Articles

Unable to update antivirus

Gateway
November 19, 2008 at 09:52:14
Specs: XP, 1gb

Hey Guys, I'm new to the forums and to computers in general. I think i might havea virus... I seem to not be able to update my antivirus (AVG Antivirus, spy bot, ad aware and such)Also, I cannot access any sites that have to do with antiviruses or antispyware. ( AVG.com, support microsoft, majorgeeks etc.) It is really bothering me, and it is also slowing my internet browsing. (By the way, I can access all other sites) I saw that JABUCK helped someone with a similar problem but he asked that we start a new thread...my friend sent me SDFIX since I couldnt go to tha website (blocked by virus i guess) and installed it and wanted at least to run it in safe mode BUT there was no Y options....Could someone help me ive been at it for a week now?


See More: Unable to update antivirus

Report •


#1
November 19, 2008 at 15:39:32

This may/may not help connecting to the web sites:

Go start> run> type cmd> ok> type in ipconfig /flushdns> (note, the space between g and / is needed) enter> type exit> enter.
Try to connect to the Malwarebytes web site.

Launch Notepad, and copy/paste all the instructions between the X’s below to it.
Save in: Desktop
File Name: fixme.reg
Save as Type: All files
Click: Save
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
REGEDIT4
[-HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains]
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains]
[-HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges]
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges]
[-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains]
[-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges]
[-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\EscDomains]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\EscDomains]
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Then, disconnect from the Internet!
Next,
Back on the Desktop, double-click on the fixme.reg file you just saved and click on Yes when asked to merge the information.
Try to connect to the malwarebytes web site.

Usually works when nothing else does:

Microsoft winsock rest


1. Click Start, and then click Run.
2. In the Open box, type regedit, and then click OK.
3. In Registry Editor, locate the following keys, right-click each key, and then click Delete:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Winsock
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Winsock2
4. When you are prompted to confirm the deletion, click Yes.
5. Note Restart the computer after you delete the Winsock keys. Doing so causes the Windows XP operating system to create new shell entries for those two keys. If you do not restart the computer after you delete the Winsock keys, the next step does not work correctly.
Step 2: Install TCP/IP
1. Right-click the network connection, and then click Properties.
2. Click Install.
3. Click Protocol, and then click Add.
4. Click Have Disk.
5. Type C:\Windows\inf, and then click OK.
6. On the list of available protocols, click , and then click OK.
Normally you are finished here, so restart the computer if Internet Protocol (TCP/IP) was installed

If Internet Protocol (TCP/IP) does not appear, follow these steps:
Click Start, and then click Search.
In the Search Companion pane, click More advanced options.
Click to select the following three check boxes:
Search system folders
Search hidden files and folders
Search subfolders
In the All or part of the file name box, type nettcpip.inf, and then click Search.
In the results pane, right-click Nettcpip.inf, and then click Install.
Restart the computer.

Please download Malwarebytes' Anti-Malware from one of these sites:

MalwareBytes1

MalwareBytes2

1. Double Click mbam-setup.exe to install the application.
2. Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
3. If an update is found, it will download and install the latest version.
4. Once the program has loaded, select "Perform Quick Scan", then click Scan. The scan may take some time to finish,so please be patient.
5. When the scan is complete, click OK, then Show Results to view the results.
6. Make sure that everything found is checked, and click Remove Selected.
7. When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediately.
8. The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
9. Copy&Paste the entire report in your next reply.


Please download and install the latest version of HijackThis v2.0.2:


Download the "HijackThis" Installer from this link:
Hijack This


1. Save " HJTInstall.exe" to your desktop.
2. Double click on HJTInstall.exe to run the program.
3. By default it will install to C:\Program Files\Trend Micro\HijackThis.
4. Accept the license agreement by clicking the "I Accept" button.
5.Click on the "Do a system scan and save a log file" button. It will scan and then ask you to save the log.
6. Click "Save log" to save the log file and then the log will open in Notepad.
7. Click on "Edit > Select All" then click on "Edit > Copy" to copy the entire contents of the log.
8. Paste the log in your next reply.
9. Do NOT have HijackThis fix anything yet! Most of what it finds will be harmless or even required.

If you have trouble installing or running MalwareBytes or Hijack This do the following:

If you got them downloaded rename the setup file then try installing them again.

Right click the mbam-setup.exe file> click rename> rename it something.exe then try to run it. If it installed but will not run navigate to this folder:

C:\Programs Files\Malwarebytes' AntiMalware

Rename the mbam.exe file then try to run it again, if still no luck rename all the .exe files in the MAlwarebytes' Anti-Malware folder and try to run it again.

For Hijack This rename the Hijack This.exe file to something else and try installing it again.


Report •

#2
November 19, 2008 at 16:03:15

ok did the first part in cmd..didnt work going unto the second

oK THE second one didnt work either this is the link that lead me to pm you cause for me, i think, it was antivirus 2009 that tried to install by itself eventhough i clicked no.
http://www.computing.net/answers/se...
going to try option three now


Report •

#3
November 19, 2008 at 16:33:36

ok did the third one...although i didnt know what to click once in connection and since i had two...i guessed...but internet is now up again (but doesnt allow me to those website again) i did panick for a while cause i had 2 internet connections to choose from...and in your steps u didnt mention to click on what...
anyway it still doesn work..I cant download your malwarebytes 1 or 2 i get block still and im sure i wont be able to upgrade them since i havent been able on none of mine. anytihng else?

Ok m yfriendemailed it tome had to add .exe to all to make it work. but as mentionned i still couldnt upgrade(thats my virus I bet) so now am running it as is...ill ask my friend if he can send me hijack this...Sddficx igot though

Newbie ARG!


Report •

Related Solutions

#4
November 19, 2008 at 19:16:03

This is the log i got after I ran malware.

Malwarebytes' Anti-Malware 1.30
Database version: 1306
Windows 5.1.2600 Service Pack 3

2008-11-19 20:26:42
mbam-log-2008-11-19 (20-26-42).txt

Scan type: Quick Scan
Objects scanned: 63259
Time elapsed: 12 minute(s), 45 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 3
Registry Keys Infected: 17
Registry Values Infected: 1
Registry Data Items Infected: 4
Folders Infected: 1
Files Infected: 54

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\ljJARjkJ.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\rwutsh.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\fccdcyVO.dll (Trojan.Vundo) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{35460667-381b-4d43-8e45-1cf213b39dca} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\fccdcyvo (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{35460667-381b-4d43-8e45-1cf213b39dca} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{60f50c1a-291f-446a-8030-03e37e3bd170} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{60f50c1a-291f-446a-8030-03e37e3bd170} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9346d04d-4791-4d87-8c81-07533711b5c6} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{9346d04d-4791-4d87-8c81-07533711b5c6} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\tdssdata (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\tdss (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\instkey (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a2587760-63ed-4ef5-b30d-a7c5b53ee597} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{78f8464d-a6f2-3f0d-a87f-a53a5f10d092} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{78f8464d-a6f2-3f0d-a87f-a53a5f10d092} (Trojan.BHO) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{35460667-381b-4d43-8e45-1cf213b39dca} (Trojan.Vundo) -> Delete on reboot.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\ljjarjkj -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\ljjarjkj -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.Agent) -> Data: c:\windows\system32\ -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.Agent) -> Data: system32\ -> Quarantined and deleted successfully.

Folders Infected:
C:\Documents and Settings\Berny\Application Data\Antivirus (Rogue.Antivirus2008) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\fccdcyVO.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\ljJARjkJ.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\JkjRAJjl.ini (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\JkjRAJjl.ini2 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\rwutsh.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\tuvULCSj.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jSCLUvut.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jSCLUvut.ini2 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\hgGvwTNg.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\hmdvcfit.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ljJDwTLC.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dqhpmi.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\efcCstRk.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\fccbXpmm.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\gscspjwn.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\huihwanw.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\iewyel.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nnnLeDtS.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\opnkHYPG.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\qoMfcDwW.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ssqOFYst.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tuvSlkjj.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wgksnz.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\anmppjgc.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Berny\Local Settings\Temp\vtUlKBQH.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\09YNGLMJ\index[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\85QF8T6Z\file[1].exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\LO4Z5DCX\CA8H0HKB (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Eliz\Local Settings\Temporary Internet Files\Content.IE5\478F47UP\CAJ2FETI (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Eliz\Local Settings\Temporary Internet Files\Content.IE5\M9S9OB8N\index[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Berny\Local Settings\Temporary Internet Files\Content.IE5\W1MBKH6Z\CAM3SP6B (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Berny\Local Settings\Temporary Internet Files\Content.IE5\W1MBKH6Z\index[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Berny\Application Data\Antivirus\antvrs.exe (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mcrh.tmp (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\_004293_.tmp.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\_004325_.tmp.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\ssqQgFWq.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tuvTjGyX.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\qoMfgGYr.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\geBuSLFw.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jkkLFVli.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\rqRJCSIb.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\Setup.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temp\pwrmgr.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temp\lwpwer.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temp\sfsrv.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\TDSSliqp.dll (Rootkit.Agent) -> Delete on reboot.
C:\WINDOWS\system32\TDSSnrsr.dll (Rootkit.Agent) -> Delete on reboot.
C:\WINDOWS\system32\TDSSoeqh.dll (Rootkit.Agent) -> Delete on reboot.
C:\WINDOWS\system32\TDSSoitu.dll (Rootkit.Agent) -> Delete on reboot.
C:\WINDOWS\system32\TDSSosvn.dll (Rootkit.Agent) -> Delete on reboot.
C:\WINDOWS\system32\TDSSsbhc.log (Trojan.TDSS) -> Delete on reboot.
C:\WINDOWS\system32\drivers\TDSSpxfe.sys (Rootkit.Agent) -> Delete on reboot.

Newbie ARG!

________________________________________
Id like ot mention that upon restart the ocmputer finally did his schedule checkdisk..which tool several hours. Upon its completion I got several messages each with a different name.exe but the message always said the same things 'c/windows/system32/rwutsh.dll is not a valid windows image." I think it asked for teh diskette....i just click ok and another one would pop up with another name.exe and the same message. dunno whatit means...gonna try to install hijack now and do the scan

Take note also taht I couldnt do when i ran it a update upgrade since like i mentionned that was my trouble. BBL


Report •

#5
November 19, 2008 at 19:22:17

Download SDFix.exe and save it to your Desktop.
Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with SDFix or remove some of its embedded files which may cause "unpredictable results".
Click on This Link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
Remember to re-enable the protection again afterwards before connecting to the Internet.

1.Double click SDFix.exe and choose Install to extract it to its own folder on the Desktop. Please then reboot your computer in Safe Mode by doing the following :
Restart your computer
After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
Instead of Windows loading as normal, a menu with options should appear;
Select the first option, to run Windows in Safe Mode, then press "Enter".
Choose your usual account.
2. Open the c:\SDFix folder and double click RunThis.cmd to start the script.
Type Y to begin the script.
It will remove the Trojan Services then make some repairs to the registry and prompt you to press any key to Reboot.
Press any Key and it will restart the PC.
3. Your system will take longer that normal to restart as the fixtool will be running and removing files.
When the desktop loads the Fixtool will complete the removal and display Finished, then press any key to end the script and load your desktop icons.
4. Finally open the SDFix folder on your desktop and copy and paste the contents of the results file Report.txt

Post the Hijack This log if possible.


Report •

#6
November 19, 2008 at 19:25:54

Here is the HIjack log...id like to mention that upon opening the explorer window I got iexplorebad image .exe and the same error message described in the last post...

_____________________________________________
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 22:21:41, on 2008-11-19
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\SYSTEM32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
C:\Program Files\Winsim\ConnectionManager\SimplyConnectionManager.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\WINDOWS\ALCWZRD.EXE
C:\Program Files\Digital Media Reader\shwiconem.exe
C:\WINDOWS\system32\hkcmd.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Windows Live\Messenger\usnsvc.exe
C:\Documents and Settings\Owner\Desktop\HiJackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.metacrawler.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.gatewaybiz.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
O2 - BHO: (no name) - {35460667-381B-4D43-8E45-1CF213B39DCA} - C:\WINDOWS\SYSTEM32\fccdcyVO.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: (no name) - {60F50C1A-291F-446A-8030-03E37E3BD170} - C:\WINDOWS\system32\ljJARjkJ.dll
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [High Definition Audio Property Page Shortcut] HDAudPropShortcut.exe
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [AlcWzrd] ALCWZRD.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [SunKistEM] C:\Program Files\Digital Media Reader\shwiconem.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb07.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - Global Startup: BigFix.lnk = C:\Program Files\BigFix\BigFix.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} (Office Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?lin...
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - https://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
O20 - AppInit_DLLs: rwutsh.dll
O20 - Winlogon Notify: fccdcyVO - C:\WINDOWS\SYSTEM32\fccdcyVO.dll
O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
O23 - Service: Gestionnaire de connexion de base de données de Simple Comptable - Sage Software - C:\Program Files\Winsim\ConnectionManager\SimplyConnectionManager.exe
O23 - Service: PrismXL - New Boundary Technologies, Inc. - C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe

--
End of file - 4756 bytes
______________________________________________Thanks for ur help jabuck

Newbie ARG!


Report •

#7
November 19, 2008 at 20:19:31

Please download ComboFix to the desktop from one of the following links:

Link1

Link 2

Link 3

Combofix is a powerful tool so follow the instructions exactly or you could damage your computer.

Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with Combofix and remove some of its embedded files which may cause "unpredictable results".
Click on This Link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

In your case to run Combofix do the following:
1. Go offline turn off your antivirus, Spyware Doctor, Ad-Aware and any other antispyware that you may have.
2. Run Combofix and save its log.
3. Restart the computer to get the antivirus running again but leave the antispyware programs off until we get the computer cleaned.
4. Post the Combofix log.


Remember to re-enable the protection again afterwards before connecting to the Internet.

Double-click combofix.exe
Follow the prompts.
(Don't click on the window while the program is running or move the mouse, it will cause your system to hang.)
Please post the log it produces.


Report •

#8
November 20, 2008 at 07:12:56

tried the sdfix..it didnt work i think...I let it run all night but all i saw was 2 lines saying something like making repairs and running processes... when i woke up xp was restarting but it hang... i never did anything else then start the sdfix in safe mode and wait...also the reason why i think it might have failed was all those error messages kept popping up on it even though i tried to close them...right now im on the internet and I got an another error message again about iexplore.exe bad image
the application or dll c;/windows/system 32/rwutsh.dll is not a valid windows image.please check this against your installation diskette. I also got dnif.exe bad image
md5file.exe bad image
csweg.exe
cghtme.exe
editreg.exe
rtsdnif.ex and maybe a few others....despitdàe that do u know if sddfix worked?
I didnt find a report.txt in the folder either...how long should this sdd fix take if I have 232 gig of which 40 isused??? cause i could try it againg this am while im gone.
Newbie ARG!

Report •

#9
November 20, 2008 at 07:54:32

ok here is the combo fix log...when the computer restarted then i also got the sdfix log...but dunno if its good or need to redo it. Lemme know whe nu have amintue and thanks for your help.BTW looks like allthose name.exe pop up windown are gone for now...

Combo log
___ComboFix 08-11-19.08 - Owner 2008-11-20 10:27:20.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.755 [GMT -5:00]
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
c:\program files\autorun.inf
c:\windows\system32\_004282_.tmp.dll
c:\windows\system32\_004283_.tmp.dll
c:\windows\system32\_004284_.tmp.dll
c:\windows\system32\_004285_.tmp.dll
c:\windows\system32\_004292_.tmp.dll
c:\windows\system32\_004294_.tmp.dll
c:\windows\system32\_004295_.tmp.dll
c:\windows\system32\_004297_.tmp.dll
c:\windows\system32\_004298_.tmp.dll
c:\windows\system32\_004301_.tmp.dll
c:\windows\system32\_004302_.tmp.dll
c:\windows\system32\_004304_.tmp.dll
c:\windows\system32\_004305_.tmp.dll
c:\windows\system32\_004306_.tmp.dll
c:\windows\system32\_004308_.tmp.dll
c:\windows\system32\_004311_.tmp.dll
c:\windows\system32\_004312_.tmp.dll
c:\windows\system32\_004316_.tmp.dll
c:\windows\system32\_004317_.tmp.dll
c:\windows\system32\_004319_.tmp.dll
c:\windows\system32\_004322_.tmp.dll
c:\windows\system32\_004324_.tmp.dll
c:\windows\system32\_004326_.tmp.dll
c:\windows\system32\_004327_.tmp.dll
c:\windows\system32\_004328_.tmp.dll
c:\windows\system32\_004331_.tmp.dll
c:\windows\system32\_004332_.tmp.dll
c:\windows\system32\_004333_.tmp.dll
c:\windows\system32\_004334_.tmp.dll
c:\windows\system32\_004335_.tmp.dll
c:\windows\system32\_004340_.tmp.dll
c:\windows\system32\_004342_.tmp.dll
c:\windows\system32\_004343_.tmp.dll
c:\windows\system32\drivers\TDSSpxfe.sys
c:\windows\system32\fccdcyVO.dll
c:\windows\system32\ieupdates.exe.tmp
c:\windows\system32\JkjRAJjl.ini
c:\windows\system32\ljJARjkJ.dll
c:\windows\system32\rwutsh.dll
c:\windows\system32\TDSScfgb.log
c:\windows\system32\TDSSfpmp.dll
c:\windows\system32\TDSSliqp.dll
c:\windows\system32\TDSSnmxh.log
c:\windows\system32\TDSSnrsr.dll
c:\windows\system32\TDSSoeqh.dll
c:\windows\system32\TDSSoitu.dll
c:\windows\system32\TDSSosvn.dll
c:\windows\system32\TDSSpaxt.dat
c:\windows\system32\TDSSsbhc.log
c:\windows\system32\vtUmLbBQ.dll
c:\windows\system32\wvUnKAqo.dll
c:\windows\Tasks\bpowvhhb.job
c:\windows\Tasks\kizaurnq.job

----- BITS: Possible infected sites -----

hxxp://www.accesspornovideo.net
hxxp://speedytorrents.net
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_TDSSSERV.SYS
-------\Legacy_TDSSSERV.SYS


((((((((((((((((((((((((( Files Created from 2008-10-20 to 2008-11-20 )))))))))))))))))))))))))))))))
.

2008-11-19 22:34 . 2008-11-19 22:34 <DIR> d-------- c:\windows\ERUNT
2008-11-19 22:29 . 2008-11-06 02:03 <DIR> d-------- C:\SDFix
2008-11-19 19:46 . 2008-11-19 19:46 <DIR> d-------- c:\documents and settings\Owner\Application Data\Malwarebytes
2008-11-19 19:40 . 2008-11-19 19:46 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware
2008-11-19 19:40 . 2008-11-19 19:40 <DIR> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2008-11-19 19:40 . 2008-10-22 16:10 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2008-11-19 19:40 . 2008-10-22 16:10 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2008-11-19 18:06 . 2008-11-19 18:08 16,384 --a------ c:\windows\DCEBoot.exe
2008-11-18 22:28 . 2008-11-18 22:28 0 --a------ C:\SDFix.exe
2008-11-18 20:08 . 2008-11-18 20:08 <DIR> d-------- c:\documents and settings\All Users\Application Data\sentinel
2008-11-18 18:51 . 2008-11-18 18:51 <DIR> d-------- C:\kaspersky
2008-11-18 18:47 . 2008-11-18 18:47 <DIR> d-------- C:\kasperky
2008-11-18 17:18 . 2008-11-18 17:25 <DIR> d-------- c:\program files\RegistryFix6
2008-11-18 16:31 . 2008-11-18 17:18 <DIR> d-------- c:\program files\RegistryFix7
2008-11-18 13:50 . 2008-11-18 14:49 <DIR> d--h----- C:\$AVG8.VAULT$
2008-11-18 13:23 . 2008-11-18 13:23 <DIR> d-------- c:\program files\AVG
2008-11-17 16:29 . 2008-11-17 16:29 <DIR> d-------- c:\program files\Western Digital Technologies
2008-11-17 16:17 . 2008-11-17 16:17 <DIR> d-------- c:\program files\Belarc
2008-11-17 16:17 . 2008-02-27 12:49 3,840 --a------ c:\windows\system32\drivers\BANTExt.sys
2008-11-17 12:23 . 2008-11-17 12:23 <DIR> d-------- c:\windows\system32\scripting
2008-11-17 12:23 . 2008-11-17 12:23 <DIR> d-------- c:\windows\system32\en
2008-11-17 12:23 . 2008-11-17 12:23 <DIR> d-------- c:\windows\system32\bits
2008-11-17 12:23 . 2008-11-17 12:23 <DIR> d-------- c:\windows\l2schemas
2008-11-17 12:22 . 2008-11-17 12:23 <DIR> d-------- c:\windows\ServicePackFiles
2008-11-17 12:17 . 2008-11-17 14:29 <DIR> d-------- c:\windows\EHome
2008-11-16 19:24 . 2008-11-19 19:15 521 --a------ C:\hpfr3320.xml
2008-11-13 19:08 . 2008-11-13 19:08 <DIR> d-------- c:\documents and settings\Eliz\Application Data\FloodLightGames
2008-11-13 19:01 . 2008-11-13 19:01 <DIR> d-------- c:\documents and settings\All Users\Application Data\Trymedia
2008-11-13 19:00 . 2008-11-13 19:00 <DIR> d-------- c:\program files\PopCap Games
2008-11-13 18:50 . 2008-11-13 19:10 16 --a------ c:\windows\popcinfo.dat
2008-11-13 18:11 . 2008-11-13 18:11 <DIR> d-------- c:\documents and settings\Owner\Application Data\FloodLightGames
2008-11-13 18:11 . 2008-11-13 18:11 <DIR> d-------- c:\documents and settings\All Users\Application Data\FloodLightGames
2008-11-13 17:12 . 2008-11-13 17:15 23 --a------ c:\windows\settings.ini
2008-11-12 20:14 . 2008-10-24 06:21 455,296 -----c--- c:\windows\system32\dllcache\mrxsmb.sys
2008-11-04 12:22 . 2008-11-04 12:22 <DIR> d-------- c:\program files\Music NFO Builder
2008-11-03 10:02 . 2008-11-03 10:02 <DIR> d-------- c:\program files\MSECache
2008-10-24 11:37 . 2008-10-15 11:34 337,408 -----c--- c:\windows\system32\dllcache\netapi32.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-11-19 19:04 --------- d---a-w c:\documents and settings\All Users\Application Data\TEMP
2008-11-19 19:03 --------- d-----w c:\program files\SpywareBlaster
2008-11-19 03:52 --------- d--h--w c:\program files\InstallShield Installation Information
2008-11-19 02:56 --------- d-----w c:\documents and settings\Owner\Application Data\uTorrent
2008-11-18 23:49 --------- d-----w c:\documents and settings\All Users\Application Data\avg8
2008-11-02 20:18 --------- d-----w c:\program files\Spybot - Search & Destroy
2008-10-24 11:21 455,296 ----a-w c:\windows\system32\drivers\mrxsmb.sys
2008-10-12 15:28 --------- d-----w c:\documents and settings\Eliz\Application Data\iWin
2008-10-12 14:31 --------- d-----w c:\documents and settings\Owner\Application Data\iWin
2008-10-12 14:27 --------- d-----w c:\program files\ReflexiveArcade
2008-10-11 19:25 --------- d-----w c:\program files\Tests de QI et Mémoire
2008-10-05 21:32 --------- d-----w c:\program files\Avery Wizard
2008-09-21 18:39 --------- d-----w c:\documents and settings\All Users\Application Data\PC Drivers HeadQuarters
2008-09-21 18:13 --------- d-----w c:\program files\Common Files\Ahead
2008-09-21 18:13 --------- d-----w c:\program files\Ahead
2008-09-21 18:09 --------- d-----w c:\program files\QuickTime
2008-09-21 17:51 --------- d-----w c:\program files\Nero StartSmart
2008-09-21 17:51 --------- d-----w c:\program files\Common Files\Lib
2008-09-21 17:51 --------- d-----w c:\program files\Common Files\DSFilters
2008-09-21 17:51 --------- d-----w c:\program files\Common Files\AudioPlugins
2008-09-15 13:47 37,027 ----a-w c:\windows\atmoUn.exe
2008-03-04 22:35 20,910,814 ----a-w c:\documents and settings\Owner\3320-enu-win2k_xp.exe
2003-07-12 00:04 46,592 ----a-w c:\program files\KeyGen.exe
2003-05-30 14:59 72,701 ----a-w c:\program files\setup.cfg
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"msnmsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2007-10-18 5724184]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2004-07-01 155648]
"SunKistEM"="c:\program files\Digital Media Reader\shwiconem.exe" [2004-03-12 135168]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2008-06-12 34672]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"HPDJ Taskbar Utility"="c:\windows\system32\spool\drivers\w32x86\3\hpztsb07.exe" [2003-05-14 188416]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2004-07-01 118784]
"SDFix"="c:\docume~1\Owner\Desktop\SDFix\RunThis.bat" [2008-11-06 964661]
"High Definition Audio Property Page Shortcut"="HDAudPropShortcut.exe" [2004-03-18 c:\windows\system32\Hdaudpropshortcut.exe]
"SoundMan"="SOUNDMAN.EXE" [2004-08-24 c:\windows\SOUNDMAN.EXE]
"AlcWzrd"="ALCWZRD.EXE" [2004-08-24 c:\windows\ALCWZRD.EXE]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
BigFix.lnk - c:\program files\BigFix\BigFix.exe [2004-10-14 1742384]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=rwutsh.dll

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\winsim\\ConnectionManager\\MySqlBinary\\5.0.38\\mysql\\mysqld-nt.exe"=
"c:\\Program Files\\winsim\\ConnectionManager\\SimplyConnectionManager.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Documents and Settings\\All Users\\Documents\\Kyodai Mahjongg 2006\\kmj.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=

R2 FastPara;FastPara;c:\windows\system32\drivers\FastPara.sys [2008-03-04 33696]
R2 Gestionnaire de connexion de base de données de Simple Comptable;Gestionnaire de connexion de base de données de Simple Comptable;c:\program files\Winsim\ConnectionManager\SimplyConnectionManager.exe [2008-03-13 16168]
.
- - - - ORPHANS REMOVED - - - -

BHO-{35460667-381B-4D43-8E45-1CF213B39DCA} - c:\windows\SYSTEM32\fccdcyVO.dll
BHO-{60F50C1A-291F-446A-8030-03E37E3BD170} - c:\windows\system32\ljJARjkJ.dll
HKLM-Run-Malwarebytes Anti-Malware (reboot) - c:\program files\Malwarebytes' Anti-Malware\mbam.exe
ShellExecuteHooks-{35460667-381B-4D43-8E45-1CF213B39DCA} - c:\windows\SYSTEM32\fccdcyVO.dll

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-11-20 10:31:49
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

PROCESS: c:\windows\explorer.exe
-> ?:\windows\system32\SETUPAPI.dll
-> ?:\windows\system32\SETUPAPI.dll
-> ?:\windows\System32\msvcp60.dll
.
r Running Proce
.
c:\program files\Lavasoft\Ad-Aware 2007\aawservice.exe
c:\program files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
c:\windows\system32\wscntfy.exe
c:\windows\system32\ntvdm.exe
.
**************************************************************************
.
Completion time: 2008-11-20 10:36:19 - machine was rebooted
ComboFix-quarantined-files.txt 2008-11-20 15:36:00

Pre-Run: 207,487,168,512 bytes free
Post-Run: 209,069,498,368 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINNT="Microsoft Windows XP Home Edition" /fastdetect

215 --- E O F --- 2008-11-18 03:08:00
________________________________________


SDFIX LOG
_______________________________________

[b]Checking Files [/b]:

No Trojan Files Found


Removing Temp Files

[b]ADS Check [/b]:


[b]Final Check [/b]:

catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-11-20 10:38:50
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden services & system hive ...

scanning hidden registry entries ...

scanning hidden files ...

scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0


[b]Remaining Services [/b]:


Authorized Application Key Export:

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\Messenger\\msmsgs.exe"="C:\\Program Files\\Messenger\\msmsgs.exe:*:Enabled:Windows Messenger"
"C:\\Program Files\\winsim\\ConnectionManager\\MySqlBinary\\5.0.38\\mysql\\mysqld-nt.exe"="C:\\Program Files\\winsim\\ConnectionManager\\MySqlBinary\\5.0.38\\mysql\\mysqld-nt.exe:*:Enabled:mysqld-nt.exe 5.0.38"
"C:\\Program Files\\winsim\\ConnectionManager\\SimplyConnectionManager.exe"="C:\\Program Files\\winsim\\ConnectionManager\\SimplyConnectionManager.exe:*:Enabled:SimplyConnectionManager.exe"
"C:\\Program Files\\uTorrent\\uTorrent.exe"="C:\\Program Files\\uTorrent\\uTorrent.exe:*:Enabled:µTorrent"
"C:\\Documents and Settings\\All Users\\Documents\\Kyodai Mahjongg 2006\\kmj.exe"="C:\\Documents and Settings\\All Users\\Documents\\Kyodai Mahjongg 2006\\kmj.exe:*:Enabled:Kyodai Mahjongg"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"="C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger"
"C:\\Program Files\\Windows Live\\Messenger\\livecall.exe"="C:\\Program Files\\Windows Live\\Messenger\\livecall.exe:*:Enabled:Windows Live Messenger (Phone)"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"="C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger"
"C:\\Program Files\\Windows Live\\Messenger\\livecall.exe"="C:\\Program Files\\Windows Live\\Messenger\\livecall.exe:*:Enabled:Windows Live Messenger (Phone)"

[b]Remaining Files [/b]:


File Backups: - C:\DOCUME~1\Owner\Desktop\SDFix\backups\backups.zip

[b]Files with Hidden Attributes [/b]:

Mon 15 Sep 2008 1,562,960 A.SHR --- "C:\Program Files\Spybot - Search & Destroy\SDHelper.dll"
Mon 28 Jan 2008 1,404,240 A.SHR --- "C:\Program Files\Spybot - Search & Destroy\SDUpdate.exe"
Mon 28 Jan 2008 5,146,448 A.SHR --- "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe"
Tue 16 Sep 2008 1,833,296 A.SHR --- "C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe"
Sat 7 Jun 2003 77,824 A..H. --- "C:\Bundle\PictureIt\PIP\LAUNCHER.EXE"
Sun 16 Mar 2008 0 A.SH. --- "C:\Documents and Settings\All Users\DRM\Cache\Indiv01.tmp"
Tue 22 Jan 2008 227,328 A..H. --- "C:\Documents and Settings\Owner\My Documents\eped897\~WRL0234.tmp"
Tue 22 Jan 2008 199,168 A..H. --- "C:\Documents and Settings\Owner\My Documents\eped897\~WRL3867.tmp"

[b]Finished![/b]

Newbie ARG!


Report •

#10
November 20, 2008 at 07:56:43

ok all seems to be working good. which antivirus hsould I reinstall avg free, kapersky, or panda?...obvisouly i did many things wrong on this computer so if u could tell me which software would be better for me...I norammmly had avg free, spware doctor, ad-aware and spybot

Newbie ARG!


Report •

#11
November 20, 2008 at 16:18:48

Open Notepad and copy/paste everything between the X"s into it and make sure the first word (such as KILLALL, Or File, Registry etc.) is at the very top of the page.
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Registry::
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=-

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Go to File on the top bar and choose" Save As", Change the "Save As Type" to All Files, Name it CFScript.txt then save it to your desktop.
Then drag/drop the CFScript.txt onto ComboFix.exe (the red symbol on your desktop) if combofix does not auto start click "run".

Empty the restore folder. Go to start>control panel>system>system restore tab>check the box beside "turn off system restore>apply (takes a minute)>ok. Go back and uncheck the box to turn system restore back on>apply>ok.


Download ATF Cleaner from this link:
http://www.majorgeeks.com/ATF_Cleaner_d4949.html
Run ATF-Cleaner
Double-click ATF-Cleaner.exe to run the program.
Under Main choose: Select All
Click the Empty Selected button.

Please run Esets online scanner from this link:

ESET

1. Note: You will need to use Internet explorer for this scan
2. Tick the box next to YES, I accept the Terms of Use.
3. Click Start
4. When asked, allow the activex control to install
5. Click Start
6. Make sure that the option Remove found threats is unticked ( Iwant to see what is found first), and the option Scan unwanted applications is checked
7. Click Scan
8. Wait for the scan to finish
9. Use notepad to open the logfile located at C:\Program Files\EsetOnlineScanner\log.txt
10. Copy and paste that log in your next reply.

I use AVG Free for an antivirus and zone alarm free firewall.

You should consider adding "Spywareblaster" to your arsenol of antispyware tools, you can download it from this link Spywareblaster

Just download it,install it, and update it. Its free and runs in the background, so you don't actually run it, and re-writes malicious script before it can install on your computer. Look for updates weekly as there is no auto-update on the free version.


Report •

#12
November 22, 2008 at 10:15:01

Ok sorry if it took long but i was away. I did all u mentionned here is the log for eset
_____________________________________________
# version=4
# OnlineScanner.ocx=1.0.0.56
# OnlineScannerDLLA.dll=1, 0, 0, 51
# OnlineScannerDLLW.dll=1, 0, 0, 51
# OnlineScannerUninstaller.exe=1, 0, 0, 49
# vers_standard_module=3632 (20081121)
# vers_arch_module=1.064 (20080214)
# vers_adv_heur_module=1.066 (20070917)
# EOSSerial=0a782cfa3d646942810f194415f38d9e
# end=finished
# remove_checked=false
# unwanted_checked=true
# utc_time=2008-11-22 05:54:28
# local_time=2008-11-22 12:54:28 (-0500, Eastern Standard Time)
# country="United States"
# osver=5.1.2600 NT Service Pack 3
# scanned=218072
# found=0
# scan_time=2117
______________________________________________
It mentionned on the web apge that there were no virus.
My question now is: how did i get so infected and by what so that i had to do all those steps ( which frankly i wonder if I can remember them)? I got an avg runnin and spyware doctor free and spybot form time to time and even sometimes i used atf...
If a problem liek that occurs again should i redo all those steps or should i better wait and ask in case the problem is different?
THANNKS A LOT JABUCk cause u were the only one in three different website that i used to use that finally helped me solve the problem...this website is now defenatly my fav for helping me out with computers problem!!

Newbie ARG!


Report •

#13
November 23, 2008 at 08:09:01

You computer appears to be clean.

There is a 90% chance that the infection came from everywhere this was downloaded:

c:\program files\KeyGen.exe

Navigate to and delete this folder:

C:\SDFix

Empty the recycle bin.

Go to start> run> combofix /u (note the space after combofix) then press enter> run. This will uninstall combofix so give the uninstaller a minute to run.

Go to start> control panel> add/remove programs and uninstall these programs:

Hijack This

Malwarebytes

Eset

You should keep AFT Cleaner and run it weekly.

You would be better off uninstalling Spybot and Ad-Aware and use Spywareblaster.


You should consider adding "Spywareblaster" to your arsenol of antispyware tools, you can download it from this link Spywareblaster

Just download it,install it, and update it. Its free and runs in the background, so you don't actually run it, and re-writes malicious script before it can install on your computer. Look for updates weekly as there is no auto-update on the free version.

How is the computer operating?


Report •

#14
November 26, 2008 at 07:22:19

well i did all u mention but malware wouldnt remove so i deleted the file manually. Hope thats allright. computer allows me to surf on all web pages. removed ad-aware and kept spyware blaster and avg as you mentionned.

got a question though....in my task manager processes i now ahve over 40 running... im wondereing if thats why the computer is still sluggish...do u have any ideas of how to remove some of them permanently?

Newbie ARG!


Report •


Ask Question