1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Solved: Lots of Adware/Spyware - HJT Log Included

Discussion in 'Virus & Other Malware Removal' started by jpisme5573, Nov 8, 2007.

Thread Status:
Not open for further replies.
Advertisement
  1. jpisme5573

    jpisme5573 Thread Starter

    Joined:
    Nov 8, 2007
    Messages:
    12
    I've read a number of threads on this site, and I'm a believer. I've got a handful of adware/spyware issues going on right now, many of them similar to some of the problems others have had. I'm sure some of them are related to a single file...but possibly there's multiple issues that need to be cleaned up. I've got the Security Toolbar in IE, as well as the pop-ups for spyworm.win32, and pop-ups from savetheinformation.com. Also, warnings for the [email protected] virus and the yellow triangle with the incessant warnings. I've also got something overriding my cookie handling (I have it set to "always prompt" but keep finding it being reset to "always accept"), so maybe you'll be able to help me out with that too. Here comes the Hijackthis log. I look forward to seeing you guys work your magic. I'm running XP. Thanks a million in advance.

    ---------------

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 7:33:46 PM, on 11/8/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\LEXBCES.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\LEXPPS.EXE
    C:\PROGRA~1\COMMON~1\AOL\ACS\acsd.exe
    C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
    C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
    C:\WINDOWS\system32\qvuoxuan.exe
    C:\Program Files\Norton Internet Security\Norton AntiVirus\navapsvc.exe
    C:\Program Files\Spyware Doctor\sdhelp.exe
    C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    C:\WINDOWS\System32\PAStiSvc.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\wanmpsvc.exe
    C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
    C:\WINDOWS\system32\hkcmd.exe
    C:\Program Files\Java\j2re1.4.2_03\bin\jusched.exe
    C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe
    C:\Program Files\Dell\Media Experience\PCMService.exe
    C:\WINDOWS\system32\dla\tfswctrl.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\Program Files\MUSICMATCH\Musicmatch Jukebox\mmtask.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\WildTangent\Apps\CDA\GameDrvr.exe
    C:\Program Files\DIGStream\digstream.exe
    C:\Program Files\ESPNRunTime\DIGServices.exe
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Program Files\Digital Line Detect\DLG.exe
    C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
    C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\Kodak Software Updater.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Avant Browser\avant.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell4me.com/myway
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.yahoo.com/search/ie.html
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=56626&homepage=http://www.yahoo.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.dell4me.com/myway
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = 192.168.100.11
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
    O3 - Toolbar: Web assistant - {0B53EAC3-8D69-4b9e-9B19-A37C9A5676A7} - C:\Program Files\Common Files\Symantec Shared\AdBlocking\NISShExt.dll
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton Internet Security\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
    O3 - Toolbar: Security Toolbar - {11A69AE4-FBED-4832-A2BF-45AF82825583} - C:\WINDOWS\system32\vtpkzsuf.dll
    O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_03\bin\jusched.exe
    O4 - HKLM\..\Run: [DVDLauncher] "C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe"
    O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Dell\Media Experience\PCMService.exe"
    O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
    O4 - HKLM\..\Run: [UpdateManager] "C:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe" /r
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
    O4 - HKLM\..\Run: [URLLSTCK.exe] C:\Program Files\Norton Internet Security\UrlLstCk.exe
    O4 - HKLM\..\Run: [mmtask] C:\Program Files\MUSICMATCH\Musicmatch Jukebox\mmtask.exe
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [WildTangent CDA] "C:\Program Files\WildTangent\Apps\CDA\GameDrvr.exe" /startup "C:\Program Files\WildTangent\Apps\CDA\cdaEngine0500.dll"
    O4 - HKLM\..\Run: [DIGStream] C:\Program Files\DIGStream\digstream.exe
    O4 - HKLM\..\Run: [DIGServices] C:\Program Files\ESPNRunTime\DIGServices.exe /brand=ESPN /priority=0 /poll=24
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [Lexmark 1200 Series] "C:\Program Files\Lexmark 1200 Series\lxczbmgr.exe"
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
    O4 - HKLM\..\Run: [c4bac5b8] rundll32.exe "C:\WINDOWS\system32\gtlepwwb.dll",b
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [Ido] "C:\Documents and Settings\Jason Postma\My Documents\??crosoft.NET\??plorer.exe"
    O4 - HKCU\..\Run: [Tzxkexs] "C:\Documents and Settings\Jason Postma\Application Data\?icrosoft\?hkdsk.exe"
    O4 - HKCU\..\Run: [Iua] C:\WINDOWS\SYSTEM32\T?sks\n?tepad.exe
    O4 - HKCU\..\Run: [Mvbi] "C:\Documents and Settings\Jason Postma\My Documents\?ymbols\?serinit.exe"
    O4 - HKCU\..\Run: [Cpnui] "C:\Program Files\Common Files\?ppPatch\m?iexec.exe"
    O4 - HKCU\..\Run: [Wxvghbe] "C:\Documents and Settings\Jason Postma\My Documents\??mantec\r?ndll32.exe"
    O4 - HKCU\..\Run: [Kua] "C:\Program Files\W?nSxS\?poolsv.exe"
    O4 - HKCU\..\Run: [Jotme] "C:\Program Files\??curity\n?lookup.exe"
    O4 - HKCU\..\Run: [Pgom] "C:\Documents and Settings\Jason Postma\My Documents\F?nts\d?dplay.exe"
    O4 - HKCU\..\Run: [Hwakbih] C:\WINDOWS\??stem32\n?lookup.exe
    O4 - HKUS\S-1-5-18\..\Run: [Spyware Doctor] (User 'SYSTEM')
    O4 - HKUS\S-1-5-18\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\GetFlash.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [Spyware Doctor] (User 'Default user')
    O4 - HKUS\.DEFAULT\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\GetFlash.exe (User 'Default user')
    O4 - Global Startup: America Online 9.0 Tray Icon.lnk = C:\Program Files\America Online 9.0\aoltray.exe
    O4 - Global Startup: Digital Line Detect.lnk = ?
    O4 - Global Startup: Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
    O4 - Global Startup: KODAK Software Updater.lnk = C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\Kodak Software Updater.exe
    O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: Add to AD Black List - C:\Program Files\Avant Browser\AddToADBlackList.htm
    O8 - Extra context menu item: Block All Images from the Same Server - C:\Program Files\Avant Browser\AddAllToADBlackList.htm
    O8 - Extra context menu item: Highlight - C:\Program Files\Avant Browser\Highlight.htm
    O8 - Extra context menu item: Open All Links in This Page... - C:\Program Files\Avant Browser\OpenAllLinks.htm
    O8 - Extra context menu item: Search - C:\Program Files\Avant Browser\Search.htm
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
    O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycmap.htm
    O8 - Extra context menu item: Yahoo! &SMS - file:///C:\Program Files\Yahoo!\Common/ycsms.htm
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_03\bin\npjpi142_03.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_03\bin\npjpi142_03.dll
    O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: AbsolutePoker.net - {5E72AD5A-20DF-4ca4-9B7B-D9717FFDE0C5} - C:\Documents and Settings\All Users\Start Menu\Programs\AbsolutePoker NET\AbsolutePoker NET.lnk
    O9 - Extra 'Tools' menuitem: AbsolutePoker.net - {5E72AD5A-20DF-4ca4-9B7B-D9717FFDE0C5} - C:\Documents and Settings\All Users\Start Menu\Programs\AbsolutePoker NET\AbsolutePoker NET.lnk
    O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
    O9 - Extra button: MUSICMATCH MX Web Player - {d81ca86b-ef63-42af-bee3-4502d9a03c2d} - http://wwws.musicmatch.com/mmz/openWebRadio.html (file missing)
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O15 - Trusted Zone: *.amaena.com
    O15 - Trusted Zone: *.avsystemcare.com
    O15 - Trusted Zone: *.gomyhit.com
    O15 - Trusted Zone: *.imageservr.com
    O15 - Trusted Zone: *.imagesrvr.com
    O15 - Trusted Zone: *.onerateld.com
    O15 - Trusted Zone: *.trustedantivirus.com
    O15 - Trusted Zone: *.virusschlacht.com
    O15 - Trusted Zone: *.amaena.com (HKLM)
    O15 - Trusted Zone: *.avsystemcare.com (HKLM)
    O15 - Trusted Zone: *.gomyhit.com (HKLM)
    O15 - Trusted Zone: *.imageservr.com (HKLM)
    O15 - Trusted Zone: *.imagesrvr.com (HKLM)
    O15 - Trusted Zone: *.musicmatch.com (HKLM)
    O15 - Trusted Zone: *.onerateld.com (HKLM)
    O15 - Trusted Zone: *.trustedantivirus.com (HKLM)
    O15 - Trusted Zone: *.virusschlacht.com (HKLM)
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://photos.walmart.com/WalmartActivia.cab
    O16 - DPF: {55027008-315F-4F45-BBC3-8BE119764741} (Slide Image Uploader Control) - http://www.slide.com/uploader/SlideImageUploader.cab
    O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~1\GOEC62~1.DLL
    O23 - Service: Adobe LM Service - Unknown owner - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: AOL Connectivity Service (AOL ACS) - America Online, Inc. - C:\PROGRA~1\COMMON~1\AOL\ACS\acsd.exe
    O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    O23 - Service: Symantec Network Proxy (ccProxy) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
    O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
    O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
    O23 - Service: DomainService - - C:\WINDOWS\system32\qvuoxuan.exe
    O23 - Service: GoogleDesktopManager - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Kodak Camera Connection Software (KodakCCS) - Unknown owner - C:\WINDOWS\system32\drivers\KodakCCS.exe (file missing)
    O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
    O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton Internet Security\Norton AntiVirus\navapsvc.exe
    O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton Internet Security\Norton AntiVirus\SAVScan.exe
    O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
    O23 - Service: PC Tools Spyware Doctor (SDhelper) - PC Tools Research Pty Ltd - C:\Program Files\Spyware Doctor\sdhelp.exe
    O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    O23 - Service: STI Simulator - Unknown owner - C:\WINDOWS\System32\PAStiSvc.exe
    O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
    O23 - Service: Viewpoint Manager Service - Unknown owner - C:\Program Files\Viewpoint\Common\ViewpointService.exe (file missing)
    O23 - Service: WAN Miniport (ATW) Service (WANMiniportService) - America Online, Inc. - C:\WINDOWS\wanmpsvc.exe

