Follow-Up
I am back. I have done everything that you have instruted however I could not run the SDFix runthis.bat. When I started up in safe mode and double clicked the black screen would come up for a 1/2 secound and go back off. I tried this a number of times with no luck. (i cannot figure out what is going on) There is a new HJT log as well as the MaleWareBytes log. Please let me know what else I need to do and what i can do about SDFix. Thanks again for all of your help.
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 4:26:32 PM, on 6/8/2008
Platform: Windows Vista (WinNT 6.00.1904)
MSIE: Internet Explorer v7.00 (7.00.6000.16643)
Boot mode: Normal
Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Windows\System32\hkcmd.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\HP\QuickPlay\QPService.exe
C:\Program Files\HP\HP Software Update\hpwuSchd2.exe
C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe
C:\Program Files\Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe
C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe
C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe
C:\Program Files\Adobe\Reader 8.0\Reader\reader_sl.exe
C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe
C:\Program Files\AIM\aim.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\HP Connections\6811507\Program\HP Connections.exe
C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE
C:\PROGRA~1\HEWLET~1\Shared\HPQTOA~1.EXE
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page =
http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =
http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=EN_US&c=71&bd=Pavilion&pf=laptop
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL =
http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page =
http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=EN_US&c=71&bd=Pavilion&pf=laptop
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe
O4 - HKLM\..\Run: [QPService] "C:\Program Files\HP\QuickPlay\QPService.exe"
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\Hp\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [QlbCtrl] %ProgramFiles%\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe /Start
O4 - HKLM\..\Run: [HP Health Check Scheduler] C:\Program Files\Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe
O4 - HKLM\..\Run: [WAWifiMessage] %ProgramFiles%\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe
O4 - HKLM\..\Run: [hpWirelessAssistant] %ProgramFiles%\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe"
O4 - HKLM\..\RunOnce: [Launcher] %WINDIR%\SMINST\launcher.exe
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User '?')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User '?')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User '?')
O4 - HKUS\S-1-5-21-4194038908-3935335703-2413737941-1000\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl (User '?')
O4 - S-1-5-21-4194038908-3935335703-2413737941-1000 Startup: OneNote 2007 Screen Clipper and Launcher.lnk = C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE (User '?')
O4 - Startup: OneNote 2007 Screen Clipper and Launcher.lnk = C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE
O4 - Global Startup: HP Connections.lnk = C:\Program Files\HP Connections\6811507\Program\HP Connections.exe
O4 - Global Startup: Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O13 - Gopher Prefix:
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) -
http://www.kaspersky.com/kos/eng/partner/us/kavwebscan_unicode.cab
O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) -
http://photos.walmart.com/WalmartActivia.cab
O16 - DPF: {48DD0448-9209-4F81-9F6D-D83562940134} (MySpace Uploader Control) -
http://lads.myspace.com/upload/MySpaceUploader1006.cab
O16 - DPF: {5C6698D9-7BE4-4122-8EC5-291D84DBD4A0} (Facebook Photo Uploader 4 Control) -
http://upload.facebook.com/controls/FacebookPhotoUploader3.cab
O16 - DPF: {BE319D04-18BD-4B34-AECC-EE7CB610FCA9} (BewitchedGameClass Control) -
http://l.yimg.com/jh/games/web_games/sony/bewitched/main.cab
O23 - Service: AddFiltr - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\AddFiltr.exe
O23 - Service: CyberLink Background Capture Service (CBCS) (CLCapSvc) - Unknown owner - C:\Program Files\HP\QuickPlay\Kernel\TV\CLCapSvc.exe
O23 - Service: CyberLink Task Scheduler (CTS) (CLSched) - Unknown owner - C:\Program Files\HP\QuickPlay\Kernel\TV\CLSched.exe
O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Unknown owner - c:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
O23 - Service: HP Health Check Service - Hewlett-Packard - C:\Program Files\Hewlett-Packard\HP Health Check\hphc_service.exe
O23 - Service: hpqwmiex - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: RoxMediaDB9 - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exe
O23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe
O23 - Service: stllssvr - MicroVision Development, Inc. - C:\Program Files\Common Files\SureThing Shared\stllssvr.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe
--
End of file - 8923 bytes
Malwarebytes' Anti-Malware 1.15
Database version: 841
4:16:53 PM 6/8/2008
mbam-log-6-8-2008 (16-16-53).txt
Scan type: Quick Scan
Objects scanned: 37552
Time elapsed: 7 minute(s), 3 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 4
Registry Values Infected: 3
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 44
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
C:\Users\Katie\AppData\Local\Temp\xxyvvSmM.dll (Trojan.Vundo) -> Unloaded module successfully.
Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1900a5a8-4bf1-42da-9604-90ae61ee7d79} (Trojan.Vundo) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{1900a5a8-4bf1-42da-9604-90ae61ee7d79} (Trojan.Vundo) -> Delete on reboot.
HKEY_CURRENT_USER\Software\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmds (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BM76ee0c25 (Trojan.Agent) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BM76ee0c25 (Trojan.Agent) -> Quarantined and deleted successfully.
Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\users\katie\appdata\local\temp\xxyvvsmm -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Authentication Packages (Trojan.Vundo) -> Data: c:\users\katie\appdata\local\temp\xxyvvsmm -> Quarantined and deleted successfully.
Folders Infected:
(No malicious items detected)
Files Infected:
C:\Users\Katie\AppData\Local\Temp\xxyvvSmM.dll (Trojan.Vundo) -> Delete on reboot.
C:\Users\Katie\AppData\Local\Temp\MmSvvyxx.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\MmSvvyxx.ini2 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\cbXOIYpP.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\friqfmhk.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\fyeajxfl.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\hlhaiofy.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\jhxlvorr.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\kodtkvim.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\kquamkyp.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\ktmvrkfc.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\lxxubckw.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\msdhbxak.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\nflxndni.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\ohtxjabn.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\qcxlnuqx.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\qoryqbbn.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\rvaeiieh.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\sqcvqrsc.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp00015521 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp00015bd5 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp000167c6 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp000168df (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp0001694c (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp0001699a (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp00016c68 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp00016da0 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp00016dcf (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp0001735b (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp000174f0 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp0001778f (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp000188dd (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp00018aa2 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp0001980a (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp00019a3b (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp0001a14d (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp00021248 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp0002bbdf (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\tmp0003903d (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\yjgifhft.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\Users\Katie\Local Settings\Temporary Internet Files\Content.IE5\4HYSG6E6\kb713501[1] (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\Users\Katie\Local Settings\Temporary Internet Files\Content.IE5\TUZNEDBO\kb456456[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Katie\winlogon.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Users\Katie\AppData\Local\Temp\pjjupoep.dll (Trojan.Agent) -> Delete on reboot.