Page 1 of 3 123 LastLast
Results 1 to 10 of 28

Thread: Please help with Conhook, Fotomoto, Virtumonde, and other...

  1. #1
    Junior Member
    Join Date
    Sep 2007
    Posts
    18

    Default Please help with Conhook, Fotomoto, Virtumonde, and other...

    Hi, over the past couple of days, a series of malwares invade my laptop. Its things like WinAntiSpyware2007FreeInstall.exe, Win32/Madcast, Virtumonde.M, and others, which I used various programs like Window Defender, Ad-aware, and later Combofix and Vundofix after seeing some advice on the net to deal with them. Everything seems to be fixed until the next day a next new series of malwares like Conhook.D, Fotomoto, Virtumonde.O, Zenosearch, and WinAntiViruspro(which pop into my browers) appears as soon as I reached Window. They are slowing down the performance of my laptop dramatically and several times I have been advice my Window Defender to reboot my computer. I need help badly. Please advice.

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 4:52:44 PM, on 9/14/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16512)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\System32\Ati2evxx.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    C:\WINDOWS\System32\svchost.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe
    C:\Program Files\Sony\HotKey Utility\HKserv.exe
    C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    C:\Program Files\Apoint\Apoint.exe
    C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe
    C:\WINDOWS\system32\ezSP_Px.exe
    C:\WINDOWS\system32\WDBtnMgr.exe
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\Program Files\Java\jre1.6.0_02\bin\jusched.exe
    C:\Program Files\Sony\HotKey Utility\HKWnd.exe
    C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\Apoint\Apvfb.exe
    C:\Program Files\Apoint\Apntex.exe
    C:\Program Files\AIRPLUS\D-Link AirPlus DWL-120+ Wireless USB Adapter\AIRPLUS.EXE
    C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/cust...search/ie.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://yahoo.sbc.com/dsl
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.sonypictures.com/digent/games/angels/vaio/
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1;
    N3 - Netscape 7: user_pref("browser.search.defaultengine", "engine://C%3A%5CProgram%20Files%5CNetscape%5CNetscape%5Csearchplugins%5CSBWeb_01.src"); (C:\Documents and Settings\MASON KAIBIN YU\Application Data\Mozilla\Profiles\default\ymx6rcjc.slt\prefs.js)
    O3 - Toolbar: ZeroBar - {F5735C15-1FB2-41FE-BA12-242757E69DDE} - C:\Program Files\NetZero\toolbar.dll
    O3 - Toolbar: ZeroBar - {F0F8ECBE-D460-4B34-B007-56A92E8F84A7} - C:\Program Files\NetZero\Toolbar.dll
    O3 - Toolbar: &Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\ycomp5_3_12_0.dll
    O3 - Toolbar: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\fgiebar.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
    O3 - Toolbar: ATLAS Translation Bar - {3C6301ED-0F78-4AF2-8150-D9C052361A8E} - C:\Program Files\ATLAS V11\ATLIECP.DLL
    O4 - HKLM\..\Run: [VAIO Recovery] C:\WINDOWS\Sonysys\VAIO Recovery\PartSeal.exe
    O4 - HKLM\..\Run: [Mouse Suite 98 Daemon] ICO.EXE
    O4 - HKLM\..\Run: [HKSERV.EXE] C:\Program Files\Sony\HotKey Utility\HKserv.exe
    O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe
    O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe
    O4 - HKLM\..\Run: [pccguide.exe] "C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe"
    O4 - HKLM\..\Run: [ezShieldProtector for Px] C:\WINDOWS\system32\ezSP_Px.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [WD Button Manager] WDBtnMgr.exe
    O4 - HKLM\..\Run: [qadtntmz] D;]XJOEPXT]tztufn43]Svoemm43/fyf!#D;]XJOEPXT]tztufn43]deoqsi/emm#-Tubsu
    O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
    O4 - HKLM\..\Run: [EPSON Stylus CX3800 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIACA.EXE /P26 "EPSON Stylus CX3800 Series" /O6 "USB001" /M "Stylus CX3800"
    O4 - HKLM\..\Run: [svhost] "C:\WINDOWS\svhost.exe"
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_02\bin\jusched.exe"
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [DAEMON Tools] "C:\Program Files\DAEMON Tools\daemon.exe" -lang 1033
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKUS\S-1-5-18\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'Default user')
    O4 - Startup: Epson all-in-one Registration.lnk = F:\Titles\Ereg\EPSONREG.EXE
    O4 - Startup: TA_Start.lnk = C:\WINDOWS\system32\kpdsrngk.exe
    O4 - Global Startup: D-Link AirPlus USB.lnk = ?
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: Download All by FlashGet - C:\Program Files\FlashGet\jc_all.htm
    O8 - Extra context menu item: Download using FlashGet - C:\Program Files\FlashGet\jc_link.htm
    O8 - Extra context menu item: Translate by ATLAS - C:\Program Files\ATLAS V11\Atlscript.html
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_02\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_02\bin\ssv.dll
    O9 - Extra button: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
    O9 - Extra 'Tools' menuitem: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
    O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
    O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
    O9 - Extra button: ATLAS Translation - {B7707A72-4355-11D4-82BD-00000EBBEF8D} - C:\Program Files\ATLAS V11\Atlscript.html
    O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe
    O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O14 - IERESET.INF: START_PAGE_URL=http://www.sony.com/vaiopeople
    O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english...an_unicode.cab
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - https://fpdownload.macromedia.com/pu...sh/swflash.cab
    O16 - DPF: {FFFFFFFF-CACE-BABE-BABE-00AA0055595A} - http://www.trueswitch.com/sbc/TrueInstallSBC.exe
    O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Trend Micro Central Control Component (PcCtlCom) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\PROGRA~1\COMMON~1\SONYSH~1\AVLib\Sptisrv.exe
    O23 - Service: Trend Micro Real-time Service (Tmntsrv) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe
    O23 - Service: VAIO Media Music Server (VAIOMediaPlatform-MusicServer-AppServer) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Music\SSSvr.exe
    O23 - Service: VAIO Media Music Server (HTTP) (VAIOMediaPlatform-MusicServer-HTTP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe
    O23 - Service: VAIO Media Music Server (UPnP) (VAIOMediaPlatform-MusicServer-UPnP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\UPnPFramework.exe
    O23 - Service: VAIO Media Photo Server (VAIOMediaPlatform-PhotoServer-AppServer) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Photo\appsrv\PhotoAppSrv.exe
    O23 - Service: VAIO Media Photo Server (HTTP) (VAIOMediaPlatform-PhotoServer-HTTP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe
    O23 - Service: VAIO Media Photo Server (UPnP) (VAIOMediaPlatform-PhotoServer-UPnP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\UPnPFramework.exe
    O23 - Service: VAIO Media Video Server (VAIOMediaPlatform-VideoServer-AppServer) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Video\GPVSvr.exe
    O23 - Service: VAIO Media Video Server (HTTP) (VAIOMediaPlatform-VideoServer-HTTP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe
    O23 - Service: VAIO Media Video Server (UPnP) (VAIOMediaPlatform-VideoServer-UPnP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\UPnPFramework.exe
    O23 - Service: YPCService - Yahoo! Inc. - C:\WINDOWS\system32\YPCSER~1.EXE

    --
    End of file - 11031 bytes

  2. #2
    Junior Member
    Join Date
    Sep 2007
    Posts
    18

    Default kaspersky log

    -------------------------------------------------------------------------------
    KASPERSKY ONLINE SCANNER REPORT
    Friday, September 14, 2007 4:01:47 PM
    Operating System: Microsoft Windows XP Home Edition, Service Pack 2 (Build 2600)
    Kaspersky Online Scanner version: 5.0.93.1
    Kaspersky Anti-Virus database last update: 14/09/2007
    Kaspersky Anti-Virus database records: 418609
    -------------------------------------------------------------------------------

    Scan Settings:
    Scan using the following antivirus database: extended
    Scan Archives: true
    Scan Mail Bases: true

    Scan Target - My Computer:
    C:\
    D:\
    E:\
    F:\
    G:\

    Scan Statistics:
    Total number of scanned objects: 81696
    Number of viruses found: 57
    Number of infected objects: 151
    Number of suspicious objects: 3
    Duration of the scan process: 04:29:59

    Infected Object Name / Virus Name / Last Action
    C:\check_LSA7.txt Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Microsoft\Windows Defender\Support\MPLog-07082007-021332.log Object is locked skipped
    C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
    C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
    C:\Documents and Settings\Mason KaiBin Yu\Cookies\index.dat Object is locked skipped
    C:\Documents and Settings\Mason KaiBin Yu\Local Settings\Application Data\Microsoft\Feeds Cache\index.dat Object is locked skipped
    C:\Documents and Settings\Mason KaiBin Yu\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\Mason KaiBin Yu\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\Mason KaiBin Yu\Local Settings\Application Data\Microsoft\Windows Defender\FileTracker\{F09C9CB9-E578-4C29-8A0C-056EB68DD4FA} Object is locked skipped
    C:\Documents and Settings\Mason KaiBin Yu\Local Settings\History\History.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\Mason KaiBin Yu\Local Settings\History\History.IE5\MSHist012007091420070915\index.dat Object is locked skipped
    C:\Documents and Settings\Mason KaiBin Yu\Local Settings\Temporary Internet Files\AntiPhishing\B3BB5BBA-E7D5-40AB-A041-A5B1C0B26C8F.dat Object is locked skipped
    C:\Documents and Settings\Mason KaiBin Yu\Local Settings\Temporary Internet Files\Content.IE5\0H6745Y3\lkjh[1] Infected: Trojan-Downloader.Win32.Tiny.id skipped
    C:\Documents and Settings\Mason KaiBin Yu\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\Mason KaiBin Yu\NTUSER.DAT Object is locked skipped
    C:\Documents and Settings\Mason KaiBin Yu\ntuser.dat.LOG Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\temp\MpCmdRun-8-421CFC91-A93E-42AB-A35C-F06F127FCC44.lock Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\temp\MpCmdRun.log Object is locked skipped
    C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
    C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\10.tmp Infected: Trojan-Downloader.Win32.Esepor.k skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\11.tmp Infected: Trojan-Clicker.Win32.Small.an skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\12.tmp Infected: Trojan-Downloader.Win32.Esepor.e skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\13.tmp Infected: Trojan-Downloader.Win32.Esepor.j skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\14.tmp Infected: Trojan-Downloader.Win32.Esepor.h skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\15.tmp Infected: Trojan-Downloader.Win32.Esepor.i skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\16.tmp Infected: Trojan-Downloader.Win32.Esepor.x skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\17.tmp Infected: Trojan-Downloader.Win32.Esepor.m skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\18.tmp Infected: Trojan-Downloader.Win32.Esepor.e skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\19.tmp Infected: Trojan-Clicker.Win32.Small.an skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\1A.tmp Infected: Trojan-Downloader.Win32.Esepor.j skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\1B.tmp Infected: Trojan-Downloader.Win32.Esepor.h skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\1C.tmp Infected: Trojan-Downloader.Win32.Small.amr skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\1D.tmp Infected: Trojan-Downloader.Win32.Small.amr skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\1E.tmp Infected: Exploit.HTML.Mht skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\1F.tmp Infected: Trojan-Downloader.Win32.Esepor.e skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2.tmp/Installer.class Infected: Trojan-Downloader.Java.OpenStream.z skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2.tmp ZIP: infected - 1 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2.tmp CryptFF.b: infected - 1 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\20.tmp Infected: Exploit.VBS.Phel.a skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\21.tmp Infected: Exploit.HTML.Mht skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\22.tmp Infected: Exploit.HTML.Mht skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\23.tmp Infected: Exploit.VBS.Phel.a skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\24.tmp Infected: Exploit.HTML.Mht skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\25.tmp Infected: Exploit.HTML.Mht skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\26.tmp Infected: Exploit.VBS.Phel.c skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\27.tmp Infected: Exploit.HTML.Mht skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\28.tmp Infected: Exploit.HTML.Mht skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\29.tmp/GetAccess.class Infected: Trojan.Java.ClassLoader.c skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\29.tmp/InsecureClassLoader.class Infected: Exploit.Java.ByteVerify skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\29.tmp/Dummy.class Infected: Trojan.Java.ClassLoader.Dummy.a skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\29.tmp/Installer.class Infected: Trojan-Downloader.Java.OpenConnection.v skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\29.tmp ZIP: infected - 4 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\29.tmp CryptFF.b: infected - 4 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2A.tmp/BlackBox.class Infected: Trojan.Java.ClassLoader.z skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2A.tmp/VB.class Infected: Trojan.Java.ClassLoader.ak skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2A.tmp/Beyond.class Infected: Trojan-Downloader.Java.OpenConnection.v skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2A.tmp ZIP: infected - 3 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2A.tmp CryptFF.b: infected - 3 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2B.tmp Infected: Trojan-Downloader.Win32.Pacer.j skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2C.tmp Infected: Exploit.JS.JavaPrxy.a skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2D.tmp Infected: Trojan-Downloader.Win32.Ani.b skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2E.tmp/GetAccess.class Infected: Trojan.Java.ClassLoader.c skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2E.tmp/InsecureClassLoader.class Infected: Exploit.Java.ByteVerify skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2E.tmp/Dummy.class Infected: Trojan.Java.ClassLoader.Dummy.a skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2E.tmp/Installer.class Infected: Trojan-Downloader.Java.OpenConnection.v skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2E.tmp ZIP: infected - 4 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2E.tmp CryptFF.b: infected - 4 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2F.tmp/BlackBox.class Infected: Exploit.Java.ByteVerify skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2F.tmp/VerifierBug.class Infected: Exploit.Java.ByteVerify skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2F.tmp/Beyond.class Infected: Trojan-Downloader.Java.OpenConnection.aa skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2F.tmp ZIP: infected - 3 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\2F.tmp CryptFF.b: infected - 3 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\30.tmp/BlackBox.class Infected: Exploit.Java.ByteVerify skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\30.tmp/VerifierBug.class Infected: Exploit.Java.ByteVerify skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\30.tmp/Beyond.class Infected: Trojan-Downloader.Java.OpenConnection.aa skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\30.tmp ZIP: infected - 3 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\30.tmp CryptFF.b: infected - 3 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\31.tmp/BlackBox.class Infected: Exploit.Java.ByteVerify skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\31.tmp/VerifierBug.class Infected: Exploit.Java.ByteVerify skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\31.tmp/Beyond.class Infected: Trojan-Downloader.Java.OpenConnection.aa skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\31.tmp ZIP: infected - 3 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\31.tmp CryptFF.b: infected - 3 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\32.tmp/GetAccess.class Infected: Trojan-Downloader.Java.OpenConnection.ae skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\32.tmp/Installer.class Infected: Trojan-Downloader.Java.OpenConnection.ae skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\32.tmp ZIP: infected - 2 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\32.tmp CryptFF.b: infected - 2 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\33.tmp/NudeBox.class Infected: Trojan.Java.ClassLoader.u skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\33.tmp/Worker.class Infected: Trojan.Java.ClassLoader.u skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\33.tmp/VerifierBug.class Infected: Trojan.Java.ClassLoader.u skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\33.tmp/javautil.zip Infected: Trojan-Downloader.Win32.Small.bqz skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\33.tmp ZIP: infected - 4 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\33.tmp CryptFF.b: infected - 4 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\34.tmp/GetAccess.class Infected: Trojan-Downloader.Java.OpenConnection.aj skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\34.tmp/Installer.class Infected: Trojan-Downloader.Java.OpenConnection.aj skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\34.tmp ZIP: infected - 2 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\34.tmp CryptFF.b: infected - 2 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\35.tmp/Matrix.class Infected: Trojan-Downloader.Java.OpenStream.c skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\35.tmp/Counter.class Infected: Trojan.Java.ClassLoader.h skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\35.tmp/Parser.class Infected: Trojan.Java.ClassLoader.d skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\35.tmp ZIP: infected - 3 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\35.tmp CryptFF.b: infected - 3 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\36.tmp Infected: Trojan-Downloader.Win32.Ani.c skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\37.tmp Suspicious: Exploit.Win32.IMG-WMF skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\38.tmp Suspicious: Exploit.Win32.IMG-WMF skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\39.tmp Suspicious: Exploit.Win32.IMG-WMF skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\3A.tmp Infected: Trojan-Downloader.Win32.Agent.acd skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\3B.tmp Infected: Exploit.Win32.IMG-WMF.u skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\3D.tmp Infected: Trojan-Downloader.Win32.Agent.acd skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\3F.tmp Infected: Trojan-Downloader.Win32.Ani.c skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\4.tmp Infected: Trojan-Downloader.Win32.Esepor.m skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\44.tmp Infected: Trojan-Downloader.Win32.Agent.acd skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\47.tmp Infected: Trojan-Downloader.Win32.Ani.c skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\68.tmp Infected: Trojan-Downloader.Win32.Esepor.m skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\Backup\drnote.RB0/ThisDocument Infected: Virus.MSWord.Marker.kl skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\Backup\drnote.RB0 Embedded: infected - 1 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\Backup\drnote.RB0 CryptFF.b: infected - 1 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\Backup\EI Test (studio lighting).RB0/ThisDocument Infected: Virus.MSWord.Marker.kl skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\Backup\EI Test (studio lighting).RB0 Embedded: infected - 1 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\Backup\EI Test (studio lighting).RB0 CryptFF.b: infected - 1 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\Backup\Prep Week paper(201A).RB0/ThisDocument Infected: Virus.MSWord.Marker.kl skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\Backup\Prep Week paper(201A).RB0 Embedded: infected - 1 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\Backup\Prep Week paper(201A).RB0 CryptFF.b: infected - 1 skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\DB.tmp Infected: Trojan-Clicker.Win32.Small.jf skipped
    C:\Program Files\Trend Micro\Internet Security 2005\Quarantine\F.tmp Infected: Trojan.HTML.StartPage.i skipped
    C:\qoobox\Quarantine\C\Program Files\InetGet2\popinstall.exe.vir Infected: not-a-virus:AdWare.Win32.Rond.c skipped
    C:\qoobox\Quarantine\C\Program Files\svhost\wr-1-77.exe.vir Infected: Trojan-Downloader.Win32.Small.fox skipped
    C:\qoobox\Quarantine\C\Program Files\WinPop\UnInstall.exe.vir Infected: Trojan.Win32.Small.oa skipped
    C:\qoobox\Quarantine\C\WINDOWS\system32\dwdsrngt.exe.vir Infected: not-a-virus:AdWare.Win32.ZenoSearch.o skipped
    C:\qoobox\Quarantine\C\WINDOWS\system32\f02WtR\f02WtR1065.exe.vir Infected: Trojan-Downloader.Win32.VB.bgd skipped
    C:\qoobox\Quarantine\C\WINDOWS\system32\f10WtR\f10WtR1099.exe.vir Infected: Trojan-Downloader.Win32.VB.bgd skipped
    C:\qoobox\Quarantine\catchme2007-09-07_192339.70.zip/d9hed.sys Infected: Trojan.Win32.Agent.ayt skipped
    C:\qoobox\Quarantine\catchme2007-09-07_192339.70.zip/patzzk65.sys Infected: Trojan.Win32.Agent.abe skipped
    C:\qoobox\Quarantine\catchme2007-09-07_192339.70.zip/wtmuni32.sys Infected: Trojan.Win32.Agent.abe skipped
    C:\qoobox\Quarantine\catchme2007-09-07_192339.70.zip/zqlnis44.sys Infected: Trojan.Win32.Agent.abe skipped
    C:\qoobox\Quarantine\catchme2007-09-07_192339.70.zip/patzzk65.dll Infected: Trojan.Win32.Agent.bfx skipped
    C:\qoobox\Quarantine\catchme2007-09-07_192339.70.zip/iifeeee.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
    C:\qoobox\Quarantine\catchme2007-09-07_192339.70.zip ZIP: infected - 6 skipped
    C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped

  3. #3
    Junior Member
    Join Date
    Sep 2007
    Posts
    18

    Default kaspersky log continues..

    C:\System Volume Information\_restore{B174B497-93F1-4175-AF50-95254415EC7E}\RP889\A0277553.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
    C:\System Volume Information\_restore{B174B497-93F1-4175-AF50-95254415EC7E}\RP889\A0277554.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
    C:\System Volume Information\_restore{B174B497-93F1-4175-AF50-95254415EC7E}\RP889\A0277572.exe Infected: Trojan-Downloader.Win32.VB.bgd skipped
    C:\System Volume Information\_restore{B174B497-93F1-4175-AF50-95254415EC7E}\RP889\A0277576.exe Infected: not-a-virus:AdWare.Win32.ZenoSearch.o skipped
    C:\System Volume Information\_restore{B174B497-93F1-4175-AF50-95254415EC7E}\RP890\A0277817.exe Infected: Trojan-Downloader.Win32.Tiny.id skipped
    C:\System Volume Information\_restore{B174B497-93F1-4175-AF50-95254415EC7E}\RP892\A0277853.exe Infected: not-a-virus:AdWare.Win32.ZenoSearch.r skipped
    C:\System Volume Information\_restore{B174B497-93F1-4175-AF50-95254415EC7E}\RP893\A0277870.exe Infected: not-a-virus:AdWare.Win32.ZenoSearch.r skipped
    C:\System Volume Information\_restore{B174B497-93F1-4175-AF50-95254415EC7E}\RP894\A0278877.exe Infected: not-a-virus:AdWare.Win32.ZenoSearch.r skipped
    C:\System Volume Information\_restore{B174B497-93F1-4175-AF50-95254415EC7E}\RP895\A0279913.exe Infected: not-a-virus:AdWare.Win32.ZenoSearch.r skipped
    C:\System Volume Information\_restore{B174B497-93F1-4175-AF50-95254415EC7E}\RP898\A0279951.exe Infected: Trojan-Downloader.Win32.Tiny.id skipped
    C:\System Volume Information\_restore{B174B497-93F1-4175-AF50-95254415EC7E}\RP898\A0279954.exe Infected: not-a-virus:AdWare.Win32.ZenoSearch.o skipped
    C:\System Volume Information\_restore{B174B497-93F1-4175-AF50-95254415EC7E}\RP898\A0279956.exe Infected: not-a-virus:AdWare.Win32.ZenoSearch.o skipped
    C:\System Volume Information\_restore{B174B497-93F1-4175-AF50-95254415EC7E}\RP911\A0282501.exe Infected: Trojan-Downloader.Win32.Tiny.id skipped
    C:\System Volume Information\_restore{B174B497-93F1-4175-AF50-95254415EC7E}\RP912\change.log Object is locked skipped
    C:\VundoFix Backups\opnnlkj.dll.bad Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
    C:\VundoFix Backups\rqronki.dll.bad Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
    C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
    C:\WINDOWS\SchedLgU.Txt Object is locked skipped
    C:\WINDOWS\SoftwareDistribution\EventCache\{474648C0-8F85-434D-B9D6-7CF6E9590D20}.bin Object is locked skipped
    C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
    C:\WINDOWS\Sti_Trace.log Object is locked skipped
    C:\WINDOWS\system32\apuksaec.exe Infected: Trojan.Win32.Agent.bck skipped
    C:\WINDOWS\system32\capcam\nab22011.exe/data0004 Infected: not-a-virus:AdWare.Win32.TTC.c skipped
    C:\WINDOWS\system32\capcam\nab22011.exe NSIS: infected - 1 skipped
    C:\WINDOWS\system32\CatRoot2\edb.log Object is locked skipped
    C:\WINDOWS\system32\CatRoot2\tmp.edb Object is locked skipped
    C:\WINDOWS\system32\cfig322\icm33o.exe Infected: Trojan-Downloader.Win32.Small.fky skipped
    C:\WINDOWS\system32\cnxfighj.exe Infected: Trojan.Win32.Agent.bck skipped
    C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
    C:\WINDOWS\system32\config\default Object is locked skipped
    C:\WINDOWS\system32\config\default.LOG Object is locked skipped
    C:\WINDOWS\system32\config\Internet.evt Object is locked skipped
    C:\WINDOWS\system32\config\SAM Object is locked skipped
    C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
    C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
    C:\WINDOWS\system32\config\SECURITY Object is locked skipped
    C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
    C:\WINDOWS\system32\config\software Object is locked skipped
    C:\WINDOWS\system32\config\software.LOG Object is locked skipped
    C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
    C:\WINDOWS\system32\config\system Object is locked skipped
    C:\WINDOWS\system32\config\system.LOG Object is locked skipped
    C:\WINDOWS\system32\drivers\m9mw0.sys Infected: Trojan.Win32.Agent.ayu skipped
    C:\WINDOWS\system32\drivers\sptd.sys Object is locked skipped
    C:\WINDOWS\system32\drvr2\bbc002nws.exe Infected: Trojan-Downloader.Win32.Small.buy skipped
    C:\WINDOWS\system32\h323log.txt Object is locked skipped
    C:\WINDOWS\system32\kbdics.dll Infected: Trojan.Win32.Agent.abe skipped
    C:\WINDOWS\system32\kfrdsuns.exe Infected: Trojan.Win32.Agent.bck skipped
    C:\WINDOWS\system32\oofrmqxb.exe Infected: Trojan.Win32.Agent.bck skipped
    C:\WINDOWS\system32\plugins\plu.exe/data.rar/bind_50010.exe Infected: Trojan-Downloader.Win32.QQHelper.acv skipped
    C:\WINDOWS\system32\plugins\plu.exe/data.rar Infected: Trojan-Downloader.Win32.QQHelper.acv skipped
    C:\WINDOWS\system32\plugins\plu.exe RarSFX: infected - 2 skipped
    C:\WINDOWS\system32\rnvceiwr.exe Infected: Trojan.Win32.Agent.bck skipped
    C:\WINDOWS\system32\t239478.exe Infected: Trojan-Downloader.Win32.Esepor.ae skipped
    C:\WINDOWS\system32\vpmojjkn.exe Infected: Trojan.Win32.Agent.bck skipped
    C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
    C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped
    C:\WINDOWS\system32\wcczixp.dll Infected: Trojan.Win32.Agent.abe skipped
    C:\WINDOWS\system32\y3jd86ewsc.dll Infected: Trojan.Win32.Agent.ays skipped
    C:\WINDOWS\wiadebug.log Object is locked skipped
    C:\WINDOWS\wiaservc.log Object is locked skipped
    C:\WINDOWS\WindowsUpdate.log Object is locked skipped
    D:\Downloads\PJ64\pj64_1_5.exe/Attach Infected: not-a-virus:AdWare.Win32.F1Organizer.h skipped
    D:\Downloads\PJ64\pj64_1_5.exe Momma: infected - 1 skipped
    D:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped

    Scan process completed.

  4. #4
    Security Expert: Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,288

    Default

    Hi

    Rename HijackThis.exe file -> whatever.exe and post a fresh hjt log. Renaming must be done to make possible hidden malware entries visible.
    Microsoft Windows Insider MVP 2016-2020
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

  5. #5
    Junior Member
    Join Date
    Sep 2007
    Posts
    18

    Default

    hi, sorry for the late reply. Here is the new log.

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:44:46 AM, on 9/25/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16512)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\System32\Ati2evxx.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    C:\WINDOWS\System32\svchost.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe
    C:\WINDOWS\Explorer.EXE
    C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    C:\Program Files\Sony\HotKey Utility\HKserv.exe
    C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    C:\Program Files\Apoint\Apoint.exe
    C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe
    C:\WINDOWS\system32\ezSP_Px.exe
    C:\WINDOWS\system32\WDBtnMgr.exe
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\Program Files\Java\jre1.6.0_02\bin\jusched.exe
    C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\DAEMON Tools\daemon.exe
    C:\Program Files\Apoint\Apntex.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\Apoint\Apvfb.exe
    C:\Program Files\Sony\HotKey Utility\HKWnd.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\Program Files\AIRPLUS\D-Link AirPlus DWL-120+ Wireless USB Adapter\AIRPLUS.EXE
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\yfrmabgg.exe
    C:\Program Files\Trend Micro\HijackThis\whatever.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\TSC.EXE

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/cust...search/ie.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://yahoo.sbc.com/dsl
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.sonypictures.com/digent/games/angels/vaio/
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1;
    N3 - Netscape 7: user_pref("browser.search.defaultengine", "engine://C%3A%5CProgram%20Files%5CNetscape%5CNetscape%5Csearchplugins%5CSBWeb_01.src"); (C:\Documents and Settings\MASON KAIBIN YU\Application Data\Mozilla\Profiles\default\ymx6rcjc.slt\prefs.js)
    O2 - BHO: Yahoo! Companion BHO - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\ycomp5_3_12_0.dll
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: ATLAS Translation Bar - {3C6301ED-0F78-4AF2-8150-D9C052361A8E} - C:\Program Files\ATLAS V11\ATLIECP.DLL
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: (no name) - {549B5CA7-4A86-11D7-A4DF-000874180BB3} - (no file)
    O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~1\tools\iesdsg.dll (file missing)
    O2 - BHO: (no name) - {6EEEEB02-B021-4E5B-B000-5157458F3AE5} - (no file)
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_02\bin\ssv.dll
    O2 - BHO: IeCatch2 Class - {A5366673-E8CA-11D3-9CD9-0090271D075B} - C:\PROGRA~1\FlashGet\jccatch.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
    O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.0.301.7164\swg.dll
    O2 - BHO: (no name) - {CF46BFB3-2ACC-441b-B82B-36B9562C7FF1} - C:\WINDOWS\system32\cvjorbqj.dll
    O2 - BHO: (no name) - {E558DEA6-AD66-4957-A09C-75473F4D2D08} - C:\WINDOWS\system32\fcyww.dll
    O2 - BHO: (no name) - {EFC0675C-8A58-485C-9946-67EE5AA7CC7C} - (no file)
    O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
    O3 - Toolbar: ZeroBar - {F5735C15-1FB2-41FE-BA12-242757E69DDE} - C:\Program Files\NetZero\toolbar.dll
    O3 - Toolbar: ZeroBar - {F0F8ECBE-D460-4B34-B007-56A92E8F84A7} - C:\Program Files\NetZero\Toolbar.dll
    O3 - Toolbar: &Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\ycomp5_3_12_0.dll
    O3 - Toolbar: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\fgiebar.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
    O3 - Toolbar: ATLAS Translation Bar - {3C6301ED-0F78-4AF2-8150-D9C052361A8E} - C:\Program Files\ATLAS V11\ATLIECP.DLL
    O4 - HKLM\..\Run: [VAIO Recovery] C:\WINDOWS\Sonysys\VAIO Recovery\PartSeal.exe
    O4 - HKLM\..\Run: [Mouse Suite 98 Daemon] ICO.EXE
    O4 - HKLM\..\Run: [HKSERV.EXE] C:\Program Files\Sony\HotKey Utility\HKserv.exe
    O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe
    O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe
    O4 - HKLM\..\Run: [pccguide.exe] "C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe"
    O4 - HKLM\..\Run: [ezShieldProtector for Px] C:\WINDOWS\system32\ezSP_Px.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [WD Button Manager] WDBtnMgr.exe
    O4 - HKLM\..\Run: [qadtntmz] D;]XJOEPXT]tztufn43]Svoemm43/fyf!#D;]XJOEPXT]tztufn43]deoqsi/emm#-Tubsu
    O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
    O4 - HKLM\..\Run: [EPSON Stylus CX3800 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIACA.EXE /P26 "EPSON Stylus CX3800 Series" /O6 "USB001" /M "Stylus CX3800"
    O4 - HKLM\..\Run: [svhost] "C:\WINDOWS\svhost.exe"
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_02\bin\jusched.exe"
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [DAEMON Tools] "C:\Program Files\DAEMON Tools\daemon.exe" -lang 1033
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKUS\S-1-5-18\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'Default user')
    O4 - Startup: Epson all-in-one Registration.lnk = F:\Titles\Ereg\EPSONREG.EXE
    O4 - Startup: TA_Start.lnk = C:\WINDOWS\system32\kpdsrngk.exe
    O4 - Global Startup: D-Link AirPlus USB.lnk = ?
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: Download All by FlashGet - C:\Program Files\FlashGet\jc_all.htm
    O8 - Extra context menu item: Download using FlashGet - C:\Program Files\FlashGet\jc_link.htm
    O8 - Extra context menu item: Translate by ATLAS - C:\Program Files\ATLAS V11\Atlscript.html
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_02\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_02\bin\ssv.dll
    O9 - Extra button: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
    O9 - Extra 'Tools' menuitem: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
    O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
    O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
    O9 - Extra button: ATLAS Translation - {B7707A72-4355-11D4-82BD-00000EBBEF8D} - C:\Program Files\ATLAS V11\Atlscript.html
    O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe
    O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O14 - IERESET.INF: START_PAGE_URL=http://www.sony.com/vaiopeople
    O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english...an_unicode.cab
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - https://fpdownload.macromedia.com/pu...sh/swflash.cab
    O16 - DPF: {FFFFFFFF-CACE-BABE-BABE-00AA0055595A} - http://www.trueswitch.com/sbc/TrueInstallSBC.exe
    O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe
    O23 - Service: DomainService - - C:\WINDOWS\system32\yfrmabgg.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Trend Micro Central Control Component (PcCtlCom) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\PROGRA~1\COMMON~1\SONYSH~1\AVLib\Sptisrv.exe
    O23 - Service: Trend Micro Real-time Service (Tmntsrv) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe
    O23 - Service: VAIO Media Music Server (VAIOMediaPlatform-MusicServer-AppServer) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Music\SSSvr.exe
    O23 - Service: VAIO Media Music Server (HTTP) (VAIOMediaPlatform-MusicServer-HTTP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe
    O23 - Service: VAIO Media Music Server (UPnP) (VAIOMediaPlatform-MusicServer-UPnP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\UPnPFramework.exe
    O23 - Service: VAIO Media Photo Server (VAIOMediaPlatform-PhotoServer-AppServer) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Photo\appsrv\PhotoAppSrv.exe
    O23 - Service: VAIO Media Photo Server (HTTP) (VAIOMediaPlatform-PhotoServer-HTTP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe
    O23 - Service: VAIO Media Photo Server (UPnP) (VAIOMediaPlatform-PhotoServer-UPnP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\UPnPFramework.exe
    O23 - Service: VAIO Media Video Server (VAIOMediaPlatform-VideoServer-AppServer) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Video\GPVSvr.exe
    O23 - Service: VAIO Media Video Server (HTTP) (VAIOMediaPlatform-VideoServer-HTTP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe
    O23 - Service: VAIO Media Video Server (UPnP) (VAIOMediaPlatform-VideoServer-UPnP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\UPnPFramework.exe
    O23 - Service: YPCService - Yahoo! Inc. - C:\WINDOWS\system32\YPCSER~1.EXE

    --
    End of file - 12841 bytes

  6. #6
    Security Expert: Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,288

    Default

    Hi

    1. Download this file -
    combofix.exe
    2. Double click combofix.exe & follow the prompts.
    3. When finished, it shall produce a log for you. Post that log in your
    next reply with a fresh hjt log.

    Note:
    Do not mouseclick combofix's window whilst it's running. That may cause
    it to stall
    Microsoft Windows Insider MVP 2016-2020
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

  7. #7
    Junior Member
    Join Date
    Sep 2007
    Posts
    18

    Default

    thanks for the help. Here is the combofix log

    ComboFix 07-09-21.2 - "Mason KaiBin Yu" 2007-09-26 12:58:07.3 - NTFSx86
    Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.83 [GMT -7:00]
    Script execution time was exceeded on script "C:\ComboFix\restore_pt.vbs".
    Script execution was terminated.
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\check_LSA7.txt
    C:\DOCUME~1\MASONK~1\STARTM~1\Programs\Startup.\TA_Start.lnk
    C:\DOCUME~1\MASONK~1\STARTM~1\Programs\Startup\ta_start.lnk
    C:\WINDOWS\cookies.ini
    C:\WINDOWS\system32\cvjorbqj.dll
    C:\WINDOWS\system32\fcyww.dll
    C:\WINDOWS\system32\hkxlpaxp.ini
    C:\WINDOWS\system32\lvkgapvy.exe
    C:\WINDOWS\system32\pxaplxkh.dll
    C:\WINDOWS\system32\qvcqplyn.dll
    C:\WINDOWS\system32\uptymcad.exe
    C:\WINDOWS\system32\vhqkgquo.exe
    C:\WINDOWS\system32\wwycf.bak1
    C:\WINDOWS\system32\wwycf.bak2
    C:\WINDOWS\system32\wwycf.ini
    C:\WINDOWS\system32\wwycf.tmp
    C:\WINDOWS\system32\yfrmabgg.exe

    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))


    -------\LEGACY_DOMAINSERVICE
    -------\DomainService


    ((((((((((((((((((((((((( Files Created from 2007-08-26 to 2007-09-26 )))))))))))))))))))))))))))))))
    .

    2007-09-26 00:07 84,032 --a------ C:\WINDOWS\system32\pftrsmvt.dll
    2007-09-25 00:05 84,032 --a------ C:\WINDOWS\system32\niswlsgn.dll
    2007-09-22 23:55 85,568 --a------ C:\WINDOWS\system32\bitvcjln.dll
    2007-09-13 00:53 <DIR> d-------- C:\WINDOWS\system32\Kaspersky Lab
    2007-09-13 00:53 <DIR> d-------- C:\DOCUME~1\ALLUSE~1\APPLIC~1\Kaspersky Lab
    2007-09-12 14:01 33,792 --a--c--- C:\WINDOWS\system32\dllcache\custsat.dll
    2007-09-12 12:00 <DIR> d-------- C:\DOCUME~1\ALLUSE~1\APPLIC~1\Spybot - Search & Destroy
    2007-09-08 12:28 <DIR> d-------- C:\VundoFix Backups
    2007-09-07 18:21 51,200 --a------ C:\WINDOWS\NirCmd.exe
    2007-09-07 00:49 <DIR> d-------- C:\WINDOWS\system32\drvr2
    2007-09-07 00:49 <DIR> d-------- C:\WINDOWS\system32\cfig322
    2007-09-07 00:49 <DIR> d-------- C:\WINDOWS\system32\capcam
    2007-09-03 22:28 73,728 --a------ C:\WINDOWS\system32\xpiztx.dll
    2007-08-27 10:56 <DIR> d-------- C:\Program Files\Winamp
    2007-08-27 10:56 <DIR> d-------- C:\Program Files\Monkey's Audio

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2007-09-25 23:20 --------- d-------- C:\Program Files\Juno
    2007-09-20 01:31 --------- d-------- C:\Program Files\FlashGet
    2007-09-14 16:51 --------- d-------- C:\Program Files\Trend Micro
    2007-09-11 00:04 --------- d-------- C:\Program Files\NJStar Chinese WP
    2004-09-03 20:31:25 56 --sh--r C:\WINDOWS\system32\18816A7B5E.sys
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .

    *Note* empty entries & legit default entries are not shown

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{4ACF4122-0815-45A5-A4BE-CEA0C6A3CAD9}]

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{549B5CA7-4A86-11D7-A4DF-000874180BB3}]

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{6EEEEB02-B021-4E5B-B000-5157458F3AE5}]

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{EFC0675C-8A58-485C-9946-67EE5AA7CC7C}]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "VAIO Recovery"="C:\WINDOWS\Sonysys\VAIO Recovery\PartSeal.exe" [2003-04-19 22:08]
    "Mouse Suite 98 Daemon"="ICO.EXE" []
    "HKSERV.EXE"="C:\Program Files\Sony\HotKey Utility\HKserv.exe" [2003-04-01 10:00]
    "ATIPTA"="C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2003-04-28 21:00]
    "ATIModeChange"="Ati2mdxx.exe" [2002-08-28 17:17 C:\WINDOWS\system32\Ati2mdxx.exe]
    "Apoint"="C:\Program Files\Apoint\Apoint.exe" [2003-06-13 15:52]
    "pccguide.exe"="C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe" [2005-11-25 21:51]
    "ezShieldProtector for Px"="C:\WINDOWS\system32\ezSP_Px.exe" [2002-08-20 10:29]
    "QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2006-02-08 03:25]
    "WD Button Manager"="WDBtnMgr.exe" [2007-02-27 00:40 C:\WINDOWS\system32\WDBtnMgr.exe]
    "qadtntmz"="D;]XJOEPXT]tztufn43]Svoemm43/fyf!#D;]XJOEPXT]tztufn43]deoqsi/emm#-Tubsu" []
    "Windows Defender"="C:\Program Files\Windows Defender\MSASCui.exe" [2006-11-03 19:20]
    "EPSON Stylus CX3800 Series"="C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIACA.exe" [2005-02-07 12:00]
    "svhost"="C:\WINDOWS\svhost.exe" []
    "SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_02\bin\jusched.exe" [2007-07-12 04:00]

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "swg"="C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-06-15 23:20]
    "ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-04 00:56]
    "DAEMON Tools"="C:\Program Files\DAEMON Tools\daemon.exe" [2007-04-03 15:29]
    "SpybotSD TeaTimer"="C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe" [2007-08-31 16:46]

    [HKEY_USERS\.default\software\microsoft\windows\currentversion\run]
    "DWQueuedReporting"="C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t

    C:\DOCUME~1\ALLUSE~1\STARTM~1\Programs\Startup\
    D-Link AirPlus USB.lnk - C:\Program Files\AIRPLUS\D-Link AirPlus DWL-120+ Wireless USB Adapter\AIRPLUS.EXE [2003-10-17 10:52:25]
    Microsoft Office.lnk - C:\Program Files\Microsoft Office\Office10\OSA.EXE [2001-02-13 01:01:04]

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
    backup=C:\WINDOWS\pss\Adobe Reader Speed Launch.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Billminder.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Billminder.lnk
    backup=C:\WINDOWS\pss\Billminder.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^InterVideo WinCinema Manager.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\InterVideo WinCinema Manager.lnk
    backup=C:\WINDOWS\pss\InterVideo WinCinema Manager.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Monitor.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Monitor.lnk
    backup=C:\WINDOWS\pss\Monitor.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Quicken Scheduled Updates.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Quicken Scheduled Updates.lnk
    backup=C:\WINDOWS\pss\Quicken Scheduled Updates.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Quicken Startup.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Quicken Startup.lnk
    backup=C:\WINDOWS\pss\Quicken Startup.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^WD Backup Monitor.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\WD Backup Monitor.lnk
    backup=C:\WINDOWS\pss\WD Backup Monitor.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\CARPService]
    carpserv.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DataLayer]
    C:\PROGRA~1\COMMON~1\PCSuite\DATALA~1\DATALA~1.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ezShieldProtector for Px]
    C:\WINDOWS\System32\ezSP_Px.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
    "C:\Program Files\iTunes\iTunesHelper.exe"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Microsoft Works Update Detection]
    C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroCheck]
    C:\WINDOWS\System32\\NeroCheck.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PCSuiteTrayApplication]
    C:\PROGRA~1\Nokia\NOKIAP~1\TRAYAP~1.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Picasa Media Detector]
    C:\Program Files\Picasa2\PicasaMediaDetector.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
    "C:\Program Files\QuickTime\qttask.exe" -atboottime

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Spyware Doctor]
    "C:\Program Files\Spyware Doctor\swdoctor.exe" /Q

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\swg]
    C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Yahoo! Pager]
    C:\Program Files\Yahoo!\Messenger\ypager.exe -quiet

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\YBrowser]
    C:\Program Files\Yahoo!\browser\ybrwicon.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ZTgServerSwitch]
    "c:\program files\support.com\client\bin\tgcmd.exe" /server

    R2 m9mw0;m9mw0;\??\C:\WINDOWS\system32\drivers\m9mw0.sys
    R2 StreamDispatcher;StreamDispatcher;C:\WINDOWS\system32\DRIVERS\strmdisp.sys
    R3 SONYWBMS;Sony Memory Stick controller(WB);C:\WINDOWS\system32\DRIVERS\SonyWBMS.SYS
    R3 TIACXUSB;D-Link AirPlus DWL-120+ Wireless USB Adapter;C:\WINDOWS\system32\Drivers\tiacxusb.sys
    S0 pcibc;pcib;C:\WINDOWS\system32\DRIVERS\pcibc.sys
    S3 PIXMCV;JVC Communication PIX-MCV Driver;C:\WINDOWS\system32\Drivers\pixmcvc.sys
    S3 TIAcxubt;D-Link WLAN USB Boot Device;C:\WINDOWS\system32\Drivers\tiacxubt.sys
    S3 USBVSP;USBVSP;C:\WINDOWS\system32\drivers\Usbvsp.sys

    .
    Contents of the 'Scheduled Tasks' folder
    "2006-04-06 21:51:41 C:\WINDOWS\Tasks\Low Battery Alarm Program.job"
    "2007-09-26 20:13:48 C:\WINDOWS\Tasks\MP Scheduled Scan.job"
    - C:\Program Files\Windows Defender\MpCmdRun.exe
    "2007-09-26 08:18:45 C:\WINDOWS\Tasks\Symantec NetDetect.job"
    .
    **************************************************************************

    catchme 0.3.1061 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2007-09-26 13:13:31
    Windows 5.1.2600 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    Completion time: 2007-09-26 13:18:16 - machine was rebooted
    C:\ComboFix-quarantined-files.txt ... 2007-09-26 13:18
    C:\ComboFix2.txt ... 2007-09-08 13:19
    C:\ComboFix3.txt ... 2007-09-07 19:31
    .
    --- E O F ---

  8. #8
    Junior Member
    Join Date
    Sep 2007
    Posts
    18

    Default

    And here is the HJT log

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 1:28:20 PM, on 9/26/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16512)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\System32\Ati2evxx.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    C:\WINDOWS\System32\svchost.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Sony\HotKey Utility\HKserv.exe
    C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    C:\Program Files\Apoint\Apoint.exe
    C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe
    C:\WINDOWS\system32\ezSP_Px.exe
    C:\Program Files\Sony\HotKey Utility\HKWnd.exe
    C:\WINDOWS\system32\WDBtnMgr.exe
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIACA.EXE
    C:\Program Files\Apoint\Apvfb.exe
    C:\Program Files\Apoint\Apntex.exe
    C:\Program Files\Java\jre1.6.0_02\bin\jusched.exe
    C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\DAEMON Tools\daemon.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\AIRPLUS\D-Link AirPlus DWL-120+ Wireless USB Adapter\AIRPLUS.EXE
    C:\Program Files\Trend Micro\HijackThis\whatever.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/cust...search/ie.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://yahoo.sbc.com/dsl
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.sonypictures.com/digent/games/angels/vaio/
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1;
    N3 - Netscape 7: user_pref("browser.search.defaultengine", "engine://C%3A%5CProgram%20Files%5CNetscape%5CNetscape%5Csearchplugins%5CSBWeb_01.src"); (C:\Documents and Settings\MASON KAIBIN YU\Application Data\Mozilla\Profiles\default\ymx6rcjc.slt\prefs.js)
    O2 - BHO: Yahoo! Companion BHO - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\ycomp5_3_12_0.dll
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: ATLAS Translation Bar - {3C6301ED-0F78-4AF2-8150-D9C052361A8E} - C:\Program Files\ATLAS V11\ATLIECP.DLL
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: (no name) - {549B5CA7-4A86-11D7-A4DF-000874180BB3} - (no file)
    O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~1\tools\iesdsg.dll (file missing)
    O2 - BHO: (no name) - {6EEEEB02-B021-4E5B-B000-5157458F3AE5} - (no file)
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_02\bin\ssv.dll
    O2 - BHO: IeCatch2 Class - {A5366673-E8CA-11D3-9CD9-0090271D075B} - C:\PROGRA~1\FlashGet\jccatch.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
    O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.0.301.7164\swg.dll
    O2 - BHO: (no name) - {EFC0675C-8A58-485C-9946-67EE5AA7CC7C} - (no file)
    O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
    O3 - Toolbar: ZeroBar - {F5735C15-1FB2-41FE-BA12-242757E69DDE} - C:\Program Files\NetZero\toolbar.dll
    O3 - Toolbar: ZeroBar - {F0F8ECBE-D460-4B34-B007-56A92E8F84A7} - C:\Program Files\NetZero\Toolbar.dll
    O3 - Toolbar: &Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\ycomp5_3_12_0.dll
    O3 - Toolbar: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\fgiebar.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
    O3 - Toolbar: ATLAS Translation Bar - {3C6301ED-0F78-4AF2-8150-D9C052361A8E} - C:\Program Files\ATLAS V11\ATLIECP.DLL
    O4 - HKLM\..\Run: [VAIO Recovery] C:\WINDOWS\Sonysys\VAIO Recovery\PartSeal.exe
    O4 - HKLM\..\Run: [Mouse Suite 98 Daemon] ICO.EXE
    O4 - HKLM\..\Run: [HKSERV.EXE] C:\Program Files\Sony\HotKey Utility\HKserv.exe
    O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe
    O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe
    O4 - HKLM\..\Run: [pccguide.exe] "C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe"
    O4 - HKLM\..\Run: [ezShieldProtector for Px] C:\WINDOWS\system32\ezSP_Px.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [WD Button Manager] WDBtnMgr.exe
    O4 - HKLM\..\Run: [qadtntmz] D;]XJOEPXT]tztufn43]Svoemm43/fyf!#D;]XJOEPXT]tztufn43]deoqsi/emm#-Tubsu
    O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
    O4 - HKLM\..\Run: [EPSON Stylus CX3800 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIACA.EXE /P26 "EPSON Stylus CX3800 Series" /O6 "USB001" /M "Stylus CX3800"
    O4 - HKLM\..\Run: [svhost] "C:\WINDOWS\svhost.exe"
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_02\bin\jusched.exe"
    O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [DAEMON Tools] "C:\Program Files\DAEMON Tools\daemon.exe" -lang 1033
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKUS\S-1-5-18\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'Default user')
    O4 - Startup: Epson all-in-one Registration.lnk = F:\Titles\Ereg\EPSONREG.EXE
    O4 - Global Startup: D-Link AirPlus USB.lnk = ?
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: Download All by FlashGet - C:\Program Files\FlashGet\jc_all.htm
    O8 - Extra context menu item: Download using FlashGet - C:\Program Files\FlashGet\jc_link.htm
    O8 - Extra context menu item: Translate by ATLAS - C:\Program Files\ATLAS V11\Atlscript.html
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_02\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_02\bin\ssv.dll
    O9 - Extra button: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
    O9 - Extra 'Tools' menuitem: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
    O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
    O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
    O9 - Extra button: ATLAS Translation - {B7707A72-4355-11D4-82BD-00000EBBEF8D} - C:\Program Files\ATLAS V11\Atlscript.html
    O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe
    O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O14 - IERESET.INF: START_PAGE_URL=http://www.sony.com/vaiopeople
    O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english...an_unicode.cab
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - https://fpdownload.macromedia.com/pu...sh/swflash.cab
    O16 - DPF: {FFFFFFFF-CACE-BABE-BABE-00AA0055595A} - http://www.trueswitch.com/sbc/TrueInstallSBC.exe
    O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Trend Micro Central Control Component (PcCtlCom) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\PROGRA~1\COMMON~1\SONYSH~1\AVLib\Sptisrv.exe
    O23 - Service: Trend Micro Real-time Service (Tmntsrv) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe
    O23 - Service: VAIO Media Music Server (VAIOMediaPlatform-MusicServer-AppServer) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Music\SSSvr.exe
    O23 - Service: VAIO Media Music Server (HTTP) (VAIOMediaPlatform-MusicServer-HTTP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe
    O23 - Service: VAIO Media Music Server (UPnP) (VAIOMediaPlatform-MusicServer-UPnP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\UPnPFramework.exe
    O23 - Service: VAIO Media Photo Server (VAIOMediaPlatform-PhotoServer-AppServer) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Photo\appsrv\PhotoAppSrv.exe
    O23 - Service: VAIO Media Photo Server (HTTP) (VAIOMediaPlatform-PhotoServer-HTTP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe
    O23 - Service: VAIO Media Photo Server (UPnP) (VAIOMediaPlatform-PhotoServer-UPnP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\UPnPFramework.exe
    O23 - Service: VAIO Media Video Server (VAIOMediaPlatform-VideoServer-AppServer) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Video\GPVSvr.exe
    O23 - Service: VAIO Media Video Server (HTTP) (VAIOMediaPlatform-VideoServer-HTTP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe
    O23 - Service: VAIO Media Video Server (UPnP) (VAIOMediaPlatform-VideoServer-UPnP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\UPnPFramework.exe
    O23 - Service: YPCService - Yahoo! Inc. - C:\WINDOWS\system32\YPCSER~1.EXE

    --
    End of file - 12429 bytes

  9. #9
    Security Expert: Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,288

    Default

    Hi


    Disable Spybot's TeaTimer temporarily
    • Run Spybot-S&D in Advanced Mode
    • If it is not already set to do this, go to the Mode menu
      select
      Advanced Mode
    • On the left hand side, click on Tools
    • Then click on the Resident icon in the list
    • Uncheck
      Resident TeaTimer
      and OK any prompts.
    • Restart your computer



    Please download AVG Anti-Spyware to your Desktop or to your usual Download Folder.
    http://www.ewido.net/en/download/
    • Install AVG Anti-Spyware by double clicking the installer.
    • Follow the prompts. Make sure that Launch AVG Anti-Spyware is checked.
    • On the main screen under Your Computer's security.
      • Click on Change state next to Resident shield. It should now change to inactive.
      • Click on Change state next to Automatic updates. It should now change to inactive.
      • Next to Last Update, click on Update now. (You will need an active internet connection to perform this)
      • Wait until you see the Update succesfull message.
    • Right-click the AVG Anti-Spyware Tray Icon and uncheck Start with Windows.
    • Right-click the AVG Anti-Spyware Tray Icon and select Exit. Confirm by clicking Yes.
    If you are having problems with the updater, you can use this link to manually update ewido.
    AVG Anti-Spyware manual updates.
    Download the Full database to your Desktop or to your usual Download Folder and install it by double clicking the file. Make sure that AVG Anti-Spyware is closed before installing the update. Don't run AVG yet. Will do it a bit later.


    Download ATF (Atribune Temp File) Cleaner© by Atribune to your desktop. Don't run ATF yet. Will do it a bit later.



    Open notepad and copy/paste the text in the quotebox below into it:

    Code:
    File::
    C:\WINDOWS\system32\pftrsmvt.dll
    C:\WINDOWS\system32\niswlsgn.dll
    C:\WINDOWS\system32\bitvcjln.dll
    C:\WINDOWS\system32\xpiztx.dll
    C:\WINDOWS\svhost.exe
    C:\WINDOWS\system32\drivers\m9mw0.sys
    
    Folder::
    C:\VundoFix Backups
    C:\WINDOWS\system32\drvr2
    C:\WINDOWS\system32\cfig322
    C:\WINDOWS\system32\capcam
    
    Registry::
    [-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{4ACF4122-0815-45A5-A4BE-CEA0C6A3CAD9}]
    
    [-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{549B5CA7-4A86-11D7-A4DF-000874180BB3}]
    
    [-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{6EEEEB02-B021-4E5B-B000-5157458F3AE5}]
    
    [-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{EFC0675C-8A58-485C-9946-67EE5AA7CC7C}]
    
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "qadtntmz"=-
    "svhost"=-
    
    Driver::
    m9mw0

    Save this as
    CFScript




    Refering to the picture above, drag CFScript into ComboFix.exe
    Then post the resultant log.



    Running temp cleaner & AVG Anti-Spyware
    ---------------------------------------



    Double-click ATF Cleaner.exe to open it

    Under Main choose:
    Windows Temp
    Current User Temp
    All Users Temp
    Cookies
    Temporary Internet Files
    Prefetch
    Java Cache

    *The other boxes are optional*
    Then click the Empty Selected button.

    If you use Firefox:
    Click Firefox at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

    If you use Opera:
    Click Opera at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

    Click Exit on the Main menu to close the program.



    Close ALL open Windows / Programs / Folders. Please start AVG Anti-Spyware and run a full scan.
    • Click on Scanner on the toolbar.
    • Click on the Settings tab.
      • Under How to act?
        • Click on Recommended Action and choose Quarantine from the popup menu.
      • Under How to scan?
        • All checkboxes should be ticked.
      • Under Possibly unwanted software:
        • All checkboxes should be ticked.
      • Under Reports:
        • Don't select Automatically generate report after every scan and uncheck Only if threats were found.
      • Under What to scan?
        • Select Scan every file.
    • Click on the Scan tab.
    • Click on Complete System Scan to start the scan process.
    • Let the program scan the machine.
    • When the scan has finished, follow the instructions below.
      IMPORTANT : Don't click on the
      Save Scan Report
      button before you did hit the
      Apply all Actions
      button.

      • Make sure that Set all elements to: shows Quarantine (1), if not click on the link and choose Quarantine from the popup menu. (2)
      • At the bottom of the window click on the Apply all Actions button. (3)
    • When done, click the Save Scan Report button. (4)
      • Click the Save Report as button.
      • Save the report to your Desktop.
    • Right-click the AVG Anti-Spyware Tray Icon and select Exit. Confirm by clicking Yes.



    Post
    -AVG Anti-Spyware log
    -a fresh HJT log.
    Microsoft Windows Insider MVP 2016-2020
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

  10. #10
    Junior Member
    Join Date
    Sep 2007
    Posts
    18

    Default hello again, here is the new combofix log

    ComboFix 07-09-21.2 - "Mason KaiBin Yu" 2007-09-26 22:44:49.4 - NTFSx86
    Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.172 [GMT -7:00]
    * Created a new restore point

    FILE::
    C:\WINDOWS\system32\pftrsmvt.dll
    C:\WINDOWS\system32\niswlsgn.dll
    C:\WINDOWS\system32\bitvcjln.dll
    C:\WINDOWS\system32\xpiztx.dll
    C:\WINDOWS\svhost.exe
    C:\WINDOWS\system32\drivers\m9mw0.sys
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\VundoFix Backups
    C:\VundoFix Backups\addmorefiles.txt
    C:\VundoFix Backups\opnnlkj.dll.bad
    C:\VundoFix Backups\rqronki.dll.bad
    C:\WINDOWS\system32\bitvcjln.dll
    C:\WINDOWS\system32\capcam
    C:\WINDOWS\system32\capcam\nab22011.exe
    C:\WINDOWS\system32\cfig322
    C:\WINDOWS\system32\cfig322\icm33o.exe
    C:\WINDOWS\system32\drivers\m9mw0.sys
    C:\WINDOWS\system32\drvr2
    C:\WINDOWS\system32\drvr2\bbc002nws.exe
    C:\WINDOWS\system32\niswlsgn.dll
    C:\WINDOWS\system32\pftrsmvt.dll
    C:\WINDOWS\system32\xpiztx.dll

    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))


    -------\LEGACY_M9MW0
    -------\m9mw0


    ((((((((((((((((((((((((( Files Created from 2007-08-27 to 2007-09-27 )))))))))))))))))))))))))))))))
    .

    2007-09-26 22:36 10,872 --a------ C:\WINDOWS\system32\drivers\AvgAsCln.sys
    2007-09-13 00:53 <DIR> d-------- C:\WINDOWS\system32\Kaspersky Lab
    2007-09-13 00:53 <DIR> d-------- C:\DOCUME~1\ALLUSE~1\APPLIC~1\Kaspersky Lab
    2007-09-12 14:01 33,792 --a--c--- C:\WINDOWS\system32\dllcache\custsat.dll
    2007-09-12 12:00 <DIR> d-------- C:\DOCUME~1\ALLUSE~1\APPLIC~1\Spybot - Search & Destroy
    2007-09-07 18:21 51,200 --a------ C:\WINDOWS\NirCmd.exe
    2007-08-27 10:56 <DIR> d-------- C:\Program Files\Winamp
    2007-08-27 10:56 <DIR> d-------- C:\Program Files\Monkey's Audio

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2007-09-25 23:20 --------- d-------- C:\Program Files\Juno
    2007-09-20 01:31 --------- d-------- C:\Program Files\FlashGet
    2007-09-14 16:51 --------- d-------- C:\Program Files\Trend Micro
    2007-09-11 00:04 --------- d-------- C:\Program Files\NJStar Chinese WP
    2004-09-03 20:31:25 56 --sh--r C:\WINDOWS\system32\18816A7B5E.sys
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .

    *Note* empty entries & legit default entries are not shown

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "VAIO Recovery"="C:\WINDOWS\Sonysys\VAIO Recovery\PartSeal.exe" [2003-04-19 22:08]
    "Mouse Suite 98 Daemon"="ICO.EXE" []
    "HKSERV.EXE"="C:\Program Files\Sony\HotKey Utility\HKserv.exe" [2003-04-01 10:00]
    "ATIPTA"="C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2003-04-28 21:00]
    "ATIModeChange"="Ati2mdxx.exe" [2002-08-28 17:17 C:\WINDOWS\system32\Ati2mdxx.exe]
    "Apoint"="C:\Program Files\Apoint\Apoint.exe" [2003-06-13 15:52]
    "pccguide.exe"="C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe" [2005-11-25 21:51]
    "ezShieldProtector for Px"="C:\WINDOWS\system32\ezSP_Px.exe" [2002-08-20 10:29]
    "QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2006-02-08 03:25]
    "WD Button Manager"="WDBtnMgr.exe" [2007-02-27 00:40 C:\WINDOWS\system32\WDBtnMgr.exe]
    "Windows Defender"="C:\Program Files\Windows Defender\MSASCui.exe" [2006-11-03 19:20]
    "EPSON Stylus CX3800 Series"="C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIACA.exe" [2005-02-07 12:00]
    "SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_02\bin\jusched.exe" [2007-07-12 04:00]

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "swg"="C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-06-15 23:20]
    "ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-04 00:56]
    "DAEMON Tools"="C:\Program Files\DAEMON Tools\daemon.exe" [2007-04-03 15:29]

    [HKEY_USERS\.default\software\microsoft\windows\currentversion\run]
    "DWQueuedReporting"="C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t

    C:\DOCUME~1\ALLUSE~1\STARTM~1\Programs\Startup\
    D-Link AirPlus USB.lnk - C:\Program Files\AIRPLUS\D-Link AirPlus DWL-120+ Wireless USB Adapter\AIRPLUS.EXE [2003-10-17 10:52:25]
    Microsoft Office.lnk - C:\Program Files\Microsoft Office\Office10\OSA.EXE [2001-02-13 01:01:04]

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
    backup=C:\WINDOWS\pss\Adobe Reader Speed Launch.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Billminder.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Billminder.lnk
    backup=C:\WINDOWS\pss\Billminder.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^InterVideo WinCinema Manager.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\InterVideo WinCinema Manager.lnk
    backup=C:\WINDOWS\pss\InterVideo WinCinema Manager.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Monitor.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Monitor.lnk
    backup=C:\WINDOWS\pss\Monitor.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Quicken Scheduled Updates.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Quicken Scheduled Updates.lnk
    backup=C:\WINDOWS\pss\Quicken Scheduled Updates.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Quicken Startup.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Quicken Startup.lnk
    backup=C:\WINDOWS\pss\Quicken Startup.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^WD Backup Monitor.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\WD Backup Monitor.lnk
    backup=C:\WINDOWS\pss\WD Backup Monitor.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\CARPService]
    carpserv.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DataLayer]
    C:\PROGRA~1\COMMON~1\PCSuite\DATALA~1\DATALA~1.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ezShieldProtector for Px]
    C:\WINDOWS\System32\ezSP_Px.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
    "C:\Program Files\iTunes\iTunesHelper.exe"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Microsoft Works Update Detection]
    C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroCheck]
    C:\WINDOWS\System32\\NeroCheck.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PCSuiteTrayApplication]
    C:\PROGRA~1\Nokia\NOKIAP~1\TRAYAP~1.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Picasa Media Detector]
    C:\Program Files\Picasa2\PicasaMediaDetector.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
    "C:\Program Files\QuickTime\qttask.exe" -atboottime

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Spyware Doctor]
    "C:\Program Files\Spyware Doctor\swdoctor.exe" /Q

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\swg]
    C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Yahoo! Pager]
    C:\Program Files\Yahoo!\Messenger\ypager.exe -quiet

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\YBrowser]
    C:\Program Files\Yahoo!\browser\ybrwicon.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ZTgServerSwitch]
    "c:\program files\support.com\client\bin\tgcmd.exe" /server

    R2 StreamDispatcher;StreamDispatcher;C:\WINDOWS\system32\DRIVERS\strmdisp.sys
    R3 SONYWBMS;Sony Memory Stick controller(WB);C:\WINDOWS\system32\DRIVERS\SonyWBMS.SYS
    R3 TIACXUSB;D-Link AirPlus DWL-120+ Wireless USB Adapter;C:\WINDOWS\system32\Drivers\tiacxusb.sys
    S0 pcibc;pcib;C:\WINDOWS\system32\DRIVERS\pcibc.sys
    S3 PIXMCV;JVC Communication PIX-MCV Driver;C:\WINDOWS\system32\Drivers\pixmcvc.sys
    S3 TIAcxubt;D-Link WLAN USB Boot Device;C:\WINDOWS\system32\Drivers\tiacxubt.sys
    S3 USBVSP;USBVSP;C:\WINDOWS\system32\drivers\Usbvsp.sys

    *Newly Created Service* - AVGASCLN
    .
    Contents of the 'Scheduled Tasks' folder
    "2006-04-06 21:51:41 C:\WINDOWS\Tasks\Low Battery Alarm Program.job"
    "2007-09-27 05:54:23 C:\WINDOWS\Tasks\MP Scheduled Scan.job"
    - C:\Program Files\Windows Defender\MpCmdRun.exe
    "2007-09-26 20:18:23 C:\WINDOWS\Tasks\Symantec NetDetect.job"
    .
    **************************************************************************

    catchme 0.3.1061 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2007-09-26 22:52:44
    Windows 5.1.2600 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    Completion time: 2007-09-26 22:57:14 - machine was rebooted
    C:\ComboFix-quarantined-files.txt ... 2007-09-26 22:56
    C:\ComboFix2.txt ... 2007-09-26 13:18
    C:\ComboFix3.txt ... 2007-09-08 13:19
    .
    --- E O F ---

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •