Results 1 to 10 of 10

Thread: Virtumonde

  1. #1
    Junior Member
    Join Date
    Aug 2008
    Posts
    6

    Unhappy Virtumonde

    helping a helpless lady out, neither SpyBot nor ZoneAlarm are able to undo this one, and HJT crashed when ran. log that it left:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 8:57:30 PM, on 8/15/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16640)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
    C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
    C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Program Files\RitzPix E-Z Print & Share\OurPictures.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\Program Files\Nikon\NkView5\NkvMon.exe
    C:\Documents and Settings\alena\Desktop\HiJackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/...ch/search.html
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/.../www.yahoo.com
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/.../www.yahoo.com
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/...ch/search.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/.../www.yahoo.com
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/.../www.yahoo.com
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
    O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
    O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [YSearchProtection] "C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe"
    O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
    O4 - HKLM\..\Run: [Antivirus] C:\Program Files\VAV\vav.exe
    O4 - HKLM\..\Run: [68d313c8] rundll32.exe "C:\WINDOWS\system32\fekumsum.dll",b
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [updateMgr] C:\Program Files\Adobe\Acrobat 7.0\Reader\AdobeUpdateManager.exe AcRdB7_0_5 -reboot 1
    O4 - HKCU\..\Run: [OurPictures] "C:\Program Files\RitzPix E-Z Print & Share\OurPictures.exe" /AutoStart
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [YSearchProtection] C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
    O4 - HKCU\..\Run: [A00FDA5131.exe] C:\DOCUME~1\alena\LOCALS~1\Temp\_A00FDA5131.exe
    O4 - HKCU\..\Run: [A00F4D9DE6.exe] C:\DOCUME~1\alena\LOCALS~1\Temp\_A00F4D9DE6.exe
    O4 - HKCU\..\Run: [Antivirus] C:\Program Files\VAV\vav.exe
    O4 - HKCU\..\Run: [TheSpyBot] C:\Program Files\TheSpyBot\TheSpyBot.exe
    O4 - Global Startup: NkvMon.exe.lnk = C:\Program Files\Nikon\NkView5\NkvMon.exe
    O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
    O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycmap.htm
    O8 - Extra context menu item: Yahoo! &SMS - file:///C:\Program Files\Yahoo!\Common/ycsms.htm
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O14 - IERESET.INF: START_PAGE_URL=http://www.averatec.com
    O16 - DPF: {1DB93715-3B60-43EE-93E6-279BB3E1DF76} (OCXDownloadChecker Control) - https://www.childrenview.net/rooms/b...ecker_6110.cab
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.co...?1096490317211
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/micr...?1218404704522
    O16 - DPF: {DA8484DE-52DB-4860-A986-61A8682E298A} (LiveX_v7.0.2.0) - https://www.childrenview.net/rooms/b...ecker_6110.cab
    O16 - DPF: {FE0BD779-44EE-4A4B-AA2E-743C63F2E5E6} (IWinAmpActiveX Class) - http://pdl.stream.aol.com/downloads/...ampx_en_dl.cab

    --
    End of file - 6294 bytes

  2. #2
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    Welcome to Safer Networking, I wish to be sure you have viewed and understand this information.
    "BEFORE you POST" (READ this Procedure before Requesting Assistance)
    http://forums.spybot.info/showthread.php?t=288
    All advice given is taken at your own risk.
    Please make sure you have read this information so we are on the same page.

    You have a load of junk there, Vundo, a couple of rouge programs, including a rouge impersonator of Spybot S&D:
    C:\Program Files\TheSpyBot\TheSpyBot.exe <<< false

    I believe you cut off the HJT log, almost always more to it than that. Please make sure your use this method:
    Notepad > Edit > Select All > copy/paste the highlited information.


    1) Appears you missed the directions, HJT is located unsafely, follow my instructions to fix that.

    A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine by running ComboFix on your own. This tool is not a toy and not for everyday use.

    2) Remove any old copies of combofix before you proceed.

    Thanks to sUBs and anyone else who helped with this fix.

    It is important that it is saved directly to your Desktop.

    Download ComboFix from Here to your Desktop
    • Double click combofix.exe and follow the prompts.
    • When finished, it shall produce a log for you. Post that log and a HiJackthis log in your next reply

    Note: Do not mouseclick combofix's window while its running. That may cause it to stall

    Post the combofix log and a new HJT log. <<< follow the instructions in #3 to locate HJT safely.

    Tutorial
    http://www.bleepingcomputer.com/comb...o-use-combofix

    3) Download Trend Micro Hijack This™ to your Desktop
    http://download.bleepingcomputer.com...HJTInstall.exe
    Doubleclick the HJTInstall.exe to start it.
    By default it will install HijackThis in the Program Files\Trendmicro folder and create a desktop shortcut.
    HijackThis will open after install. Press the Scan button below.
    This will start the scan and open a log.
    Copy and paste the contents of the log in your next reply.

    Thanks
    MS-MVP Consumer Security 2007-08-09
    Proud Member ASAP
    UNITE Member 2006

  3. #3
    Junior Member
    Join Date
    Aug 2008
    Posts
    6

    Default combofix / HJT logs

    it found a ton of stuff...


    ComboFix 08-08-15.04 - alena 2008-08-16 20:39:14.1 - NTFSx86
    Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.167 [GMT -4:00]
    Running from: C:\Documents and Settings\alena\Desktop\ComboFix.exe
    * Created a new restore point

    WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\Documents and Settings\alena\Application Data\macromedia\Flash Player\#SharedObjects\3V8CUTNU\interclick.com
    C:\Documents and Settings\alena\Application Data\macromedia\Flash Player\#SharedObjects\3V8CUTNU\interclick.com\ud.sol
    C:\Documents and Settings\alena\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com
    C:\Documents and Settings\alena\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com\settings.sol
    C:\Documents and Settings\alena\Cookies\alena@ads.revsci[1].txt
    C:\Documents and Settings\alena\Cookies\alena@advertising[1].txt
    C:\Documents and Settings\alena\Cookies\alena@advertising[3].txt
    C:\Documents and Settings\alena\Cookies\alena@americanexpress[1].txt
    C:\Documents and Settings\alena\Cookies\alena@cs.sexcounter[2].txt
    C:\Documents and Settings\alena\Cookies\alena@cts.metricsdirect[1].txt
    C:\Documents and Settings\alena\Cookies\alena@ebay[1].txt
    C:\Documents and Settings\alena\Cookies\alena@gms1[1].txt
    C:\Documents and Settings\alena\Cookies\alena@hits.gureport.co[2].txt
    C:\Documents and Settings\alena\Cookies\alena@insightexpressai[1].txt
    C:\Documents and Settings\alena\Cookies\alena@live[2].txt
    C:\Documents and Settings\alena\Cookies\alena@main.ebayrtm[2].txt
    C:\Documents and Settings\alena\Cookies\alena@mapquest[1].txt
    C:\Documents and Settings\alena\Cookies\alena@metrics.adobe[2].txt
    C:\Documents and Settings\alena\Cookies\alena@msn[1].txt
    C:\Documents and Settings\alena\Cookies\alena@msn[2].txt
    C:\Documents and Settings\alena\Cookies\alena@msn[4].txt
    C:\Documents and Settings\alena\Cookies\alena@paidmarketingpanel.aavalue[2].txt
    C:\Documents and Settings\alena\Cookies\alena@prizeamerica.aavalue[2].txt
    C:\Documents and Settings\alena\Cookies\alena@realpatrol[1].txt
    C:\Documents and Settings\alena\Cookies\alena@revsci[2].txt
    C:\Documents and Settings\alena\Cookies\alena@secure1.m57media[1].txt
    C:\Documents and Settings\alena\Cookies\alena@sidestep[2].txt
    C:\Documents and Settings\alena\Cookies\alena@sourceforge[2].txt
    C:\Documents and Settings\alena\Cookies\alena@w.freegiftworld[1].txt
    C:\Documents and Settings\alena\Cookies\alena@www.match[2].txt
    C:\Documents and Settings\alena\Cookies\alena@www.nclottery[2].txt
    C:\Documents and Settings\alena\Cookies\alena@www.seattlerealestate[1].txt
    C:\Documents and Settings\alena\Cookies\alena@yahoo[2].txt
    C:\Documents and Settings\alena\Cookies\alena@zone.msn[1].txt
    C:\Documents and Settings\alena\Desktop\Security Updates.URL
    C:\Redemption.ECF
    C:\WINDOWS\cookies.ini
    C:\WINDOWS\system32\aipdufcd.dll
    C:\WINDOWS\system32\aqxhwxfr.ini
    C:\WINDOWS\system32\atgaqijx.dll
    C:\WINDOWS\system32\cdhkqwlq.ini
    C:\WINDOWS\system32\cdnrdgba.ini
    C:\WINDOWS\system32\cepiiwqb.dll
    C:\WINDOWS\system32\cfbvdnnd.dll
    C:\WINDOWS\system32\cfiqhj.dll
    C:\WINDOWS\system32\dkfivfxq.ini
    C:\WINDOWS\system32\eegiysyl.ini
    C:\WINDOWS\system32\eucrto.dll
    C:\WINDOWS\system32\evmxlbea.dll
    C:\WINDOWS\system32\fulzdv.dll
    C:\WINDOWS\system32\fusqxdvl.dll
    C:\WINDOWS\system32\fyfnsdno.dll
    C:\WINDOWS\system32\gompeskj.ini
    C:\WINDOWS\system32\gupwob.dll
    C:\WINDOWS\system32\gvgrgxju.ini
    C:\WINDOWS\system32\gwprha.dll
    C:\WINDOWS\system32\gxmuer.dll
    C:\WINDOWS\system32\htatcamk.ini
    C:\WINDOWS\system32\iagnxwqt.dll
    C:\WINDOWS\system32\iajmnz.dll
    C:\WINDOWS\system32\ihptbtvq.dll
    C:\WINDOWS\system32\iklfxhvf.ini
    C:\WINDOWS\system32\jivmissv.ini
    C:\WINDOWS\system32\jksepmog.dll
    C:\WINDOWS\system32\jmammglq.ini
    C:\WINDOWS\system32\jnpfjmjg.ini
    C:\WINDOWS\system32\jopogkwp.ini
    C:\WINDOWS\system32\jsrnwvbs.ini
    C:\WINDOWS\system32\kceswt.dll
    C:\WINDOWS\system32\kjaewago.ini
    C:\WINDOWS\system32\kjntxjrg.ini
    C:\WINDOWS\system32\kxossc.dll
    C:\WINDOWS\system32\kymfklhi.dll
    C:\WINDOWS\system32\lcgbaksp.ini
    C:\WINDOWS\system32\lcgljkin.dll
    C:\WINDOWS\system32\limmkeuq.ini
    C:\WINDOWS\system32\liyalw.dll
    C:\WINDOWS\system32\lmrwlfmt.dll
    C:\WINDOWS\system32\lRqqAJlm.ini
    C:\WINDOWS\system32\lRqqAJlm.ini2
    C:\WINDOWS\system32\mcrh.tmp
    C:\WINDOWS\system32\mdgvsavp.ini
    C:\WINDOWS\system32\mlJAqqRl.dll
    C:\WINDOWS\system32\musmukef.ini
    C:\WINDOWS\system32\nbqdmknf.dll
    C:\WINDOWS\system32\ncnkaysy.dll
    C:\WINDOWS\system32\nvdoptjs.ini
    C:\WINDOWS\system32\nwibuevw.dll
    C:\WINDOWS\system32\nwkewgir.dll
    C:\WINDOWS\system32\odbgrdfm.dll
    C:\WINDOWS\system32\okwpvlxq.exe
    C:\WINDOWS\system32\olnummci.ini
    C:\WINDOWS\system32\pfpyhpys.dll
    C:\WINDOWS\system32\pkrrpaiy.dll
    C:\WINDOWS\system32\plnrktho.ini
    C:\WINDOWS\system32\qlwqkhdc.dll
    C:\WINDOWS\system32\qrdcstul.ini
    C:\WINDOWS\system32\qzitbk.dll
    C:\WINDOWS\system32\rmytrtir.ini
    C:\WINDOWS\system32\rsmrljhv.dll
    C:\WINDOWS\system32\rsvmcabc.ini
    C:\WINDOWS\system32\sbbizb.dll
    C:\WINDOWS\system32\srvmgjxx.dll
    C:\WINDOWS\system32\sxixwbpp.ini
    C:\WINDOWS\system32\tfkpmz.dll
    C:\WINDOWS\system32\tjvvamet.ini
    C:\WINDOWS\system32\tojkmtdq.ini
    C:\WINDOWS\system32\tpchdsxu.dll
    C:\WINDOWS\system32\tvsjhbaa.dll
    C:\WINDOWS\system32\ugenujre.ini
    C:\WINDOWS\system32\ugtcep.dll
    C:\WINDOWS\system32\ujeppsyi.dll
    C:\WINDOWS\system32\uvwrkdmv.ini
    C:\WINDOWS\system32\uxxrvygd.ini
    C:\WINDOWS\system32\vav.cpl
    C:\WINDOWS\system32\vftvnsbm.dll
    C:\WINDOWS\system32\vheqyz.dll
    C:\WINDOWS\system32\vhjlrmsr.ini
    C:\WINDOWS\system32\vhwxvf.dll
    C:\WINDOWS\system32\vrxqbwfl.dll
    C:\WINDOWS\system32\vtgwid.dll
    C:\WINDOWS\system32\weadxdmx.ini
    C:\WINDOWS\system32\wkgrytga.dll
    C:\WINDOWS\system32\wqjjcr.dll
    C:\WINDOWS\system32\wqwympdv.ini
    C:\WINDOWS\system32\wveubiwn.ini
    C:\WINDOWS\system32\xcjmcxft.dll
    C:\WINDOWS\system32\xcjrcfkf.ini
    C:\WINDOWS\system32\xdphjuij.ini
    C:\WINDOWS\system32\xexcjome.ini
    C:\WINDOWS\system32\xxyabxYr.dll
    C:\WINDOWS\system32\xyhmve.dll
    C:\WINDOWS\system32\ycalml.dll
    C:\WINDOWS\system32\yiaprrkp.ini
    C:\WINDOWS\system32\ynkefekj.dll
    C:\WINDOWS\system32\yvigiykv.dll
    C:\WINDOWS\system32\zioctq.dll
    C:\xcrashdump.dat

    .
    ((((((((((((((((((((((((( Files Created from 2008-07-17 to 2008-08-17 )))))))))))))))))))))))))))))))
    .

    2008-08-16 17:30 . 2008-08-16 17:31 <DIR> d-------- C:\Program Files\Trend Micro
    2008-08-15 13:20 . 2008-08-15 13:20 552 --a------ C:\WINDOWS\system32\d3d8caps.dat
    2008-08-15 03:27 . 2008-08-15 20:05 1,148 --a------ C:\WINDOWS\wininit.ini
    2008-08-15 01:10 . 2008-08-15 01:11 <DIR> d-------- C:\Program Files\Spybot - Search & Destroy
    2008-08-15 01:10 . 2008-08-15 02:09 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
    2008-08-10 20:36 . 2008-08-15 16:33 <DIR> d-------- C:\Program Files\Windows Live Safety Center
    2008-08-10 17:47 . 2008-08-10 17:47 81,408 --a------ C:\WINDOWS\system32\fekumsum.dll.vzr
    2008-08-10 16:38 . 2008-08-10 16:38 8 --a------ C:\WINDOWS\system32\68d30146
    2008-08-10 13:13 . 2008-08-15 18:14 0 --a------ C:\rollback.ini
    2008-08-10 12:31 . 2008-08-10 13:07 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\MailFrontier
    2008-08-10 12:30 . 2004-04-27 04:40 11,264 --a------ C:\WINDOWS\system32\SpOrder.dll
    2008-08-10 12:30 . 2008-08-15 18:55 4,212 --ah----- C:\WINDOWS\system32\zllictbl.dat
    2008-08-10 12:27 . 2008-08-15 20:53 <DIR> d-------- C:\WINDOWS\Internet Logs
    2008-08-10 11:53 . 2008-08-10 17:39 894 --ahs---- C:\WINDOWS\system32\hldoaspr.ini

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2008-08-11 00:15 --------- d-----w C:\Program Files\Common Files\Symantec Shared
    2008-08-10 16:59 --------- d-----w C:\Program Files\Norton AntiVirus
    2008-08-10 16:59 --------- d-----w C:\Documents and Settings\All Users\Application Data\Symantec
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "MSMSGS"="C:\Program Files\Messenger\msmsgs.exe" [2004-10-13 12:24 1694208]
    "OurPictures"="C:\Program Files\RitzPix E-Z Print & Share\OurPictures.exe" [2006-06-19 18:30 4796416]
    "ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-04 08:00 15360]
    "YSearchProtection"="C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe" [2007-06-08 10:59 224248]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "RemoteControl"="C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe" [2003-10-31 22:42 32768]
    "SynTPLpr"="C:\Program Files\Synaptics\SynTP\SynTPLpr.exe" [2003-04-24 12:51 110592]
    "SynTPEnh"="C:\Program Files\Synaptics\SynTP\SynTPEnh.exe" [2003-04-24 12:44 610304]
    "QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2004-09-29 15:48 98304]
    "TkBellExe"="C:\Program Files\Common Files\Real\Update_OB\realsched.exe" [2006-10-08 09:39 185784]
    "YSearchProtection"="C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe" [2007-06-08 10:59 224248]
    "Adobe Reader Speed Launcher"="C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 22:16 39792]

    C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
    NkvMon.exe.lnk - C:\Program Files\Nikon\NkView5\NkvMon.exe [2005-03-05 13:46:20 212992]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
    "msacm.clmp3enc"= C:\PROGRA~1\CYBERL~1\Power2Go\CLMP3Enc.ACM
    "vidc.mpg4"= C:\WINDOWS\mpg4c32.dll
    "vidc.mpg2"= C:\WINDOWS\mpg4c32.dll
    "vidc.mpg3"= C:\WINDOWS\mpg4c32.dll
    "vidc.GEOX"= C:\WINDOWS\system32\GeoCodec.dll

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
    backup=C:\WINDOWS\pss\Adobe Reader Speed Launch.lnkCommon Startup

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Office.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Microsoft Office.lnk
    backup=C:\WINDOWS\pss\Microsoft Office.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\KernelFaultCheck]
    C:\WINDOWS\system32\dumprep 0 -k [X]

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Power2GoExpress]
    C:\WINDOWS\system32\dumprep 0 -k [X]

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall"= 0 (0x0)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=

    .
    - - - - ORPHANS REMOVED - - - -

    HKCU-Run-updateMgr - C:\Program Files\Adobe\Acrobat 7.0\Reader\AdobeUpdateManager.exe
    HKCU-Run-TheSpyBot - C:\Program Files\TheSpyBot\TheSpyBot.exe
    HKLM-Run-Antivirus - C:\Program Files\VAV\vav.exe
    HKLM-Run-68d313c8 - C:\WINDOWS\system32\nwibuevw.dll
    Notify-__c00249C9 - C:\WINDOWS\system32\__c00249C9.dat
    Notify-__c0031389 - C:\WINDOWS\system32\__c0031389.dat
    Notify-__c00B46C4 - C:\WINDOWS\system32\__c00B46C4.dat
    MSConfigStartUp-BearShare - C:\Program Files\BearShare\BearShare.exe
    MSConfigStartUp-iTunesHelper - C:\Program Files\iTunes\iTunesHelper.exe


    .
    ------- Supplementary Scan -------
    .
    FireFox -: Profile - C:\Documents and Settings\alena\Application Data\Mozilla\Firefox\Profiles\3927zzro.default\
    FireFox -: prefs.js - SEARCH.DEFAULTURL - hxxp://search.yahoo.com/search?fr=ffsp1&p=
    FireFox -: prefs.js - STARTUP.HOMEPAGE - hxxp://www.yahoo.com/


    **************************************************************************

    catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-08-16 21:01:15
    Windows 5.1.2600 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    ------------------------ Other Running Processes ------------------------
    .
    C:\WINDOWS\system32\savedump.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\WINDOWS\system32\wdfmgr.exe
    C:\WINDOWS\system32\rundll32.exe
    C:\WINDOWS\system32\wscntfy.exe
    .
    **************************************************************************
    .
    Completion time: 2008-08-16 21:04:43 - machine was rebooted
    ComboFix-quarantined-files.txt 2008-08-17 01:04:38

    Pre-Run: 63,641,133,056 bytes free
    Post-Run: 63,990,312,960 bytes free

    253 --- E O F --- 2008-05-17 00:32:16



    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 9:10:09 PM, on 8/16/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16640)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
    C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Program Files\RitzPix E-Z Print & Share\OurPictures.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\Program Files\Nikon\NkView5\NkvMon.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\system32\notepad.exe
    C:\Program Files\internet explorer\iexplore.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://forums.spybot.info/showthread...841#post223841
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/...ch/search.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/.../www.yahoo.com
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
    O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
    O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
    O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [YSearchProtection] "C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe"
    O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [OurPictures] "C:\Program Files\RitzPix E-Z Print & Share\OurPictures.exe" /AutoStart
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [YSearchProtection] C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
    O4 - Global Startup: NkvMon.exe.lnk = C:\Program Files\Nikon\NkView5\NkvMon.exe
    O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
    O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycmap.htm
    O8 - Extra context menu item: Yahoo! &SMS - file:///C:\Program Files\Yahoo!\Common/ycsms.htm
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra button: (no name) - Cmdmapping - (no file) (HKCU)
    O14 - IERESET.INF: START_PAGE_URL=http://www.averatec.com
    O16 - DPF: {1DB93715-3B60-43EE-93E6-279BB3E1DF76} (OCXDownloadChecker Control) - https://www.childrenview.net/rooms/b...ecker_6110.cab
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.co...?1096490317211
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/micr...?1218404704522
    O16 - DPF: {DA8484DE-52DB-4860-A986-61A8682E298A} (LiveX_v7.0.2.0) - https://www.childrenview.net/rooms/b...ecker_6110.cab
    O16 - DPF: {FE0BD779-44EE-4A4B-AA2E-743C63F2E5E6} (IWinAmpActiveX Class) - http://pdl.stream.aol.com/downloads/...ampx_en_dl.cab

    --
    End of file - 5749 bytes

  4. #4
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    Good morning Alena? you said:
    it found a ton of stuff...
    That it did, I see some really nasty cookies, I can show you how to stop accepting that junk, make sure I do so before we finish. The bad ones are the ones in the System32 folder, they are Vundo.

    You do not appear to be running an antivirus program? Going online without one is cyber-suicide anymore. If you need a free one, here are three to choose from.
    http://free.grisoft.com/ww.download-...s-free-edition
    http://www.avast.com/eng/avast_4_home.html
    http://www.free-av.com/
    If you decide to install AVG 8 Free, look at this tutorial to see if it helps:
    How to Install Free version AVG 8.0 without LinkScanner feature
    http://russelltexas.com/tutorials/avg8install.htm

    AVG 8 Free is the program I use on my computers.

    Your HJT log looks clean, combofix did a great job, before we do a little minor cleaning, I would like to get the opinion of another scan:

    Download Malwarebytes' Anti-Malware to your Desktop
    http://www.besttechie.net/tools/mbam-setup.exe

    * Double-click mbam-setup.exe and follow the prompts to install the program.
    * Be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    * If an update is found, it will download and install the latest version.
    * Once the program has loaded, select Perform FULL SCAN, then click Scan.
    * When the scan is complete, click OK, then Show Results to view the results.
    * Be sure that everything is checked, and click Remove Selected.
    * When completed, a log will open in Notepad. Please save it to a convenient location. The log can also be opened by going to Start > All Programs > Malwarebytes' Anti-Malware > Logs > log-date.txt
    * Please post contents of that file & a new HJT log in your next reply.

    Please tell me how your computer is running now, any malware issues?

    Thanks...Phil
    Last edited by pskelley; 2008-08-17 at 13:20. Reason: add additional information
    MS-MVP Consumer Security 2007-08-09
    Proud Member ASAP
    UNITE Member 2006

  5. #5
    Junior Member
    Join Date
    Aug 2008
    Posts
    6

    Default mbam / hjt logs

    Thanks Phil,
    much better now, see no bad effects currently, have installed AVG for her as well, ( via the tutorial bit thanks)
    what go you think of Zonealarm vs Comodo ?(see in a link around here that Comodo was "rated" better....
    =====================================

    Malwarebytes' Anti-Malware 1.24
    Database version: 1061
    Windows 5.1.2600 Service Pack 2

    10:23:05 AM 8/17/2008
    mbam-log-8-17-2008 (10-23-05).txt

    Scan type: Full Scan (C:\|)
    Objects scanned: 78026
    Time elapsed: 39 minute(s), 48 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 5
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 67

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{8109fd3d-d891-4f80-8339-50a4913ace6f} (Adware.Zango) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\VAV (Rogue.VistaAntivirus2008) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\The Weather Channel (Adware.Hotbar) -> Quarantined and deleted successfully.

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    C:\QooBox\Quarantine\C\WINDOWS\system32\fulzdv.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\gupwob.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\kymfklhi.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\okwpvlxq.exe.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\pfpyhpys.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\pkrrpaiy.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\qlwqkhdc.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\rsmrljhv.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\srvmgjxx.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\vav.cpl.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\vftvnsbm.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\vrxqbwfl.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\nwibuevw.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\xxyabxYr.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\xyhmve.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\ycalml.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\ynkefekj.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\QooBox\Quarantine\C\WINDOWS\system32\zioctq.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP260\A0151449.exe (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP260\A0151450.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155328.exe (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155329.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155330.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155331.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155332.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155333.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155334.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155335.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155336.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155343.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155352.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155355.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155356.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155358.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155364.exe (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155367.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155368.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155370.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155372.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155373.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155374.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155380.exe (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155382.exe (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155383.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP281\A0155377.exe (Adware.Hotbar) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP285\A0169563.cpl (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP285\A0169571.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP285\A0169574.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP285\A0169583.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP285\A0169589.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP285\A0169592.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP285\A0169594.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP285\A0169595.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP285\A0169597.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP285\A0169599.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP285\A0169605.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP285\A0169608.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP285\A0169613.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP285\A0169614.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP285\A0169615.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP285\A0169616.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP285\A0169618.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP285\A0169593.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{1C14BCF1-6280-4DCD-B138-1FD410842FEB}\RP238\A0146817.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\fekumsum.dll.vzr (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\clkcnt.txt (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\Documents and Settings\alena\Desktop\Find And Fix Errors.lnk (Rogue.Link) -> Quarantined and deleted successfully.


    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:26:22 AM, on 8/17/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16640)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
    C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Program Files\RitzPix E-Z Print & Share\OurPictures.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
    C:\Program Files\Nikon\NkView5\NkvMon.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    C:\PROGRA~1\AVG\AVG8\avgrsx.exe
    C:\PROGRA~1\AVG\AVG8\avgemc.exe
    C:\Program Files\AVG\AVG8\avgtray.exe
    C:\WINDOWS\system32\NOTEPAD.EXE
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Trend Micro\HijackThis\HiJackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://forums.spybot.info/showthread...841#post223841
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/...ch/search.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/.../www.yahoo.com
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
    O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
    O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
    O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [YSearchProtection] "C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe"
    O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
    O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [OurPictures] "C:\Program Files\RitzPix E-Z Print & Share\OurPictures.exe" /AutoStart
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [YSearchProtection] C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
    O4 - Global Startup: NkvMon.exe.lnk = C:\Program Files\Nikon\NkView5\NkvMon.exe
    O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
    O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycmap.htm
    O8 - Extra context menu item: Yahoo! &SMS - file:///C:\Program Files\Yahoo!\Common/ycsms.htm
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra button: (no name) - Cmdmapping - (no file) (HKCU)
    O14 - IERESET.INF: START_PAGE_URL=http://www.averatec.com
    O16 - DPF: {1DB93715-3B60-43EE-93E6-279BB3E1DF76} (OCXDownloadChecker Control) - https://www.childrenview.net/rooms/b...ecker_6110.cab
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.co...?1096490317211
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/micr...?1218404704522
    O16 - DPF: {DA8484DE-52DB-4860-A986-61A8682E298A} (LiveX_v7.0.2.0) - https://www.childrenview.net/rooms/b...ecker_6110.cab
    O16 - DPF: {FE0BD779-44EE-4A4B-AA2E-743C63F2E5E6} (IWinAmpActiveX Class) - http://pdl.stream.aol.com/downloads/...ampx_en_dl.cab
    O20 - AppInit_DLLs: avgrsstx.dll
    O23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exe
    O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe

    --
    End of file - 6230 bytes

  6. #6
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    Thanks for returning your information and the feedback.
    Zonealarm vs Comodo <<< I personally run ZA free but many folks swear by Comodo? Here are others that are supposed to be freeware:
    http://www.jetico.com/jpfirewall.htm
    http://www.agnitum.com/products/outp...e/download.php
    http://www.downloadsquad.com/2007/10...vista-xp-2000/
    http://www.online-armor.com/free-fir...-software.html

    Most of what MBAM found is in combofix quarantine and infected System Restore files, we will deal with that soon.

    The new HJT log appears to be clean of malware so let's move to the next bridge we must cross.

    I am sure you saw this:
    WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
    http://www.bleepingcomputer.com/comb...o-use-combofix
    Review that information to understand Recovery Console. Installation is optional but if you do not have the CD's needed, as is explained, it can be installed before we remove combofix.
    If you do not have access to Recovery Console via a Windows CD, I strongly advise you to install this tool.
    If you do not wish to install RC, let me know so I can continue with the cleanup.
    If you install RC, post the C:\*CF-RC.txt*.



    Since we do not need to scan with combofix, click NO





    Thanks...Phil
    MS-MVP Consumer Security 2007-08-09
    Proud Member ASAP
    UNITE Member 2006

  7. #7
    Junior Member
    Join Date
    Aug 2008
    Posts
    6

    Default CF-RC.txt

    Thank you,
    Installed

    WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
    [boot loader]
    timeout=2
    default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
    [operating systems]
    C:\CMDCONS\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
    multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect

  8. #8
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    Good job Recovery Console is a tool that will allow you to recover from a catastrophic system failure, so let's hope you never need it. Many experts believe Microsoft should have installed it by default.
    http://support.microsoft.com/kb/314058
    http://support.microsoft.com/kb/307654

    Remove combofix from the computer like this:

    Click START then RUN
    Now type or copy Combofix /u in the runbox and click OK.
    Note the space between the X and the U, it needs to be there.



    Clean the infected System Restore files like this:

    Turn off System Restore.
    On the Desktop, right-click My Computer.
    Click Properties.
    Click the System Restore tab.
    Check Turn off System Restore.
    Click Apply, and then click OK.

    Reboot

    Turn ON System Restore,
    On the Desktop, right-click My Computer.
    Click Properties.
    Click the System Restore tab.
    UN-Check *Turn off System Restore*.

    I suggest you give MBAM another run to be sure we missed nothing, no need to post a clean scan result.

    Update AVG 8 and do a system scan for a last check, if all is running as it should just let me know.

    I will post this information for you now so you can benefit from it.

    Some good information for you:
    http://users.telenet.be/bluepatchy/m...wcomputer.html
    http://www.microsoft.com/windowsxp/u...s/mcgill1.mspx

    Here is some great information from experts in this field that will help you stay clean and safe online.
    http://users.telenet.be/bluepatchy/m...revention.html
    http://forums.spybot.info/showthread.php?t=279
    http://russelltexas.com/malware/allclear.htm
    http://forum.malwareremoval.com/viewtopic.php?t=14
    http://www.bleepingcomputer.com/forums/topict2520.html
    http://cybercoyote.org/security/not-admin.shtml

    http://www.malwarecomplaints.info/

    Thanks...Phil
    Safer Networking Forums
    http://www.spybot.info/en/donate/index.html
    If you are reading this information...thank a teacher,
    If you are reading it in English...thank a soldier.

    http://users.telenet.be/bluepatchy/m...oes/Links.html
    MS-MVP Consumer Security 2007-08-09
    Proud Member ASAP
    UNITE Member 2006

  9. #9
    Junior Member
    Join Date
    Aug 2008
    Posts
    6

    Default avg / mbam now clean

    Thanks Phil,
    both scans were clean,
    now installing a fw for her so she doesn't get back to a hosed system
    (or least for a long time)

  10. #10
    Junior Member
    Join Date
    Aug 2008
    Posts
    6

    Default still running A/OK

    Thanks again Phil,
    ( and I have mde a donation today on her behalf ! )

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •