windows fake security? Or something

Hewlett-packard / PAVILLION
January 5, 2009 at 06:00:44
Specs: XPw/SP2, P42.66/1gig
Here are the symptoms.
1. A little icon of the MS Security emblem appeared in the extreme lower right corner.
2. I clicked on it and weird things started happening.
3. I can no longer make adjustments in the MS secutity box, such as change to auto updates.
4. Lavasoft scans show 10-40 malware and mru items which immediately reapear afer deleting.
5. I now get popups even with popup blocker on.
6. My cookies setting dialog box has changed. It used to be just on or off and now it has turned into a slider type adjustment. I had it set to off and it went to allow everything all by itself. I think.

Can you guys tell me how to get rid of this or should I buy a good AV program?


See More: windows fake security? Or something

Report •


#1
January 5, 2009 at 09:30:08
Scan with
http://www.eset.eu/eos/eset-online-...


I am use NOD32! Very Good AV for me!


Report •

#2
January 5, 2009 at 14:01:28
That helped. It found a lot of junk and computer runs faster
now. But. In IE (only, not with Safari) it still changes from
block all cookies to accept all cookies instantly after I change
it back to block all cookies. Run NOD32 scan again? It took
a couple of hours!

Report •

#3
January 5, 2009 at 15:44:07
Please download Malwarebytes' Anti-Malware from one of these sites:

MalwareBytes1

MalwareBytes2

Rename the setup file, mbam-setup.exe, before you download it. To do that once the "enter name of file to save to" box appears as the download begins in the filename box rename mbam-setup.exe to tool.exe> click save.

1. Double Click tool.exe to install the application.
2. Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
3. If an update is found, it will download and install the latest version.
4. Once the program has loaded, select "Perform Quick Scan", then click Scan. The scan may take some time to finish,so please be patient.
5. When the scan is complete, click OK, then Show Results to view the results.
6. Make sure that everything found is checked, and click Remove Selected.
7. When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediately.
8. The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
9. Copy&Paste the entire report in your next reply.


Please download and install the latest version of HijackThis v2.0.2:


Download the "HijackThis" Installer from this link:
Hijack This

Rename the setup file, HJTInstall.exe, before you download it. To do that once the "enter name of file to save to" box appears as the download begins in the filename box rename HJTInstall.exe to tools.exe> click save.
1. Save " tools.exe" to your desktop.
2. Double click on tools.exe to run the program.
3. By default it will install to C:\Program Files\Trend Micro\HijackThis.
4. Accept the license agreement by clicking the "I Accept" button.
5.Click on the "Do a system scan and save a log file" button. It will scan and then ask you to save the log.
6. Click "Save log" to save the log file and then the log will open in Notepad.
7. Click on "Edit > Select All" then click on "Edit > Copy" to copy the entire contents of the log.
8. Paste the log in your next reply.
9. Do NOT have HijackThis fix anything yet! Most of what it finds will be harmless or even required.



Report •

Related Solutions

#4
January 5, 2009 at 16:30:30
OK, I'll try it. In the meantime I should tell you I am using
Safari as it seems immune to the remaining viruses in the
computer. I assume it is ok to download thru Safari even
though I usually use IE. If I should download via IE please let
me know.

Report •

#5
January 5, 2009 at 16:56:16
Safari should be fine.

Report •

#6
January 5, 2009 at 17:03:46
It keeps starting automatically. I can find the file in the
desktop but when I try to rename it, it wont let me. It says
the file is in use. It is still downloading, so maybe it will
allow me after it finishes. If this is a bad idea, let me know.
Thanks


Report •

#7
January 5, 2009 at 17:22:07
You are supposed to rename the files before they download so when it gets to the desktop it should already be renamed.

Cancel the download and read the bolded parts in my post the redownload them please.


Report •

#8
January 5, 2009 at 17:23:03
It downloaded, updated already and is running. I started the
scan and it already found about a billion bad things. When it
gets done, I will just quarantine, see if the computer works
better and let you know for your further advice.

Report •

#9
January 5, 2009 at 17:25:23
OK, can I let the scan finish or abort it now?

Report •

#10
January 5, 2009 at 17:40:32
You can let it finish as it may run without renaming it and it sounds like you are on dial-up, it would be worth it time wise to let it download then see if it will install and run.

Report •

#11
January 5, 2009 at 18:04:06
The scan is done. The "logs" tab at top doesn't respond
but the "save logfile" does. Here is the cut and paste of
that.

Malwarebytes' Anti-Malware 1.32
Database version: 1621
Windows 5.1.2600 Service Pack 3

1/5/2009 6:51:31 PM
mbam-log-2009-01-05 (18-51-16).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 120183
Time elapsed: 27 minute(s), 5 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 7
Registry Keys Infected: 20
Registry Values Infected: 4
Registry Data Items Infected: 6
Folders Infected: 1
Files Infected: 33

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\khrqlkgd.dll (Trojan.Vundo.H) ->
No action taken.
C:\WINDOWS\system32\ljJCrsTn.dll (Trojan.Vundo.H) ->
No action taken.
C:\WINDOWS\system32\nawobiti.dll (Trojan.Vundo.H) ->
No action taken.
C:\WINDOWS\system32\nuzeriko.dll (Trojan.Vundo.H) ->
No action taken.
C:\WINDOWS\system32\baliteta.dll (Trojan.Vundo.H) ->
No action taken.
C:\WINDOWS\system32\cbXPhefe.dll (Trojan.Vundo) ->
No action taken.
C:\WINDOWS\system32\hryrmu.dll (Trojan.Vundo) -> No
action taken.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\C
urrentVersion\Explorer\Browser Helper
Objects\{52c03e5b-196d-40ab-b15d-ea95dab98865}
(Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{52c03e5b-196d-40ab-
b15d-ea95dab98865} (Trojan.Vundo.H) -> No action
taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\C
urrentVersion\Explorer\Browser Helper
Objects\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c}
(Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon\Notify\cbxphefe
(Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{6d794cb4-c7cd-4c6f-
bfdc-9b77afbdc02c} (Trojan.Vundo.H) -> No action
taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\C
urrentVersion\Explorer\Browser Helper
Objects\{9df43407-93ff-4e19-81be-e53d95c66b36}
(Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{9df43407-93ff-4e19-
81be-e53d95c66b36} (Trojan.Vundo.H) -> No action
taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\C
urrentVersion\Explorer\Browser Helper
Objects\{49fa8c48-213c-49fa-b75b-6d0c8e249ddc}
(Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{49fa8c48-213c-49fa-
b75b-6d0c8e249ddc} (Trojan.Vundo.H) -> No action
taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Cur
rentVersion\Ext\Stats\{49fa8c48-213c-49fa-b75b-
6d0c8e249ddc} (Trojan.Vundo.H) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Cur
rentVersion\Ext\Stats\{6d794cb4-c7cd-4c6f-bfdc-
9b77afbdc02c} (Trojan.Vundo) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Cur
rentVersion\Ext\Stats\{9df43407-93ff-4e19-81be-
e53d95c66b36} (Trojan.Vundo) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Cur
rentVersion\Ext\Stats\{52c03e5b-196d-40ab-b15d-
ea95dab98865} (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan
(Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim
(Trojan.Vundo) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\instkey
(Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track
System (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa
(Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM
(Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP
(Trojan.Vundo) -> No action taken.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\C
urrentVersion\Run\4efed8f3 (Trojan.Vundo.H) -> No
action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\C
urrentVersion\Run\pugolibeta (Trojan.Vundo.H) -> No
action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\C
urrentVersion\Explorer\ShellExecuteHooks\{6d794cb4-
c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> No
action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Cur
rentVersion\Run\gadcom (Trojan.Agent) -> No action
taken.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contr
ol\LSA\Notification Packages (Trojan.Vundo.H) -> Data:
c:\windows\system32\ljjcrstn -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Windows\AppInit_DLLs
(Trojan.Vundo.H) -> Data:
c:\windows\system32\nawobiti.dll -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contr
ol\LSA\Notification Packages (Trojan.Vundo.H) -> Data:
c:\windows\system32\nawobiti.dll -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Windows\AppInit_DLLs
(Trojan.Vundo.H) -> Data: system32\nawobiti.dll -> No
action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contr
ol\LSA\Authentication Packages (Trojan.Vundo) -> Data:
c:\windows\system32\ljjcrstn -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contr
ol\SecurityProviders\SecurityProviders (Trojan.Agent) ->
Data: digeste.dll -> No action taken.

Folders Infected:
C:\Documents and Settings\HP_Owner\Application
Data\gadcom (Trojan.Agent) -> No action taken.

Files Infected:
C:\WINDOWS\system32\ljJCrsTn.dll (Trojan.Vundo.H) ->
No action taken.
C:\WINDOWS\system32\nTsrCJjl.ini (Trojan.Vundo.H) ->
No action taken.
C:\WINDOWS\system32\nTsrCJjl.ini2 (Trojan.Vundo.H) ->
No action taken.
C:\WINDOWS\system32\cbXPhefe.dll (Trojan.Vundo.H) ->
No action taken.
C:\WINDOWS\system32\hryrmu.dll (Trojan.Vundo.H) ->
No action taken.
C:\WINDOWS\system32\hupekepo.dll (Trojan.Vundo.H) -
> No action taken.
C:\WINDOWS\system32\opekepuh.ini (Trojan.Vundo.H) -
> No action taken.
C:\WINDOWS\system32\khrqlkgd.dll (Trojan.Vundo.H) ->
No action taken.
C:\WINDOWS\system32\dgklqrhk.ini (Trojan.Vundo.H) ->
No action taken.
C:\WINDOWS\system32\nuzeriko.dll (Trojan.Vundo.H) ->
No action taken.
C:\WINDOWS\system32\baliteta.dll (Trojan.Vundo.H) ->
No action taken.
C:\WINDOWS\system32\nawobiti.dll (Trojan.Vundo.H) ->
No action taken.
C:\Documents and Settings\HP_Owner\Local
Settings\Temp\KB88.exe (Trojan.Dropper) -> No action
taken.
C:\Documents and Settings\HP_Owner\Local
Settings\Temporary Internet
Files\Content.IE5\VW4XY2F3\index[1] (Trojan.Vundo) ->
No action taken.
C:\Documents and Settings\HP_Owner\Local
Settings\Temporary Internet
Files\Content.IE5\XVRWK8T2\upd105320[1]
(Trojan.Vundo.H) -> No action taken.
C:\System Volume Information\_restore{00EFF98B-5705-
4D9A-BA78-7681A60AFB54}\RP543\A0069966.dll
(Trojan.Vundo) -> No action taken.
C:\System Volume Information\_restore{00EFF98B-5705-
4D9A-BA78-7681A60AFB54}\RP543\A0069985.exe
(Trojan.Downloader) -> No action taken.
C:\System Volume Information\_restore{00EFF98B-5705-
4D9A-BA78-7681A60AFB54}\RP544\A0070090.dll
(Trojan.Vundo.H) -> No action taken.
C:\System Volume Information\_restore{00EFF98B-5705-
4D9A-BA78-7681A60AFB54}\RP544\A0070091.dll
(Trojan.Vundo.H) -> No action taken.
C:\System Volume Information\_restore{00EFF98B-5705-
4D9A-BA78-7681A60AFB54}\RP544\A0070092.dll
(Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\baliteta.dll.tmp (Trojan.Vundo.H)
-> No action taken.
C:\WINDOWS\system32\cewjjcku.dll (Trojan.Vundo) ->
No action taken.
C:\WINDOWS\system32\chibsr.dll (Trojan.Vundo) -> No
action taken.
C:\WINDOWS\system32\digeste.dll (Trojan.Agent) -> No
action taken.
C:\WINDOWS\system32\harupeza.dll (Trojan.Vundo) ->
No action taken.
C:\WINDOWS\system32\nadojizu.dll (Trojan.Vundo) ->
No action taken.
C:\WINDOWS\system32\nawobiti.dll.tmp
(Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\nuzeriko.dll.tmp
(Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\sivotumo.dll (Trojan.Vundo) ->
No action taken.
C:\WINDOWS\system32\slykskqv.dll (Trojan.Vundo) ->
No action taken.
C:\WINDOWS\system32\~.exe (Trojan.Vundo.H) -> No
action taken.
C:\WINDOWS\system32\liyobinu.dll (Trojan.Vundo) -> No
action taken.
C:\WINDOWS\system32\hufufoga.dll (Trojan.Vundo) ->
No action taken.


Report •

#12
January 5, 2009 at 19:45:54
These are saying "no action taken" did you see do item 6 and follow those directions and the program responded that way? If not you will need to run the scan again and follow the directions in item 6.

Report •

#13
January 5, 2009 at 19:59:22
OK. I just did it now. Here it is.

Malwarebytes' Anti-Malware 1.32
Database version: 1621
Windows 5.1.2600 Service Pack 3

1/5/2009 8:58:30 PM
mbam-log-2009-01-05 (20-58-30).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 120183
Time elapsed: 27 minute(s), 5 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 7
Registry Keys Infected: 20
Registry Values Infected: 4
Registry Data Items Infected: 6
Folders Infected: 1
Files Infected: 33

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\khrqlkgd.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\ljJCrsTn.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\nawobiti.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\nuzeriko.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\baliteta.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\cbXPhefe.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\hryrmu.dll (Trojan.Vundo) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{52c03e5b-196d-40ab-b15d-ea95dab98865} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{52c03e5b-196d-40ab-b15d-ea95dab98865} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cbxphefe (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9df43407-93ff-4e19-81be-e53d95c66b36} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{9df43407-93ff-4e19-81be-e53d95c66b36} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{49fa8c48-213c-49fa-b75b-6d0c8e249ddc} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{49fa8c48-213c-49fa-b75b-6d0c8e249ddc} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{49fa8c48-213c-49fa-b75b-6d0c8e249ddc} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{9df43407-93ff-4e19-81be-e53d95c66b36} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{52c03e5b-196d-40ab-b15d-ea95dab98865} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\instkey (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4efed8f3 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pugolibeta (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gadcom (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\ljjcrstn -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\nawobiti.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\nawobiti.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\nawobiti.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\ljjcrstn -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SecurityProviders (Trojan.Agent) -> Data: digeste.dll -> Quarantined and deleted successfully.

Folders Infected:
C:\Documents and Settings\HP_Owner\Application Data\gadcom (Trojan.Agent) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\ljJCrsTn.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\nTsrCJjl.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nTsrCJjl.ini2 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\cbXPhefe.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\hryrmu.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\hupekepo.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\opekepuh.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\khrqlkgd.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dgklqrhk.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nuzeriko.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\baliteta.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nawobiti.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Owner\Local Settings\Temp\KB88.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Owner\Local Settings\Temporary Internet Files\Content.IE5\VW4XY2F3\index[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Owner\Local Settings\Temporary Internet Files\Content.IE5\XVRWK8T2\upd105320[1] (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{00EFF98B-5705-4D9A-BA78-7681A60AFB54}\RP543\A0069966.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{00EFF98B-5705-4D9A-BA78-7681A60AFB54}\RP543\A0069985.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{00EFF98B-5705-4D9A-BA78-7681A60AFB54}\RP544\A0070090.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{00EFF98B-5705-4D9A-BA78-7681A60AFB54}\RP544\A0070091.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{00EFF98B-5705-4D9A-BA78-7681A60AFB54}\RP544\A0070092.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\baliteta.dll.tmp (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\cewjjcku.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\chibsr.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\digeste.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\harupeza.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\nadojizu.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\nawobiti.dll.tmp (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\nuzeriko.dll.tmp (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\sivotumo.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\slykskqv.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\~.exe (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\liyobinu.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\hufufoga.dll (Trojan.Vundo) -> Delete on reboot.


Report •

#14
January 5, 2009 at 20:04:37
Also, there is a little message box popped up on top of the
scan identifying 6 items that could not be removed. They all
start with HKEY except one starts with NT. They won't cut
and past but I could transcribe them in about 10 minutes or
so if you wanna see them.

Report •

#15
January 5, 2009 at 20:06:05
oops, never mind. It says they will be deleted on reboot.

Report •

#16
January 5, 2009 at 20:27:15
It looks like the system is back to normal. I will do the
"hijackthis" tomorrow. Thanks for everything.

Report •

#17
January 6, 2009 at 06:25:20
here is the hijack this logfile. I will leave the scan open until you tell me what to do.

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 7:09:02 AM, on 1/6/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16762)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\Iaanotif.exe
C:\Program Files\HP\HP Software Update\HPwuSchd2.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
C:\program files\common files\installshield\updateservice\issch.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
c:\windows\system\hpsysdrv.exe
C:\Program Files\AT&T\WnClient\Programs\WNConnect.exe
C:\PROGRA~1\AT&T\WnClient\Programs\WNCSMS~1.EXE
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\HP_Owner\Desktop\tools.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://ie.redirect.hp.com/svs/rdr?T...
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://ie.redirect.hp.com/svs/rdr?T...
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.att.net/ie4/search/index...
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://ie.redirect.hp.com/svs/rdr?T...
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.worldnet.att.net/microso...
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?Lin...
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?Lin...
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://ie.redirect.hp.com/svs/rdr?T...
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?Lin...
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?Lin...
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://ie.redirect.hp.com/svs/rdr?T...
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://go.microsoft.com/fwlink/?Lin...
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O2 - BHO: hpWebHelper Class - {AAAE832A-5FFF-4661-9C8F-369692D1DCB9} - C:\WINDOWS\pchealth\helpctr\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\plugin\WebHelper.dll
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [igfxpers] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [IAAnotif] C:\Program Files\Intel\Intel Matrix Storage Manager\Iaanotif.exe
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [HPBootOp] "C:\Program Files\Hewlett-Packard\HP Boot Optimizer\HPBootOp.exe" /run
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPwuSchd2.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [ISUSPM Startup] C:\PROGRA~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
O4 - HKLM\..\Run: [ISUSScheduler] "c:\program files\common files\installshield\updateservice\issch.exe" -start
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [updateMgr] "C:\Program Files\Adobe\Acrobat 7.0\Reader\AdobeUpdateManager.exe" AcRdB7_0_9 -reboot 1
O4 - .DEFAULT User Startup: Pin.lnk = C:\hp\bin\CLOAKER.EXE (User 'Default user')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Internet Connection Help - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm (file missing)
O9 - Extra 'Tools' menuitem: Internet Connection Help - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm (file missing)
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://www.worldnet.att.net/microsoft/index.html
O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} (QuickTime Object) - http://a1540.g.akamai.net/7/1540/52...
O16 - DPF: {49232000-16E4-426C-A231-62846947304B} - http://ipgweb.cce.hp.com/rdqcpc/dow...
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microso...
O17 - HKLM\System\CCS\Services\Tcpip\..\{CD2B155F-33CA-4691-A073-2E141425CE30}: NameServer = 204.127.160.3 204.127.129.3
O20 - AppInit_DLLs: hryrmu.dll,C:\WINDOWS\system32\nadojizu.dll
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: Intel(R) Matrix Storage Event Monitor (IAANTMON) - Intel Corporation - C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe

--
End of file - 7587 bytes


Report •

#18
January 6, 2009 at 15:03:29
Here is the analysis of the hijackthis scan. I still have the scan open to delete whatever you say delete.

TrendSecure
Trend Micro
Your current Web browser may not display this site properly.
TrendSecure performs best when opened with the latest version of either Microsoft Internet Explorer or Mozilla Firefox.

Comparison of your HijackThis log file items to others
The table below compares the items HijackThis found on your computer with those on other people's computers. The column "% of PCs with item" indicates what percent of other people's HijackThis log files contain the item in that row of the table. Additional information will be provided as more HijackThis log files are added to the AnalyzeThis database.

Each entry is coded to indicate the type of item it is on your computer. An explanation of these codes may be found at the bottom of this page.


Index % of PCs with item Code Data
1 0.0% O14 START_PAGE_URL=http://www.worldnet.att.net/microsoft/index.html
2 0.0% O16 {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} (QuickTime Object) - http://a1540.g.akamai.net/7/1540/52...
3 0.0% O16 {49232000-16E4-426C-A231-62846947304B} - http://ipgweb.cce.hp.com/rdqcpc/dow...
4 0.0% O16 {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microso...
5 0.0% O17 NameServer = 204.127.160.3 204.127.129.3
6 0.0% O2 (no name) - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - (no file)
7 0.0% O2 hpWebHelper Class - {AAAE832A-5FFF-4661-9C8F-369692D1DCB9} - C:\WINDOWS\pchealth\helpctr\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\plugin\WebHelper.dll
8 0.0% O2 SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
9 0.0% O20 hryrmu.dll,C:\WINDOWS\system32\nadojizu.dll
10 0.0% O23 InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
11 0.0% O23 Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
12 0.0% O23 Intel(R) Matrix Storage Event Monitor (IAANTMON) - Intel Corporation - C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe
13 0.0% O23 Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
14 0.0% O4 [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
15 0.0% O4 [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
16 0.0% O4 [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
17 0.0% O4 Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
18 0.0% O4 [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
19 0.0% O4 Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
20 0.0% O4 [RTHDCPL] RTHDCPL.EXE
21 0.0% O4 [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe
22 0.0% O4 [igfxpers] C:\WINDOWS\system32\igfxpers.exe
23 0.0% O4 [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
24 0.0% O4 [ISUSScheduler] "C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe" -start
25 0.0% O4 [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
26 0.0% O4 [ISUSPM Startup] C:\PROGRA~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
27 0.0% O4 Pin.lnk = C:\hp\bin\CLOAKER.EXE (User 'Default user')
28 0.0% O4 [HPBootOp] "C:\Program Files\Hewlett-Packard\HP Boot Optimizer\HPBootOp.exe" /run
29 0.0% O4 [IAAnotif] C:\Program Files\Intel\Intel Matrix Storage Manager\Iaanotif.exe
30 0.0% O4 [updateMgr] "C:\Program Files\Adobe\Acrobat 7.0\Reader\AdobeUpdateManager.exe" AcRdB7_0_9 -reboot 1
31 0.0% O4 [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
32 0.0% O8 E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\Office10\EXCEL.EXE/3000
33 0.0% O9 Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
34 0.0% O9 Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
35 0.0% O9 (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\Windows\Network Diagnostic\xpnetdiag.exe
36 0.0% O9 @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\Windows\Network Diagnostic\xpnetdiag.exe
37 0.0% O9 Internet Connection Help - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm (file missing)
38 0.0% O9 (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
39 0.0% O9 Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
40 0.0% P01 C:\WINDOWS\Explorer.EXE
41 0.0% P01 C:\WINDOWS\system32\svchost.exe
42 0.0% P01 C:\WINDOWS\system32\lsass.exe
43 0.0% P01 C:\WINDOWS\system32\winlogon.exe
44 0.0% P01 C:\WINDOWS\system32\services.exe
45 0.0% P01 C:\WINDOWS\System32\smss.exe
46 0.0% P01 C:\WINDOWS\system32\spoolsv.exe
47 0.0% P01 C:\WINDOWS\system32\ctfmon.exe
48 0.0% P01 C:\Program Files\Internet Explorer\iexplore.exe
49 0.0% P01 C:\WINDOWS\system32\rundll32.exe
50 0.0% P01 C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
51 0.0% P01 C:\Program Files\QuickTime\qttask.exe
52 0.0% P01 C:\Program Files\Messenger\msmsgs.exe
53 0.0% P01 C:\WINDOWS\System32\hkcmd.exe
54 0.0% P01 C:\Program Files\Common Files\Real\Update_OB\realsched.exe
55 0.0% P01 C:\WINDOWS\system32\igfxpers.exe
56 0.0% P01 C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
57 0.0% P01 C:\WINDOWS\RTHDCPL.EXE
58 0.0% P01 C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe
59 0.0% P01 C:\windows\system\hpsysdrv.exe
60 0.0% P01 C:\Program Files\Canon\CAL\CALMAIN.exe
61 0.0% P01 C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe
62 0.0% P01 C:\Program Files\Intel\Intel Matrix Storage Manager\Iaanotif.exe
63 0.0% P01 C:\Program Files\AT&T\WnClient\Programs\WNConnect.exe
64 0.0% P01 C:\PROGRA~1\AT&T\WnClient\Programs\WNCSMS~1.EXE
65 0.0% P01 C:\Documents and Settings\HP_Owner\Desktop\tools.exe
66 0.0% P01 C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
67 0.0% P01 C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
68 0.0% R0 HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?Lin...
69 0.0% R0 HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://ie.redirect.hp.com/svs/rdr?T...
70 0.0% R0 HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.worldnet.att.net/microso...
71 0.0% R1 HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?Lin...
72 0.0% R1 HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?Lin...
73 0.0% R1 HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?Lin...
74 0.0% R1 HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://ie.redirect.hp.com/svs/rdr?T...
75 0.0% R1 HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://ie.redirect.hp.com/svs/rdr?T...
76 0.0% R1 HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://ie.redirect.hp.com/svs/rdr?T...
77 0.0% R1 HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://go.microsoft.com/fwlink/?Lin...
78 0.0% R1 HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://ie.redirect.hp.com/svs/rdr?T...
79 0.0% R1 HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.att.net/ie4/search/index...

Explanation of the codes

R - Registry, StartPage/SearchPage changes


R0 - Changed registry value
R1 - Created registry value
R2 - Created registry key
R3 - Created extra registry value where only one should be

F - IniFiles, autoloading entries


F0 - Changed inifile value
F1 - Created inifile value
F2 - Changed inifile value, mapped to Registry
F3 - Created inifile value, mapped to Registry

N - Netscape/Mozilla StartPage/SearchPage changes


N1 - Change in prefs.js of Netscape 4.x
N2 - Change in prefs.js of Netscape 6
N3 - Change in prefs.js of Netscape 7
N4 - Change in prefs.js of Mozilla

O - Other, several sections which represent:


O1 - Hijack of auto.search.msn.com with Hosts file
O2 - Enumeration of existing MSIE BHO's
O3 - Enumeration of existing MSIE toolbars
O4 - Enumeration of suspicious autoloading Registry entries
O5 - Blocking of loading Internet Options in Control Panel
O6 - Disabling of 'Internet Options' Main tab with Policies
O7 - Disabling of Regedit with Policies
O8 - Extra MSIE context menu items
O9 - Extra 'Tools' menuitems and buttons
O10 - Breaking of Internet access by New.Net or WebHancer
O11 - Extra options in MSIE 'Advanced' settings tab
O12 - MSIE plugins for file extensions or MIME types
O13 - Hijack of default URL prefixes
O14 - Changing of IERESET.INF
O15 - Trusted Zone Autoadd
O16 - Download Program Files item
O17 - Domain hijack
O18 - Enumeration of existing protocols and filters
O19 - User stylesheet hijack
O20 - AppInit_DLLs autorun Registry value, Winlogon Notify Registry keys
O21 - ShellServiceObjectDelayLoad (SSODL) autorun Registry key
O22 - SharedTaskScheduler autorun Registry key
O23 - Enumeration of NT Services
O24 - Enumeration of ActiveX Desktop Components


Privacy Policy | About Trend Micro | Contact Us

Copyright © 2007 Trend Micro, Inc.


Report •

#19
January 6, 2009 at 15:46:36
You still have an baddie.

I don't see an antivirus program installed, it would be useless to continue without one as you will quickly get infected. We will need it turn off a few times during the removal process of malware. I use the free version of AVG antivirus, you can download it at this link:
AVG Free Antivirus

Update it once you get it installed.

Your java is out of date and may have been exploited.
Download the latest version of java from this link Java
Click on the JRE 6 Update 11 download button.
Check the box that says: "Accept License Agreement". The page will refresh.
Click on the link to download Windows Offline Installation with or without Multi-language and save to your desktop.
Close any programs you may have running - especially your web browser.
Go to Start > Control Panel double-click on Add/Remove programs and remove all older versions of Java. Check any item with Java Runtime Environment (JRE or J2SE) in the name. It should have the "coffee cup" icon next to it.
Click the Remove or Change/Remove button. Repeat as many times as necessary to remove each Java versions.
Reboot your computer once all Java components are removed
Then from your desktop double-click on jre-6u11-windows-i586-p.exe to install the newest version.

Please download ComboFix to the desktop from one of the following links:

Link1

Link 2

Link 3

Combofix is a powerful tool so follow the instructions exactly or you could damage your computer.

Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with Combofix and remove some of its embedded files which may cause "unpredictable results".
Click on This Link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

In your case to run Combofix do the following:
1. Go offline turn off your AVG antivirus, Ad-Aware and any other antispyware that you may have.
2. Run Combofix and save its log.
3. Restart the computer to get the antivirus running again but leave the antispyware programs off until we get the computer cleaned.
4. Post the Combofix log.


Remember to re-enable the protection again afterwards before connecting to the Internet.

Double-click combofix.exe
Follow the prompts.
(Don't click on the window while the program is running or move the mouse, it will cause your system to hang.)
Please post the log it produces.


Report •

#20
January 6, 2009 at 16:08:42
OK, thanks, I will start downloading AVG now. It is 50+ megs so will be a couple of hours. I'll report back then, unless there is something else I can do while it is downloading.

Report •

#21
January 7, 2009 at 06:39:44
I downloaded new java and deleted all old java. Now, I have combo fix ready to run but can't figure out how to temporarily disable AVG. It has a control in my MS Security center, but when I click the "on" button instead of turning off, it just opens a dialog box telling me what it is. How to disable AVG?

Report •

#22
January 7, 2009 at 19:41:16
I got it figured out. Here is the combo fix log. btw, can I delete all the viruses that Malwarebytes has quarantined?

ComboFix 09-01-06.02 - HP_Owner 2009-01-07 20:25:19.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1014.604 [GMT -7:00]
Running from: c:\documents and settings\HP_Owner\Desktop\ComboFix.exe
AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated)
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
c:\documents and settings\HP_Owner\Local Settings\Temporary Internet Files\fbk.sts
c:\windows\IE4 Error Log.txt
c:\windows\system32\azepurah.ini
c:\windows\system32\ebstbeeb.ini
c:\windows\wiaserviv.log
D:\Autorun.inf

----- BITS: Possible infected sites -----

hxxp://childhe.com
.
((((((((((((((((((((((((( Files Created from 2008-12-08 to 2009-01-08 )))))))))))))))))))))))))))))))
.

2009-01-07 06:46 . 2009-01-07 06:46 410,984 --a------ c:\windows\system32\deploytk.dll
2009-01-07 05:52 . 2009-01-07 05:58 <DIR> d-------- c:\documents and settings\HP_Owner\.SunDownloadManager
2009-01-06 20:15 . 2009-01-07 12:32 <DIR> d--h----- C:\$AVG8.VAULT$
2009-01-06 19:52 . 2009-01-07 17:04 <DIR> d-------- c:\windows\system32\drivers\Avg
2009-01-06 19:52 . 2009-01-06 20:09 <DIR> d-------- c:\documents and settings\HP_Owner\Application Data\AVGTOOLBAR
2009-01-06 19:52 . 2009-01-06 19:52 97,928 --a------ c:\windows\system32\drivers\avgldx86.sys
2009-01-06 19:52 . 2009-01-06 19:52 76,040 --a------ c:\windows\system32\drivers\avgtdix.sys
2009-01-06 19:52 . 2009-01-06 19:52 10,520 --a------ c:\windows\system32\avgrsstx.dll
2009-01-06 19:51 . 2009-01-06 19:51 <DIR> d-------- c:\program files\AVG
2009-01-06 19:51 . 2009-01-06 19:51 <DIR> d-------- c:\documents and settings\All Users\Application Data\avg8
2009-01-05 18:14 . 2009-01-05 18:14 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware
2009-01-05 18:14 . 2009-01-05 18:14 <DIR> d-------- c:\documents and settings\HP_Owner\Application Data\Malwarebytes
2009-01-05 18:14 . 2009-01-05 18:14 <DIR> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-01-05 18:14 . 2009-01-04 18:39 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2009-01-05 18:14 . 2009-01-04 18:39 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2009-01-05 12:46 . 2009-01-05 12:46 <DIR> d-------- c:\documents and settings\HP_Owner\Application Data\ESET
2009-01-05 12:44 . 2009-01-05 12:44 <DIR> d-------- c:\documents and settings\All Users\Application Data\ESET
2008-12-22 10:52 . 2008-12-22 10:52 0 --a------ c:\windows\iPlayer.INI
2008-12-22 09:37 . 2008-12-22 11:25 <DIR> d-------- c:\program files\InterActual

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-01-07 15:18 --------- d-----w c:\program files\Lavasoft
2009-01-07 13:53 --------- d-----w c:\program files\Java
2008-12-29 02:42 67,696 ----a-w c:\program files\mozilla firefox\components\jar50.dll
2008-12-29 02:42 54,376 ----a-w c:\program files\mozilla firefox\components\jsd3250.dll
2008-12-29 02:42 34,952 ----a-w c:\program files\mozilla firefox\components\myspell.dll
2008-12-29 02:42 46,720 ----a-w c:\program files\mozilla firefox\components\spellchk.dll
2008-12-29 02:42 172,144 ----a-w c:\program files\mozilla firefox\components\xpinstal.dll
2008-08-27 21:12 32,768 --sha-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012008082720080828\index.dat
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2008-04-13 1695232]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-13 15360]
"updateMgr"="c:\program files\Adobe\Acrobat 7.0\Reader\AdobeUpdateManager.exe" [2006-03-30 313472]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2006-02-07 77824]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2006-02-07 118784]
"IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\Iaanotif.exe" [2006-02-21 143360]
"Recguard"="c:\windows\SMINST\RECGUARD.EXE" [2005-07-22 237568]
"HPBootOp"="c:\program files\Hewlett-Packard\HP Boot Optimizer\HPBootOp.exe" [2006-02-15 249856]
"HP Software Update"="c:\program files\HP\HP Software Update\HPwuSchd2.exe" [2005-12-15 49152]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2006-08-08 180269]
"ISUSPM Startup"="c:\progra~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe" [2004-07-27 221184]
"ISUSScheduler"="c:\program files\common files\installshield\updateservice\issch.exe" [2004-07-27 81920]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2007-01-03 282624]
"AVG8_TRAY"="c:\progra~1\AVG\AVG8\avgtray.exe" [2009-01-06 1261336]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-01-07 136600]
"RTHDCPL"="RTHDCPL.EXE" [2006-03-07 c:\windows\RTHDCPL.EXE]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2005-09-23 29696]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-02-13 83360]

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\Updates from HP\\9972322\\Program\\Updates from HP.exe"=
"c:\\Program Files\\Schwab\\SSPro\\SSPro.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgemc.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgupd.exe"=

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2009-01-06 97928]
R4 avg8emc;AVG Free8 E-mail Scanner;c:\progra~1\AVG\AVG8\avgemc.exe [2009-01-06 875288]
R4 avg8wd;AVG Free8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [2009-01-06 231704]
R4 AvgTdiX;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2009-01-06 76040]
.
Contents of the 'Scheduled Tasks' folder

2009-01-08 c:\windows\Tasks\dolavumu.job
- c:\windows\system32\rundll32.exe [2008-04-13 17:12]
.
- - - - ORPHANS REMOVED - - - -

HKLM-Run-PCDrProfiler - (no file)
Notify-WgaLogon - (no file)


.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.worldnet.att.net/microsoft/index.html
uDefault_Search_URL = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_US&c=63&bd=PAVILION&pf=desktop
mSearch Bar = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_US&c=63&bd=PAVILION&pf=desktop
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~4\Office10\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\HP_Owner\Application Data\Mozilla\Firefox\Profiles\ycf3t08a.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - component: c:\program files\Mozilla Firefox\components\xpinstal.dll
.

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-01-07 20:28:18
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
r Running Proce
.
c:\program files\Intel\Intel Matrix Storage Manager\IAANTmon.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
c:\windows\system32\wdfmgr.exe
c:\program files\Canon\CAL\CALMAIN.exe
c:\program files\AVG\AVG8\avgrsx.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2009-01-07 20:30:16 - machine was rebooted
ComboFix-quarantined-files.txt 2009-01-08 03:30:13

Pre-Run: 58,919,178,240 bytes free
Post-Run: 59,246,505,984 bytes free

144 --- E O F --- 2008-12-18 15:18:39


Report •

#23
January 7, 2009 at 20:34:41
Set up the computer to view hidden files:
To show hidden files do the following:
Click Start > My Computer
On the Tools menu, click Folder Options.
Click the View tab.
Uncheck Hide file extensions for known file types.
Uncheck Hide protected operating system files.
Under the Hidden files folder, locate and check Show hidden files and folders.
If you see a warning message, click Yes.
Click Apply > OK.

Do a manual search for this file and delete it if found:

childhe.com

Open Notepad and copy/paste everything between the X's into it and make sure the first word (such as KILLALL, File, Folder, Registry etc.) is at the very top of the page.
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
KILLALL::
File::
c:\windows\Tasks\dolavumu.job

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Go to File on the top bar and choose" Save As", Change the "Save As Type" to All Files, Name it CFScript.txt then save it to your desktop.
Then drag/drop the CFScript.txt onto ComboFix.exe (the red symbol on your desktop) if combofix does not auto start click "run".

Empty the restore folder. Go to start>control panel>system>system restore tab>check the box beside "turn off system restore>apply (takes a minute)>ok. Go back and uncheck the box to turn system restore back on>apply>ok.


Download ATF Cleaner from this link:
http://www.majorgeeks.com/ATF_Cleaner_d4949.html
Run ATF-Cleaner
Double-click ATF-Cleaner.exe to run the program.
Under Main choose: Select All
Click the Empty Selected button.

Run an online scan with Kaspersky from the following link:
Kaspersky Online Scanner

Note: If you have used this particular scanner before, you MAY HAVE TO UNINSTALL the program through Add/Remove Programs before downloading the new ActiveX component

1. Click Accept, when prompted to download and install the program files and database of malware definitions.
2. Click Run at the Security prompt.
The program will then begin downloading and installing and will also update the database.
Please be patient as this can take several minutes.
3.Once the update is complete, click on My Computer under the green Scan bar to the left to start the scan.
4. Once the scan is complete, it will display if your system has been infected. It does not provide an option to clean/disinfect. We only require a report from it.
5. Do NOT be alarmed by what you see in the report. Many of the finds have likely been quarantined.
6. Click View scan report at the bottom.
7. Click the Save Report As... button.
8. Click the Save as Text button to save the file to your desktop so that you may post it in your next reply.
**Note**

To optimize scanning time and produce a more sensible report for review:
Close any open programs.
Turn off the real-time scanner of all antivirus or antispyware programs while performing the online scan.
Note for Internet Explorer 7 users: If at any time you have trouble viewing the accept button of the license, click on the Zoom tool located at the bottom right of the IE window and set the zoom to 75%. Once the license is accepted, reset to 100%.


Report •

#24
January 8, 2009 at 05:51:20
Here is new combo fix log. Having a little trouble getting Kaspersky Scan to run. Will post it when I get it.
ComboFix 09-01-06.02 - HP_Owner 2009-01-08 6:33:10.3 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1014.650 [GMT -7:00]
Running from: c:\documents and settings\HP_Owner\Desktop\ComboFix.exe
AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated)
.

((((((((((((((((((((((((( Files Created from 2008-12-08 to 2009-01-08 )))))))))))))))))))))))))))))))
.

2009-01-07 06:46 . 2009-01-07 06:46 410,984 --a------ c:\windows\system32\deploytk.dll
2009-01-07 05:52 . 2009-01-07 05:58 <DIR> d-------- c:\documents and settings\HP_Owner\.SunDownloadManager
2009-01-06 20:15 . 2009-01-07 12:32 <DIR> d--h----- C:\$AVG8.VAULT$
2009-01-06 19:52 . 2009-01-08 04:39 <DIR> d-------- c:\windows\system32\drivers\Avg
2009-01-06 19:52 . 2009-01-06 20:09 <DIR> d-------- c:\documents and settings\HP_Owner\Application Data\AVGTOOLBAR
2009-01-06 19:52 . 2009-01-06 19:52 97,928 --a------ c:\windows\system32\drivers\avgldx86.sys
2009-01-06 19:52 . 2009-01-06 19:52 76,040 --a------ c:\windows\system32\drivers\avgtdix.sys
2009-01-06 19:52 . 2009-01-06 19:52 10,520 --a------ c:\windows\system32\avgrsstx.dll
2009-01-06 19:51 . 2009-01-06 19:51 <DIR> d-------- c:\program files\AVG
2009-01-06 19:51 . 2009-01-06 19:51 <DIR> d-------- c:\documents and settings\All Users\Application Data\avg8
2009-01-05 18:14 . 2009-01-05 18:14 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware
2009-01-05 18:14 . 2009-01-05 18:14 <DIR> d-------- c:\documents and settings\HP_Owner\Application Data\Malwarebytes
2009-01-05 18:14 . 2009-01-05 18:14 <DIR> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-01-05 18:14 . 2009-01-04 18:39 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2009-01-05 18:14 . 2009-01-04 18:39 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2009-01-05 12:46 . 2009-01-05 12:46 <DIR> d-------- c:\documents and settings\HP_Owner\Application Data\ESET
2009-01-05 12:44 . 2009-01-05 12:44 <DIR> d-------- c:\documents and settings\All Users\Application Data\ESET
2008-12-22 10:52 . 2008-12-22 10:52 0 --a------ c:\windows\iPlayer.INI
2008-12-22 09:37 . 2008-12-22 11:25 <DIR> d-------- c:\program files\InterActual

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-01-07 15:18 --------- d-----w c:\program files\Lavasoft
2009-01-07 13:53 --------- d-----w c:\program files\Java
2008-12-13 06:40 3,593,216 ----a-w c:\windows\system32\dllcache\mshtml.dll
2008-10-24 11:21 455,296 ------w c:\windows\system32\dllcache\mrxsmb.sys
2008-10-23 12:36 286,720 ----a-w c:\windows\system32\gdi32.dll
2008-10-23 12:36 286,720 ------w c:\windows\system32\dllcache\gdi32.dll
2008-10-16 21:13 202,776 ----a-w c:\windows\system32\wuweb.dll
2008-10-16 21:13 202,776 ----a-w c:\windows\system32\dllcache\wuweb.dll
2008-10-16 21:13 1,809,944 ----a-w c:\windows\system32\wuaueng.dll
2008-10-16 21:13 1,809,944 ----a-w c:\windows\system32\dllcache\wuaueng.dll
2008-10-16 21:12 561,688 ----a-w c:\windows\system32\wuapi.dll
2008-10-16 21:12 561,688 ----a-w c:\windows\system32\dllcache\wuapi.dll
2008-10-16 21:12 323,608 ----a-w c:\windows\system32\wucltui.dll
2008-10-16 21:12 323,608 ----a-w c:\windows\system32\dllcache\wucltui.dll
2008-10-16 21:09 92,696 ----a-w c:\windows\system32\dllcache\cdm.dll
2008-10-16 21:09 92,696 ----a-w c:\windows\system32\cdm.dll
2008-10-16 21:09 51,224 ----a-w c:\windows\system32\wuauclt.exe
2008-10-16 21:09 51,224 ----a-w c:\windows\system32\dllcache\wuauclt.exe
2008-10-16 21:09 43,544 ----a-w c:\windows\system32\wups2.dll
2008-10-16 21:08 34,328 ----a-w c:\windows\system32\wups.dll
2008-10-16 21:08 34,328 ----a-w c:\windows\system32\dllcache\wups.dll
2008-10-16 21:07 208,744 ----a-w c:\windows\system32\muweb.dll
2008-10-16 13:11 70,656 ----a-w c:\windows\system32\dllcache\ie4uinit.exe
2008-10-16 13:11 13,824 ------w c:\windows\system32\dllcache\ieudinit.exe
2008-10-15 16:34 337,408 ------w c:\windows\system32\dllcache\netapi32.dll
2008-10-15 07:06 633,632 ----a-w c:\windows\system32\dllcache\iexplore.exe
2008-10-15 07:04 161,792 ----a-w c:\windows\system32\dllcache\ieakui.dll
2008-12-29 02:42 67,696 ----a-w c:\program files\mozilla firefox\components\jar50.dll
2008-12-29 02:42 54,376 ----a-w c:\program files\mozilla firefox\components\jsd3250.dll
2008-12-29 02:42 34,952 ----a-w c:\program files\mozilla firefox\components\myspell.dll
2008-12-29 02:42 46,720 ----a-w c:\program files\mozilla firefox\components\spellchk.dll
2008-12-29 02:42 172,144 ----a-w c:\program files\mozilla firefox\components\xpinstal.dll
2008-08-27 21:12 32,768 --sha-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012008082720080828\index.dat
.

((((((((((((((((((((((((((((( snapshot@2009-01-07_20.29.33.17 )))))))))))))))))))))))))))))))))))))))))
.
- 2009-01-08 03:28:05 16,384 ----atw c:\windows\Temp\Perflib_Perfdata_6d0.dat
+ 2009-01-08 13:00:42 16,384 ----atw c:\windows\temp\Perflib_Perfdata_6d0.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2008-04-13 1695232]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-13 15360]
"updateMgr"="c:\program files\Adobe\Acrobat 7.0\Reader\AdobeUpdateManager.exe" [2006-03-30 313472]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2006-02-07 77824]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2006-02-07 118784]
"IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\Iaanotif.exe" [2006-02-21 143360]
"Recguard"="c:\windows\SMINST\RECGUARD.EXE" [2005-07-22 237568]
"HPBootOp"="c:\program files\Hewlett-Packard\HP Boot Optimizer\HPBootOp.exe" [2006-02-15 249856]
"HP Software Update"="c:\program files\HP\HP Software Update\HPwuSchd2.exe" [2005-12-15 49152]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2006-08-08 180269]
"ISUSPM Startup"="c:\progra~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe" [2004-07-27 221184]
"ISUSScheduler"="c:\program files\common files\installshield\updateservice\issch.exe" [2004-07-27 81920]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2007-01-03 282624]
"AVG8_TRAY"="c:\progra~1\AVG\AVG8\avgtray.exe" [2009-01-06 1261336]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-01-07 136600]
"RTHDCPL"="RTHDCPL.EXE" [2006-03-07 c:\windows\RTHDCPL.EXE]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2005-09-23 29696]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-02-13 83360]

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\Updates from HP\\9972322\\Program\\Updates from HP.exe"=
"c:\\Program Files\\Schwab\\SSPro\\SSPro.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgemc.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgupd.exe"=

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2009-01-06 97928]
R4 avg8emc;AVG Free8 E-mail Scanner;c:\progra~1\AVG\AVG8\avgemc.exe [2009-01-06 875288]
R4 avg8wd;AVG Free8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [2009-01-06 231704]
R4 AvgTdiX;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2009-01-06 76040]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.worldnet.att.net/microsoft/index.html
uDefault_Search_URL = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_US&c=63&bd=PAVILION&pf=desktop
mSearch Bar = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_US&c=63&bd=PAVILION&pf=desktop
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~4\Office10\EXCEL.EXE/3000
TCP: {CD2B155F-33CA-4691-A073-2E141425CE30} = 204.127.129.4 204.127.160.4
FF - ProfilePath - c:\documents and settings\HP_Owner\Application Data\Mozilla\Firefox\Profiles\ycf3t08a.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - component: c:\program files\Mozilla Firefox\components\xpinstal.dll
.

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-01-08 06:34:09
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
Completion time: 2009-01-08 6:35:09
ComboFix-quarantined-files.txt 2009-01-08 13:35:07
ComboFix2.txt 2009-01-08 13:03:04
ComboFix3.txt 2009-01-08 03:30:17

Pre-Run: 59,917,578,240 bytes free
Post-Run: 59,909,181,440 bytes free

142 --- E O F --- 2008-12-18 15:18:39


Report •

#25
January 8, 2009 at 19:18:49
Try this scanner.

Please run Esets online scanner from this link:

ESET

1. Note: You will need to use Internet explorer for this scan
2. Tick the box next to YES, I accept the Terms of Use.
3. Click Start
4. When asked, allow the activex control to install
5. Click Start
6. Make sure that the option Remove found threats is unticked ( I want to see what is found first), and the option Scan unwanted applications is checked
7. Click Scan
8. Wait for the scan to finish
9. Use notepad to open the logfile located at C:\Program Files\EsetOnlineScanner\log.txt
10. Copy and paste that log in your next reply.


Report •

#26
January 8, 2009 at 19:42:09
The Kaspersky scan was 0 infections or suspicious objects. There is simply nothing to copy and post. The report is just a blank white box. The scan took several hours to download and over an hour to run. All appeared normal. Is it possible to be perfectly clean?

Report •

#27
January 8, 2009 at 19:47:27
I can post this part from the Kaspersky scan.
The 73308 number of files is supposed to be 733080, I think.


Scan statistics
Files scanned 73308
Threat names 0
Infected objects 0
Suspicious objects 0
Duration of the scan 01:27:21
Start scan
Scan is running (99%)
Click the area that you want to scan in left part of the window. The scan will start automatically as soon as you select a scan area.
Last start: 1/08/2009 19:06:14
Status: complete


Report •

#28
January 8, 2009 at 20:10:39
You computer appears to be clean, probably not perfectly clean as cookies/tmp files start getting retained on the computer as soon as you get on line, just usually not baddies.


Go to start> run> type in combofix /u (note the space after combofix) then press enter> run. This will uninstall combofix so give the uninstaller a minute to run.

Go to start> control panel> add/remove programs and uninstall these programs:

Hijack This

Malwarebytes

Eset

You should keep AFT Cleaner and run it weekly.


You should consider adding "Spywareblaster" to your arsenol of antispyware tools, you can download it from this link Spywareblaster

Just download it,install it, and update it. Its free and runs in the background, so you don't actually run it, and re-writes malicious script before it can install on your computer. Look for updates weekly as there is no auto-update on the free version.

How is the computer operating?


Report •

#29
January 8, 2009 at 20:26:56
OK, will do, thanks. Runs perfectly. Also, I returned the 2 settings in folder options about showing hidden files and something else to the reccomended settings. Your a bloody genius.

Report •

#30
January 8, 2009 at 20:40:41
One more question. Do I run AVG and spywareblaster both at the same time?

Report •

#31
January 9, 2009 at 20:05:04
You will not know spywareblaster is running and AVG is about the same. The antivirus and the antispyware programs should be running all the time, the answer is yes.

Glad we could help.


Report •


Ask Question