PDA

View Full Version : Help



altec900
2008-11-12, 00:00
Hey bear with me I'm a first timer. Below is Hijack Log. I'm getting firewall bypass along with virtumonde. Spybot seems to remove but after rebooting viruse's come back. Any help would be fine. Thanks


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 4:54:32 PM, on 11/11/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal

Running processes:
E:\WINDOWS\System32\smss.exe
E:\WINDOWS\system32\winlogon.exe
E:\WINDOWS\system32\services.exe
E:\WINDOWS\system32\lsass.exe
E:\WINDOWS\system32\svchost.exe
E:\WINDOWS\System32\svchost.exe
E:\WINDOWS\system32\LEXBCES.EXE
E:\WINDOWS\system32\spoolsv.exe
E:\WINDOWS\system32\LEXPPS.EXE
E:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
E:\WINDOWS\Explorer.EXE
E:\WINDOWS\system32\nvsvc32.exe
E:\WINDOWS\System32\svchost.exe
E:\WINDOWS\system32\RUNDLL32.EXE
E:\Program Files\Google\Gmail Notifier\gnotify.exe
E:\Program Files\Common Files\Ulead Systems\AutoDetector\monitor.exe
E:\Program Files\EPSON\Creativity Suite\Event Manager\EEventManager.exe
E:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
E:\WINDOWS\system32\ctfmon.exe
E:\Program Files\Microsoft Office\Office\FINDFAST.EXE
E:\Program Files\Microsoft Office\Office\OSA.EXE
E:\WINDOWS\System32\igfxsrvc.exe
E:\WINDOWS\system32\7PUQYY8U.exe
c:\program files\internet explorer\iexplore.exe
E:\WINDOWS\system32\ctfmon.exe
E:\Program Files\Mozilla Firefox\firefox.exe
E:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.wraltv.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - E:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {80ee2eaa-1288-43d2-a515-fc4001c35c09} - E:\WINDOWS\system32\luravufa.dll
O4 - HKLM\..\Run: [HotKeysCmds] E:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE E:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE E:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [{0228e555-4f9c-4e35-a3ec-b109a192b4c2}] E:\Program Files\Google\Gmail Notifier\gnotify.exe
O4 - HKLM\..\Run: [Ulead AutoDetector v2] E:\Program Files\Common Files\Ulead Systems\AutoDetector\monitor.exe
O4 - HKLM\..\Run: [EEventManager] E:\Program Files\EPSON\Creativity Suite\Event Manager\EEventManager.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "E:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [IntelAudioStudio] "E:\Program Files\Intel Audio Studio\IntelAudioStudio.exe" BOOT
O4 - HKLM\..\Run: [mopuneniru] Rundll32.exe "E:\WINDOWS\system32\ranuvozo.dll",s
O4 - HKLM\..\Run: [CPMfb6ed207] Rundll32.exe "e:\windows\system32\lulakodu.dll",a
O4 - HKLM\..\RunOnce: [SpybotDeletingA4002] command /c del "e:\windows\system32\lulakodu.dll_old"
O4 - HKLM\..\RunOnce: [SpybotDeletingC7944] cmd /c del "e:\windows\system32\lulakodu.dll_old"
O4 - HKCU\..\Run: [SpybotSD TeaTimer] E:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [ctfmon.exe] E:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\RunOnce: [SpybotDeletingD9681] cmd /c del "e:\windows\system32\lulakodu.dll_old"
O4 - HKUS\S-1-5-19\..\Run: [mopuneniru] Rundll32.exe "E:\WINDOWS\system32\ranuvozo.dll",s (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [mopuneniru] Rundll32.exe "E:\WINDOWS\system32\ranuvozo.dll",s (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\RunOnce: [FlashPlayerUpdate] E:\WINDOWS\System32\Macromed\Flash\FlashUtil9e.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\RunOnce: [FlashPlayerUpdate] E:\WINDOWS\System32\Macromed\Flash\FlashUtil9e.exe (User 'Default user')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = E:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Microsoft Find Fast.lnk = E:\Program Files\Microsoft Office\Office\FINDFAST.EXE
O4 - Global Startup: Office Startup.lnk = E:\Program Files\Microsoft Office\Office\OSA.EXE
O4 - Global Startup: VPN Client.lnk = ?
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - E:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - E:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - E:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - E:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - E:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - E:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1207021349905
O20 - AppInit_DLLs: E:\WINDOWS\system32\fimijole.dll e:\windows\system32\wikufalu.dll e:\windows\system32\nahuvihi.dll e:\windows\system32\lulakodu.dll
O22 - SharedTaskScheduler: STS - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - e:\windows\system32\lulakodu.dll (file missing)
O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - E:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - E:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - E:\WINDOWS\system32\nvsvc32.exe

--
End of file - 6209 bytes

ken545
2008-11-12, 03:02
Hello altec900

Welcome to Safer Networking.

Please read Before You Post (http://forums.spybot.info/showthread.php?t=288)
That said, All advice given by anyone volunteering here, is taken at your own risk.
While best efforts are made to assist in removing infections safely, unexpected stuff can happen.
It is advisable that you back up your personal data before starting any clean up procedure.

Do this first...Important

Disable the TeaTimer, leave it disabled until we're done or it will prevent fixes from taking

Run Spybot-S&D in Advanced Mode.
If it is not already set to do this Go to the Mode menu select "Advanced Mode"
On the left hand side, Click on Tools
Then click on the Resident Icon in the List
Uncheck "Resident TeaTimer" and OK any prompts.
Restart your computer.<--You need to do this for it to take effect


Please do not proceed until the TeaTimer is disabled




Open HijackThis > Do a System Scan Only, close your browser and all open windows including this one, the only program or window you should have open is HijackThis, check the following entries and click on Fix Checked.


O2 - BHO: (no name) - {80ee2eaa-1288-43d2-a515-fc4001c35c09} - E:\WINDOWS\system32\luravufa.dll

O4 - HKLM\..\Run: [mopuneniru] Rundll32.exe "E:\WINDOWS\system32\ranuvozo.dll",s
O4 - HKLM\..\Run: [CPMfb6ed207] Rundll32.exe "e:\windows\system32\lulakodu.dll",a
O4 - HKLM\..\RunOnce: [SpybotDeletingA4002] command /c del "e:\windows\system32\lulakodu.dll_old"
O4 - HKLM\..\RunOnce: [SpybotDeletingC7944] cmd /c del "e:\windows\system32\lulakodu.dll_old"
O4 - HKCU\..\RunOnce: [SpybotDeletingD9681] cmd /c del "e:\windows\system32\lulakodu.dll_old"
O4 - HKUS\S-1-5-19\..\Run: [mopuneniru] Rundll32.exe "E:\WINDOWS\system32\ranuvozo.dll",s (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [mopuneniru] Rundll32.exe "E:\WINDOWS\system32\ranuvozo.dll",s (User 'NETWORK SERVICE')

O20 - AppInit_DLLs: E:\WINDOWS\system32\fimijole.dll e:\windows\system32\wikufalu.dll e:\windows\system32\nahuvihi.dll e:\windows\system32\lulakodu.dll

O22 - SharedTaskScheduler: STS - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - e:\windows\system32\lulakodu.dll (file missing)




Please download ATF Cleaner (http://www.atribune.org/ccount/click.php?id=1) by Atribune to your desktop.

This program is for XP and Windows 2000 only
Double-click ATF-Cleaner.exe to run the program.
Under Main choose: Select All
Click the Empty Selected button.Your system may start up slower after running ATF Cleaner, this is expected but will be back to normal after the first or second boot up
Please note: If you use online banking or are registered online with any other organizations, ensure you have memorized password and other personal information as removing cookies will temporarily disable the auto-login facility.




Please download Malwarebytes' Anti-Malware from Here (http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html) or Here (http://www.besttechie.net/tools/mbam-setup.exe)

Double Click mbam-setup.exe to install the application.

Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
If an update is found, it will download and install the latest version.
Once the program has loaded, select "Perform Quick Scan", then click Scan.
The scan may take some time to finish,so please be patient.
When the scan is complete, click OK, then Show Results to view the results.
Make sure that everything is checked, and click Remove Selected.<-- Don't forget this
When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.
The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
Copy and Paste the entire report in your next reply along with a New Hijackthis log.

altec900
2008-11-12, 04:32
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 9:28:38 PM, on 11/11/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal

Running processes:
E:\WINDOWS\System32\smss.exe
E:\WINDOWS\system32\winlogon.exe
E:\WINDOWS\system32\services.exe
E:\WINDOWS\system32\lsass.exe
E:\WINDOWS\system32\svchost.exe
E:\WINDOWS\System32\svchost.exe
E:\WINDOWS\system32\LEXBCES.EXE
E:\WINDOWS\system32\spoolsv.exe
E:\WINDOWS\system32\LEXPPS.EXE
E:\WINDOWS\Explorer.EXE
E:\WINDOWS\system32\RUNDLL32.EXE
E:\Program Files\Google\Gmail Notifier\gnotify.exe
E:\Program Files\Common Files\Ulead Systems\AutoDetector\monitor.exe
E:\Program Files\EPSON\Creativity Suite\Event Manager\EEventManager.exe
E:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe
E:\WINDOWS\system32\ctfmon.exe
E:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
E:\WINDOWS\system32\nvsvc32.exe
E:\WINDOWS\System32\svchost.exe
E:\Program Files\Microsoft Office\Office\FINDFAST.EXE
E:\Program Files\Microsoft Office\Office\OSA.EXE
E:\WINDOWS\system32\wscntfy.exe
E:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.wraltv.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - E:\PROGRA~1\SPYBOT~1\SDHelper.dll
O4 - HKLM\..\Run: [HotKeysCmds] E:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE E:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE E:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [{0228e555-4f9c-4e35-a3ec-b109a192b4c2}] E:\Program Files\Google\Gmail Notifier\gnotify.exe
O4 - HKLM\..\Run: [Ulead AutoDetector v2] E:\Program Files\Common Files\Ulead Systems\AutoDetector\monitor.exe
O4 - HKLM\..\Run: [EEventManager] E:\Program Files\EPSON\Creativity Suite\Event Manager\EEventManager.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "E:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [IntelAudioStudio] "E:\Program Files\Intel Audio Studio\IntelAudioStudio.exe" BOOT
O4 - HKCU\..\Run: [ctfmon.exe] E:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-19\..\Run: [mopuneniru] Rundll32.exe "E:\WINDOWS\system32\ranuvozo.dll",s (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [mopuneniru] Rundll32.exe "E:\WINDOWS\system32\ranuvozo.dll",s (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\RunOnce: [FlashPlayerUpdate] E:\WINDOWS\System32\Macromed\Flash\FlashUtil9e.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\RunOnce: [FlashPlayerUpdate] E:\WINDOWS\System32\Macromed\Flash\FlashUtil9e.exe (User 'Default user')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = E:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Microsoft Find Fast.lnk = E:\Program Files\Microsoft Office\Office\FINDFAST.EXE
O4 - Global Startup: Office Startup.lnk = E:\Program Files\Microsoft Office\Office\OSA.EXE
O4 - Global Startup: VPN Client.lnk = ?
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - E:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - E:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - E:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - E:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - E:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - E:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1207021349905
O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - E:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - E:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - E:\WINDOWS\system32\nvsvc32.exe

--
End of file - 5124 bytes


Malwarebytes' Anti-Malware 1.30
Database version: 1386
Windows 5.1.2600 Service Pack 2

11/11/2008 9:22:17 PM
mbam-log-2008-11-11 (21-22-17).txt

Scan type: Quick Scan
Objects scanned: 44565
Time elapsed: 1 minute(s), 34 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 6
Registry Keys Infected: 14
Registry Values Infected: 4
Registry Data Items Infected: 5
Folders Infected: 0
Files Infected: 21

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
E:\WINDOWS\system32\vojijaje.dll (Trojan.Vundo.H) -> Delete on reboot.
E:\WINDOWS\system32\ranuvozo.dll (Trojan.Vundo) -> Delete on reboot.
E:\WINDOWS\system32\kohajawu.dll (Trojan.Vundo) -> Delete on reboot.
E:\WINDOWS\system32\fimijole.dll (Trojan.Vundo) -> Delete on reboot.
E:\WINDOWS\system32\luravufa.dll (Trojan.Vundo) -> Delete on reboot.
E:\WINDOWS\system32\4RWSBB5W.dll (Adware.Agent) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{80ee2eaa-1288-43d2-a515-fc4001c35c09} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{80ee2eaa-1288-43d2-a515-fc4001c35c09} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{80ee2eaa-1288-43d2-a515-fc4001c35c09} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{00476c87-a276-49bf-86bc-ff005732430b} (Adware.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{892b2785-b0d0-4aa2-ae6a-0ed60b00a979} (Adware.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{99c6d1bb-7555-474c-91da-d8fb62a9cc75} (Adware.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{99c6d1bb-7555-474c-91da-d8fb62a9cc75} (Adware.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{99c6d1bb-7555-474c-91da-d8fb62a9cc75} (Adware.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\solution.solution (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\solution.solution.1 (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\{e81cf86b-f683-422a-b742-3f2427ea9d6a} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mopuneniru (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\ssodl (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cpmfb6ed207 (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo) -> Data: e:\windows\system32\kohajawu.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo) -> Data: system32\kohajawu.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo) -> Data: e:\windows\system32\fimijole.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo) -> Data: e:\windows\system32\fimijole.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo) -> Data: system32\fimijole.dll -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
E:\WINDOWS\system32\semasema.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
E:\WINDOWS\system32\amesames.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
E:\WINDOWS\system32\vogapasa.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
E:\WINDOWS\system32\asapagov.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
E:\WINDOWS\system32\vojijaje.dll (Trojan.Vundo.H) -> Delete on reboot.
E:\WINDOWS\system32\ejajijov.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
E:\WINDOWS\system32\wigafipe.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
E:\WINDOWS\system32\epifagiw.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
E:\WINDOWS\system32\ranuvozo.dll (Trojan.Vundo) -> Delete on reboot.
E:\WINDOWS\system32\kohajawu.dll (Trojan.Vundo) -> Delete on reboot.
E:\WINDOWS\system32\fimijole.dll (Trojan.Vundo) -> Delete on reboot.
E:\WINDOWS\system32\luravufa.dll (Trojan.Vundo) -> Delete on reboot.
E:\WINDOWS\system32\4RWSBB5W.dll (Adware.Agent) -> Delete on reboot.
E:\WINDOWS\system32\regopimu.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
E:\WINDOWS\system32\revulazo.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
E:\WINDOWS\system32\demayoha.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
E:\WINDOWS\system32\duyovaha.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
E:\WINDOWS\system32\wiwisoho.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
E:\WINDOWS\system32\2EqI3tI5.exe.a_a (Trojan.Agent) -> Quarantined and deleted successfully.
E:\WINDOWS\system32\6AEJOjt7.exe.a_a (Trojan.Agent) -> Quarantined and deleted successfully.
E:\WINDOWS\system32\7PUQYY8U.exe.a_a (Trojan.Agent) -> Quarantined and deleted successfully.

ken545
2008-11-12, 04:43
Hello,

Remove these with HJT.

O4 - HKUS\S-1-5-19\..\Run: [mopuneniru] Rundll32.exe "E:\WINDOWS\system32\ranuvozo.dll",s (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [mopuneniru] Rundll32.exe "E:\WINDOWS\system32\ranuvozo.dll",s (User 'NETWORK SERVICE')





Download ComboFix from one of these locations:

Link 1 (http://download.bleepingcomputer.com/sUBs/ComboFix.exe)
Link 2 (http://www.forospyware.com/sUBs/ComboFix.exe)
Link 3 (http://subs.geekstogo.com/ComboFix.exe)

* IMPORTANT !!! Save ComboFix.exe to your Desktop


Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
See this Link (http://www.bleepingcomputer.com/forums/topic114351.html) for programs that need to be disabled and instruction on how to disable them.
Remember to re-enable them when we're done.


Double click on ComboFix.exe & follow the prompts.


As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.


Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



http://i24.photobucket.com/albums/c30/ken545/RcAuto1.gif


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

http://i24.photobucket.com/albums/c30/ken545/whatnext.jpg

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply along with a New Hijackthis log.

*If there is no internet connection when Combofix has completely finished then restart your computer to restore back the connections.

altec900
2008-11-12, 04:57
ComboFix 08-11-10.01 - JR 2008-11-11 21:53:39.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.1603 [GMT -5:00]
Running from: e:\documents and settings\JR\My Documents\ComboFix.exe
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

e:\windows\Readme.txt
e:\windows\system32\i62150n8.dll
e:\windows\system32\x64

.
((((((((((((((((((((((((( Files Created from 2008-10-12 to 2008-11-12 )))))))))))))))))))))))))))))))
.

2008-11-11 21:18 . 2008-11-11 21:18 <DIR> d-------- e:\program files\Malwarebytes' Anti-Malware
2008-11-11 21:18 . 2008-11-11 21:18 <DIR> d-------- e:\documents and settings\JR\Application Data\Malwarebytes
2008-11-11 21:18 . 2008-11-11 21:18 <DIR> d-------- e:\documents and settings\All Users\Application Data\Malwarebytes
2008-11-11 21:18 . 2008-10-22 16:28 38,496 --a------ e:\windows\system32\drivers\mbamswissarmy.sys
2008-11-11 21:18 . 2008-10-22 16:28 15,504 --a------ e:\windows\system32\drivers\mbam.sys
2008-11-11 16:27 . 2008-11-11 16:27 <DIR> d-------- E:\VundoFix Backups
2008-11-11 16:21 . 2008-11-11 16:21 <DIR> d-------- e:\program files\Trend Micro
2008-11-10 21:44 . 2008-11-10 22:05 <DIR> d-------- e:\documents and settings\All Users\Application Data\Lavasoft
2008-11-10 18:04 . 2008-11-10 18:04 120 ---hs---- e:\windows\system32\esakafod.ini
2008-11-09 11:48 . 2008-11-11 16:08 211 --a------ e:\windows\wininit.ini
2008-10-18 20:36 . 2008-11-09 11:29 <DIR> d-------- e:\program files\Spybot - Search & Destroy
2008-10-18 20:36 . 2008-11-11 17:35 <DIR> d-------- e:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2008-10-12 15:04 . 2008-10-12 15:02 30,272 --a------ e:\windows\system32\2EqI3tI5.exe

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-11-12 01:18 40,450 ----a-w e:\windows\system32\7PUQYY8U.exe
2008-09-25 21:43 --------- d-----w e:\program files\Common Files\Deterministic Networks
2008-09-25 21:43 --------- d-----w e:\program files\Cisco Systems
2008-09-25 21:37 --------- d--h--w e:\program files\InstallShield Installation Information
2008-09-06 02:13 29,824 ----a-w e:\windows\system32\6AEJOjt7.exe
2007-06-21 23:38 30,280 ----a-w e:\program files\mozilla firefox\plugins\cgpcfg.dll
2007-06-21 23:38 79,432 ----a-w e:\program files\mozilla firefox\plugins\CgpCore.dll
2007-06-21 23:38 71,240 ----a-w e:\program files\mozilla firefox\plugins\confmgr.dll
2007-06-21 23:38 140,872 ----a-w e:\program files\mozilla firefox\plugins\ctxmui.dll
2007-06-21 23:39 38,472 ----a-w e:\program files\mozilla firefox\plugins\icafile.dll
2007-06-21 23:39 46,664 ----a-w e:\program files\mozilla firefox\plugins\icalogon.dll
2007-06-21 23:39 34,376 ----a-w e:\program files\mozilla firefox\plugins\logging.dll
2007-06-21 23:39 685,640 ----a-w e:\program files\mozilla firefox\plugins\sslsdk_b.dll
2007-06-21 23:40 30,280 ----a-w e:\program files\mozilla firefox\plugins\TcpPServ.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="e:\windows\system32\ctfmon.exe" [2004-08-04 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"HotKeysCmds"="e:\windows\System32\hkcmd.exe" [2006-12-12 106496]
"NvCplDaemon"="e:\windows\system32\NvCpl.dll" [2007-06-28 8466432]
"NvMediaCenter"="e:\windows\system32\NvMcTray.dll" [2007-06-28 81920]
"{0228e555-4f9c-4e35-a3ec-b109a192b4c2}"="e:\program files\Google\Gmail Notifier\gnotify.exe" [2005-07-15 479232]
"Ulead AutoDetector v2"="e:\program files\Common Files\Ulead Systems\AutoDetector\monitor.exe" [2005-05-23 90112]
"EEventManager"="e:\program files\EPSON\Creativity Suite\Event Manager\EEventManager.exe" [2005-04-08 102400]
"Adobe Reader Speed Launcher"="e:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2008-06-12 34672]
"IntelAudioStudio"="e:\program files\Intel Audio Studio\IntelAudioStudio.exe" [2008-01-24 9142272]
"nwiz"="nwiz.exe" [2007-06-28 e:\windows\system32\nwiz.exe]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"FlashPlayerUpdate"="e:\windows\System32\Macromed\Flash\FlashUtil9e.exe" [2007-11-20 218496]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run-]
"ctfmon.exe"=e:\windows\system32\ctfmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\BTVRegistrationService.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\BTVLibraryService.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\BTVNetworkService.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\BTVNotifierService.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\BTVRecordingEngine.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\BTVGuideDataLoader.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\BTVSettingsService.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\BTVTaskManagerService.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\BTVD3DShell.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\SetupWizard.exe"=
"e:\\WINDOWS\\system32\\LEXPPS.EXE"=
"e:\\WINDOWS\\system32\\logonui.exe"=
"e:\\Program Files\\Cisco Systems\\VPN Client\\cvpnd.exe"=
"e:\\WINDOWS\\system32\\winlogon.exe"=
"e:\\WINDOWS\\system32\\spoolsv.exe"=
"e:\\WINDOWS\\system32\\services.exe"=
"e:\\WINDOWS\\system32\\lsass.exe"=
"e:\\WINDOWS\\system32\\7PUQYY8U.exe"=

R3 xcbdaNtsc;ViXS Tuner Card (NTSC);e:\windows\system32\DRIVERS\xcbda.sys [2006-11-17 147328]
S3 PciCon;PciCon;F:\PciCon.sys [ ]

*Newly Created Service* - PROCEXP90
.
Contents of the 'Scheduled Tasks' folder

2008-11-01 e:\windows\Tasks\At1.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-11 e:\windows\Tasks\At10.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-11 e:\windows\Tasks\At11.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-11 e:\windows\Tasks\At12.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-11 e:\windows\Tasks\At13.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-11 e:\windows\Tasks\At14.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-11 e:\windows\Tasks\At15.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-11 e:\windows\Tasks\At16.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-11 e:\windows\Tasks\At17.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-11 e:\windows\Tasks\At18.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-11 e:\windows\Tasks\At19.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-01 e:\windows\Tasks\At2.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-12 e:\windows\Tasks\At20.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-12 e:\windows\Tasks\At21.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-12 e:\windows\Tasks\At22.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-11 e:\windows\Tasks\At23.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-01 e:\windows\Tasks\At24.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-01 e:\windows\Tasks\At25.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-01 e:\windows\Tasks\At26.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-01 e:\windows\Tasks\At27.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-01 e:\windows\Tasks\At28.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-01 e:\windows\Tasks\At29.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-01 e:\windows\Tasks\At3.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-01 e:\windows\Tasks\At30.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-01 e:\windows\Tasks\At31.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-10 e:\windows\Tasks\At32.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-11 e:\windows\Tasks\At33.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-11 e:\windows\Tasks\At34.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-11 e:\windows\Tasks\At35.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-11 e:\windows\Tasks\At36.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-11 e:\windows\Tasks\At37.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-11 e:\windows\Tasks\At38.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-11 e:\windows\Tasks\At39.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-01 e:\windows\Tasks\At4.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-11 e:\windows\Tasks\At40.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-11 e:\windows\Tasks\At41.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-11 e:\windows\Tasks\At42.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-12 e:\windows\Tasks\At43.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-12 e:\windows\Tasks\At44.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-12 e:\windows\Tasks\At45.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-12 e:\windows\Tasks\At46.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-11 e:\windows\Tasks\At47.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-01 e:\windows\Tasks\At48.job
- e:\windows\system32\7PUQYY8U.exe [2008-11-11 20:18]

2008-11-01 e:\windows\Tasks\At49.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-01 e:\windows\Tasks\At5.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-01 e:\windows\Tasks\At50.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-01 e:\windows\Tasks\At51.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-01 e:\windows\Tasks\At52.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-01 e:\windows\Tasks\At53.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-01 e:\windows\Tasks\At54.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-01 e:\windows\Tasks\At55.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-10 e:\windows\Tasks\At56.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-11 e:\windows\Tasks\At57.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-11 e:\windows\Tasks\At58.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-11 e:\windows\Tasks\At59.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-01 e:\windows\Tasks\At6.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-11 e:\windows\Tasks\At60.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-11 e:\windows\Tasks\At61.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-11 e:\windows\Tasks\At62.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-11 e:\windows\Tasks\At63.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-11 e:\windows\Tasks\At64.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-11 e:\windows\Tasks\At65.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-11 e:\windows\Tasks\At66.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-11 e:\windows\Tasks\At67.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-12 e:\windows\Tasks\At68.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-12 e:\windows\Tasks\At69.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-01 e:\windows\Tasks\At7.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-12 e:\windows\Tasks\At70.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-11 e:\windows\Tasks\At71.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-01 e:\windows\Tasks\At72.job
- e:\windows\system32\2EqI3tI5.exe [2008-10-12 15:02]

2008-11-10 e:\windows\Tasks\At8.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-11 e:\windows\Tasks\At9.job
- e:\windows\system32\6AEJOjt7.exe [2008-09-05 21:13]

2008-11-11 e:\windows\Tasks\User_Feed_Synchronization-{3222661E-4C84-4A99-8982-72A1C4218667}.job
- e:\windows\system32\msfeedssync.exe [2007-08-13 18:36]
.
.
------- Supplementary Scan -------
.
FireFox -: Profile - e:\documents and settings\JR\Application Data\Mozilla\Firefox\Profiles\igif23j7.default\
FireFox -: prefs.js - STARTUP.HOMEPAGE - hxxp://www.google.com/
FF -: plugin - e:\program files\Mozilla Firefox\plugins\npicaN.dll
.

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-11-11 21:54:12
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
Completion time: 2008-11-11 21:54:35
ComboFix-quarantined-files.txt 2008-11-12 02:54:34

Pre-Run: 31,084,257,280 bytes free
Post-Run: 31,071,309,824 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(3)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(3)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect /NoExecute=OptIn

270 --- E O F --- 2008-09-25 20:38:50



Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 9:56:33 PM, on 11/11/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal

Running processes:
E:\WINDOWS\System32\smss.exe
E:\WINDOWS\system32\winlogon.exe
E:\WINDOWS\system32\services.exe
E:\WINDOWS\system32\lsass.exe
E:\WINDOWS\system32\svchost.exe
E:\WINDOWS\System32\svchost.exe
E:\WINDOWS\system32\LEXBCES.EXE
E:\WINDOWS\system32\spoolsv.exe
E:\WINDOWS\system32\LEXPPS.EXE
E:\Program Files\Google\Gmail Notifier\gnotify.exe
E:\Program Files\Common Files\Ulead Systems\AutoDetector\monitor.exe
E:\Program Files\EPSON\Creativity Suite\Event Manager\EEventManager.exe
E:\WINDOWS\system32\ctfmon.exe
E:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
E:\WINDOWS\system32\nvsvc32.exe
E:\WINDOWS\System32\svchost.exe
E:\Program Files\Microsoft Office\Office\FINDFAST.EXE
E:\Program Files\Microsoft Office\Office\OSA.EXE
E:\WINDOWS\explorer.exe
E:\Program Files\Mozilla Firefox\firefox.exe
E:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.wraltv.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - E:\PROGRA~1\SPYBOT~1\SDHelper.dll
O4 - HKLM\..\Run: [HotKeysCmds] E:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE E:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE E:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [{0228e555-4f9c-4e35-a3ec-b109a192b4c2}] E:\Program Files\Google\Gmail Notifier\gnotify.exe
O4 - HKLM\..\Run: [Ulead AutoDetector v2] E:\Program Files\Common Files\Ulead Systems\AutoDetector\monitor.exe
O4 - HKLM\..\Run: [EEventManager] E:\Program Files\EPSON\Creativity Suite\Event Manager\EEventManager.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "E:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [IntelAudioStudio] "E:\Program Files\Intel Audio Studio\IntelAudioStudio.exe" BOOT
O4 - HKCU\..\Run: [ctfmon.exe] E:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-18\..\RunOnce: [FlashPlayerUpdate] E:\WINDOWS\System32\Macromed\Flash\FlashUtil9e.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\RunOnce: [FlashPlayerUpdate] E:\WINDOWS\System32\Macromed\Flash\FlashUtil9e.exe (User 'Default user')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = E:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Microsoft Find Fast.lnk = E:\Program Files\Microsoft Office\Office\FINDFAST.EXE
O4 - Global Startup: Office Startup.lnk = E:\Program Files\Microsoft Office\Office\OSA.EXE
O4 - Global Startup: VPN Client.lnk = ?
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - E:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - E:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - E:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - E:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1207021349905
O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - E:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - E:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - E:\WINDOWS\system32\nvsvc32.exe

--
End of file - 4562 bytes


Thanks so much!

ken545
2008-11-12, 12:17
Good Morning,

Open Notepad Go to Start> All Programs> Assessories> Notepad ( this will only work with Notepad )and copy all the text inside the Codebox by highlighting it all and pressing CTRL C on your keyboard, then paste it into Notepad, make sure there is no space before and above File::




File::
e:\windows\system32\2EqI3tI5.exe
e:\windows\system32\7PUQYY8U.exe
e:\windows\system32\6AEJOjt7.exe
e:\windows\Tasks\At1.job
e:\windows\Tasks\At10.job
e:\windows\Tasks\At11.job
e:\windows\Tasks\At12.job
e:\windows\Tasks\At13.job
e:\windows\Tasks\At14.job
e:\windows\Tasks\At15.job
e:\windows\Tasks\At16.job
e:\windows\Tasks\At17.job
e:\windows\Tasks\At18.job
e:\windows\Tasks\At19.job
e:\windows\Tasks\At2.job
e:\windows\Tasks\At20.job
e:\windows\Tasks\At21.job
e:\windows\Tasks\At22.job
e:\windows\Tasks\At23.job
e:\windows\Tasks\At24.job
e:\windows\Tasks\At25.job
e:\windows\Tasks\At26.job
e:\windows\Tasks\At27.job
e:\windows\Tasks\At28.job
e:\windows\Tasks\At29.job
e:\windows\Tasks\At3.job
e:\windows\Tasks\At30.job
e:\windows\Tasks\At31.job
e:\windows\Tasks\At32.job
e:\windows\Tasks\At33.job
e:\windows\Tasks\At34.job
e:\windows\Tasks\At35.job
e:\windows\Tasks\At36.job
e:\windows\Tasks\At37.job
e:\windows\Tasks\At38.job
e:\windows\Tasks\At39.job
e:\windows\Tasks\At4.job
e:\windows\Tasks\At40.job
e:\windows\Tasks\At41.job
e:\windows\Tasks\At42.job
e:\windows\Tasks\At43.job
e:\windows\Tasks\At44.job
e:\windows\Tasks\At45.job
e:\windows\Tasks\At46.job
e:\windows\Tasks\At47.job
e:\windows\Tasks\At48.job
e:\windows\Tasks\At49.job
e:\windows\Tasks\At5.job
e:\windows\Tasks\At50.job
e:\windows\Tasks\At51.job
e:\windows\Tasks\At52.job
e:\windows\Tasks\At53.job
e:\windows\Tasks\At54.job
e:\windows\Tasks\At55.job
e:\windows\Tasks\At56.job
e:\windows\Tasks\At57.job
e:\windows\Tasks\At58.job
e:\windows\Tasks\At59.job
e:\windows\Tasks\At6.job
e:\windows\Tasks\At60.job
e:\windows\Tasks\At61.job
e:\windows\Tasks\At62.job
e:\windows\Tasks\At63.job
e:\windows\Tasks\At64.job
e:\windows\Tasks\At65.job
e:\windows\Tasks\At66.job
e:\windows\Tasks\At67.job
e:\windows\Tasks\At68.job
e:\windows\Tasks\At69.job
e:\windows\Tasks\At7.job
e:\windows\Tasks\At70.job
e:\windows\Tasks\At71.job
e:\windows\Tasks\At72.job
e:\windows\Tasks\At8.job
e:\windows\Tasks\At9.job


Save this as CFScript to your desktop.

Then drag the CFScript into ComboFix.exe as you see in the screenshot below.

http://i24.photobucket.com/albums/c30/ken545/CFScriptB-4.gif


This will start ComboFix again. After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply together with a new HijackThis log.

altec900
2008-11-13, 01:27
ComboFix 08-11-10.01 - JR 2008-11-12 18:20:44.4 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.1659 [GMT -5:00]
Running from: e:\documents and settings\JR\My Documents\ComboFix.exe
Command switches used :: e:\documents and settings\JR\Desktop\CFScript.txt
* Created a new restore point

FILE ::
e:\windows\system32\2EqI3tI5.exe
e:\windows\system32\6AEJOjt7.exe
e:\windows\system32\7PUQYY8U.exe
e:\windows\Tasks\At1.job
e:\windows\Tasks\At10.job
e:\windows\Tasks\At11.job
e:\windows\Tasks\At12.job
e:\windows\Tasks\At13.job
e:\windows\Tasks\At14.job
e:\windows\Tasks\At15.job
e:\windows\Tasks\At16.job
e:\windows\Tasks\At17.job
e:\windows\Tasks\At18.job
e:\windows\Tasks\At19.job
e:\windows\Tasks\At2.job
e:\windows\Tasks\At20.job
e:\windows\Tasks\At21.job
e:\windows\Tasks\At22.job
e:\windows\Tasks\At23.job
e:\windows\Tasks\At24.job
e:\windows\Tasks\At25.job
e:\windows\Tasks\At26.job
e:\windows\Tasks\At27.job
e:\windows\Tasks\At28.job
e:\windows\Tasks\At29.job
e:\windows\Tasks\At3.job
e:\windows\Tasks\At30.job
e:\windows\Tasks\At31.job
e:\windows\Tasks\At32.job
e:\windows\Tasks\At33.job
e:\windows\Tasks\At34.job
e:\windows\Tasks\At35.job
e:\windows\Tasks\At36.job
e:\windows\Tasks\At37.job
e:\windows\Tasks\At38.job
e:\windows\Tasks\At39.job
e:\windows\Tasks\At4.job
e:\windows\Tasks\At40.job
e:\windows\Tasks\At41.job
e:\windows\Tasks\At42.job
e:\windows\Tasks\At43.job
e:\windows\Tasks\At44.job
e:\windows\Tasks\At45.job
e:\windows\Tasks\At46.job
e:\windows\Tasks\At47.job
e:\windows\Tasks\At48.job
e:\windows\Tasks\At49.job
e:\windows\Tasks\At5.job
e:\windows\Tasks\At50.job
e:\windows\Tasks\At51.job
e:\windows\Tasks\At52.job
e:\windows\Tasks\At53.job
e:\windows\Tasks\At54.job
e:\windows\Tasks\At55.job
e:\windows\Tasks\At56.job
e:\windows\Tasks\At57.job
e:\windows\Tasks\At58.job
e:\windows\Tasks\At59.job
e:\windows\Tasks\At6.job
e:\windows\Tasks\At60.job
e:\windows\Tasks\At61.job
e:\windows\Tasks\At62.job
e:\windows\Tasks\At63.job
e:\windows\Tasks\At64.job
e:\windows\Tasks\At65.job
e:\windows\Tasks\At66.job
e:\windows\Tasks\At67.job
e:\windows\Tasks\At68.job
e:\windows\Tasks\At69.job
e:\windows\Tasks\At7.job
e:\windows\Tasks\At70.job
e:\windows\Tasks\At71.job
e:\windows\Tasks\At72.job
e:\windows\Tasks\At8.job
e:\windows\Tasks\At9.job
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

e:\windows\system32\2EqI3tI5.exe
e:\windows\system32\6AEJOjt7.exe
e:\windows\system32\7PUQYY8U.exe
e:\windows\Tasks\At1.job
e:\windows\Tasks\At10.job
e:\windows\Tasks\At11.job
e:\windows\Tasks\At12.job
e:\windows\Tasks\At13.job
e:\windows\Tasks\At14.job
e:\windows\Tasks\At15.job
e:\windows\Tasks\At16.job
e:\windows\Tasks\At17.job
e:\windows\Tasks\At18.job
e:\windows\Tasks\At19.job
e:\windows\Tasks\At2.job
e:\windows\Tasks\At20.job
e:\windows\Tasks\At21.job
e:\windows\Tasks\At22.job
e:\windows\Tasks\At23.job
e:\windows\Tasks\At24.job
e:\windows\Tasks\At25.job
e:\windows\Tasks\At26.job
e:\windows\Tasks\At27.job
e:\windows\Tasks\At28.job
e:\windows\Tasks\At29.job
e:\windows\Tasks\At3.job
e:\windows\Tasks\At30.job
e:\windows\Tasks\At31.job
e:\windows\Tasks\At32.job
e:\windows\Tasks\At33.job
e:\windows\Tasks\At34.job
e:\windows\Tasks\At35.job
e:\windows\Tasks\At36.job
e:\windows\Tasks\At37.job
e:\windows\Tasks\At38.job
e:\windows\Tasks\At39.job
e:\windows\Tasks\At4.job
e:\windows\Tasks\At40.job
e:\windows\Tasks\At41.job
e:\windows\Tasks\At42.job
e:\windows\Tasks\At43.job
e:\windows\Tasks\At44.job
e:\windows\Tasks\At45.job
e:\windows\Tasks\At46.job
e:\windows\Tasks\At47.job
e:\windows\Tasks\At48.job
e:\windows\Tasks\At49.job
e:\windows\Tasks\At5.job
e:\windows\Tasks\At50.job
e:\windows\Tasks\At51.job
e:\windows\Tasks\At52.job
e:\windows\Tasks\At53.job
e:\windows\Tasks\At54.job
e:\windows\Tasks\At55.job
e:\windows\Tasks\At56.job
e:\windows\Tasks\At57.job
e:\windows\Tasks\At58.job
e:\windows\Tasks\At59.job
e:\windows\Tasks\At6.job
e:\windows\Tasks\At60.job
e:\windows\Tasks\At61.job
e:\windows\Tasks\At62.job
e:\windows\Tasks\At63.job
e:\windows\Tasks\At64.job
e:\windows\Tasks\At65.job
e:\windows\Tasks\At66.job
e:\windows\Tasks\At67.job
e:\windows\Tasks\At68.job
e:\windows\Tasks\At69.job
e:\windows\Tasks\At7.job
e:\windows\Tasks\At70.job
e:\windows\Tasks\At71.job
e:\windows\Tasks\At72.job
e:\windows\Tasks\At8.job
e:\windows\Tasks\At9.job

.
((((((((((((((((((((((((( Files Created from 2008-10-12 to 2008-11-12 )))))))))))))))))))))))))))))))
.

2008-11-11 21:18 . 2008-11-11 21:18 <DIR> d-------- e:\program files\Malwarebytes' Anti-Malware
2008-11-11 21:18 . 2008-11-11 21:18 <DIR> d-------- e:\documents and settings\JR\Application Data\Malwarebytes
2008-11-11 21:18 . 2008-11-11 21:18 <DIR> d-------- e:\documents and settings\All Users\Application Data\Malwarebytes
2008-11-11 21:18 . 2008-10-22 16:28 38,496 --a------ e:\windows\system32\drivers\mbamswissarmy.sys
2008-11-11 21:18 . 2008-10-22 16:28 15,504 --a------ e:\windows\system32\drivers\mbam.sys
2008-11-11 16:27 . 2008-11-11 16:27 <DIR> d-------- E:\VundoFix Backups
2008-11-11 16:21 . 2008-11-11 16:21 <DIR> d-------- e:\program files\Trend Micro
2008-11-10 21:44 . 2008-11-10 22:05 <DIR> d-------- e:\documents and settings\All Users\Application Data\Lavasoft
2008-11-10 18:04 . 2008-11-10 18:04 120 ---hs---- e:\windows\system32\esakafod.ini
2008-11-09 11:48 . 2008-11-11 16:08 211 --a------ e:\windows\wininit.ini
2008-10-18 20:36 . 2008-11-09 11:29 <DIR> d-------- e:\program files\Spybot - Search & Destroy
2008-10-18 20:36 . 2008-11-11 17:35 <DIR> d-------- e:\documents and settings\All Users\Application Data\Spybot - Search & Destroy

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-09-25 21:43 --------- d-----w e:\program files\Common Files\Deterministic Networks
2008-09-25 21:43 --------- d-----w e:\program files\Cisco Systems
2008-09-25 21:37 --------- d--h--w e:\program files\InstallShield Installation Information
2007-06-21 23:38 30,280 ----a-w e:\program files\mozilla firefox\plugins\cgpcfg.dll
2007-06-21 23:38 79,432 ----a-w e:\program files\mozilla firefox\plugins\CgpCore.dll
2007-06-21 23:38 71,240 ----a-w e:\program files\mozilla firefox\plugins\confmgr.dll
2007-06-21 23:38 140,872 ----a-w e:\program files\mozilla firefox\plugins\ctxmui.dll
2007-06-21 23:39 38,472 ----a-w e:\program files\mozilla firefox\plugins\icafile.dll
2007-06-21 23:39 46,664 ----a-w e:\program files\mozilla firefox\plugins\icalogon.dll
2007-06-21 23:39 34,376 ----a-w e:\program files\mozilla firefox\plugins\logging.dll
2007-06-21 23:39 685,640 ----a-w e:\program files\mozilla firefox\plugins\sslsdk_b.dll
2007-06-21 23:40 30,280 ----a-w e:\program files\mozilla firefox\plugins\TcpPServ.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="e:\windows\system32\ctfmon.exe" [2004-08-04 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"HotKeysCmds"="e:\windows\System32\hkcmd.exe" [2006-12-12 106496]
"NvCplDaemon"="e:\windows\system32\NvCpl.dll" [2007-06-28 8466432]
"NvMediaCenter"="e:\windows\system32\NvMcTray.dll" [2007-06-28 81920]
"{0228e555-4f9c-4e35-a3ec-b109a192b4c2}"="e:\program files\Google\Gmail Notifier\gnotify.exe" [2005-07-15 479232]
"Ulead AutoDetector v2"="e:\program files\Common Files\Ulead Systems\AutoDetector\monitor.exe" [2005-05-23 90112]
"EEventManager"="e:\program files\EPSON\Creativity Suite\Event Manager\EEventManager.exe" [2005-04-08 102400]
"Adobe Reader Speed Launcher"="e:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2008-06-12 34672]
"IntelAudioStudio"="e:\program files\Intel Audio Studio\IntelAudioStudio.exe" [2008-01-24 9142272]
"nwiz"="nwiz.exe" [2007-06-28 e:\windows\system32\nwiz.exe]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"FlashPlayerUpdate"="e:\windows\System32\Macromed\Flash\FlashUtil9e.exe" [2007-11-20 218496]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run-]
"ctfmon.exe"=e:\windows\system32\ctfmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\BTVRegistrationService.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\BTVLibraryService.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\BTVNetworkService.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\BTVNotifierService.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\BTVRecordingEngine.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\BTVGuideDataLoader.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\BTVSettingsService.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\BTVTaskManagerService.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\BTVD3DShell.exe"=
"e:\\Program Files\\SnapStream Media\\Beyond TV\\SetupWizard.exe"=
"e:\\WINDOWS\\system32\\LEXPPS.EXE"=
"e:\\WINDOWS\\system32\\logonui.exe"=
"e:\\Program Files\\Cisco Systems\\VPN Client\\cvpnd.exe"=
"e:\\WINDOWS\\system32\\winlogon.exe"=
"e:\\WINDOWS\\system32\\spoolsv.exe"=
"e:\\WINDOWS\\system32\\services.exe"=
"e:\\WINDOWS\\system32\\lsass.exe"=

R3 xcbdaNtsc;ViXS Tuner Card (NTSC);e:\windows\system32\DRIVERS\xcbda.sys [2006-11-17 147328]
S3 PciCon;PciCon;F:\PciCon.sys [ ]

*Newly Created Service* - CATCHME
.
Contents of the 'Scheduled Tasks' folder

2008-11-12 e:\windows\Tasks\User_Feed_Synchronization-{3222661E-4C84-4A99-8982-72A1C4218667}.job
- e:\windows\system32\msfeedssync.exe [2007-08-13 18:36]
.

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-11-12 18:21:17
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
Completion time: 2008-11-12 18:21:38
ComboFix-quarantined-files.txt 2008-11-12 23:21:34
ComboFix2.txt 2008-11-12 23:19:38
ComboFix3.txt 2008-11-12 03:42:00
ComboFix4.txt 2008-11-12 02:54:36

Pre-Run: 31,071,600,640 bytes free
Post-Run: 31,059,324,928 bytes free

260 --- E O F --- 2008-09-25 20:38:50




Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 6:23:24 PM, on 11/12/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal

Running processes:
E:\WINDOWS\System32\smss.exe
E:\WINDOWS\system32\winlogon.exe
E:\WINDOWS\system32\services.exe
E:\WINDOWS\system32\lsass.exe
E:\WINDOWS\system32\svchost.exe
E:\WINDOWS\System32\svchost.exe
E:\WINDOWS\system32\LEXBCES.EXE
E:\WINDOWS\system32\spoolsv.exe
E:\WINDOWS\system32\LEXPPS.EXE
E:\Program Files\Google\Gmail Notifier\gnotify.exe
E:\Program Files\Common Files\Ulead Systems\AutoDetector\monitor.exe
E:\Program Files\EPSON\Creativity Suite\Event Manager\EEventManager.exe
E:\WINDOWS\system32\ctfmon.exe
E:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
E:\Program Files\Microsoft Office\Office\FINDFAST.EXE
E:\Program Files\Microsoft Office\Office\OSA.EXE
E:\WINDOWS\system32\nvsvc32.exe
E:\WINDOWS\System32\svchost.exe
E:\WINDOWS\system32\wuauclt.exe
E:\WINDOWS\explorer.exe
E:\Program Files\Mozilla Firefox\firefox.exe
E:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.wraltv.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - E:\PROGRA~1\SPYBOT~1\SDHelper.dll
O4 - HKLM\..\Run: [HotKeysCmds] E:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE E:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE E:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [{0228e555-4f9c-4e35-a3ec-b109a192b4c2}] E:\Program Files\Google\Gmail Notifier\gnotify.exe
O4 - HKLM\..\Run: [Ulead AutoDetector v2] E:\Program Files\Common Files\Ulead Systems\AutoDetector\monitor.exe
O4 - HKLM\..\Run: [EEventManager] E:\Program Files\EPSON\Creativity Suite\Event Manager\EEventManager.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "E:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [IntelAudioStudio] "E:\Program Files\Intel Audio Studio\IntelAudioStudio.exe" BOOT
O4 - HKCU\..\Run: [ctfmon.exe] E:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-18\..\RunOnce: [FlashPlayerUpdate] E:\WINDOWS\System32\Macromed\Flash\FlashUtil9e.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\RunOnce: [FlashPlayerUpdate] E:\WINDOWS\System32\Macromed\Flash\FlashUtil9e.exe (User 'Default user')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = E:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Microsoft Find Fast.lnk = E:\Program Files\Microsoft Office\Office\FINDFAST.EXE
O4 - Global Startup: Office Startup.lnk = E:\Program Files\Microsoft Office\Office\OSA.EXE
O4 - Global Startup: VPN Client.lnk = ?
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - E:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - E:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - E:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - E:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1207021349905
O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - E:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - E:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - E:\WINDOWS\system32\nvsvc32.exe

--
End of file - 4595 bytes

Hey just so ya know, I had to shut everything down last night. Went through all the steps again. On a sidebar Combo fix is telling me there's a newer version. Also when I started Tea Timer again I might have got reinfected? My bad. But like I said I've gone through all steps again. Thanks.

ken545
2008-11-13, 01:43
Hi,

Your log looks fine. What I would do is keep the TeaTimer disabled and install the programs that I am linking you to as SpywareGuard ( recommended ) will conflict with the TeaTimer.


ATF Cleaner <-- Yours to keep, run it now and then to clean out the clutter.

Malwarebytes <-- Yours to keep also, check for updates and run a scan now and then.

Hijackthis <---Your call, hopefully you won't need it again, if you do you can redownload it

Combofix <---Is not a general cleaning tool, just run it with supervision or you can bork your system


Click START then RUN
Now type Combofix /u in the runbox and click OK. Note the space between the X and the U, it needs to be there.


http://i189.photobucket.com/albums/z176/EPL47/CF_Cleanup.png


When shown the disclaimer, Select "2"

The above procedure will:

Delete the following:
ComboFix and its associated files and folders.
VundoFix backups, if present
The C:\Deckard folder, if present
The C:_OtMoveIt folder, if present
Reset the clock settings.
Hide file extensions, if required.
Hide System/Hidden files, if required.
Reset System Restore.



How did I get infected in the first place ? Read these links and find out how to prevent getting infected again.
Tutorial for System Restore (http://www.bleepingcomputer.com/tutorials/tutorial56.html) <-- Do this first to prevent yourself from being reinfected.
WhattheTech (http://forums.whatthetech.com/So_how_did_I_get_infected_in_the_first_place_t57817.html)
TonyKlein CastleCops (http://www.castlecops.com/postlite7736-.html)
Grinler BleepingComputer (http://www.bleepingcomputer.com/forums/topic2520.html)
GeeksTo Go (http://www.geekstogo.com/forum/index.php?autocom=custom&page=How_did_I)
Dslreports (http://www.dslreports.com/faq/10002)




Keep in mind if you install some of these programs. Only ONE Anti Virus and only ONE Firewall is recommended, more is overkill and can cause you problems. You can install all the Spyware programs I have listed without any problems. If you install Spyware Blaster, you can still install Spybot Search and Destroy but do not enable the TeaTimer in Spybot.

Here are some free programs to install, all free and highly regarded by the fine people in the Malware Removal Community

Spybot Search and Destroy 1.6 (http://www.safer-networking.org/en/download/)
Check for Updates/ Immunize and run a Full System Scan on a regular basis. If you install Spyware Blaster ( Recommended ) then do not enable the TeaTimer in Spybot Search and Destroy.

Spyware Blaster (http://www.javacoolsoftware.com/spywareblaster.html) It will prevent most spyware from ever being installed. No scan to run, just update about once a week and enable all protection.

Spyware Guard (http://www.javacoolsoftware.com/spywareguard.html) It offers realtime protection from spyware installation attempts, again, no scan to run, just install it and let it do its thing.

IE-Spyad (http://www.pcworld.com/downloads/file/fid,23332-order,1-page,1-c,antispywaretools/description.html)
IE-Spyad places over 6000 web sites and domains in the IE Restricted list which will severely impair attempts to infect your system. It basically prevents any downloads (cookies etc) from the sites listed, although you will still be able to connect to the sites.

Firefox 3 (http://www.mozilla.org/products/firefox/) It has more features and is a lot more secure than IE. It is a very easy and painless download and install, it will no way interfere with IE, you can use them both.



Safe Surfn
Ken

altec900
2008-11-13, 01:47
Thanks so much for your help Ken!

ken545
2008-11-13, 01:55
Your very welcome my friend , glad we could help you :bigthumb:

Ken:p: