PDA

View Full Version : Help I am in Spyware HELL!!!



PokerPop3
2009-01-07, 23:17
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 5:15:16 PM, on 1/7/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.5730.0011)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec\pcAnywhere\awhost32.exe
C:\Program Files\Wave Systems Corp\Common\DataServer.exe
C:\Program Files\DigitalPersona\Bin\DpHost.exe
C:\WINDOWS\system32\EloSrvce.exe
c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
c:\revention\revbackup.exe
c:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\NTRU Cryptosystems\NTRU Hybrid TSS v2.0.25\bin\tcsd_win32.exe
C:\WINDOWS\system32\mqsvc.exe
C:\WINDOWS\system32\mqtgsvc.exe
c:\revention\reventioncallerid.exe
c:\revention\revprtservice.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Wave Systems Corp\Services Manager\DocMgr\bin\docmgr.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\ctfmon.exe
C:\911\BIN\CCV_SERVER.EXE
C:\WINDOWS\system32\EloDkMon.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://webmail.fuelpizza.com/src/login.php
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://go.microsoft.com/fwlink/?LinkId=74005
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {4796eefd-bf22-40c5-bd90-c5a1724078e0} - C:\WINDOWS\system32\tubijeki.dll
O4 - HKLM\..\Run: [Document Manager] C:\Program Files\Wave Systems Corp\Services Manager\DocMgr\bin\docmgr.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [nobigasefe] Rundll32.exe "C:\WINDOWS\system32\fokubino.dll",s
O4 - HKLM\..\Run: [9083dfe4] rundll32.exe "C:\WINDOWS\system32\rizakoyu.dll",b
O4 - HKLM\..\Run: [CPM93b0ec78] Rundll32.exe "c:\windows\system32\hufopogi.dll",a
O4 - HKLM\..\RunOnce: [WIAWizardMenu] RUNDLL32.EXE C:\WINDOWS\system32\sti_ci.dll,WiaCreateWizardMenu
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-19\..\Run: [nobigasefe] Rundll32.exe "C:\WINDOWS\system32\fokubino.dll",s (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [nobigasefe] Rundll32.exe "C:\WINDOWS\system32\fokubino.dll",s (User 'NETWORK SERVICE')
O4 - Global Startup: CC Server.lnk = C:\911\BIN\CCV_SERVER.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MI1933~1\Office12\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MI1933~1\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1165494474203
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1168523958010
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{94FDB30E-7CDD-4A70-A67F-4CD65DAA8E01}: NameServer = 192.168.1.254
O20 - AppInit_DLLs: wxvault.dll c:\windows\system32\puwohuwu.dll c:\windows\system32\nageduge.dll c:\windows\system32\nenepoke.dll C:\WINDOWS\system32\fawuruvo.dll c:\windows\system32\hufopogi.dll
O21 - SSODL: SSODL - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - c:\windows\system32\hufopogi.dll
O22 - SharedTaskScheduler: STS - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - c:\windows\system32\hufopogi.dll
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: DataSvr2 - Wave Systems Corp. - C:\Program Files\Wave Systems Corp\Common\DataServer.exe
O23 - Service: Biometric Authentication Service (DpHost) - Digital Persona, Inc. - C:\Program Files\DigitalPersona\Bin\DpHost.exe
O23 - Service: EloSystemService - Elo Touchsystems, Inc. - C:\WINDOWS\system32\EloSrvce.exe
O23 - Service: RevBackup - - c:\revention\revbackup.exe
O23 - Service: RevCallerId - - c:\revention\reventioncallerid.exe
O23 - Service: Revention Print Server (RevPrtSrv) - - c:\revention\revprtservice.exe
O23 - Service: NTRU Hybrid TSS v2.0.25 TCS (tcsd_win32.exe) - Unknown owner - C:\Program Files\NTRU Cryptosystems\NTRU Hybrid TSS v2.0.25\bin\tcsd_win32.exe

--
End of file - 5995 bytes

pskelley
2009-01-12, 15:07
Welcome to Safer Networking, I wish to be sure you have viewed and understand this information.
"BEFORE you POST" (READ this Procedure before Requesting Assistance) http://forums.spybot.info/showthread.php?t=288
All advice given is taken at your own risk.
Please make sure you have read this information so we are on the same page.

Make sure you read and follow the directions, anything else will slow the process and waste both of our time. I suggest you keep this computer offline except when troubleshooting, the junk may download more. If you have any tool I use, delete it and download it new from the link I provide. Read and follow the directions carefully, the tools will not work unless you do.
The junk can be tough to remove, so do not expect fast or easy.

I apologize for the wait, volunteers are swamped at all forums with infected computers. If you have resolved your issues, please post to let me know so I can close this topic.

If you still need help, and you have read and followed the "Before you Post" directions, post a new HJT log since it has been five days, and I will take a look, please describe any recent symptoms

Thanks

PokerPop3
2009-01-13, 23:07
Thank you for your time I am still havng problems
I have a popup that says I need windows antivirus 2009 here is my fresh hjt log file.

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 5:07:21 PM, on 1/13/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.5730.0011)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec\pcAnywhere\awhost32.exe
C:\Program Files\Wave Systems Corp\Common\DataServer.exe
C:\Program Files\DigitalPersona\Bin\DpHost.exe
C:\WINDOWS\system32\EloSrvce.exe
c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
c:\revention\revbackup.exe
c:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\NTRU Cryptosystems\NTRU Hybrid TSS v2.0.25\bin\tcsd_win32.exe
C:\WINDOWS\system32\mqsvc.exe
C:\WINDOWS\system32\mqtgsvc.exe
c:\revention\reventioncallerid.exe
c:\revention\revprtservice.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\ctfmon.exe
C:\911\BIN\CCV_SERVER.EXE
C:\WINDOWS\system32\EloDkMon.exe
C:\Program Files\Microsoft Office\Office12\EXCEL.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://webmail.fuelpizza.com/src/login.php
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://go.microsoft.com/fwlink/?LinkId=74005
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {4796eefd-bf22-40c5-bd90-c5a1724078e0} - C:\WINDOWS\system32\rodusano.dll
O4 - HKLM\..\Run: [nobigasefe] Rundll32.exe "C:\WINDOWS\system32\befomita.dll",s
O4 - HKLM\..\Run: [9083dfe4] rundll32.exe "C:\WINDOWS\system32\suhahebu.dll",b
O4 - HKLM\..\Run: [CPM93b0ec78] Rundll32.exe "c:\windows\system32\holiwaga.dll",a
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-19\..\Run: [nobigasefe] Rundll32.exe "C:\WINDOWS\system32\befomita.dll",s (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [nobigasefe] Rundll32.exe "C:\WINDOWS\system32\befomita.dll",s (User 'NETWORK SERVICE')
O4 - Global Startup: CC Server.lnk = C:\911\BIN\CCV_SERVER.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MI1933~1\Office12\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MI1933~1\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\WINDOWS\system32\shdocvw.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\WINDOWS\system32\shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1165494474203
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1168523958010
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{94FDB30E-7CDD-4A70-A67F-4CD65DAA8E01}: NameServer = 192.168.1.254
O20 - AppInit_DLLs: wxvault.dll c:\windows\system32\puwohuwu.dll c:\windows\system32\nageduge.dll c:\windows\system32\nenepoke.dll C:\WINDOWS\system32\hezaguga.dll c:\windows\system32\holiwaga.dll
O21 - SSODL: SSODL - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - c:\windows\system32\holiwaga.dll
O22 - SharedTaskScheduler: STS - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - c:\windows\system32\holiwaga.dll
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: DataSvr2 - Wave Systems Corp. - C:\Program Files\Wave Systems Corp\Common\DataServer.exe
O23 - Service: Biometric Authentication Service (DpHost) - Digital Persona, Inc. - C:\Program Files\DigitalPersona\Bin\DpHost.exe
O23 - Service: EloSystemService - Elo Touchsystems, Inc. - C:\WINDOWS\system32\EloSrvce.exe
O23 - Service: RevBackup - - c:\revention\revbackup.exe
O23 - Service: RevCallerId - - c:\revention\reventioncallerid.exe
O23 - Service: Revention Print Server (RevPrtSrv) - - c:\revention\revprtservice.exe
O23 - Service: NTRU Hybrid TSS v2.0.25 TCS (tcsd_win32.exe) - Unknown owner - C:\Program Files\NTRU Cryptosystems\NTRU Hybrid TSS v2.0.25\bin\tcsd_win32.exe

--
End of file - 5445 bytes

pskelley
2009-01-13, 23:30
I don't see an antivirus program running on this computer? It is a waste of your time and mine to clean the computer if you are not going to secure it? Please tell me what you intend to do, if you need links to good freeware programs, let me know.

1) Please DO NOT ENABLE Spybot S&D TeaTimer while we work together.

2) A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine by running ComboFix on your own. This tool is not a toy and not for everyday use

Download ComboFix from one of these locations:

Link 1 (http://download.bleepingcomputer.com/sUBs/ComboFix.exe)
Link 2 (http://www.forospyware.com/sUBs/ComboFix.exe)
Link 3 (http://subs.geekstogo.com/ComboFix.exe)

* IMPORTANT !!! Save ComboFix.exe to your Desktop

Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
See this Link (http://www.bleepingcomputer.com/forums/topic114351.html) for programs that need to be disabled and instruction on how to disable them.
Remember to re-enable them when we're done.


Double click on ComboFix.exe & follow the prompts.

As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


http://i24.photobucket.com/albums/c30/ken545/RcAuto1.gif

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

http://i24.photobucket.com/albums/c30/ken545/whatnext.jpg

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply along with a New Hijackthis log.

*If there is no internet connection when Combofix has completely finished then restart your computer to restore back the connections.

Tutorial if needed
http://www.bleepingcomputer.com/combofix/how-to-use-combofix

3) Post also an uninstall list: Open Hijackthis.
Click the "Open the Misc Tools" section Button.
Click the "Open Uninstall Manager" Button.
Click the "Save list..." Button.
Save it to your desktop. Copy and paste the contents into your reply.
(You may edit out Microsoft, Hotfixes, Security Update for Windows XP,
Update for Windows XP and Windows XP Hotfix to shorten the list)
Image: http://img.bleepingcomputer.com/tutorials/hijackthis/uninstall-man.jpg

Thanks

PokerPop3
2009-01-14, 00:32
First let me say that the AV i was using was conflicting with something on the system...ong story beleive me that will not be an issue once i am done this.

COMBOFIX.TXT
ComboFix 09-01-13.03 - Administrator 2009-01-13 18:15:35.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1014.182 [GMT -5:00]
Running from: c:\documents and settings\Administrator\Desktop\ComboFix.exe
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
c:\windows\system32\abiholay.ini
c:\windows\system32\agevafen.ini
c:\windows\system32\akupemih.ini
c:\windows\system32\amaliwum.ini
c:\windows\system32\amitorip.ini
c:\windows\system32\anisuvon.ini
c:\windows\system32\asesafad.ini
c:\windows\system32\awewidad.ini
c:\windows\system32\bamuvido.dll
c:\windows\system32\banupuyo.dll
c:\windows\system32\befomita.dll
c:\windows\system32\bekalite.dll
c:\windows\system32\bihomojo.dll
c:\windows\system32\bivehuso.dll
c:\windows\system32\bodizeya.dll
c:\windows\system32\bofofevu.dll
c:\windows\system32\bogerijo.dll
c:\windows\system32\bowuridi.dll
c:\windows\system32\dadiwewa.dll
c:\windows\system32\dafasesa.dll
c:\windows\system32\dubipoja.dll
c:\windows\system32\dugavulu.dll
c:\windows\system32\efisalar.ini
c:\windows\system32\egukuhuh.ini
c:\windows\system32\ejoyutew.ini
c:\windows\system32\esugazep.ini
c:\windows\system32\etumefuh.ini
c:\windows\system32\evenuyew.ini
c:\windows\system32\evununew.ini
c:\windows\system32\ezazejit.ini
c:\windows\system32\fefedami.dll
c:\windows\system32\feloviko.dll
c:\windows\system32\fenozano.dll
c:\windows\system32\fezogevu.dll
c:\windows\system32\fikarapi.dll
c:\windows\system32\fineloto.dll
c:\windows\system32\fivahofi.dll
c:\windows\system32\fotowuta.dll
c:\windows\system32\fozisitu.dll
c:\windows\system32\gebuhiri.dll
c:\windows\system32\gedesumi.dll
c:\windows\system32\gozomose.dll
c:\windows\system32\guyubaha.dll
c:\windows\system32\hafekali.dll
c:\windows\system32\halivevi.dll
c:\windows\system32\hatutiza.dll
c:\windows\system32\hezaguga.dll
c:\windows\system32\holiwaga.dll
c:\windows\system32\hufopogi.dll
c:\windows\system32\hununihu.dll
c:\windows\system32\idibijiv.ini
c:\windows\system32\idiruwob.ini
c:\windows\system32\ijiveruj.ini
c:\windows\system32\ijiwuboy.ini
c:\windows\system32\imadefef.ini
c:\windows\system32\imavawoz.ini
c:\windows\system32\inowutij.ini
c:\windows\system32\iwewosik.ini
c:\windows\system32\jafasatu.dll
c:\windows\system32\jegagire.dll
c:\windows\system32\jihubazo.dll
c:\windows\system32\jituwoni.dll
c:\windows\system32\juguteto.dll
c:\windows\system32\jureviji.dll
c:\windows\system32\kipariwo.dll
c:\windows\system32\kisowewi.dll
c:\windows\system32\kogavazo.dll
c:\windows\system32\kulogizo.dll
c:\windows\system32\lilofati.dll
c:\windows\system32\lurapaso.dll
c:\windows\system32\majubilu.dll
c:\windows\system32\muwilama.dll
c:\windows\system32\nagafuni.dll
c:\windows\system32\nanuleya.dll
c:\windows\system32\navokivi.dll
c:\windows\system32\nijazopo.dll
c:\windows\system32\nitalopo.dll
c:\windows\system32\nivonano.dll
c:\windows\system32\nokanoza.dll
c:\windows\system32\novusina.dll
c:\windows\system32\nuwolazo.dll
c:\windows\system32\nuzadayi.dll
c:\windows\system32\nuzevuzi.dll
c:\windows\system32\onazonef.ini
c:\windows\system32\opolatin.ini
c:\windows\system32\orumohuw.ini
c:\windows\system32\otolenif.ini
c:\windows\system32\otorizaw.ini
c:\windows\system32\ozabuhij.ini
c:\windows\system32\ozalowun.ini
c:\windows\system32\pedewovo.dll
c:\windows\system32\pefivebe.dll
c:\windows\system32\perojiko.dll
c:\windows\system32\pewafahu.dll
c:\windows\system32\pezaguse.dll
c:\windows\system32\pirotima.dll
c:\windows\system32\pokumala.dll
c:\windows\system32\ponegiwu.dll
c:\windows\system32\punawuwu.dll
c:\windows\system32\puseveni.dll
c:\windows\system32\pusifore.dll
c:\windows\system32\ralasife.dll
c:\windows\system32\rejegufe.dll
c:\windows\system32\rejemufa.dll
c:\windows\system32\rodusano.dll
c:\windows\system32\situdipu.dll
c:\windows\system32\suhahebu.dll
c:\windows\system32\tafusabe.dll
c:\windows\system32\tamowevu.dll
c:\windows\system32\tanudeke.dll
c:\windows\system32\tb.dr
c:\windows\system32\tejoluze.dll
c:\windows\system32\telowewa.dll
c:\windows\system32\tepusiga.dll
c:\windows\system32\tetomibi.dll
c:\windows\system32\tijezaze.dll
c:\windows\system32\tijubopi.dll
c:\windows\system32\tufemivu.dll
c:\windows\system32\tupopazo.dll
c:\windows\system32\tutepega.dll
c:\windows\system32\ubehahus.ini
c:\windows\system32\uhinunuh.ini
c:\windows\system32\uruvefel.ini
c:\windows\system32\usedapaj.ini
c:\windows\system32\utasafaj.ini
c:\windows\system32\utonanil.ini
c:\windows\system32\uvefofob.ini
c:\windows\system32\uvimefut.ini
c:\windows\system32\uwuwanup.ini
c:\windows\system32\uyokazir.ini
c:\windows\system32\uyudeliy.ini
c:\windows\system32\vatoteju.dll
c:\windows\system32\vijibidi.dll
c:\windows\system32\vufurajo.dll
c:\windows\system32\wenunuve.dll
c:\windows\system32\wiboniza.dll
c:\windows\system32\wijahupu.dll
c:\windows\system32\wiwanazo.dll
c:\windows\system32\wiwedafi.dll
c:\windows\system32\wuhomuro.dll
c:\windows\system32\yakesehi.dll
c:\windows\system32\yerehute.dll
c:\windows\system32\yileduyu.dll
c:\windows\system32\yobuwiji.dll
c:\windows\system32\zevububu.dll
c:\windows\system32\zowavami.dll

----- BITS: Possible infected sites -----

hxxp://77.74.48.105
.
((((((((((((((((((((((((( Files Created from 2008-12-13 to 2009-01-13 )))))))))))))))))))))))))))))))
.

2009-01-10 23:19 . 2009-01-10 23:19 66,502 --a------ C:\MenuMix011009.PDF
2009-01-10 23:19 . 2009-01-10 23:19 49,198 --a------ C:\DailyPerf011009.PDF
2009-01-10 23:19 . 2009-01-10 23:19 39,905 --a------ C:\AdjSummary011009.PDF
2009-01-09 23:14 . 2009-01-09 23:33 66,655 --a------ C:\MenuMix010909.PDF
2009-01-09 23:14 . 2009-01-09 23:33 49,256 --a------ C:\DailyPerf010909.PDF
2009-01-09 23:14 . 2009-01-09 23:33 40,032 --a------ C:\AdjSummary010909.PDF
2009-01-07 17:14 . 2009-01-07 17:14 <DIR> d-------- c:\program files\Trend Micro
2009-01-07 16:18 . 2009-01-07 16:22 <DIR> d-------- c:\program files\Microsoft MapPoint
2009-01-07 16:18 . 2009-01-07 16:22 <DIR> d-------- c:\program files\Microsoft Location Finder
2009-01-06 22:28 . 2009-01-06 22:28 63,860 --a------ C:\MenuMix010609.PDF
2009-01-06 22:28 . 2009-01-06 22:28 48,930 --a------ C:\DailyPerf010609.PDF
2009-01-06 22:28 . 2009-01-06 22:28 37,812 --a------ C:\AdjSummary010609.PDF
2009-01-06 11:14 . 2009-01-06 11:14 <DIR> d-------- c:\documents and settings\All Users\Application Data\Office Genuine Advantage
2009-01-05 16:45 . 2009-01-05 18:32 785 --a------ C:\Shortcut to Week Folders.lnk
2009-01-03 23:43 . 2009-01-03 23:43 66,752 --a------ C:\MenuMix010309.PDF
2009-01-03 23:43 . 2009-01-03 23:43 49,190 --a------ C:\DailyPerf010309.PDF
2009-01-03 23:43 . 2009-01-03 23:43 38,299 --a------ C:\AdjSummary010309.PDF
2009-01-03 16:43 . 2009-01-03 16:43 10,635 --a------ c:\windows\system32\drivers\SYMEVENT.CAT
2009-01-03 16:43 . 2009-01-03 16:43 806 --a------ c:\windows\system32\drivers\SYMEVENT.INF
2009-01-03 16:42 . 2009-01-03 16:42 <DIR> d-------- c:\documents and settings\All Users\Application Data\NortonInstaller
2009-01-03 16:42 . 2009-01-03 18:08 <DIR> d-------- c:\documents and settings\All Users\Application Data\Norton
2009-01-02 23:30 . 2009-01-02 23:30 66,682 --a------ C:\MenuMix010209.PDF
2009-01-02 23:30 . 2009-01-02 23:30 49,199 --a------ C:\DailyPerf010209.PDF
2009-01-02 23:30 . 2009-01-02 23:30 39,344 --a------ C:\AdjSummary010209.PDF
2008-12-31 23:13 . 2008-12-31 23:13 66,961 --a------ C:\MenuMix123108.PDF
2008-12-31 23:13 . 2008-12-31 23:13 48,978 --a------ C:\DailyPerf123108.PDF
2008-12-31 23:13 . 2008-12-31 23:13 38,360 --a------ C:\AdjSummary123108.PDF
2008-12-23 22:43 . 2008-12-23 22:43 66,482 --a------ C:\MenuMix122308.PDF
2008-12-23 22:43 . 2008-12-23 22:43 50,000 --a------ C:\DailyPerf122308.PDF
2008-12-23 22:43 . 2008-12-23 22:43 38,459 --a------ C:\AdjSummary122308.PDF
2008-12-22 20:31 . 2009-01-03 09:03 439 --a------ c:\windows\wininit.ini
2008-12-22 16:16 . 2009-01-03 16:57 <DIR> d-------- c:\program files\Spybot - Search & Destroy
2008-12-22 16:16 . 2009-01-08 14:50 <DIR> d-------- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2008-12-21 21:35 . 2008-12-21 21:35 66,671 --a------ C:\MenuMix122108.PDF
2008-12-21 21:35 . 2008-12-21 21:35 49,242 --a------ C:\DailyPerf122108.PDF
2008-12-21 21:35 . 2008-12-21 21:35 34,858 --a------ C:\AdjSummary122108.PDF
2008-12-19 21:50 . 2008-12-19 21:51 1,981,268 --a------ C:\t3_us_standard.zip
2008-12-17 22:50 . 2008-12-17 22:50 1 --a------ c:\windows\system32\edl.dat
2008-12-17 16:50 . 2008-12-17 16:50 0 --a------ c:\windows\nsreg.dat
2008-12-17 16:05 . 2008-12-17 16:27 7,518,240 --a------ C:\Firefox Setup 3.0.5.exe
2008-12-17 15:02 . 2009-01-03 16:57 <DIR> d-------- c:\documents and settings\All Users\Application Data\Lavasoft
2008-12-13 23:38 . 2008-12-13 23:38 66,665 --a------ C:\MenuMix121308.PDF
2008-12-13 23:38 . 2008-12-13 23:38 49,212 --a------ C:\DailyPerf121308.PDF
2008-12-13 23:38 . 2008-12-13 23:38 38,722 --a------ C:\AdjSummary121308.PDF

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-01-03 22:59 --------- d-----w c:\documents and settings\All Users\Application Data\Symantec
2009-01-03 21:51 --------- d-----w c:\program files\Common Files\Symantec Shared
2009-01-03 21:43 124,464 ----a-w c:\windows\system32\drivers\SYMEVENT.SYS
2009-01-03 21:43 --------- d-----w c:\program files\Symantec
2008-12-19 14:01 --------- d-----w c:\program files\Common Files\Adobe
2008-12-09 22:26 --------- d-----w c:\program files\MSECache
2008-12-04 23:11 --------- d-----w c:\documents and settings\Administrator\Application Data\GetRightToGo
2008-12-04 23:09 --------- d-----w c:\program files\Microsoft Works
2008-12-04 23:09 --------- d-----w c:\documents and settings\All Users\Application Data\Microsoft Help
2008-12-04 18:25 --------- d-----w c:\program files\Hewlett-Packard
2008-12-04 18:25 --------- d-----w c:\program files\Common Files\Hewlett-Packard
2008-12-04 18:25 --------- d-----w c:\documents and settings\All Users\Application Data\Hewlett-Packard
2008-12-04 18:24 --------- d-----w c:\program files\HP
2004-12-21 22:34 25,214 ----a-w c:\program files\dplogo32.ico
1601-01-01 00:12 24,576 --sha-w c:\windows\system32\geyeyusi.dll
2008-09-26 13:49 24,576 --sha-w c:\windows\system32\harizepu.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

c:\documents and settings\user\Start Menu\Startup\
Revention POS.lnk - c:\revention\ReventionPOS.exe [2006-12-07 17694720]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
CC Server.lnk - c:\911\BIN\CCV_SERVER.EXE [2006-11-06 884736]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"DisableChangePassword"= 1 (0x1)
"DisableLockWorkstation"= 1 (0x1)

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"NoAddPrinter"= 1 (0x1)
"NoCommonGroups"= 1 (0x1)
"NoDeletePrinter"= 1 (0x1)
"NoFavoritesMenu"= 1 (0x1)
"NoNetConnectDisconnect"= 1 (0x1)
"NoSMHelp"= 1 (0x1)
"NoSMMyDocs"= 1 (0x1)
"NoStartMenuNetworkPlaces"= 1 (0x1)
"NoStartMenuSubFolders"= 1 (0x1)
"NoWinKeys"= 1 (0x1)
"NoWins"= 1 (0x1)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\PCANotify]
2003-10-31 12:01 8704 c:\windows\system32\PCANotify.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
Authentication Packages REG_MULTI_SZ msv1_0 wvauth
Notification Packages REG_MULTI_SZ scecli c:\windows\system32\hezaguga.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\KernelFaultCheck]
c:\windows\system32\dumprep 0 -k [X]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
--a------ 2008-10-15 01:04 39792 c:\program files\Adobe\Reader 8.0\Reader\reader_sl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Document Manager]
--a------ 2006-05-16 13:35 102400 c:\program files\Wave Systems Corp\Services Manager\DocMgr\bin\docmgr.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HotKeysCmds]
--a------ 2006-07-21 19:50 86016 c:\windows\system32\hkcmd.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IgfxTray]
--a------ 2006-07-21 19:48 98304 c:\windows\system32\igfxtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Persistence]
--a------ 2006-07-21 19:47 81920 c:\windows\system32\igfxpers.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMAXPnP]
--a------ 2006-05-01 11:07 843776 c:\program files\Analog Devices\Core\smax4pnp.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MsmqIntCert]
--a------ 2004-08-04 07:00 177152 c:\windows\system32\mqrt.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"ose"=3 (0x3)
"odserv"=3 (0x3)

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
"DisableNotifications"= 1 (0x1)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\mqsvc.exe"=
"c:\\Program Files\\Symantec\\pcAnywhere\\awhost32.exe"=
"c:\\Program Files\\Symantec\\pcAnywhere\\awrem32.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\WINDOWS\\system32\\cmd.exe"=
"c:\\WINDOWS\\system32\\EloDkMon.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009

R3 ADM8511;Belkin USB Ethernet Adapter;c:\windows\system32\drivers\NET8511.SYS [2001-04-09 24424]
R3 elomoufiltr;ELO TouchSystems-SRV2;c:\windows\system32\drivers\EloFiltr.sys [2006-12-12 18944]
R3 EloUsb;ELO TouchSystems-SRV;c:\windows\system32\drivers\EloUsb.Sys [2006-12-12 49664]
R3 QSerBus;Quatech PCI/PCMCIA/ISA Multiport Serial Device Enumerator;c:\windows\system32\drivers\qserbus.sys [2007-08-08 26624]
R3 QTSerial;Quatech Multiport Serial Driver;c:\windows\system32\drivers\qtserial.sys [2007-08-08 91648]
R4 Machnm32;Machnm32 Driver;c:\windows\system32\Machnm32.sys [2006-12-11 2304]
R4 RevBackup;RevBackup;c:\revention\RevBackup.exe [2006-12-07 32768]
R4 RevCallerId;RevCallerId;c:\revention\ReventionCallerId.exe [2006-12-07 32768]
R4 RevPrtSrv;Revention Print Server;c:\revention\RevPrtService.exe [2006-12-07 40960]
S3 dpK00701;U.are.U Fingerprint Reader Upper Driver;c:\windows\system32\drivers\dpK00701.sys [2004-10-12 41856]
S3 UsbdpFP;U.are.U Fingerprint Reader Class Driver;c:\windows\system32\drivers\UsbdpFP.sys [2004-10-12 45056]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ hpqcxs08
.
Contents of the 'Scheduled Tasks' folder

2009-01-12 c:\windows\Tasks\At1.job
- c:\revention\utilities\xprestart.bat [2005-01-24 11:40]

2009-01-12 c:\windows\Tasks\At2.job
- c:\revention\utilities\copydb.bat [2006-10-13 06:39]
.
- - - - ORPHANS REMOVED - - - -

BHO-{4796eefd-bf22-40c5-bd90-c5a1724078e0} - c:\windows\system32\rodusano.dll
MSConfigStartUp-CPM93b0ec78 - c:\windows\system32\nenepoke.dll
MSConfigStartUp-nobigasefe - c:\windows\system32\geyofebi.dll


.
------- Supplementary Scan -------
.
TCP: {94FDB30E-7CDD-4A70-A67F-4CD65DAA8E01} = 192.168.1.254
.

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-01-13 18:19:14
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'lsass.exe'(968)
c:\windows\system32\wvauth.dll
c:\windows\system32\biolsp.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\msdtc.exe
c:\program files\Symantec\pcAnywhere\awhost32.exe
c:\program files\Wave Systems Corp\common\DataServer.exe
c:\program files\DigitalPersona\Bin\DpHost.exe
c:\windows\system32\EloSrvce.exe
c:\program files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe
c:\windows\system32\EloDkMon.exe
c:\program files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
c:\program files\NTRU Cryptosystems\NTRU Hybrid TSS v2.0.25\bin\tcsd_win32.exe
c:\windows\system32\mqsvc.exe
c:\windows\system32\mqtgsvc.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2009-01-13 18:21:42 - machine was rebooted [user]
ComboFix-quarantined-files.txt 2009-01-13 23:21:40

Pre-Run: 65,959,915,520 bytes free
Post-Run: 65,918,607,360 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

364


HJT LOG


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 18:28, on 2009-01-13
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.5730.0011)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec\pcAnywhere\awhost32.exe
C:\Program Files\Wave Systems Corp\Common\DataServer.exe
C:\Program Files\DigitalPersona\Bin\DpHost.exe
C:\WINDOWS\system32\EloSrvce.exe
c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
c:\revention\revbackup.exe
c:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\NTRU Cryptosystems\NTRU Hybrid TSS v2.0.25\bin\tcsd_win32.exe
C:\WINDOWS\system32\mqsvc.exe
C:\WINDOWS\system32\mqtgsvc.exe
c:\revention\reventioncallerid.exe
c:\revention\revprtservice.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\911\BIN\CCV_SERVER.EXE
C:\WINDOWS\system32\EloDkMon.exe
C:\Program Files\internet explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://webmail.fuelpizza.com/src/login.php
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://go.microsoft.com/fwlink/?LinkId=74005
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - S-1-5-21-1935655697-602162358-725345543-1003 Startup: Revention POS.lnk = C:\Revention\ReventionPOS.exe (User 'user')
O4 - S-1-5-21-1935655697-602162358-725345543-1003 User Startup: Revention POS.lnk = C:\Revention\ReventionPOS.exe (User 'user')
O4 - Global Startup: CC Server.lnk = C:\911\BIN\CCV_SERVER.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MI1933~1\Office12\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MI1933~1\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\WINDOWS\system32\shdocvw.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\WINDOWS\system32\shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra button: (no name) - Cmdmapping - (no file) (HKCU)
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1165494474203
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1168523958010
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{94FDB30E-7CDD-4A70-A67F-4CD65DAA8E01}: NameServer = 192.168.1.254
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: DataSvr2 - Wave Systems Corp. - C:\Program Files\Wave Systems Corp\Common\DataServer.exe
O23 - Service: Biometric Authentication Service (DpHost) - Digital Persona, Inc. - C:\Program Files\DigitalPersona\Bin\DpHost.exe
O23 - Service: EloSystemService - Elo Touchsystems, Inc. - C:\WINDOWS\system32\EloSrvce.exe
O23 - Service: RevBackup - - c:\revention\revbackup.exe
O23 - Service: RevCallerId - - c:\revention\reventioncallerid.exe
O23 - Service: Revention Print Server (RevPrtSrv) - - c:\revention\revprtservice.exe
O23 - Service: NTRU Hybrid TSS v2.0.25 TCS (tcsd_win32.exe) - Unknown owner - C:\Program Files\NTRU Cryptosystems\NTRU Hybrid TSS v2.0.25\bin\tcsd_win32.exe

--
End of file - 4963 bytes


Uninstall List
32 Bit HP CIO Components Installer
911 Software CreditLine
Adobe Flash Player 10 ActiveX
Adobe Flash Player 10 Plugin
Adobe Reader 8.1.3
Atmel TPM Driver Installer 3.0.3.15
Broadcom Gigabit Integrated Controller
Dell Embassy Trust Suite by Wave Systems
Dell Resource CD
DigitalPersona Platinum Fingerprint Recognition Software 3.2.0
Document Manager Lite
Elo XP Universal Driver
EMBASSY Security Center
EMBASSY Trust Suite by Wave Systems
ETS Launch Pad
ETS Upgrade
GMail Drive Shell Extension
High Definition Audio Driver Package - KB835221
HijackThis 2.0.2
Hotfix for Windows XP (KB914440)
Hotfix for Windows XP (KB915865)
HP Officejet Pro All-In-One Series
Intel(R) Graphics Media Accelerator Driver
LiveReg (Symantec Corporation)
LiveUpdate 1.80 (Symantec Corporation)
Microsoft .NET Framework 1.1
Microsoft .NET Framework 1.1
Microsoft .NET Framework 1.1 Hotfix (KB886903)
Microsoft .NET Framework 2.0
Microsoft English TTS Engine
Microsoft Internationalized Domain Names Mitigation APIs
Microsoft MapPoint North America 2006
Microsoft National Language Support Downlevel APIs
Microsoft Office Access database engine 2007 (English)
Microsoft Office Excel MUI (English) 2007
Microsoft Office Outlook MUI (English) 2007
Microsoft Office PowerPoint MUI (English) 2007
Microsoft Office Proof (English) 2007
Microsoft Office Proof (French) 2007
Microsoft Office Proof (Spanish) 2007
Microsoft Office Proofing (English) 2007
Microsoft Office Shared MUI (English) 2007
Microsoft Office Shared Setup Metadata MUI (English) 2007
Microsoft Office Standard 2007
Microsoft Office Standard 2007 Trial
Microsoft Office Word MUI (English) 2007
Microsoft SQL Server 2005
Microsoft SQL Server 2005 Express Edition (SQLEXPRESS)
Microsoft SQL Server Management Studio Express CTP
Microsoft SQL Server Native Client
Microsoft SQL Server Setup Support Files (English)
Microsoft SQL Server VSS Writer
Mozilla Firefox (3.0.5)
MSXML 4.0 SP2 (KB927978)
MSXML 6.0 Parser (KB927977)
NTRU Hybrid TSS v2.0.25
POSCR10Install
POSCR11Install
Preboot Manager
Private Information Manager
Secure Update
Security Wizards
SoundMAX
Symantec pcAnywhere
Update for Windows XP (KB931836)
upekmsi
Wave Infrastructure Installer
Wave Support Software
Windows Installer 3.1 (KB893803)
Windows Internet Explorer 7
Windows Media Format 11 runtime
Windows Media Format 11 runtime





THX
POKERPOP3

pskelley
2009-01-14, 01:09
I see stuff that make me think this is a company computer?
http://forums.spybot.info/showpost.php?p=25712&postcount=5 <<< see this
Please read all of the information at that link, but especially this:

More than one machine could be at stake, possibly even the server. If sensitive material has been compromised by an infection, the company could be held liable.
To prevent any possible loss or corruption of company information, please inform your IT department or Supervisor when a workplace computer has been infected, immediately.

First let me say that the AV i was using was conflicting with something on the system
OK...I have links to three good freeware programs if you want them. Let's wait until you are clean before you install anything. Since you are not protected, stay offline except when necessary. You sure had a mess on this computer:sad:

Please follow these directions carefully and in the numbered order.

1) Please download ATF Cleaner by Atribune
http://www.atribune.org/public-beta/ATF-Cleaner.exe
Save it to your Desktop. We will use this later.

2) Open notepad and copy/paste the text in the codebox below into it:


File::
c:\windows\system32\geyeyusi.dll
c:\windows\system32\harizepu.dll

Save this as CFScript

http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif

Referring to the picture above, drag CFScript into ComboFix.exe.

This will start ComboFix again. After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply together with a new HijackThis log. (wait until you finish to post the logs)

3) Run ATF Cleaner
Double-click ATF-Cleaner.exe to run the program.
Click Select All found at the bottom of the list.
Click the Empty Selected button.
Click Exit on the Main menu to close the program.

*Cleaning Prefetch may result in a few slow starts until the folder is repopulated:
http://www.windowsnetworking.com/articles_tutorials/Gaining-Speed-Empty-Prefetch-XP.html

4) Download Malwarebytes' Anti-Malware to your Desktop
http://www.malwarebytes.org/

* Double-click mbam-setup.exe and follow the prompts to install the program.
* Be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform FULL SCAN, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad. Please save it to a convenient location. The log can also be opened by going to Start > All Programs > Malwarebytes' Anti-Malware > Logs > log-date.txt
* Please post the log from CFScript, the log from MBAM and a new HJT log.

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

Tutorial if needed:
http://www.techsupportteam.org/forum/tutorials/2282-malwarebytes-anti-malware-mbam.html

How is the computer running now?

Thanks


This can be done as time permits, but it is important.
Uninstall list: I look for malware and security issues and will not know all of your programs, but you should.
Hackers are using out of date programs to infect folks more and more,
Here is a small free tool that lets you know when something needs an update if you are interested:
http://secunia.com/vulnerability_scanning/personal/ While PSI runs in the System Tray for realtime notifications, I personally prefer to turn it off in MSConfig and run it from All Programs when I want to do a check.

Adobe Reader 8.1.3 <<< out of date and unsafe, see this:
http://news.cnet.com/8301-1009_3-10081618-83.html?tag=nl.e433
http://www.filehippo.com/download_adobe_reader/
(if you want a smaller program, look at this one)
Foxit Reader 2.3 for Windows (make sure to uncheck toolbars)
http://www.foxitsoftware.com/pdf/rd_intro.php

LiveReg (Symantec Corporation)
LiveUpdate 1.80 (Symantec Corporation)
If you dump Symantec, you want to uninstall these.

PokerPop3
2009-01-14, 01:48
You are very right this is a company machine, However, since I own the compay I can only be mad at myself for the screwups!

Here are the scans once done

COMBOFIX--

ComboFix 09-01-13.03 - Administrator 2009-01-13 19:12:29.2 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1014.450 [GMT -5:00]
Running from: c:\documents and settings\Administrator\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Administrator\Desktop\CFScript.txt
* Created a new restore point

FILE ::
c:\windows\system32\geyeyusi.dll
c:\windows\system32\harizepu.dll
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\geyeyusi.dll
c:\windows\system32\harizepu.dll

.
((((((((((((((((((((((((( Files Created from 2008-12-14 to 2009-01-14 )))))))))))))))))))))))))))))))
.

2009-01-10 23:19 . 2009-01-10 23:19 66,502 --a------ C:\MenuMix011009.PDF
2009-01-10 23:19 . 2009-01-10 23:19 49,198 --a------ C:\DailyPerf011009.PDF
2009-01-10 23:19 . 2009-01-10 23:19 39,905 --a------ C:\AdjSummary011009.PDF
2009-01-09 23:14 . 2009-01-09 23:33 66,655 --a------ C:\MenuMix010909.PDF
2009-01-09 23:14 . 2009-01-09 23:33 49,256 --a------ C:\DailyPerf010909.PDF
2009-01-09 23:14 . 2009-01-09 23:33 40,032 --a------ C:\AdjSummary010909.PDF
2009-01-07 17:14 . 2009-01-07 17:14 <DIR> d-------- c:\program files\Trend Micro
2009-01-07 16:18 . 2009-01-07 16:22 <DIR> d-------- c:\program files\Microsoft MapPoint
2009-01-07 16:18 . 2009-01-07 16:22 <DIR> d-------- c:\program files\Microsoft Location Finder
2009-01-06 22:28 . 2009-01-06 22:28 63,860 --a------ C:\MenuMix010609.PDF
2009-01-06 22:28 . 2009-01-06 22:28 48,930 --a------ C:\DailyPerf010609.PDF
2009-01-06 22:28 . 2009-01-06 22:28 37,812 --a------ C:\AdjSummary010609.PDF
2009-01-06 11:14 . 2009-01-06 11:14 <DIR> d-------- c:\documents and settings\All Users\Application Data\Office Genuine Advantage
2009-01-05 16:45 . 2009-01-05 18:32 785 --a------ C:\Shortcut to Week Folders.lnk
2009-01-03 23:43 . 2009-01-03 23:43 66,752 --a------ C:\MenuMix010309.PDF
2009-01-03 23:43 . 2009-01-03 23:43 49,190 --a------ C:\DailyPerf010309.PDF
2009-01-03 23:43 . 2009-01-03 23:43 38,299 --a------ C:\AdjSummary010309.PDF
2009-01-03 16:43 . 2009-01-03 16:43 10,635 --a------ c:\windows\system32\drivers\SYMEVENT.CAT
2009-01-03 16:43 . 2009-01-03 16:43 806 --a------ c:\windows\system32\drivers\SYMEVENT.INF
2009-01-03 16:42 . 2009-01-03 16:42 <DIR> d-------- c:\documents and settings\All Users\Application Data\NortonInstaller
2009-01-03 16:42 . 2009-01-03 18:08 <DIR> d-------- c:\documents and settings\All Users\Application Data\Norton
2009-01-02 23:30 . 2009-01-02 23:30 66,682 --a------ C:\MenuMix010209.PDF
2009-01-02 23:30 . 2009-01-02 23:30 49,199 --a------ C:\DailyPerf010209.PDF
2009-01-02 23:30 . 2009-01-02 23:30 39,344 --a------ C:\AdjSummary010209.PDF
2008-12-31 23:13 . 2008-12-31 23:13 66,961 --a------ C:\MenuMix123108.PDF
2008-12-31 23:13 . 2008-12-31 23:13 48,978 --a------ C:\DailyPerf123108.PDF
2008-12-31 23:13 . 2008-12-31 23:13 38,360 --a------ C:\AdjSummary123108.PDF
2008-12-23 22:43 . 2008-12-23 22:43 66,482 --a------ C:\MenuMix122308.PDF
2008-12-23 22:43 . 2008-12-23 22:43 50,000 --a------ C:\DailyPerf122308.PDF
2008-12-23 22:43 . 2008-12-23 22:43 38,459 --a------ C:\AdjSummary122308.PDF
2008-12-22 20:31 . 2009-01-03 09:03 439 --a------ c:\windows\wininit.ini
2008-12-22 16:16 . 2009-01-03 16:57 <DIR> d-------- c:\program files\Spybot - Search & Destroy
2008-12-22 16:16 . 2009-01-08 14:50 <DIR> d-------- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2008-12-21 21:35 . 2008-12-21 21:35 66,671 --a------ C:\MenuMix122108.PDF
2008-12-21 21:35 . 2008-12-21 21:35 49,242 --a------ C:\DailyPerf122108.PDF
2008-12-21 21:35 . 2008-12-21 21:35 34,858 --a------ C:\AdjSummary122108.PDF
2008-12-19 21:50 . 2008-12-19 21:51 1,981,268 --a------ C:\t3_us_standard.zip
2008-12-17 22:50 . 2008-12-17 22:50 1 --a------ c:\windows\system32\edl.dat
2008-12-17 16:50 . 2008-12-17 16:50 0 --a------ c:\windows\nsreg.dat
2008-12-17 16:05 . 2008-12-17 16:27 7,518,240 --a------ C:\Firefox Setup 3.0.5.exe
2008-12-17 15:02 . 2009-01-03 16:57 <DIR> d-------- c:\documents and settings\All Users\Application Data\Lavasoft

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-01-03 22:59 --------- d-----w c:\documents and settings\All Users\Application Data\Symantec
2009-01-03 21:51 --------- d-----w c:\program files\Common Files\Symantec Shared
2009-01-03 21:43 124,464 ----a-w c:\windows\system32\drivers\SYMEVENT.SYS
2009-01-03 21:43 --------- d-----w c:\program files\Symantec
2008-12-19 14:01 --------- d-----w c:\program files\Common Files\Adobe
2008-12-09 22:26 --------- d-----w c:\program files\MSECache
2008-12-04 23:11 --------- d-----w c:\documents and settings\Administrator\Application Data\GetRightToGo
2008-12-04 23:09 --------- d-----w c:\program files\Microsoft Works
2008-12-04 23:09 --------- d-----w c:\documents and settings\All Users\Application Data\Microsoft Help
2008-12-04 18:25 --------- d-----w c:\program files\Hewlett-Packard
2008-12-04 18:25 --------- d-----w c:\program files\Common Files\Hewlett-Packard
2008-12-04 18:25 --------- d-----w c:\documents and settings\All Users\Application Data\Hewlett-Packard
2008-12-04 18:24 --------- d-----w c:\program files\HP
2004-12-21 22:34 25,214 ----a-w c:\program files\dplogo32.ico
.

((((((((((((((((((((((((((((( snapshot@2009-01-13_18.20.51.13 )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-01-14 00:15:06 16,384 ----atw c:\windows\Temp\Perflib_Perfdata_238.dat
+ 2009-01-14 00:15:19 16,384 ----atw c:\windows\Temp\Perflib_Perfdata_f64.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

c:\documents and settings\user\Start Menu\Startup\
Revention POS.lnk - c:\revention\ReventionPOS.exe [2006-12-07 17694720]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
CC Server.lnk - c:\911\BIN\CCV_SERVER.EXE [2006-11-06 884736]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"DisableChangePassword"= 1 (0x1)
"DisableLockWorkstation"= 1 (0x1)

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"NoAddPrinter"= 1 (0x1)
"NoCommonGroups"= 1 (0x1)
"NoDeletePrinter"= 1 (0x1)
"NoFavoritesMenu"= 1 (0x1)
"NoNetConnectDisconnect"= 1 (0x1)
"NoSMHelp"= 1 (0x1)
"NoSMMyDocs"= 1 (0x1)
"NoStartMenuNetworkPlaces"= 1 (0x1)
"NoStartMenuSubFolders"= 1 (0x1)
"NoWinKeys"= 1 (0x1)
"NoWins"= 1 (0x1)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\PCANotify]
2003-10-31 12:01 8704 c:\windows\system32\PCANotify.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
Authentication Packages REG_MULTI_SZ msv1_0 wvauth

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\KernelFaultCheck]
c:\windows\system32\dumprep 0 -k [X]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
--a------ 2008-10-15 01:04 39792 c:\program files\Adobe\Reader 8.0\Reader\reader_sl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Document Manager]
--a------ 2006-05-16 13:35 102400 c:\program files\Wave Systems Corp\Services Manager\DocMgr\bin\docmgr.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HotKeysCmds]
--a------ 2006-07-21 19:50 86016 c:\windows\system32\hkcmd.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IgfxTray]
--a------ 2006-07-21 19:48 98304 c:\windows\system32\igfxtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Persistence]
--a------ 2006-07-21 19:47 81920 c:\windows\system32\igfxpers.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMAXPnP]
--a------ 2006-05-01 11:07 843776 c:\program files\Analog Devices\Core\smax4pnp.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MsmqIntCert]
--a------ 2004-08-04 07:00 177152 c:\windows\system32\mqrt.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"ose"=3 (0x3)
"odserv"=3 (0x3)

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
"DisableNotifications"= 1 (0x1)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\mqsvc.exe"=
"c:\\Program Files\\Symantec\\pcAnywhere\\awhost32.exe"=
"c:\\Program Files\\Symantec\\pcAnywhere\\awrem32.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\WINDOWS\\system32\\cmd.exe"=
"c:\\WINDOWS\\system32\\EloDkMon.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009

R3 ADM8511;Belkin USB Ethernet Adapter;c:\windows\system32\drivers\NET8511.SYS [2001-04-09 24424]
R3 elomoufiltr;ELO TouchSystems-SRV2;c:\windows\system32\drivers\EloFiltr.sys [2006-12-12 18944]
R3 EloUsb;ELO TouchSystems-SRV;c:\windows\system32\drivers\EloUsb.Sys [2006-12-12 49664]
R3 QSerBus;Quatech PCI/PCMCIA/ISA Multiport Serial Device Enumerator;c:\windows\system32\drivers\qserbus.sys [2007-08-08 26624]
R3 QTSerial;Quatech Multiport Serial Driver;c:\windows\system32\drivers\qtserial.sys [2007-08-08 91648]
R4 Machnm32;Machnm32 Driver;c:\windows\system32\Machnm32.sys [2006-12-11 2304]
R4 RevBackup;RevBackup;c:\revention\RevBackup.exe [2006-12-07 32768]
R4 RevCallerId;RevCallerId;c:\revention\ReventionCallerId.exe [2006-12-07 32768]
R4 RevPrtSrv;Revention Print Server;c:\revention\RevPrtService.exe [2006-12-07 40960]
S3 dpK00701;U.are.U Fingerprint Reader Upper Driver;c:\windows\system32\drivers\dpK00701.sys [2004-10-12 41856]
S3 UsbdpFP;U.are.U Fingerprint Reader Class Driver;c:\windows\system32\drivers\UsbdpFP.sys [2004-10-12 45056]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ hpqcxs08
.
Contents of the 'Scheduled Tasks' folder

2009-01-12 c:\windows\Tasks\At1.job
- c:\revention\utilities\xprestart.bat [2005-01-24 11:40]

2009-01-12 c:\windows\Tasks\At2.job
- c:\revention\utilities\copydb.bat [2006-10-13 06:39]
.
.
------- Supplementary Scan -------
.
TCP: {94FDB30E-7CDD-4A70-A67F-4CD65DAA8E01} = 192.168.1.254
.

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-01-13 19:15:11
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'lsass.exe'(968)
c:\windows\system32\wvauth.dll
c:\windows\system32\biolsp.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\msdtc.exe
c:\program files\Symantec\pcAnywhere\awhost32.exe
c:\program files\Wave Systems Corp\common\DataServer.exe
c:\program files\DigitalPersona\Bin\DpHost.exe
c:\windows\system32\EloSrvce.exe
c:\program files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe
c:\windows\system32\EloDkMon.exe
c:\program files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
c:\program files\NTRU Cryptosystems\NTRU Hybrid TSS v2.0.25\bin\tcsd_win32.exe
c:\windows\system32\mqsvc.exe
c:\windows\system32\mqtgsvc.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2009-01-13 19:17:34 - machine was rebooted [user]
ComboFix-quarantined-files.txt 2009-01-14 00:17:31
ComboFix2.txt 2009-01-13 23:21:43

Pre-Run: 66,222,555,136 bytes free
Post-Run: 66,212,601,856 bytes free

209


HJT LOG---


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 19:46, on 2009-01-13
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.5730.0011)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec\pcAnywhere\awhost32.exe
C:\Program Files\Wave Systems Corp\Common\DataServer.exe
C:\Program Files\DigitalPersona\Bin\DpHost.exe
C:\WINDOWS\system32\EloSrvce.exe
c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
c:\revention\revbackup.exe
c:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\NTRU Cryptosystems\NTRU Hybrid TSS v2.0.25\bin\tcsd_win32.exe
C:\WINDOWS\system32\mqsvc.exe
C:\WINDOWS\system32\mqtgsvc.exe
c:\revention\reventioncallerid.exe
c:\revention\revprtservice.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\911\BIN\CCV_SERVER.EXE
C:\Program Files\internet explorer\iexplore.exe
C:\WINDOWS\system32\EloDkMon.exe
C:\Program Files\internet explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://webmail.fuelpizza.com/src/login.php
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://go.microsoft.com/fwlink/?LinkId=74005
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O4 - HKLM\..\RunOnce: [Malwarebytes' Anti-Malware] C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Global Startup: CC Server.lnk = C:\911\BIN\CCV_SERVER.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MI1933~1\Office12\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MI1933~1\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\WINDOWS\system32\shdocvw.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\WINDOWS\system32\shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra button: (no name) - Cmdmapping - (no file) (HKCU)
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1165494474203
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1168523958010
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{94FDB30E-7CDD-4A70-A67F-4CD65DAA8E01}: NameServer = 192.168.1.254
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: DataSvr2 - Wave Systems Corp. - C:\Program Files\Wave Systems Corp\Common\DataServer.exe
O23 - Service: Biometric Authentication Service (DpHost) - Digital Persona, Inc. - C:\Program Files\DigitalPersona\Bin\DpHost.exe
O23 - Service: EloSystemService - Elo Touchsystems, Inc. - C:\WINDOWS\system32\EloSrvce.exe
O23 - Service: RevBackup - - c:\revention\revbackup.exe
O23 - Service: RevCallerId - - c:\revention\reventioncallerid.exe
O23 - Service: Revention Print Server (RevPrtSrv) - - c:\revention\revprtservice.exe
O23 - Service: NTRU Hybrid TSS v2.0.25 TCS (tcsd_win32.exe) - Unknown owner - C:\Program Files\NTRU Cryptosystems\NTRU Hybrid TSS v2.0.25\bin\tcsd_win32.exe

--
End of file - 4884 bytes


MALMWARE BYTES LOG FILE-----



Malwarebytes' Anti-Malware 1.32
Database version: 1648
Windows 5.1.2600 Service Pack 2

2009-01-13 19:42:11
mbam-log-2009-01-13 (19-42-11).txt

Scan type: Full Scan (C:\|)
Objects scanned: 89182
Time elapsed: 13 minute(s), 54 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 193

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Qoobox\Quarantine\C\WINDOWS\system32\bamuvido.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\bekalite.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\bihomojo.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\bivehuso.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\bodizeya.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\bofofevu.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\bogerijo.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\bowuridi.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\dadiwewa.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\fefedami.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\feloviko.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\fenozano.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\fezogevu.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\fineloto.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\fivahofi.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\fotowuta.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\gebuhiri.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\gedesumi.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\geyeyusi.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\guyubaha.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\halivevi.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\harizepu.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\hatutiza.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\hununihu.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\jafasatu.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\jegagire.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\jituwoni.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\juguteto.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\jureviji.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\kipariwo.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\kisowewi.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\kogavazo.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\kulogizo.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\muwilama.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\nagafuni.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\nanuleya.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\navokivi.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\nitalopo.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\nivonano.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\nokanoza.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\novusina.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\nuwolazo.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\nuzadayi.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\nuzevuzi.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\pedewovo.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\pezaguse.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\pirotima.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\pokumala.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\ponegiwu.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\punawuwu.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\puseveni.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\rejegufe.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\rejemufa.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\tafusabe.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\tamowevu.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\tejoluze.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\telowewa.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\tepusiga.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\tetomibi.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\tijezaze.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\tijubopi.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\tufemivu.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\tupopazo.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\tutepega.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\vatoteju.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\vijibidi.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\vufurajo.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\wenunuve.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\wijahupu.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\wiwedafi.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\wuhomuro.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\yileduyu.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\yobuwiji.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\zevububu.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP726\A0034144.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP726\A0034145.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP726\A0034146.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP727\A0034174.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP731\A0036374.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP731\A0036347.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP731\A0036358.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP731\A0036373.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP731\A0036375.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP732\A0036432.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP732\A0036433.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP733\A0038416.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP733\A0038417.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP735\A0038505.dll (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP740\A0039694.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP740\A0039695.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP740\A0039697.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP740\A0039699.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP741\A0039756.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP741\A0039764.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP741\A0039766.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP741\A0039767.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP741\A0040792.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP742\A0042231.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP743\A0042261.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP743\A0043261.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP744\A0045296.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP744\A0045295.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP746\A0045658.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP747\A0045698.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP747\A0046698.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP749\A0049762.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051864.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051867.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051869.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051870.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051871.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051872.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051873.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051874.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051887.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051888.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051889.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051891.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051892.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051893.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051895.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051896.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051898.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051900.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051901.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051905.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051914.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051915.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051917.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051918.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051919.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051920.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051921.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051923.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051927.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051928.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051929.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051930.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051932.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051933.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051934.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051935.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051936.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051937.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051938.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051946.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051950.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051951.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051952.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051953.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051954.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051955.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051868.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051886.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051922.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051958.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051994.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051959.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051963.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051964.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051966.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051967.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051968.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051969.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051970.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051971.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051972.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051973.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051974.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051986.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051987.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051988.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051989.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051991.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051993.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051997.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051998.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP753\A0051999.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP754\A0052545.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{7672A219-571D-498B-B10B-84AB372ABBD2}\RP754\A0052546.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\fadonidu.dll_old (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\govezamu.dll_old (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\gowevoni.dll.tmp (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nageduge.dll_old (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ropizave.dll.tmp (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\sipifunu.dll_old (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\loditija.dll.tmp (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mojegawi.dll.tmp (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nofekile.dll.tmp (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\topapope.dll.tmp (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\huyugadi.dll.tmp (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\bujumuto.dll.tmp (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\zijojere.dll.tmp (Trojan.Vundo) -> Quarantined and deleted successfully.


No word on how is working yet the AV Cleaner message comes up intermittantly before so i need a few IE sessions before i can tell.

THX

pskelley
2009-01-14, 01:58
No word on how is working yet the AV Cleaner message comes up intermittantly before so i need a few IE sessions before i can tell.
There is a load of malware quarantined in combofix and MBAM, plus you have many infected System Restore files. Any AV program will likely see those as a threat even though they are not. Before I can proceed I need to know what you are going to do about an antivirus program?

Thanks

PokerPop3
2009-01-14, 02:17
Well i tried installing NIS 09 and it didnt cooperate with my softwrae on the system. The IT guys said Macafee works fine with the POS software we use. I will probobly try that.

pskelley
2009-01-14, 02:28
I can offer links to freeware programs, as I said, but I have no idea how they work with point of sales software. I can wrap this up if you want, I prefer to see antivirus software running, but I would have to assume you will install something...let me know.

Thanks

PokerPop3
2009-01-14, 17:27
Yeah I understand the AV thing I will install macafee probobly since that is what they reccommend. Is there anything else I need to do to finish up before AV install?

pskelley
2009-01-14, 17:35
Here is the closing post for your computer, but you will have problems completing the instructions without an antivirus program.

Remove combofix from the computer like this:

Click START then RUN
Now type or copy Combofix /u in the runbox and click OK.
Note the space between the X and the U, it needs to be there.

http://i189.photobucket.com/albums/z176/EPL47/CF_Cleanup.png

Clean the System Restore files like this:

Turn off System Restore.
On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
Check Turn off System Restore.
Click Apply, and then click OK.

Reboot

Turn ON System Restore,
On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
UN-Check *Turn off System Restore*.
Click Apply, and then click OK.

Update MBAM and scan to be sure we missed none of the junk, there is no need to post a clean scan result.
(MBAM is yours to keep if you wish, update it and run it once a month or so)

Update the antivirus and scan the system, to be sure it is running right and scanning clean. If you have problems with the program, contact tech support for instructions.

If all is well at this point, let me know and I will close the topic.

Some good information for you:
http://users.telenet.be/bluepatchy/miekiemoes/slowcomputer.html
http://www.microsoft.com/windowsxp/using/helpandsupport/learnmore/tips/mcgill1.mspx

Here is some great information from experts in this field that will help you stay clean and safe online.
http://users.telenet.be/bluepatchy/miekiemoes/prevention.html
http://forums.spybot.info/showthread.php?t=279
http://russelltexas.com/malware/allclear.htm
http://forum.malwareremoval.com/viewtopic.php?t=14
http://www.bleepingcomputer.com/forums/topict2520.html
http://cybercoyote.org/security/not-admin.shtml

http://www.malwarecomplaints.info/

Thanks...pskelley
Safer Networking Forums
http://www.spybot.info/en/donate/index.html
If you are reading this information...thank a teacher,
If you are reading it in English...thank a soldier.

http://users.telenet.be/bluepatchy/miekiemoes/Links.html

PokerPop3
2009-01-14, 18:28
Everything Seems to be working great now thanks so much for your help. I no longer have to bang my head against a wall :eek: