Help with spyware and pc
Hi, here is the virus report and hj report, and the symptoms of my computer.
my computer does not display the c:/ drive,
can't get windows update to work,
and my desktop has been inactive, and won't restore,
plus is very slow - due to some infected files, and virus.
Please, let me know what to do next.
give 2 get = life.
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 6:22:46 PM, on 8/28/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\system32\crypserv.exe
C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Spyware Doctor\pctsAuxs.exe
C:\Program Files\Spyware Doctor\pctsSvc.exe
C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Trend Micro\BM\TMBMSRV.exe
C:\WINDOWS\System32\alg.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
C:\Program Files\Trend Micro\Internet Security\TmProxy.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
C:\Program Files\SMSC\Seticon.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe
C:\Program Files\Spyware Doctor\pctsTray.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
C:\Program Files\Registry Mechanic\RegMech.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\WINDOWS\System32\wbem\wmiprvse.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\Userinit.exe
O2 - BHO: (no name) - {4433DF0D-7B52-4F26-A6D6-DC085259E117} - C:\WINDOWS\system32\qoMgfETl.dll (file missing)
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {FFB64CFE-B832-48FC-980D-5B9BB2198F39} - C:\WINDOWS\system32\mLExuTKd.dll (file missing)
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
O4 - HKLM\..\Run: [SetRefresh] C:\Program Files\COMPAQ\SetRefresh\\SetRefresh.exe
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [SetIcon] \Program Files\SMSC\Seticon.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [UfSeAgnt.exe] "C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe"
O4 - HKLM\..\Run: [ISTray] "C:\Program Files\Spyware Doctor\pctsTray.exe"
O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [RegistryMechanic] C:\Program Files\Registry Mechanic\RegMech.exe /H
O4 - HKUS\S-1-5-18\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'Default user')
O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1173988543843
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - (no file)
O20 - AppInit_DLLs: karina.dat
O20 - Winlogon Notify: mLExuTKd - mLExuTKd.dll (file missing)
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Crypkey License - CrypKey (Canada) Ltd. - C:\WINDOWS\SYSTEM32\crypserv.exe
O23 - Service: Google Desktop Manager 5.7.802.22438 (GoogleDesktopManager-022208-143751) - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Trend Micro Central Control Component (SfCtlCom) - Trend Micro Inc. - C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
O23 - Service: Trend Micro Unauthorized Change Prevention Service (TMBMServer) - Trend Micro Inc. - C:\Program Files\Trend Micro\BM\TMBMSRV.exe
O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\Program Files\Trend Micro\Internet Security\TmProxy.exe
--
End of file - 8185 bytes
KASPERSKY ONLINE SCANNER 7 REPORT
Thursday, August 28, 2008
Operating System: Microsoft Windows XP Professional Service Pack 2 (build 2600)
Kaspersky Online Scanner 7 version: 7.0.25.0
Program database last update: Thursday, August 28, 2008 21:44:06
Records in database: 1158226
Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes
Scan area - My Computer:
C:\
D:\
E:\
F:\
G:\
H:\
Scan statistics:
Files scanned: 52191
Threat name: 7
Infected objects: 21
Suspicious objects: 0
Duration of the scan: 01:36:07
File name / Threat name / Threats count
C:\Documents and Settings\SCS\Local Settings\Temp\Rar$DR18.562\AllData9.7_crack\Ace.exe Infected: Trojan-Downloader.Win32.Zlob.toy 1
C:\Documents and Settings\SCS\Local Settings\Temp\Rar$EX02.844\AllData9.7_crack\Ace.exe Infected: Trojan-Downloader.Win32.Zlob.toy 1
C:\Documents and Settings\SCS\My Documents\video cd\support.exe Infected: not-a-virus:RemoteAdmin.Win32.WinVNC-based.c 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\A0066796.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\A0066805.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\A0067855.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\buritos.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr_c4c.VIR Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr_c74.VIR Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP135\A0063941.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP135\A0063942.exe Infected: Trojan-Downloader.Win32.Zlob.toy 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064303.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064304.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064305.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064306.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP140\A0066475.exe Infected: Trojan-Downloader.Win32.Zlob.toy 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP142\A0067838.dll Infected: Trojan.Win32.Monder.gmm 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP146\A0069962.dll Infected: Trojan.Win32.Monder.gqc 1
C:\WINDOWS\system32\tbexoo.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.cut 1
C:\WINDOWS\system32\yiqhyhyt.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.cut 1
The selected area was scanned.
thanks
my computer does not display the c:/ drive,
can't get windows update to work,
and my desktop has been inactive, and won't restore,
plus is very slow - due to some infected files, and virus.
Please, let me know what to do next.
give 2 get = life.
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 6:22:46 PM, on 8/28/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\system32\crypserv.exe
C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Spyware Doctor\pctsAuxs.exe
C:\Program Files\Spyware Doctor\pctsSvc.exe
C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Trend Micro\BM\TMBMSRV.exe
C:\WINDOWS\System32\alg.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
C:\Program Files\Trend Micro\Internet Security\TmProxy.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
C:\Program Files\SMSC\Seticon.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe
C:\Program Files\Spyware Doctor\pctsTray.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
C:\Program Files\Registry Mechanic\RegMech.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\WINDOWS\System32\wbem\wmiprvse.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\Userinit.exe
O2 - BHO: (no name) - {4433DF0D-7B52-4F26-A6D6-DC085259E117} - C:\WINDOWS\system32\qoMgfETl.dll (file missing)
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {FFB64CFE-B832-48FC-980D-5B9BB2198F39} - C:\WINDOWS\system32\mLExuTKd.dll (file missing)
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
O4 - HKLM\..\Run: [SetRefresh] C:\Program Files\COMPAQ\SetRefresh\\SetRefresh.exe
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [SetIcon] \Program Files\SMSC\Seticon.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [UfSeAgnt.exe] "C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe"
O4 - HKLM\..\Run: [ISTray] "C:\Program Files\Spyware Doctor\pctsTray.exe"
O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [RegistryMechanic] C:\Program Files\Registry Mechanic\RegMech.exe /H
O4 - HKUS\S-1-5-18\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'Default user')
O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1173988543843
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - (no file)
O20 - AppInit_DLLs: karina.dat
O20 - Winlogon Notify: mLExuTKd - mLExuTKd.dll (file missing)
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Crypkey License - CrypKey (Canada) Ltd. - C:\WINDOWS\SYSTEM32\crypserv.exe
O23 - Service: Google Desktop Manager 5.7.802.22438 (GoogleDesktopManager-022208-143751) - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Trend Micro Central Control Component (SfCtlCom) - Trend Micro Inc. - C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
O23 - Service: Trend Micro Unauthorized Change Prevention Service (TMBMServer) - Trend Micro Inc. - C:\Program Files\Trend Micro\BM\TMBMSRV.exe
O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\Program Files\Trend Micro\Internet Security\TmProxy.exe
--
End of file - 8185 bytes
KASPERSKY ONLINE SCANNER 7 REPORT
Thursday, August 28, 2008
Operating System: Microsoft Windows XP Professional Service Pack 2 (build 2600)
Kaspersky Online Scanner 7 version: 7.0.25.0
Program database last update: Thursday, August 28, 2008 21:44:06
Records in database: 1158226
Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes
Scan area - My Computer:
C:\
D:\
E:\
F:\
G:\
H:\
Scan statistics:
Files scanned: 52191
Threat name: 7
Infected objects: 21
Suspicious objects: 0
Duration of the scan: 01:36:07
File name / Threat name / Threats count
C:\Documents and Settings\SCS\Local Settings\Temp\Rar$DR18.562\AllData9.7_crack\Ace.exe Infected: Trojan-Downloader.Win32.Zlob.toy 1
C:\Documents and Settings\SCS\Local Settings\Temp\Rar$EX02.844\AllData9.7_crack\Ace.exe Infected: Trojan-Downloader.Win32.Zlob.toy 1
C:\Documents and Settings\SCS\My Documents\video cd\support.exe Infected: not-a-virus:RemoteAdmin.Win32.WinVNC-based.c 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\A0066796.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\A0066805.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\A0067855.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\buritos.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr_c4c.VIR Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr_c74.VIR Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP135\A0063941.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP135\A0063942.exe Infected: Trojan-Downloader.Win32.Zlob.toy 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064303.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064304.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064305.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064306.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP140\A0066475.exe Infected: Trojan-Downloader.Win32.Zlob.toy 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP142\A0067838.dll Infected: Trojan.Win32.Monder.gmm 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP146\A0069962.dll Infected: Trojan.Win32.Monder.gqc 1
C:\WINDOWS\system32\tbexoo.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.cut 1
C:\WINDOWS\system32\yiqhyhyt.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.cut 1
The selected area was scanned.
thanks
0
This discussion has been closed.
Comments
Please download Malwarebytes' Anti-Malware by clicking the link below:
http://www.besttechie.net/tools/mbam-setup.exe
Double Click mbam-setup.exe to install the application.
* Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select "Perform Quick Scan", then click Scan.
* The scan may take some time to finish,so please be patient.
* When the scan is complete, click OK, then Show Results to view the results.
* Make sure that everything is checked, and click Remove Selected.
* When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
* The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
* You'll be required to post the contents of this log later.
Please Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediately.
==============================================
Ok. Let's have you download ComboFix.exe. This will give me a better view to the files running and also hidden on your computer and also those in the registry..Please visit this webpage for downloading and instructions for running the tool:
Go here ======> A guide and tutorial on using ComboFix <====== Go here
Please ensure you read this guide carefully and install the Recovery Console first.This applies to XP Pro and XP Home users only.If you have SP3 installed you will need to use SP2
The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.
Once installed, you should get a prompt that says:
The Recovery Console was successfully installed.
Please continue as follows:
(1) Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
(2) Click Yes to allow ComboFix to continue scanning for malware.
When the tool is finished, it will produce a report for you.
Please include the following reports for further review, and so we may continue cleansing the system:
MBAM log
C:\ComboFix.txt
New HijackThis log
Caution: Never run and remove files with Combofix unless supervised by a qualified security analyst who is experienced in the use of Combofix. Misuse can cause serious computer problems.
HijackThis:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:33:47 AM, on 8/30/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\system32\crypserv.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
C:\Program Files\SMSC\Seticon.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Registry Mechanic\RegMech.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Spyware Doctor\pctsAuxs.exe
C:\Program Files\Spyware Doctor\pctsSvc.exe
C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
C:\Program Files\Spyware Doctor\pctsTray.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Trend Micro\BM\TMBMSRV.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\System32\alg.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
C:\Program Files\Trend Micro\Internet Security\TmProxy.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\notepad.exe
C:\WINDOWS\SoftwareDistribution\Download\fd0264849c01086f3c6b505dc02dbd44\update\update.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\WINDOWS\System32\wbem\wmiprvse.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
O4 - HKLM\..\Run: [SetRefresh] C:\Program Files\COMPAQ\SetRefresh\\SetRefresh.exe
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [SetIcon] \Program Files\SMSC\Seticon.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [UfSeAgnt.exe] "C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe"
O4 - HKLM\..\Run: [ISTray] "C:\Program Files\Spyware Doctor\pctsTray.exe"
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [RegistryMechanic] C:\Program Files\Registry Mechanic\RegMech.exe /H
O4 - HKUS\S-1-5-18\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'Default user')
O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1173988543843
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - (no file)
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Crypkey License - CrypKey (Canada) Ltd. - C:\WINDOWS\SYSTEM32\crypserv.exe
O23 - Service: Google Desktop Manager 5.7.802.22438 (GoogleDesktopManager-022208-143751) - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Trend Micro Central Control Component (SfCtlCom) - Trend Micro Inc. - C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
O23 - Service: Trend Micro Unauthorized Change Prevention Service (TMBMServer) - Trend Micro Inc. - C:\Program Files\Trend Micro\BM\TMBMSRV.exe
O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\Program Files\Trend Micro\Internet Security\TmProxy.exe
--
End of file - 7749 bytes
combofix log:
ComboFix 08-08-29.02 - SCS 2008-08-30 11:14:22.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.131 [GMT -5:00]
Running from: C:\Documents and Settings\SCS\Desktop\ComboFix.exe
Command switches used :: C:\Documents and Settings\SCS\Desktop\WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
* Created a new restore point
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\#SharedObjects\YBB8NC5B\bin.clearspring.com
C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\#SharedObjects\YBB8NC5B\bin.clearspring.com\clearspring.sol
C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\#SharedObjects\YBB8NC5B\interclick.com
C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\#SharedObjects\YBB8NC5B\interclick.com\ud.sol
C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\#SharedObjects\YBB8NC5B\static.youku.com
C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\#SharedObjects\YBB8NC5B\static.youku.com\v1.0.0284\v\swf\qplayer.swf\qplayer.sol
C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\#SharedObjects\YBB8NC5B\static.youku.com\v1.0.0288\v\swf\qplayer.swf\qplayer.sol
C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#bin.clearspring.com
C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#bin.clearspring.com\settings.sol
C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com
C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com\settings.sol
C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#static.youku.com
C:\Documents and Settings\SCS\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#static.youku.com\settings.sol
C:\Documents and Settings\SCS\Local Settings\Temporary Internet Files\litogi.com
C:\Documents and Settings\SCS\Local Settings\Temporary Internet Files\nufovafa.bin
C:\Documents and Settings\SCS\Local Settings\Temporary Internet Files\puhetago.db
C:\Documents and Settings\SCS\Local Settings\Temporary Internet Files\qujiva.lib
C:\Documents and Settings\SCS\Local Settings\Temporary Internet Files\ykabybapi.dl
C:\WINDOWS\system32\lTEfgMoq.ini
C:\WINDOWS\system32\lTEfgMoq.ini2
C:\WINDOWS\system32\nepsnhgm.ini
.
((((((((((((((((((((((((( Files Created from 2008-07-28 to 2008-08-30 )))))))))))))))))))))))))))))))
.
2008-08-30 09:58 . 2008-08-30 09:58 <DIR> d
C:\Program Files\Malwarebytes' Anti-Malware
2008-08-30 09:58 . 2008-08-30 09:58 <DIR> d
C:\Documents and Settings\SCS\Application Data\Malwarebytes
2008-08-30 09:58 . 2008-08-30 09:58 <DIR> d
C:\Documents and Settings\All Users\Application Data\Malwarebytes
2008-08-30 09:58 . 2008-08-17 15:01 38,472 --a
C:\WINDOWS\system32\drivers\mbamswissarmy.sys
2008-08-30 09:58 . 2008-08-17 15:01 17,144 --a
C:\WINDOWS\system32\drivers\mbam.sys
2008-08-28 13:08 . 2008-08-28 13:08 <DIR> d
C:\Program Files\Lavasoft
2008-08-28 13:08 . 2008-08-28 13:10 <DIR> d
C:\Documents and Settings\All Users\Application Data\Lavasoft
2008-08-28 10:48 . 2008-08-28 10:48 5,759 --a
C:\WINDOWS\system32\uyeijykj.dll
2008-08-28 10:45 . 2008-08-28 10:45 5,761 --a
C:\WINDOWS\system32\wyopsdeg.dll
2008-08-28 10:17 . 2004-08-04 00:56 116,224 --a--c--- C:\WINDOWS\system32\dllcache\xrxwiadr.dll
2008-08-28 10:17 . 2001-08-17 22:37 27,648 --a--c--- C:\WINDOWS\system32\dllcache\xrxftplt.exe
2008-08-28 10:17 . 2001-08-17 22:36 23,040 --a--c--- C:\WINDOWS\system32\dllcache\xrxwbtmp.dll
2008-08-28 10:17 . 2001-08-17 22:36 17,408 --a--c--- C:\WINDOWS\system32\dllcache\xrxscnui.dll
2008-08-28 10:17 . 2001-08-17 22:37 4,608 --a--c--- C:\WINDOWS\system32\dllcache\xrxflnch.exe
2008-08-28 10:15 . 2001-08-17 13:28 794,654 --a--c--- C:\WINDOWS\system32\dllcache\usr1801.sys
2008-08-28 10:14 . 2001-08-17 12:18 285,760 --a--c--- C:\WINDOWS\system32\dllcache\stlnata.sys
2008-08-28 10:13 . 2001-08-17 22:36 495,616 --a--c--- C:\WINDOWS\system32\dllcache\sblfx.dll
2008-08-28 10:12 . 2001-08-17 13:28 899,146 --a--c--- C:\WINDOWS\system32\dllcache\r2mdkxga.sys
2008-08-28 10:11 . 2001-08-17 14:05 351,616 --a--c--- C:\WINDOWS\system32\dllcache\ovcodek2.sys
2008-08-28 10:10 . 2001-08-17 12:11 128,000 --a--c--- C:\WINDOWS\system32\dllcache\n100325.sys
2008-08-28 10:09 . 2001-08-17 13:28 802,683 --a--c--- C:\WINDOWS\system32\dllcache\ltsm.sys
2008-08-28 10:08 . 2004-08-04 00:56 152,576 --a--c--- C:\WINDOWS\system32\dllcache\irftp.exe
2008-08-28 10:07 . 2004-08-04 00:56 702,845 --a--c--- C:\WINDOWS\system32\dllcache\i81xdnt5.dll
2008-08-28 10:06 . 2001-08-17 14:56 1,733,120 --a--c--- C:\WINDOWS\system32\dllcache\g400d.dll
2008-08-28 10:05 . 2001-08-17 13:28 634,134 --a--c--- C:\WINDOWS\system32\dllcache\el656ct5.sys
2008-08-28 10:04 . 2001-08-17 12:14 952,007 --a--c--- C:\WINDOWS\system32\dllcache\diwan.sys
2008-08-28 10:03 . 2001-08-17 12:13 980,034 --a--c--- C:\WINDOWS\system32\dllcache\cicap.sys
2008-08-28 10:02 . 2001-08-17 14:05 314,752 --a--c--- C:\WINDOWS\system32\dllcache\camdro21.sys
2008-08-28 10:01 . 2001-08-17 13:28 871,388 --a--c--- C:\WINDOWS\system32\dllcache\bcmdm.sys
2008-08-28 10:00 . 2001-08-17 13:28 762,780 --a--c--- C:\WINDOWS\system32\dllcache\3cwmcru.sys
2008-08-28 09:59 . 2001-08-17 14:56 66,048 --a--c--- C:\WINDOWS\system32\dllcache\s3legacy.dll
2008-08-27 10:44 . 2008-08-27 10:44 5,761 --a
C:\WINDOWS\system32\qtnydhsp.dll
2008-08-26 10:43 . 2008-08-26 10:43 5,761 --a
C:\WINDOWS\system32\kooegnfr.dll
2008-08-26 10:43 . 2008-08-26 10:43 5,759 --a
C:\WINDOWS\system32\gvqvagtw.dll
2008-08-23 16:21 . 2008-08-23 16:21 <DIR> d
C:\Program Files\Microsoft Silverlight
2008-08-23 16:16 . 2008-08-23 16:16 <DIR> d
C:\Program Files\Windows Defender
2008-08-23 13:56 . 2007-12-10 14:53 81,288 --a
C:\WINDOWS\system32\drivers\iksyssec.sys
2008-08-23 13:56 . 2007-12-10 14:53 66,952 --a
C:\WINDOWS\system32\drivers\iksysflt.sys
2008-08-23 13:56 . 2008-08-23 14:04 42,376 --a
C:\WINDOWS\system32\drivers\ikfilesec.sys
2008-08-23 13:56 . 2007-12-10 14:53 29,576 --a
C:\WINDOWS\system32\drivers\kcom.sys
2008-08-23 13:55 . 2008-08-29 16:25 <DIR> d
C:\Program Files\Spyware Doctor
2008-08-23 13:55 . 2008-08-23 13:55 <DIR> d
C:\Documents and Settings\SCS\Application Data\PC Tools
2008-08-22 19:34 . 2008-08-22 19:34 5,761 --a
C:\WINDOWS\system32\cgprpovy.dll
2008-08-22 19:34 . 2008-08-22 19:34 5,759 --a
C:\WINDOWS\system32\ndtwhcdw.dll
2008-08-22 14:50 . 2008-08-30 11:22 <DIR> d-a
C:\Documents and Settings\All Users\Application Data\TEMP
2008-08-22 14:14 . 2008-02-15 23:39 138,384 --a
C:\WINDOWS\system32\drivers\tmcomm.sys
2008-08-22 14:14 . 2008-02-15 23:39 52,496 --a
C:\WINDOWS\system32\drivers\tmactmon.sys
2008-08-22 14:14 . 2008-02-15 23:39 52,240 --a
C:\WINDOWS\system32\drivers\tmevtmgr.sys
2008-08-22 14:11 . 2008-08-28 18:21 <DIR> d
C:\Program Files\Trend Micro
2008-08-22 13:49 . 2008-08-22 13:49 <DIR> d
C:\Documents and Settings\SCS\.housecall6.6
2008-08-22 13:35 . 2008-08-22 13:35 <DIR> d
C:\Program Files\AVG
2008-08-22 13:35 . 2008-08-22 13:35 <DIR> d
C:\Documents and Settings\SCS\Application Data\AVGTOOLBAR
2008-08-22 13:35 . 2008-08-22 13:41 <DIR> d
C:\Documents and Settings\All Users\Application Data\avg8
2008-08-22 13:30 . 2008-08-22 13:30 19,114 --a
C:\Documents and Settings\SCS\Application Data\vuhewelo.vbs
2008-08-22 13:30 . 2008-08-22 13:30 19,102 --a
C:\Program Files\Common Files\sigy.sys
2008-08-22 13:30 . 2008-08-22 13:30 18,919 --a
C:\Documents and Settings\All Users\Application Data\ujigoj.reg
2008-08-22 13:30 . 2008-08-22 13:30 17,623 --a
C:\WINDOWS\ygexijewa.bat
2008-08-22 13:30 . 2008-08-22 13:30 17,560 --a
C:\WINDOWS\bitomep.lib
2008-08-22 13:30 . 2008-08-22 13:30 16,642 --a
C:\WINDOWS\ribeji.scr
2008-08-22 13:30 . 2008-08-22 13:30 16,558 --a
C:\Program Files\Common Files\iribyzag.bin
2008-08-22 13:30 . 2008-08-22 13:30 16,519 --a
C:\Program Files\Common Files\okogadapy.reg
2008-08-22 13:30 . 2008-08-22 13:30 16,042 --a
C:\WINDOWS\fixedyfu._sy
2008-08-22 13:30 . 2008-08-22 13:30 14,420 --a
C:\WINDOWS\asezutax._sy
2008-08-22 13:30 . 2008-08-22 13:30 13,887 --a
C:\WINDOWS\system32\siliwavuz.pif
2008-08-22 13:30 . 2008-08-22 13:30 13,720 --a
C:\WINDOWS\dabuzaf.bat
2008-08-22 13:30 . 2008-08-22 13:30 10,704 --a
C:\WINDOWS\owujygi.dl
2008-08-22 13:30 . 2008-08-22 13:30 10,441 --a
C:\WINDOWS\system32\yboguja.lib
2008-08-22 13:03 . 2008-08-28 14:29 <DIR> d
C:\Program Files\Spybot - Search & Destroy
2008-08-22 13:03 . 2008-08-28 14:34 <DIR> d
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2008-08-21 18:48 . 2008-08-21 18:48 19,829 --a
C:\Documents and Settings\SCS\Application Data\yjuf.vbs
2008-08-21 18:48 . 2008-08-21 18:48 19,429 --a
C:\WINDOWS\bohusona.inf
2008-08-21 18:48 . 2008-08-21 18:48 18,407 --a
C:\Documents and Settings\SCS\Application Data\fypybixuxo.reg
2008-08-21 18:48 . 2008-08-21 18:48 17,574 --a
C:\Documents and Settings\SCS\Application Data\atelal.dll
2008-08-21 18:48 . 2008-08-21 18:48 17,545 --a
C:\WINDOWS\ymegusiva.dat
2008-08-21 18:48 . 2008-08-21 18:48 15,680 --a
C:\WINDOWS\ujyge.db
2008-08-21 18:48 . 2008-08-21 18:48 14,865 --a
C:\WINDOWS\system32\redoqo.exe
2008-08-21 18:48 . 2008-08-21 18:48 14,702 --a
C:\WINDOWS\pojowalumi.reg
2008-08-21 18:48 . 2008-08-21 18:48 13,399 --a
C:\Documents and Settings\All Users\Application Data\onosycerad.com
2008-08-21 18:48 . 2008-08-21 18:48 12,641 --a
C:\WINDOWS\izixije.pif
2008-08-21 18:48 . 2008-08-21 18:48 11,384 --a
C:\WINDOWS\tabezof.bat
2008-08-21 18:48 . 2008-08-21 18:48 10,620 --a
C:\Documents and Settings\SCS\Application Data\inap.vbs
2008-07-31 12:57 . 2008-07-31 12:57 <DIR> d
C:\Program Files\Citrix
2008-07-31 12:57 . 2008-07-31 12:57 60,744 --a
C:\Documents and Settings\SCS\g2mdlhlpx.exe
2008-07-23 13:05 . 2004-08-03 22:58 14,848 --a
C:\WINDOWS\system32\drivers\kbdhid.sys
2008-07-23 13:05 . 2004-08-03 22:58 14,848 --a--c--- C:\WINDOWS\system32\dllcache\kbdhid.sys
2008-07-19 14:06 . 2008-08-15 12:44 23 --a
C:\Documents and Settings\SCS\jagex_runescape_preferences.dat
2008-07-16 17:53 . 2008-07-16 17:53 <DIR> d
C:\Documents and Settings\SCS\Application Data\Media Player Classic
2008-07-16 17:52 . 2008-07-16 17:52 <DIR> d
C:\Program Files\K-Lite Codec Pack
2008-07-14 20:51 . 2008-07-14 20:51 <DIR> d
C:\Documents and Settings\All Users\Application Data\MSScanAppDataDir
2008-07-03 18:55 . 2008-07-03 18:55 <DIR> d
C:\Program Files\iPod
2008-07-03 18:55 . 2008-07-03 18:55 <DIR> d
C:\Documents and Settings\SCS\Application Data\Apple Computer
2008-07-03 18:54 . 2008-07-03 18:55 <DIR> d
C:\Program Files\iTunes
2008-07-03 18:54 . 2008-07-03 18:54 <DIR> d
C:\Program Files\Bonjour
2008-07-03 18:52 . 2008-07-03 18:53 <DIR> d
C:\Program Files\QuickTime
2008-07-03 18:52 . 2008-07-03 18:54 <DIR> d
C:\Documents and Settings\All Users\Application Data\Apple Computer
2008-07-03 18:49 . 2008-07-03 18:49 <DIR> d----c--- C:\WINDOWS\system32\DRVSTORE
2008-07-03 18:49 . 2008-07-03 18:49 <DIR> d
C:\Program Files\Common Files\Apple
2008-07-03 18:49 . 2008-02-18 11:16 30,464 --a
C:\WINDOWS\system32\drivers\usbaapl.sys
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-08-29 21:11
d
w C:\Documents and Settings\All Users\Application Data\Trend Micro
2008-08-29 21:07
d
w C:\Documents and Settings\All Users\Application Data\Google Updater
2008-08-28 18:07
d
w C:\Program Files\Common Files\Wise Installation Wizard
2008-08-23 22:41
d
w C:\Documents and Settings\SCS\Application Data\uTorrent
2008-08-22 18:30 19,265 ----a-w C:\Program Files\Common Files\aqifeqynot.inf
2008-08-21 23:48 18,211 ----a-w C:\Program Files\Common Files\lumawyloh.inf
2008-08-21 23:48 12,483 ----a-w C:\Program Files\Common Files\xomulo.inf
2008-08-21 23:24
d
w C:\Program Files\8.0 Shop Controller
2008-07-21 23:31
d
w C:\Program Files\Java
2008-07-19 00:08 36,368 ----a-w C:\WINDOWS\system32\drivers\tmpreflt.sys
2008-07-19 00:08 205,328 ----a-w C:\WINDOWS\system32\drivers\tmxpflt.sys
2008-07-18 23:51 1,195,448 ----a-w C:\WINDOWS\system32\drivers\vsapint.sys
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2008-02-28 21:16 68856]
"BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe" [2006-06-01 14:32 94208]
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-04 01:56 15360]
"RegistryMechanic"="C:\Program Files\Registry Mechanic\RegMech.exe" [2008-07-08 16:41 2828184]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Google Desktop Search"="C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" [2008-04-27 16:03 29744]
"NeroFilterCheck"="C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe" [2006-01-12 17:40 155648]
"ATIPTA"="C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2006-01-04 22:05 344064]
"SetRefresh"="C:\Program Files\COMPAQ\SetRefresh\\SetRefresh.exe" [2003-11-20 19:01 525824]
"RemoteControl"="C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe" [2005-01-12 04:01 32768]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe" [2008-06-10 04:27 144784]
"Adobe Reader Speed Launcher"="C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 22:16 39792]
"SetIcon"="\Program Files\SMSC\Seticon.exe" [2005-01-13 09:57 42496]
"QuickTime Task"="C:\Program Files\QuickTime\QTTask.exe" [2008-05-27 10:50 413696]
"iTunesHelper"="C:\Program Files\iTunes\iTunesHelper.exe" [2008-06-02 11:13 267048]
"UfSeAgnt.exe"="C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe" [2008-07-29 14:24 1398024]
"ISTray"="C:\Program Files\Spyware Doctor\pctsTray.exe" [2008-08-23 14:04 1107848]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-04 01:56 15360]
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"NoDispSettingPage"= 1 (0x1)
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"ForceClassicControlPanel"= 1 (0x1)
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"VIDC.YV12"= yv12vfw.dll
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\securityproviders]
SecurityProviders msapsspc.dllschannel.dlldigest.dllmsnsspc.dll
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\TrendAntiVirus]
"DisableMonitoring"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\TrendFirewall]
"DisableMonitoring"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"C:\\Program Files\\uTorrent\\uTorrent.exe"=
"C:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"C:\\Program Files\\iTunes\\iTunes.exe"=
S3 GoogleDesktopManager-022208-143751;Google Desktop Manager 5.7.802.22438;C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe [2008-04-27 16:03]
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{b80d4292-d3d2-11db-82d1-806d6172696f}]
\Shell\AutoRun\command - D:\SETUP.EXE
.
Contents of the 'Scheduled Tasks' folder
2008-08-26 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job
- C:\Program Files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 14:57]
.
- - - - ORPHANS REMOVED - - - -
BHO-{4433DF0D-7B52-4F26-A6D6-DC085259E117} - C:\WINDOWS\system32\qoMgfETl.dll
HKLM-Run-NWEReboot - (no file)
.
Supplementary Scan
.
FireFox -: Profile - C:\Documents and Settings\SCS\Application Data\Mozilla\Firefox\Profiles\yijzf82s.default\
FireFox -: prefs.js - SEARCH.DEFAULTURL - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=
FireFox -: prefs.js - STARTUP.HOMEPAGE - hxxp://en-us.start.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:en-US:official
FF -: plugin - C:\Program Files\Google\Google Updater\2.2.1111.1511\npCIDetect11.dll
FF -: plugin - C:\Program Files\iTunes\Mozilla Plugins\npitunes.dll
FF -: plugin - C:\Program Files\K-Lite Codec Pack\Real\browser\plugins\nppl3260.dll
FF -: plugin - C:\Program Files\K-Lite Codec Pack\Real\browser\plugins\nprpjplug.dll
FF -: plugin - C:\Program Files\Mozilla Firefox\plugins\npGoogleGadgetPluginFirefoxWin.dll
.
**************************************************************************
catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-08-30 11:21:33
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
.
Other Running Processes
.
C:\WINDOWS\system32\ati2evxx.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\ati2evxx.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\system32\Crypserv.exe
C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
C:\Program Files\SMSC\SetIcon.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Spyware Doctor\pctsAuxs.exe
C:\Program Files\Spyware Doctor\pctsSvc.exe
C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
C:\Program Files\Trend Micro\BM\TMBMSRV.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\wscntfy.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
C:\Program Files\Trend Micro\Internet Security\TmProxy.exe
C:\WINDOWS\system32\verclsid.exe
.
**************************************************************************
.
Completion time: 2008-08-30 11:26:53 - machine was rebooted
ComboFix-quarantined-files.txt 2008-08-30 16:26:36
Pre-Run: 149,455,613,952 bytes free
Post-Run: 149,482,139,648 bytes free
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
C:\CMDCONS\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fastdetect /NoExecute=OptIn
262 --- E O F --- 2008-08-14 08:16:17
MBAM log
Malwarebytes' Anti-Malware 1.25
Database version: 1098
Windows 5.1.2600 Service Pack 2
10:11:55 AM 8/30/2008
mbam-log-08-30-2008 (10-11-45).txt
Scan type: Quick Scan
Objects scanned: 44297
Time elapsed: 4 minute(s), 53 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 7
Registry Values Infected: 0
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 5
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ffb64cfe-b832-48fc-980d-5b9bb2198f39} (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mlexutkd (Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{ffb64cfe-b832-48fc-980d-5b9bb2198f39} (Trojan.Vundo.H) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\antivirus 2008 (Rogue.Antivirus2008) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> No action taken.
Registry Values Infected:
(No malicious items detected)
Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives (Hijack.Drives) -> Bad: (12) Good: (0) -> No action taken.
Folders Infected:
(No malicious items detected)
Files Infected:
C:\WINDOWS\system32\mLExuTKd.dll (Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\mcrh.tmp (Malware.Trace) -> No action taken.
C:\WINDOWS\system32\dwepvfyl.dll (Trojan.Vundo) -> No action taken.
C:\Documents and Settings\SCS\Local Settings\Temporary Internet Files\urynof.exe (Trojan.Agent) -> No action taken.
C:\Documents and Settings\SCS\Local Settings\Temp\s1265.php (Trojan.FakeAlert) -> No action taken.
to your desktop.
- Double-click VundoFix.exe to run it.
- Click the Scan for Vundo button.
- Once it's done scanning, click the Remove Vundo button.
- You will receive a prompt asking if you want to remove the files, click YES
- Once you click yes, your desktop will go blank as it starts removing Vundo.
- When completed, it will prompt that it will reboot your computer, click OK.
- Please post the contents of C:\vundofix.txt and a new HiJackThis log.
Note: It is possible that VundoFix encountered a file it could not remove.In this case, VundoFix will run on reboot, simply follow the above
instructions starting from "Click the Scan for Vundo button." when
VundoFix appears at reboot.
Logs:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 10:17:23 AM, on 9/1/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe
C:\Program Files\SMSC\Seticon.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe
C:\Program Files\Spyware Doctor\pctsTray.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Registry Mechanic\RegMech.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\system32\crypserv.exe
C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Spyware Doctor\pctsAuxs.exe
C:\Program Files\Spyware Doctor\pctsSvc.exe
C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Trend Micro\BM\TMBMSRV.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\System32\wbem\wmiprvse.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\System32\wbem\wmiprvse.exe
C:\WINDOWS\system32\wuauclt.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\Program Files\Trend Micro\Internet Security\TmProxy.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
O4 - HKLM\..\Run: [SetRefresh] C:\Program Files\COMPAQ\SetRefresh\\SetRefresh.exe
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [SetIcon] \Program Files\SMSC\Seticon.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [UfSeAgnt.exe] "C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe"
O4 - HKLM\..\Run: [ISTray] "C:\Program Files\Spyware Doctor\pctsTray.exe"
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [RegistryMechanic] C:\Program Files\Registry Mechanic\RegMech.exe /H
O4 - HKUS\S-1-5-18\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'Default user')
O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1173988543843
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - (no file)
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Crypkey License - CrypKey (Canada) Ltd. - C:\WINDOWS\SYSTEM32\crypserv.exe
O23 - Service: Google Desktop Manager 5.7.802.22438 (GoogleDesktopManager-022208-143751) - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Trend Micro Central Control Component (SfCtlCom) - Trend Micro Inc. - C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
O23 - Service: Trend Micro Unauthorized Change Prevention Service (TMBMServer) - Trend Micro Inc. - C:\Program Files\Trend Micro\BM\TMBMSRV.exe
O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\Program Files\Trend Micro\Internet Security\TmProxy.exe
--
End of file - 7717 bytes
and new log for vundofix:
VundoFix V7.0.6
Scan started at 9:47:26 AM 9/1/2008
Listing files found while scanning....
C:\Windows\system32\cgprpovy.dll
C:\Windows\system32\gvqvagtw.dll
C:\Windows\system32\kooegnfr.dll
C:\Windows\system32\ndtwhcdw.dll
C:\Windows\system32\qtnydhsp.dll
C:\Windows\system32\uyeijykj.dll
C:\Windows\system32\wyopsdeg.dll
Beginning removal...
Attempting to delete C:\Windows\system32\cgprpovy.dll
C:\Windows\system32\cgprpovy.dll Has been deleted!
Attempting to delete C:\Windows\system32\gvqvagtw.dll
C:\Windows\system32\gvqvagtw.dll Has been deleted!
Attempting to delete C:\Windows\system32\kooegnfr.dll
C:\Windows\system32\kooegnfr.dll Has been deleted!
Attempting to delete C:\Windows\system32\ndtwhcdw.dll
C:\Windows\system32\ndtwhcdw.dll Has been deleted!
Attempting to delete C:\Windows\system32\qtnydhsp.dll
C:\Windows\system32\qtnydhsp.dll Has been deleted!
Attempting to delete C:\Windows\system32\uyeijykj.dll
C:\Windows\system32\uyeijykj.dll Has been deleted!
Attempting to delete C:\Windows\system32\wyopsdeg.dll
C:\Windows\system32\wyopsdeg.dll Has been deleted!
Performing Repairs to the registry.
Done!
Question:
Windows can now install updates: should I update to service pack 3 now, or wait til everything is clean in my computer?
Thank you once again...
First I need you to go to Trend Micro Internet Security and delete the quarantined items stored there.
Next, boot to Safe Mode using the instructions here.
Once you're in Safe Mode, navigate to and delete the following files:
C:\WINDOWS\system32\tbexoo.dll
C:\WINDOWS\system32\yiqhyhyt.dll
Restart your computer again to go back to Normal Mode.
Finally run a new scan with Kaspersky Online Scanner and post the generated log in your new reply. How's your PC running now?
Hi, I tried to delete the quarantined, but could not. The files can't be highlighted... The computer is running smooth, a little bit slow -but what a difference. I will do as you instructed, after you reply to this last reply.
Please run a new scan with Kaspersky Online Scanner and post the generated log in your new reply.
Sorry it took so long,
I was not able to delete the two files that you pointed out; I couldn't find them. I think that happen cuz i did a spyware scanned with spyware doctor.
Here is the log for the anti-virus. And I tried one more time to delete the quarantine files from trend micro but a message indicated that I didn't have the authority to do so.
KASPERSKY ONLINE SCANNER 7 REPORT
Wednesday, September 3, 2008
Operating System: Microsoft Windows XP Professional Service Pack 2 (build 2600)
Kaspersky Online Scanner 7 version: 7.0.25.0
Program database last update: Wednesday, September 03, 2008 16:35:25
Records in database: 1188247
Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes
Scan area - My Computer:
C:\
D:\
E:\
F:\
G:\
H:\
I:\
Scan statistics:
Files scanned: 93305
Threat name: 7
Infected objects: 19
Suspicious objects: 0
Duration of the scan: 03:05:50
File name / Threat name / Threats count
C:\Documents and Settings\SCS\My Documents\video cd\support.exe Infected: not-a-virus:RemoteAdmin.Win32.WinVNC-based.c 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\A0066796.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\A0066805.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\A0067855.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\buritos.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr_c4c.VIR Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr_c74.VIR Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP135\A0063941.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP135\A0063942.exe Infected: Trojan-Downloader.Win32.Zlob.toy 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064303.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064304.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064305.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP136\A0064306.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP140\A0066475.exe Infected: Trojan-Downloader.Win32.Zlob.toy 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP142\A0067838.dll Infected: Trojan.Win32.Monder.gmm 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP146\A0069961.dll Infected: Trojan.Win32.Monder.krq 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP146\A0069962.dll Infected: Trojan.Win32.Monder.gqc 1
C:\System Volume Information\_restore{26CC699B-2FFB-4D26-848E-6A0520A5F1B8}\RP146\A0069980.dll Infected: Trojan.Win32.Monder.krq 1
The scan was stopped by the user.
thank you once again...
If you have not installed VNC on your computer and don't know what the following file is for, delete it:
C:\Documents and Settings\SCS\My Documents\video cd\support.exe
Now follow the instructions in this link to flush out your System Restore points:
http://safecomputing.umn.edu/guides/systemrestore.html
You may post a new Kaspersky Online Scanner log if you wish to, but it is optional. You should be clean now.
Let us know how things go.
KASPERSKY ONLINE SCANNER 7 REPORT
Thursday, September 4, 2008
Operating System: Microsoft Windows XP Professional Service Pack 2 (build 2600)
Kaspersky Online Scanner 7 version: 7.0.25.0
Program database last update: Thursday, September 04, 2008 16:23:28
Records in database: 1191663
Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes
Scan area - Folder:
C:\
Scan statistics:
Files scanned: 50557
Threat name: 3
Infected objects: 8
Suspicious objects: 0
Duration of the scan: 01:17:22
File name / Threat name / Threats count
C:\Documents and Settings\SCS\My Documents\video cd\support.exe Infected: not-a-virus:RemoteAdmin.Win32.WinVNC-based.c 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\A0066796.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\A0066805.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\A0067855.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\buritos.exe Infected: Hoax.Win32.Renos.vaqt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr.exe Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr_c4c.VIR Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\winivstr_c74.VIR Infected: not-a-virus:FraudTool.Win32.XPSecurityCenter.p 1
The selected area was scanned.
thank you so much for your help.
Question: How do I delete the files that are quarantined in trend micro?
Can I update to service pack 3 now?
thank you so much for your help, and I will donate once I get paid this Friday - thank you
This is something I found on the web, since I'm not familiar with the Trend Micro interface myself:
My advice is to go through the Quarantine options and exercise the "Delete" button if you find it.
Yes, you can update to SP3 now.
Thanks for everything, I donated what I could afford - its not much. Anyhow, thank you for all your hard work and help. I will refer you more friends, and if I need something else with any of my other computers - you will be the first I contact.
Thank you
give 2 get = life
If all is well now, this will clear away any of the files and folders that were created by ComboFix.
Go to :
Start > Run then copy and paste the following highlighted text below into the box and click OK.
ComboFix /u
Glad we could be of assistance! The help you received here was free.
This topic is now closed. If you wish it reopened, please send a Private Message to Trogan with a link to your thread.
If you are not the user who started this thread, you must start your own Thread instead