Options

Desktop Suddenly Slowed

Quite a while ago my desktop started to run very slowly for some odd reason, and I can remember quite clearly some of the ways that it did. For instance in World of Warcraft the player models would always load last, and the loading screens would take forever when it said it was finished, leaving my mouse available to scroll around with pointlessly.

Getting back on topic, my computer suddenly (about a few weeks ago) started running smoothly, and everything was fine until yesterday, when I got tired of receiving the "Update iTunes now!" message every time I loaded it.

So I updated my iTunes, reinstalled, and voila, my computer had been back to it's slow self. The same symptoms and occurences are back now. So I uninstalled iTunes and Quicktime, only to find that it didn't help at all.

I'm a little baffled at the moment, and having this slowness back irritates me a lot.

I will appreciate any help, thanks.

Hijackthis:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 6:47:31 PM, on 10/8/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\svchost.exe
C:\PROGRA~1\AVG\AVG8\avgtray.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
Q:\Program Files\Hamachi\hamachi.exe
C:\WINDOWS\system32\taskmgr.exe
C:\Program Files\Mozilla Firefox\firefox.exe
Q:\PROGRA~1\REGIST~1.0\RegistryPatrol.exe
Q:\Program Files\RegistryPatrol3.0\RegistryPatrol.exe
C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
C:\PROGRA~1\COMMON~1\INSTAL~1\Driver\1050\INTEL3~1\IDriver.exe
Q:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.windowsxlive.net
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
F3 - REG:win.ini: run=lhhsux.exe, oerfqojcdci.exe, bfgf.exe, udupcfvnqwove.exe, wtsiqlnb.exe, udrbgwhefespd.exe, xssdrrtq.exe, Ž•¹, kkpemvt.exe, urdugfqwbwn.exe, nvop.exe, xiegqvvlw.exe, BÚj£¸¿, pnop.exe, kjss.exe, ÀÃo½, fnibsbwsi.exe, qyqaqqadcegax.exe, dcbwihpga.exe, tamuand.exe, isjotnemwvvqp.exe, cwvpjaudl.exe, eiawkuflwhxug.exe, eaidspr.exe, hyvbia.exe, mfrp.exe, vvuegyuyev.exe, lcqoyqg.exe, xtpgwbhpqve.exe, sexcrtk.exe, amshb.exe, ntyqovgpucrn.exe, ugecgmrhpkhqj.exe, xbwgx.exe, dfudnvew.exe, smat.exe, ixwlvxtodsd.exe, ayxkoemjxlvux.exe, á
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: (no name) - {2C5E523F-F71A-4428-B9DB-3A53960BAC1A} - C:\WINDOWS\system32\jkkji.dll (file missing)
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: (no name) - {6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C} - C:\WINDOWS\system32\wvusspn.dll (file missing)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: {7aec8685-9201-2c5a-59c4-0050dbea2f89} - {98f2aebd-0500-4c95-a5c2-10295868cea7} - C:\WINDOWS\system32\fzcgpu.dll (file missing)
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: StylerToolBar - {D2F8F919-690B-4EA2-9FA7-A203D1E04F75} - C:\Program Files\Styler\TB\StylerTB.dll (file missing)
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe"
O4 - HKLM\..\Run: [P17Helper] Rundll32 P17.dll,P17Helper
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe" -start
O4 - HKLM\..\Run: [WinLoader] á
O4 - HKLM\..\Run: [94b90aba] rundll32.exe "C:\WINDOWS\system32\letkgrfp.dll",b
O4 - HKLM\..\Run: [BM978a3926] Rundll32.exe "C:\WINDOWS\system32\nlbeppir.dll",s
O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\RunServices: [WinLoader] á
O4 - HKCU\..\Run: [Philips Intelligent Agent] NOT_IN_USE_DUMMY_PATH
O4 - HKCU\..\Run: [viwc] C:\WINDOWS\system32\viwc.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [BitTorrent DNA] "C:\Program Files\DNA\btdna.exe"
O4 - Startup: hamachi.lnk = Q:\Program Files\Hamachi\hamachi.exe
O4 - Global Startup: Desktop Manager.lnk = C:\Program Files\Research In Motion\BlackBerry\DesktopMgr.exe
O4 - Global Startup: Logitech SetPoint.lnk = C:\Program Files\Logitech\SetPoint\SetPoint.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: ShopperReports - Compare product prices - {C5428486-50A0-4a02-9D20-520B59A9F9B2} - C:\Program Files\ShoppingReport\Bin\2.0.26\ShoppingReport.dll (file missing)
O9 - Extra button: ShopperReports - Compare travel rates - {C5428486-50A0-4a02-9D20-520B59A9F9B3} - C:\Program Files\ShoppingReport\Bin\2.0.26\ShoppingReport.dll (file missing)
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1191470381670
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://messenger.zone.msn.com/binary/ZIntro.cab56649.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {E6187999-9FEC-46A1-A20F-F4CA977D5643} (ZoneChess Object) - http://messenger.zone.msn.com/binary/Chess.cab57176.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{7EFC4CD9-409A-4756-95E1-47CD475365BF}: NameServer = 208.67.222.222,208.67.220.220
O17 - HKLM\System\CCS\Services\Tcpip\..\{BCBA7996-91D6-447E-AA40-F25CBB009938}: NameServer = 192.168.0.1,192.168.0.2
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
O20 - AppInit_DLLs: wbsys.dll,avgrsstx.dll
O20 - Winlogon Notify: wvusspn - wvusspn.dll (file missing)
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Logitech Bluetooth Service (LBTServ) - Logitech, Inc. - C:\Program Files\Common Files\Logishrd\Bluetooth\LBTServ.exe
O23 - Service: MySQL - Unknown owner - C:\Program.exe (file missing)
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Roxio UPnP Renderer 9 - Unknown owner - C:\Program Files\Roxio\Digital Home 9\RoxioUPnPRenderer9.exe (file missing)
O23 - Service: Roxio Upnp Server 9 - Unknown owner - C:\Program Files\Roxio\Digital Home 9\RoxioUpnpService9.exe (file missing)
O23 - Service: LiveShare P2P Server 9 (RoxLiveShare9) - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxLiveShare9.exe
O23 - Service: RoxMediaDB9 - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exe
O23 - Service: Roxio Hard Drive Watcher 9 (RoxWatch9) - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatch9.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Program Files\WinPcap\rpcapd.exe

--
End of file - 8510 bytes

Comments

  • VekaVeka Finland
    edited October 2008
    Hello and welcome to Icrontic.

    You have some nice infections there we need to get rid of.
    At first, I suggest to print out these directions or save them into desktop as text file.

    After that, please download Malwarebytes' Anti-Malware and ComboFix to your desktop.

    Note: It is important that these tools are saved directly to your desktop

    Step 1:
    • Double Click mbam-setup.exe to install the application.
    • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    • If an update is found, it will download and install the latest version.
    • Once the program has loaded, please reboot into Safe Mode:
    Restart your computer and as soon as it starts booting up again continuously tap F8.
    A menu should come up where you will be given the option to enter Safe Mode. Log in using your default account.
    • Once in Safe Mode, please run MBAM and select "Perform full Scan", then click Scan.
    • The scan may take some time to finish, so please be patient.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Make sure that everything is checked, and click Remove Selected.
    • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart (include this log in your next reply).
    • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
    Step 2:

    When back in Normal mode, please close / disable all antivirus and antimalware programs so they do not interfere with the running of ComboFix.

    Double click on ComboFix.exe & follow the prompts.
    • When finished, it will produce a report for you.
    • Please post the C:\ComboFix.txt along with a new HijackThis log for further review.
    Note: Do not mouseclick combofix's window while it's running. That may cause it to stall.

    For information regarding Combofix, please visit this webpage:
    http://www.bleepingcomputer.com/combofix/how-to-use-combofix

    Step 3:

    Please post MBAM's and ComboFix's logs.
  • edited October 2008
    Thanks vekarppe,

    I am not currently at home but as soon as I get there I will do all of this and report back here.

    Just a quick note, I ran a chkdsk on my c drive last night, as the ntfs claimed it to be dirty. :P Don't know why this would matter I just thought I'd let you know just in case.

    Also, a few months ago I had symptoms of Virtumonde on my computer, so I attempted to get rid of it, but I'm not quite sure if it's gone. Just another sidenote I thought you should know.

    Thanks again,

    Slyfox
  • edited October 2008
    Alrighty, every direction was followed. My computer already seems to be running faster.

    New HJT:
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 7:35:09 PM, on 10/9/2008
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
    Boot mode: Normal
    
    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    C:\Program Files\MySQL\MySQL Server 5.0\bin\mysqld-nt.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\WINDOWS\system32\svchost.exe
    C:\PROGRA~1\AVG\AVG8\avgrsx.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\system32\CF15267.exe
    C:\WINDOWS\system32\Rundll32.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Program Files\Logitech\SetPoint\SetPoint.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
    C:\WINDOWS\explorer.exe
    C:\ComboFix\NirCmd.cfexe
    Q:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.windowsxlive.net
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: (no name) - {2C5E523F-F71A-4428-B9DB-3A53960BAC1A} - C:\WINDOWS\system32\jkkji.dll (file missing)
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O3 - Toolbar: StylerToolBar - {D2F8F919-690B-4EA2-9FA7-A203D1E04F75} - C:\Program Files\Styler\TB\StylerTB.dll (file missing)
    O4 - HKLM\..\Run: [StartCCC] "C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe"
    O4 - HKLM\..\Run: [P17Helper] Rundll32 P17.dll,P17Helper
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe" -start
    O4 - HKLM\..\Run: [WinLoader] á 
    O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
    O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\RunServices: [WinLoader] á 
    O4 - HKCU\..\Run: [Philips Intelligent Agent] NOT_IN_USE_DUMMY_PATH
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - Startup: hamachi.lnk = Q:\Program Files\Hamachi\hamachi.exe
    O4 - Global Startup: Desktop Manager.lnk = C:\Program Files\Research In Motion\BlackBerry\DesktopMgr.exe
    O4 - Global Startup: Logitech SetPoint.lnk = C:\Program Files\Logitech\SetPoint\SetPoint.exe
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1191470381670
    O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://messenger.zone.msn.com/binary/ZIntro.cab56649.cab
    O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
    O16 - DPF: {E6187999-9FEC-46A1-A20F-F4CA977D5643} (ZoneChess Object) - http://messenger.zone.msn.com/binary/Chess.cab57176.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{7EFC4CD9-409A-4756-95E1-47CD475365BF}: NameServer = 208.67.222.222,208.67.220.220
    O17 - HKLM\System\CCS\Services\Tcpip\..\{BCBA7996-91D6-447E-AA40-F25CBB009938}: NameServer = 192.168.0.1,192.168.0.2
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
    O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: Logitech Bluetooth Service (LBTServ) - Logitech, Inc. - C:\Program Files\Common Files\Logishrd\Bluetooth\LBTServ.exe
    O23 - Service: MySQL - Unknown owner - C:\Program.exe (file missing)
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: Roxio UPnP Renderer 9 - Unknown owner - C:\Program Files\Roxio\Digital Home 9\RoxioUPnPRenderer9.exe (file missing)
    O23 - Service: Roxio Upnp Server 9 - Unknown owner - C:\Program Files\Roxio\Digital Home 9\RoxioUpnpService9.exe (file missing)
    O23 - Service: LiveShare P2P Server 9 (RoxLiveShare9) - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxLiveShare9.exe
    O23 - Service: RoxMediaDB9 - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exe
    O23 - Service: Roxio Hard Drive Watcher 9 (RoxWatch9) - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatch9.exe
    O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Program Files\WinPcap\rpcapd.exe
    
    --
    End of file - 7102 bytes
    
    MalawareBytes Log:
    Malwarebytes' Anti-Malware 1.28
    Database version: 1248
    Windows 5.1.2600 Service Pack 3
    
    10/9/2008 7:03:43 PM
    mbam-log-2008-10-09 (19-03-43).txt
    
    Scan type: Full Scan (C:\|Q:\|)
    Objects scanned: 161176
    Time elapsed: 2 hour(s), 12 minute(s), 29 second(s)
    
    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 45
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 6
    Files Infected: 29
    
    Memory Processes Infected:
    (No malicious items detected)
    
    Memory Modules Infected:
    (No malicious items detected)
    
    Registry Keys Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wvusspn (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{98f2aebd-0500-4c95-a5c2-10295868cea7} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{98f2aebd-0500-4c95-a5c2-10295868cea7} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\shoppingreport.hbax (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\shoppingreport.hbax.1 (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\shoppingreport.hbinfoband (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\shoppingreport.hbinfoband.1 (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\shoppingreport.iebutton (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\shoppingreport.iebutton.1 (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\shoppingreport.iebuttona (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\shoppingreport.iebuttona.1 (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\shoppingreport.rprtctrl (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\shoppingreport.rprtctrl.1 (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{8ad9ad05-36be-4e40-ba62-5422eb0d02fb} (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{aebf09e2-0c15-43c8-99bf-928c645d98a0} (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{d8560ac2-21b5-4c1a-bdd4-bd12bc83b082} (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{c9ccbb35-d123-4a31-affc-9b2933132116} (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{a7cddcdc-beeb-4685-a062-978f5e07ceee} (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{a16ad1e9-f69a-45af-9462-b1c286708842} (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{20ea9658-6bc3-4599-a87d-6371fe9295fc} (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{9afb8248-617f-460d-9366-d71cdeda3179} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Typelib\{cdca70d8-c6a6-49ee-9bed-7429d6c477a2} (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Typelib\{d136987f-e1c4-4ccc-a220-893df03ec5df} (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Typelib\{e343edfc-1e6c-4cb5-aa29-e9c922641c80} (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{a7cddcdc-beeb-4685-a062-978f5e07ceee} (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{c5428486-50a0-4a02-9d20-520b59a9f9b2} (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{c5428486-50a0-4a02-9d20-520b59a9f9b3} (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\affltid (Malware.Trace) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affltid (Malware.Trace) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IProxyProvider (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\ShoppingReport (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\ShoppingReport (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    
    Registry Values Infected:
    (No malicious items detected)
    
    Registry Data Items Infected:
    (No malicious items detected)
    
    Folders Infected:
    C:\Documents and Settings\AJ\Application Data\ShoppingReport (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    C:\Documents and Settings\AJ\Application Data\ShoppingReport\cs (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    C:\Documents and Settings\AJ\Application Data\ShoppingReport\cs\db (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    C:\Documents and Settings\AJ\Application Data\ShoppingReport\cs\dwld (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    C:\Documents and Settings\AJ\Application Data\ShoppingReport\cs\report (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    C:\Documents and Settings\AJ\Application Data\ShoppingReport\cs\res1 (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    
    Files Infected:
    C:\WINDOWS\system32\wvusspn.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\fzcgpu.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\Documents and Settings\AJ\Local Settings\Temp\sai36F.tmp (Adware.Zango) -> Quarantined and deleted successfully.
    Q:\System Volume Information\_restore{45E87E9C-F978-4862-B239-2131E456ACE7}\RP347\A0395512.dll (Adware.Zango) -> Quarantined and deleted successfully.
    Q:\System Volume Information\_restore{45E87E9C-F978-4862-B239-2131E456ACE7}\RP347\A0395514.dll (Adware.Zango) -> Quarantined and deleted successfully.
    Q:\System Volume Information\_restore{45E87E9C-F978-4862-B239-2131E456ACE7}\RP347\A0395515.dll (Adware.Seekmo) -> Quarantined and deleted successfully.
    Q:\System Volume Information\_restore{45E87E9C-F978-4862-B239-2131E456ACE7}\RP347\A0395516.dll (Adware.Seekmo) -> Quarantined and deleted successfully.
    Q:\System Volume Information\_restore{45E87E9C-F978-4862-B239-2131E456ACE7}\RP347\A0395517.dll (Adware.Seekmo) -> Quarantined and deleted successfully.
    Q:\System Volume Information\_restore{45E87E9C-F978-4862-B239-2131E456ACE7}\RP347\A0395518.dll (Adware.Seekmo) -> Quarantined and deleted successfully.
    Q:\System Volume Information\_restore{45E87E9C-F978-4862-B239-2131E456ACE7}\RP347\A0395520.exe (Adware.Seekmo) -> Quarantined and deleted successfully.
    Q:\System Volume Information\_restore{45E87E9C-F978-4862-B239-2131E456ACE7}\RP347\A0395521.exe (Adware.Zango) -> Quarantined and deleted successfully.
    Q:\System Volume Information\_restore{45E87E9C-F978-4862-B239-2131E456ACE7}\RP347\A0395522.dll (Adware.Zango) -> Quarantined and deleted successfully.
    Q:\System Volume Information\_restore{45E87E9C-F978-4862-B239-2131E456ACE7}\RP347\A0395523.exe (Adware.Zango) -> Quarantined and deleted successfully.
    Q:\System Volume Information\_restore{45E87E9C-F978-4862-B239-2131E456ACE7}\RP347\A0395524.dll (Adware.Zango) -> Quarantined and deleted successfully.
    Q:\System Volume Information\_restore{45E87E9C-F978-4862-B239-2131E456ACE7}\RP347\A0395525.exe (Adware.Seekmo) -> Quarantined and deleted successfully.
    Q:\System Volume Information\_restore{45E87E9C-F978-4862-B239-2131E456ACE7}\RP347\A0395526.dll (Adware.Seekmo) -> Quarantined and deleted successfully.
    Q:\System Volume Information\_restore{45E87E9C-F978-4862-B239-2131E456ACE7}\RP347\A0395527.dll (Adware.Seekmo) -> Quarantined and deleted successfully.
    C:\Documents and Settings\AJ\Application Data\ShoppingReport\cs\Config.xml (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    C:\Documents and Settings\AJ\Application Data\ShoppingReport\cs\db\Aliases.dbs (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    C:\Documents and Settings\AJ\Application Data\ShoppingReport\cs\db\Sites.dbs (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    C:\Documents and Settings\AJ\Application Data\ShoppingReport\cs\dwld\WhiteList.xip (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    C:\Documents and Settings\AJ\Application Data\ShoppingReport\cs\report\aggr_storage.xml (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    C:\Documents and Settings\AJ\Application Data\ShoppingReport\cs\report\send_storage.xml (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    C:\Documents and Settings\AJ\Application Data\ShoppingReport\cs\res1\WhiteList.dbs (Adware.Shopping.Report) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\mcrh.tmp (Malware.Trace) -> Quarantined and deleted successfully.
    C:\WINDOWS\cookies.ini (Malware.Trace) -> Quarantined and deleted successfully.
    C:\WINDOWS\pskt.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\BM978a3926.xml (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\BM978a3926.txt (Trojan.Vundo) -> Quarantined and deleted successfully.
    
    ComboFix Log:
    ComboFix 08-10-08.07 - AJ 2008-10-09 19:12:15.1 - NTFSx86
    Microsoft Windows XP Professional  5.1.2600.3.1252.1.1033.18.707 [GMT -7:00]
    Running from: C:\Documents and Settings\AJ\Desktop\ComboFix.exe
     * Created a new restore point
    
    [COLOR=RED][B]WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !![/B][/COLOR]
    .
    
    (((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    
    C:\Documents and Settings\AJ\Local Settings\Temporary Internet Files\ijjistarter_verinfo.dat
    C:\WINDOWS\system32\abywslls.ini
    C:\WINDOWS\system32\adjmwtqh.ini
    C:\WINDOWS\system32\ageryifm.ini
    C:\WINDOWS\system32\aqvuaslo.ini
    C:\WINDOWS\system32\asfdclka.ini
    C:\WINDOWS\system32\aubnaomg.ini
    C:\WINDOWS\system32\auwrmfdy.ini
    C:\WINDOWS\system32\bfibyhkg.ini
    C:\WINDOWS\system32\bhyrkmtk.ini
    C:\WINDOWS\system32\bkjgewql.ini
    C:\WINDOWS\system32\bkmdcklg.ini
    C:\WINDOWS\system32\bnbuwypb.ini
    C:\WINDOWS\system32\bvcppgyv.ini
    C:\WINDOWS\system32\ceuswkks.ini
    C:\WINDOWS\system32\cmtrpnyw.ini
    C:\WINDOWS\system32\cqcmxlgl.ini
    C:\WINDOWS\system32\csdqbaig.ini
    C:\WINDOWS\system32\cxxtodky.ini
    C:\WINDOWS\system32\daqvdnvi.ini
    C:\WINDOWS\system32\dayhfmog.ini
    C:\WINDOWS\system32\dreboiuq.ini
    C:\WINDOWS\system32\dwkjuynm.ini
    C:\WINDOWS\system32\eabfjbsm.ini
    C:\WINDOWS\system32\elfvssrm.ini
    C:\WINDOWS\system32\enfbrhtt.ini
    C:\WINDOWS\system32\eoxtjfqd.ini
    C:\WINDOWS\system32\etsxusow.ini
    C:\WINDOWS\system32\exbsnymm.ini
    C:\WINDOWS\system32\ffbjqrxr.ini
    C:\WINDOWS\system32\fhggjqbn.ini
    C:\WINDOWS\system32\fkuabqij.ini
    C:\WINDOWS\system32\fmfqtcfg.ini
    C:\WINDOWS\system32\foilsfcd.ini
    C:\WINDOWS\system32\fpbpvnyw.ini
    C:\WINDOWS\system32\fptkrcxa.ini
    C:\WINDOWS\system32\frvdiqyb.ini
    C:\WINDOWS\system32\fxowxvkq.ini
    C:\WINDOWS\system32\gajkcqkc.ini
    C:\WINDOWS\system32\garnjflh.ini
    C:\WINDOWS\system32\gawmiwbj.ini
    C:\WINDOWS\system32\gdjxbdmn.ini
    C:\WINDOWS\system32\ghijjfml.ini
    C:\WINDOWS\system32\gjydxory.ini
    C:\WINDOWS\system32\gtfscufh.ini
    C:\WINDOWS\system32\gvovldno.ini
    C:\WINDOWS\system32\gwgqwtwy.ini
    C:\WINDOWS\system32\gwuwfuhn.ini
    C:\WINDOWS\system32\gyxkijkh.ini
    C:\WINDOWS\system32\hehiohar.ini
    C:\WINDOWS\system32\hhkywpne.ini
    C:\WINDOWS\system32\hhqvactu.ini
    C:\WINDOWS\system32\hlicpmad.ini
    C:\WINDOWS\system32\hwcnecyt.ini
    C:\WINDOWS\system32\ieirdngf.ini
    C:\WINDOWS\system32\ihraisit.ini
    C:\WINDOWS\system32\ijkkj.ini
    C:\WINDOWS\system32\ijkkj.ini2
    C:\WINDOWS\system32\itoiprgg.ini
    C:\WINDOWS\system32\ixxvtvvb.ini
    C:\WINDOWS\system32\jfyxhrpr.ini
    C:\WINDOWS\system32\jhdsumwi.ini
    C:\WINDOWS\system32\jiajjwbo.ini
    C:\WINDOWS\system32\jygkdhnx.ini
    C:\WINDOWS\system32\kksuhwef.ini
    C:\WINDOWS\system32\kqgbakom.ini
    C:\WINDOWS\system32\kqnyfcvt.ini
    C:\WINDOWS\system32\kqwlrpfk.ini
    C:\WINDOWS\system32\ktclelrn.ini
    C:\WINDOWS\system32\kwwphyxv.ini
    C:\WINDOWS\system32\kxeundgf.ini
    C:\WINDOWS\system32\lepxvpro.ini
    C:\WINDOWS\system32\lffomwhc.ini
    C:\WINDOWS\system32\lgmxjuop.ini
    C:\WINDOWS\system32\lptdofpg.ini
    C:\WINDOWS\system32\lutmllud.ini
    C:\WINDOWS\system32\mcihstgl.ini
    C:\WINDOWS\system32\megtpvsr.ini
    C:\WINDOWS\system32\mnpyjyst.ini
    C:\WINDOWS\system32\mnslqatg.ini
    C:\WINDOWS\system32\mrgropmm.ini
    C:\WINDOWS\system32\mudtvwnb.ini
    C:\WINDOWS\system32\nbvgokqw.ini
    C:\WINDOWS\system32\nibaatvn.ini
    C:\WINDOWS\system32\nmyjatup.ini
    C:\WINDOWS\system32\nnaqcgvj.ini
    C:\WINDOWS\system32\ntsgujqg.ini
    C:\WINDOWS\system32\nytjolyv.ini
    C:\WINDOWS\system32\oeffmknb.ini
    C:\WINDOWS\system32\oktavjrw.ini
    C:\WINDOWS\system32\ovhloelc.ini
    C:\WINDOWS\system32\pcrwmjbm.ini
    C:\WINDOWS\system32\pfrgktel.ini
    C:\WINDOWS\system32\pgjkdkqb.ini
    C:\WINDOWS\system32\plbguhoo.ini
    C:\WINDOWS\system32\pmsrfnsh.ini
    C:\WINDOWS\system32\potnbcmc.ini
    C:\WINDOWS\system32\ptinvgab.ini
    C:\WINDOWS\system32\pwsmcect.ini
    C:\WINDOWS\system32\qbwpuhmn.ini
    C:\WINDOWS\system32\qcipyffy.ini
    C:\WINDOWS\system32\qkrnipcu.ini
    C:\WINDOWS\system32\qntafmim.ini
    C:\WINDOWS\system32\qtigkatt.ini
    C:\WINDOWS\system32\qvvfvoaw.ini
    C:\WINDOWS\system32\qypqqeoe.ini
    C:\WINDOWS\system32\rgodamkg.ini
    C:\WINDOWS\system32\rktwtfmn.ini
    C:\WINDOWS\system32\rlaqxlrr.ini
    C:\WINDOWS\system32\rlemyfoc.ini
    C:\WINDOWS\system32\rohryhvc.ini
    C:\WINDOWS\system32\rprvschy.ini
    C:\WINDOWS\system32\rupalvvn.ini
    C:\WINDOWS\system32\saejylap.ini
    C:\WINDOWS\system32\sbpcbyag.ini
    C:\WINDOWS\system32\sdbidvwu.ini
    C:\WINDOWS\system32\sduwnofk.ini
    C:\WINDOWS\system32\sehlaxuy.ini
    C:\WINDOWS\system32\siylwljb.ini
    C:\WINDOWS\system32\sjwjaxxm.ini
    C:\WINDOWS\system32\slrxlwwy.ini
    C:\WINDOWS\system32\ssvyvtdr.ini
    C:\WINDOWS\system32\sujvmmli.ini
    C:\WINDOWS\system32\sxewsetk.ini
    C:\WINDOWS\system32\tbabjkud.ini
    C:\WINDOWS\system32\tbsqaspv.ini
    C:\WINDOWS\system32\tdqhkqmr.ini
    C:\WINDOWS\system32\tfkapbkd.ini
    C:\WINDOWS\system32\tmahkeai.ini
    C:\WINDOWS\system32\tntejiak.ini
    C:\WINDOWS\system32\torwppgw.ini
    C:\WINDOWS\system32\tpiphlfv.ini
    C:\WINDOWS\system32\tpwtogks.ini
    C:\WINDOWS\system32\txxrmwsu.ini
    C:\WINDOWS\system32\ugujmvok.ini
    C:\WINDOWS\system32\ugwstevc.ini
    C:\WINDOWS\system32\uiytgheq.ini
    C:\WINDOWS\system32\utcrfyoo.ini
    C:\WINDOWS\system32\uueucpua.ini
    C:\WINDOWS\system32\uyskhiyv.ini
    C:\WINDOWS\system32\vabbfwwa.ini
    C:\WINDOWS\system32\vflwojmu.ini
    C:\WINDOWS\system32\vgdoqnap.ini
    C:\WINDOWS\system32\vjxtnmnh.ini
    C:\WINDOWS\system32\vnvdupkq.ini
    C:\WINDOWS\system32\vtvntgef.ini
    C:\WINDOWS\system32\wkgvhppc.ini
    C:\WINDOWS\system32\wohswrtd.ini
    C:\WINDOWS\system32\wvjqigol.ini
    C:\WINDOWS\system32\wwgvcloj.ini
    C:\WINDOWS\system32\xdlmvkdl.ini
    C:\WINDOWS\system32\xkldeydm.ini
    C:\WINDOWS\system32\xtwmxqck.ini
    C:\WINDOWS\system32\xwvofoxr.ini
    C:\WINDOWS\system32\yvapphcn.ini
    
    .
    (((((((((((((((((((((((((((((((((((((((   Drivers/Services   )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    
    -------\Legacy_NPF
    -------\Service_NPF
    
    
    (((((((((((((((((((((((((   Files Created from 2008-09-10 to 2008-10-10  )))))))))))))))))))))))))))))))
    .
    
    2008-10-09 17:29 . 2008-10-09 17:29    664    --a------    C:\WINDOWS\system32\d3d9caps.dat
    2008-10-09 16:34 . 2008-10-09 16:34    <DIR>    d--------    C:\Documents and Settings\All Users\Application Data\Malwarebytes
    2008-10-09 16:34 . 2008-10-09 16:34    <DIR>    d--------    C:\Documents and Settings\AJ\Application Data\Malwarebytes
    2008-10-09 16:34 . 2008-09-10 00:08    38,528    --a------    C:\WINDOWS\system32\drivers\mbamswissarmy.sys
    2008-10-09 16:34 . 2008-09-10 00:08    17,200    --a------    C:\WINDOWS\system32\drivers\mbam.sys
    2008-10-08 20:26 . 1999-11-10 12:05    86,016    --a------    C:\WINDOWS\unvise32qt.exe
    2008-10-08 20:26 . 2008-10-08 20:29    9,680    --a------    C:\WINDOWS\system32\QuickTime.qtp
    2008-10-08 18:42 . 2008-10-08 18:43    45    --a------    C:\WINDOWS\system32\RPVersion.ini
    2008-10-08 17:03 . 2008-10-08 17:03    <DIR>    d--------    C:\Program Files\Common Files\Research In Motion
    2008-09-28 23:25 . 2008-09-28 23:25    <DIR>    d--------    C:\Program Files\Google
    2008-09-28 01:16 . 2008-09-17 09:55    201,050    --a------    C:\WINDOWS\system32\nvapps.nvb
    2008-09-28 01:07 . 2008-09-28 01:07    <DIR>    d--------    C:\Program Files\SystemRequirementsLab
    2008-09-28 01:07 . 2008-09-28 01:07    <DIR>    d--------    C:\Documents and Settings\AJ\Application Data\SystemRequirementsLab
    2008-09-26 15:02 . 2008-09-26 15:02    <DIR>    d--------    C:\Documents and Settings\All Users\Application Data\Marginal Team
    
    .
    ((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2008-10-10 02:19    ---------    d-----w    C:\Documents and Settings\AJ\Application Data\Hamachi
    2008-10-09 03:29    ---------    d-----w    C:\Program Files\QuickTime
    2008-10-09 03:26    ---------    d--h--w    C:\Program Files\InstallShield Installation Information
    2008-10-09 00:09    ---------    d-----w    C:\Program Files\Common Files\Apple
    2008-10-09 00:06    ---------    d-----w    C:\Documents and Settings\All Users\Application Data\Napster
    2008-10-08 23:59    ---------    d-----w    C:\Program Files\Common Files\ACD Systems
    2008-10-07 04:03    ---------    d-----w    C:\Program Files\Apple Software Update
    2008-09-29 03:00    ---------    d-----w    C:\Program Files\Steam
    2008-09-27 18:40    ---------    d-----w    C:\Program Files\Diablo II
    2008-09-17 16:55    6,132,576    ----a-w    C:\WINDOWS\system32\drivers\nv4_mini.sys
    2008-09-08 02:03    ---------    d-----w    C:\Documents and Settings\AJ\Application Data\SPORE
    2008-09-07 23:47    ---------    d-----w    C:\Program Files\Electronic Arts
    2008-09-04 10:05    ---------    d-----w    C:\Program Files\MSXML 6.0
    2008-09-04 10:01    ---------    d-----w    C:\Program Files\MSXML 4.0
    2008-09-01 06:55    ---------    d-----w    C:\Program Files\Starcraft
    2008-08-29 16:56    97,928    ----a-w    C:\WINDOWS\system32\drivers\avgldx86.sys
    2008-08-10 16:01    ---------    d-----w    C:\Documents and Settings\AJ\Application Data\DNA
    2008-08-10 12:37    ---------    d--h--w    C:\Documents and Settings\AJ\Application Data\ijjigame
    2008-08-10 10:24    15,440    ----a-w    C:\WINDOWS\system32\drivers\hamachi.sys
    2008-08-10 00:21    ---------    d-----w    C:\Program Files\Common Files\Blizzard Entertainment
    2007-02-13 03:10    2,682,880    ------w    C:\Documents and Settings\All Users\VCREDI~3.EXE
    .
    
    (((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown 
    REGEDIT4
    
    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Philips Intelligent Agent"="NOT_IN_USE_DUMMY_PATH" [X]
    "MSMSGS"="C:\Program Files\Messenger\msmsgs.exe" [2008-04-14 1695232]
    
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "WinLoader"="á " [X]
    "StartCCC"="C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2006-11-10 90112]
    "NvCplDaemon"="C:\WINDOWS\system32\NvCpl.dll" [2008-09-17 13574144]
    "ISUSScheduler"="C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe" [2006-09-11 86960]
    "AVG8_TRAY"="C:\PROGRA~1\AVG\AVG8\avgtray.exe" [2008-09-29 1234712]
    "NvMediaCenter"="C:\WINDOWS\system32\NvMcTray.dll" [2008-09-17 86016]
    "QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2008-10-08 98304]
    "P17Helper"="P17.dll" [2005-05-03 C:\WINDOWS\system32\P17.dll]
    "nwiz"="nwiz.exe" [2008-09-17 C:\WINDOWS\system32\nwiz.exe]
    
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices]
    "WinLoader"="á " [X]
    
    C:\Documents and Settings\AJ\Start Menu\Programs\Startup\
    hamachi.lnk - Q:\Program Files\Hamachi\hamachi.exe [2008-08-10 597032]
    
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon]
    "UIHost"=hex(2):76,69,73,74,61,75,69,2e,65,78,65,00
    
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LBTWlgn]
    2008-05-02 02:42 72208 c:\Program Files\Common Files\Logishrd\Bluetooth\LBTWLgn.dll
    
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\WB]
    2001-12-20 23:34 24576 C:\Program Files\AlienGUIse\fastload.dll
    
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
    "AppInit_DLLs"=wbsys.dll,avgrsstx.dll
    
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
    "VIDC.ACDV"= ACDV.dll
    
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WdfLoadGroup]
    @=""
    
    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"=
    "C:\\Program Files\\Steam\\steamapps\\slyfox1011\\half-life\\hl.exe"=
    "C:\\Program Files\\Starcraft\\StarCraft.exe"=
    "C:\\Program Files\\Steam\\steamapps\\slyfox1011\\counter-strike source\\hl2.exe"=
    "C:\\Program Files\\Steam\\steamapps\\slyfox1011\\counter-strike\\hl.exe"=
    "C:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
    "C:\\Program Files\\AIM6\\aim6.exe"=
    "C:\\StubInstaller.exe"=
    "C:\\Program Files\\Steam\\Steam.exe"=
    "C:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
    "C:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"=
    "C:\\WINDOWS\\system32\\dxdiag.exe"=
    "C:\\Program Files\\Messenger\\msmsgs.exe"=
    "C:\\Program Files\\MSN Messenger\\msnmsgr.exe"=
    "C:\\Program Files\\MSN Messenger\\livecall.exe"=
    "Q:\\Program Files\\Warcraft III\\war3.exe"=
    "Q:\\Program Files\\Softnyx\\Rakion\\Bin\\rakion.bin"=
    "C:\\Program Files\\Steam\\steamapps\\slyfox1011\\team fortress 2\\hl2.exe"=
    "C:\\Program Files\\AVG\\AVG8\\avgupd.exe"=
    "C:\\Program Files\\Electronic Arts\\EADM\\Core.exe"=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "C:\\Program Files\\Diablo II\\Diablo II.exe"=
    
    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
    "3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009
    "3724:TCP"= 3724:TCP:Blizzard Downloader: 3724
    
    R0 videX32;videX32;C:\WINDOWS\system32\DRIVERS\videX32.sys [2006-02-22 9728]
    R0 xfilt;VIA SATA IDE Hot-plug Driver;C:\WINDOWS\system32\DRIVERS\xfilt.sys [2006-02-22 11264]
    R1 AvgLdx86;AVG Free AVI Loader Driver x86;C:\WINDOWS\system32\Drivers\avgldx86.sys [2008-08-29 97928]
    R2 avg8wd;AVG Free8 WatchDog;C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe [2008-08-29 231704]
    R2 E2ECAP;e2eCap - WDM Video Capture;C:\WINDOWS\system32\DRIVERS\e2ecap.sys [2007-08-22 126208]
    S3 SndTDriverV32;SndTDriverV32;C:\WINDOWS\system32\drivers\SndTDriverV32.sys [2008-03-13 506496]
    S3 XDva134;XDva134;C:\WINDOWS\system32\XDva134.sys [ ]
    
    [HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{582610B8-E496-4813-993C-4B027173FE38}]
    C:\Program Files\PixiePack Codec Pack\InstallerHelper.exe
    .
    Contents of the 'Scheduled Tasks' folder
    
    2008-10-07 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job
    - C:\Program Files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 12:34]
    .
    - - - - ORPHANS REMOVED - - - -
    
    BHO-{2C5E523F-F71A-4428-B9DB-3A53960BAC1A} - C:\WINDOWS\system32\jkkji.dll
    HKCU-Run-Aim6 - (no file)
    HKLM-Run-NWEReboot - (no file)
    
    
    .
    ------- Supplementary Scan -------
    .
    FireFox -: Profile - C:\Documents and Settings\AJ\Application Data\Mozilla\Firefox\Profiles\1nvzm56a.default\
    FF -: plugin - C:\Documents and Settings\AJ\Application Data\Mozilla\plugins\npoctoshape.dll
    FF -: plugin - C:\Program Files\Octoshape Streaming Services\AJ\octoprogram-L03-NMS0806110_SUA_900\npoctoshape.dll
    FF -: plugin - C:\Program Files\Yahoo!\Shared\npYState.dll
    .
    
    **************************************************************************
    
    catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-10-09 19:24:00
    Windows 5.1.2600 Service Pack 3 NTFS
    
    scanning hidden processes ... 
    
    scanning hidden autostart entries ...
    
    scanning hidden files ... 
    
    scan completed successfully
    hidden files: 0
    
    **************************************************************************
    
    [HKEY_LOCAL_MACHINE\System\ControlSet004\Services\MySQL]
    "ImagePath"="\"C:\Program Files\MySQL\MySQL Server 5.0\bin\mysqld-nt\" --defaults-file=\"C:\Program Files\MySQL\MySQL Server 5.0\my.ini\" MySQL"
    .
    ------------------------ Other Running Processes ------------------------
    .
    C:\Program Files\MySQL\MySQL Server 5.0\bin\mysqld-nt.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\Program Files\AVG\AVG8\avgrsx.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\system32\rundll32.exe
    C:\Program Files\Logitech\SetPoint\SetPoint.exe
    C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.exe
    .
    **************************************************************************
    .
    Completion time: 2008-10-09 19:34:15 - machine was rebooted
    ComboFix-quarantined-files.txt  2008-10-10 02:34:11
    
    Pre-Run: 5,140,430,848 bytes free
    Post-Run: 8,009,777,152 bytes free
    
    324    --- E O F ---    2008-10-07 04:21:57
    
    Everything went very smoothly and a lot seemed to be removed.
  • VekaVeka Finland
    edited October 2008
    Hey, please re-run HijackThis and select Do a system scan only
    When the scan is complete, please check mark following entries:

    O2 - BHO: (no name) - {2C5E523F-F71A-4428-B9DB-3A53960BAC1A} - C:\WINDOWS\system32\jkkji.dll (file missing)
    O4 - HKLM\..\Run: [WinLoader] á
    O4 - HKLM\..\RunServices: [WinLoader] á

    Finally, click Fix Checked


    After that, do a scan with Kaspersky

    Note: Internet Explorer should be used

    • Read through the requirements and privacy statement and click on Accept button.
    • It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
    • When the downloads have finished, click on Settings.
    • Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:
      • Spyware, Adware, Dialers, and other potentially dangerous programs
      • Archives
    • Click on My Computer under Scan and then put the kettle on!
    • Once the scan is complete, it will display the results. Click on View Scan Report.
    • You will see a list of infected items there. Click on Save Report As....
    • Save this report to a convenient place like your Desktop. Change the Files of type to Text file (.txt) before clicking on the Save button.
    • Copy and paste the report into your next reply.
  • edited October 2008
    Vekarppe,

    Thanks again for continuing to help me solve this problem.

    O2 - BHO: (no name) - {2C5E523F-F71A-4428-B9DB-3A53960BAC1A} - C:\WINDOWS\system32\jkkji.dll (file missing)

    That file was not in the Hijackthis scan log. The other two I did remove.

    Kasperksy Log:


    KASPERSKY ONLINE SCANNER 7 REPORT
    Monday, October 13, 2008
    Operating System: Microsoft Windows XP Professional Service Pack 3 (build 2600)
    Kaspersky Online Scanner 7 version: 7.0.25.0
    Program database last update: Monday, October 13, 2008 07:47:39
    Records in database: 1308098

    Scan settings:
    Scan using the following database: extended
    Scan archives: yes
    Scan mail databases: yes

    Scan area - My Computer:
    A:\
    C:\
    D:\
    E:\
    Q:\

    Scan statistics:
    Files scanned: 99061
    Threat name: 3
    Infected objects: 4
    Suspicious objects: 0
    Duration of the scan: 03:20:58


    File name / Threat name / Threats count
    C:\Documents and Settings\AJ\Desktop\mY sTuFF\MySQL\dcsetup.exe Infected: Packed.Win32.Black.a 1
    C:\Documents and Settings\AJ\Desktop\mY sTuFF\WarcraftAutorefresh.7z Infected: Trojan-Spy.Win32.Pophot.cpc 1
    C:\Documents and Settings\AJ\Desktop\Warcraft 3 Hosting-Playing Stuff\WarcraftAutorefresh.exe Infected: Trojan-Spy.Win32.Pophot.cpc 1
    C:\WINDOWS\system32\arvexnpm.dll_old Infected: Trojan.Win32.Monder.dl 1

    The selected area was scanned.

  • VekaVeka Finland
    edited October 2008
    Hi, please update MBAM and do a quick scan. Post the results, please.
  • edited October 2008
    Here it is:

    Malwarebytes' Anti-Malware 1.28
    Database version: 1274
    Windows 5.1.2600 Service Pack 3

    10/15/2008 10:35:24 PM
    mbam-log-2008-10-15 (22-35-23).txt

    Scan type: Quick Scan
    Objects scanned: 52014
    Time elapsed: 23 minute(s), 29 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 0

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    (No malicious items detected)
  • VekaVeka Finland
    edited October 2008
    How is your computer doing? :)
  • edited October 2008
    Just fine, I wanted to thank you again for your help.

    WoW is running smoother and I'm no longer crashing consistently.

    Thanks so much. :)
  • VekaVeka Finland
    edited October 2008
    • Please go to VirusTotal
    • Copy and paste the following file path into the Search Box in the middle of the page:

      C:\WINDOWS\system32\arvexnpm.dll_old

    • Now, click on the Send File button
    • Save a copy of the Anti-Virus results. Post the results in your next reply.
    Do same thing with these files (one by one):

    C:\Documents and Settings\AJ\Desktop\mY sTuFF\MySQL\dcsetup.exe

    C:\Documents and Settings\AJ\Desktop\mY sTuFF\WarcraftAutorefresh.7z

    C:\Documents and Settings\AJ\Desktop\Warcraft 3 Hosting-Playing Stuff\WarcraftAutorefresh.exe


    Please post the results
  • edited October 2008
    Alright, here are the results:

    C:\WINDOWS\system32\arvexnpm.dll_old

    File arvexnpm.dll_old received on 10.21.2008 02:31:36 (CET)
    Antivirus    Version    Last Update    Result
    AhnLab-V3    2008.10.18.0    2008.10.20    -
    AntiVir    7.9.0.5    2008.10.20    TR/Vundo.Gen
    Authentium    5.1.0.4    2008.10.21    W32/Virtumonde!Generic
    Avast    4.8.1248.0    2008.10.15    Win32:VunDrop
    AVG    8.0.0.161    2008.10.20    Vundo.R
    BitDefender    7.2    2008.10.21    Trojan.Vundo.1
    CAT-QuickHeal    9.50    2008.10.20    Trojan.Monder.dl
    ClamAV    0.93.1    2008.10.21    Trojan.Vundo-2957
    DrWeb    4.44.0.09170    2008.10.21    Trojan.Virtumod.365
    eSafe    7.0.17.0    2008.10.19    Suspicious File
    eTrust-Vet    31.6.6160    2008.10.20    Win32/Vundo!generic
    Ewido    4.0    2008.10.20    -
    F-Prot    4.4.4.56    2008.10.20    W32/Virtumonde.R.gen!Eldorado
    F-Secure    8.0.14332.0    2008.10.21    Trojan.Win32.Monder.dl
    Fortinet    3.113.0.0    2008.10.20    W32/Vundo.C!tr
    GData    19    2008.10.21    Trojan.Vundo.1
    Ikarus    T3.1.1.44.0    2008.10.20    Win32.Rigel.6468
    K7AntiVirus    7.10.500    2008.10.20    Trojan.Win32.Monder.dl
    Kaspersky    7.0.0.125    2008.10.21    Trojan.Win32.Monder.dl
    McAfee    5409    2008.10.21    Vundo.gen.c
    Microsoft    1.4005    2008.10.21    Trojan:Win32/Vundo.gen!K
    NOD32    3539    2008.10.21    Win32/Adware.AdMedia
    Norman    5.80.02    2008.10.20    W32/Virtumonde.VIK
    Panda    9.0.0.4    2008.10.20    Spyware/Virtumonde
    PCTools    4.4.2.0    2008.10.20    Adware.Vundo.Gen!Pac.18
    Prevx1    V2    2008.10.21    Fraudulent Security Program
    Rising    20.67.01.00    2008.10.20    Trojan.Win32.Monder.a
    SecureWeb-Gateway    6.7.6    2008.10.20    Trojan.Vundo.Gen
    Sophos    4.34.0    2008.10.20    Troj/Virtum-Gen
    Sunbelt    3.1.1741.1    2008.10.21    VIPRE.Suspicious
    Symantec    10    2008.10.21    Trojan.Vundo.B
    TheHacker    6.3.1.0.119    2008.10.18    Trojan/Monder.dl
    TrendMicro    8.700.0.1004    2008.10.20    Cryp_Tap-5
    VBA32    3.12.8.8    2008.10.21    Trojan.Win32.Monder.dl
    ViRobot    2008.10.20.1428    2008.10.20    Trojan.Win32.Monder.100416.B
    VirusBuster    4.5.11.0    2008.10.20    Trojan.Monder.KK
    Additional information
    File size: 100416 bytes
    MD5...: d86d96e3cd668bc76c6288a5f5967213
    SHA1..: abf4c03c418fc1be4e47ff1d5988fa9375861eee
    SHA256: 7f58ef12c074c1772ec178d188ecd8d2cb16107ea15ed6c66bfe30bb1a718850
    SHA512: 9ed4d149f1231298ba761525eea5f63efc80f9a92c79d1dcb45bef1cb77dcea7<br>eeab2cfbcd36ba48afb9652f5b9f70db5d611becb7ebe4cdd8cf2a4b5c263e41
    PEiD..: -
    TrID..: File type identification<br>Win32 Dynamic Link Library (generic) (55.5%)<br>Clipper DOS Executable (14.7%)<br>Generic Win/DOS Executable (14.6%)<br>DOS Executable Generic (14.6%)<br>VXD Driver (0.2%)
    PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x100069f5<br>timedatestamp.....: 0xbd570c23L (invalid)<br>machinetype.......: 0x14c (I386)<br><br>( 4 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x1a000 0x5c00 7.82 c5c4a4b13b3201594dd43f02185c4a34<br>.data 0x1b000 0x12000 0x12000 7.99 45b328a337759f84619aed6aaccaa083<br>.rdata 0x2d000 0x1000 0x400 7.16 eb259eae1aece86db9cc697b6e512902<br>.idata 0x2e000 0x1000 0x400 0.95 3b6b8496f20cee7bd48a8127e620089d<br><br>( 1 imports ) <br>&gt; kernel32.dll: FlushFileBuffers, SetCurrentDirectoryA, lstrcatA, CloseHandle<br><br>( 0 exports ) <br>
    Prevx info: http://info.prevx.com/aboutprogramtext.asp?PX5=A7F2A44640BDF25088190107D1AE4800F8E4F8C1
    
    C:\Documents and Settings\AJ\Desktop\mY sTuFF\MySQL\dcsetup.exe

    File dcsetup.exe received on 06.11.2008 01:53:28 (CET)
    Antivirus    Version    Last Update    Result
    AhnLab-V3    2008.6.11.0    2008.06.10    -
    AntiVir    7.8.0.55    2008.06.10    -
    Authentium    5.1.0.4    2008.06.10    -
    Avast    4.8.1195.0    2008.06.10    -
    AVG    7.5.0.516    2008.06.10    -
    BitDefender    7.2    2008.06.11    -
    CAT-QuickHeal    9.50    2008.06.10    -
    ClamAV    0.92.1    2008.06.11    -
    DrWeb    4.44.0.09170    2008.06.10    -
    eSafe    7.0.15.0    2008.06.10    -
    eTrust-Vet    31.6.5864    2008.06.10    -
    Ewido    4.0    2008.06.10    -
    F-Prot    4.4.4.56    2008.06.10    -
    F-Secure    6.70.13260.0    2008.06.10    -
    Fortinet    3.14.0.0    2008.06.10    -
    GData    2.0.7306.1023    2008.06.10    -
    Ikarus    T3.1.1.26.0    2008.06.11    -
    Kaspersky    7.0.0.125    2008.06.11    -
    McAfee    5314    2008.06.10    -
    Microsoft    1.3604    2008.06.11    -
    NOD32v2    3175    2008.06.11    -
    Norman    5.80.02    2008.06.10    -
    Panda    9.0.0.4    2008.06.10    -
    Prevx1    V2    2008.06.11    -
    Rising    20.48.12.00    2008.06.10    -
    Sophos    4.30.0    2008.06.11    -
    Sunbelt    3.0.1145.1    2008.06.05    -
    Symantec    10    2008.06.11    -
    TheHacker    6.2.92.341    2008.06.10    -
    VBA32    3.12.6.7    2008.06.10    -
    VirusBuster    4.3.26:9    2008.06.10    -
    Webwasher-Gateway    6.6.2    2008.06.10    -
    Additional information
    File size: 4411862 bytes
    MD5...: c1222b76519d7d60d9b5651ec3189e8e
    SHA1..: 3313a1e464099027d17ac7a8de911c280044cb67
    SHA256: 8b7f322ded87e6db4496df6cd782415e5839cce54abf686c43703c492df86467
    SHA512: bd860a343c69708f229296803f0c00bf405f4eaf2ec37788be2095178447e32d<br>d104c82a1bac225a3ecc4945ab7428e2f6eb2527ba8e2fed56508521d4805d97
    PEiD..: -
    PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x409a54<br>timedatestamp.....: 0x2a425e19 (Fri Jun 19 22:22:17 1992)<br>machinetype.......: 0x14c (I386)<br><br>( 8 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>CODE 0x1000 0x916c 0x9200 6.56 f9c9dd3f4dceede0add0e7309253e897<br>DATA 0xb000 0x24c 0x400 2.73 4a56e30ca4646e6369d96abeacb0e6f0<br>BSS 0xc000 0xe48 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e<br>.idata 0xd000 0x950 0xa00 4.43 bb5485bf968b970e5ea81292af2acdba<br>.tls 0xe000 0x8 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e<br>.rdata 0xf000 0x18 0x200 0.20 9ba824905bf9c7922b6fc87a38b74366<br>.reloc 0x10000 0x8b4 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e<br>.rsrc 0x11000 0x2a00 0x2a00 4.44 a574830033631ac8b8256eef9ea6733d<br><br>( 8 imports ) <br>&gt; kernel32.dll: DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle<br>&gt; user32.dll: MessageBoxA<br>&gt; oleaut32.dll: VariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen<br>&gt; advapi32.dll: RegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA<br>&gt; kernel32.dll: WriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle<br>&gt; user32.dll: TranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA<br>&gt; comctl32.dll: InitCommonControls<br>&gt; advapi32.dll: AdjustTokenPrivileges<br><br>( 0 exports ) <br>
    packers (Kaspersky): PE_Patch.Poly
    
    
    C:\Documents and Settings\AJ\Desktop\mY sTuFF\WarcraftAutorefresh.7z

    File WarcraftAutorefresh.7z received on 06.30.2008 18:53:42 (CET)
    Antivirus    Version    Last Update    Result
    AhnLab-V3    -    -    -
    AntiVir    -    -    -
    Authentium    -    -    -
    Avast    -    -    Win32:Trojan-gen {Other}
    AVG    -    -    -
    BitDefender    -    -    -
    CAT-QuickHeal    -    -    -
    ClamAV    -    -    -
    DrWeb    -    -    Trojan.PWS.Banker.12189
    eSafe    -    -    -
    eTrust-Vet    -    -    -
    Ewido    -    -    -
    F-Prot    -    -    -
    F-Secure    -    -    -
    Fortinet    -    -    -
    GData    -    -    Win32:Trojan-gen
    Ikarus    -    -    -
    Kaspersky    -    -    -
    McAfee    -    -    -
    Microsoft    -    -    -
    NOD32v2    -    -    -
    Norman    -    -    -
    Panda    -    -    -
    Prevx1    -    -    Suspicious
    Rising    -    -    -
    Sophos    -    -    -
    Sunbelt    -    -    -
    Symantec    -    -    -
    TheHacker    -    -    -
    TrendMicro    -    -    -
    VBA32    -    -    -
    VirusBuster    -    -    -
    Webwasher-Gateway    -    -    -
    Additional information
    MD5: 44eb8b8b1fe47db4bc27ec70eeb71bb9
    SHA1: 87530247c586d7361037963b95a0953981069b13
    SHA256: c13972e4994a748564e65b3db9069792ea2c32838d9cb263dc449dbf1ee5530a
    SHA512: 4f86e2795fb78fc687d603c60643c7a69db529bcfba471896206d05685d15b832366b6f92ebd03c9e0e18b1a1d8661b984ebe2ddb63ed08e4b273966210c15d4
    
    
    C:\Documents and Settings\AJ\Desktop\Warcraft 3 Hosting-Playing Stuff\WarcraftAutorefresh.exe

    As soon as I opened up this folder my AVG caught it and deleted it, so that problem is taken care of.
  • VekaVeka Finland
    edited October 2008
    Thank you.

    Please do the following....
    • Click Start.
    • Open My Computer.
    • Select the Tools menu and click Folder Options.
    • Select the View Tab.
    • Under the Hidden files and folders heading select Show hidden files and folders.
    • Uncheck the Hide protected operating system files (recommended) option.
    • Click Yes to confirm.
    • Click OK.
    (You can change the settings back after the fix)


    Now, find and remove these files

    C:\WINDOWS\system32\arvexnpm.dll_old

    C:\Documents and Settings\AJ\Desktop\mY sTuFF\WarcraftAutorefresh.7z


    Please download ATF Cleaner by Atribune and save it to your desktop.
    • Double-click ATF-Cleaner.exe to run the program.
    • Under Main choose: Select All
    • Click the Empty Selected button.
    • Click the Exit button.

    Let's remove used tools....

    • Click START then RUN
    • Now type Combofix /u in the runbox and click OK. Note the space between the X and the U, it needs to be there.
      CF_Cleanup.png
    • When shown the disclaimer, Select "2"
    That's it. :)
  • edited October 2008
    Thanks so much once again.

    This site/you have been such a great help and I'm definitely going to come back/recommend it if I experience any future virus related problems.

    Is there anything else I should know?
  • VekaVeka Finland
    edited October 2008
    You're welcome. :)

    Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:

    Clean up System Restore

    You can find instructions on how to disable and enable System Restore from these guides:

    Disable And Enable System Restore
    Windows XP System Restore Guide

    Make Your Internet Explorer More Secure

    This can be done by following these simple instructions:
    • From within Internet Explorer click on the tools menu and then click on Options
    • Click once on the "Security" tab
    • Click once on the "Internet" icon so it becomes highlighted
    • Click once on the Custom Level button.
      • Change the "Download signed ActiveX" controls to Prompt
      • Change the "Download unsigned ActiveX" controls to Disable
      • Change the "Initialize and script ActiveX controls" not marked as safe to Disable
      • Change the "Launching programs and files in an IFRAME" to Prompt
      • Change the "Navigate sub-frames across different domains" to Prompt
      • When all these settings have been made, click on the OK button.
      • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    • Next press the Apply button and then the OK to exit the Internet Properties page.

    Note that Internet Explorer is not the most secure browser. There are safer (and better) alternatives available like Opera and Firefox.

    Keep Your System Up to date

    It is imperative that you keep your Windows, Antivirus, and other softwares up to date. Otherwise you are not protected against new threats and your system is vulnerable and unsafe. Update your Antivirus software at least once a week, and visit Microsoft Windows Update site regularly.

    Install SpywareBlaster

    SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware, Hijackers, and Malware

    Additional Utilities and Tips to Enhance Your Safety
    • MVPS Hosts file --- The MVPS Hosts file replaces your current HOSTS file with one containing well know ad sites etc. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer.
    • Comodo BOCLEAN --- Stop identity thieves from getting personal information. Instantly detects well over 1,000,000 unique, variant and repack malware in total. And it's free.
    • Winpatrol --- Download and install the free version of Winpatrol. A tutorial for this product is located here: Using Winpatrol to protect your computer from malicious software

    Get more knowledge about how to protecet your computer and prevent malware issues by reading these short articles:

    Happy surfing and stay clean! :D
  • VekaVeka Finland
    edited October 2008
    Glad we could be of assistance! The help you received here was free.

    This topic is now closed. If you wish it reopened, please send a Private Message to Trogan with a link to your thread.

    If you are not the user who started this thread, you must start your own Thread instead :)
    _______________________________
    Have we helped you with any issues you have had with your PCs or other items? If so, you can now help us by Joining Team 93 and fold for a cure.
Sign In or Register to comment.