1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

i can't get rid of this virus

Discussion in 'Malware and Virus Removal Archive' started by greenarrow3, 2008/09/11.

  1. 2008/09/11
    greenarrow3

    greenarrow3 Inactive Thread Starter

    Joined:
    2008/09/10
    Messages:
    4
    Likes Received:
    0
    So, my computer now has a yellow triangle with an exclamation point icon in the task bar that randomly pops up three different messages at me:

    (paraphrased) "your computer is running slow, may have viruses, click to check for latest security updates "; "internet attack attempt detected, someone is trying to infect your computer, click here for the latest security updates" (I get this one even when my wireless internet is disabled:p); and "your antivirus software is out of date, click here for the latest security updates ".

    Clicking on the icon brings up an internet explorer page about something called "pc protection center 2008 ". It also brings up the page every few minutes by itself.

    every few minutes i get a page that is titled "ads by gooochi" which is always some random product.

    my desktop has been changed to blue with letters saying "warning: spyware threat has been detected on your PC. Your computer has several fatal errors do to spyware activity. It is strongly recommended you install antivirus software to close all vulnerabilities. "

    every once in a while my desktop blinks; all the icons disappear and then come back again.

    my task manager has been disabled, and my computer is running a little slow.

    Ad-Aware doesn't find anything, PC Tools Antivirus doesn't find anything, and Windows malicious software removal tool doesn't find anything. I have made sure they are updated.

    I don't know if this has anything to do with it, but I just updated to Firefox 3. (firefox is my usual browser.) If you can help, i would be very grateful.
    I am using windows xp home.

    (edit) sorry, i guess i didn't read all the rules. here's the hijack this log:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:55:17 PM, on 9/10/2008
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16705)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\wdfmgr.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\uesiuqcr.exe
    C:\WINDOWS\System32\alg.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\WINDOWS\system32\pwinqmdm.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
    C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\PC Tools AntiVirus\PCTAV.exe
    C:\WINDOWS\System32\Rundll32.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\NETGEAR WG311v2 Adapter\wlancfg5.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    C:\WINDOWS\system32\wbem\wmiprvse.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://safesearch.cyberdefender.com/smallsearch.html
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://red.clientapps.yahoo.com/customize/ie/defaults/sp/sbcydsl/*http://www.yahoo.com
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/cus.../sbcydsl/*http://www.yahoo.com/search/ie.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://ads.gooochi.biz/bc/123kah.php
    F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\uesiuqcr.exe,
    O2 - BHO: {0baed8ed-3fa8-44fb-d784-05a8cdf7e330} - {033e7fdc-8a50-487d-bf44-8af3de8deab0} - C:\WINDOWS\system32\vaxiftmy.dll (file missing)
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {0C18A986-1943-1AB4-3421-4D71C20497EE} - C:\WINDOWS\system32\mwzc.dll (file missing)
    O2 - BHO: (no name) - {158A95B4-1F79-3B06-78BF-0424CDB17C2E} - (no file)
    O2 - BHO: getsn32.msiesn - {2D9F1530-0B38-4DCB-A90A-CECD559F3514} - C:\WINDOWS\system32\getsn32.dll
    O2 - BHO: gooochi browser enhancer - {64d337c2-dd69-5e2a-0d57-839399699522} - C:\WINDOWS\system32\ciopcvwowssvrtmim.dll
    O2 - BHO: (no name) - {8FB5B012-E8CB-46cd-B6D2-ED428FAE9043} - (no file)
    O2 - BHO: (no name) - {D7D8E074-4118-4866-967E-59D3C3CB6A4D} - C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\System.EnterpriseSe#\entrdv.dll (file missing)
    O2 - BHO: (no name) - {E9BD0828-1FD9-410C-A50F-43EBE65D310F} - (no file)
    O2 - BHO: (no name) - {F90366A3-DCDB-47B7-86EF-D956D30E3BE7} - C:\WINDOWS\system32\ssqrp.dll (file missing)
    O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe "
    O4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\cli.exe" runtime -Delay
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe "
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [{DB-B8-87-70-ZN}] C:\windows\system32\lpdsrngm.exe CHD003
    O4 - HKLM\..\Run: [plite731] C:\WINDOWS\plite731.exe
    O4 - HKLM\..\Run: [mpglipyh] regsvr32 /u "C:\Documents and Settings\All Users\Application Data\mpglipyh.dll "
    O4 - HKLM\..\Run: [ExploreUpdSched] C:\WINDOWS\system32\pwinqmdm.exe CHD003
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [{6f891898-86a3-b8f8-9ef7-ba3481a2056c}] C:\WINDOWS\System32\Rundll32.exe "C:\WINDOWS\system32\ciopcvwowssvrtmim.dll" DllStub
    O4 - HKLM\..\Run: [PCTAVApp] "C:\Program Files\PC Tools AntiVirus\PCTAV.exe" /MONITORSCAN
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - Startup: Deewoo.lnk = C:\WINDOWS\system32\pwinqmdm.exe
    O4 - Startup: TA_Start.lnk = C:\WINDOWS\system32\lpdsrngm.exe
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MI1933~1\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_03\bin\npjpi142_03.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_03\bin\npjpi142_03.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MI1933~1\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {15AD6789-CDB4-47E1-A9DA-992EE8E6BAD6} - http://static.windupdates.com/cab/DownloadAccess/ie/bridge-c9.cab
    O20 - Winlogon Notify: entrdv - C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\System.EnterpriseSe#\entrdv.dll (file missing)
    O20 - Winlogon Notify: ljjjghi - ljjjghi.dll (file missing)
    O20 - Winlogon Notify: winzzc32 - winzzc32.dll (file missing)
    O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: PC Tools AntiVirus Engine (PCTAVSvc) - PC Tools Research Pty Ltd - C:\Program Files\PC Tools AntiVirus\PCTAVSvc.exe
    O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - c:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe

    --
    End of file - 7185 bytes
     
    Last edited: 2008/09/11
  2. 2008/09/11
    Geri Lifetime Subscription

    Geri Inactive Alumni

    Joined:
    2003/03/02
    Messages:
    4,580
    Likes Received:
    7
    Hi greenarrow3
    Welcome to Windowsbbs

    You have quite the mess here. :eek:

    Please do the following in the order given.

    Download Malwarebytes' Anti-Malware (MBAM) from here or here and save the file to your desktop.

    Double click mbam-setup.exe to install the application.
    • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    • If an update is found, it will download and install the latest version.
    • Once the program has loaded, select 'Perform Quick Scan', then click Scan.
    • The scan may take some time to finish,so please be patient.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Make sure that everything is checked, and click Remove Selected.
    • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Note below)
    • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
    • Post the entire report in your next reply along with a fresh HijackThis log.

    Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.


    Now this.

    Download ComboFix from Here to your Desktop.

    It's best to disable realtime protection applications as they sometimes interfere with the tool.
    Check this link for any applicable programs you may have.
    • Close all open programs and windows
    • Double click combofix.exe and follow the prompts.
    • Vista users right click Combofix.exe and select Run As Administrator.
    • When finished, it shall produce a log for you. Post the Combofix log
    Note: Do not mouseclick combofix's window while its running. That may cause it to stall

    Note - ComboFix may reset a number of Internet Explorer's settings, including making it the default browser.

    Note - Combofix makes some changes when run to prevent autorun/autoplay of ALL CDs, floppies and USB devices, to assist with malware removal & increase security. If this is an issue or makes it difficult for you to use those devices, please ask how to reset it.

