C:\Documents and Settings\SCS\Application Data\Apple Computer
    2008-07-03 18:54 . 2008-07-03 18:55 <DIR> d
    C:\Program Files\iTunes
    2008-07-03 18:54 . 2008-07-03 18:54 <DIR> d
    C:\Program Files\Bonjour
    2008-07-03 18:52 . 2008-07-03 18:53 <DIR> d
    C:\Program Files\QuickTime
    2008-07-03 18:52 . 2008-07-03 18:54 <DIR> d
    C:\Documents and Settings\All Users\Application Data\Apple Computer
    2008-07-03 18:49 . 2008-07-03 18:49 <DIR> d----c--- C:\WINDOWS\system32\DRVSTORE
    2008-07-03 18:49 . 2008-07-03 18:49 <DIR> d
    C:\Program Files\Common Files\Apple
    2008-07-03 18:49 . 2008-02-18 11:16 30,464 --a
    C:\WINDOWS\system32\drivers\usbaapl.sys

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2008-08-29 21:11
    d
    w C:\Documents and Settings\All Users\Application Data\Trend Micro
    2008-08-29 21:07
    d
    w C:\Documents and Settings\All Users\Application Data\Google Updater
    2008-08-28 18:07
    d
    w C:\Program Files\Common Files\Wise Installation Wizard
    2008-08-23 22:41
    d
    w C:\Documents and Settings\SCS\Application Data\uTorrent
    2008-08-22 18:30 19,265 ----a-w C:\Program Files\Common Files\aqifeqynot.inf
    2008-08-21 23:48 18,211 ----a-w C:\Program Files\Common Files\lumawyloh.inf
    2008-08-21 23:48 12,483 ----a-w C:\Program Files\Common Files\xomulo.inf
    2008-08-21 23:24
    d
    w C:\Program Files\8.0 Shop Controller
    2008-07-21 23:31
    d
    w C:\Program Files\Java
    2008-07-19 00:08 36,368 ----a-w C:\WINDOWS\system32\drivers\tmpreflt.sys
    2008-07-19 00:08 205,328 ----a-w C:\WINDOWS\system32\drivers\tmxpflt.sys
    2008-07-18 23:51 1,195,448 ----a-w C:\WINDOWS\system32\drivers\vsapint.sys
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "swg"="C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2008-02-28 21:16 68856]
    "BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe" [2006-06-01 14:32 94208]
    "ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-04 01:56 15360]
    "RegistryMechanic"="C:\Program Files\Registry Mechanic\RegMech.exe" [2008-07-08 16:41 2828184]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Google Desktop Search"="C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" [2008-04-27 16:03 29744]
    "NeroFilterCheck"="C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe" [2006-01-12 17:40 155648]
    "ATIPTA"="C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2006-01-04 22:05 344064]
    "SetRefresh"="C:\Program Files\COMPAQ\SetRefresh\\SetRefresh.exe" [2003-11-20 19:01 525824]
    "RemoteControl"="C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe" [2005-01-12 04:01 32768]
    "SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe" [2008-06-10 04:27 144784]
    "Adobe Reader Speed Launcher"="C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 22:16 39792]
    "SetIcon"="\Program Files\SMSC\Seticon.exe" [2005-01-13 09:57 42496]
    "QuickTime Task"="C:\Program Files\QuickTime\QTTask.exe" [2008-05-27 10:50 413696]
    "iTunesHelper"="C:\Program Files\iTunes\iTunesHelper.exe" [2008-06-02 11:13 267048]
    "UfSeAgnt.exe"="C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe" [2008-07-29 14:24 1398024]
    "ISTray"="C:\Program Files\Spyware Doctor\pctsTray.exe" [2008-08-23 14:04 1107848]

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-04 01:56 15360]

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
    "NoDispSettingPage"= 1 (0x1)

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
    "ForceClassicControlPanel"= 1 (0x1)

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
    "VIDC.YV12"= yv12vfw.dll

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\securityproviders]
    SecurityProviders msapsspc.dllschannel.dlldigest.dllmsnsspc.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\security center]
    "AntiVirusDisableNotify"=dword:00000001
    "UpdatesDisableNotify"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\TrendAntiVirus]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\TrendFirewall]
    "DisableMonitoring"=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall"= 0 (0x0)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "C:\\Program Files\\uTorrent\\uTorrent.exe"=
    "C:\\Program Files\\Bonjour\\mDNSResponder.exe"=
    "C:\\Program Files\\iTunes\\iTunes.exe"=

    S3 GoogleDesktopManager-022208-143751;Google Desktop Manager 5.7.802.22438;C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe [2008-04-27 16:03]

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{b80d4292-d3d2-11db-82d1-806d6172696f}]
    \Shell\AutoRun\command - D:\SETUP.EXE
    .
    Contents of the 'Scheduled Tasks' folder

    2008-08-26 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job
    - C:\Program Files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 14:57]
    .
    - - - - ORPHANS REMOVED - - - -

    BHO-{4433DF0D-7B52-4F26-A6D6-DC085259E117} - C:\WINDOWS\system32\qoMgfETl.dll
    HKLM-Run-NWEReboot - (no file)


    .
    Supplementary Scan
    .
    FireFox -: Profile - C:\Documents and Settings\SCS\Application Data\Mozilla\Firefox\Profiles\yijzf82s.default\
    FireFox -: prefs.js - SEARCH.DEFAULTURL - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=
    FireFox -: prefs.js - STARTUP.HOMEPAGE - hxxp://en-us.start.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:en-US:official
    FF -: plugin - C:\Program Files\Google\Google Updater\2.2.1111.1511\npCIDetect11.dll
    FF -: plugin - C:\Program Files\iTunes\Mozilla Plugins\npitunes.dll
    FF -: plugin - C:\Program Files\K-Lite Codec Pack\Real\browser\plugins\nppl3260.dll
    FF -: plugin - C:\Program Files\K-Lite Codec Pack\Real\browser\plugins\nprpjplug.dll
    FF -: plugin - C:\Program Files\Mozilla Firefox\plugins\npGoogleGadgetPluginFirefoxWin.dll
    .

    **************************************************************************

    catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-08-30 11:21:33
    Windows 5.1.2600 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    Other Running Processes
    .
    C:\WINDOWS\system32\ati2evxx.exe
    C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
    C:\WINDOWS\system32\ati2evxx.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\WINDOWS\system32\Crypserv.exe
    C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    C:\Program Files\SMSC\SetIcon.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\Program Files\Spyware Doctor\pctsAuxs.exe
    C:\Program Files\Spyware Doctor\pctsSvc.exe
    C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
    C:\Program Files\Trend Micro\BM\TMBMSRV.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    C:\Program Files\Trend Micro\Internet Security\TmProxy.exe
    C:\WINDOWS\system32\verclsid.exe
    .
    **************************************************************************
    .
    Completion time: 2008-08-30 11:26:53 - machine was rebooted
    ComboFix-quarantined-files.txt 2008-08-30 16:26:36

    Pre-Run: 149,455,613,952 bytes free
    Post-Run: 149,482,139,648 bytes free

    WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
    [boot loader]
    timeout=2
    default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
    [operating systems]
    C:\CMDCONS\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
    multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fastdetect /NoExecute=OptIn

    262 --- E O F --- 2008-08-14 08:16:17


    MBAM log
    Malwarebytes' Anti-Malware 1.25
    Database version: 1098
    Windows 5.1.2600 Service Pack 2

    10:11:55 AM 8/30/2008
    mbam-log-08-30-2008 (10-11-45).txt

    Scan type: Quick Scan
    Objects scanned: 44297
    Time elapsed: 4 minute(s), 53 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 7
    Registry Values Infected: 0
    Registry Data Items Infected: 1
    Folders Infected: 0
    Files Infected: 5

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ffb64cfe-b832-48fc-980d-5b9bb2198f39} (Trojan.Vundo.H) -> No action taken.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mlexutkd (Trojan.Vundo.H) -> No action taken.
    HKEY_CLASSES_ROOT\CLSID\{ffb64cfe-b832-48fc-980d-5b9bb2198f39} (Trojan.Vundo.H) -> No action taken.
    HKEY_CURRENT_USER\SOFTWARE\antivirus 2008 (Rogue.Antivirus2008) -> No action taken.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> No action taken.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> No action taken.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> No action taken.

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives (Hijack.Drives) -> Bad: (12) Good: (0) -> No action taken.

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    C:\WINDOWS\system32\mLExuTKd.dll (Trojan.Vundo.H) -> No action taken.
    C:\WINDOWS\system32\mcrh.tmp (Malware.Trace) -> No action taken.
    C:\WINDOWS\system32\dwepvfyl.dll (Trojan.Vundo) -> No action taken.
    C:\Documents and Settings\SCS\Local Settings\Temporary Internet Files\urynof.exe (Trojan.Agent) -> No action taken.
    C:\Documents and Settings\SCS\Local Settings\Temp\s1265.php (Trojan.FakeAlert) -> No action taken.
  • edited August 2008
    Please download VundoFix.exe
    to your desktop.
    • Double-click VundoFix.exe to run it.
    • Click the Scan for Vundo button.
    • Once it's done scanning, click the Remove Vundo button.
    • You will receive a prompt asking if you want to remove the files, click YES
    • Once you click yes, your desktop will go blank as it starts removing Vundo.
    • When completed, it will prompt that it will reboot your computer, click OK.
    • Please post the contents of C:\vundofix.txt and a new HiJackThis log.
    Note: It is possible that VundoFix encountered a file it could not remove.
    In this case, VundoFix will run on reboot, simply follow the above
    instructions starting from "Click the Scan for Vundo button." when
    VundoFix appears at reboot.
  • edited September 2008
    hi, and thank you for your help:

    Logs:
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:17:23 AM, on 9/1/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16705)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
    C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
    C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe
    C:\Program Files\SMSC\Seticon.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe
    C:\Program Files\Spyware Doctor\pctsTray.exe
    C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Registry Mechanic\RegMech.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\WINDOWS\system32\crypserv.exe
    C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\Program Files\Spyware Doctor\pctsAuxs.exe
    C:\Program Files\Spyware Doctor\pctsSvc.exe
    C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Trend Micro\BM\TMBMSRV.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\WINDOWS\System32\wbem\wmiprvse.exe
    C:\WINDOWS\System32\alg.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\System32\wbem\wmiprvse.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    C:\Program Files\Trend Micro\Internet Security\TmProxy.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
    O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe
    O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
    O4 - HKLM\..\Run: [SetRefresh] C:\Program Files\COMPAQ\SetRefresh\\SetRefresh.exe
    O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
    O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
    O4 - HKLM\..\Run: [SetIcon] \Program Files\SMSC\Seticon.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [UfSeAgnt.exe] "C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe"
    O4 - HKLM\..\Run: [ISTray] "C:\Program Files\Spyware Doctor\pctsTray.exe"
    O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [RegistryMechanic] C:\Program Files\Registry Mechanic\RegMech.exe /H
    O4 - HKUS\S-1-5-18\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'Default user')
    O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1173988543843
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - (no file)
    O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
    O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: Crypkey License - CrypKey (Canada) Ltd. - C:\WINDOWS\SYSTEM32\crypserv.exe
    O23 - Service: Google Desktop Manager 5.7.802.22438 (GoogleDesktopManager-022208-143751) - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
    O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
    O23 - Service: Trend Micro Central Control Component (SfCtlCom) - Trend Micro Inc. - C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
    O23 - Service: Trend Micro Unauthorized Change Prevention Service (TMBMServer) - Trend Micro Inc. - C:\Program Files\Trend Micro\BM\TMBMSRV.exe
    O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\Program Files\Trend Micro\Internet Security\TmProxy.exe

    --
    End of file - 7717 bytes

    and new log for vundofix:


    VundoFix V7.0.6

    Scan started at 9:47:26 AM 9/1/2008

    Listing files found while scanning....

    C:\Windows\system32\cgprpovy.dll
    C:\Windows\system32\gvqvagtw.dll
    C:\Windows\system32\kooegnfr.dll
    C:\Windows\system32\ndtwhcdw.dll
    C:\Windows\system32\qtnydhsp.dll
    C:\Windows\system32\uyeijykj.dll
    C:\Windows\system32\wyopsdeg.dll

    Beginning removal...

    Attempting to delete C:\Windows\system32\cgprpovy.dll
    C:\Windows\system32\cgprpovy.dll Has been deleted!

    Attempting to delete C:\Windows\system32\gvqvagtw.dll
    C:\Windows\system32\gvqvagtw.dll Has been deleted!

    Attempting to delete C:\Windows\system32\kooegnfr.dll
    C:\Windows\system32\kooegnfr.dll Has been deleted!

    Attempting to delete C:\Windows\system32\ndtwhcdw.dll
    C:\Windows\system32\ndtwhcdw.dll Has been deleted!

    Attempting to delete C:\Windows\system32\qtnydhsp.dll
    C:\Windows\system32\qtnydhsp.dll Has been deleted!

    Attempting to delete C:\Windows\system32\uyeijykj.dll
    C:\Windows\system32\uyeijykj.dll Has been deleted!

    Attempting to delete C:\Windows\system32\wyopsdeg.dll
    C:\Windows\system32\wyopsdeg.dll Has been deleted!

    Performing Repairs to the registry.
    Done!

    Question:

    Windows can now install updates: should I update to service pack 3 now, or wait til everything is clean in my computer?

    Thank you once again...
  • edited September 2008
    Hold off for the moment....let's get everything cleaned up first. You may need to print out the following set of instructions or copy it to a Notepad file on your desktop as we will be going offline for a while during the fix.


    First I need you to go to Trend Micro Internet Security and delete the quarantined items stored there.

    Next, boot to Safe Mode using the instructions here.

    Once you're in Safe Mode, navigate to and delete the following files:
    C:\WINDOWS\system32\tbexoo.dll
    C:\WINDOWS\system32\yiqhyhyt.dll

    Restart your computer again to go back to Normal Mode.


    Finally run a new scan with Kaspersky Online Scanner and post the generated log in your new reply. How's your PC running now?
  • edited September 2008
    chiaz wrote:
    Hold off for the moment....let's get everything cleaned up first. You may need to print out the following set of instructions or copy it to a Notepad file on your desktop as we will be going offline for a while during the fix.


    First I need you to go to Trend Micro Internet Security and delete the quarantined items stored there.

    Next, boot to Safe Mode using the instructions here.

    Once you're in Safe Mode, navigate to and delete the following files:
    C:\WINDOWS\system32\tbexoo.dll
    C:\WINDOWS\system32\yiqhyhyt.dll

    Restart your computer again to go back to Normal Mode.


    Finally run a new scan with Kaspersky Online Scanner and post the generated log in your new reply. How's your PC running now?


    Hi, I tried to delete the quarantined, but could not. The files can't be highlighted... The computer is running smooth, a little bit slow -but what a difference. I will do as you instructed, after you reply to this last reply.
  • edited September 2008
    OK, glad to hear that your computer is running smoother.

    Please run a new scan with Kaspersky Online Scanner and post the generated log in your new reply.
  • edited September 2008
    I'll send it tomorrow morning - I'm no longer at work. Thank you for all your help, and yes - I will donate, your forum is such an awesome forum. Thank you very much...
  • edited September 2008
    Let me know how it goes neziak. :)
  • edited September 2008
    chiaz wrote:
    Let me know how it goes neziak. :)

    Sorry it took so long,

    I was not able to delete the two files that you pointed out; I couldn't find them. I think that happen cuz i did a spyware scanned with spyware doctor.

    Here is the log for the anti-virus. And I tried one more time to delete the quarantine files from trend micro but a message indicated that I didn't have the authority to do so.

    KASPERSKY ONLINE SCANNER 7 REPORT
    Wednesday, September 3, 2008
    Operating System: Microsoft Windows XP Professional Service Pack 2 (build 2600)
    Kaspersky Online Scanner 7 version: 7.0.25.0
    Program database last update: Wednesday, September 03, 2008 16:35:25
    Records in database: 1188247

    Scan settings:
    Scan using the following database: extended
    Scan archives: yes
    Scan mail databases: yes

    Scan area - My Computer:
    C:\
    D:\
    E:\
    F:\
    G:\
    H:\
    I:\

    Scan statistics:
    Files scanned: 93305
    Threat name: 7
    Infected objects: 19
    Suspicious objects: 0
    Duration of the scan: 03:05:50


    File name / Threat name / Threats count
    C:\Documents and Settings\SCS\My Documents\video cd\support.exe Infected: not-a-virus:RemoteAdmin.Win32.WinVNC-based.c 1
    C:\Program Files\Trend Micro\Internet Security\Quarantine\A0066796.exe Infected: Hoax.Win32.Renos.vaqt 1
    C:\Program Files\Trend Micro\Internet Security\Quarantine\A0066805.exe Infected: Hoax.Win32.Renos.vaqt 1
    C:\Program Files\Trend Micro\Internet Security\Quarantine\A0067855.exe Infected: Hoax.Win32.Renos.vaqt 1
    C:\Program Files\Trend Micro\Internet Security\Quarantine\buritos.exe Infected: Hoax.Win32.Renos.vaqt 1
    C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
    C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr_c4c.VIR Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
    C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr_c74.VIR Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
    C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP135\A0063941.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
    C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP135\A0063942.exe Infected: Trojan-Downloader.Win32.Zlob.toy 1
    C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064303.exe Infected: Hoax.Win32.Renos.vaqt 1
    C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064304.exe Infected: Hoax.Win32.Renos.vaqt 1
    C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064305.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
    C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064306.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
    C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP140\A0066475.exe Infected: Trojan-Downloader.Win32.Zlob.toy 1
    C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP142\A0067838.dll Infected: Trojan.Win32.Monder.gmm 1
    C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP146\A0069961.dll Infected: Trojan.Win32.Monder.krq 1
    C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP146\A0069962.dll Infected: Trojan.Win32.Monder.gqc 1
    C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP146\A0069980.dll Infected: Trojan.Win32.Monder.krq 1

    The scan was stopped by the user.


    thank you once again...
  • edited September 2008
    Alrighty...

    If you have not installed VNC on your computer and don't know what the following file is for, delete it:
    C:\Documents and Settings\SCS\My Documents\video cd\support.exe

    Now follow the instructions in this link to flush out your System Restore points:
    http://safecomputing.umn.edu/guides/systemrestore.html

    You may post a new Kaspersky Online Scanner log if you wish to, but it is optional. You should be clean now.


    Let us know how things go.
  • edited September 2008
    Here is the last log:

    KASPERSKY ONLINE SCANNER 7 REPORT
    Thursday, September 4, 2008
    Operating System: Microsoft Windows XP Professional Service Pack 2 (build 2600)
    Kaspersky Online Scanner 7 version: 7.0.25.0
    Program database last update: Thursday, September 04, 2008 16:23:28
    Records in database: 1191663

    Scan settings:
    Scan using the following database: extended
    Scan archives: yes
    Scan mail databases: yes

    Scan area - Folder:
    C:\

    Scan statistics:
    Files scanned: 50557
    Threat name: 3
    Infected objects: 8
    Suspicious objects: 0
    Duration of the scan: 01:17:22


    File name / Threat name / Threats count
    C:\Documents and Settings\SCS\My Documents\video cd\support.exe Infected: not-a-virus:RemoteAdmin.Win32.WinVNC-based.c 1
    C:\Program Files\Trend Micro\Internet Security\Quarantine\A0066796.exe Infected: Hoax.Win32.Renos.vaqt 1
    C:\Program Files\Trend Micro\Internet Security\Quarantine\A0066805.exe Infected: Hoax.Win32.Renos.vaqt 1
    C:\Program Files\Trend Micro\Internet Security\Quarantine\A0067855.exe Infected: Hoax.Win32.Renos.vaqt 1
    C:\Program Files\Trend Micro\Internet Security\Quarantine\buritos.exe Infected: Hoax.Win32.Renos.vaqt 1
    C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
    C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr_c4c.VIR Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
    C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr_c74.VIR Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1

    The selected area was scanned.

    thank you so much for your help.
    Question: How do I delete the files that are quarantined in trend micro?

    Can I update to service pack 3 now?

    thank you so much for your help, and I will donate once I get paid this Friday - thank you
  • edited September 2008
    Question: How do I delete the files that are quarantined in trend micro?
    It is not necessary to delete quarantined files, as the files have moved to a 'cache' where it has been 'deactivated', so to speak.

    This is something I found on the web, since I'm not familiar with the Trend Micro interface myself:
    To enter Quarantine, double-click the Trend Micro AntiVirus icon in the System Tray and then click the Virus & Spyware Controls tab. Next, click Quarantine and then click Examine Quarantine Files. The Quarantine menu has separate tabs for viruses and spyware. The Virus Quarantine tab lists any quarantine threats and provides buttons for three actions: Clean, Delete, and Restore. You can also manually add files to the Quarantine from this menu. The Spyware Quarantine tab looks much the same, but it has only the Delete and Restore options.

    My advice is to go through the Quarantine options and exercise the "Delete" button if you find it.


    Can I update to service pack 3 now?
    Yes, you can update to SP3 now.
  • edited September 2008
    Chiaz,

    Thanks for everything, I donated what I could afford - its not much. Anyhow, thank you for all your hard work and help. I will refer you more friends, and if I need something else with any of my other computers - you will be the first I contact.

    Thank you

    give 2 get = life
  • edited September 2008
    Thank you - you are far too kind.


    If all is well now, this will clear away any of the files and folders that were created by ComboFix.

    Go to :
    Start > Run then copy and paste the following highlighted text below into the box and click OK.



    ComboFix /u

    CF_Cleanup.png



    Glad we could be of assistance! The help you received here was free.

    This topic is now closed. If you wish it reopened, please send a Private Message to Trogan with a link to your thread.

    If you are not the user who started this thread, you must start your own Thread instead :)
    _______________________________
    Have we helped you with any issues you have had with your PCs or other items? If so, you can now help us by Joining Team 93 and fold for a cure.
This discussion has been closed.