1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Solved: Total Secure 2009

Discussion in 'Virus & Other Malware Removal' started by Johnny Whoops, Oct 2, 2008.

Thread Status:
Not open for further replies.
Advertisement
  1. Johnny Whoops

    Johnny Whoops Thread Starter

    Joined:
    Oct 2, 2008
    Messages:
    6
    Hi,

    I'm a victim of Total Secure 2009, hoping to find some help. It installed itself onto my system, which is running Windows XP SP2. AVG removed a few files, but I'm still getting pop-up dialog boxes when I open folders in Windows Explorer.

    Here's a screen shot of the dialog box:

    [​IMG]

    Here's a screenshot of my virus vault:

    [​IMG]

    And here's my HJT log:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:53:30 AM, on 10/2/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.5730.0011)
    Boot mode: Normal

    Running processes:
    F:\WINDOWS\System32\smss.exe
    F:\WINDOWS\system32\winlogon.exe
    F:\WINDOWS\system32\services.exe
    F:\WINDOWS\system32\lsass.exe
    F:\WINDOWS\system32\svchost.exe
    F:\WINDOWS\System32\svchost.exe
    F:\WINDOWS\system32\spoolsv.exe
    F:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    F:\Program Files\Bonjour\mDNSResponder.exe
    F:\WINDOWS\eHome\ehRecvr.exe
    F:\WINDOWS\eHome\ehSched.exe
    F:\WINDOWS\system32\nvsvc32.exe
    F:\Program Files\Sling Media\SlingAgent\SlingAgentService.exe
    F:\WINDOWS\system32\svchost.exe
    F:\Program Files\Viewpoint\Common\ViewpointService.exe
    F:\PROGRA~1\AVG\AVG8\avgrsx.exe
    F:\PROGRA~1\AVG\AVG8\avgemc.exe
    F:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
    F:\PROGRA~1\AVG\AVG8\avgtray.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
    F:\WINDOWS\system32\dllhost.exe
    F:\WINDOWS\system32\wscntfy.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\WINDOWS\explorer.exe
    F:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    F3 - REG:win.ini: load=
    F3 - REG:win.ini: run=
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - F:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - F:\Program Files\AVG\AVG8\avgssie.dll
    O2 - BHO: (no name) - {42C891CC-E792-4F66-826A-8567A83509A2} - F:\WINDOWS\system32\ddcCSJaw.dll (file missing)
    O2 - BHO: AlpGld.Tb6 - {57BE2636-F271-4151-9D4A-40A2663E4FD7} - F:\WINDOWS\system32\sysbase32.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - F:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O2 - BHO: (no name) - {7AA07AE6-01EF-44EC-93CA-9D7CD41CCDB6} - (no file)
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE F:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "F:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
    O4 - HKLM\..\Run: [AVG8_TRAY] F:\PROGRA~1\AVG\AVG8\avgtray.exe
    O4 - HKCU\..\Run: [Google Update] "F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" /c
    O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions present
    O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - F:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - F:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/mic...ls/en/x86/client/muweb_site.cab?1184715067578
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - F:\Program Files\AVG\AVG8\avgpp.dll
    O20 - AppInit_DLLs: avgrsstx.dll
    O23 - Service: Adobe LM Service - Adobe Systems - F:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - F:\PROGRA~1\AVG\AVG8\avgemc.exe
    O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - F:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    O23 - Service: Bonjour Service - Apple Inc. - F:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Unknown owner - F:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - F:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe
    O23 - Service: iPod Service - Apple Inc. - F:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - F:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: SlingAgent Service (SlingAgentService) - Sling Media Inc. - F:\Program Files\Sling Media\SlingAgent\SlingAgentService.exe
    O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - F:\Program Files\Viewpoint\Common\ViewpointService.exe

    --
    End of file - 6685 bytes
     
  2. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Hi Welcome to TSG!!


    Download SDFix and save it to your Desktop.

    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix and remove some of its embedded files which may cause "unpredictable results".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
    • Remember to re-enable the protection again afterwards before connecting to the Internet.

    Double click SDFix.exe and choose Install to extract it to its own folder on the Desktop. Please then reboot your computer in Safe Mode by doing the following :
    • Restart your computer
    • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
    • Instead of Windows loading as normal, a menu with options should appear;
    • Select the first option, to run Windows in Safe Mode, then press "Enter".
    • Choose your usual account.
    • Open the c:\SDFix folder and double click RunThis.cmd to start the script.
    • Type Y to begin the script.
    • It will remove the Trojan Services then make some repairs to the registry and prompt you to press any key to Reboot.
    • Press any Key and it will restart the PC.
    • Your system will take longer that normal to restart as the fixtool will be running and removing files.
    • When the desktop loads the Fixtool will complete the removal and display Finished, then press any key to end the script and load your desktop icons.
    • Finally open the SDFix folder on your desktop and copy and paste the contents of the results file Report.txt back to the thread with a new HijackThis log.
     
  3. Johnny Whoops

    Johnny Whoops Thread Starter

    Joined:
    Oct 2, 2008
    Messages:
    6
    Thanks for helping.

    Here are the contents of the results file:

    SDFix: Version 1.234
    Run by johnny on Wed 10/08/2008 at 11:59 PM

    Microsoft Windows XP [Version 5.1.2600]
    Running From: F:\SDFix

    Checking Services :


    Restoring Default Security Values
    Restoring Default Hosts File

    Rebooting


    Checking Files :

    Trojan Files Found:

    F:\WINDOWS\system32\sysbase32.dll - Deleted
    F:\DOCUME~1\johnny\LOCALS~1\Temp\pwrmgr.exe.bat - Deleted
    F:\DOCUME~1\johnny\LOCALS~1\Temp\smchk.exe.bat - Deleted
    F:\DOCUME~1\johnny\LOCALS~1\Temp\windfr.exe.bat - Deleted
    F:\DOCUME~1\johnny\LOCALS~1\Temp\removalfile.bat - Deleted
    F:\WINDOWS\k.txt - Deleted
    F:\WINDOWS\system32\tdssadw.dll - Deleted
    F:\WINDOWS\system32\TDSSerrors.log - Deleted
    F:\WINDOWS\system32\tdssinit.dll - Deleted
    F:\WINDOWS\system32\tdssservers.dat - Deleted





    Removing Temp Files

    ADS Check :



    Final Check :

    catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-10-09 00:08:05
    Windows 5.1.2600 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden services & system hive ...

    scanning hidden registry entries ...

    scanning hidden files ...

    scan completed successfully
    hidden processes: 0
    hidden services: 0
    hidden files: 0


    Remaining Services :




    Authorized Application Key Export:

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
    "F:\\Program Files\\uTorrent\\uTorrent.exe"="F:\\Program Files\\uTorrent\\uTorrent.exe:*:Enabled:æTorrent"
    "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:mad:xpsp2res.dll,-22019"
    "F:\\Program Files\\InterVideo\\DVD8\\WinDVD.exe"="F:\\Program Files\\InterVideo\\DVD8\\WinDVD.exe:*:Disabled:WinDVD"
    "F:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"="F:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe:*:Enabled:AOL Loader"
    "F:\\Program Files\\Grisoft\\AVG7\\avginet.exe"="F:\\Program Files\\Grisoft\\AVG7\\avginet.exe:*:Enabled:avginet.exe"
    "F:\\Program Files\\Grisoft\\AVG7\\avgamsvr.exe"="F:\\Program Files\\Grisoft\\AVG7\\avgamsvr.exe:*:Enabled:avgamsvr.exe"
    "F:\\Program Files\\Grisoft\\AVG7\\avgcc.exe"="F:\\Program Files\\Grisoft\\AVG7\\avgcc.exe:*:Enabled:avgcc.exe"
    "F:\\Program Files\\LimeWire\\LimeWire.exe"="F:\\Program Files\\LimeWire\\LimeWire.exe:*:Enabled:LimeWire"
    "F:\\Program Files\\Macromedia\\Dreamweaver 8\\Dreamweaver.exe"="F:\\Program Files\\Macromedia\\Dreamweaver 8\\Dreamweaver.exe:*:Enabled:Dreamweaver 8"
    "F:\\Program Files\\AIM6\\aim6.exe"="F:\\Program Files\\AIM6\\aim6.exe:*:Enabled:AIM"
    "F:\\Program Files\\DAP\\DAP.exe"="F:\\Program Files\\DAP\\DAP.exe:*:Enabled:Download Accelerator Plus (DAP)"
    "F:\\server\\xampp\\apache\\bin\\apache.exe"="F:\\server\\xampp\\apache\\bin\\apache.exe:*:Enabled:Apache HTTP Server"
    "F:\\Program Files\\Opera\\Opera.exe"="F:\\Program Files\\Opera\\Opera.exe:*:Disabled:Opera Internet Browser"
    "F:\\Program Files\\Gizmo Project\\mDNSResponder.exe"="F:\\Program Files\\Gizmo Project\\mDNSResponder.exe:*:Enabled:Bonjour"
    "F:\\Program Files\\Gizmo Project\\Gizmo.exe"="F:\\Program Files\\Gizmo Project\\Gizmo.exe:*:Enabled:Gizmo Project"
    "F:\\Program Files\\ASoft\\AutoExit\\AutoExit.exe"="F:\\Program Files\\ASoft\\AutoExit\\AutoExit.exe:*:Disabled:public Release Version"
    "F:\\Program Files\\Dev-php2\\devphp.exe"="F:\\Program Files\\Dev-php2\\devphp.exe:*:Enabled:Dev-PHP is a well-featured IDE for PHP."
    "F:\\Program Files\\Gizmo5\\Gizmo5.exe"="F:\\Program Files\\Gizmo5\\Gizmo5.exe:*:Enabled:Gizmo5"
    "F:\\Program Files\\Poker.com\\client.exe"="F:\\Program Files\\Poker.com\\client.exe:*:Enabled:poker.com Client"
    "F:\\Program Files\\Mozilla Firefox\\firefox.exe"="F:\\Program Files\\Mozilla Firefox\\firefox.exe:*:Enabled:Firefox"
    "F:\\Program Files\\Bonjour\\mDNSResponder.exe"="F:\\Program Files\\Bonjour\\mDNSResponder.exe:*:Enabled:Bonjour"
    "F:\\Program Files\\iTunes\\iTunes.exe"="F:\\Program Files\\iTunes\\iTunes.exe:*:Enabled:iTunes"
    "F:\\Program Files\\PDCPoker\\client.exe"="F:\\Program Files\\PDCPoker\\client.exe:*:Enabled:pDC Poker Client"
    "F:\\xampplite\\apache\\bin\\apache.exe"="F:\\xampplite\\apache\\bin\\apache.exe:*:Enabled:Apache HTTP Server"
    "F:\\xampplite\\mysql\\bin\\mysqld.exe"="F:\\xampplite\\mysql\\bin\\mysqld.exe:*:Enabled:mysqld"
    "F:\\Program Files\\Sling Media\\SlingPlayer\\SlingPlayer.exe"="F:\\Program Files\\Sling Media\\SlingPlayer\\SlingPlayer.exe:*:Enabled:SlingPlayer"
    "F:\\Program Files\\AVG\\AVG8\\avgemc.exe"="F:\\Program Files\\AVG\\AVG8\\avgemc.exe:*:Enabled:avgemc.exe"
    "F:\\Program Files\\AVG\\AVG8\\avgupd.exe"="F:\\Program Files\\AVG\\AVG8\\avgupd.exe:*:Enabled:avgupd.exe"

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
    "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:mad:xpsp2res.dll,-22019"

    Remaining Files :


    File Backups: - F:\SDFix\backups\backups.zip

    Files with Hidden Attributes :

    Wed 13 Oct 2004 1,694,208 ..SH. --- F:\PROGRA~1\MESSEN~1\MSMSGS.EXE
    Tue 10 Aug 2004 60,416 A.SH. --- F:\PROGRA~1\OUTLOO~1\MSIMN.EXE
    Fri 28 Jan 2005 73,728 A.SH. --- F:\PROGRA~1\WINDOW~3\WMPLAYER.EXE

    Finished!

    And here's a new HJT log:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 12:28:34 AM, on 10/9/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.5730.0011)
    Boot mode: Normal

    Running processes:
    F:\WINDOWS\System32\smss.exe
    F:\WINDOWS\system32\winlogon.exe
    F:\WINDOWS\system32\services.exe
    F:\WINDOWS\system32\lsass.exe
    F:\WINDOWS\system32\svchost.exe
    F:\WINDOWS\System32\svchost.exe
    F:\WINDOWS\system32\spoolsv.exe
    F:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    F:\Program Files\Bonjour\mDNSResponder.exe
    F:\WINDOWS\eHome\ehRecvr.exe
    F:\WINDOWS\eHome\ehSched.exe
    F:\WINDOWS\system32\nvsvc32.exe
    F:\Program Files\Sling Media\SlingAgent\SlingAgentService.exe
    F:\WINDOWS\system32\svchost.exe
    F:\Program Files\Viewpoint\Common\ViewpointService.exe
    F:\PROGRA~1\AVG\AVG8\avgrsx.exe
    F:\PROGRA~1\AVG\AVG8\avgemc.exe
    F:\WINDOWS\system32\dllhost.exe
    F:\WINDOWS\Explorer.EXE
    F:\WINDOWS\system32\wuauclt.exe
    F:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
    F:\PROGRA~1\AVG\AVG8\avgtray.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\WINDOWS\system32\wuauclt.exe
    F:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - F:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - F:\Program Files\AVG\AVG8\avgssie.dll
    O2 - BHO: (no name) - {42C891CC-E792-4F66-826A-8567A83509A2} - F:\WINDOWS\system32\ddcCSJaw.dll (file missing)
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - F:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O2 - BHO: (no name) - {7AA07AE6-01EF-44EC-93CA-9D7CD41CCDB6} - (no file)
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE F:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "F:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
    O4 - HKLM\..\Run: [AVG8_TRAY] F:\PROGRA~1\AVG\AVG8\avgtray.exe
    O4 - HKCU\..\Run: [Google Update] "F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" /c
    O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions present
    O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - F:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - F:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/mic...ls/en/x86/client/muweb_site.cab?1184715067578
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - F:\Program Files\AVG\AVG8\avgpp.dll
    O20 - AppInit_DLLs: avgrsstx.dll
    O23 - Service: Adobe LM Service - Adobe Systems - F:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - F:\PROGRA~1\AVG\AVG8\avgemc.exe
    O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - F:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    O23 - Service: Bonjour Service - Apple Inc. - F:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Unknown owner - F:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - F:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe
    O23 - Service: iPod Service - Apple Inc. - F:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - F:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: SlingAgent Service (SlingAgentService) - Sling Media Inc. - F:\Program Files\Sling Media\SlingAgent\SlingAgentService.exe
    O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - F:\Program Files\Viewpoint\Common\ViewpointService.exe

    --
    End of file - 6259 bytes
     
  4. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Run HJT again and put a check in the following:

    O2 - BHO: (no name) - {42C891CC-E792-4F66-826A-8567A83509A2} - F:\WINDOWS\system32\ddcCSJaw.dll (file missing)
    O2 - BHO: (no name) - {7AA07AE6-01EF-44EC-93CA-9D7CD41CCDB6} - (no file)
    O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions present
    O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Control Panel present

    Close all applications and browser windows before you click "fix checked".


    Please download ATF Cleaner by Atribune.

    • Double-click ATF-Cleaner.exe to run the program.
    • Under Main choose: Select All
    • Click the Empty Selected button.

    Click Exit on the Main menu to close the program.




    Please download Malwarebytes Anti-Malware and save it to your desktop. alternate download link 1 alternate download link 2
    • Make sure you are connected to the Internet.
    • Double-click on Download_mbam-setup.exe to install the application.
    • When the installation begins, follow the prompts and do not make any changes to default settings.
    • When installation has finished, make sure you leave both of these checked:
      • Update Malwarebytes' Anti-Malware
      • Launch Malwarebytes' Anti-Malware
    • Then click Finish.
    • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
    • On the Scanner tab:
      • Make sure the "Perform Quick Scan" option is selected.
      • Then click on the Scan button.
    • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
    • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
    • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
    • Click OK to close the message box and continue with the removal process.
    • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
    • Make sure that everything is checked, and click Remove Selected.
    • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
    • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
    • Copy and paste the contents of that report in your next reply with a new hijackthis log.
    Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.



    Please do an online scan with Kaspersky WebScanner

    Kaspersky online scanner uses JAVA tecnology to perform the scan. If you do not have the latest JAVA version, follow the instrutions below under Upgrading Java, to download and install the latest vesion.

    • Read through the requirements and privacy statement and click on Accept button.
    • It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
    • When the downloads have finished, click on Settings.
    • Make sure the following is checked.
      • Spyware, Adware, Dialers, and other potentially dangerous programs
        [*]Archives
        [*]Mail databases
    • Click on My Computer under Scan.
    • Once the scan is complete, it will display the results. Click on View Scan Report.
    • You will see a list of infected items there. Click on Save Report As....
    • Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button.
    • Please post this log in your next reply.
     
  5. Johnny Whoops

    Johnny Whoops Thread Starter

    Joined:
    Oct 2, 2008
    Messages:
    6
    Okay.

    The MBAM report:

    Malwarebytes' Anti-Malware 1.27
    Database version: 1127
    Windows 5.1.2600 Service Pack 2

    10/9/2008 12:39:27 PM
    mbam-log-2008-10-09 (12-39-27).txt

    Scan type: Quick Scan
    Objects scanned: 44578
    Time elapsed: 4 minute(s), 20 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 3
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 1

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    HKEY_CLASSES_ROOT\Interface\{3dbf2330-f8ad-4ccc-ad20-d155da5bc81a} (Trojan.BHO) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\Interface\{c6c4e78f-65fb-48b1-aada-3855fdce8f52} (Trojan.BHO) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    F:\WINDOWS\system32\mcrh.tmp (Malware.Trace) -> Quarantined and deleted successfully.

    A new HJT log:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 4:29:48 PM, on 10/9/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.5730.0011)
    Boot mode: Normal

    Running processes:
    F:\WINDOWS\System32\smss.exe
    F:\WINDOWS\system32\winlogon.exe
    F:\WINDOWS\system32\services.exe
    F:\WINDOWS\system32\lsass.exe
    F:\WINDOWS\system32\svchost.exe
    F:\WINDOWS\System32\svchost.exe
    F:\WINDOWS\system32\spoolsv.exe
    F:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    F:\Program Files\Bonjour\mDNSResponder.exe
    F:\WINDOWS\eHome\ehRecvr.exe
    F:\WINDOWS\eHome\ehSched.exe
    F:\WINDOWS\system32\nvsvc32.exe
    F:\Program Files\Sling Media\SlingAgent\SlingAgentService.exe
    F:\WINDOWS\system32\svchost.exe
    F:\Program Files\Viewpoint\Common\ViewpointService.exe
    F:\PROGRA~1\AVG\AVG8\avgrsx.exe
    F:\PROGRA~1\AVG\AVG8\avgemc.exe
    F:\WINDOWS\system32\dllhost.exe
    F:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
    F:\PROGRA~1\AVG\AVG8\avgtray.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
    F:\Program Files\PeerGuardian2\pg2.exe
    F:\Program Files\Common Files\Adobe\Updater5\AdobeUpdater.exe
    F:\WINDOWS\explorer.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
    F:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    F:\WINDOWS\system32\wuauclt.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - F:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - F:\Program Files\AVG\AVG8\avgssie.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - F:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE F:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "F:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
    O4 - HKLM\..\Run: [AVG8_TRAY] F:\PROGRA~1\AVG\AVG8\avgtray.exe
    O4 - HKCU\..\Run: [Google Update] "F:\Documents and Settings\johnny\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" /c
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - F:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - F:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/mic...ls/en/x86/client/muweb_site.cab?1184715067578
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - F:\Program Files\AVG\AVG8\avgpp.dll
    O20 - AppInit_DLLs: avgrsstx.dll
    O23 - Service: Adobe LM Service - Adobe Systems - F:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - F:\PROGRA~1\AVG\AVG8\avgemc.exe
    O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - F:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    O23 - Service: Bonjour Service - Apple Inc. - F:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Unknown owner - F:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - F:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe
    O23 - Service: iPod Service - Apple Inc. - F:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - F:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: SlingAgent Service (SlingAgentService) - Sling Media Inc. - F:\Program Files\Sling Media\SlingAgent\SlingAgentService.exe
    O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - F:\Program Files\Viewpoint\Common\ViewpointService.exe

    --
    End of file - 6088 bytes

    And the Kaspersky results:

    --------------------------------------------------------------------------------
    KASPERSKY ONLINE SCANNER 7 REPORT
    Thursday, October 9, 2008
    Operating System: Microsoft Windows XP Professional Service Pack 2 (build 2600)
    Kaspersky Online Scanner 7 version: 7.0.25.0
    Program database last update: Thursday, October 09, 2008 20:21:30
    Records in database: 1301985
    --------------------------------------------------------------------------------

    Scan settings:
    Scan using the following database: extended
    Scan archives: yes
    Scan mail databases: yes

    Scan area - My Computer:
    A:\
    E:\
    F:\

    Scan statistics:
    Files scanned: 50272
    Threat name: 2
    Infected objects: 2
    Suspicious objects: 0
    Duration of the scan: 01:57:30


    File name / Threat name / Threats count
    F:\SDFix\backups\backups.zip Infected: not-a-virus:FraudTool.Win32.TotalSecure2009.n 1
    F:\SDFix\backups\backups.zip Infected: Rootkit.Win32.Clbd.kr 1

    The selected area was scanned.
     
  6. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    (y) Looks good.

    Download OTCleanIt. Save this application on your desktop. Once downloaded Double click on the OTCleanIt.exe. This should remove most malware tools you downloaded. A restart will be required.


    It's a good idea to Flush your System Restore after removing malware.
    Turn off system restore, restart the machine and then turn it back on.
    For help with XP visit: How to turn off and turn on System Restore in Windows XP


    That will purge the restore folder and clear any malware that has accumulated there.


    Now you should Clean up your PC
     
  7. Johnny Whoops

    Johnny Whoops Thread Starter

    Joined:
    Oct 2, 2008
    Messages:
    6
    Awesome.

    However, Resident Shield detected a trojan early this morning:

    Infection: Trojan horse Generic11.AMPE
    Object: F:\System Volume Information\_restore{36223E71-E555-453A-9B4A-35711F4D6AB4}\RP268\A0048705.dll
    Result: Moved to Virus Vault
    Detection time: 10/10/2008, 3:44:56 AM
    Object Type: file
    Process: F:\WINDOWS\System32\svchost.exe

    Identical to one it detected yesterday, except for the last digit of the file name.
     
  8. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    You need to flush the system restore to clear those out.

    Have you tried that yet?
     
  9. Johnny Whoops

    Johnny Whoops Thread Starter

    Joined:
    Oct 2, 2008
    Messages:
    6
    On it. Thanks, again, for your help!
     
  10. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    (y)

    You're welcome!
     
  11. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/755497

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice