1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Solved Lsas.blaster.keylogger has me nuts.

Discussion in 'Malware and Virus Removal Archive' started by Renie, 2009/09/16.

  1. 2009/09/16
    Renie

    Renie Inactive Thread Starter

    Joined:
    2008/11/28
    Messages:
    27
    Likes Received:
    0
    [Resolved] Lsas.blaster.keylogger has me nuts.

    Ant chance of suggesting a removal method for the Lsas.Blaster.Keyloger.
    I have tried MS defender,Spyware Doctor, Spyware Blaster, Cyber Blaster. I can't find the files to manually delete them through Tsk Manager. Any ideas would be greatlyappeciated.

    Thanks everyone for your assisstance.

    Renie here in Va Beach..
     
  2. 2009/09/17
    Admin.

    Admin. Administrator Administrator Staff

    Joined:
    2001/12/30
    Messages:
    6,687
    Likes Received:
    107
    Hi,

    Read this post as indicated at the top of this forum & follow the instructions.
     

  3. to hide this advert.

  4. 2009/09/17
    Renie

    Renie Inactive Thread Starter

    Joined:
    2008/11/28
    Messages:
    27
    Likes Received:
    0
    DDS (Ver_09-07-30.01) - NTFSx86
    Run by Arnold Salasky at 5:22:54.85 on Thu 09/17/2009
    Internet Explorer: 6.0.2900.2180
    Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.478.117 [GMT -4:00]

    AV: CyberDefender Internet Security *On-access scanning enabled* (Updated) {F4DA92FA-59A6-4979-B9D7-EE74EB1E7087}

    ============== Running Processes ===============

    C:\WINDOWS\system32\svchost -k DcomLaunch
    C:\WINDOWS\system32\svchost -k rpcss
    C:\WINDOWS\System32\svchost.exe -k netsvcs
    C:\WINDOWS\system32\svchost.exe -k NetworkService
    C:\WINDOWS\system32\svchost.exe -k LocalService
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\Program Files\Spyware Doctor\pctsAuxs.exe
    C:\Program Files\Spyware Doctor\pctsSvc.exe
    C:\WINDOWS\system32\svchost.exe -k imgsvc
    C:\Program Files\Spyware Doctor\pctsTray.exe
    C:\Program Files\Viewpoint\Common\ViewpointService.exe
    C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe
    C:\WINDOWS\system32\igfxtray.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\WINDOWS\system32\LVCOMSX.EXE
    C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\AIM6\aim6.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\CyberDefender\AntiSpyware\cdas4.exe
    C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
    C:\Program Files\HP\Digital Imaging\bin\hpqimzone.exe
    C:\Program Files\AIM6\aolsoftware.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\WINDOWS\System32\alg.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\WINDOWS\system32\wbem\wmiprvse.exe
    C:\Documents and Settings\Arnold Salasky\Desktop\dds.scr
    C:\WINDOWS\system32\wbem\wmiprvse.exe

    ============== Pseudo HJT Report ===============

    uInternet Settings,ProxyOverride = *.local
    BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 6.0\reader\activex\AcroIEHelper.dll
    BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
    uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
    uRun: [Aim6] "c:\program files\aim6\aim6.exe" /d locale=en-US ee://aol/imApp
    uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
    uRun: [CyberDefender Early Detection Center] "c:\program files\cyberdefender\antispyware\cdas4.exe" /minimize
    mRun: [eabconfg.cpl] c:\program files\hpq\quick launch buttons\EabServr.exe /Start
    mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
    mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
    mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
    mRun: [LVCOMSX] c:\windows\system32\LVCOMSX.EXE
    mRun: [HP Software Update] c:\program files\hp\hp software update\HPWuSchd2.exe
    mRun: [AppleSyncNotifier] c:\program files\common files\apple\mobile device support\bin\AppleSyncNotifier.exe
    mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
    mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe "
    mRun: [ISTray] "c:\program files\spyware doctor\pctsTray.exe "
    StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
    StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpphot~1.lnk - c:\program files\hp\digital imaging\bin\hpqthb08.exe
    IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
    IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
    IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
    IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
    DPF: {31435657-9980-0010-8000-00AA00389B71} - hxxp://download.microsoft.com/download/e/2/f/e2fcec4b-6c8b-48b7-adab-ab9c403a978f/wvc1dmo.cab
    Notify: igfxcui - igfxsrvc.dll
    AppInit_DLLs: wusosogo.dll,c:\windows\system32\surosubo.dll,c:\windows\system32\yuhazuzi.dll
    LSA: Notification Packages = scecli tuyubeva.dll c:\windows\system32\surosubo.dll c:\windows\system32\yuhazuzi.dll

    ================= FIREFOX ===================

    FF - ProfilePath - c:\docume~1\arnold~1\applic~1\mozilla\firefox\profiles\vg1so0bz.default\
    FF - prefs.js: browser.startup.homepage - hxxp://www.yahoo.com/
    FF - plugin: c:\documents and settings\arnold salasky\application data\mozilla\firefox\profiles\vg1so0bz.default\extensions\moveplayer@movenetworks.com\platform\winnt_x86-msvc\plugins\npmnqmp071303000006.dll
    FF - plugin: c:\program files\mozilla firefox\plugins\npViewpoint.dll
    FF - plugin: c:\program files\viewpoint\viewpoint media player\npViewpoint.dll

    ============= SERVICES / DRIVERS ===============

    R0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [2009-8-16 206256]
    R2 sdAuxService;PC Tools Auxiliary Service;c:\program files\spyware doctor\pctsAuxs.exe [2009-8-16 348752]
    R2 sdCoreService;PC Tools Security Service;c:\program files\spyware doctor\pctsSvc.exe [2009-8-16 1097096]
    R2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\viewpoint\common\ViewpointService.exe [2007-11-1 24652]
    R3 CDAVFS;CDAVFS;c:\windows\system32\drivers\CDAVFS.sys [2009-9-16 67424]

    =============== Created Last 30 ================

    2009-09-16 22:27 <DIR> --d----- c:\docume~1\arnold~1\applic~1\AVG8
    2009-09-16 22:05 43 a------- c:\windows\av_affiliate.ini
    2009-09-16 22:05 43 a------- c:\windows\as_affiliate.ini
    2009-09-16 22:04 67,424 a------- c:\windows\system32\drivers\CDAVFS.sys
    2009-09-16 22:04 <DIR> --d----- c:\program files\CyberDefender
    2009-09-15 21:08 153 a------- c:\windows\wininit.ini
    2009-09-15 13:02 7,396 a------- c:\windows\system32\drivers\pctcore.cat
    2009-09-15 09:45 <DIR> --d----- c:\program files\Spybot - Search & Destroy
    2009-09-15 09:45 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy
    2009-08-20 09:58 3,729 ---sh--- c:\windows\system32\perosaro.dll
    2009-08-20 09:57 <DIR> --d----- c:\windows\X38DIMRV05AFKOTX

    ==================== Find3M ====================

    2009-09-15 13:02 206,256 a------- c:\windows\system32\drivers\PCTCore.sys
    2009-08-16 21:18 3,336 a------- c:\windows\system32\tmp.reg
    2009-08-16 19:42 1,065,508 a--sh--- c:\windows\system32\merunime.exe
    2009-08-15 21:45 1,064,484 a--sh--- c:\windows\system32\foromogu.exe
    2009-08-15 09:50 84,480 a------- c:\windows\system32\fefiyiri.dll
    2009-08-15 09:45 1,995 ---sh--- c:\windows\system32\vabazaja.dll
    2009-08-15 09:45 1,995 ---sh--- c:\windows\system32\regoyivu.exe
    2009-08-15 09:45 1,995 ---sh--- c:\windows\system32\kofipulo.dll
    2009-08-07 19:19 1,995 ---sh--- c:\windows\system32\yerofata.dll
    2009-08-07 19:19 1,995 ---sh--- c:\windows\system32\nomadani.dll
    2009-08-05 20:35 38,912 a------- c:\windows\system32\yefanopa.dll
    2009-08-05 20:35 50,176 a------- c:\windows\system32\gahejeyu.dll
    2009-08-05 20:30 1,995 ---sh--- c:\windows\system32\sizumeju.dll
    2009-08-05 20:30 1,995 ---sh--- c:\windows\system32\lugatepo.dll
    2009-08-05 20:30 1,995 ---sh--- c:\windows\system32\lowofoza.dll

    ============= FINISH: 5:24:15.47 ===============
    9/15/2009 4:18:07 PM, error: Service Control Manager [7031] - The Apple Mobile Device service

    terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken

    in 60000 milliseconds: Restart the service.
    9/15/2009 4:18:06 PM, error: Service Control Manager [7022] - The PC Tools Security Service

    service hung on starting.
    9/15/2009 4:12:32 PM, error: DCOM [10005] - DCOM got error "%1084" attempting to start the

    service EventSystem with arguments " " in order to run the server:

    {1BE1F766-5536-11D1-B726-00C04FB926AF}
    9/15/2009 4:12:24 PM, error: DCOM [10005] - DCOM got error "%1084" attempting to start the

    service netman with arguments " " in order to run the server:

    {BA126AE5-2166-11D1-B1D0-00805FC1270E}
    9/15/2009 4:11:53 PM, error: DCOM [10005] - DCOM got error "%1084" attempting to start the

    service StiSvc with arguments " " in order to run the server:

    {A1F4E726-8CF1-11D1-BF92-0060081ED811}
    9/15/2009 3:04:25 PM, error: Service Control Manager [7026] - The following boot-start or

    system-start driver(s) failed to load: AFD eabfiltr Fips intelppm IPSec MRxSmb NetBIOS NetBT

    RasAcd Rdbss Tcpip
    9/15/2009 3:04:25 PM, error: Service Control Manager [7001] - The TCP/IP NetBIOS Helper

    service depends on the AFD service which failed to start because of the following error: A device

    attached to the system is not functioning.
    9/15/2009 3:04:25 PM, error: Service Control Manager [7001] - The IPSEC Services service

    depends on the IPSEC driver service which failed to start because of the following error: A device

    attached to the system is not functioning.
    9/15/2009 3:04:25 PM, error: Service Control Manager [7001] - The DNS Client service depends

    on the TCP/IP Protocol Driver service which failed to start because of the following error: A device

    attached to the system is not functioning.
    9/15/2009 3:04:25 PM, error: Service Control Manager [7001] - The DHCP Client service depends

    on the NetBios over Tcpip service which failed to start because of the following error: A device

    attached to the system is not functioning.
    9/15/2009 3:04:25 PM, error: Service Control Manager [7001] - The Bonjour Service service

    depends on the TCP/IP Protocol Driver service which failed to start because of the following error:

    A device attached to the system is not functioning.
    9/15/2009 3:04:25 PM, error: Service Control Manager [7001] - The Apple Mobile Device service

    depends on the TCP/IP Protocol Driver service which failed to start because of the following error:

    A device attached to the system is not functioning.
    9/15/2009 2:57:19 PM, error: Service Control Manager [7023] - The Computer Browser service

    terminated with the following error: This operation returned because the timeout period expired.
    9/15/2009 2:26:28 PM, error: Service Control Manager [7009] - Timeout (30000 milliseconds)

    waiting for the IMAPI CD-Burning COM Service service to connect.
    9/15/2009 2:26:28 PM, error: Service Control Manager [7000] - The IMAPI CD-Burning COM

    Service service failed to start due to the following error: The service did not respond to the start or

    control request in a timely fashion.
    9/15/2009 12:48:21 PM, error: Service Control Manager [7034] - The Machine Debug Manager

    service terminated unexpectedly. It has done this 2 time(s).
    9/15/2009 12:45:20 PM, error: Service Control Manager [7009] - Timeout (30000 milliseconds)

    waiting for the iPod Service service to connect.
    9/15/2009 12:45:20 PM, error: Service Control Manager [7000] - The iPod Service service failed

    to start due to the following error: The service did not respond to the start or control request in a

    timely fashion.
    9/15/2009 12:45:19 PM, error: DCOM [10005] - DCOM got error "%1053" attempting to start the

    service iPod Service with arguments " " in order to run the server:

    {063D34A4-BF84-4B8D-B699-E8CA06504DDE}
    9/15/2009 12:43:28 PM, error: System Error [1003] - Error code 000000f4, parameter1 00000003,

    parameter2 84c7dda0, parameter3 84c7df14, parameter4 805fa7a8.

    ==== End Of File ===========================
     
  5. 2009/09/17
    Admin.

    Admin. Administrator Administrator Staff

    Joined:
    2001/12/30
    Messages:
    6,687
    Likes Received:
    107
    Thanks, a Malware expert will look at your log in due course.
     
  6. 2009/09/17
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Print these instructions out.

    NOTE. If any of the programs listed below refuse to run, try renaming executive file to something else; for instance, rename hijackthis.exe to scanner.exe

    ***VERY IMPORTANT! Make sure, you update Superantispyware, and Malwarebytes before running the scans.***

    STEP 1. Download SUPERAntiSpyware Free for Home Users:
    http://www.superantispyware.com/

    * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
    * An icon will be created on your desktop. Double-click that icon to launch the program.
    * If asked to update the program definitions, click "Yes ". If not, update the definitions before scanning by selecting "Check for Updates ". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
    * Close SUPERAntiSpyware.

    PHYSICALLY DISCONNECT FROM THE INTERNET

    Restart computer in Safe Mode.
    To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

    * Open SUPERAntiSpyware.
    * Click Scan your Computer... button.
    * Click Scanning Preferences/Control Center... button.
    * Under General and Startup tab, make sure, Start SUPERAntiSpyware when Windows starts option is UN-checked.
    * Click the Scanning Control tab.
    * Under Scanner Options make sure the following are checked (leave all others unchecked):
    - Close browsers before scanning.
    - Terminate memory threats before quarantining.

    * Click the Close button to leave the control center screen.
    * On the left, make sure you check C:\Fixed Drive.
    * On the right, choose Perform Complete Scan.
    * Click Next to start the scan. Please be patient while it scans your computer.
    * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click OK.
    * Make sure everything has a checkmark next to it and click Next.
    * A notification will appear that Quarantine and Removal is Complete. Click OK and then click the Finish button to return to the main menu.
    * If asked if you want to reboot, click Yes.
    * To retrieve the removal information after reboot, launch SUPERAntispyware again.
    - Click Preferences, then click the Statistics/Logs tab.
    - Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    - If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    - Please copy and paste the Scan Log results in your next reply.

    * Click Close to exit the program.
    Post SUPERAntiSpyware log.

    RECONNECT TO THE INTERNET

    RESTART COMPUTER!

    STEP 2. Download Malwarebytes' Anti-Malware: http://www.malwarebytes.org/mbam.php to your desktop.
    (Malwarebytes is free to use as a manual scanner. Payment is only required if you wish to have it run and update automatically which is not necessary for our purposes)

    * Double-click mbam-setup.exe and follow the prompts to install the program.
    * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    * If an update is found, it will download and install the latest version.
    * Once the program has loaded, select Perform full scan, then click Scan.
    * When the scan is complete, click OK, then Show Results to view the results.
    * Be sure that everything is checked, and click Remove Selected.
    * When completed, a log will open in Notepad.
    * Post the log back here.

    The log can also be found here:
    C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
    Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

    RESTART COMPUTER!

    STEP 3. Download GMER: http://www.gmer.net/files.php, by clicking on Download EXE button.
    Alternative downloads:
    - http://majorgeeks.com/GMER_d5198.html
    - http://www.softpedia.com/get/Interne...ers/GMER.shtml
    Double click on downloaded .exe file, select Rootkit tab and click the Scan button.
    When scan is completed, click Save button, and save the results as gmer.log
    Warning ! Please, do not select the "Show all" checkbox during the scan.
    Post the log to your next reply.

    RESTART COMPUTER

    STEP 4. Download HijackThis:
    http://www.trendsecure.com/portal/en-US/tools/security_tools/hijackthis/download
    by clicking on Download HijackThis Installer
    Install, and run it.
    Post HijackThis log.
    NOTE. If you're using Vista, right click on HijackThis, and click Run as Administrator
    Do NOT attempt to "fix" anything!


    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
  7. 2009/09/18
    Renie

    Renie Inactive Thread Starter

    Joined:
    2008/11/28
    Messages:
    27
    Likes Received:
    0
    SOLVED
    Gentlemen,

    Thanks so much for being the beacon in the technical fixit void of cyberspace.

    Renie,
    Virginia Beach
     
  8. 2009/09/18
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Solved what?
    I need to see all logs.
    We have to be sure, your computer is clean, so nothing is hiding in the back and you don't have to be back here in couple of days, complaining about more infections.
     
  9. 2009/09/18
    Renie

    Renie Inactive Thread Starter

    Joined:
    2008/11/28
    Messages:
    27
    Likes Received:
    0
    Thanks for the help. This is all I could find.

    Renie


    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 04:58:36, on 9/18/2009
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Viewpoint\Common\ViewpointService.exe
    C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe
    C:\WINDOWS\system32\hkcmd.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\WINDOWS\system32\LVCOMSX.EXE
    C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
    C:\Program Files\HP\Digital Imaging\bin\hpqimzone.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\WINDOWS\System32\alg.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    C:\WINDOWS\system32\wbem\wmiprvse.exe

    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O4 - HKLM\..\Run: [eabconfg.cpl] C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe /Start
    O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [LVCOMSX] C:\WINDOWS\system32\LVCOMSX.EXE
    O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
    O4 - HKLM\..\Run: [AppleSyncNotifier] C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe "
    O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\Run: [CyberDefender Early Detection Center] "C:\Program Files\CyberDefender\AntiSpyware\cdas4.exe" /minimize
    O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
    O4 - Global Startup: HP Photosmart Premier Fast Start.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O20 - AppInit_DLLs: wusosogo.dll,C:\WINDOWS\system32\surosubo.dll,C:\WINDOWS\system32\yuhazuzi.dll
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: HP WMI Interface (hpqwmi) - Hewlett-Packard Development Company, L.P. - C:\Program Files\HPQ\SHARED\HPQWMI.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe

    --
    End of file - 4825 bytes


    GMER 1.0.15.15087 - http://www.gmer.net
    Rootkit scan 2009-09-18 04:47:06
    Windows 5.1.2600 Service Pack 2
    Running: gmer.exe; Driver: C:\DOCUME~1\ARNOLD~1\LOCALS~1\Temp\kxtdapow.sys


    ---- System - GMER 1.0.15 ----

    SSDT PCTCore.sys ZwCreateKey [0xF778BD72]
    SSDT PCTCore.sys ZwCreateProcess [0xF776C9A6]
    SSDT PCTCore.sys ZwCreateProcessEx [0xF776CB98]
    SSDT PCTCore.sys ZwDeleteKey [0xF778C568]
    SSDT PCTCore.sys ZwDeleteValueKey [0xF778C820]
    SSDT PCTCore.sys ZwOpenKey [0xF778AA80]
    SSDT PCTCore.sys ZwRenameKey [0xF778CC8A]
    SSDT PCTCore.sys ZwSetValueKey [0xF778C036]
    SSDT PCTCore.sys ZwTerminateProcess [0xF776C656]

    ---- Kernel code sections - GMER 1.0.15 ----

    ? PCTCore.sys The system cannot find the file specified. !
    ? C:\WINDOWS\system32\Drivers\mchInjDrv.sys The system cannot find the file specified. !

    ---- User code sections - GMER 1.0.15 ----

    .text C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe[428] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 003C0001
    .text C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe[428] USER32.dll!SetWindowPos 77D4C78E 3 Bytes [FF, 25, 1E]
    .text C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe[428] USER32.dll!SetWindowPos + 4 77D4C792 2 Bytes [12, 5F]
    .text C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe[428] USER32.dll!SetForegroundWindow 77D566A7 6 Bytes JMP 5F0D0F5A
    .text C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe[428] USER32.dll!ChangeDisplaySettingsExA 77D66A51 6 Bytes JMP 5F140F5A
    .text C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe[428] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe[428] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe[428] USER32.dll!ChangeDisplaySettingsExW 77D891B6 6 Bytes JMP 5F170F5A
    .text C:\WINDOWS\system32\hkcmd.exe[448] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 00F00001
    .text C:\WINDOWS\system32\hkcmd.exe[448] USER32.dll!SetWindowPos 77D4C78E 3 Bytes [FF, 25, 1E]
    .text C:\WINDOWS\system32\hkcmd.exe[448] USER32.dll!SetWindowPos + 4 77D4C792 2 Bytes [12, 5F]
    .text C:\WINDOWS\system32\hkcmd.exe[448] USER32.dll!SetForegroundWindow 77D566A7 6 Bytes JMP 5F0D0F5A
    .text C:\WINDOWS\system32\hkcmd.exe[448] USER32.dll!ChangeDisplaySettingsExA 77D66A51 6 Bytes JMP 5F140F5A
    .text C:\WINDOWS\system32\hkcmd.exe[448] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\WINDOWS\system32\hkcmd.exe[448] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\WINDOWS\system32\hkcmd.exe[448] USER32.dll!ChangeDisplaySettingsExW 77D891B6 6 Bytes JMP 5F170F5A
    .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[464] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 010D0001
    .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[464] USER32.dll!SetWindowPos 77D4C78E 3 Bytes [FF, 25, 1E]
    .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[464] USER32.dll!SetWindowPos + 4 77D4C792 2 Bytes [12, 5F]
    .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[464] USER32.dll!SetForegroundWindow 77D566A7 6 Bytes JMP 5F0D0F5A
    .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[464] USER32.dll!ChangeDisplaySettingsExA 77D66A51 6 Bytes JMP 5F140F5A
    .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[464] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[464] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[464] USER32.dll!ChangeDisplaySettingsExW 77D891B6 6 Bytes JMP 5F170F5A
    .text C:\WINDOWS\system32\LVCOMSX.EXE[472] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 011A0001
    .text C:\WINDOWS\system32\LVCOMSX.EXE[472] USER32.dll!SetWindowPos 77D4C78E 3 Bytes [FF, 25, 1E]
    .text C:\WINDOWS\system32\LVCOMSX.EXE[472] USER32.dll!SetWindowPos + 4 77D4C792 2 Bytes [12, 5F]
    .text C:\WINDOWS\system32\LVCOMSX.EXE[472] USER32.dll!SetForegroundWindow 77D566A7 6 Bytes JMP 5F0D0F5A
    .text C:\WINDOWS\system32\LVCOMSX.EXE[472] USER32.dll!ChangeDisplaySettingsExA 77D66A51 6 Bytes JMP 5F140F5A
    .text C:\WINDOWS\system32\LVCOMSX.EXE[472] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\WINDOWS\system32\LVCOMSX.EXE[472] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\WINDOWS\system32\LVCOMSX.EXE[472] USER32.dll!ChangeDisplaySettingsExW 77D891B6 6 Bytes JMP 5F170F5A
    .text C:\Program Files\HP\HP Software Update\HPWuSchd2.exe[480] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 00BC0001
    .text C:\Program Files\HP\HP Software Update\HPWuSchd2.exe[480] USER32.dll!SetWindowPos 77D4C78E 3 Bytes [FF, 25, 1E]
    .text C:\Program Files\HP\HP Software Update\HPWuSchd2.exe[480] USER32.dll!SetWindowPos + 4 77D4C792 2 Bytes [12, 5F]
    .text C:\Program Files\HP\HP Software Update\HPWuSchd2.exe[480] USER32.dll!SetForegroundWindow 77D566A7 6 Bytes JMP 5F0D0F5A
    .text C:\Program Files\HP\HP Software Update\HPWuSchd2.exe[480] USER32.dll!ChangeDisplaySettingsExA 77D66A51 6 Bytes JMP 5F140F5A
    .text C:\Program Files\HP\HP Software Update\HPWuSchd2.exe[480] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\Program Files\HP\HP Software Update\HPWuSchd2.exe[480] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\Program Files\HP\HP Software Update\HPWuSchd2.exe[480] USER32.dll!ChangeDisplaySettingsExW 77D891B6 6 Bytes JMP 5F170F5A
    .text C:\Program Files\iTunes\iTunesHelper.exe[548] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 015B0001
    .text C:\Program Files\iTunes\iTunesHelper.exe[548] USER32.dll!SetWindowPos 77D4C78E 3 Bytes [FF, 25, 1E]
    .text C:\Program Files\iTunes\iTunesHelper.exe[548] USER32.dll!SetWindowPos + 4 77D4C792 2 Bytes [12, 5F]
    .text C:\Program Files\iTunes\iTunesHelper.exe[548] USER32.dll!SetForegroundWindow 77D566A7 6 Bytes JMP 5F0D0F5A
    .text C:\Program Files\iTunes\iTunesHelper.exe[548] USER32.dll!ChangeDisplaySettingsExA 77D66A51 6 Bytes JMP 5F140F5A
    .text C:\Program Files\iTunes\iTunesHelper.exe[548] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\Program Files\iTunes\iTunesHelper.exe[548] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\Program Files\iTunes\iTunesHelper.exe[548] USER32.dll!ChangeDisplaySettingsExW 77D891B6 6 Bytes JMP 5F170F5A
    .text C:\WINDOWS\system32\ctfmon.exe[628] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 00D80001
    .text C:\WINDOWS\system32\ctfmon.exe[628] USER32.dll!SetWindowPos 77D4C78E 3 Bytes [FF, 25, 1E]
    .text C:\WINDOWS\system32\ctfmon.exe[628] USER32.dll!SetWindowPos + 4 77D4C792 2 Bytes [12, 5F]
    .text C:\WINDOWS\system32\ctfmon.exe[628] USER32.dll!SetForegroundWindow 77D566A7 6 Bytes JMP 5F0D0F5A
    .text C:\WINDOWS\system32\ctfmon.exe[628] USER32.dll!ChangeDisplaySettingsExA 77D66A51 6 Bytes JMP 5F140F5A
    .text C:\WINDOWS\system32\ctfmon.exe[628] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\WINDOWS\system32\ctfmon.exe[628] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\WINDOWS\system32\ctfmon.exe[628] USER32.dll!ChangeDisplaySettingsExW 77D891B6 6 Bytes JMP 5F170F5A
    .text C:\WINDOWS\system32\csrss.exe[632] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\WINDOWS\system32\csrss.exe[632] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\WINDOWS\system32\csrss.exe[632] KERNEL32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 01180001
    .text C:\WINDOWS\system32\winlogon.exe[656] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 01320001
    .text C:\WINDOWS\system32\winlogon.exe[656] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\WINDOWS\system32\winlogon.exe[656] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\WINDOWS\system32\services.exe[700] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 00A00001
    .text C:\WINDOWS\system32\services.exe[700] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\WINDOWS\system32\services.exe[700] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\WINDOWS\system32\lsass.exe[712] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 01160001
    .text C:\WINDOWS\system32\lsass.exe[712] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\WINDOWS\system32\lsass.exe[712] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\WINDOWS\system32\svchost.exe[856] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 00B00001
    .text C:\WINDOWS\system32\svchost.exe[856] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\WINDOWS\system32\svchost.exe[856] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\WINDOWS\system32\svchost.exe[904] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 00C60001
    .text C:\WINDOWS\system32\svchost.exe[904] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\WINDOWS\system32\svchost.exe[904] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\WINDOWS\System32\svchost.exe[944] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 022A0001
    .text C:\WINDOWS\System32\svchost.exe[944] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\WINDOWS\System32\svchost.exe[944] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[964] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 01AE0001
    .text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[964] USER32.dll!SetWindowPos 77D4C78E 3 Bytes [FF, 25, 1E]
    .text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[964] USER32.dll!SetWindowPos + 4 77D4C792 2 Bytes [12, 5F]
    .text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[964] USER32.dll!SetForegroundWindow 77D566A7 6 Bytes JMP 5F0D0F5A
    .text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[964] USER32.dll!ChangeDisplaySettingsExA 77D66A51 6 Bytes JMP 5F140F5A
    .text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[964] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[964] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[964] USER32.dll!ChangeDisplaySettingsExW 77D891B6 6 Bytes JMP 5F170F5A
    .text C:\WINDOWS\system32\svchost.exe[1028] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 007C0001
    .text C:\WINDOWS\system32\svchost.exe[1028] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\WINDOWS\system32\svchost.exe[1028] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[1056] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 010F0001
    .text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[1056] USER32.dll!SetWindowPos 77D4C78E 3 Bytes [FF, 25, 1E]
    .text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[1056] USER32.dll!SetWindowPos + 4 77D4C792 2 Bytes [12, 5F]
    .text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[1056] USER32.dll!SetForegroundWindow 77D566A7 6 Bytes JMP 5F0D0F5A
    .text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[1056] USER32.dll!ChangeDisplaySettingsExA 77D66A51 6 Bytes JMP 5F140F5A
    .text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[1056] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[1056] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[1056] USER32.dll!ChangeDisplaySettingsExW 77D891B6 6 Bytes JMP 5F170F5A
    .text C:\WINDOWS\system32\svchost.exe[1172] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 006B0001
    .text C:\WINDOWS\system32\svchost.exe[1172] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\WINDOWS\system32\svchost.exe[1172] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\WINDOWS\Explorer.EXE[1284] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 01330001
    .text C:\WINDOWS\Explorer.EXE[1284] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\WINDOWS\Explorer.EXE[1284] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\WINDOWS\system32\spoolsv.exe[1488] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 00A30001
    .text C:\WINDOWS\system32\spoolsv.exe[1488] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\WINDOWS\system32\spoolsv.exe[1488] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[1580] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 00BE0001
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[1580] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[1580] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\Program Files\Bonjour\mDNSResponder.exe[1596] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 00D30001
    .text C:\Program Files\Bonjour\mDNSResponder.exe[1596] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\Program Files\Bonjour\mDNSResponder.exe[1596] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE[1656] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 003B0001
    .text C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE[1656] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE[1656] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\Program Files\HP\Digital Imaging\bin\hpqimzone.exe[1828] KERNEL32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 09640001
    .text C:\Program Files\HP\Digital Imaging\bin\hpqimzone.exe[1828] USER32.dll!SetWindowPos 77D4C78E 3 Bytes [FF, 25, 1E]
    .text C:\Program Files\HP\Digital Imaging\bin\hpqimzone.exe[1828] USER32.dll!SetWindowPos + 4 77D4C792 2 Bytes [12, 5F]
    .text C:\Program Files\HP\Digital Imaging\bin\hpqimzone.exe[1828] USER32.dll!SetForegroundWindow 77D566A7 6 Bytes JMP 5F0D0F5A
    .text C:\Program Files\HP\Digital Imaging\bin\hpqimzone.exe[1828] USER32.dll!ChangeDisplaySettingsExA 77D66A51 6 Bytes JMP 5F140F5A
    .text C:\Program Files\HP\Digital Imaging\bin\hpqimzone.exe[1828] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\Program Files\HP\Digital Imaging\bin\hpqimzone.exe[1828] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\Program Files\HP\Digital Imaging\bin\hpqimzone.exe[1828] USER32.dll!ChangeDisplaySettingsExW 77D891B6 6 Bytes JMP 5F170F5A
    .text C:\WINDOWS\system32\svchost.exe[1924] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 00BE0001
    .text C:\WINDOWS\system32\svchost.exe[1924] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\WINDOWS\system32\svchost.exe[1924] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\Program Files\Viewpoint\Common\ViewpointService.exe[1952] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 00CA0001
    .text C:\Program Files\Viewpoint\Common\ViewpointService.exe[1952] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\Program Files\Viewpoint\Common\ViewpointService.exe[1952] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\Program Files\Mozilla Firefox\firefox.exe[2300] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 00B90001
    .text C:\Program Files\Mozilla Firefox\firefox.exe[2300] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 7170003D
    .text C:\Program Files\Mozilla Firefox\firefox.exe[2300] USER32.dll!SetWindowPos 77D4C78E 3 Bytes [FF, 25, 1E]
    .text C:\Program Files\Mozilla Firefox\firefox.exe[2300] USER32.dll!SetWindowPos + 4 77D4C792 2 Bytes [12, 5F]
    .text C:\Program Files\Mozilla Firefox\firefox.exe[2300] USER32.dll!SetForegroundWindow 77D566A7 6 Bytes JMP 5F0D0F5A
    .text C:\Program Files\Mozilla Firefox\firefox.exe[2300] USER32.dll!ChangeDisplaySettingsExA 77D66A51 6 Bytes JMP 5F140F5A
    .text C:\Program Files\Mozilla Firefox\firefox.exe[2300] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\Program Files\Mozilla Firefox\firefox.exe[2300] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\Program Files\Mozilla Firefox\firefox.exe[2300] USER32.dll!ChangeDisplaySettingsExW 77D891B6 6 Bytes JMP 5F170F5A
    .text C:\Program Files\WinRAR\WinRAR.exe[2568] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 003D0001
    .text C:\Program Files\WinRAR\WinRAR.exe[2568] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 7170003D
    .text C:\Program Files\WinRAR\WinRAR.exe[2568] USER32.dll!SetWindowPos 77D4C78E 3 Bytes [FF, 25, 1E]
    .text C:\Program Files\WinRAR\WinRAR.exe[2568] USER32.dll!SetWindowPos + 4 77D4C792 2 Bytes [12, 5F]
    .text C:\Program Files\WinRAR\WinRAR.exe[2568] USER32.dll!SetForegroundWindow 77D566A7 6 Bytes JMP 5F0D0F5A
    .text C:\Program Files\WinRAR\WinRAR.exe[2568] USER32.dll!ChangeDisplaySettingsExA 77D66A51 6 Bytes JMP 5F140F5A
    .text C:\Program Files\WinRAR\WinRAR.exe[2568] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\Program Files\WinRAR\WinRAR.exe[2568] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\Program Files\WinRAR\WinRAR.exe[2568] USER32.dll!ChangeDisplaySettingsExW 77D891B6 6 Bytes JMP 5F170F5A
    .text C:\Program Files\iPod\bin\iPodService.exe[2892] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 00870001
    .text C:\Program Files\iPod\bin\iPodService.exe[2892] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 7170003D
    .text C:\Program Files\iPod\bin\iPodService.exe[2892] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\Program Files\iPod\bin\iPodService.exe[2892] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\WINDOWS\System32\alg.exe[3120] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 00820001
    .text C:\WINDOWS\System32\alg.exe[3120] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 7170003D
    .text C:\WINDOWS\System32\alg.exe[3120] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\WINDOWS\System32\alg.exe[3120] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\WINDOWS\system32\wscntfy.exe[3440] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 009B0001
    .text C:\WINDOWS\system32\wscntfy.exe[3440] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 7170003D
    .text C:\WINDOWS\system32\wscntfy.exe[3440] USER32.dll!SetWindowPos 77D4C78E 3 Bytes [FF, 25, 1E]
    .text C:\WINDOWS\system32\wscntfy.exe[3440] USER32.dll!SetWindowPos + 4 77D4C792 2 Bytes [12, 5F]
    .text C:\WINDOWS\system32\wscntfy.exe[3440] USER32.dll!SetForegroundWindow 77D566A7 6 Bytes JMP 5F0D0F5A
    .text C:\WINDOWS\system32\wscntfy.exe[3440] USER32.dll!ChangeDisplaySettingsExA 77D66A51 6 Bytes JMP 5F140F5A
    .text C:\WINDOWS\system32\wscntfy.exe[3440] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\WINDOWS\system32\wscntfy.exe[3440] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\WINDOWS\system32\wscntfy.exe[3440] USER32.dll!ChangeDisplaySettingsExW 77D891B6 6 Bytes JMP 5F170F5A
    .text C:\DOCUME~1\ARNOLD~1\LOCALS~1\Temp\Rar$EX01.775\gmer.exe[3668] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 003B0001
    .text C:\DOCUME~1\ARNOLD~1\LOCALS~1\Temp\Rar$EX01.775\gmer.exe[3668] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 7170003D
    .text C:\DOCUME~1\ARNOLD~1\LOCALS~1\Temp\Rar$EX01.775\gmer.exe[3668] USER32.dll!SetWindowPos 77D4C78E 3 Bytes [FF, 25, 1E]
    .text C:\DOCUME~1\ARNOLD~1\LOCALS~1\Temp\Rar$EX01.775\gmer.exe[3668] USER32.dll!SetWindowPos + 4 77D4C792 2 Bytes [12, 5F]
    .text C:\DOCUME~1\ARNOLD~1\LOCALS~1\Temp\Rar$EX01.775\gmer.exe[3668] USER32.dll!SetForegroundWindow 77D566A7 6 Bytes JMP 5F0D0F5A
    .text C:\DOCUME~1\ARNOLD~1\LOCALS~1\Temp\Rar$EX01.775\gmer.exe[3668] USER32.dll!ChangeDisplaySettingsExA 77D66A51 6 Bytes JMP 5F140F5A
    .text C:\DOCUME~1\ARNOLD~1\LOCALS~1\Temp\Rar$EX01.775\gmer.exe[3668] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\DOCUME~1\ARNOLD~1\LOCALS~1\Temp\Rar$EX01.775\gmer.exe[3668] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\DOCUME~1\ARNOLD~1\LOCALS~1\Temp\Rar$EX01.775\gmer.exe[3668] USER32.dll!ChangeDisplaySettingsExW 77D891B6 6 Bytes JMP 5F170F5A
    .text C:\Program Files\WinRAR\WinRAR.exe[4020] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 003D0001
    .text C:\Program Files\WinRAR\WinRAR.exe[4020] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 7170003D
    .text C:\Program Files\WinRAR\WinRAR.exe[4020] USER32.dll!SetWindowPos 77D4C78E 3 Bytes [FF, 25, 1E]
    .text C:\Program Files\WinRAR\WinRAR.exe[4020] USER32.dll!SetWindowPos + 4 77D4C792 2 Bytes [12, 5F]
    .text C:\Program Files\WinRAR\WinRAR.exe[4020] USER32.dll!SetForegroundWindow 77D566A7 6 Bytes JMP 5F0D0F5A
    .text C:\Program Files\WinRAR\WinRAR.exe[4020] USER32.dll!ChangeDisplaySettingsExA 77D66A51 6 Bytes JMP 5F140F5A
    .text C:\Program Files\WinRAR\WinRAR.exe[4020] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A
    .text C:\Program Files\WinRAR\WinRAR.exe[4020] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A
    .text C:\Program Files\WinRAR\WinRAR.exe[4020] USER32.dll!ChangeDisplaySettingsExW 77D891B6 6 Bytes JMP 5F170F5A

    ---- Devices - GMER 1.0.15 ----

    AttachedDevice \Driver\Kbdclass \Device\KeyboardClass0 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
    AttachedDevice \Driver\Kbdclass \Device\KeyboardClass0 EABFiltr.sys (QLB PS/2 Keyboard filter driver/Hewlett-Packard Company)
    AttachedDevice \Driver\Kbdclass \Device\KeyboardClass1 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
    AttachedDevice \Driver\Kbdclass \Device\KeyboardClass1 EABFiltr.sys (QLB PS/2 Keyboard filter driver/Hewlett-Packard Company)

    ---- EOF - GMER 1.0.15 ----
     
  10. 2009/09/18
    Renie

    Renie Inactive Thread Starter

    Joined:
    2008/11/28
    Messages:
    27
    Likes Received:
    0
    Malwarebytes' Anti-Malware 1.41
    Database version: 2818
    Windows 5.1.2600 Service Pack 2

    9/17/2009 9:40:54 PM
    mbam-log-2009-09-17 (21-40-54).txt

    Scan type: Full Scan (C:\|D:\|)
    Objects scanned: 119457
    Time elapsed: 25 minute(s), 36 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 1
    Registry Values Infected: 0
    Registry Data Items Infected: 1
    Folders Infected: 1
    Files Infected: 10

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

    Folders Infected:
    C:\Documents and Settings\All Users\Application Data\13696914 (Rogue.Multiple) -> Quarantined and deleted successfully.

    Files Infected:
    C:\Documents and Settings\Arnold Salasky\My Documents\Setup-30a95_02009-1724.exe (Rogue.PersonalAntiVirus) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Arnold Salasky\My Documents\Setup-7939_02009-1724.exe (Rogue.PersonalAntiVirus) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\foromogu.exe (Rogue.SystemSecurity) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\merunime.exe (Rogue.SystemSecurity) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Application Data\13696914\13696914 (Rogue.Multiple) -> Quarantined and deleted successfully.
    C:\Documents and Settings\All Users\Application Data\13696914\pc13696914ins (Rogue.Multiple) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\lowofoza.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\maligoha.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\nomadani.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\tinonere.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
     
  11. 2009/09/18
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    You don't have any antivirus program running.

    Please, download and install one of these:

    - Avira free antivirus: http://www.free-av.com/en/download/1/avira_antivir_personal__free_antivirus.html
    - Avast! free antivirus: http://www.avast.com/eng/download-avast-home.html

    - free Comodo Internet Security (firewall + AV): http://www.personalfirewall.comodo.com/
    NOTE. During installation, Comodo will also allow you to install AV only, or firewall only, if you prefer to combine one Comodo product with some other product.

    If you decide to install Avast, or Avira, make sure, Windows firewall is turned on, or use Comodo firewall..
    If you decide to install Comodo Internet Security, or just Comodo firewall, make sure, Windows firewall is turned off.

    IMPORTANT! Make sure, you use only ONE antivirus, and ONE firewall.

    After installation, update the program, run full scan.

    When done....

    Please download ComboFix from [color= "Red"]Here[/color] or [color= "#FF0000"]Here[/color] to your Desktop.

    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
    1. Please, never rename Combofix unless instructed.
    2. Close any open browsers.
    3. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
      • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results ".
      • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
      NOTE. If Combofix asks you to install Recovery Console, please allow it.
      • Close any open browsers.
      • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
      • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
      • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
    4. Double click on combofix.exe & follow the prompts.
    5. When finished, it will produce a report for you.
    6. Please post the "C:\ComboFix.txt" along with a new HijackThis log for further review.
    **Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

    Make sure, you re-enable your security programs, when you're done with Combofix.

    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
  12. 2009/09/18
    Renie

    Renie Inactive Thread Starter

    Joined:
    2008/11/28
    Messages:
    27
    Likes Received:
    0
    ComboFix 09-09-18.02 - Arnold Salasky 09/18/2009 22:36.1.1 - NTFSx86
    Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.478.150 [GMT -4:00]
    Running from: c:\documents and settings\Arnold Salasky\My Documents\Downloads\ComboFix.exe
    AV: AntiVir Desktop *On-access scanning disabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    c:\windows\system32\kofipulo.dll
    c:\windows\system32\lugatepo.dll
    c:\windows\system32\perosaro.dll
    c:\windows\system32\regoyivu.exe
    c:\windows\system32\sizumeju.dll
    c:\windows\system32\tmp.reg
    c:\windows\system32\yerofata.dll
    D:\AUTORUN.INF

    .
    ((((((((((((((((((((((((( Files Created from 2009-08-19 to 2009-09-19 )))))))))))))))))))))))))))))))
    .

    2009-09-19 02:05 . 2009-09-19 02:05 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache
    2009-09-19 02:01 . 2009-07-28 20:33 55656 ----a-w- c:\windows\system32\drivers\avgntflt.sys
    2009-09-19 02:01 . 2009-03-30 14:33 96104 ----a-w- c:\windows\system32\drivers\avipbb.sys
    2009-09-19 02:01 . 2009-02-13 16:29 22360 ----a-w- c:\windows\system32\drivers\avgntmgr.sys
    2009-09-19 02:01 . 2009-02-13 16:17 45416 ----a-w- c:\windows\system32\drivers\avgntdd.sys
    2009-09-19 02:01 . 2009-09-19 02:01 -------- d-----w- c:\program files\Avira
    2009-09-19 02:01 . 2009-09-19 02:01 -------- d-----w- c:\documents and settings\All Users\Application Data\Avira
    2009-09-18 23:04 . 2009-09-18 23:04 -------- d-sh--w- c:\documents and settings\NetworkService\IETldCache
    2009-09-18 22:31 . 2009-09-18 22:31 -------- d-sh--w- c:\documents and settings\Arnold Salasky\IECompatCache
    2009-09-18 22:27 . 2009-09-18 22:27 -------- d-sh--w- c:\documents and settings\Arnold Salasky\PrivacIE
    2009-09-18 22:23 . 2009-09-18 22:23 -------- d-sh--w- c:\windows\system32\config\systemprofile\IETldCache
    2009-09-18 22:13 . 2009-09-18 22:13 -------- d-----w- c:\windows\system32\scripting
    2009-09-18 22:13 . 2009-09-18 22:13 -------- d-----w- c:\windows\l2schemas
    2009-09-18 22:13 . 2009-09-18 22:13 -------- d-----w- c:\windows\system32\en
    2009-09-18 22:13 . 2009-09-18 22:13 -------- d-----w- c:\windows\system32\bits
    2009-09-18 22:04 . 2009-09-18 22:04 -------- d-----w- c:\windows\EHome
    2009-09-18 21:54 . 2009-09-18 21:54 -------- d-sh--w- c:\documents and settings\Arnold Salasky\IETldCache
    2009-09-18 21:50 . 2009-08-07 08:48 100352 -c----w- c:\windows\system32\dllcache\iecompat.dll
    2009-09-18 21:50 . 2009-09-18 21:50 -------- d-----w- c:\windows\ie8updates
    2009-09-18 21:50 . 2009-07-03 17:09 12800 -c----w- c:\windows\system32\dllcache\xpshims.dll
    2009-09-18 21:50 . 2009-07-03 17:09 55296 -c----w- c:\windows\system32\dllcache\msfeedsbs.dll
    2009-09-18 21:50 . 2009-07-03 17:09 594432 -c----w- c:\windows\system32\dllcache\msfeeds.dll
    2009-09-18 21:50 . 2009-07-03 17:09 1985536 -c----w- c:\windows\system32\dllcache\iertutil.dll
    2009-09-18 21:50 . 2009-07-03 17:09 246272 -c----w- c:\windows\system32\dllcache\ieproxy.dll
    2009-09-18 21:50 . 2009-07-19 22:48 11067392 -c----w- c:\windows\system32\dllcache\ieframe.dll
    2009-09-18 21:48 . 2009-09-18 21:49 -------- dc-h--w- c:\windows\ie8
    2009-09-18 21:38 . 2009-09-18 22:10 -------- d-----w- c:\windows\ServicePackFiles
    2009-09-18 21:34 . 2009-09-18 21:34 -------- d-----w- c:\program files\MSXML 4.0
    2009-09-18 16:37 . 2004-08-04 02:29 25471 ------w- c:\windows\system32\drivers\watv10nt.sys
    2009-09-18 16:37 . 2004-08-04 02:29 22271 ------w- c:\windows\system32\drivers\watv06nt.sys
    2009-09-18 16:37 . 2004-08-04 02:29 11935 ------w- c:\windows\system32\drivers\wadv11nt.sys
    2009-09-18 16:37 . 2004-08-04 02:29 11871 ------w- c:\windows\system32\drivers\wadv09nt.sys
    2009-09-18 16:37 . 2004-08-04 02:29 11807 ------w- c:\windows\system32\drivers\wadv07nt.sys
    2009-09-18 16:37 . 2004-08-04 02:29 11295 ------w- c:\windows\system32\drivers\wadv08nt.sys
    2009-09-18 16:35 . 2004-08-04 02:29 73216 ------w- c:\windows\system32\drivers\atintuxx.sys
    2009-09-18 15:55 . 2009-06-12 12:31 76288 -c----w- c:\windows\system32\dllcache\telnet.exe
    2009-09-18 15:55 . 2009-03-06 14:22 284160 -c----w- c:\windows\system32\dllcache\pdh.dll
    2009-09-18 15:55 . 2009-02-09 12:10 473600 -c----w- c:\windows\system32\dllcache\fastprox.dll
    2009-09-18 15:55 . 2009-02-09 12:10 401408 -c----w- c:\windows\system32\dllcache\rpcss.dll
    2009-09-18 15:55 . 2009-02-06 11:11 110592 -c----w- c:\windows\system32\dllcache\services.exe
    2009-09-18 15:55 . 2009-02-06 10:10 227840 -c----w- c:\windows\system32\dllcache\wmiprvse.exe
    2009-09-18 15:55 . 2009-02-09 12:10 729088 -c----w- c:\windows\system32\dllcache\lsasrv.dll
    2009-09-18 15:55 . 2009-02-09 12:10 714752 -c----w- c:\windows\system32\dllcache\ntdll.dll
    2009-09-18 15:55 . 2009-02-09 12:10 617472 -c----w- c:\windows\system32\dllcache\advapi32.dll
    2009-09-18 15:55 . 2009-02-09 12:10 453120 -c----w- c:\windows\system32\dllcache\wmiprvsd.dll
    2009-09-18 15:55 . 2009-02-06 11:08 2189056 -c----w- c:\windows\system32\dllcache\ntoskrnl.exe
    2009-09-18 15:55 . 2009-02-06 11:06 2145280 -c----w- c:\windows\system32\dllcache\ntkrnlmp.exe
    2009-09-18 15:55 . 2009-02-06 10:32 2023936 -c----w- c:\windows\system32\dllcache\ntkrpamp.exe
    2009-09-18 15:51 . 2008-10-24 11:21 455296 -c----w- c:\windows\system32\dllcache\mrxsmb.sys
    2009-09-18 15:49 . 2008-05-03 11:55 2560 ------w- c:\windows\system32\xpsp4res.dll
    2009-09-18 15:49 . 2008-04-21 12:08 215552 -c----w- c:\windows\system32\dllcache\wordpad.exe
    2009-09-18 15:49 . 2008-06-13 11:05 272128 -c----w- c:\windows\system32\dllcache\bthport.sys
    2009-09-18 15:49 . 2008-06-13 11:05 272128 ------w- c:\windows\system32\drivers\bthport.sys
    2009-09-18 15:45 . 2008-05-08 14:02 203136 -c----w- c:\windows\system32\dllcache\rmcast.sys
    2009-09-18 15:45 . 2008-12-11 10:57 333952 -c----w- c:\windows\system32\dllcache\srv.sys
    2009-09-18 15:45 . 2009-07-10 13:27 1315328 -c----w- c:\windows\system32\dllcache\msoe.dll
    2009-09-18 15:45 . 2009-08-05 09:01 204800 -c----w- c:\windows\system32\dllcache\mswebdvd.dll
    2009-09-18 15:44 . 2008-10-23 12:36 286720 -c----w- c:\windows\system32\dllcache\gdi32.dll
    2009-09-18 12:38 . 2009-01-07 22:21 26144 ----a-w- c:\windows\system32\spupdsvc.exe
    2009-09-18 12:38 . 2009-09-18 21:51 -------- d--h--w- c:\windows\$hf_mig$
    2009-09-18 11:01 . 2008-07-07 20:26 253952 -c----w- c:\windows\system32\dllcache\es.dll
    2009-09-18 11:01 . 2008-04-11 19:04 691712 -c----w- c:\windows\system32\dllcache\inetcomm.dll
    2009-09-18 11:00 . 2008-10-15 16:34 337408 -c----w- c:\windows\system32\dllcache\netapi32.dll
    2009-09-18 08:57 . 2009-09-18 08:57 -------- d-----w- c:\program files\Trend Micro
    2009-09-18 01:10 . 2009-09-18 01:10 -------- d-----w- c:\documents and settings\Arnold Salasky\Application Data\Malwarebytes
    2009-09-18 01:10 . 2009-09-10 18:54 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2009-09-18 01:10 . 2009-09-18 01:10 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2009-09-18 01:10 . 2009-09-18 01:10 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
    2009-09-18 01:10 . 2009-09-10 18:53 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
    2009-09-18 00:21 . 2009-09-18 00:21 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
    2009-09-18 00:20 . 2009-09-18 00:20 -------- d-----w- c:\program files\SUPERAntiSpyware
    2009-09-18 00:20 . 2009-09-18 00:20 -------- d-----w- c:\documents and settings\Arnold Salasky\Application Data\SUPERAntiSpyware.com
    2009-09-18 00:18 . 2009-09-18 00:18 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
    2009-09-17 02:27 . 2009-09-17 02:27 -------- d-----w- c:\documents and settings\Arnold Salasky\Application Data\AVG8
    2009-09-15 13:45 . 2009-09-16 01:09 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
    2009-09-15 13:45 . 2009-09-15 14:27 -------- d-----w- c:\program files\Spybot - Search & Destroy
    2009-09-15 13:25 . 2009-09-15 13:25 -------- d-----w- c:\documents and settings\Arnold Salasky\Local Settings\Application Data\Identities
    2009-08-20 13:57 . 2009-08-20 13:57 -------- d-----w- c:\windows\X38DIMRV05AFKOTX

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2009-09-18 22:25 . 2007-10-19 19:43 69072 ----a-w- c:\documents and settings\Arnold Salasky\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
    2009-09-18 02:58 . 2007-11-01 18:39 -------- d-----w- c:\program files\Common Files\AOL
    2009-09-18 02:58 . 2007-11-01 18:39 -------- d-----w- c:\documents and settings\All Users\Application Data\AOL
    2009-09-18 02:40 . 2009-08-17 01:11 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
    2009-09-18 02:39 . 2009-08-17 01:11 -------- d-----w- c:\program files\SpywareBlaster
    2009-09-15 17:02 . 2009-09-15 17:02 7396 ----a-w- c:\windows\system32\drivers\pctcore.cat
    2009-09-15 13:36 . 2007-12-21 17:19 -------- d-----w- c:\documents and settings\Arnold Salasky\Application Data\HP
    2009-08-17 01:07 . 2009-08-17 01:07 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{EF63305C-BAD7-4144-9208-D65528260864}
    2009-08-05 09:01 . 2004-08-04 08:56 204800 ----a-w- c:\windows\system32\mswebdvd.dll
    2009-07-29 04:37 . 2004-08-04 08:56 119808 ----a-w- c:\windows\system32\t2embed.dll
    2009-07-29 04:37 . 2001-08-18 12:00 81920 ----a-w- c:\windows\system32\fontsub.dll
    2009-07-17 19:01 . 2004-08-04 08:56 58880 ----a-w- c:\windows\system32\atl.dll
    2009-07-03 17:09 . 2004-08-04 08:56 915456 ----a-w- c:\windows\system32\wininet.dll
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "SpybotSD TeaTimer "= "c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "eabconfg.cpl "= "c:\program files\HPQ\Quick Launch Buttons\EabServr.exe" [2004-12-03 290816]
    "IgfxTray "= "c:\windows\system32\igfxtray.exe" [2004-10-08 155648]
    "HotKeysCmds "= "c:\windows\system32\hkcmd.exe" [2004-10-08 126976]
    "SynTPEnh "= "c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2006-03-31 761946]
    "LVCOMSX "= "c:\windows\system32\LVCOMSX.EXE" [2005-07-19 221184]
    "Malwarebytes Anti-Malware (reboot) "= "c:\program files\Malwarebytes' Anti-Malware\mbam.exe" [2009-09-10 1312080]
    "HP Software Update "= "c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2006-02-19 49152]
    "QuickTime Task "= "c:\program files\QuickTime\QTTask.exe" [2008-05-27 413696]
    "iTunesHelper "= "c:\program files\iTunes\iTunesHelper.exe" [2008-07-30 289064]
    "AppleSyncNotifier "= "c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe" [2008-07-23 116040]
    "avgnt "= "c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2009-03-02 209153]

    c:\documents and settings\All Users\Start Menu\Programs\Startup\
    HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2006-2-19 288472]
    HP Photosmart Premier Fast Start.lnk - c:\program files\HP\Digital Imaging\bin\hpqthb08.exe [2006-2-10 73728]

    [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
    "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} "= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
    2009-09-03 19:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\sdauxservice]
    @=" "

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\sdcoreservice]
    @=" "

    [HKEY_LOCAL_MACHINE\software\microsoft\security center]
    "AntiVirusOverride "=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "c:\\WINDOWS\\system32\\sessmgr.exe "=
    "c:\\Program Files\\Bonjour\\mDNSResponder.exe "=
    "c:\\Program Files\\iTunes\\iTunes.exe "=
    "c:\\Program Files\\iPod\\bin\\iPodService.exe "=
    "c:\\Program Files\\Common Files\\Apple\\Mobile Device Support\\bin\\AppleMobileDeviceService.exe "=
    "c:\\Program Files\\Common Files\\Microsoft Shared\\VS7DEBUG\\MDM.EXE "=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe "=
    "%windir%\\system32\\sessmgr.exe "=

    R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [9/15/2009 11:42 AM 9968]
    R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [9/15/2009 11:42 AM 74480]
    R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [9/18/2009 10:01 PM 108289]
    R2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\Viewpoint\Common\ViewpointService.exe [11/1/2007 2:39 PM 24652]
    S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [9/15/2009 11:42 AM 7408]

    [HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\>{60B49E34-C7CC-11D0-8953-00A0C90347FF}]
    "c:\windows\system32\rundll32.exe" "c:\windows\system32\iedkcs32.dll ",BrandIEActiveSetup SIGNUP
    .
    Contents of the 'Scheduled Tasks' folder

    2009-09-18 c:\windows\Tasks\AppleSoftwareUpdate.job
    - c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-04-11 21:57]
    .
    .
    ------- Supplementary Scan -------
    .
    uInternet Settings,ProxyOverride = *.local
    IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    FF - ProfilePath - c:\documents and settings\Arnold Salasky\Application Data\Mozilla\Firefox\Profiles\vg1so0bz.default\
    FF - prefs.js: browser.startup.homepage - hxxp://www.yahoo.com/
    FF - plugin: c:\documents and settings\Arnold Salasky\Application Data\Mozilla\Firefox\Profiles\vg1so0bz.default\extensions\moveplayer@movenetworks.com\platform\WINNT_x86-msvc\plugins\npmnqmp071303000006.dll
    FF - plugin: c:\program files\Mozilla Firefox\plugins\npViewpoint.dll
    FF - plugin: c:\program files\Viewpoint\Viewpoint Media Player\npViewpoint.dll
    .

    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2009-09-18 22:43
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    --------------------- LOCKED REGISTRY KEYS ---------------------

    [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{19114156-8E9A-4D4E-9EE9-17A0E48D3BBB}]
    @Denied: (A 2) (Everyone)
    @= "FlashBroker "
    "LocalizedString "= "@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10c.exe,-101 "

    [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{19114156-8E9A-4D4E-9EE9-17A0E48D3BBB}\Elevation]
    "Enabled "=dword:00000001

    [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{19114156-8E9A-4D4E-9EE9-17A0E48D3BBB}\LocalServer32]
    @= "c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10c.exe "

    [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{19114156-8E9A-4D4E-9EE9-17A0E48D3BBB}\TypeLib]
    @= "{FAB3E735-69C7-453B-A446-B6823C6DF1C9} "

    [HKEY_LOCAL_MACHINE\software\Classes\Interface\{1D4C8A81-B7AC-460A-8C23-98713C41D6B3}]
    @Denied: (A 2) (Everyone)
    @= "IFlashBroker3 "

    [HKEY_LOCAL_MACHINE\software\Classes\Interface\{1D4C8A81-B7AC-460A-8C23-98713C41D6B3}\ProxyStubClsid32]
    @= "{00020424-0000-0000-C000-000000000046} "

    [HKEY_LOCAL_MACHINE\software\Classes\Interface\{1D4C8A81-B7AC-460A-8C23-98713C41D6B3}\TypeLib]
    @= "{FAB3E735-69C7-453B-A446-B6823C6DF1C9} "
    "Version "= "1.0 "
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'winlogon.exe'(652)
    c:\program files\SUPERAntiSpyware\SASWINLO.dll
    c:\windows\system32\WININET.dll

    - - - - - - - > 'explorer.exe'(3728)
    c:\windows\system32\WININET.dll
    c:\windows\system32\ieframe.dll
    c:\windows\system32\webcheck.dll
    .
    ------------------------ Other Running Processes ------------------------
    .
    c:\program files\Avira\AntiVir Desktop\avguard.exe
    c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    c:\program files\Bonjour\mDNSResponder.exe
    c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    c:\program files\iPod\bin\iPodService.exe
    c:\program files\HP\Digital Imaging\bin\hpqimzone.exe
    .
    **************************************************************************
    .
    Completion time: 2009-09-19 22:48 - machine was rebooted
    ComboFix-quarantined-files.txt 2009-09-19 02:48

    Pre-Run: 43,849,744,384 bytes free
    Post-Run: 43,819,524,096 bytes free

    WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
    [boot loader]
    timeout=2
    default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
    [operating systems]
    c:\cmdcons\BOOTSECT.DAT= "Microsoft Windows Recovery Console" /cmdcons
    multi(0)disk(0)rdisk(0)partition(1)\WINDOWS= "Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect

    239 --- E O F --- 2009-09-18 22:20
     
  13. 2009/09/18
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Uninstall Combofix:
    Go Start > Run
    Type in:
    combofix /u
    Note the space between the "combofix" and the "/u "
    Restart computer.


    I need fresh HJT log.
     
  14. 2009/09/19
    Renie

    Renie Inactive Thread Starter

    Joined:
    2008/11/28
    Messages:
    27
    Likes Received:
    0
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 7:59:27, on 9/19/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v8.00 (8.00.6001.18702)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Avira\AntiVir Desktop\sched.exe
    C:\Program Files\Avira\AntiVir Desktop\avguard.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Viewpoint\Common\ViewpointService.exe
    C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe
    C:\WINDOWS\system32\hkcmd.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\WINDOWS\system32\LVCOMSX.EXE
    C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\HP\Digital Imaging\bin\hpqimzone.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O4 - HKLM\..\Run: [eabconfg.cpl] C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe /Start
    O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [LVCOMSX] C:\WINDOWS\system32\LVCOMSX.EXE
    O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
    O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe "
    O4 - HKLM\..\Run: [AppleSyncNotifier] C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe
    O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir Desktop\avgnt.exe" /min
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
    O4 - Global Startup: HP Photosmart Premier Fast Start.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Avira AntiVir Scheduler (AntiVirSchedulerService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\sched.exe
    O23 - Service: Avira AntiVir Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\avguard.exe
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: HP WMI Interface (hpqwmi) - Hewlett-Packard Development Company, L.P. - C:\Program Files\HPQ\SHARED\HPQWMI.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe

    --
    End of file - 5660 bytes
     
  15. 2009/09/19
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Please download JavaRa to your desktop and unzip it to its own folder
    • Run JavaRa.exe (Vista users! Right click on JavaRa.exe, click Run As Administrator), pick the language of your choice and click Select. Then click Remove Older Versions.
    • Accept any prompts.
    • Open JavaRa.exe again and select Search For Updates.
    • Select Update Using Sun Java's Website then click Search and click on the Open Webpage button. Download and install the latest Java Runtime Environment (JRE) version for your computer.

    Note 1: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

    Note 2: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. If you don't want to run another extra service, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and restart your computer.

    ===============================================================

    Unless you installed Viewpoint Manager knowledgeably...
    Go Start>Control Panel>Add\Remove (Programs and Features in Vista), and...
    Uninstall any of the following programs associated with Viewpoint:
    * Viewpoint Manager
    * Viewpoint Media Player
    * Viewpoint Toolbar
    This program does not do anything bad such as deliver ads or spy on you, but it is considered foistware ( "drive-by-install ") as it is installed without your consent through programs like AOl, AIM, Compuserve, etc.

    ================================================================

    Disable TeaTimer, as it'll interfere with the cleaning process:
    Right click Spybot's TeaTimer System Tray Icon.
    Click Exit Spybot-S&D Resident.
    TeaTimer closes.
    NOTE. If on re-boot, Spybot inquires about registry change(s), allow it.

    =============================================================

    Print this post out, since you won't have an access to it, at some point.

    1. Open HijackThis.

    2. Close all windows, except for HijackThis.

    3. Put checkmarks next to the following HijackThis entries:

    nothing malicious to remove

    4. You should also checkmark following entries (these are unnecessary startups; no actual programs will be removed):

    - O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
    - O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript (leave this one alone, if you have paid version)
    - O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
    - O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe "
    - O4 - HKLM\..\Run: [AppleSyncNotifier] C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe
    - O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
    - O4 - Global Startup: HP Photosmart Premier Fast Start.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
    - O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll



    5. Click on Fix checked button.

    6. Restart computer.

    7. Post new HijackThis log.
     
  16. 2009/09/19
    Renie

    Renie Inactive Thread Starter

    Joined:
    2008/11/28
    Messages:
    27
    Likes Received:
    0
    New HijackThis log

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 5:13:55, on 9/19/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v8.00 (8.00.6001.18702)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Avira\AntiVir Desktop\sched.exe
    C:\Program Files\Avira\AntiVir Desktop\avguard.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe
    C:\WINDOWS\system32\hkcmd.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\WINDOWS\system32\LVCOMSX.EXE
    C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
    C:\Program Files\Java\jre6\bin\jusched.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O4 - HKLM\..\Run: [eabconfg.cpl] C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe /Start
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [LVCOMSX] C:\WINDOWS\system32\LVCOMSX.EXE
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir Desktop\avgnt.exe" /min
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe "
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
    O23 - Service: Avira AntiVir Scheduler (AntiVirSchedulerService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\sched.exe
    O23 - Service: Avira AntiVir Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\avguard.exe
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: HP WMI Interface (hpqwmi) - Hewlett-Packard Development Company, L.P. - C:\Program Files\HPQ\SHARED\HPQWMI.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe

    --
    End of file - 4999 bytes
     
  17. 2009/09/19
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Your computer is clean :)

    1. Download Temp File Cleaner (TFC)
    Double click on TFC.exe to run the program.
    Click on Start button to begin cleaning process.
    TFC will close all running programs, and it may ask you to restart computer.

    2. Turn off System Restore:

    - Windows XP:
    1. Click Start.
    2. Right-click the My Computer icon, and then click Properties.
    3. Click the System Restore tab.
    4. Check "Turn off System Restore ".
    5. Click Apply.
    6. When turning off System Restore, the existing restore points will be deleted. Click Yes to do this.
    7. Click OK.
    - Windows Vista:
    1. Click Start.
    2. Right-click the Computer icon, and then click Properties.
    3. Click on System Protection under the Tasks column on the left side
    4. Click on Continue on the "User Account Control" window that pops up
    5. Under the System Protection tab, find Available Disks
    6. Uncheck the box for any drive you wish to disable system restore on (in most cases, drive "C: ")
    7. When turning off System Restore, the existing restore points will be deleted. Click "Turn System Restore Off" on the popup window to do this.
    8. Click OK

    3. Restart computer.

    4. Turn System Restore on.

    5. Make sure, Windows Updates are current.

    [SIZE= "4"]6. If any Trojan was listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately![/SIZE]

    7. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

    8. Run defrag at your convenience.

    9. Read How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html

    10. Please, let me know, how is your computer doing.
     
  18. 2009/09/19
    Renie

    Renie Inactive Thread Starter

    Joined:
    2008/11/28
    Messages:
    27
    Likes Received:
    0
    Hi Broni,
    Everything seems crisp, fast and a breath of fresh air. Thank so much for your expertise.
    However, I have one followup question: Since this is my daughter's laptop(the subject machine), should any of these procedures be done on my primary desk top PC as a precaution to get it clean and in first class order? I don't suspect any spyware, malware, or viruses.
    I am currently using Panda Cloud Antivirus and Spybot.
    Thanks for the lessons that you have shared with this Forum.
    Renie
     
  19. 2009/09/20
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    I'm glad, everything works fine :)

    Surely, you can start another thread about your computer and we'll take a look...
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.