    Please post the MBAM log and the Combofix log.

    Thanks
    Geri
     
    Geri,
    #2

  3. to hide this advert.

  4. 2008/09/12
    greenarrow3

    greenarrow3 Inactive Thread Starter

    Joined:
    2008/09/10
    Messages:
    4
    Likes Received:
    0
    wow, it seems to have worked. those two found a lot more than what I was using before. I'm gonna have to post the logs in different replies because it won't let me do them all in one.

    Here is the MBAM log:

    Malwarebytes' Anti-Malware 1.28
    Database version: 1141
    Windows 5.1.2600 Service Pack 3

    9/11/2008 11:53:44 PM
    mbam-log-2008-09-11 (23-53-44).txt

    Scan type: Quick Scan
    Objects scanned: 110071
    Time elapsed: 38 minute(s), 22 second(s)

    Memory Processes Infected: 1
    Memory Modules Infected: 1
    Registry Keys Infected: 36
    Registry Values Infected: 2
    Registry Data Items Infected: 4
    Folders Infected: 15
    Files Infected: 67

    Memory Processes Infected:
    C:\WINDOWS\system32\uesiuqcr.exe (Trojan.FakeAlert) -> Unloaded process successfully.

    Memory Modules Infected:
    C:\WINDOWS\system32\getsn32.dll (Trojan.FakeAlert) -> Delete on reboot.

    Registry Keys Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{033e7fdc-8a50-487d-bf44-8af3de8deab0} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{033e7fdc-8a50-487d-bf44-8af3de8deab0} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\TypeLib\{252874d8-5b00-4b93-a282-4ca656598278} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{e221c81b-e518-4f93-b0d2-14e52065417a} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{2d9f1530-0b38-4dcb-a90a-cecd559f3514} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2d9f1530-0b38-4dcb-a90a-cecd559f3514} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\getsn32.msiesn (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\smwin32.mdr (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\TypeLib\{e6be5e3a-23f3-4ec2-b9b7-bcd9a601f2a3} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{38754e01-ac2e-482b-95fa-f1aee41823c4} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{9f146720-43f3-4fa6-b9e5-4fb13f8c2ffd} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{1601d447-7424-4866-8dcc-acf98a2a41e1} (Adware.BHO) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{ceb9c60d-f0ad-4b73-a3ab-4fc822e38d66} (Adware.BHO) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{ceb9c60d-f0ad-4b73-a3ab-4fc822e38d66} (Adware.BHO) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{1daefcb9-06c8-47c6-8f20-3fb54b244daa} (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{849b9523-785f-4014-9caf-079fb4a74c61} (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{f18f04b0-9cf1-4b93-b004-77a288bee28b} (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Typelib\{c3c0ec2c-2c1c-495c-9ad0-1f0ef833d7b5} (Adware.BHO) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Typelib\{dbba22f6-4f42-436e-8893-b1b73b69d7a4} (Adware.AdSponsor) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{a26503fe-b3b8-4910-a9dc-9cbd25c6b8d6} (Trojan.BHO) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E9BD0828-1FD9-410C-A50F-43EBE65D310F} (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8fb5b012-e8cb-46cd-b6d2-ed428fae9043} (Adware.AdSponsor) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{11b97cf9-c40e-4127-801d-0fe00eb35705} (Adware.AdSponsor) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\winzzc32 (Dialer) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\xpre (Trojan.Downloader) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affltid (Malware.Trace) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IProxyProvider (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\cmdService (Adware.CommAd) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR (Trojan.DNSChanger) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE (Trojan.Downloader) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{64d337c2-dd69-5e2a-0d57-839399699522} (Adware.BHO) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{64d337c2-dd69-5e2a-0d57-839399699522} (Adware.BHO) -> Quarantined and deleted successfully.

    Registry Values Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ExploreUpdSched (Trojan.Agent) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\General\wallpaper (Hijack.Desktop) -> Quarantined and deleted successfully.

    Registry Data Items Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: c:\windows\system32\uesiuqcr.exe -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: system32\uesiuqcr.exe -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\uesiuqcr.exe,) Good: (userinit.exe) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

    Folders Infected:
    C:\WINDOWS\system32\f02WtR (Malware.Trace) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\capcom (Malware.Trace) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\cfig322 (Malware.Trace) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\drvr2 (Malware.Trace) -> Quarantined and deleted successfully.
    C:\Program Files\Common Files\WinAntiSpyware 2007 (Rogue.WinAntiSpyware) -> Quarantined and deleted successfully.
    C:\Program Files\ISM2 (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Program Files\Temporary (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\Program Files\Common Files\WinTools (Trojan.WinTools) -> Quarantined and deleted successfully.
    C:\Program Files\Common Files\WinTools\Update (Trojan.WinTools) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Mike\Start Menu\Programs\Internet Speed Monitor (Adware.AdSponsor) -> Quarantined and deleted successfully.
    C:\Documents and Settings\LocalService\Application Data\NetMon (Trojan.NetMon) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Application Data\SalesMonitor (Rogue.Multiple) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Application Data\SalesMonitor\Data (Rogue.Multiple) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Application Data\WinAntiSpyware 2007 (Rogue.WinAntiSpyware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Application Data\WinAntiSpyware 2007\Data (Rogue.WinAntiSpyware) -> Quarantined and deleted successfully.

    Files Infected:
    C:\WINDOWS\system32\vaxiftmy.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\ansaista.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\atsiasna.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\hsxglphk.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\khplgxsh.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\pkmvewbo.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\obwevmkp.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\qhqmfswu.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\uwsfmqhq.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\tuxqeihn.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\nhieqxut.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\uesiuqcr.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\getsn32.dll (Trojan.FakeAlert) -> Delete on reboot.
    C:\WINDOWS\system32\smwin32.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\WINDOWS\frexup2.exe (Adware.AdSponsor) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\bfkjcsua.dll (Trojan.AVKiller) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\pwinqmdn.exe (Adware.Agent) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\tatyatmq.dll (Trojan.AVKiller) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\gpxibtxb.dll (Trojan.AVKiller) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\eqrondyr.dll (Trojan.AVKiller) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\afninykq.dll (Trojan.AVKiller) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\{f8d8ecd7-3691-1615-2816-60fcb193fd5a}.dll-uninst.exe (Adware.Rotator) -> Quarantined and deleted successfully.
    C:\Program Files\Common Files\Yazzle1122OinUninstaller.exe (Adware.PurityScan) -> Quarantined and deleted successfully.
    C:\Program Files\Common Files\Yazzle1162OinUninstaller.exe (Adware.PurityScan) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Mike\Local Settings\Temp\mainti2.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Mike\Local Settings\Temporary Internet Files\Content.IE5\LTGFCNK0\mainti2[1].exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\f02WtR\f02WtR1065.exe (Malware.Trace) -> Quarantined and deleted successfully.
    C:\Program Files\Common Files\WinAntiSpyware 2007\err.log (Rogue.WinAntiSpyware) -> Quarantined and deleted successfully.
    C:\Program Files\ISM2\cringupd.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Program Files\ISM2\dictionary.gz (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Program Files\ISM2\ISMPack8.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Program Files\ISM2\targets.gz (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Program Files\Common Files\WinTools\WToolsC.cfg (Trojan.WinTools) -> Quarantined and deleted successfully.
    C:\Program Files\Common Files\WinTools\WToolsP.cfg (Trojan.WinTools) -> Quarantined and deleted successfully.
    C:\Program Files\Common Files\WinTools\WToolsR.cfg (Trojan.WinTools) -> Quarantined and deleted successfully.
    C:\Program Files\Common Files\WinTools\WToolsU.cfg (Trojan.WinTools) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Mike\Start Menu\Programs\Internet Speed Monitor\Check Now.lnk (Adware.AdSponsor) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Mike\Start Menu\Programs\Internet Speed Monitor\Uninstall.lnk (Adware.AdSponsor) -> Quarantined and deleted successfully.
    C:\Documents and Settings\LocalService\Application Data\NetMon\domains.txt (Trojan.NetMon) -> Quarantined and deleted successfully.
    C:\Documents and Settings\LocalService\Application Data\NetMon\log.txt (Trojan.NetMon) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Application Data\WinAntiSpyware 2007\Data\Abbr (Rogue.WinAntiSpyware) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Application Data\WinAntiSpyware 2007\Data\ProductCode (Rogue.WinAntiSpyware) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\winzzc32.dll (Dialer) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\mcrh.tmp (Malware.Trace) -> Quarantined and deleted successfully.
    C:\WINDOWS\default.htm (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\WINDOWS\loader.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\WINDOWS\cookies.ini (Malware.Trace) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\winpfz33.sys (Malware.Trace) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\pwinqmdm.exe (Trojan.Agent) -> Delete on reboot.
    C:\WINDOWS\system32\zxdnt3d.cfg. (Adware.ZenoSearch) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\pac.txt (Malware.Trace) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\msnav32.ax (Malware.Trace) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\zxdnt3d.cfg (Malware.Trace) -> Quarantined and deleted successfully.
    C:\WINDOWS\pskt.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\BMefde8b43.xml (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\BMefde8b43.txt (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\ldinfo.ldr (Malware.Trace) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\ClickToFindandFixErrors_US.ico (Malware.Trace) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Mike\Local Settings\Temp\snapsnet.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Mike\Local Settings\Temp\rasesnet.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Mike\Local Settings\Temp\winvsnet.exe (Rogue.Installer) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Your Doom!\Start Menu\Programs\Startup\Deewoo.lnk (Malware.Links) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Mike\Start Menu\Programs\Startup\Deewoo.lnk (Malware.Links) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Mike\Desktop\Click to Find and Fix Errors.url (Rogue.Link) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Your Doom!\Start Menu\Programs\Startup\TA_Start.lnk (Malware.Trace) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Mike\Start Menu\Programs\Startup\TA_Start.lnk (Malware.Trace) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\ciopcvwowssvrtmim.dll (Adware.BHO) -> Delete on reboot.
     
  5. 2008/09/12
    greenarrow3

    greenarrow3 Inactive Thread Starter

    Joined:
    2008/09/10
    Messages:
    4
    Likes Received:
    0
    And here is the ComboFix log:

    ComboFix 08-09-10.04 - Your Doom! 2008-09-12 0:14:24.1 - NTFSx86
    Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.494 [GMT -7:00]
    Running from: C:\Documents and Settings\Your Doom!\Desktop\ComboFix.exe
    * Created a new restore point
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Windows Media\10.0\WMSDKNSD.XML
    C:\Documents and Settings\Mike\Application Data\APPATC~1
    C:\Documents and Settings\Mike\Application Data\ASKS~1
    C:\Documents and Settings\Mike\Application Data\DOBE~1
    C:\Documents and Settings\Mike\Application Data\SCURIT~1
    C:\Documents and Settings\Mike\Application Data\SEMBLY~1
    C:\Documents and Settings\Mike\Application Data\STEM~1
    C:\Documents and Settings\Mike\Cookies\mike@mygeek[1].txt
    C:\Documents and Settings\Mike\gside.exe
    C:\Documents and Settings\Mike\My Documents\CROSOF~1
    C:\Documents and Settings\Your Doom!\Cookies\your_doom!@ad.yieldmanager[1].txt
    C:\Documents and Settings\Your Doom!\Cookies\your_doom!@ad.yieldmanager[2].txt
    C:\Documents and Settings\Your Doom!\Cookies\your_doom!@ad.yieldmanager[4].txt
    C:\Documents and Settings\Your Doom!\Cookies\your_doom!@fastclick[2].txt
    C:\Documents and Settings\Your Doom!\Cookies\your_doom!@rotator.its.adjuggler[2].txt
    C:\Documents and Settings\Your Doom!\Cookies\your_doom!@trafficmp[1].txt
    C:\Documents and Settings\Your Doom!\Cookies\your_doom!@trafficmp[2].txt
    C:\Documents and Settings\Your Doom!\Local Settings\Application Data\Microsoft\Windows Media\10.0\WMSDKNSD.XML
    C:\Documents and Settings\Your Doom!\Start Menu\Programs\Startup\ta_start.lnk
    C:\Program Files\Common Files\dobe~1
    C:\Program Files\Common Files\sstem~1
    C:\Program Files\Common Files\ymbols~1
    C:\Program Files\fnts~1
    C:\Program Files\iMeshBar
    C:\Program Files\iMeshBar\bar\History\search
    C:\Temp\1cb
    C:\Temp\1cb\syscheck.log
    C:\Temp\abW9
    C:\Temp\abW9\tPho.log
    C:\Temp\fse
    C:\Temp\fse\tmpZTF.log
    C:\WINDOWS\curity~1
    C:\WINDOWS\IA
    C:\WINDOWS\icroso~1.net
    C:\WINDOWS\mbols~1
    C:\WINDOWS\scurit~1
    C:\WINDOWS\smbols~1
    C:\WINDOWS\stem~1
    C:\WINDOWS\system32\abxjhifg.ini
    C:\WINDOWS\system32\acveudmq.ini
    C:\WINDOWS\system32\ahhupeil.ini
    C:\WINDOWS\system32\amlergdx.ini
    C:\WINDOWS\system32\asks~1
    C:\WINDOWS\system32\aylhbtio.ini
    C:\WINDOWS\system32\baqbevne.ini
    C:\WINDOWS\system32\bgipxitk.ini
    C:\WINDOWS\system32\bhlhougv.ini
    C:\WINDOWS\system32\bhrkuabv.ini
    C:\WINDOWS\system32\blyqnrvi.ini
    C:\WINDOWS\system32\bmnotpis.ini
    C:\WINDOWS\system32\bsrjccpu.ini
    C:\WINDOWS\system32\bydrascl.ini
    C:\WINDOWS\system32\cbnpahrc.ini
    C:\WINDOWS\system32\cbtpaiob.ini
    C:\WINDOWS\system32\ceyiwnlg.ini
    C:\WINDOWS\system32\cfrnmneg.ini
    C:\WINDOWS\system32\cifvqaff.ini
    C:\WINDOWS\system32\cjntnboy.ini
    C:\WINDOWS\system32\cotovmat.ini
    C:\WINDOWS\system32\cqsaqktx.ini
    C:\WINDOWS\system32\cqxclmby.ini
    C:\WINDOWS\system32\cvrbowst.ini
    C:\WINDOWS\system32\cygffkdc.ini
    C:\WINDOWS\system32\cyyvrhlj.ini
    C:\WINDOWS\system32\deksfctm.ini
    C:\WINDOWS\system32\diurpoel.ini
    C:\WINDOWS\system32\dndspdkm.ini
    C:\WINDOWS\system32\dnjqpeek.ini
    C:\WINDOWS\system32\dpbkkbok.ini
    C:\WINDOWS\system32\dufllqwq.ini
    C:\WINDOWS\system32\dwdsrngt.exe
    C:\WINDOWS\system32\edjijfhj.ini
    C:\WINDOWS\system32\emmgegkm.ini
    C:\WINDOWS\system32\esadrfkb.ini
    C:\WINDOWS\system32\feounmhx.ini
    C:\WINDOWS\system32\fjmbdowl.ini
    C:\WINDOWS\system32\fqpwoirr.ini
    C:\WINDOWS\system32\fytgxtlq.ini
    C:\WINDOWS\system32\gesdwflx.ini
    C:\WINDOWS\system32\gijyslfj.ini
    C:\WINDOWS\system32\gkiintof.ini
    C:\WINDOWS\system32\gqbbamjh.ini
    C:\WINDOWS\system32\gtqkvont.ini
    C:\WINDOWS\system32\guxpvqel.ini
    C:\WINDOWS\system32\gvahpbrv.ini
    C:\WINDOWS\system32\gvwtpxnq.ini
    C:\WINDOWS\system32\hcooldth.ini
    C:\WINDOWS\system32\hcvvighw.ini
    C:\WINDOWS\system32\hdlqjcwl.ini
    C:\WINDOWS\system32\heorkfxv.ini
    C:\WINDOWS\system32\hhnsjwap.ini
    C:\WINDOWS\system32\hihcugkn.ini
    C:\WINDOWS\system32\hnlxymeo.ini
    C:\WINDOWS\system32\hvmtkkui.ini
    C:\WINDOWS\system32\hyktsajl.ini
    C:\WINDOWS\system32\hyubehhd.ini
    C:\WINDOWS\system32\ibovnspa.ini
    C:\WINDOWS\system32\icroso~1
    C:\WINDOWS\system32\ieekhlco.ini
    C:\WINDOWS\system32\ihmdtggf.ini
    C:\WINDOWS\system32\imqfxsnh.ini
    C:\WINDOWS\system32\ioqrjanq.ini
    C:\WINDOWS\system32\iqvtffwj.ini
    C:\WINDOWS\system32\irvilshg.ini
    C:\WINDOWS\system32\isfksncv.ini
    C:\WINDOWS\system32\isjwqmtf.ini
    C:\WINDOWS\system32\jdwrugys.ini
    C:\WINDOWS\system32\jeqgigtn.ini
    C:\WINDOWS\system32\jgficlew.ini
    C:\WINDOWS\system32\jimnrgvv.ini
    C:\WINDOWS\system32\jopbwcqa.ini
    C:\WINDOWS\system32\joymcxqp.ini
    C:\WINDOWS\system32\jwsaldnw.dll
    C:\WINDOWS\system32\kbvbgbni.ini
    C:\WINDOWS\system32\kejvqptp.ini
    C:\WINDOWS\system32\khqrfhsq.ini
    C:\WINDOWS\system32\kjanuwjg.ini
    C:\WINDOWS\system32\kppkdmgr.ini
    C:\WINDOWS\system32\kprqqewi.ini
    C:\WINDOWS\system32\kvbqittt.ini
    C:\WINDOWS\system32\kxsslorg.ini
    C:\WINDOWS\system32\lcbnsguu.ini
    C:\WINDOWS\system32\lfbvdpsp.ini
    C:\WINDOWS\system32\lkxpddsg.dll
    C:\WINDOWS\system32\lmipywuo.ini
    C:\WINDOWS\system32\lrexghgt.ini
    C:\WINDOWS\system32\ltlnvvit.ini
    C:\WINDOWS\system32\ltvvjgbb.ini
    C:\WINDOWS\system32\mckuhvrw.ini
    C:\WINDOWS\system32\mdsryrhd.dll
    C:\WINDOWS\system32\mgdcacbg.ini
    C:\WINDOWS\system32\mgwpewey.ini
    C:\WINDOWS\system32\mkoorlrl.ini
    C:\WINDOWS\system32\mlabyatg.ini
    C:\WINDOWS\system32\mldecxvk.ini
    C:\WINDOWS\system32\mnbjunoh.ini
    C:\WINDOWS\system32\mrlafxwl.ini
    C:\WINDOWS\system32\MSINET.oca
    C:\WINDOWS\system32\msphfqpj.ini
    C:\WINDOWS\system32\msymfbih.ini
    C:\WINDOWS\system32\mxqjsmnq.ini
    C:\WINDOWS\system32\myrlfdrb.ini
    C:\WINDOWS\system32\nhjuracq.ini
    C:\WINDOWS\system32\npjhfpfq.ini
    C:\WINDOWS\system32\nsjkghup.ini
    C:\WINDOWS\system32\nundxpdt.ini
    C:\WINDOWS\system32\nuyivhfi.ini
    C:\WINDOWS\system32\okuoqafo.ini
    C:\WINDOWS\system32\oplympca.ini
    C:\WINDOWS\system32\orapvgoy.ini
    C:\WINDOWS\system32\ormwkshi.ini
    C:\WINDOWS\system32\osvdogsd.ini
    C:\WINDOWS\system32\otiosxsk.ini
    C:\WINDOWS\system32\otprtthe.ini
    C:\WINDOWS\system32\oumnlbnk.ini
    C:\WINDOWS\system32\pebcnypt.ini
    C:\WINDOWS\system32\pepvowmy.ini
    C:\WINDOWS\system32\pljwlyyj.ini
    C:\WINDOWS\system32\plmlrsvp.ini
    C:\WINDOWS\system32\ppbocrnr.dll
    C:\WINDOWS\system32\pquxldjb.ini
    C:\WINDOWS\system32\prqss.bak1
    C:\WINDOWS\system32\prqss.bak2
    C:\WINDOWS\system32\prqss.ini
    C:\WINDOWS\system32\prqss.tmp
    C:\WINDOWS\system32\prqss.tmp2
    C:\WINDOWS\system32\psgsplbn.ini
    C:\WINDOWS\system32\pvsunicg.ini
    C:\WINDOWS\system32\qanwlkex.ini
    C:\WINDOWS\system32\qeiycdob.ini
    C:\WINDOWS\system32\qjhnqcci.ini
    C:\WINDOWS\system32\qnihoqtq.ini
    C:\WINDOWS\system32\qsqgnskm.ini
    C:\WINDOWS\system32\qsthwtqk.ini
    C:\WINDOWS\system32\qtvpgwij.ini
    C:\WINDOWS\system32\qxhuhiat.ini
    C:\WINDOWS\system32\qympnfsk.ini
    C:\WINDOWS\system32\racle~1
    C:\WINDOWS\system32\rahwvwvh.ini
    C:\WINDOWS\system32\rdlummvw.ini
    C:\WINDOWS\system32\rkksuole.ini
    C:\WINDOWS\system32\rMa02yy
    C:\WINDOWS\system32\rMa02yy\rMa02yy1099.exe
    C:\WINDOWS\system32\rpwuancv.ini
    C:\WINDOWS\system32\rrvkpqkp.ini
    C:\WINDOWS\system32\rydkffgk.ini
    C:\WINDOWS\system32\scdsuoso.ini
    C:\WINDOWS\system32\siukhplx.ini
    C:\WINDOWS\system32\sjhpkcpf.ini
    C:\WINDOWS\system32\sjygjoqh.ini
    C:\WINDOWS\system32\skbvutpd.ini
    C:\WINDOWS\system32\sks~1
    C:\WINDOWS\system32\srgqmdap.ini
    C:\WINDOWS\system32\sxbgptad.ini
    C:\WINDOWS\system32\sxdihnxf.ini
    C:\WINDOWS\system32\tddumfwe.ini
    C:\WINDOWS\system32\tfypfdfv.ini
    C:\WINDOWS\system32\tgjgjbbw.ini
    C:\WINDOWS\system32\tpxfopkr.ini
    C:\WINDOWS\system32\tsks~1
    C:\WINDOWS\system32\twrbilqk.ini
    C:\WINDOWS\system32\ufxxkogu.ini
    C:\WINDOWS\system32\ufyptsuc.ini
    C:\WINDOWS\system32\ulbhirnq.ini
    C:\WINDOWS\system32\ulyoqmiw.ini
    C:\WINDOWS\system32\utpsbjae.ini
    C:\WINDOWS\system32\uwhpaxfy.ini
    C:\WINDOWS\system32\vbrcdqvw.ini
    C:\WINDOWS\system32\vfnrkjbh.ini
    C:\WINDOWS\system32\vfuipqym.ini
    C:\WINDOWS\system32\vijxxrbx.ini
    C:\WINDOWS\system32\vkhomiut.ini
    C:\WINDOWS\system32\vkvtnjmg.ini
    C:\WINDOWS\system32\vslrvoxq.ini
    C:\WINDOWS\system32\vsmmxjif.ini
    C:\WINDOWS\system32\vtqdxlrp.ini
    C:\WINDOWS\system32\vufwwjab.ini
    C:\WINDOWS\system32\wgjxaxbf.ini
    C:\WINDOWS\system32\whdpfkqq.ini
    C:\WINDOWS\system32\whumhxou.ini
    C:\WINDOWS\system32\winpfz32.sys
    C:\WINDOWS\system32\wkeqcxov.ini
    C:\WINDOWS\system32\wldplbiw.ini
    C:\WINDOWS\system32\wnscpicomsv.exe
    C:\WINDOWS\system32\wqulhkkb.ini
    C:\WINDOWS\system32\wteqmbul.ini
    C:\WINDOWS\system32\xjtnqvjp.ini
    C:\WINDOWS\system32\xluiqxpa.ini
    C:\WINDOWS\system32\xohwjmjp.ini
    C:\WINDOWS\system32\xtpssvqc.ini
    C:\WINDOWS\system32\xvmuikfn.dll
    C:\WINDOWS\system32\ybqraoeu.ini
    C:\WINDOWS\system32\ydccsyty.ini
    C:\WINDOWS\system32\ydceldyc.ini
    C:\WINDOWS\system32\yfdujaet.ini
    C:\WINDOWS\system32\ykknfepg.ini
    C:\WINDOWS\system32\yktbvuqp.ini
    C:\WINDOWS\system32\ymllrrnl.ini
    C:\WINDOWS\system32\ynmxxkfn.ini
    C:\WINDOWS\system32\yoqqrege.ini
    C:\WINDOWS\system32\yrbmtlnd.ini
    C:\WINDOWS\system32\ytsrmrom.ini
    C:\WINDOWS\ystem~1
    D:\Autorun.inf

    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    -------\Legacy_FOPN


    ((((((((((((((((((((((((( Files Created from 2008-08-12 to 2008-09-12 )))))))))))))))))))))))))))))))
    .

    2008-09-11 23:13 . 2008-09-11 23:13 <DIR> d----c--- C:\Documents and Settings\Your Doom!\Application Data\Malwarebytes
    2008-09-11 23:12 . 2008-09-11 23:13 <DIR> d----c--- C:\Program Files\Malwarebytes' Anti-Malware
    2008-09-11 23:12 . 2008-09-11 23:12 <DIR> d----c--- C:\Documents and Settings\All Users\Application Data\Malwarebytes
    2008-09-11 23:12 . 2008-09-10 00:04 38,528 --a--c--- C:\WINDOWS\system32\drivers\mbamswissarmy.sys
    2008-09-11 23:12 . 2008-09-10 00:03 17,200 --a--c--- C:\WINDOWS\system32\drivers\mbam.sys
    2008-09-10 22:54 . 2008-09-10 22:54 <DIR> d----c--- C:\Program Files\Trend Micro
    2008-09-09 01:09 . 2008-09-09 01:09 <DIR> d----c--- C:\WINDOWS\system32\scripting
    2008-09-09 01:09 . 2008-09-09 01:09 <DIR> d----c--- C:\WINDOWS\system32\en
    2008-09-09 01:09 . 2008-09-09 01:09 <DIR> d----c--- C:\WINDOWS\system32\bits
    2008-09-09 01:09 . 2008-09-09 01:09 <DIR> d----c--- C:\WINDOWS\l2schemas
    2008-09-09 01:04 . 2008-09-09 01:10 <DIR> d----c--- C:\WINDOWS\ServicePackFiles
    2008-09-09 00:55 . 2008-09-09 00:55 <DIR> d----c--- C:\WINDOWS\EHome
    2008-09-08 23:21 . 2004-08-03 22:41 1,309,184 -----c--- C:\WINDOWS\system32\drivers\mtlstrm.sys
    2008-09-08 23:21 . 2004-08-03 22:41 1,041,536 -----c--- C:\WINDOWS\system32\drivers\hsfdpsp2.sys
    2008-09-08 23:21 . 2004-08-03 22:41 685,056 -----c--- C:\WINDOWS\system32\drivers\hsfcxts2.sys
    2008-09-08 23:21 . 2004-08-03 22:29 452,736 -----c--- C:\WINDOWS\system32\drivers\mtxparhm.sys
    2008-09-08 23:21 . 2004-08-03 22:41 220,032 -----c--- C:\WINDOWS\system32\drivers\hsfbs2s2.sys
    2008-09-08 23:21 . 2004-08-03 22:41 180,360 -----c--- C:\WINDOWS\system32\drivers\ntmtlfax.sys
    2008-09-08 23:21 . 2004-07-17 22:55 129,045 -----c--- C:\WINDOWS\system32\drivers\cxthsfs2.cty
    2008-09-08 23:21 . 2004-08-03 22:41 126,686 -----c--- C:\WINDOWS\system32\drivers\mtlmnt5.sys
    2008-09-08 23:21 . 2004-07-17 11:35 67,866 -----c--- C:\WINDOWS\system32\drivers\netwlan5.img
    2008-09-08 23:21 . 2004-08-03 22:41 11,868 -----c--- C:\WINDOWS\system32\drivers\mdmxsdk.sys
    2008-09-08 22:14 . 2008-09-08 22:14 <DIR> d----c--- C:\Documents and Settings\Your Doom!\Application Data\PC Tools
    2008-09-08 22:13 . 2008-09-12 00:33 <DIR> d----c--- C:\Program Files\PC Tools AntiVirus
    2008-09-08 22:13 . 2008-09-08 22:13 <DIR> d----c--- C:\Program Files\Common Files\PC Tools
    2008-09-08 22:13 . 2008-09-12 00:33 <DIR> d-a--c--- C:\Documents and Settings\All Users\Application Data\TEMP
    2008-09-08 22:13 . 2008-09-08 22:14 <DIR> d----c--- C:\Documents and Settings\All Users\Application Data\PC Tools
    2008-09-08 22:13 . 2007-12-06 15:51 28,568 --a--c--- C:\WINDOWS\system32\drivers\AVHook.sys
    2008-09-08 22:13 . 2007-12-06 15:51 21,912 --a--c--- C:\WINDOWS\system32\drivers\AVRec.sys
    2008-09-08 22:13 . 2008-02-12 10:44 21,904 --a--c--- C:\WINDOWS\system32\drivers\AVFilter.sys
    2008-09-08 21:32 . 2008-09-08 21:32 <DIR> d----c--- C:\Documents and Settings\Your Doom!\Application Data\Viewpoint
    2008-09-08 21:24 . 2008-09-08 21:24 73 --a--c--- C:\WINDOWS\st_affiliate.ini
    2008-09-08 21:16 . 2008-09-08 21:20 <DIR> d----c--- C:\Documents and Settings\All Users\Application Data\Lavasoft
    2008-09-08 21:15 . 2008-09-08 21:15 <DIR> d----c--- C:\Program Files\Common Files\Wise Installation Wizard
    2008-09-08 20:38 . 2008-09-08 20:38 <DIR> d----c--- C:\Documents and Settings\Your Doom!\Application Data\Lavasoft
    2008-09-08 20:29 . 2008-06-13 04:05 272,128 -----c--- C:\WINDOWS\system32\dllcache\bthport.sys
    2008-09-08 20:29 . 2008-05-08 07:02 203,136 -----c--- C:\WINDOWS\system32\dllcache\rmcast.sys
    2008-09-08 20:28 . 2008-04-11 12:04 691,712 -----c--- C:\WINDOWS\system32\dllcache\inetcomm.dll
    2008-09-08 20:28 . 2008-05-01 07:33 331,776 -----c--- C:\WINDOWS\system32\dllcache\msadce.dll
    2008-09-08 20:26 . 2008-09-08 20:26 <DIR> d----c--- C:\Documents and Settings\Your Doom!\Application Data\ATI
    2008-09-08 20:25 . 2004-10-20 07:47 <DIR> d----c--- C:\Documents and Settings\Your Doom!\WINDOWS
    2008-09-08 20:25 . 2004-10-21 03:13 <DIR> d----c--- C:\Documents and Settings\Your Doom!\Application Data\Symantec
    2008-09-08 20:25 . 2004-10-20 23:40 <DIR> d----c--- C:\Documents and Settings\Your Doom!\Application Data\Sonic
    2008-09-08 20:25 . 2004-10-20 23:40 <DIR> d----c--- C:\Documents and Settings\Your Doom!\Application Data\SampleView
    2008-09-08 20:25 . 2004-10-20 07:31 <DIR> d----c--- C:\Documents and Settings\Your Doom!\Application Data\Intervideo
    2008-09-08 20:25 . 2004-10-20 07:47 <DIR> d----c--- C:\Documents and Settings\Your Doom!\Application Data\Apple Computer
    2008-09-08 20:25 . 2008-09-09 05:51 <DIR> d----c--- C:\Documents and Settings\Your Doom!
    2008-09-08 20:07 . 2004-10-20 07:47 <DIR> d----c--- C:\Documents and Settings\Administrator\WINDOWS
    2008-09-08 20:07 . 2004-10-21 03:13 <DIR> d----c--- C:\Documents and Settings\Administrator\Application Data\Symantec
    2008-09-08 20:07 . 2004-10-20 23:40 <DIR> d----c--- C:\Documents and Settings\Administrator\Application Data\Sonic
    2008-09-08 20:07 . 2004-10-20 23:40 <DIR> d----c--- C:\Documents and Settings\Administrator\Application Data\SampleView
    2008-09-08 20:07 . 2004-10-20 07:31 <DIR> d----c--- C:\Documents and Settings\Administrator\Application Data\Intervideo
    2008-09-08 20:07 . 2004-10-20 07:47 <DIR> d----c--- C:\Documents and Settings\Administrator\Application Data\Apple Computer
    2008-09-08 20:07 . 2008-09-08 20:07 <DIR> d----c--- C:\Documents and Settings\Administrator

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2008-09-09 04:19 --------- dc----w C:\Program Files\Lavasoft
    2008-09-09 04:19 --------- dc----w C:\Documents and Settings\Mike\Application Data\Lavasoft
    2008-09-09 04:05 --------- dc-h--w C:\Program Files\InstallShield Installation Information
    2008-09-09 04:05 --------- dc----w C:\Program Files\Viewpoint
    2008-09-09 04:05 --------- dc----w C:\Documents and Settings\All Users\Application Data\Viewpoint
    2008-09-09 03:23 --------- dc----w C:\Program Files\DV TS
    2008-09-09 03:22 --------- dc----w C:\Program Files\Yahoo!
    2008-09-09 03:22 --------- dc----w C:\Documents and Settings\All Users\Application Data\Yahoo!
    2008-09-09 03:21 --------- dc----w C:\Program Files\Common Files\Scanner
    2008-08-20 07:48 1,310 -c--a-w C:\Documents and Settings\Mike\Application Data\wklnhst.dat
    2008-07-26 06:41 --------- dc----w C:\Program Files\Creative
    2008-07-26 06:38 --------- dc----w C:\Documents and Settings\All Users\Application Data\Creative
    2008-07-16 16:47 --------- dc----w C:\Documents and Settings\Mike\Application Data\U3
    2008-05-03 19:58 399,406 -c--a-w C:\Documents and Settings\Mike\g96.exe
    2004-07-02 19:19 40,960 -c--a-w C:\WINDOWS\inf\WG311v2\imdinst.exe
    2004-06-18 06:41 386,688 -c--a-w C:\WINDOWS\inf\WG311v2\netwg311_XP.sys
    2004-04-04 20:07 84,912 -c--a-w C:\WINDOWS\inf\WG311v2\FwRad17.bin
    2004-04-04 20:07 83,320 -c--a-w C:\WINDOWS\inf\WG311v2\FwRad16.bin
    2004-02-04 19:53 62,865 -c--a-w C:\WINDOWS\inf\WG311v2\odysseyIM3.sys
    2004-02-04 19:53 12,739 -c--a-w C:\WINDOWS\inf\WG311v2\odNetInstall.dll
    2006-11-27 01:13 962,939 -csh--w C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\System.EnterpriseSe#\vdrtne.bak1
    2006-12-14 09:37 1,011,675 -csh--w C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\System.EnterpriseSe#\vdrtne.bak2
    2006-12-14 09:40 1,007,766 -csh--w C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\System.EnterpriseSe#\vdrtne.ini2
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ctfmon.exe "= "C:\WINDOWS\system32\ctfmon.exe" [2008-04-13 15360]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ATIPTA "= "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-08-05 344064]
    "ATICCC "= "C:\Program Files\ATI Technologies\ATI.ACE\cli.exe" [2006-01-02 45056]
    "iTunesHelper "= "C:\Program Files\iTunes\iTunesHelper.exe" [2006-10-30 256576]
    "QuickTime Task "= "C:\Program Files\QuickTime\qttask.exe" [2006-10-25 282624]
    "{DB-B8-87-70-ZN} "= "C:\windows\system32\lpdsrngm.exe" [2007-12-27 52757]
    "TkBellExe "= "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" [2008-05-25 185632]
    "PCTAVApp "= "C:\Program Files\PC Tools AntiVirus\PCTAV.exe" [2008-07-23 1259408]

    C:\Documents and Settings\Your Doom!\Start Menu\Programs\Startup\
    TA_Start.lnk - C:\WINDOWS\system32\lpdsrngm.exe [2007-12-27 52757]

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
    backup=C:\WINDOWS\pss\Adobe Reader Speed Launch.lnkCommon Startup

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Compaq Connections.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Compaq Connections.lnk
    backup=C:\WINDOWS\pss\Compaq Connections.lnkCommon Startup

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^NETGEAR WG311v2 Smart Configuration.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\NETGEAR WG311v2 Smart Configuration.lnk
    backup=C:\WINDOWS\pss\NETGEAR WG311v2 Smart Configuration.lnkCommon Startup

    [HKLM\~\startupfolder\C:^Documents and Settings^Mike^Start Menu^Programs^Startup^PowerReg Scheduler V3.exe]
    path=C:\Documents and Settings\Mike\Start Menu\Programs\Startup\PowerReg Scheduler V3.exe
    backup=C:\WINDOWS\pss\PowerReg Scheduler V3.exeStartup

    [HKLM\~\startupfolder\C:^Documents and Settings^Mike^Start Menu^Programs^Startup^wkcalrem.LNK]
    path=C:\Documents and Settings\Mike\Start Menu\Programs\Startup\wkcalrem.LNK
    backup=C:\WINDOWS\pss\wkcalrem.LNKStartup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ATIPTA]
    --a------ 2005-08-05 21:05 344064 C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
    --a--c--- 2008-04-13 17:12 15360 C:\WINDOWS\system32\ctfmon.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\EPSON Stylus C80 Series]
    --a--c--- 2001-10-04 03:01 69632 C:\WINDOWS\system32\spool\drivers\w32x86\3\E_A10IC2.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\hpsysdrv]
    --a--c--- 1998-05-07 16:04 52736 c:\WINDOWS\system\hpsysdrv.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IgfxTray]
    --a--c--- 2004-08-20 22:55 155648 C:\WINDOWS\system32\igfxtray.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
    --a--c--- 2006-10-30 10:36 256576 C:\Program Files\iTunes\iTunesHelper.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\KBD]
    --a--c--- 2003-02-11 20:02 61440 C:\hp\KBD\kbd.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LSBWatcher]
    --a--c--- 2004-10-14 21:54 253952 c:\hp\drivers\hplsbwatcher\LSBurnWatcher.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
    -----c--- 2008-04-13 17:12 1695232 C:\Program Files\Messenger\msmsgs.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PS2]
    --a--c--- 2003-09-12 20:13 98304 C:\WINDOWS\system32\ps2.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
    --a--c--- 2006-10-25 19:58 282624 C:\Program Files\QuickTime\qttask.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Recguard]
    --a--c--- 2004-04-14 20:43 233472 C:\WINDOWS\SMINST\Recguard.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Reminder]
    --a--c--- 2003-12-18 00:31 118784 C:\WINDOWS\CREATOR\Remind_XP.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
    --a--c--- 2004-10-20 06:39 32881 C:\Program Files\Java\j2re1.4.2_03\bin\jusched.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Symantec NetDriver Monitor]
    --a--c--- 2005-04-15 15:27 95960 C:\PROGRA~1\SYMNET~1\SNDMon.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
    --a--c--- 2008-05-25 23:43 185632 C:\Program Files\Common Files\Real\Update_OB\realsched.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AGRSMMSG]
    --a--c--- 2005-03-04 12:01 88209 C:\WINDOWS\AGRSMMSG.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AlcxMonitor]
    --a--c--- 2004-09-07 20:47 57344 C:\WINDOWS\ALCXMNTR.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SiSPower]
    --a--c--- 2004-09-24 09:49 49152 C:\WINDOWS\system32\SiSPower.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\VTTimer]
    --a--c--- 2004-10-22 11:53 53248 C:\WINDOWS\system32\VTTimer.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
    "DisableMonitoring "=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "C:\\Program Files\\Compaq Connections\\6750491\\Program\\Compaq Connections.exe "=
    "C:\\Program Files\\World of Warcraft\\WoW-1.6.0-enUS-downloader.exe "=
    "C:\\Program Files\\World of Warcraft\\WoW-1.6.0.4500-to-1.6.1-enUS-downloader.exe "=
    "C:\\Program Files\\World of Warcraft\\WoW-1.6.1.4544-to-1.7.0-enUS-downloader.exe "=
    "C:\\Program Files\\World of Warcraft\\WoW-1.7.1.4695-to-1.8.0-enUS-downloader.exe "=
    "C:\\Program Files\\World of Warcraft\\WoW-1.8.3.4807-to-1.8.4.4878-enUS-downloader.exe "=
    "C:\\Program Files\\World of Warcraft\\WoW-1.8.4.4878-to-1.9.0.4937-enUS-downloader.exe "=
    "C:\\Program Files\\World of Warcraft\\BackgroundDownloader.exe "=
    "C:\\Program Files\\World of Warcraft\\WoW.exe "=
    "C:\\Program Files\\World of Warcraft\\Launcher.exe "=
    "C:\\Program Files\\iTunes\\iTunes.exe "=
    "C:\\Program Files\\NETGEAR WG311v2 Adapter\\wlancfg5.exe "=
    "C:\\Program Files\\Mozilla Firefox\\firefox.exe "=
    "C:\\WINDOWS\\system32\\sessmgr.exe "=
    "C:\\Program Files\\WinMX\\WinMX.exe "=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe "=
    "%windir%\\system32\\sessmgr.exe "=

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
    "6112:TCP "= 6112:TCP:*:Disabled:gw.exe
    "3724:TCP "= 3724:TCP:blizzardbackrounddownloader
    "6112:UDP "= 6112:UDP:blizzardbackrounddownloader
    "6881:TCP "= 6881:TCP:blizzardbackrounddownloader
    "25:TCP "= 25:TCP:a
    "80:TCP "= 80:TCP:b
    "110:TCP "= 110:TCP:a2
    "443:TCP "= 443:TCP:a3
    "50000:UDP "= 50000:UDP:a4

    S3 CoachUsb;Coach Digital Camera on USB;C:\WINDOWS\system32\DRIVERS\CoachUsb.sys [ ]
    S3 MR97310_VGA_DUAL_CAMERA;VGA Dual-Mode Camera;C:\WINDOWS\system32\DRIVERS\mr97310v.sys [2004-03-30 118106]
    S3 pohci13F;pohci13F;C:\DOCUME~1\Mike\LOCALS~1\Temp\pohci13F.sys [ ]
    S3 SysInfo;SysInfo;C:\WINDOWS\system32\drivers\SysInfo.sys [ ]
    .
    Contents of the 'Scheduled Tasks' folder
    .
    - - - - ORPHANS REMOVED - - - -

    BHO-{0C18A986-1943-1AB4-3421-4D71C20497EE} - C:\WINDOWS\system32\mwzc.dll
    BHO-{D7D8E074-4118-4866-967E-59D3C3CB6A4D} - C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\System.EnterpriseSe#\entrdv.dll
    BHO-{F90366A3-DCDB-47B7-86EF-D956D30E3BE7} - C:\WINDOWS\system32\ssqrp.dll
    WebBrowser-{A26503FE-B3B8-4910-A9DC-9CBD25C6B8D6} - (no file)
    HKLM-Run-plite731 - C:\WINDOWS\plite731.exe
    HKLM-Run-yhhheoccne - C:\WINDOWS\system32\ciopcvwowssvrtmim.dll
    Notify-entrdv - C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\System.EnterpriseSe#\entrdv.dll
    Notify-ljjjghi - ljjjghi.dll
    MSConfigStartUp-2wSysTray - C:\Program Files\2Wire\2PortalMon.exe
    MSConfigStartUp-Aim6 - C:\Program Files\AIM6\aim6.exe
    MSConfigStartUp-ccApp - c:\Program Files\Common Files\Symantec Shared\ccApp.exe
    MSConfigStartUp-IPInSightMonitor 01 - C:\Program Files\SBC Yahoo!\Connection Manager\IP InSight\IPMon32.exe
    MSConfigStartUp-NAV CfgWiz - c:\Program Files\Norton AntiVirus\CfgWiz.exe
    MSConfigStartUp-PRISMSVR - C:\WINDOWS\system32\PRISMSVR.EXE
    MSConfigStartUp-Qaqwqtlv - C:\Program Files\Opxvrb\Jexwcl.exe
    MSConfigStartUp-SSC_UserPrompt - c:\Program Files\Common Files\Symantec Shared\Security Center\UsrPrmpt.exe
    MSConfigStartUp-UpdateManager - C:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe
    MSConfigStartUp-Xgctebp - C:\Program Files\Akeamjn\Dphlx.exe
    MSConfigStartUp-Yahoo! Pager - C:\Program Files\Yahoo!\Messenger\ypager.exe
    MSConfigStartUp-YBrowser - C:\Program Files\Yahoo!\browser\ybrwicon.exe


    .
    ------- Supplementary Scan -------
    .
    FireFox -: Profile - C:\Documents and Settings\Your Doom!\Application Data\Mozilla\Firefox\Profiles\jgzfqxsl.default\
    FF -: plugin - C:\Program Files\Adobe\Acrobat 7.0\Reader\browser\nppdf32.dll
    FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPJava11.dll
    FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPJava12.dll
    FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPJava13.dll
    FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPJava14.dll
    FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPJava32.dll
    FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPJPI142_03.dll
    FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPOJI610.dll
    FF -: plugin - C:\Program Files\Mozilla Firefox\plugins\npunagi2.dll
    .

    **************************************************************************

    catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-09-12 00:30:13
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...


    C:\WINDOWS\system32\msnav32.ax 17 bytes

    scan completed successfully
    hidden files: 1

    **************************************************************************
    .
    ------------------------ Other Running Processes ------------------------
    .
    C:\WINDOWS\system32\ati2evxx.exe
    C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\Program Files\PC Tools AntiVirus\PCTAVSvc.exe
    C:\WINDOWS\system32\wdfmgr.exe
    C:\WINDOWS\system32\ati2evxx.exe
    C:\Program Files\iPod\bin\iPodService.exe
    .
    **************************************************************************
    .
    Completion time: 2008-09-12 0:38:25 - machine was rebooted
    ComboFix-quarantined-files.txt 2008-09-12 07:38:21

    Pre-Run: 4,783,042,560 bytes free
    Post-Run: 5,567,737,856 bytes free

    510 --- E O F --- 2008-09-10 04:07:00
     
  6. 2008/09/12
    greenarrow3

    greenarrow3 Inactive Thread Starter

    Joined:
    2008/09/10
    Messages:
    4
    Likes Received:
    0
    and finally, here is the Highjack This log:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 1:11:07 AM, on 9/12/2008
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16705)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\Program Files\PC Tools AntiVirus\PCTAVSvc.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
    C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
    C:\WINDOWS\explorer.exe
    C:\Program Files\NETGEAR WG311v2 Adapter\wlancfg5.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    C:\WINDOWS\system32\net.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/cus.../sbcydsl/*http://www.yahoo.com/search/ie.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://ads.gooochi.biz/bc/123kah.php
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe "
    O4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\cli.exe" runtime -Delay
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe "
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [{DB-B8-87-70-ZN}] C:\windows\system32\lpdsrngm.exe CHD003
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [PCTAVApp] "C:\Program Files\PC Tools AntiVirus\PCTAV.exe" /MONITORSCAN
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - Startup: TA_Start.lnk = C:\WINDOWS\system32\lpdsrngm.exe
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MI1933~1\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_03\bin\npjpi142_03.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_03\bin\npjpi142_03.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MI1933~1\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: PC Tools AntiVirus Engine (PCTAVSvc) - PC Tools Research Pty Ltd - C:\Program Files\PC Tools AntiVirus\PCTAVSvc.exe
    O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - c:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe

    --
    End of file - 4432 bytes
     
  7. 2008/09/13
    Geri Lifetime Subscription

    Geri Inactive Alumni

    Joined:
    2003/03/02
    Messages:
    4,580
    Likes Received:
    7
    Hi
    OK please do the following.

    Highlight and copy the contents of the code box below and paste it into a blank Notepad, then save it to your desktop as;

    Filename: CFScript.txt
    Save As Type: All Files (*.*)

    Close all other windows and programs. Now drag the CFScript.txt onto ComboFix.exe and drop it, using the left mouse button.
    Click here to see how to use CFScript.txt
    Combofix should run and may reboot the computer when it's done. A log will open when it's complete. Post the contents of that log and another fresh HijackThis log.

    Please do not click on the ComboFix window while it is running a scan. This can cause it to stall.

    Code:
    File::
    C:\Documents and Settings\Mike\g96.exe
    C:\WINDOWS\system32\lpdsrngm.exe 
    
    Registry::
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
     "{DB-B8-87-70-ZN} "=- 
    Your Java needs to be updated.

    Please download JavaRa and save the file to your desktop.
    • Right click and Extract All
    • Once extracted, open and run JavaRa.exe
    • Click Search For Updates
    • Select Update Using jucheck.exe
    • Click Search
    • If a newer version is found, allow it to be installed
    • Uncheck the Google Toolbar option. (if you don't want the Google tool bar)
    • When complete, click Remove Older Versions in the JavaRa interface and allow it to proceed
    • When that is complete, click Additional Tasks, then select Remove Useless JRE Files and click Go
    • Exit the tool when complete.
    Read and then You can delete the gpl-2.0.txt file.

    I see you have P2P software ( Limewire, BitTorrent uTorrent, WinMX. etc… ) installed on your machine. We are not here to pass judgment on file-sharing as a concept. However, we will warn you that engaging in this activity and having this kind of software installed on your machine will always make you more susceptible to re-infections. It may be contributing to your current situation. This page will give you further information.

    Please note: Even if you are using a "safe" P2P program, it is only the program that is safe. You will be sharing files from uncertified sources, and these are often infected. The bad guys use P2P filesharing as a major conduit to spread their wares and their infections.

    References for the risk of these programs are here,
    here and here.

    I would strongly recommend that you uninstall them, however that choice is up to you. If you choose to remove these programs, you can do so via Control Panel >> Add or Remove Programs.

    Note: Please be advised that continued use of these programs after being warned of the danger of infections from them, may result in the discontinued help of future cleaning of your system here at Windowsbbs Malware and Virus removal.

    Please post the combofix log and a new HJT log.

    Thanks
    Geri
     
    Geri,
    #6

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.