Is this vundo? winlogon.exe issue

Hp media / Pavillian a1247c
November 3, 2009 at 15:36:44
Specs: Windows XP SP3, 3800 AMD Athalon 64 / 1GB
I think I have the vundo that attaches itself to the winlogon.exe process, but by the time it loads, the cpu usage is so overwhelmed i cannot open anything. It takes several minutes to open task manager or anything. I downloaded the sysinternals mgr (on another computer and transfered it) and while it opened, the menus were non-existant. I cannot install any software as there isnt enough resources available.

This is in safe mode, as booting it in regular mode it does not load anything, just gets to the wall paper and stops.

Please help.....?

See More: Is this vundo? winlogon.exe issue

Report •

November 3, 2009 at 20:04:04
From an uninfected computer download the following to a jump drive or cd and run it on the infected computer:

Please save this file to your desktop.


Please double click on the Win32kDiag file and post the log it produces. This log might be quite lengthy and may take more than one post to get all of it posted.

Report •

November 5, 2009 at 15:19:57
The log comes up blank, except for the header, if you will, and finished! press any key...

Ive run it from the command prompt with the -f -r, clicking the exe...

I did get the procept to work in safe mode, and once I suspend the winlogon.exe process the computer starts acting normal.

Report •

November 5, 2009 at 15:55:27
Please download ComboFix to the desktop from one of the following links:


Link 2

Link 3

Rename the setup file, combofix.exe, before you download it. To do that once the "enter name of file to save to" box appears as the download begins in the filename box rename combofix.exe to to Combo-Fix> click save.
Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved and renamed following this process directly to your desktop.
If you are using Firefox, make sure that your download settings are as follows:
Tools->Options->Main tab
Set to "Always ask me where to Save the files".

Please do not rename Combofix to other names, but only to the one indicated.
Close any open browsers.
Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
Click on This Link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
Close any open browsers.
WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
Double click on Combo-Fix.exe & follow the prompts.
Install the recovery console when asked.
When finished, it will produce a report for you.
Please post the "C:\Combo-Fix.txt" .
Note: Do not mouseclick combo-fix's window while it's running. That may cause it to hang.

Note: ComboFix may reset a number of Internet Explorer's settings, including making it the default browser.
Note: Combofix prevents autorun of ALL CDs, floppies and USB devices to assist with malware removal & increase security.

Please do not install any new programs or update anything unless told to do so while we are fixing your problem.

Report •

Related Solutions

November 5, 2009 at 16:40:34
ComboFix log...

ComboFix 09-11-05.01 - HP_Administrator 11/05/2009 19:09:11.2.1 - NTFSx86 NETWORK
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.958.462 [GMT -5:00]
Running from: C:\Documents and Settings\HP_Administrator\Desktop\combofix.exe

((((((((((((((((((((((((( Files Created from 2009-10-06 to 2009-11-06 )))))))))))))))))))))))))))))))

2009-11-05 14:45:34 . 2009-11-05 14:45:34 4045527 ----a-w- C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
2009-11-05 14:45:08 . 2009-09-10 19:53:50 19160 ----a-w- C:\WINDOWS\system32\drivers\mbam.sys
2009-11-05 14:45:06 . 2009-09-10 19:54:06 38224 ----a-w- C:\WINDOWS\system32\drivers\mbamswissarmy.sys
2009-11-05 14:45:05 . 2009-11-05 14:45:38 0 d-----w- C:\Program Files\Malwarebytes' Anti-Malware
2009-11-05 00:41:31 . 2009-11-05 01:08:57 0 d-----w- C:\Combo-Fix27629C
2009-11-05 00:40:54 . 2009-11-05 00:41:05 0 d-----w- C:\Combo-Fix
2009-10-14 18:18:39 . 2009-10-14 18:19:58 0 d-----w- C:\Documents and Settings\All Users\Application Data\HotbarSA
2009-10-13 19:14:20 . 2001-08-17 17:48:00 12160 ----a-w- C:\WINDOWS\system32\drivers\mouhid.sys
2009-10-13 19:14:20 . 2001-08-17 17:48:00 12160 ----a-w- C:\WINDOWS\system32\dllcache\mouhid.sys
2009-10-13 19:14:11 . 2008-04-13 18:45:28 10368 ----a-w- C:\WINDOWS\system32\drivers\hidusb.sys
2009-10-13 19:14:11 . 2008-04-13 18:45:28 10368 ----a-w- C:\WINDOWS\system32\dllcache\hidusb.sys
2009-10-07 18:27:26 . 2009-10-01 14:29:14 195440 ------w- C:\WINDOWS\system32\MpSigStub.exe

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
2009-11-05 13:56:34 . 2009-11-05 13:56:33 4964 ----a-w- C:\WINDOWS\system32\PerfStringBackup.TMP
2009-10-02 00:53:56 . 2009-10-02 00:53:56 45064 ---ha-w- C:\WINDOWS\system32\mlfcache.dat
2009-10-02 00:51:28 . 2007-02-20 02:03:15 0 d-----w- C:\Documents and Settings\HP_Administrator\Application Data\Apple Computer
2009-10-02 00:43:48 . 2007-02-20 02:02:03 0 d-----w- C:\Program Files\Apple Software Update
2009-10-02 00:37:57 . 2009-10-02 00:37:14 0 d-----w- C:\Program Files\iTunes
2009-10-02 00:37:57 . 2009-10-02 00:37:14 0 d-----w- C:\Documents and Settings\All Users\Application Data\{755AC846-7372-4AC8-8550-C52491DAA8BD}
2009-10-02 00:37:18 . 2009-10-02 00:37:18 0 d-----w- C:\Program Files\iPod
2009-10-02 00:37:17 . 2007-07-15 22:28:00 0 d-----w- C:\Program Files\Common Files\Apple
2009-10-02 00:35:42 . 2009-10-02 00:35:15 0 d-----w- C:\Program Files\QuickTime
2009-10-02 00:31:13 . 2009-10-02 00:31:13 79144 ----a-w- C:\Documents and Settings\All Users\Application Data\Apple Computer\Installer Cache\iTunes\SetupAdmin.exe
2009-10-02 00:29:51 . 2009-10-02 00:29:39 0 d-----w- C:\Program Files\Safari
2009-10-02 00:28:26 . 2009-10-02 00:28:26 0 d-----w- C:\Program Files\Bonjour
2009-09-27 20:15:36 . 2009-04-12 18:55:36 0 d-----w- C:\Program Files\SUPERAntiSpyware
2009-09-27 19:53:55 . 2005-11-15 20:41:45 0 d-----w- C:\Program Files\Java
2009-09-27 19:53:15 . 2009-09-27 19:53:15 152576 ----a-w- C:\Documents and Settings\HP_Administrator\Application Data\Sun\Java\jre1.6.0_15\lzma.dll
2009-09-27 13:52:36 . 2009-04-12 18:55:50 117760 ----a-w- C:\Documents and Settings\HP_Administrator\Application Data\\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2009-09-23 20:57:30 . 2009-05-22 02:35:05 0 d-----w- C:\Program Files\World of Warcraft
2009-09-18 21:04:13 . 2009-03-06 21:41:51 0 d-----w- C:\Program Files\Winferno
2009-09-10 11:25:31 . 2009-03-20 15:41:15 0 d-----w- C:\Program Files\Microsoft Silverlight
2009-09-09 01:46:17 . 2008-03-28 23:56:56 488968 ----a-w- C:\Documents and Settings\HP_Administrator\Application Data\Real\Update\setup\setup.exe
2009-09-04 12:10:06 . 2009-09-04 12:10:06 339968 ----a-w- C:\WINDOWS\system32\pythoncom25.dll
2009-09-04 12:10:06 . 2009-09-04 12:10:06 2117632 ----a-w- C:\WINDOWS\system32\python25.dll
2009-09-04 12:10:06 . 2009-09-04 12:10:06 114688 ----a-w- C:\WINDOWS\system32\pywintypes25.dll
2009-08-28 23:42:52 . 2009-10-02 00:33:24 2065696 ----a-w- C:\WINDOWS\system32\usbaaplrc.dll
2009-08-28 23:42:52 . 2008-08-29 18:42:28 40448 ----a-w- C:\WINDOWS\system32\drivers\usbaapl.sys
2009-08-15 10:28:52 . 2005-11-15 21:14:00 56888 -c--a-w- C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-03-16 18:35:46 . 2009-03-16 18:35:46 525128 -c--a-w- C:\Program Files\DXSETUP.exe
2009-03-16 18:35:34 . 2009-03-16 18:35:34 94024 -c--a-w- C:\Program Files\DSETUP.dll
2007-01-10 21:55:09 . 2007-01-10 21:55:09 251 -c--a-w- C:\Program Files\wt3d.ini

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
*Note* empty entries & legit default entries are not shown

"MsnMsgr"="C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" [2009-02-06 22:51:28 3885408]
"SUPERAntiSpyware"="C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2009-09-24 22:26:18 1998576]

"HPBootOp"="C:\Program Files\Hewlett-Packard\HP Boot Optimizer\HPBootOp.exe" [2005-09-21 10:41:10 1605740]
"KBD"="C:\HP\KBD\KBD.EXE" [2005-02-02 21:44:24 61440]
"Windows Defender"="C:\Program Files\Windows Defender\MSASCui.exe" [2006-11-03 23:20:12 866584]
"vptray"="C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe" [2003-04-26 05:18:18 90112]
"Malwarebytes Anti-Malware (reboot)"="C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" [2009-09-10 19:53:56 1312080]
"TkBellExe"="C:\Program Files\Common Files\Real\Update_OB\realsched.exe" [2005-11-15 21:14:40 180269]
"SunJavaUpdateSched"="C:\Program Files\Java\jre6\bin\jusched.exe" [2009-07-25 09:23:12 149280]
"QuickTime Task"="C:\Program Files\QuickTime\QTTask.exe" [2009-09-05 05:54:42 417792]
"iTunesHelper"="C:\Program Files\iTunes\iTunesHelper.exe" [2009-09-21 20:36:12 305440]

C:\Documents and Settings\Default User\Start Menu\Programs\Startup\
Pin.lnk - C:\hp\bin\CLOAKER.EXE [2005-11-15 27136]

"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "C:\Program Files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 14:13:36 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-24 22:26:21 548352 ----a-w- C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\WgaLogon]



[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^ WinCinema Manager.lnk]
backup=C:\WINDOWS\pss\ WinCinema Manager.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
backup=C:\WINDOWS\pss\HP Digital Imaging Monitor.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Status Monitor.lnk]
backup=C:\WINDOWS\pss\Status Monitor.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Updates from HP.lnk]
backup=C:\WINDOWS\pss\Updates from HP.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\security center]

"EnableFirewall"= 0 (0x0)

"C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"C:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"C:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"C:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"C:\\Program Files\\HP\\Digital Imaging\\bin\\hpqCopy.exe"=
"C:\\Program Files\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=
"C:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"C:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"C:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"C:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"C:\\Program Files\\DISC\\DISCover.exe"=
"C:\\Program Files\\DISC\\DiscStreamHub.exe"=
"C:\\Program Files\\DISC\\myFTP.exe"=
"C:\\Program Files\\Updates from HP\\9972322\\Program\\Updates from HP.exe"=
"C:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"C:\\Program Files\\Common Files\\AOL\\ACS\\AOLDial.exe"=
"C:\\Program Files\\Common Files\\AOL\\ACS\\AOLacsd.exe"=
"C:\\Program Files\\America Online 9.0\\waol.exe"=
"C:\\Program Files\\Common Files\\AOL\\TopSpeed\\2.0\\aoltsmon.exe"=
"C:\\Program Files\\Common Files\\AOL\\TopSpeed\\2.0\\aoltpspd.exe"=
"C:\\Program Files\\Common Files\\AOL\\1140528990\\EE\\AOLServiceHost.exe"=
"C:\\Program Files\\Common Files\\AOL\\System Information\\sinf.exe"=
"C:\\Program Files\\Common Files\\AolCoach\\en_en\\player\\AOLNySEV.exe"=
"C:\\Program Files\\LimeWire\\LimeWire.exe"=
"C:\\Program Files\\Common Files\\AOL\\1140528990\\EE\\aolsoftware.exe"=
"C:\\Program Files\\Messenger\\msmsgs.exe"=
"C:\\Program Files\\World of Warcraft\\BackgroundDownloader.exe"=
"C:\\Program Files\\Google\\Google Talk\\googletalk.exe"=
"C:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"C:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"C:\\Program Files\\World of Warcraft\\Launcher.exe"=
"C:\\Program Files\\World of Warcraft\\WoW-"=
"C:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"C:\\Program Files\\iTunes\\iTunes.exe"=

"3724:TCP"= 3724:TCP:Blizzard Downloader
"6112:TCP"= 6112:TCP:Blizzard Downloader
"6881:TCP"= 6881:TCP:*:Disabled:Blizzard Downloads
"6882:TCP"= 6882:TCP:*:Disabled:Blizzard Downloads
"6883:TCP"= 6883:TCP:Blizzard Downloads
"6884:TCP"= 6884:TCP:Blizzard Downloads
"26675:TCP"= 26675:TCP: Service

R2 WinDefend;Windows Defender;C:\Program Files\Windows Defender\MsMpEng.exe [11/3/2006 6:19:58 PM 13592]
S1 SASDIFSV;SASDIFSV;C:\Program Files\SUPERAntiSpyware\sasdifsv.sys [3/23/2009 1:07:26 PM 9968]
S1 SASKUTIL;SASKUTIL;C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS [3/23/2009 1:07:26 PM 74480]
S2 fssfltr;FssFltr;C:\WINDOWS\system32\drivers\fssfltr_tdi.sys [3/20/2009 10:39:46 AM 55152]
S3 fsssvc;Windows Live Family Safety;C:\Program Files\Windows Live\Family Safety\fsssvc.exe [2/6/2009 5:08:58 PM 533360]
S3 SASENUM;SASENUM;C:\Program Files\SUPERAntiSpyware\SASENUM.SYS [3/23/2009 1:07:28 PM 7408]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - MBR
*Deregistered* - mbr
Contents of the 'Scheduled Tasks' folder

2009-10-02 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job
- C:\Program Files\Apple Software Update\SoftwareUpdate.exe [2008-04-11 21:57:18 . 2008-07-30 16:34:12]

2009-09-23 C:\WINDOWS\Tasks\Disk Cleanup.job
- C:\WINDOWS\system32\cleanmgr.exe [2004-08-10 05:00:00 . 2008-04-14 00:12:14]

2009-11-05 C:\WINDOWS\Tasks\MP Scheduled Scan.job
- C:\Program Files\Windows Defender\MpCmdRun.exe [2006-11-03 23:20:06 . 2006-11-03 23:20:06]
------- Supplementary Scan -------
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = *.local
IE: &Search - ?p=ZKxdm176RSUS
IE: E&xport to Microsoft Excel - C:\PROGRA~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
Trusted Zone:
DPF: CabBuilder - hxxp://
FF - ProfilePath - C:\Documents and Settings\HP_Administrator\Application Data\Mozilla\Firefox\Profiles\qlt480sp.default\
FF - prefs.js: - hxxp://
FF - prefs.js: - Kiwee Live Search
FF - prefs.js: browser.startup.homepage - hxxp://
FF - prefs.js: keyword.URL - hxxp://
FF - plugin: C:\Program Files\Microsoft\Office Live\npOLW.dll
FF - plugin: C:\Program Files\Viewpoint\Viewpoint Experience Technology\npViewpoint.dll
FF - plugin: C:\Program Files\Windows Live\Photo Gallery\NPWLPG.dll
FF - HiddenExtension: XUL Cache: {8E698C2C-F23F-4D39-9B74-6F44964E6328} - C:\Documents and Settings\HP_Administrator\Local Settings\Application Data\{8E698C2C-F23F-4D39-9B74-6F44964E6328}
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\WINDOWS\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

Report •

November 5, 2009 at 17:07:50
LimeWire should be uninstalled as it is know to harbor spyware, at least until we get your computer clean. There is not much showing in combofix.

Please download Malwarebytes' Anti-Malware from one of these sites:



Rename the setup file, mbam-setup.exe, before you download it. To do that once the "enter name of file to save to" box appears as the download begins in the filename box rename mbam-setup.exe to tool.exe> click save.

1. Double Click tool.exe to install the application.
2. Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
3. If an update is found, it will download and install the latest version.
4. Once the program has loaded, select "Perform Quick Scan", then click Scan. The scan may take some time to finish,so please be patient.
5. When the scan is complete, click OK, then Show Results to view the results.
6. Make sure that everything found is checked, and click Remove Selected.
7. When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediately.
8. The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
9. Copy&Paste the entire report in your next reply.

Report •

November 5, 2009 at 19:36:49
Malwarebytes' Anti-Malware 1.41
Database version: 3109
Windows 5.1.2600 Service Pack 3 (Safe Mode)

11/5/2009 10:37:28 PM
mbam-log-2009-11-05 (22-37-28).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 236499
Time elapsed: 26 minute(s), 14 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 53
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\coresrv.lfgax (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\coresrv.lfgax.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hostie.bho (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hostie.bho.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\shoppingreport.hbax (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\shoppingreport.hbax.1 (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\shoppingreport.hbinfoband (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\shoppingreport.hbinfoband.1 (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\shoppingreport.iebutton (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\shoppingreport.iebutton.1 (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\shoppingreport.iebuttona (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\shoppingreport.iebuttona.1 (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\shoppingreport.rprtctrl (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\shoppingreport.rprtctrl.1 (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{8ad9ad05-36be-4e40-ba62-5422eb0d02fb} (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{aebf09e2-0c15-43c8-99bf-928c645d98a0} (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{d8560ac2-21b5-4c1a-bdd4-bd12bc83b082} (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{100eb1fd-d03e-47fd-81f3-ee91287f9465} (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{20ea9658-6bc3-4599-a87d-6371fe9295fc} (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a16ad1e9-f69a-45af-9462-b1c286708842} (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a7cddcdc-beeb-4685-a062-978f5e07ceee} (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{c9ccbb35-d123-4a31-affc-9b2933132116} (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{cdca70d8-c6a6-49ee-9bed-7429d6c477a2} (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{d136987f-e1c4-4ccc-a220-893df03ec5df} (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{e343edfc-1e6c-4cb5-aa29-e9c922641c80} (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{a7cddcdc-beeb-4685-a062-978f5e07ceee} (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6fd31ed6-7c94-4bbc-8e95-f927f4d3a949} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{100eb1fd-d03e-47fd-81f3-ee91287f9465} (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{c5428486-50a0-4a02-9d20-520b59a9f9b2} (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{c5428486-50a0-4a02-9d20-520b59a9f9b3} (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{c5428486-50a0-4a02-9d20-520b59a9f9b2} (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{c5428486-50a0-4a02-9d20-520b59a9f9b3} (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{eddbb5ee-bb64-4bfc-9dbe-e7c85941335b} (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{100eb1fd-d03e-47fd-81f3-ee91287f9465} (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\coresrv.coreservices (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\coresrv.coreservices.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbmain.commband (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbmain.commband.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbr.hbmain (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbr.hbmain.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hostol.mailanim (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hostol.mailanim.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hostol.webmailsend (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hostol.webmailsend.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\srv.coreservices (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\srv.coreservices.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\toolbar.htmlmenuui (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\toolbar.htmlmenuui.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\toolbar.toolbarctl (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\toolbar.toolbarctl.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\ShoppingReport (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ShoppingReport (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\ShoppingReport (Adware.ShopperReports) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Extensions\CmdMapping\{c5428486-50a0-4a02-9d20-520b59a9f9b2} (Adware.ShopperReports) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Extensions\CmdMapping\{c5428486-50a0-4a02-9d20-520b59a9f9b3} (Adware.ShopperReports) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\System Volume Information\_restore{106CF321-99A3-4E3A-9103-1BD027606A99}\RP6\A0003527.dll (Adware.SmartShopper) -> Quarantined and deleted successfully.

Report •

November 5, 2009 at 19:59:17
Looking better.

Navigate to and delete this folder if found:

C:\Documents and Settings\All Users\Application Data\HotbarSA

Run an online scan with Kaspersky from the following link:
Kaspersky Online Scanner

Note: If you have used this particular scanner before, you MAY HAVE TO UNINSTALL the program through Add/Remove Programs before downloading the new ActiveX component

1. Click Accept, when prompted to download and install the program files and database of malware definitions.
2. Click Run at the Security prompt.
The program will then begin downloading and installing and will also update the database.
Please be patient as this can take several minutes.
3.Once the update is complete, click on My Computer under the green Scan bar to the left to start the scan.
4. Once the scan is complete, it will display if your system has been infected. It does not provide an option to clean/disinfect. We only require a report from it.
5. Do NOT be alarmed by what you see in the report. Many of the finds have likely been quarantined.
6. Click View scan report at the bottom.
7. Click the Save Report As... button.
8. Click the Save as Text button to save the file to your desktop so that you may post it in your next reply.

To optimize scanning time and produce a more sensible report for review:
Close any open programs.
Turn off the real-time scanner of all antivirus or antispyware programs while performing the online scan.
Note for Internet Explorer 7 users: If at any time you have trouble viewing the accept button of the license, click on the Zoom tool located at the bottom right of the IE window and set the zoom to 75%. Once the license is accepted, reset to 100%.

Report •

November 8, 2009 at 13:50:05
"The current Kaspersky Online Scanner is unavailable - we apologize for the inconvenience......" Has been for atleast a week or so..

But it did get past the wall paper when booting in regular mode. Was still a little slow, but it started.

I did remove the HotBar folder as suggested.

Report •

November 8, 2009 at 16:33:14
I did get the procept to work in safe mode, and once I suspend the winlogon.exe process the computer starts acting normal.

How did you suspend this and is it still suspended?

Report •

November 9, 2009 at 15:01:40
You right click on the process and choose suspend. You cannot log out with it suspended, so you have to resume the process before logging out.

I scanned it with Housecall from Trendmicro and it was clean, nothing found.

Report •

November 9, 2009 at 15:27:19
See if Win32kdiag in response #1 will run. If so post its log.

Report •

November 10, 2009 at 15:23:32
Running from: C:\Documents and Settings\HP_Administrator\Desktop\Win32kDiag.exe

Log file at : C:\Win32kDiag.txt

WARNING: Could not get backup privileges!

Searching 'C:\WINDOWS'...

Cannot access: C:\WINDOWS\Minidump\Mini062309-01.dmp

[1] 2009-06-23 01:20:31 90112 C:\WINDOWS\Minidump\Mini062309-01.dmp ()

Cannot access: C:\WINDOWS\Minidump\Mini112606-01.dmp

[1] 2006-11-26 16:35:29 94208 C:\WINDOWS\Minidump\Mini112606-01.dmp ()

Cannot access: C:\WINDOWS\system32\config\default.bak

[1] 2009-09-26 21:48:40 524288 C:\WINDOWS\system32\config\default.bak ()

Cannot access: C:\WINDOWS\system32\config\SAM.bak

[1] 2009-09-26 21:48:40 28672 C:\WINDOWS\system32\config\SAM.bak ()

Cannot access: C:\WINDOWS\system32\config\SECURITY.bak

[1] 2009-09-26 21:48:40 262144 C:\WINDOWS\system32\config\SECURITY.bak ()

Cannot access: C:\WINDOWS\system32\config\software.bak

[1] 2009-09-26 21:48:40 38797312 C:\WINDOWS\system32\config\software.bak ()

Cannot access: C:\WINDOWS\system32\config\system.bak

[1] 2005-11-15 17:05:11 4247552 C:\WINDOWS\repair\system.bak ()

[1] 2009-09-26 21:48:40 8388608 C:\WINDOWS\system32\config\system.bak ()

Cannot access: C:\WINDOWS\system32\hpzjrd01.dll

[1] 2006-04-10 08:11:45 139264 C:\WINDOWS\system32\hpzjrd01.dll ()

Cannot access: C:\WINDOWS\system32\tmber8.DLL

[1] 2004-08-17 19:00:00 65536 C:\WINDOWS\system32\tmber8.DLL ()

Cannot access: C:\WINDOWS\system32\wbem\AutoRecover\1EBE968EB7AF815A32641E6185350A9E.mof

[1] 2009-11-08 23:28:41 107496 C:\WINDOWS\system32\wbem\AutoRecover\1EBE968EB7AF815A32641E6185350A9E.mof ()

Cannot access: C:\WINDOWS\system32\wbem\AutoRecover\23BDE61F1F4FACE17E9B0C01F2A1FD9B.mof

[1] 2009-09-27 14:54:37 32872 C:\WINDOWS\system32\wbem\AutoRecover\23BDE61F1F4FACE17E9B0C01F2A1FD9B.mof ()

Cannot access: C:\WINDOWS\system32\wbem\AutoRecover\638BA04A9A5A3EC498F24410721595C0.mof

[1] 2009-04-10 21:42:16 15792 C:\WINDOWS\system32\wbem\AutoRecover\638BA04A9A5A3EC498F24410721595C0.mof ()

Cannot access: C:\WINDOWS\system32\wbem\AutoRecover\6CF93667737B93EF167943B7E338E669.mof

[1] 2009-08-15 02:23:55 1644 C:\WINDOWS\system32\wbem\AutoRecover\6CF93667737B93EF167943B7E338E669.mof ()

Cannot access: C:\WINDOWS\system32\wbem\AutoRecover\7BDE76979585395D59B5DA1D62E63C50.mof

[1] 2009-08-15 03:18:46 25566 C:\WINDOWS\system32\wbem\AutoRecover\7BDE76979585395D59B5DA1D62E63C50.mof ()

Cannot access: C:\WINDOWS\system32\wbem\AutoRecover\7E27EAAD25AA36FEADFF502991DFC5C1.mof

[1] 2009-08-15 03:15:56 167174 C:\WINDOWS\system32\wbem\AutoRecover\7E27EAAD25AA36FEADFF502991DFC5C1.mof ()

Cannot access: C:\WINDOWS\system32\wbem\AutoRecover\7F417E1A6D819A9B2FEB55DA6858EA0A.mof

[1] 2009-04-10 21:42:07 1394 C:\WINDOWS\system32\wbem\AutoRecover\7F417E1A6D819A9B2FEB55DA6858EA0A.mof ()

Cannot access: C:\WINDOWS\system32\wbem\AutoRecover\8858F1BA0D460E5A5B27AB13DE3ACB5D.mof

[1] 2008-11-16 11:34:04 149016 C:\WINDOWS\system32\wbem\AutoRecover\8858F1BA0D460E5A5B27AB13DE3ACB5D.mof ()

Cannot access: C:\WINDOWS\system32\wbem\AutoRecover\903E49C444C46FEF5F2C3A189C9CEF71.mof

[1] 2009-04-10 21:42:07 8102 C:\WINDOWS\system32\wbem\AutoRecover\903E49C444C46FEF5F2C3A189C9CEF71.mof ()

Cannot access: C:\WINDOWS\system32\wbem\AutoRecover\C8463ECBE33BC240263A0B094E46D510.mof

[1] 2009-09-27 14:54:37 2570652 C:\WINDOWS\system32\wbem\AutoRecover\C8463ECBE33BC240263A0B094E46D510.mof ()

Cannot access: C:\WINDOWS\system32\wbem\AutoRecover\DFB9AD54AC2D3B8122567AAD3BF3EB7F.mof

[1] 2009-11-08 23:28:09 42152 C:\WINDOWS\system32\wbem\AutoRecover\DFB9AD54AC2D3B8122567AAD3BF3EB7F.mof ()

Cannot access: C:\WINDOWS\twain_32\BrMfSc03\MF3240CU\brTwdFe.dsx

[1] 2004-01-20 16:14:04 73728 C:\WINDOWS\twain_32\BrMfSc03\MF3240CU\brTwdFe.dsx ()


Report •

November 10, 2009 at 15:38:53
Please run win32kdiag.exe again, with the following command.
Please make sure that a copy of win32kdiag.exe is located on your desktop.

Click on Start->Run, and copy-paste (or type) the following command (the bolded text) into the "Open" box, and click OK:

Note: the space after exe is needed.

"%userprofile%\desktop\win32kdiag.exe" -f -r

When it's finished, there will be a log called Win32kDiag.txt on your desktop. Please open it with notepad and post the contents here.

Report •

November 12, 2009 at 16:24:05
Running from: desktop\win32kdiag.exe

Log file at : C:\Documents and Settings\Administrator\Desktop\Win32kDiag.txt

Removing all found mount points.

Attempting to reset file permissions.

WARNING: Could not get backup privileges!

Searching 'C:\WINDOWS'...

Cannot access: C:\WINDOWS\Prefetch\layout.ini

Attempting to restore permissions of : C:\WINDOWS\Prefetch\layout.ini


Report •

November 12, 2009 at 18:18:19
This will help look for a rootkit.

Download RootRepeal from one of the links on the rootrepeal download page. It can be downloaded as a .rar or .zip file which ever you like. If you get a bandwidth problem notice just try another link.


Extract the RootRepeal.exe file from the RAR or ZIP and save the EXE file to your Desktop.
Disable your antivirus, antispyware, and firewalls before continuing or they may block RootRepeal from running properly.
Now run the RootRepeal.exe program by double clicking on it.
On the botton click the Files tab and then click the Scan button
A Select Drives form will open. Select all of your drives by checking the boxes and then click ok.
It will start scanning. It may take a while to finish depending on how many drives, files and folder you have so be patient and wait on it.
When it finishes click “save report” and save at a easy place to locate such as your desktop. Save it as Rrlog.txt.
Place post the log that was produced.

Report •

November 13, 2009 at 16:04:59
ROOTREPEAL (c) AD, 2007-2009
Scan Start Time: 2009/11/13 19:05
Program Version: Version
Windows Version: Windows XP Media Center Edition SP3

Hidden/Locked Files

Report •

November 15, 2009 at 07:34:32
Go to start> run> type in cmd and press ok. Then type in the following command, press enter and post the results please.

DIR /a/s %windir%\winlogon.exe>Log.txt&log.txt

(note: the space after DIR and s are needed)

Report •

November 16, 2009 at 15:50:38
Volume in drive C is HP_PAVILION
Volume Serial Number is 0B14-D12D

Directory of C:\Windows\$NtServicePackUninstall$

08/10/2004 12:00 AM 502,272 winlogon.exe
1 File(s) 502,272 bytes

Directory of C:\Windows\ERDNT\cache

04/13/2008 07:12 PM 507,904 winlogon.exe
1 File(s) 507,904 bytes

Directory of C:\Windows\ServicePackFiles\i386

04/13/2008 07:12 PM 507,904 winlogon.exe
1 File(s) 507,904 bytes

Directory of C:\Windows\system32

04/13/2008 07:12 PM 507,904 winlogon.exe
1 File(s) 507,904 bytes

Directory of C:\Windows\system32\dllcache

04/13/2008 07:12 PM 507,904 winlogon.exe
1 File(s) 507,904 bytes

Total Files Listed:
5 File(s) 2,533,888 bytes
0 Dir(s) 193,673,416,704 bytes free

Report •

November 16, 2009 at 16:51:39
Although there does not appear to be a problem with the winlogon.exe file in system32 where it starts from, I suspect it is corrupt and will need to be replace. The easiest way is with a windows cd if you have one.

Do you have a cd?

Report •

November 16, 2009 at 17:29:06
Hi Jabuck, I was just googling a problem & spotted your post.

This info may help you look inside winlogon, I have extracted a quote.

Looking at winlogon.exe within Process Explorer and changing the Lower View to show DLLs ( View, tick > Show Lower Pane, then below > Lower Pane View, tick dll's ) Then I sorted by Company Name, just because it never seems that evil software writers are clever enough to include a Company Name.

Process Explorer

Report •

November 17, 2009 at 15:09:50
I do have a CD.

Report •

November 17, 2009 at 16:29:30

If a copy of winlogon.exe is not in the system32 folder the computer will not boot, so if you do not get the" file expanded" notification as bolded go to plan B below.

Insert the Windows XP CD into the CD-ROM drive, then restart your computer.
If prompted, click any options that are required to start the computer from the CD-ROM drive.
When the "Welcome to Setup" screen appears, press R to start the Recovery Console.
The Recovery Console will start and ask you which Windows installation you would like to log on to.

If you have multiple Windows installations, it will list each one, and you would enter the number associated with the installation you would like to work on and press enter. If you have just one Windows installation, type 1 and press enter.
It will then prompt you for the Administrator's password. If there is no password, simply press enter.
You will now be presented with a C:\Windows> prompt
At the comand prompt window, type exactly the bolded text below the way I posted them one at a time then press Enter . (The d after the word expand is the drive letter to your CDROM. If it's different on your computer, please make the necessary adjustment)
Note: The spaces between "ren c" "expand d", "ex_ c" and "exe /" and (copy d in Plan B)are needed.

ren c:\windows\system32\winlogon.exe winlogon.exe.old

expand d:\i386\winlogon.ex_ c:\windows\system32\winlogon.exe

click yes to overwrite if prompted
You should get notified that the file is expanded.
type exit to exit the command prompt, remove the cd and restart your computer.

Plan B
as above:

ren c:\windows\system32\winlogon.exe winlogon.exe.old

copy d:\i386\winlogon.ex_ c:\windows\system32\winlogon.exe

click yes to overwrite if prompted
You should get notified that the file was expanded.
type exit to exit the command prompt, remove the cd and restart your computer.

Report •

Ask Question