    --
    End of file - 13354 bytes
     
  2. jpisme5573

    jpisme5573 Thread Starter

    Joined:
    Nov 8, 2007
    Messages:
    12
  3. JSntgRvr

    JSntgRvr Retired Moderator and Malware Specialist

    Joined:
    Jul 1, 2003
    Messages:
    18,552
    First Name:
    José
    Hi, jpisme5573. :)

    Welcome to TSG.

    Please read this post completely, it may make it easier for you if you copy and paste this post to a new text document or print it for reference later.

    This will likely be a few step process in removing the malware that has infected your system. I encourage you to stick with it and follow my directions as closely as possible so as to avoid complicating the problem further.

    We will download some utilities that will help us remove this malware.

    RIGHT-CLICK HERE and Save As (in IE it's "Save Target As") in order to download DelDomains.inf to your desktop. Once downloaded, RIGHT-CLICK DelDomains.inf and select: Install (no need to restart)

    Note: This will remove all entries in the "Trusted Zone" and "Ranges" also.

    [​IMG] Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system. Please follow these steps to remove older version of Java components and upgrade the application. Beware it is NOT supported for use in 9x or ME and probably will not install in those systems

    Ugrading Java:
    • Download the latest version of Java Runtime Environment (JRE) 6 Update 3.
    • Scroll down to where it says "The J2SE Runtime Environment (JRE) allows end-users to run Java applications".
    • Click the "Download" button to the right.
    • Check the box that says: "Accept License Agreement".
    • The page will refresh.
    • Click on the link to download Windows Offline Installation with or without Multi-language and save to your desktop.
    • Close any programs you may have running - especially your web browser.
    • Go to Start > Control Panel, double-click on Add/Remove programs and remove all older versions of Java.
    • Check any item with Java Runtime Environment (JRE or J2SE) in the name.
    • Click the Remove or Change/Remove button.
    • Repeat as many times as necessary to remove each Java version.
    • Reboot your computer once all Java components are removed.
    • Then from your desktop double-click on the download to install the newest version.
    Look in your control panel add/remove programs for the following:

    outerinfo
    AskTBar
    ClickSpring
    Cowabanga by OIN
    ipwindows / ipwins
    MediaTickets
    MediaTickets by OIN
    OIN
    Outer Info Network
    PurityScan
    PurityScan by OIN
    Snowball Wars by OIN
    TizzleTalk
    TizzleTalk by OIN
    Yazzle by OIN
    Yazzle ActiveX by OIN
    Yazzle Cowabanga by OIN
    Yazzle Kobe :filtered:! By OIN
    Yazzle Picster by OIN
    Yazzle Snowball Wars by OIN
    Yazzle Sudoku by OIN
    Zolero Translator


    If present, click on the entry and click remove.

    Download and run the Purityscan uninstaller from Here

    Please download VundoFix.exe to your desktop.

    Note: In the event you already have Vundofix, this is a new version that I need you to download.
    • Double-click VundoFix.exe to run it.
    • You will receive a message saying vundofix will close and re-open in a minute or less. Click OK
    • When VundoFix re-opens, click the Scan for Vundo button.
    • Once it's done scanning, click the Remove Vundo button.
    • You will receive a prompt asking if you want to remove the files, click YES
    • Once you click yes, your desktop will go blank as it starts removing Vundo.
    • When completed, it will prompt that it will shutdown your computer, click OK.
    • Turn your computer back on.
    • Please post the contents of C:\vundofix.txt in your next reply.
    Note: It is possible that VundoFix encountered a file it could not remove. In this case, VundoFix will run on reboot, simply follow the above instructions starting from "Click the Scan for Vundo button" when VundoFix appears at reboot.

    Please download ComboFix from Here or Here to your Desktop.

    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
    1. Close any open browsers.
    2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
      -----------------------------------------------------------​
      • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
      • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
        -----------------------------------------------------------​
    3. Double click on combofix.exe & follow the prompts.
    4. When finished, it will produce a report for you.
    5. Please post the "C:\ComboFix.txt" on your next reply.
    **Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

    Download and scan with SUPERAntiSpyware Free for Home Users
    • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
    • An icon will be created on your desktop. Double-click that icon to launch the program.
    • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here.)
    • Under "Configuration and Preferences", click the Preferences button.
    • Click the Scanning Control tab.
    • Under Scanner Options make sure the following are checked (leave all others unchecked):
      • Close browsers before scanning.
      • Scan for tracking cookies.
      • Terminate memory threats before quarantining.
    • Click the "Close" button to leave the control center screen.
    • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
    • On the left, make sure you check C:\Fixed Drive.
    • On the right, under "Complete Scan", choose Perform Complete Scan.
    • Click "Next" to start the scan. Please be patient while it scans your computer.
    • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
    • Make sure everything has a checkmark next to it and click "Next".
    • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
    • If asked if you want to reboot, click "Yes".
    • To retrieve the removal information after reboot, launch SUPERAntispyware again.
      • Click Preferences, then click the Statistics/Logs tab.
      • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
      • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
      • Please copy and paste the Scan Log results in your next reply along with a Hijackthis log.
    • Click Close to exit the program.
     
  4. jpisme5573

    jpisme5573 Thread Starter

    Joined:
    Nov 8, 2007
    Messages:
    12
    Okay, first of all, thanks for all your help. You guys are total rock stars. I worked my way through all the steps. And after rebooting for the final time, so far everything looks as good as new. I wanna let things play themselves out for a little bit before declaring it "clean," or maybe you will see something in one of the logs. No pop-ups yets, or the triangle warning. Security Toolbar is gone and cookies stay on "prompt." Thanks again.

    =================VUNDOFIX LOG=======

    VundoFix V6.5.11

    Checking Java version...

    Java version is 1.4.2.3
    Old versions of java are exploitable and should be removed.

    Scan started at 9:42:53 PM 11/9/2007

    Listing files found while scanning....

    C:\windows\system32\vtpkzsuf.dll

    Beginning removal...

    Attempting to delete C:\windows\system32\vtpkzsuf.dll
    C:\windows\system32\vtpkzsuf.dll Has been deleted!

    Performing Repairs to the registry.
    Done!

    =====COMBO SCAN LOG=======

    ComboFix 07-11-08.1 - Jason Postma 2007-11-10 0:03:57.2 - NTFSx86
    Running from: C:\Documents and Settings\Jason Postma\Desktop\ComboFix.exe
    .

    Unable to gain System Privileges

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\Documents and Settings\All Users\Start Menu\Live Safety Center.lnk
    C:\Documents and Settings\All Users\Start Menu\Online Security Guide.lnk
    C:\Documents and Settings\Jason Postma\Desktop\Live Safety Center.lnk
    C:\Documents and Settings\Jason Postma\Desktop\Online Security Guide.lnk
    C:\Documents and Settings\Jason Postma\Favorites\Online Security Guide.lnk
    C:\WINDOWS\SYSTEM32\accdd.bak1
    C:\WINDOWS\SYSTEM32\accdd.ini
    C:\WINDOWS\system32\ddcca.dll
    C:\WINDOWS\system32\pvrwpacy.dllbox
    .
    ---- Previous Run -------
    .
    C:\Documents and Settings\All Users\Start Menu\Live Safety Center.lnk
    C:\Documents and Settings\All Users\Start Menu\Online Security Guide.lnk
    C:\Documents and Settings\Jason Postma\Application Data\CURITY~1
    C:\Documents and Settings\Jason Postma\Application Data\FNTS~1
    C:\Documents and Settings\Jason Postma\Application Data\ICROSO~1
    C:\Documents and Settings\Jason Postma\Application Data\install.dat
    C:\Documents and Settings\Jason Postma\Desktop\Live Safety Center.lnk
    C:\Documents and Settings\Jason Postma\Desktop\Online Security Guide.lnk
    C:\Documents and Settings\Jason Postma\Favorites\Online Security Guide.lnk
    C:\Documents and Settings\Jason Postma\My Documents\CROSOF~1.NET
    C:\Documents and Settings\Jason Postma\My Documents\FNTS~1
    C:\Documents and Settings\Jason Postma\My Documents\MANTEC~1
    C:\Documents and Settings\Jason Postma\My Documents\PPPATC~1
    C:\Documents and Settings\Jason Postma\My Documents\SSEMBL~1
    C:\Documents and Settings\Jason Postma\My Documents\WNSXS~1
    C:\Documents and Settings\Jason Postma\My Documents\YMBOLS~1
    C:\Documents and Settings\NetworkService\Application Data\NetMon
    C:\Documents and Settings\NetworkService\Application Data\NetMon\domains.txt
    C:\Documents and Settings\NetworkService\Application Data\NetMon\log.txt
    C:\Program Files\Common Files\crosof~1.net
    C:\Program Files\Common Files\mantec~1
    C:\Program Files\Common Files\pppatc~1
    C:\Program Files\Common Files\racle~1
    C:\Program Files\Common Files\smbols~1
    C:\Program Files\Common Files\ssembl~1
    C:\Program Files\Common Files\Yazzle1122OinAdmin.exe
    C:\Program Files\Common Files\ymante~1
    C:\Program Files\dobe~1
    C:\Program Files\inetget2
    C:\Program Files\Insider
    C:\Program Files\Insider\Insider.exe
    C:\Program Files\Insider\UnInstall.exe
    C:\Program Files\web buying
    C:\Program Files\web buying\v1.8.5\wbuninst.exe
    C:\Program Files\web buying\v1.8.5\webbuying.exe
    C:\Program Files\Words
    C:\Program Files\Words\list.txt
    C:\Program Files\Words\UnInstall.exe
    C:\Temp\1cb
    C:\Temp\1cb\syscheck.log
    C:\temp\tn3
    C:\WINDOWS\b103.exe
    C:\WINDOWS\b122.exe
    C:\WINDOWS\b128.exe
    C:\WINDOWS\b138.exe
    C:\WINDOWS\b143.exe
    C:\WINDOWS\b147.exe
    C:\WINDOWS\cookies.ini
    C:\WINDOWS\crosof~1.net
    C:\WINDOWS\dobe~1
    C:\WINDOWS\scurit~1
    C:\WINDOWS\stem32~1
    C:\WINDOWS\system32\a1
    C:\WINDOWS\system32\a1\rarndrll2.exe
    C:\WINDOWS\system32\asks~1
    C:\WINDOWS\system32\atmtd.dll._
    C:\WINDOWS\system32\drivers\core.cache.dsk
    C:\WINDOWS\system32\drivers\core.sys
    C:\WINDOWS\system32\drivers\fad.sys
    C:\WINDOWS\system32\g2
    C:\WINDOWS\system32\g2\caws83122.exe
    C:\WINDOWS\system32\h1
    C:\WINDOWS\system32\hoysfah.dll
    C:\WINDOWS\system32\kjknrljk.exe
    C:\WINDOWS\system32\mrnnabpw.exe
    C:\WINDOWS\system32\pac.txt
    C:\WINDOWS\system32\pvrwpacy.dllbox
    C:\WINDOWS\system32\qvuoxuan.exe
    C:\WINDOWS\system32\r2
    C:\WINDOWS\system32\r2\wr31drs.exe
    C:\WINDOWS\SYSTEM32\rrutv.bak2
    C:\WINDOWS\SYSTEM32\rrutv.ini
    C:\WINDOWS\system32\ssembl~1
    C:\WINDOWS\system32\ssembl~1\??mbols\
    C:\WINDOWS\system32\ssembl~1\javaw.exe
    C:\WINDOWS\system32\tsks~1
    C:\WINDOWS\system32\vtpkzsuf.dllbox
    C:\WINDOWS\system32\vturr.dll
    C:\WINDOWS\system32\wygfyjmn.exe
    C:\WINDOWS\system32\ymante~1
    C:\WINDOWS\wnsxs~1
    C:\WINDOWS\wr.txt

    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

    .
    -------\LEGACY_CORE
    -------\LEGACY_DOMAINSERVICE
    -------\LEGACY_NETWORK_MONITOR
    -------\core
    -------\DomainService




    ((((((((((((((((((((((((( Files Created from 2007-10-10 to 2007-11-10 )))))))))))))))))))))))))))))))
    .

    2007-11-09 21:59 145,984 --a------ C:\WINDOWS\SYSTEM32\pvrwpacy.dll
    2007-11-09 21:58 145,984 --a------ C:\WINDOWS\SYSTEM32\lgwsebkb.dll
    2007-11-09 21:57 51,200 --a------ C:\WINDOWS\NirCmd.exe
    2007-11-09 21:42 <DIR> d-------- C:\VundoFix Backups
    2007-11-09 21:15 85,056 --a------ C:\WINDOWS\SYSTEM32\pvuxcgrk.dll
    2007-11-09 21:12 <DIR> d-------- C:\Program Files\Common Files\Java
    2007-11-09 21:12 81,472 --a------ C:\WINDOWS\SYSTEM32\mgutkvnm.dll
    2007-11-09 21:11 71,232 --a------ C:\WINDOWS\SYSTEM32\ygyosiuc.exe
    2007-11-08 21:05 80,448 --a------ C:\WINDOWS\SYSTEM32\ojsjxxus.dll
    2007-11-08 21:02 86,080 --a------ C:\WINDOWS\SYSTEM32\odvvqtvq.dll
    2007-11-08 21:02 71,232 --a------ C:\WINDOWS\SYSTEM32\yfwqacvy.exe
    2007-11-08 19:33 <DIR> d-------- C:\Program Files\Trend Micro
    2007-11-07 21:04 79,936 --a------ C:\WINDOWS\SYSTEM32\ahftiuel.dll
    2007-11-07 21:01 71,232 --a------ C:\WINDOWS\SYSTEM32\myvkgmrp.exe
    2007-11-06 10:18 35,840 --a------ C:\WINDOWS\mrofinu1000106.exe
    2007-11-06 10:17 <DIR> d-------- C:\WINDOWS\SYSTEM32\Mz02r
    2007-11-06 10:17 <DIR> d-------- C:\temp\mZOr
    2007-11-06 10:17 35,328 --a------ C:\WINDOWS\SYSTEM32\gebaxya.dll
    2007-11-06 01:33 81,472 --a------ C:\WINDOWS\SYSTEM32\caobmbwo.dll
    2007-11-04 22:45 83,008 --a------ C:\WINDOWS\SYSTEM32\yvptbags.dll
    2007-11-04 21:53 20,480 --a------ C:\WINDOWS\quit.exe
    2007-11-04 18:37 155,648 --a------ C:\WINDOWS\SYSTEM32\igfxres.dll
    2007-11-04 18:14 16,384 --a--c--- C:\WINDOWS\SYSTEM32\DLLCACHE\isignup.exe
    2007-11-04 17:58 24,661 --a------ C:\WINDOWS\SYSTEM32\spxcoins.dll
    2007-11-04 17:58 24,661 --a--c--- C:\WINDOWS\SYSTEM32\DLLCACHE\spxcoins.dll
    2007-11-04 17:58 13,312 --a------ C:\WINDOWS\SYSTEM32\irclass.dll
    2007-11-04 17:58 13,312 --a--c--- C:\WINDOWS\SYSTEM32\DLLCACHE\irclass.dll
    2007-11-04 12:59 <DIR> d-------- C:\Program Files\Windows Defender
    2007-11-03 22:44 78,912 --a------ C:\WINDOWS\SYSTEM32\bqnkfxvj.dll
    2007-11-03 10:29 36,352 --a------ C:\WINDOWS\SYSTEM32\pmnmnop.dll
    2007-11-03 10:25 36,352 --a------ C:\WINDOWS\SYSTEM32\yayvwxv.dll

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2007-11-10 08:30 316,512 ----a-w C:\WINDOWS\SYSTEM32\ddaba.dll
    2007-11-10 08:27 --------- d-----w C:\Documents and Settings\All Users\Application Data\DIGStream
    2007-11-10 05:38 --------- d-----w C:\Program Files\Common Files\Symantec Shared
    2007-11-10 05:15 --------- d-----w C:\Program Files\Java
    2007-11-08 06:16 --------- d-----w C:\Documents and Settings\Jason Postma\Application Data\Avant Browser
    2007-11-08 06:12 --------- d--h--r C:\Documents and Settings\Jason Postma\Application Data\yahoo!
    2007-10-31 21:37 --------- d-----w C:\Program Files\Modem Helper
    2007-08-02 13:43 282,624 ----a-w C:\Program Files\TTC.dll
    2005-05-01 00:18 7,177,320 -c--a-w C:\Documents and Settings\Random\yahoo_poker1-1_tm5-3.exe
    2005-02-27 01:46 1,865,291 -c--a-w C:\Documents and Settings\Random\setup_ares.exe
    2007-07-31 05:21:04 848 --sha-w C:\WINDOWS\SYSTEM32\KGyGaAvL.sys
    2006-03-14 05:09:59 979 -csha-w C:\WINDOWS\SYSTEM32\msbasm.dat
    2005-07-29 23:24:26 472 --sha-r C:\WINDOWS\UG9zdG1h\o36Wx3Y1.vbs
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{2F15A490-C0F2-4321-BAB5-3FC6C1300CFC}]
    2007-11-10 00:30 316512 --a------ C:\WINDOWS\system32\ddaba.dll

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{5B0D2586-55EF-4619-A19C-5D9C1EF48AAD}]

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{634BBAB7-3F60-4426-944F-A62B9007F67F}]
    2007-11-03 10:25 36352 --a------ C:\WINDOWS\system32\yayvwxv.dll

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{76ED0A23-8C2D-419E-B983-17E1E6791877}]

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{A95B2816-1D7E-4561-A202-68C0DE02353A}]
    2007-11-09 21:59 145984 --a------ C:\WINDOWS\system32\pvrwpacy.dll

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{d75a1f09-f571-437b-aae2-76e331665825}]
    2007-11-09 21:12 81472 --a------ C:\WINDOWS\system32\mgutkvnm.dll

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
    "{11A69AE4-FBED-4832-A2BF-45AF82825583}"= C:\WINDOWS\system32\pvrwpacy.dll [2007-11-09 21:59 145984]

    [HKEY_CLASSES_ROOT\CLSID\{11A69AE4-FBED-4832-A2BF-45AF82825583}]

    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser]
    "{11A69AE4-FBED-4832-A2BF-45AF82825583}"= C:\WINDOWS\system32\pvrwpacy.dll [2007-11-09 21:59 145984]

    [HKEY_CLASSES_ROOT\CLSID\{11A69AE4-FBED-4832-A2BF-45AF82825583}]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "IgfxTray"="C:\WINDOWS\system32\igfxtray.exe" [2003-10-02 10:37]
    "HotKeysCmds"="C:\WINDOWS\system32\hkcmd.exe" [2003-10-02 10:19]
    "DVDLauncher"="C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe" [2004-04-11 08:43]
    "PCMService"="C:\Program Files\Dell\Media Experience\PCMService.exe" [2004-04-11 17:15]
    "dla"="C:\WINDOWS\system32\dla\tfswctrl.exe" [2004-03-14 22:04]
    "UpdateManager"="C:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe" [2003-08-18 22:01]
    "ccApp"="C:\Program Files\Common Files\Symantec Shared\ccApp.exe" [2003-11-21 13:04]
    "URLLSTCK.exe"="C:\Program Files\Norton Internet Security\UrlLstCk.exe" [2003-11-21 13:04]
    "mmtask"="C:\Program Files\MUSICMATCH\Musicmatch Jukebox\mmtask.exe" [2004-10-08 08:49]
    "TkBellExe"="C:\Program Files\Common Files\Real\Update_OB\realsched.exe" [2005-02-06 11:53]
    "WildTangent CDA"="C:\Program Files\WildTangent\Apps\CDA\GameDrvr.exe" [2005-03-28 17:24]
    "DIGStream"="C:\Program Files\DIGStream\digstream.exe" [2005-05-18 13:49]
    "DIGServices"="C:\Program Files\ESPNRunTime\DIGServices.exe" [2005-04-01 14:37]
    "iTunesHelper"="C:\Program Files\iTunes\iTunesHelper.exe" [2005-10-18 11:58]
    "QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2006-12-27 09:42]
    "Lexmark 1200 Series"="C:\Program Files\Lexmark 1200 Series\lxczbmgr.exe" [2006-07-12 21:22]
    "Windows Defender"="C:\Program Files\Windows Defender\MSASCui.exe" [2006-11-03 19:20]
    "SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe" [2007-09-25 01:11]
    "c4bac5b8"="C:\WINDOWS\system32\pvuxcgrk.dll" [2007-11-09 21:15]

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "MSMSGS"="C:\Program Files\Messenger\msmsgs.exe" [2004-10-13 08:24]
    "Ido"="C:\Documents and Settings\Jason Postma\My Documents\??crosoft.NET\??plorer.exe" []
    "Tzxkexs"="C:\Documents and Settings\Jason Postma\Application Data\?icrosoft\?hkdsk.exe" []
    "Iua"="C:\WINDOWS\SYSTEM32\T?sks\n?tepad.exe" []
    "Mvbi"="C:\Documents and Settings\Jason Postma\My Documents\?ymbols\?serinit.exe" []
    "Cpnui"="C:\Program Files\Common Files\?ppPatch\m?iexec.exe" []
    "Wxvghbe"="C:\Documents and Settings\Jason Postma\My Documents\??mantec\r?ndll32.exe" []
    "Kua"="C:\Program Files\W?nSxS\?poolsv.exe" []
    "Jotme"="C:\Program Files\??curity\n?lookup.exe" []
    "Pgom"="C:\Documents and Settings\Jason Postma\My Documents\F?nts\d?dplay.exe" []
    "Hwakbih"="C:\WINDOWS\??stem32\n?lookup.exe" [2004-08-12 06:02]

    [HKEY_USERS\.default\software\microsoft\windows\currentversion\runonce]
    "FlashPlayerUpdate"=C:\WINDOWS\system32\Macromed\Flash\GetFlash.exe
    "tscuninstall"=%systemroot%\system32\tscupgrd.exe

    [HKEY_USERS\.default\software\microsoft\windows\currentversion\run]
    "Spyware Doctor"=

    C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
    America Online 9.0 Tray Icon.lnk - C:\Program Files\America Online 9.0\aoltray.exe [2004-10-13 18:27:50]
    Digital Line Detect.lnk - C:\Program Files\Digital Line Detect\DLG.exe [2004-10-13 18:25:22]
    Kodak EasyShare software.lnk - C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe [2006-06-02 03:29:26]
    KODAK Software Updater.lnk - C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\Kodak Software Updater.exe [2004-02-13 13:12:08]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
    "{634BBAB7-3F60-4426-944F-A62B9007F67F}"= C:\WINDOWS\system32\yayvwxv.dll [2007-11-03 10:25 36352]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\pvrwpacy]
    pvrwpacy.dll 2007-11-09 21:59 145984 C:\WINDOWS\SYSTEM32\pvrwpacy.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\yayvwxv]
    yayvwxv.dll 2007-11-03 10:25 36352 C:\WINDOWS\SYSTEM32\yayvwxv.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
    "AppInit_DLLs"=C:\PROGRA~1\Google\GOOGLE~1\GOEC62~1.DLL

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
    "Authentication Packages"= msv1_0 C:\WINDOWS\system32\ddaba.dll

    S3 PAC207;Webcam Basic;C:\WINDOWS\system32\DRIVERS\pfc027.sys

    .
    Contents of the 'Scheduled Tasks' folder
    "2007-11-10 08:26:58 C:\WINDOWS\Tasks\MP Scheduled Scan.job"
    - C:\Program Files\Windows Defender\MpCmdRun.exe
    .
    **************************************************************************

    catchme 0.3.1250 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2007-11-10 00:30:04
    Windows 5.1.2600 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    Completion time: 2007-11-10 0:34:53 - machine was rebooted
    .
    --- E O F ---


    ========

    (CONTINUED)
     
  5. jpisme5573

    jpisme5573 Thread Starter

    Joined:
    Nov 8, 2007
    Messages:
    12
    .....(CONTINUED)

    ====SUPER ANTI SPYWARE LOG========

    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 11/10/2007 at 02:55 AM

    Application Version : 3.9.1008

    Core Rules Database Version : 3342
    Trace Rules Database Version: 1343

    Scan type : Complete Scan
    Total Scan Time : 01:46:14

    Memory items scanned : 500
    Memory threats detected : 4
    Registry items scanned : 5385
    Registry threats detected : 38
    File items scanned : 59121
    File threats detected : 274

    Adware.Vundo-Variant
    C:\WINDOWS\SYSTEM32\PVRWPACY.DLL
    C:\WINDOWS\SYSTEM32\PVRWPACY.DLL
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{d75a1f09-f571-437b-aae2-76e331665825}
    HKCR\CLSID\{D75A1F09-F571-437B-AAE2-76E331665825}
    HKCR\CLSID\{D75A1F09-F571-437B-AAE2-76E331665825}\InprocServer32
    HKCR\CLSID\{D75A1F09-F571-437B-AAE2-76E331665825}\InprocServer32#ThreadingModel
    Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\pvrwpacy
    C:\WINDOWS\SYSTEM32\AHFTIUEL.DLL
    C:\WINDOWS\SYSTEM32\BQNKFXVJ.DLL
    C:\WINDOWS\SYSTEM32\CAOBMBWO.DLL
    C:\WINDOWS\SYSTEM32\LGWSEBKB.DLL
    C:\WINDOWS\SYSTEM32\OJSJXXUS.DLL
    C:\WINDOWS\SYSTEM32\YVPTBAGS.DLL

    Adware.Vundo Variant
    C:\WINDOWS\SYSTEM32\YAYVWXV.DLL
    C:\WINDOWS\SYSTEM32\YAYVWXV.DLL
    C:\WINDOWS\SYSTEM32\DDABA.DLL
    C:\WINDOWS\SYSTEM32\DDABA.DLL
    HKLM\Software\Classes\CLSID\{2F15A490-C0F2-4321-BAB5-3FC6C1300CFC}
    HKCR\CLSID\{2F15A490-C0F2-4321-BAB5-3FC6C1300CFC}
    HKCR\CLSID\{2F15A490-C0F2-4321-BAB5-3FC6C1300CFC}\InprocServer32
    HKCR\CLSID\{2F15A490-C0F2-4321-BAB5-3FC6C1300CFC}\InprocServer32#ThreadingModel
    HKLM\Software\Classes\CLSID\{634BBAB7-3F60-4426-944F-A62B9007F67F}
    HKCR\CLSID\{634BBAB7-3F60-4426-944F-A62B9007F67F}
    HKCR\CLSID\{634BBAB7-3F60-4426-944F-A62B9007F67F}\InprocServer32
    HKCR\CLSID\{634BBAB7-3F60-4426-944F-A62B9007F67F}\InprocServer32#ThreadingModel
    HKLM\Software\Classes\CLSID\{A95B2816-1D7E-4561-A202-68C0DE02353A}
    HKCR\CLSID\{A95B2816-1D7E-4561-A202-68C0DE02353A}
    HKCR\CLSID\{A95B2816-1D7E-4561-A202-68C0DE02353A}\InprocServer32
    HKCR\CLSID\{A95B2816-1D7E-4561-A202-68C0DE02353A}\InprocServer32#ThreadingModel
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2F15A490-C0F2-4321-BAB5-3FC6C1300CFC}
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{634BBAB7-3F60-4426-944F-A62B9007F67F}
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A95B2816-1D7E-4561-A202-68C0DE02353A}
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks#{634BBAB7-3F60-4426-944F-A62B9007F67F}
    Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\yayvwxv
    HKCR\CLSID\{634BBAB7-3F60-4426-944F-A62B9007F67F}
    HKCR\CLSID\{A95B2816-1D7E-4561-A202-68C0DE02353A}
    C:\WINDOWS\SYSTEM32\GEBAXYA.DLL
    C:\WINDOWS\SYSTEM32\PMNMNOP.DLL

    Trojan.Downloader-NewJuan/VM
    C:\WINDOWS\SYSTEM32\MGUTKVNM.DLL
    C:\WINDOWS\SYSTEM32\MGUTKVNM.DLL

    Unclassified.Unknown Origin
    HKLM\Software\Classes\CLSID\{11A69AE4-FBED-4832-A2BF-45AF82825583}
    HKCR\CLSID\{11A69AE4-FBED-4832-A2BF-45AF82825583}
    HKCR\CLSID\{11A69AE4-FBED-4832-A2BF-45AF82825583}
    HKCR\CLSID\{11A69AE4-FBED-4832-A2BF-45AF82825583}\InprocServer32
    HKCR\CLSID\{11A69AE4-FBED-4832-A2BF-45AF82825583}\InprocServer32#ThreadingModel
    HKLM\Software\Microsoft\Internet Explorer\Toolbar#{11A69AE4-FBED-4832-A2BF-45AF82825583}
    HKU\.DEFAULT\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser#{11A69AE4-FBED-4832-A2BF-45AF82825583}
    HKU\S-1-5-21-1046023807-3404959257-3746350551-1008\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser#{11A69AE4-FBED-4832-A2BF-45AF82825583}
    HKU\S-1-5-18\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser#{11A69AE4-FBED-4832-A2BF-45AF82825583}
    C:\PROGRAM FILES\TTC.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP12\A0011578.EXE

    Adware.Tracking Cookie
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][3].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][9].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][4].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason postma[email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][3].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][3].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][3].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][4].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][3].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][3].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][8].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected]=0_[2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected]_41221d046eaa2d418d7b_e60b5155bb60972986da4ef873dbed86_http__[3].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][3].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][10].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][3].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][7].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][10].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][11].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][12].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][13].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][14].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][15].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][17].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][3].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][4].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][5].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][6].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][7].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][8].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][9].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][3].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][4].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][5].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][6].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][7].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][8].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][3].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][4].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][5].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][7].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][3].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][3].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][4].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][5].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][10].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][11].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][12].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][13].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][3].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][4].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][5].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][6].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][7].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][8].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][9].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][1].txt
    C:\Documents and Settings\Jason Postma\Cookies\jason [email protected][2].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][2].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][2].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][2].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][2].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][2].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][2].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][2].txt

    Trojan.Malware
    HKCR\CLSID\{357A87ED-3E5D-437d-B334-DEB7EB4982A3}
    HKCR\CLSID\{357A87ED-3E5D-437d-B334-DEB7EB4982A3}#IT
    HKCR\CLSID\{357A87ED-3E5D-437d-B334-DEB7EB4982A3}#Bin

    Adware.Web Buying
    HKU\.DEFAULT\Software\WebBuying
    HKU\S-1-5-18\Software\WebBuying

    Adware.ClickSpring/Yazzle
    C:\QOOBOX\QUARANTINE\C\PROGRAM FILES\COMMON FILES\YAZZLE1122OINADMIN.EXE.VIR

    Adware.WebBuying Assistant-Installer
    C:\QOOBOX\QUARANTINE\C\PROGRAM FILES\WEB BUYING\V1.8.5\WBUNINST.EXE.VIR
    C:\QOOBOX\QUARANTINE\C\PROGRAM FILES\WEB BUYING\V1.8.5\WEBBUYING.EXE.VIR
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP12\A0011591.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP23\A0012887.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP23\A0012888.EXE

    Trojan.Unknown Origin
    C:\QOOBOX\QUARANTINE\C\WINDOWS\B147.EXE.VIR
    C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\G2\CAWS83122.EXE.VIR
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP14\A0011612.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP14\A0011614.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP2\A0000021.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP2\A0000022.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP23\A0012878.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP23\A0012891.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP3\A0000131.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP5\A0001276.VBS
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP5\A0001280.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP5\A0001285.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP6\A0002286.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP7\A0002323.EXE
    C:\WINDOWS\MROFINU1000106.EXE
    C:\WINDOWS\UG9ZDG1H\O36WX3Y1.VBS

    Adware.Adservs
    C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\A1\RARNDRLL2.EXE.VIR
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP12\A0011573.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP12\A0011592.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP2\A0000029.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP23\A0012890.EXE

    Adware.WebBuying Assistant/Resident
    C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\HOYSFAH.DLL.VIR
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP23\A0012883.DLL

    Adware.eZula
    C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\KJKNRLJK.EXE.VIR
    C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\MRNNABPW.EXE.VIR
    C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\QVUOXUAN.EXE.VIR
    C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\WYGFYJMN.EXE.VIR
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP10\A0008555.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP23\A0012879.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP23\A0012880.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP23\A0012881.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP23\A0012882.EXE

    Trojan.Downloader-Gen/Installer
    C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\R2\WR31DRS.EXE.VIR
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP23\A0012892.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP5\A0001284.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP5\A0001286.EXE

    Adware.ClickSpring-Variant
    C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\SSEMBL~1\JAVAW.EXE.VIR
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP2\A0000039.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP22\A0012827.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP23\A0012889.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP5\A0002257.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP6\A0002301.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP7\A0002338.EXE

    Trojan.Downloader-Gen/BundleBase
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP14\A0011627.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP22\A0012830.EXE
    C:\WINDOWS\SYSTEM32\MZ02R\MZ02R1065.EXE
    C:\WINDOWS\Prefetch\MZ02R1065.EXE-1AF6301C.pf

    Adware.ClickSpring
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP2\A0000023.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP3\A0000173.DLL

    Trojan.Downloader-Gen/Hammer
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP22\A0012849.DLL

    Trojan.Downloader-Gen
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP3\A0000127.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP3\A0000133.EXE

    Unclassified.Unknown Origin/System
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP3\A0000135.DLL

    Adware.webHancer
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP3\A0000172.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP5\A0001281.DLL

    TargetSaver, Inc. Process
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP5\A0001277.EXE

    NavExcel/NavHelper Adware Toolbar and Browser Helper Object
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP6\A0002291.DLL

    Trojan.Downloader-Gen/RetAd
    C:\WINDOWS\RETADPU11.EXE.TMP

    Adware.Vundo Variant/Rel
    C:\WINDOWS\SYSTEM32\ABADD.BAK1
    C:\WINDOWS\SYSTEM32\ABADD.INI

    Trojan.Downloader-Gen/DDC
    C:\WINDOWS\SYSTEM32\MYVKGMRP.EXE
    C:\WINDOWS\SYSTEM32\YFWQACVY.EXE
    C:\WINDOWS\SYSTEM32\YGYOSIUC.EXE
    C:\WINDOWS\Prefetch\YGYOSIUC.EXE-12C1E9EF.pf


    (CONTINUED).....
     
  6. jpisme5573

    jpisme5573 Thread Starter

    Joined:
    Nov 8, 2007
    Messages:
    12
    .....(CONTINUED)


    ======NEW HIJACKTHIS LOG======

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 3:04:15 AM, on 11/10/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\LEXBCES.EXE
    C:\WINDOWS\system32\LEXPPS.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\hkcmd.exe
    C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe
    C:\Program Files\Dell\Media Experience\PCMService.exe
    C:\WINDOWS\system32\dla\tfswctrl.exe
    C:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\Program Files\MUSICMATCH\Musicmatch Jukebox\mmtask.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\WildTangent\Apps\CDA\GameDrvr.exe
    C:\Program Files\DIGStream\digstream.exe
    C:\Program Files\ESPNRunTime\DIGServices.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\Lexmark 1200 Series\lxczbmgr.exe
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
    C:\Program Files\Lexmark 1200 Series\lxczbmon.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\PROGRA~1\COMMON~1\AOL\ACS\acsd.exe
    C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
    C:\Program Files\Norton Internet Security\Norton AntiVirus\navapsvc.exe
    C:\Program Files\Digital Line Detect\DLG.exe
    C:\Program Files\Spyware Doctor\sdhelp.exe
    C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    C:\WINDOWS\System32\PAStiSvc.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\wanmpsvc.exe
    C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
    C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\Kodak Software Updater.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.dell4me.com/myway
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = 192.168.100.11
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
    O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {59D34A39-6709-479F-9128-8D32ECAB81BF} - C:\WINDOWS\system32\ddaba.dll (file missing)
    O2 - BHO: (no name) - {5B0D2586-55EF-4619-A19C-5D9C1EF48AAD} - \
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~1\tools\iesdsg.dll
    O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O2 - BHO: (no name) - {76ED0A23-8C2D-419E-B983-17E1E6791877} - \
    O2 - BHO: CNisExtBho Class - {9ECB9560-04F9-4bbc-943D-298DDF1699E1} - C:\Program Files\Common Files\Symantec Shared\AdBlocking\NISShExt.dll
    O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
    O2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton Internet Security\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Web assistant - {0B53EAC3-8D69-4b9e-9B19-A37C9A5676A7} - C:\Program Files\Common Files\Symantec Shared\AdBlocking\NISShExt.dll
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton Internet Security\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
    O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
    O4 - HKLM\..\Run: [DVDLauncher] "C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe"
    O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Dell\Media Experience\PCMService.exe"
    O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
    O4 - HKLM\..\Run: [UpdateManager] "C:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe" /r
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
    O4 - HKLM\..\Run: [URLLSTCK.exe] C:\Program Files\Norton Internet Security\UrlLstCk.exe
    O4 - HKLM\..\Run: [mmtask] C:\Program Files\MUSICMATCH\Musicmatch Jukebox\mmtask.exe
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [WildTangent CDA] "C:\Program Files\WildTangent\Apps\CDA\GameDrvr.exe" /startup "C:\Program Files\WildTangent\Apps\CDA\cdaEngine0500.dll"
    O4 - HKLM\..\Run: [DIGStream] C:\Program Files\DIGStream\digstream.exe
    O4 - HKLM\..\Run: [DIGServices] C:\Program Files\ESPNRunTime\DIGServices.exe /brand=ESPN /priority=0 /poll=24
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [Lexmark 1200 Series] "C:\Program Files\Lexmark 1200 Series\lxczbmgr.exe"
    O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
    O4 - HKLM\..\Run: [c4bac5b8] rundll32.exe "C:\WINDOWS\system32\pvuxcgrk.dll",b
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [Ido] "C:\Documents and Settings\Jason Postma\My Documents\??crosoft.NET\??plorer.exe"
    O4 - HKCU\..\Run: [Tzxkexs] "C:\Documents and Settings\Jason Postma\Application Data\?icrosoft\?hkdsk.exe"
    O4 - HKCU\..\Run: [Iua] C:\WINDOWS\SYSTEM32\T?sks\n?tepad.exe
    O4 - HKCU\..\Run: [Mvbi] "C:\Documents and Settings\Jason Postma\My Documents\?ymbols\?serinit.exe"
    O4 - HKCU\..\Run: [Cpnui] "C:\Program Files\Common Files\?ppPatch\m?iexec.exe"
    O4 - HKCU\..\Run: [Wxvghbe] "C:\Documents and Settings\Jason Postma\My Documents\??mantec\r?ndll32.exe"
    O4 - HKCU\..\Run: [Kua] "C:\Program Files\W?nSxS\?poolsv.exe"
    O4 - HKCU\..\Run: [Jotme] "C:\Program Files\??curity\n?lookup.exe"
    O4 - HKCU\..\Run: [Pgom] "C:\Documents and Settings\Jason Postma\My Documents\F?nts\d?dplay.exe"
    O4 - HKCU\..\Run: [Hwakbih] C:\WINDOWS\??stem32\n?lookup.exe
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - HKUS\S-1-5-18\..\Run: [Spyware Doctor] (User 'SYSTEM')
    O4 - HKUS\S-1-5-18\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\GetFlash.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [Spyware Doctor] (User 'Default user')
    O4 - HKUS\.DEFAULT\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\GetFlash.exe (User 'Default user')
    O4 - Global Startup: America Online 9.0 Tray Icon.lnk = C:\Program Files\America Online 9.0\aoltray.exe
    O4 - Global Startup: Digital Line Detect.lnk = ?
    O4 - Global Startup: Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
    O4 - Global Startup: KODAK Software Updater.lnk = C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\Kodak Software Updater.exe
    O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
    O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycmap.htm
    O8 - Extra context menu item: Yahoo! &SMS - file:///C:\Program Files\Yahoo!\Common/ycsms.htm
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: AbsolutePoker.net - {5E72AD5A-20DF-4ca4-9B7B-D9717FFDE0C5} - C:\Documents and Settings\All Users\Start Menu\Programs\AbsolutePoker NET\AbsolutePoker NET.lnk
    O9 - Extra 'Tools' menuitem: AbsolutePoker.net - {5E72AD5A-20DF-4ca4-9B7B-D9717FFDE0C5} - C:\Documents and Settings\All Users\Start Menu\Programs\AbsolutePoker NET\AbsolutePoker NET.lnk
    O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
    O9 - Extra button: MUSICMATCH MX Web Player - {d81ca86b-ef63-42af-bee3-4502d9a03c2d} - http://wwws.musicmatch.com/mmz/openWebRadio.html (file missing)
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://photos.walmart.com/WalmartActivia.cab
    O16 - DPF: {55027008-315F-4F45-BBC3-8BE119764741} (Slide Image Uploader Control) - http://www.slide.com/uploader/SlideImageUploader.cab
    O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~1\GOEC62~1.DLL
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Adobe LM Service - Unknown owner - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: AOL Connectivity Service (AOL ACS) - America Online, Inc. - C:\PROGRA~1\COMMON~1\AOL\ACS\acsd.exe
    O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    O23 - Service: Symantec Network Proxy (ccProxy) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
    O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
    O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
    O23 - Service: GoogleDesktopManager - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Kodak Camera Connection Software (KodakCCS) - Unknown owner - C:\WINDOWS\system32\drivers\KodakCCS.exe (file missing)
    O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
    O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton Internet Security\Norton AntiVirus\navapsvc.exe
    O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton Internet Security\Norton AntiVirus\SAVScan.exe
    O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
    O23 - Service: PC Tools Spyware Doctor (SDhelper) - PC Tools Research Pty Ltd - C:\Program Files\Spyware Doctor\sdhelp.exe
    O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    O23 - Service: STI Simulator - Unknown owner - C:\WINDOWS\System32\PAStiSvc.exe
    O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
    O23 - Service: Viewpoint Manager Service - Unknown owner - C:\Program Files\Viewpoint\Common\ViewpointService.exe (file missing)
    O23 - Service: WAN Miniport (ATW) Service (WANMiniportService) - America Online, Inc. - C:\WINDOWS\wanmpsvc.exe

    --
    End of file - 13439 bytes


    =============
     
  7. JSntgRvr

    JSntgRvr Retired Moderator and Malware Specialist

    Joined:
    Jul 1, 2003
    Messages:
    18,552
    First Name:
    José
    Hi, jpisme5573 :)

    • Copy the entire contents of the Quote Box below to Notepad.
    • Name the file as CFScript.txt
    • Change the Save as Type to All Files
    • and Save it on the desktop
    [​IMG]

    Once saved, referring to the picture above, drag CFScript.txt into ComboFix.exe, and post back the resulting report along with a Hijackthis log.
     
  8. jpisme5573

    jpisme5573 Thread Starter

    Joined:
    Nov 8, 2007
    Messages:
    12
    === COMBO FIX LOG ====

    ComboFix 07-11-08.1 - Jason Postma 2007-11-10 10:02:26.3 - NTFSx86
    Running from: C:\Documents and Settings\Jason Postma\Desktop\ComboFix.exe
    Command switches used :: C:\Documents and Settings\Jason Postma\Desktop\CFScript.txt
    * Created a new restore point

    FILE
    C:\WINDOWS\mrofinu1000106.exe
    C:\WINDOWS\quit.exe
    C:\WINDOWS\SYSTEM32\ahftiuel.dll
    C:\WINDOWS\SYSTEM32\bqnkfxvj.dll
    C:\WINDOWS\SYSTEM32\caobmbwo.dll
    C:\WINDOWS\SYSTEM32\ddaba.dll
    C:\WINDOWS\SYSTEM32\gebaxya.dll
    C:\WINDOWS\SYSTEM32\lgwsebkb.dll
    C:\WINDOWS\SYSTEM32\mgutkvnm.dll
    C:\WINDOWS\SYSTEM32\msbasm.dat
    C:\WINDOWS\SYSTEM32\myvkgmrp.exe
    C:\WINDOWS\SYSTEM32\odvvqtvq.dll
    C:\WINDOWS\SYSTEM32\ojsjxxus.dll
    C:\WINDOWS\SYSTEM32\pmnmnop.dll
    C:\WINDOWS\SYSTEM32\pvrwpacy.dll
    C:\WINDOWS\system32\pvuxcgrk.dll
    C:\WINDOWS\SYSTEM32\pvuxcgrk.dll
    C:\WINDOWS\SYSTEM32\yayvwxv.dll
    C:\WINDOWS\SYSTEM32\yfwqacvy.exe
    C:\WINDOWS\SYSTEM32\ygyosiuc.exe
    C:\WINDOWS\SYSTEM32\yvptbags.dll
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\temp\mZOr
    C:\temp\mZOr\tOasF.log
    C:\WINDOWS\quit.exe
    C:\WINDOWS\SYSTEM32\msbasm.dat
    C:\WINDOWS\SYSTEM32\Mz02r
    C:\WINDOWS\SYSTEM32\odvvqtvq.dll
    C:\WINDOWS\system32\pvrwpacy.dllbox
    C:\WINDOWS\system32\pvuxcgrk.dll
    C:\WINDOWS\UG9zdG1h

    .
    ((((((((((((((((((((((((( Files Created from 2007-10-10 to 2007-11-10 )))))))))))))))))))))))))))))))
    .

    2007-11-10 01:03 <DIR> d-------- C:\Program Files\SUPERAntiSpyware
    2007-11-10 01:03 <DIR> d-------- C:\Documents and Settings\Jason Postma\Application Data\SUPERAntiSpyware.com
    2007-11-10 01:03 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
    2007-11-10 01:01 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
    2007-11-09 21:57 51,200 --a------ C:\WINDOWS\NirCmd.exe
    2007-11-09 21:42 <DIR> d-------- C:\VundoFix Backups
    2007-11-09 21:12 <DIR> d-------- C:\Program Files\Common Files\Java
    2007-11-08 19:33 <DIR> d-------- C:\Program Files\Trend Micro
    2007-11-04 18:37 155,648 --a------ C:\WINDOWS\SYSTEM32\igfxres.dll
    2007-11-04 18:14 16,384 --a--c--- C:\WINDOWS\SYSTEM32\DLLCACHE\isignup.exe
    2007-11-04 17:58 24,661 --a------ C:\WINDOWS\SYSTEM32\spxcoins.dll
    2007-11-04 17:58 24,661 --a--c--- C:\WINDOWS\SYSTEM32\DLLCACHE\spxcoins.dll
    2007-11-04 17:58 13,312 --a------ C:\WINDOWS\SYSTEM32\irclass.dll
    2007-11-04 17:58 13,312 --a--c--- C:\WINDOWS\SYSTEM32\DLLCACHE\irclass.dll
    2007-11-04 12:59 <DIR> d-------- C:\Program Files\Windows Defender

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2007-11-10 18:13 --------- d-----w C:\Documents and Settings\All Users\Application Data\DIGStream
    2007-11-10 05:38 --------- d-----w C:\Program Files\Common Files\Symantec Shared
    2007-11-10 05:15 --------- d-----w C:\Program Files\Java
    2007-11-08 06:16 --------- d-----w C:\Documents and Settings\Jason Postma\Application Data\Avant Browser
    2007-11-08 06:12 --------- d--h--r C:\Documents and Settings\Jason Postma\Application Data\yahoo!
    2007-10-31 21:37 --------- d-----w C:\Program Files\Modem Helper
    2005-05-01 00:18 7,177,320 -c--a-w C:\Documents and Settings\Random\yahoo_poker1-1_tm5-3.exe
    2005-02-27 01:46 1,865,291 -c--a-w C:\Documents and Settings\Random\setup_ares.exe
    2007-07-31 05:21:04 848 --sha-w C:\WINDOWS\SYSTEM32\KGyGaAvL.sys
    .

    ((((((((((((((((((((((((((((( [email protected]_22.37.02.34 )))))))))))))))))))))))))))))))))))))))))
    .
    + 2007-11-10 09:03:43 29,696 ----a-r C:\WINDOWS\Installer\{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}\IconCDDCBBF11.exe
    + 2007-11-10 09:03:43 18,944 ----a-r C:\WINDOWS\Installer\{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}\IconCDDCBBF13.exe
    + 2007-11-10 09:03:43 65,024 ----a-r C:\WINDOWS\Installer\{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}\IconCDDCBBF15.exe
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{59D34A39-6709-479F-9128-8D32ECAB81BF}]
    C:\WINDOWS\system32\ddaba.dll

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "IgfxTray"="C:\WINDOWS\system32\igfxtray.exe" [2003-10-02 10:37]
    "HotKeysCmds"="C:\WINDOWS\system32\hkcmd.exe" [2003-10-02 10:19]
    "DVDLauncher"="C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe" [2004-04-11 08:43]
    "PCMService"="C:\Program Files\Dell\Media Experience\PCMService.exe" [2004-04-11 17:15]
    "dla"="C:\WINDOWS\system32\dla\tfswctrl.exe" [2004-03-14 22:04]
    "UpdateManager"="C:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe" [2003-08-18 22:01]
    "ccApp"="C:\Program Files\Common Files\Symantec Shared\ccApp.exe" [2003-11-21 13:04]
    "URLLSTCK.exe"="C:\Program Files\Norton Internet Security\UrlLstCk.exe" [2003-11-21 13:04]
    "mmtask"="C:\Program Files\MUSICMATCH\Musicmatch Jukebox\mmtask.exe" [2004-10-08 08:49]
    "TkBellExe"="C:\Program Files\Common Files\Real\Update_OB\realsched.exe" [2005-02-06 11:53]
    "WildTangent CDA"="C:\Program Files\WildTangent\Apps\CDA\GameDrvr.exe" [2005-03-28 17:24]
    "DIGStream"="C:\Program Files\DIGStream\digstream.exe" [2005-05-18 13:49]
    "DIGServices"="C:\Program Files\ESPNRunTime\DIGServices.exe" [2005-04-01 14:37]
    "iTunesHelper"="C:\Program Files\iTunes\iTunesHelper.exe" [2005-10-18 11:58]
    "QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2006-12-27 09:42]
    "Lexmark 1200 Series"="C:\Program Files\Lexmark 1200 Series\lxczbmgr.exe" [2006-07-12 21:22]
    "Windows Defender"="C:\Program Files\Windows Defender\MSASCui.exe" [2006-11-03 19:20]
    "SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe" [2007-09-25 01:11]

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "MSMSGS"="C:\Program Files\Messenger\msmsgs.exe" [2004-10-13 08:24]
    "SUPERAntiSpyware"="C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2007-06-21 14:06]

    [HKEY_USERS\.default\software\microsoft\windows\currentversion\runonce]
    "FlashPlayerUpdate"=C:\WINDOWS\system32\Macromed\Flash\GetFlash.exe
    "tscuninstall"=%systemroot%\system32\tscupgrd.exe

    C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
    America Online 9.0 Tray Icon.lnk - C:\Program Files\America Online 9.0\aoltray.exe [2004-10-13 18:27:50]
    Digital Line Detect.lnk - C:\Program Files\Digital Line Detect\DLG.exe [2004-10-13 18:25:22]
    Kodak EasyShare software.lnk - C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe [2006-06-02 03:29:26]
    KODAK Software Updater.lnk - C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\Kodak Software Updater.exe [2004-02-13 13:12:08]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
    "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= C:\Program Files\SUPERAntiSpyware\SASSEH.DLL [2006-12-20 13:55 77824]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
    C:\Program Files\SUPERAntiSpyware\SASWINLO.dll 2007-04-19 13:41 294912 C:\Program Files\SUPERAntiSpyware\SASWINLO.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
    "AppInit_DLLs"=C:\PROGRA~1\Google\GOOGLE~1\GOEC62~1.DLL

    S3 PAC207;Webcam Basic;C:\WINDOWS\system32\DRIVERS\pfc027.sys

    .
    Contents of the 'Scheduled Tasks' folder
    "2007-11-10 18:16:24 C:\WINDOWS\Tasks\MP Scheduled Scan.job"
    - C:\Program Files\Windows Defender\MpCmdRun.exe
    .
    **************************************************************************

    catchme 0.3.1250 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2007-11-10 10:16:40
    Windows 5.1.2600 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    Completion time: 2007-11-10 10:18:39 - machine was rebooted
    C:\ComboFix2.txt ... 2007-11-10 00:34
    .
    --- E O F ---


    ====== HIJACKTHIS LOG ======

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:19:36 AM, on 11/10/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\LEXBCES.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\LEXPPS.EXE
    C:\PROGRA~1\COMMON~1\AOL\ACS\acsd.exe
    C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
    C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
    C:\Program Files\Norton Internet Security\Norton AntiVirus\navapsvc.exe
    C:\Program Files\Spyware Doctor\sdhelp.exe
    C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    C:\WINDOWS\System32\PAStiSvc.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\wanmpsvc.exe
    C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\system32\hkcmd.exe
    C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe
    C:\Program Files\Dell\Media Experience\PCMService.exe
    C:\WINDOWS\system32\dla\tfswctrl.exe
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\Program Files\MUSICMATCH\Musicmatch Jukebox\mmtask.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\WildTangent\Apps\CDA\GameDrvr.exe
    C:\Program Files\DIGStream\digstream.exe
    C:\Program Files\ESPNRunTime\DIGServices.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\Lexmark 1200 Series\lxczbmgr.exe
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Program Files\Lexmark 1200 Series\lxczbmon.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\Digital Line Detect\DLG.exe
    C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
    C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\Kodak Software Updater.exe
    C:\WINDOWS\system32\notepad.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.dell4me.com/myway
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = 192.168.100.11
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
    O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {59D34A39-6709-479F-9128-8D32ECAB81BF} - C:\WINDOWS\system32\ddaba.dll (file missing)
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~1\tools\iesdsg.dll
    O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O2 - BHO: CNisExtBho Class - {9ECB9560-04F9-4bbc-943D-298DDF1699E1} - C:\Program Files\Common Files\Symantec Shared\AdBlocking\NISShExt.dll
    O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
    O2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton Internet Security\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Web assistant - {0B53EAC3-8D69-4b9e-9B19-A37C9A5676A7} - C:\Program Files\Common Files\Symantec Shared\AdBlocking\NISShExt.dll
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton Internet Security\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
    O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
    O4 - HKLM\..\Run: [DVDLauncher] "C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe"
    O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Dell\Media Experience\PCMService.exe"
    O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
    O4 - HKLM\..\Run: [UpdateManager] "C:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe" /r
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
    O4 - HKLM\..\Run: [URLLSTCK.exe] C:\Program Files\Norton Internet Security\UrlLstCk.exe
    O4 - HKLM\..\Run: [mmtask] C:\Program Files\MUSICMATCH\Musicmatch Jukebox\mmtask.exe
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [WildTangent CDA] "C:\Program Files\WildTangent\Apps\CDA\GameDrvr.exe" /startup "C:\Program Files\WildTangent\Apps\CDA\cdaEngine0500.dll"
    O4 - HKLM\..\Run: [DIGStream] C:\Program Files\DIGStream\digstream.exe
    O4 - HKLM\..\Run: [DIGServices] C:\Program Files\ESPNRunTime\DIGServices.exe /brand=ESPN /priority=0 /poll=24
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [Lexmark 1200 Series] "C:\Program Files\Lexmark 1200 Series\lxczbmgr.exe"
    O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - HKUS\S-1-5-18\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\GetFlash.exe (User 'SYSTEM')
    O4 - HKUS\S-1-5-18\..\RunOnce: [tscuninstall] %systemroot%\system32\tscupgrd.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\GetFlash.exe (User 'Default user')
    O4 - Global Startup: America Online 9.0 Tray Icon.lnk = C:\Program Files\America Online 9.0\aoltray.exe
    O4 - Global Startup: Digital Line Detect.lnk = ?
    O4 - Global Startup: Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
    O4 - Global Startup: KODAK Software Updater.lnk = C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\Kodak Software Updater.exe
    O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
    O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycmap.htm
    O8 - Extra context menu item: Yahoo! &SMS - file:///C:\Program Files\Yahoo!\Common/ycsms.htm
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: AbsolutePoker.net - {5E72AD5A-20DF-4ca4-9B7B-D9717FFDE0C5} - C:\Documents and Settings\All Users\Start Menu\Programs\AbsolutePoker NET\AbsolutePoker NET.lnk
    O9 - Extra 'Tools' menuitem: AbsolutePoker.net - {5E72AD5A-20DF-4ca4-9B7B-D9717FFDE0C5} - C:\Documents and Settings\All Users\Start Menu\Programs\AbsolutePoker NET\AbsolutePoker NET.lnk
    O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
    O9 - Extra button: MUSICMATCH MX Web Player - {d81ca86b-ef63-42af-bee3-4502d9a03c2d} - http://wwws.musicmatch.com/mmz/openWebRadio.html (file missing)
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://photos.walmart.com/WalmartActivia.cab
    O16 - DPF: {55027008-315F-4F45-BBC3-8BE119764741} (Slide Image Uploader Control) - http://www.slide.com/uploader/SlideImageUploader.cab
    O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~1\GOEC62~1.DLL
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Adobe LM Service - Unknown owner - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: AOL Connectivity Service (AOL ACS) - America Online, Inc. - C:\PROGRA~1\COMMON~1\AOL\ACS\acsd.exe
    O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    O23 - Service: Symantec Network Proxy (ccProxy) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
    O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
    O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
    O23 - Service: GoogleDesktopManager - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Kodak Camera Connection Software (KodakCCS) - Unknown owner - C:\WINDOWS\system32\drivers\KodakCCS.exe (file missing)
    O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
    O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton Internet Security\Norton AntiVirus\navapsvc.exe
    O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton Internet Security\Norton AntiVirus\SAVScan.exe
    O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
    O23 - Service: PC Tools Spyware Doctor (SDhelper) - PC Tools Research Pty Ltd - C:\Program Files\Spyware Doctor\sdhelp.exe
    O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    O23 - Service: STI Simulator - Unknown owner - C:\WINDOWS\System32\PAStiSvc.exe
    O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
    O23 - Service: Viewpoint Manager Service - Unknown owner - C:\Program Files\Viewpoint\Common\ViewpointService.exe (file missing)
    O23 - Service: WAN Miniport (ATW) Service (WANMiniportService) - America Online, Inc. - C:\WINDOWS\wanmpsvc.exe

    --
    End of file - 12240 bytes

    =======
     
  9. JSntgRvr

    JSntgRvr Retired Moderator and Malware Specialist

    Joined:
    Jul 1, 2003
    Messages:
    18,552
    First Name:
    José
    Hi, jpisme5573 :)

    Please re-open HiJackThis and scan. Check the boxes next to all the entries listed below.

    O2 - BHO: (no name) - {59D34A39-6709-479F-9128-8D32ECAB81BF} - C:\WINDOWS\system32\ddaba.dll (file missing)

    Now close all windows and browsers, other than HiJackThis, then click Fix Checked.

    Close Hijackthis.

    The rest looks clear. How is the computer doing?
     
  10. jpisme5573

    jpisme5573 Thread Starter

    Joined:
    Nov 8, 2007
    Messages:
    12
    It's running better than it has at any time in probably the last two years. This clean-up was LONG overdue. You guys are awesome. Thanks.
     
  11. JSntgRvr

    JSntgRvr Retired Moderator and Malware Specialist

    Joined:
    Jul 1, 2003
    Messages:
    18,552
    First Name:
    José
    Hi, jpisme5573. :)

    Congratulations.[​IMG]

    Reset and Re-enable your System Restore to remove bad files that have been backed up by Windows. The files in System Restore are protected to prevent any programmes changing them. This is the only way to clean these files: (You will lose all previous restore points which are likely to be infected.)

    To reset your restore points, please note that you will need to log into your computer with an account which has full administrator access. You will know if the account has administrator access because you will be able to see the System Restore tab. If the tab is missing, you are logged in under a limited account.

    (Windows XP)

    1. Turn off System Restore.
    On the Desktop, right-click My Computer.
    Click Properties.
    Click the System Restore tab.
    Check Turn off System Restore.
    Click Apply, and then click OK.

    2. Reboot.

    3. Turn ON System Restore.

    On the Desktop, right-click My Computer.
    Click Properties.
    Click the System Restore tab.
    UN-Check *Turn off System Restore*.
    Click Apply, and then click OK..

    Since the tools we used to scan the computer, as well as tools to delete files and folders, are no longer needed, they should be removed, as well as the folders created by these tools.
    • Click START then RUN
    • Now type Combofix /u in the runbox and click OK. Note the space between the X and the /U, it needs to be there.

      • [​IMG]

    • If the disclaimer notice is displayed, select "2" and press Enter

    The above procedure will:
    • Delete the following:
      • ComboFix and its associated files and folders.
      • VundoFix backups, if present
      • The C:\Deckard folder, if present
      • The C:_OtMoveIt folder, if present
    • Reset the clock settings.
    • Hide file extensions, if required.
    • Hide System/Hidden files, if required.
    • Set a new, clean Restore Point.

    Create a Restore point (If the above process fails):
    1. Click Start, point to All Programs, point to Accessories, point to System Tools, and then click System Restore.
    2. In the System Restore dialog box, click Create a restore point, and then click Next.
    3. Type a description for your restore point, such as "After Cleanup", then click Create.

    The following is a list of tools and utilities that I like to suggest to people. This list is full of great tools and utilities to help you understand how you got infected and how to keep from getting infected again.
    1. Spybot Search & Destroy - Uber powerful tool which can search and annhilate nasties that make it onto your system. Now with an Immunize section that will help prevent future infections.
    2. AdAware - Another very powerful tool which searches and kills nasties that infect your system. AdAware and Spybot Search & Destroy compliment each other very well.
    3. SpywareBlaster - Great prevention tool to keep nasties from installing on your system.
    4. IE-SpyAd - puts over 5000 sites in your restricted zone so you'll be protected when you visit innocent-looking sites that aren't actually innocent at all.
    5. CleanUP! - Cleans temporary files from IE and Windows, empties the recycle bin and more. Great tool to help speed up your computer and knock out those nasties that like to reside in the temp folders.
    6. Windows Updates - It is very important to make sure that both Internet Explorer and Windows are kept current with the latest critical security patches from Microsoft. To do this just start Internet Explorer and select Tools > Windows Update, and follow the online instructions from there.
    7. Google Toolbar - Free google toolbar that allows you to use the powerful Google search engine from the bar, but also blocks pop up windows.
    8. Trillian or Miranda-IM - These are Malware free Instant Messenger programs which allow you to connect to multiple IM services in one program! (AOL, Yahoo, ICQ, IRC, MSN)
    9. ERUNT (Emergency Recovery Utility NT) allows you to keep a complete backup of your registry and restore it when needed. The standard registry backup options that come with Windows back up most of the registry but not all of it. ERUNT however creates a complete backup set, including the Security hive and user related sections. ERUNT is easy to use and since it creates a full backup, there are no options or choices other than to select the location of the backup files. The backup set includes a small executable that will launch the registry restore if needed.
    To find out more information about how you got infected in the first place and some great guidelines to follow to prevent future infections you can read this article by Tony Klein.

    Click Here for some advise from our security Experts.

    Please use the thread's Tools and mark this thread as "Solved".

    Best wishes! [​IMG]
     
  12. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/649662

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice