WiredWX Christian Hobby Weather Tools
Would you like to react to this message? Create an account in a few clicks or log in to continue.

WiredWX Christian Hobby Weather ToolsLog in

 


descriptionMore system security problems EmptyMore system security problems

more_horiz
I have been working on a computer that was a victim of the System Security malware mess for a friend. I have removed some of the infected files, but I'm sure I don't have everything gone because when I am able to get on internet pages, it often redirects to unwanted web pages or get a page that says 'Reported Site Attack' when trying to do a google search. I had to use a 'cached page' to get to the Geek Police page.
I tried installing the Malwarebytes program but the installation stalls while on the 'finishing' page and will not run. I was not able to uninstall it, either from the Add/Remove Prog. or the uninstall in the Program folder. Could I try renaming that program? I did get the Ice Sword installed and HiJack This (after I renamed the program). I am including the report from HJT

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 9:08:28 PM, on 6/15/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18372)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\Explorer.EXE
C:\Program Files\Norton PC Checkup\executables\mrHealthy\MrHealthy.exe
C:\Program Files\Dell\Media Experience\PCMService.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\system32\hkcmd.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\Dell AIO Printer A960\dlbfbmgr.exe
C:\PROGRA~1\MUSICM~1\MUSICM~1\MMDiag.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
C:\Program Files\Dell AIO Printer A960\dlbfbmon.exe
C:\Program Files\ClamWin\bin\ClamTray.exe
C:\WINDOWS\system32\ctfmon.exe
C:\PROGRA~1\SIMPLE~1\PHOTOS~1\data\Xtras\mssysmgr.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\MUSICMATCH\MUSICMATCH Jukebox\mim.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
C:\Program Files\HP\Digital Imaging\bin\hpqimzone.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\Internet Explorer\Iexplore.exe
C:\Program Files\Internet Explorer\Iexplore.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\Program Files\Internet Explorer\Iexplore.exe
C:\Program Files\Internet Explorer\Iexplore.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://frontier.myway.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr7/*http://www.yahoo.com/ext/search/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://search.barungo.com/?t=side&bid=%toolbar_id&q=%s
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O1 - Hosts: 195.245.119.131 browser-security.microsoft.com
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: &Helper - {2E59498D-7E44-4452-9044-0973B080B9E8} - C:\WINDOWS\system32\winexplorer.dll
O2 - BHO: (no name) - {3fd9cb96-2379-472b-8d7c-722de0eb19e6} - C:\WINDOWS\system32\yenuhaja.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
O4 - HKLM\..\Run: [legejiyune] Rundll32.exe "C:\WINDOWS\system32\yosutihe.dll",s
O4 - HKLM\..\Run: [StorageGuard] "C:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe" /r
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Dell\Media Experience\PCMService.exe"
O4 - HKLM\..\Run: [PAV] C:\Program Files\PAV\pav.exe
O4 - HKLM\..\Run: [MimBoot] C:\PROGRA~1\MUSICM~1\MUSICM~1\mimboot.exe
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [igfxtray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [igfxpers] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [Dell AIO Printer A960] "C:\Program Files\Dell AIO Printer A960\dlbfbmgr.exe"
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [Ad-Watch] C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
O4 - HKLM\..\Run: [sysldtray] C:\windows\ld09.exe
O4 - HKLM\..\Run: [CPMe357b5b6] Rundll32.exe "c:\windows\system32\tatetimo.dll",a
O4 - HKLM\..\Run: [e064862a] rundll32.exe "C:\WINDOWS\system32\rurisugo.dll",b
O4 - HKLM\..\Run: [ClamWin] "C:\Program Files\ClamWin\bin\ClamTray.exe" --logon
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [system tool] C:\WINDOWS\sysguard.exe
O4 - HKCU\..\Run: [RealPlayer] "C:\Program Files\Real\RealOne Player\realplay.exe" /RunUPGToolCommandReBoot
O4 - HKCU\..\Run: [PhotoShow Deluxe Media Manager] C:\PROGRA~1\SIMPLE~1\PHOTOS~1\data\Xtras\mssysmgr.exe
O4 - HKCU\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [MoneyAgent] "C:\Program Files\Microsoft Money\System\mnyexpr.exe"
O4 - HKCU\..\Run: [ErrorFix] C:\Program Files\ErrorFix\ErrorFix.exe -boot
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Policies\Explorer\Run: [svcho] C:\WINDOWS\svcho.exe
O4 - HKUS\S-1-5-19\..\Run: [legejiyune] Rundll32.exe "C:\WINDOWS\system32\yosutihe.dll",s (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [legejiyune] Rundll32.exe "C:\WINDOWS\system32\yosutihe.dll",s (User 'NETWORK SERVICE')
O4 - Global Startup: Event Reminder.lnk = C:\Program Files\PrintMaster 16\pmremind.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: HP Photosmart Premier Fast Start.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O4 - Global Startup: Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
O8 - Extra context menu item: &Search - ?p=ZUfox000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe (file missing)
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe (file missing)
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra button: Absolute Poker - {13C1DBF6-7535-495c-91F6-8C13714ED485} - C:\Documents and Settings\Owner\Start Menu\Programs\Absolute Poker\Absolute Poker.lnk (file missing) (HKCU)
O9 - Extra 'Tools' menuitem: Absolute Poker - {13C1DBF6-7535-495c-91F6-8C13714ED485} - C:\Documents and Settings\Owner\Start Menu\Programs\Absolute Poker\Absolute Poker.lnk (file missing) (HKCU)
O9 - Extra button: WeatherBug - {AF6CABAB-61F9-4f12-A198-B7D41EF1CB52} - C:\Program Files\AWS\WeatherBug\Weather.exe (file missing) (HKCU)
O16 - DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} (StagingUI Object) - http://zone.msn.com/binFrameWork/v10/StagingUI.cab55579.cab
O16 - DPF: {149E45D8-163E-4189-86FC-45022AB2B6C9} (SpinTop DRM Control) - file:///C:/Program%20Files/Chessmaster%20Challenge/Images/stg_drm.ocx
O16 - DPF: {2B323CD9-50E3-11D3-9466-00A0C9700498} - http://jcs.chat.dcn.yahoo.com/v45/yacscom.cab
O16 - DPF: {2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C} (MiniBugTransporterX Class) - http://wdownload.weatherbug.com/minibug/tricklers/AWS/MiniBugTransporter.cab?
O16 - DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} (MSN Games – Buddy Invite) - http://zone.msn.com/BinFrameWork/v10/ZBuddy.cab55579.cab
O16 - DPF: {48DD0448-9209-4F81-9F6D-D83562940134} (MySpace Uploader Control) - http://lads.myspace.com/upload/MySpaceUploader1006.cab
O16 - DPF: {4C39376E-FA9D-4349-BACC-D305C1750EF3} (EPUImageControl Class) - http://tools.ebayimg.com/eps/wl/activex/EPUWALControl_v1-0-3-17.cab
O16 - DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} (ZonePAChat Object) - http://zone.msn.com/binframework/v10/ZPAChat.cab55579.cab
O16 - DPF: {58FC4C77-71C2-4972-A8CD-78691AD85158} (BJA Control) - http://www.worldwinner.com/games/v49/bjattack/bjattack.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.com/v5consumer/V5Controls/en/x86/client/wuweb_site.cab?1101253455022
O16 - DPF: {8A94C905-FF9D-43B6-8708-F0F22D22B1CB} (Wwlaunch Control) - http://www.worldwinner.com/games/shared/wwlaunch.cab
O16 - DPF: {A52FBD2B-7AB3-4F6B-90E3-91C772C5D00F} (WoF Control) - http://www.worldwinner.com/games/v45/wof/wof.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://cdn2.zone.msn.com/binFramework/v10/ZIntro.cab56649.cab
O16 - DPF: {CC450D71-CC90-424C-8638-1F2DBAC87A54} (ArmHelper Control) - file:///C:/Program%20Files/Chessmaster%20Challenge/Images/armhelper.ocx
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {D77EF652-9A6B-40C8-A4B9-1C0697C6CF41} (TikGames Online Control) - http://download.games.yahoo.com/games/web_games/tikgames/cinematycoon/cinematycoon.cab
O16 - DPF: {D8089245-3211-40F6-819B-9E5E92CD61A2} (FlashXControl Object) - https://signin3.valueactive.com/Register/Branding/olr3313/OCX/v1018/flashax.cab
O16 - DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} (MSN Games – Game Communicator) - http://zone.msn.com/binframework/v10/StProxy.cab55579.cab
O16 - DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} -
O16 - DPF: {F773E7B2-62A9-4524-9109-87D2F0BEFAA4} (ChessControl Class) - http://zone.msn.com/bingame/zpagames/zpa_kqrp.cab56961.cab
O16 - DPF: {F7EDBBEA-1AD2-4EBF-AA07-D453CC29EE65} (Flash Casino Helper Object) - https://spinpalace.microgaming.com/spinpalace/FlashAX2.cab
O16 - DPF: {FF3C5A9F-5A91-4930-80E8-4709194C2AD3} (CheckersZPA Object) - http://zone.msn.com/bingame/zpagames/CheckersZPA.cab55579.cab
O20 - AppInit_DLLs: c:\windows\system32\sunezihe.dll C:\WINDOWS\system32\bamukitu.dll c:\windows\system32\tatetimo.dll
O21 - SSODL: SSODL - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - c:\windows\system32\tatetimo.dll (file missing)
O22 - SharedTaskScheduler: STS - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - c:\windows\system32\tatetimo.dll (file missing)
O23 - Service: getPlus(R) Helper - NOS Microsystems Ltd. - C:\Program Files\NOS\bin\getPlus_HelperSvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: MrHealthy (MrHealthyService) - Symantec Corporation - C:\Program Files\Norton PC Checkup\executables\mrHealthy\MrHealthy.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe

--
End of file - 12575 bytes

Thanks so much for any help.

descriptionMore system security problems EmptyRe: More system security problems

more_horiz
Please download Ice Sword from HERE

  1. Download the zip to your desktop and extract it.
  2. Open the Ice Sword folder and then launch IceSword.exe.
  3. Then look in the left hand bottom of the program and press "Registry"
  4. When the registry list opens, drag the line between the two windows so you can see which registry hive you need.
  5. Next, open the HKEY_LOCAL_MACHINE, and navigate to the following key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

  6. Now look in the right side pane for two run values that are just random numbers.
  7. Once you have found the value(s), right click it and press "Delete"
  8. Okay the prompt and close IceSword.

............................................................................................

While my help is always free, please consider donating to keep this site alive: Donate

More system security problems 2wg6fte

descriptionMore system security problems EmptyRe: More system security problems

more_horiz
I forgot to mention that I was able to run ClamWin which found 25 infected files as listed here:
C:\d45.bat: Trojan.Agent-116237 FOUND
C:\d45.bat: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\d45.bat.infected'
C:\Documents and Settings\All Users\.clamwin\quarantine\d45.bat.infected: Trojan.Agent-116237 FOUND
C:\WINDOWS\system32\bepesata.exe: Trojan.Stuh-706 FOUND
C:\WINDOWS\system32\bepesata.exe: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\bepesata.exe.infected'
C:\WINDOWS\system32\bokeneja.dll: Trojan.Agent-116206 FOUND
C:\WINDOWS\system32\bokeneja.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\bokeneja.dll.infected'
C:\WINDOWS\system32\dadazeti.dll: Trojan.Agent-116212 FOUND
C:\WINDOWS\system32\dadazeti.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\dadazeti.dll.infected'
C:\WINDOWS\system32\dubojoba.dll: Trojan.Vundo-15078 FOUND
C:\WINDOWS\system32\dubojoba.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\dubojoba.dll.infected'
C:\WINDOWS\system32\fijovopo.dll: Trojan.Vundo-14926 FOUND
C:\WINDOWS\system32\fijovopo.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\fijovopo.dll.infected'
C:\WINDOWS\system32\gogogahi.dll: Trojan.Vundo-15074 FOUND
C:\WINDOWS\system32\gogogahi.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\gogogahi.dll.infected'
C:\WINDOWS\system32\hapojute.dll: Trojan.Vundo-15078 FOUND
C:\WINDOWS\system32\hapojute.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\hapojute.dll.infected'
C:\WINDOWS\system32\hayitapa.dll: Trojan.Vundo-15322 FOUND
C:\WINDOWS\system32\hayitapa.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\hayitapa.dll.infected'
C:\WINDOWS\system32\jijoyowe.dll: Trojan.Vundo-15078 FOUND
C:\WINDOWS\system32\jijoyowe.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\jijoyowe.dll.infected'
C:\WINDOWS\system32\kevupavo.dll: Trojan.Spy-61786 FOUND
C:\WINDOWS\system32\kevupavo.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\kevupavo.dll.infected'
C:\WINDOWS\system32\lefefawe.dll: Trojan.Vundo-15078 FOUND
C:\WINDOWS\system32\lefefawe.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\lefefawe.dll.infected'
C:\WINDOWS\system32\lehigede.dll: Trojan.Agent-116207 FOUND
C:\WINDOWS\system32\lehigede.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\lehigede.dll.infected'
C:\WINDOWS\system32\leyeluto.dll: Trojan.Agent-116212 FOUND
C:\WINDOWS\system32\leyeluto.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\leyeluto.dll.infected'
C:\WINDOWS\system32\maremapa.dll: Trojan.Agent-116209 FOUND
C:\WINDOWS\system32\maremapa.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\maremapa.dll.infected'
C:\WINDOWS\system32\nazofafo.dll: Trojan.Spy-61786 FOUND
C:\WINDOWS\system32\nazofafo.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\nazofafo.dll.infected'
C:\WINDOWS\system32\nesafisa.exe: Trojan.Stuh-733 FOUND
C:\WINDOWS\system32\nesafisa.exe: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\nesafisa.exe.infected'
C:\WINDOWS\system32\neweyoko.dll: Trojan.Vundo-15078 FOUND
C:\WINDOWS\system32\neweyoko.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\neweyoko.dll.infected'
C:\WINDOWS\system32\nidagiki.exe: Trojan.Stuh-763 FOUND
C:\WINDOWS\system32\nidagiki.exe: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\nidagiki.exe.infected'
C:\WINDOWS\system32\siditesu.dll: Trojan.Agent-116212 FOUND
C:\WINDOWS\system32\siditesu.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\siditesu.dll.infected'
C:\WINDOWS\system32\vozigoji.dll: Trojan.Vundo-14836 FOUND
C:\WINDOWS\system32\vozigoji.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\vozigoji.dll.infected'
C:\WINDOWS\system32\wumikigo.dll: Trojan.Agent-116212 FOUND
C:\WINDOWS\system32\wumikigo.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\wumikigo.dll.infected'
C:\WINDOWS\system32\yohujoku.dll: Trojan.Vundo-14883 FOUND
C:\WINDOWS\system32\yohujoku.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\yohujoku.dll.infected'

I also was able to run AdAware which found Win32RootKitAgent and Win32TrojanTDSS as well as some cookies and something 'unknown'
SpyBot would not run although I was able to update it.

descriptionMore system security problems EmptyRe: More system security problems

more_horiz
I ran the Ice Sword and did not find the listings of the numbers.

descriptionMore system security problems EmptyRe: More system security problems

more_horiz
Please disable Ad-Watch, as it may hinder the removal of some HijackThis entries. You can re-enable it after your computer is clean. Please see here for instructions on how to disable it:

1. Right-click on the Ad-Watch icon in the system tray (located down by the system clock for most configurations)
2. Choose *Settings* from the dropdown menu
3. Under the *General Settings* tab turn OFF (red x) the option to "Load Ad-Watch at Startup" (if enabled)
More system security problems Post-65-1216314425
4. Click on the *Status* button in the left hand menu
5. Turn OFF (red x) the option for *Regshield*
6. Close that window, then right-click on the Ad-Watch icon shield again down in the system tray next to the clock.
7. Choose *Turn off Ad-Watch* from the drop menu



I notice that you have Spybot's TeaTimer running. While this is normally a wonderful tool to protect against hijackers, it can also interfere with HijackThis fixes. So please disable TeaTimer by doing the following:
1) Run Spybot-S&D
2) Go to the Mode menu, and make sure "Advanced Mode" is selected
3) On the left hand side, choose Tools -> Resident
4) Uncheck "Resident TeaTimer" and OK any prompts
You can reenable TeaTimer once your system is clean.

Please make sure Teatimer is disable before we do this, otherwise this fix will fail.






  • Open HijackThis.
  • Choose "Do a system scan only"
  • Check the boxes in front of these lines:


    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://search.barungo.com/?t=side&bid=%toolbar_id&q=%s
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O2 - BHO: &Helper - {2E59498D-7E44-4452-9044-0973B080B9E8} - C:\WINDOWS\system32\winexplorer.dll
    O2 - BHO: (no name) - {3fd9cb96-2379-472b-8d7c-722de0eb19e6} - C:\WINDOWS\system32\yenuhaja.dll
    O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
    O4 - HKLM\..\Run: [legejiyune] Rundll32.exe "C:\WINDOWS\system32\yosutihe.dll",s
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKLM\..\Run: [CPMe357b5b6] Rundll32.exe "c:\windows\system32\tatetimo.dll",a
    O4 - HKLM\..\Run: [e064862a] rundll32.exe "C:\WINDOWS\system32\rurisugo.dll",b
    O4 - HKCU\..\Policies\Explorer\Run: [svcho] C:\WINDOWS\svcho.exe
    O4 - HKUS\S-1-5-19\..\Run: [legejiyune] Rundll32.exe "C:\WINDOWS\system32\yosutihe.dll",s (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [legejiyune] Rundll32.exe "C:\WINDOWS\system32\yosutihe.dll",s (User 'NETWORK SERVICE')
    O4 - Global Startup: Event Reminder.lnk = C:\Program Files\PrintMaster 16\pmremind.exe
    O8 - Extra context menu item: &Search - ?p=ZUfox000
    O9 - Extra button: Absolute Poker - {13C1DBF6-7535-495c-91F6-8C13714ED485} - C:\Documents and Settings\Owner\Start Menu\Programs\Absolute Poker\Absolute Poker.lnk (file missing) (HKCU)
    O9 - Extra 'Tools' menuitem: Absolute Poker - {13C1DBF6-7535-495c-91F6-8C13714ED485} - C:\Documents and Settings\Owner\Start Menu\Programs\Absolute Poker\Absolute Poker.lnk (file missing) (HKCU)
    O9 - Extra button: WeatherBug - {AF6CABAB-61F9-4f12-A198-B7D41EF1CB52} - C:\Program Files\AWS\WeatherBug\Weather.exe (file missing) (HKCU)
    O16 - DPF: {2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C} (MiniBugTransporterX Class) - http://wdownload.weatherbug.com/minibug/tricklers/AWS/MiniBugTransporter.cab?
    O20 - AppInit_DLLs: c:\windows\system32\sunezihe.dll C:\WINDOWS\system32\bamukitu.dll c:\windows\system32\tatetimo.dll
    O21 - SSODL: SSODL - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - c:\windows\system32\tatetimo.dll (file missing)
    O22 - SharedTaskScheduler: STS - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - c:\windows\system32\tatetimo.dll (file missing)



  • Press "Fix Checked"
  • Close Hijack This.




Please download and run this tool.

Download Malwarebytes' Anti-Malware from Here

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.


Post the contents of the MBAM Log.

Last edited by Origin on 16th June 2009, 4:23 am; edited 1 time in total

............................................................................................

While my help is always free, please consider donating to keep this site alive: Donate

More system security problems 2wg6fte

descriptionMore system security problems EmptyRe: More system security problems

more_horiz
Sorry internet lagg

............................................................................................

While my help is always free, please consider donating to keep this site alive: Donate

More system security problems 2wg6fte

descriptionMore system security problems EmptyTea Timer ?

more_horiz
Since I can't open SpyBot, will it work to end the TeaTimer process in Task Manager? Also, my version of Ad Aware doesn't look quite like your screenshot, but I think I have AdWatch disabled on startup.
Thanks

descriptionMore system security problems EmptyRe: More system security problems

more_horiz
Yes, you can kill TeaTimer via Task Manager.

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
More system security problems DXwU4
More system security problems VvYDg

descriptionMore system security problems EmptyMalwarebytes

more_horiz
I fixed the entries you listed from HJT. I tried to open Malwarebytes that was already installed but nothing happened. So I uninstalled that installation thinking that because it was installed before the fix, maybe that was why it wouldn't open. After the uninstall, it required a restart. I reinstalled the Malwarebytes (after having to rename it) but it still won't open.
Would that mean I need to go through the HJT again and then try the download and installation of Malwarebytes?
Or is there some other trick to get the program to open?
TeaTimer and AdWatch are turned off.
Thanks

descriptionMore system security problems EmptyRe: More system security problems

more_horiz

  • Download combofix from here
    Link 1
    Link 2

    1. If you are using Firefox, make sure that your download settings are as follows:

    * Tools->Options->Main tab
    * Set to "Always ask me where to Save the files".

    2. During the download, rename Combofix to Combo-Fix as follows:

    More system security problems CF_download_FF

    More system security problems CF_download_rename

    3. It is important you rename Combofix during the download, but not after.
    4. Please do not rename Combofix to other names, but only to the one indicated.
    5. Close any open browsers.
    6. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

  • We need to disable your local AV (Anti-virus) before running Combofix.
  • See HERE for how to disable your AV. (AVG7)
  • Double click on ComboFix.exe.
  • Follow the prompts. NOTE:
  • ComboFix will check to see if the Microsoft Windows Recovery Console is installed.
    ***It's strongly recommended to have the Recovery Console installed before doing any malware removal.***

    **Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will automatically proceed with its scan.


  • The Recovery Console provides a recovery/repair mode should a problem occur during a Combofix run.

    More system security problems Rcauto10

  • Allow ComboFix to download the Recovery Console.
  • Accept the End-User License Agreement.
  • The Recovery Console will be installed.
  • You will then get this next prompt that asks if you want to continue the malware scan, select yes

    More system security problems Whatne10

  • Allow combofix to run
  • Post C:\combofix.txt back here.

    Note:
    Do not mouseclick combofix's window whilst it's running. That may cause it to stall.

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
More system security problems DXwU4
More system security problems VvYDg

descriptionMore system security problems EmptyComboFix

more_horiz
ComboFix ran and installed the System Recovery. Now a message has come up in a window that says Rootkit!!!! on the title bar
The message says 'There is the presence of rootkit activity and needs to reboot. The files it lists are:
C:\Windows\system32\drivers\UACaculkrxpnsitmrv.sys
C:\Windows\system32\drivers\UACuufyndwtujeswd.dll
C:\Windows\system32\drivers\UACdpyryntvmnbgdvj.dat
C:\Windows\system32\drivers\UACxtpwxsywaoxtand.dll
C:\Windows\system32\drivers\UACdeqrgumnbnstpmk.dll
C:\Windows\system32\drivers\UACbneeymtoewowtyl.dll
C:\Windows\system32\drivers\UACmvbwddqwpkndgwq.dll
C:\Windows\system32\drivers\UACufyftomodjsxjpq.log
C:\Windows\system32\drivers\UACsqytbyyojkwkxpq.log
C:\Windows\system32\drivers\UACirmllmpeljwaywd.log

Should I click OK and let it reboot?

descriptionMore system security problems EmptyRe: More system security problems

more_horiz
Hello.
Yes, reboot. I already knew of the rootkits presence, that's why MBAM won't work.

Once Combofix has finished it's run here, MBAM will work fine. Smile...
Go a head and reboot, post the log when done.

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
More system security problems DXwU4
More system security problems VvYDg

descriptionMore system security problems EmptyCombo Fix report part 1

more_horiz
Here is the log generated when Combo Fix restarted
ComboFix 09-06-15.07 - Owner 06/16/2009 13:10.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.510.305 [GMT -5:00]
Running from: c:\downloads\Combo-Fix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
c:\documents and settings\All Users\Start Menu\PAV
c:\documents and settings\Owner\Application Data\DriveCleaner Free
c:\windows\system32\drivers\UACaculkrxpnsitmrv.sys
c:\windows\system32\jasosise.exe
c:\windows\system32\lofojuzo.exe
c:\windows\system32\movezisa.exe
c:\windows\system32\tidadegi.exe
c:\windows\system32\UACbneeymtoewowtyl.dll
c:\windows\system32\UACdeqrgumnbnstpmk.dll
c:\windows\system32\UACdpyrjntvmnbgdvj.dat
c:\windows\system32\UACirmllmpeljwaywd.log
c:\windows\system32\UACmvbwddqwpkndgwq.dll
c:\windows\system32\UACsqytbyyojkwhxpq.log
c:\windows\system32\UACufyftomodtjsxjp.log
c:\windows\system32\UACuufyhndwtujeswd.dll
c:\windows\system32\UACxtpwxsywaoxtand.dll
c:\documents and settings\All Users\Start Menu\PAV\Personal Antivirus.lnk
c:\documents and settings\All Users\Start Menu\PAV\Uninstall.lnk
c:\documents and settings\Owner\Application Data\DriveCleaner Free\Logs\update.log
c:\windows\ld09.exe
c:\windows\system32\abojobud.ini
c:\windows\system32\adalosid.ini
c:\windows\system32\afunugaf.ini
c:\windows\system32\ajenekob.ini
c:\windows\system32\apameram.ini
c:\windows\system32\apipafip.ini
c:\windows\system32\apoyapon.ini
c:\windows\system32\apugapir.ini
c:\windows\system32\aridasuz.ini
c:\windows\system32\bamukitu.dll
c:\windows\system32\bigigare.dll
c:\windows\system32\bowikiku.dll
c:\windows\system32\buloreke.dll
c:\windows\system32\disolada.dll
c:\windows\system32\drivers\UACaculkrxpnsitmrv.sys
c:\windows\system32\edegihel.ini
c:\windows\system32\ekerolub.ini
c:\windows\system32\eragigib.ini
c:\windows\system32\eromadik.ini
c:\windows\system32\etujopah.ini
c:\windows\system32\ewafefel.ini
c:\windows\system32\ewoyojij.ini
c:\windows\system32\ewuduzas.ini
c:\windows\system32\eyilotaz.ini
c:\windows\system32\fagunufa.dll
c:\windows\system32\fomekinu.dll.tmp
c:\windows\system32\gikuyaju.dll
c:\windows\system32\gokisoso.dll
c:\windows\system32\GroupPolicy000.dat
c:\windows\system32\humoyofa.dll
c:\windows\system32\hupetetu.dll
c:\windows\system32\idukipij.ini
c:\windows\system32\igunizuk.ini
c:\windows\system32\inadozik.ini
c:\windows\system32\ininagol.ini
c:\windows\system32\iperajoz.ini
c:\windows\system32\itezadad.ini
c:\windows\system32\iyibehor.ini
c:\windows\system32\izohuhey.ini
c:\windows\system32\jipikudi.dll
c:\windows\system32\kidamore.dll
c:\windows\system32\kizodani.dll
c:\windows\system32\kobemiso.dll.tmp
c:\windows\system32\lodifeze.dll
c:\windows\system32\ogikimuw.ini
c:\windows\system32\ogusirur.ini
c:\windows\system32\okometaf.ini
c:\windows\system32\okoyewen.ini
c:\windows\system32\ososikog.ini
c:\windows\system32\otuleyel.ini
c:\windows\system32\ozenazaz.ini
c:\windows\system32\ripagupa.dll
c:\windows\system32\ronigofu.dll
c:\windows\system32\sazuduwe.dll
c:\windows\system32\suhahebu.dll
c:\windows\system32\teyunufa.dll.tmp
c:\windows\system32\tusubiku.dll
c:\windows\system32\UACbneeymtoewowtyl.dll
c:\windows\system32\UACdeqrgumnbnstpmk.dll
c:\windows\system32\UACdpyrjntvmnbgdvj.dat
c:\windows\system32\uacinit.dll
c:\windows\system32\UACirmllmpeljwaywd.log
c:\windows\system32\UACmvbwddqwpkndgwq.dll
c:\windows\system32\UACsqytbyyojkwhxpq.log
c:\windows\system32\UACufyftomodtjsxjp.log
c:\windows\system32\UACuufyhndwtujeswd.dll
c:\windows\system32\UACxtpwxsywaoxtand.dll
c:\windows\system32\ufasezay.ini
c:\windows\system32\ufoginor.ini
c:\windows\system32\ujayukig.ini
c:\windows\system32\ukibusut.ini
c:\windows\system32\usetidis.ini
c:\windows\system32\utetepuh.ini
c:\windows\system32\winexplorer.dll
c:\windows\system32\wobebupi.dll.tmp
c:\windows\system32\wokohebu.dll.tmp
c:\windows\system32\yazesafu.dll
c:\windows\system32\yehuhozi.dll
c:\windows\system32\yenuhaja.dll
c:\windows\system32\yosutihe.dll
c:\windows\system32\yukikono.dll
c:\windows\system32\zatoliye.dll
c:\windows\system32\zazanezo.dll
c:\windows\system32\zesanido.dll
c:\windows\system32\zusadira.dll
c:\windows\Sysvxd.exe

----- BITS: Possible infected sites -----

hxxp://193.33.61.188
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_UACd.sys
-------\Legacy_MYWEBSEARCHSERVICE


((((((((((((((((((((((((( Files Created from 2009-05-16 to 2009-06-16 )))))))))))))))))))))))))))))))
.

2009-06-16 14:46 . 2009-05-26 18:20 40160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-06-16 14:46 . 2009-06-16 14:47 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-06-16 14:46 . 2009-06-16 14:46 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-06-16 14:46 . 2009-05-26 18:19 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-06-16 13:27 . 2009-06-16 13:27 2 ---h--w- c:\windows\zaponce52689.dat
2009-06-16 05:46 . 2009-06-16 05:46 5300 --sh--w- c:\windows\system32\bohusika.exe
2009-06-16 05:45 . 2009-06-16 05:45 2 ---h--w- c:\windows\zaponce53652.dat
2009-06-16 05:45 . 2009-06-16 05:45 159 ----a-w- C:\d45.bat
2009-06-16 02:02 . 2009-06-16 02:02 -------- d-----w- c:\program files\Trend Micro
2009-06-15 18:11 . 2009-06-15 17:45 15688 ----a-w- c:\windows\system32\lsdelete.exe
2009-06-15 17:45 . 2009-06-15 17:44 64160 ----a-w- c:\windows\system32\drivers\Lbd.sys
2009-06-15 17:45 . 2009-06-15 17:45 2 ---h--w- c:\windows\zaponce53290.dat
2009-06-15 17:45 . 2009-06-15 17:45 2 ---h--w- c:\windows\zaponce53173.dat
2009-06-15 17:45 . 2009-06-15 17:45 314200 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\threatwork.exe
2009-06-15 17:45 . 2009-06-15 17:45 25440 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\savapibridge.dll
2009-06-15 17:45 . 2009-06-15 17:45 169312 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\lavamessage.dll
2009-06-15 17:45 . 2009-06-15 17:45 15688 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\lsdelete.exe
2009-06-15 17:45 . 2009-06-15 17:45 348496 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\lavalicense.dll
2009-06-15 17:45 . 2009-06-15 17:45 294240 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\UpdateManager.dll
2009-06-15 17:45 . 2009-06-15 17:45 83808 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\ShellExt.dll
2009-06-15 17:44 . 2009-06-15 17:44 1630048 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Resources.dll
2009-06-15 17:44 . 2009-06-15 17:44 64160 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Drivers\32\lbd.sys
2009-06-15 17:44 . 2009-06-15 17:44 40288 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\PrivacyClean.dll
2009-06-15 17:44 . 2009-06-15 17:44 212848 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\RPAPI.dll
2009-06-15 17:44 . 2009-06-15 17:44 640360 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\CEAPI.dll
2009-06-15 17:44 . 2009-06-15 17:44 540536 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-AwareCommand.exe
2009-06-15 17:44 . 2009-06-15 17:44 559464 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-AwareAdmin.exe
2009-06-15 17:44 . 2009-06-15 17:44 2352456 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-Aware.exe
2009-06-15 17:44 . 2009-06-15 17:44 627536 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AAWWSC.exe
2009-06-15 17:44 . 2009-06-15 17:44 518488 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AAWTray.exe
2009-06-15 17:44 . 2009-06-15 17:44 1005904 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AAWService.exe
2009-06-15 17:39 . 2009-06-15 17:39 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{7972B2E5-3E09-4E5E-81B7-FE5819D6772F}
2009-06-15 17:39 . 2009-03-12 08:17 2902048 -c--a-w- c:\documents and settings\All Users\Application Data\{7972B2E5-3E09-4E5E-81B7-FE5819D6772F}\Ad-AwareAE.exe
2009-06-13 03:14 . 2009-06-13 05:11 -------- d-----w- c:\documents and settings\Owner\.housecall6.6
2009-06-13 03:06 . 2009-06-13 03:06 -------- d-s---r- C:\assembly
2009-06-11 14:40 . 2009-06-11 14:40 -------- d-sh--w- c:\windows\system32\config\systemprofile\PrivacIE
2009-06-10 18:26 . 2009-06-10 18:26 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Mozilla
2009-06-10 18:24 . 2009-06-13 14:19 -------- d-----w- c:\documents and settings\Administrator\Application Data\.clamwin
2009-06-05 00:43 . 2009-06-05 00:46 -------- d-----w- c:\documents and settings\Owner\tmp
2009-05-28 23:55 . 2009-05-28 23:55 -------- d-----w- c:\program files\NortonInstaller
2009-05-28 23:55 . 2009-05-28 23:55 -------- d-----w- c:\documents and settings\All Users\Application Data\NortonInstaller
2009-05-28 21:13 . 2009-05-28 21:13 -------- d-----w- c:\program files\Common Files\Uninstall
2009-05-28 21:12 . 2009-05-28 21:12 -------- d-----w- c:\program files\LimeWire
2009-05-28 21:10 . 2009-05-28 21:11 -------- d-----w- C:\b36a23ba899725aee97877da
2009-05-26 23:37 . 2009-05-26 23:37 -------- d-sh--w- c:\documents and settings\Guest\PrivacIE
2009-05-26 23:37 . 2009-05-26 23:37 -------- d-sh--w- c:\documents and settings\Guest\IETldCache

.

descriptionMore system security problems EmptyCombo Fix part 2

more_horiz
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-06-16 05:45 . 2009-03-16 05:45 15360 --sha-w- c:\windows\system32\yeyapoyu.exe
2009-06-15 19:20 . 2007-01-08 19:39 -------- d-----w- c:\program files\ClamWin
2009-06-15 18:47 . 2008-04-08 19:18 -------- d-----w- c:\program files\Mozilla Thunderbird
2009-06-15 17:56 . 2004-11-23 22:33 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2009-06-15 17:45 . 2009-03-15 17:45 15360 --sha-w- c:\windows\system32\wanisupa.exe
2009-06-15 17:39 . 2007-01-08 17:14 -------- d-----w- c:\program files\Lavasoft
2009-06-15 17:29 . 2004-11-23 22:33 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-06-13 16:49 . 2006-08-28 21:20 -------- d-----w- c:\documents and settings\All Users\Application Data\Kodak
2009-06-09 14:05 . 2009-03-09 14:04 537918 --sha-w- c:\windows\system32\nahovoge.exe
2009-06-07 19:03 . 2008-11-28 04:58 -------- d-----w- c:\program files\Common Files\Symantec Shared
2009-06-03 01:00 . 2005-07-19 01:08 -------- d-----w- c:\documents and settings\Owner\Application Data\AdobeUM
2009-05-27 11:27 . 2009-02-27 11:27 100864 ------w- c:\windows\system32\zojarepi.dll
2009-05-14 00:18 . 2009-02-14 00:18 63488 --sha-w- c:\windows\system32\zefirena.exe
2009-05-11 00:10 . 2009-02-11 00:10 70656 --sha-w- c:\windows\system32\pevuweku.dll
2009-05-10 12:10 . 2009-02-10 12:10 64000 --sha-w- c:\windows\system32\lutafone.exe
2009-05-10 12:10 . 2009-02-10 12:10 101376 ------w- c:\windows\system32\loganini.dll
2009-04-30 12:55 . 2004-11-24 04:18 -------- d-----w- c:\documents and settings\Owner\Application Data\MSN6
2009-04-19 17:21 . 2007-11-23 05:56 65816 -c--a-w- c:\documents and settings\Guest\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2008-09-06 07:35 . 2008-09-06 07:35 774144 -c--a-w- c:\program files\RngInterstitial.dll
2009-02-11 00:11 . 2009-02-11 00:11 70656 --sha-w- c:\windows\system32\domagihi.dll.tmp
2009-02-11 00:11 . 2009-02-11 00:11 70656 --sha-w- c:\windows\system32\jivuvomo.dll.tmp
2009-02-11 00:11 . 2009-02-11 00:11 70656 --sha-w- c:\windows\system32\kesezila.dll.tmp
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"PhotoShow Deluxe Media Manager"="c:\progra~1\SIMPLE~1\PHOTOS~1\data\Xtras\mssysmgr.exe" [2005-01-22 163840]
"MoneyAgent"="c:\program files\Microsoft Money\System\mnyexpr.exe" [2003-06-18 200704]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"StorageGuard"="c:\program files\Common Files\Sonic\Update Manager\sgtray.exe" [2003-02-13 155648]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2007-11-15 286720]
"PCMService"="c:\program files\Dell\Media Experience\PCMService.exe" [2003-08-27 204800]
"MimBoot"="c:\progra~1\MUSICM~1\MUSICM~1\mimboot.exe" [2006-01-19 11776]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-09-20 94208]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-09-20 114688]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-09-20 77824]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2006-02-19 49152]
"Dell AIO Printer A960"="c:\program files\Dell AIO Printer A960\dlbfbmgr.exe" [2003-09-21 270336]
"Ad-Watch"="c:\program files\Lavasoft\Ad-Aware\AAWTray.exe" [2009-06-15 518488]
"ClamWin"="c:\program files\ClamWin\bin\ClamTray.exe" [2009-06-12 86016]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2006-2-19 288472]
HP Photosmart Premier Fast Start.lnk - c:\program files\HP\Digital Imaging\bin\hpqthb08.exe [2006-2-10 73728]
Kodak EasyShare software.lnk - c:\program files\Kodak\Kodak EasyShare software\bin\EasyShare.exe [2005-11-4 176128]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AVG7_EMC
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\dla
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MCAgentExe
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MCUpdateExe
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TangoManager

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"UpdatesDisableNotify"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Kodak\\KODAK Software Updater\\7288971\\Program\\Kodak Software Updater.exe"=
"c:\\Program Files\\Kodak\\Kodak EasyShare software\\bin\\EasyShare.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\mmc.exe"=
"c:\\WINDOWS\\system32\\LEXPPS.EXE"=

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [6/15/2009 12:45 PM 64160]
R2 MrHealthyService;MrHealthy;c:\program files\Norton PC Checkup\executables\mrHealthy\MrHealthy.exe -service --> c:\program files\Norton PC Checkup\executables\mrHealthy\MrHealthy.exe -service [?]
S3 ENDETECT;ENDETECT; [x]
S3 getPlus(R) Helper;getPlus(R) Helper;c:\program files\NOS\bin\getPlus_HelperSvc.exe [1/12/2009 10:52 PM 33752]
S3 L2XPSR;L2XPSR; [x]
S3 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [3/9/2009 2:06 PM 1005904]
S3 LOGNT;LOGNT; [x]
S3 NTSTPL1;NTSTPL1; [x]
S3 TAPBIND;TAPBIND; [x]

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\>{60B49E34-C7CC-11D0-8953-00A0C90347FF}]
"c:\windows\system32\rundll32.exe" "c:\windows\system32\iedkcs32.dll",BrandIEActiveSetup SIGNUP
.
Contents of the 'Scheduled Tasks' folder

2009-06-15 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-03-09 17:44]

2009-06-04 c:\windows\Tasks\Norton PC Checkup Weekday Scanner.job
- c:\program files\Norton PC Checkup\PC_Checkup.exe [2009-01-29 22:10]

2009-06-13 c:\windows\Tasks\Norton PC Checkup Weekend Scanner.job
- c:\program files\Norton PC Checkup\PC_Checkup.exe [2009-01-29 22:10]
.
- - - - ORPHANS REMOVED - - - -

BHO-{3fd9cb96-2379-472b-8d7c-722de0eb19e6} - c:\windows\system32\yenuhaja.dll
HKCU-Run-RealPlayer - c:\program files\Real\RealOne Player\realplay.exe
HKCU-Run-MySpaceIM - c:\program files\MySpace\IM\MySpaceIM.exe
HKCU-Run-MsnMsgr - c:\program files\MSN Messenger\MsnMsgr.Exe
HKCU-Run-ErrorFix - c:\program files\ErrorFix\ErrorFix.exe
HKCU-Run-Sonic RecordNow! - (no file)
HKLM-Run-PAV - c:\program files\PAV\pav.exe
HKLM-Run-iTunesHelper - c:\program files\iTunes\iTunesHelper.exe
HKLM-Run-AVG7_CC - c:\progra~1\Grisoft\AVGFRE~1\avgcc.exe
HKLM-Run-e064862a - c:\windows\system32\ripagupa.dll
HKLM-Run-CPMe357b5b6 - c:\windows\system32\zesanido.dll
HKLM-Run-legejiyune - c:\windows\system32\yosutihe.dll


.
------- Supplementary Scan -------
.
uStart Page = hxxp://frontier.myway.com/
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr7/*http://www.yahoo.com/ext/search/search.html
uInternet Connection Wizard,ShellNext = iexplore
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
Trusted Zone: musicmatch.com\online
FF - ProfilePath -
.
.
------- File Associations -------
.
JSEFile=NOTEPAD.EXE %1
VBEFile=NOTEPAD.EXE %1
VBSFile=NOTEPAD.EXE %1
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-06-16 13:22
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,e5,70,95,ff,91,6a,25,4d,b2,cb,43,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,e5,70,95,ff,91,6a,25,4d,b2,cb,43,\
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(3168)
c:\windows\system32\ieframe.dll
c:\windows\system32\OneX.DLL
c:\windows\system32\eappprxy.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\LEXBCES.EXE
c:\windows\system32\LEXPPS.EXE
c:\program files\Norton PC Checkup\executables\mrHealthy\MrHealthy.exe
c:\program files\Dell AIO Printer A960\dlbfbmon.exe
c:\progra~1\MUSICM~1\MUSICM~1\MMDiag.exe
c:\program files\HP\Digital Imaging\bin\hpqimzone.exe
c:\program files\MUSICMATCH\MUSICMATCH Jukebox\mim.exe
c:\windows\system32\wscntfy.exe
c:\windows\system32\wbem\unsecapp.exe
c:\program files\HP\Digital Imaging\bin\hpqste08.exe
c:\windows\system32\msiexec.exe
c:\windows\system32\dwwin.exe
.
**************************************************************************
.
Completion time: 2009-06-16 13:32 - machine was rebooted
ComboFix-quarantined-files.txt 2009-06-16 18:32

Pre-Run: 60,559,446,016 bytes free
Post-Run: 60,656,050,176 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect /NoExecute=OptIn
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect

347 --- E O F --- 2009-04-17 15:04

descriptionMore system security problems EmptyRe: More system security problems

more_horiz
Now open a new notepad file.
Input this into the notepad file:

KILLALL::

File::
c:\windows\zaponce52689.dat
c:\windows\system32\bohusika.exe
c:\windows\zaponce53652.dat
C:\d45.bat
c:\windows\zaponce53290.dat
c:\windows\zaponce53173.dat
c:\windows\system32\yeyapoyu.exe
c:\windows\system32\wanisupa.exe
c:\windows\system32\nahovoge.exe
c:\windows\system32\zojarepi.dll
c:\windows\system32\zefirena.exe
c:\windows\system32\pevuweku.dll
c:\windows\system32\lutafone.exe
c:\windows\system32\loganini.dll
c:\windows\system32\domagihi.dll.tmp
c:\windows\system32\jivuvomo.dll.tmp
c:\windows\system32\kesezila.dll.tmp

Folder::
c:\program files\LimeWire
c:\program files\Common Files\Uninstall

Registry::
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"UpdatesDisableNotify"=-
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\LimeWire\\LimeWire.exe"=-

DDS::
uStart Page = hxxp://frontier.myway.com/

Driver::
LOGNT
NTSTPL1
TAPBIND
L2XPSR
ENDETECT


Save this as CFScript.txt, save it to your desktop also.
Then drag and drop CFScript.txt into combofix as seen below:
More system security problems Sfxdaw

This will open combofix again, agree to it's terms and allow it to run.
It may want to reboot after it's done. (It will warn you if it wants to)
Post the resulting log back here.

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
More system security problems DXwU4
More system security problems VvYDg

descriptionMore system security problems EmptyCombo fix report2 part 1

more_horiz
ComboFix 09-06-16.05 - Owner 06/17/2009 8:18.3 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.510.259 [GMT -5:00]
Running from: c:\documents and settings\Owner\Desktop\Combo-Fix.exe
Command switches used :: c:\documents and settings\Owner\Desktop\CFScript.txt

FILE ::
"C:\d45.bat"
"c:\windows\system32\bohusika.exe"
"c:\windows\system32\domagihi.dll.tmp"
"c:\windows\system32\jivuvomo.dll.tmp"
"c:\windows\system32\kesezila.dll.tmp"
"c:\windows\system32\loganini.dll"
"c:\windows\system32\lutafone.exe"
"c:\windows\system32\nahovoge.exe"
"c:\windows\system32\pevuweku.dll"
"c:\windows\system32\wanisupa.exe"
"c:\windows\system32\yeyapoyu.exe"
"c:\windows\system32\zefirena.exe"
"c:\windows\system32\zojarepi.dll"
"c:\windows\zaponce52689.dat"
"c:\windows\zaponce53173.dat"
"c:\windows\zaponce53290.dat"
"c:\windows\zaponce53652.dat"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\program files\Common Files\Uninstall
c:\program files\LimeWire
c:\program files\Common Files\Uninstall\PAV\Uninstall.lnk
c:\program files\LimeWire\lib\jacob-1.14.1-x64.dll
c:\program files\LimeWire\lib\jacob-1.14.1-x86.dll
c:\program files\LimeWire\lib\jdic.dll
c:\program files\LimeWire\lib\LimeWire.ico
c:\program files\LimeWire\lib\log4j.properties
c:\program files\LimeWire\lib\SystemUtilities.dll
c:\program files\LimeWire\lib\SystemUtilitiesA.dll
c:\program files\LimeWire\LimeWire On Startup.lnk
c:\program files\LimeWire\LimeWire.exe
c:\program files\LimeWire\LimeWire.ico
c:\program files\LimeWire\pmf.ico
c:\windows\system32\bohusika.exe
c:\windows\system32\domagihi.dll.tmp
c:\windows\system32\jivuvomo.dll.tmp
c:\windows\system32\kesezila.dll.tmp
c:\windows\system32\loganini.dll
c:\windows\system32\lutafone.exe
c:\windows\system32\nahovoge.exe
c:\windows\system32\pevuweku.dll
c:\windows\system32\wanisupa.exe
c:\windows\system32\yeyapoyu.exe
c:\windows\system32\zefirena.exe
c:\windows\system32\zojarepi.dll
c:\windows\zaponce52689.dat
c:\windows\zaponce53173.dat
c:\windows\zaponce53290.dat
c:\windows\zaponce53652.dat

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_ENDETECT
-------\Legacy_L2XPSR
-------\Legacy_LOGNT
-------\Legacy_NTSTPL1
-------\Legacy_TAPBIND
-------\Service_ENDETECT
-------\Service_L2XPSR
-------\Service_LOGNT
-------\Service_NTSTPL1
-------\Service_TAPBIND


((((((((((((((((((((((((( Files Created from 2009-05-17 to 2009-06-17 )))))))))))))))))))))))))))))))
.

2009-06-16 14:46 . 2009-05-26 18:20 40160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-06-16 14:46 . 2009-06-16 14:47 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-06-16 14:46 . 2009-06-16 14:46 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-06-16 14:46 . 2009-05-26 18:19 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-06-16 02:02 . 2009-06-16 02:02 -------- d-----w- c:\program files\Trend Micro
2009-06-15 18:11 . 2009-06-15 17:45 15688 ----a-w- c:\windows\system32\lsdelete.exe
2009-06-15 17:45 . 2009-06-15 17:44 64160 ----a-w- c:\windows\system32\drivers\Lbd.sys
2009-06-15 17:45 . 2009-06-15 17:45 314200 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\threatwork.exe
2009-06-15 17:45 . 2009-06-15 17:45 25440 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\savapibridge.dll
2009-06-15 17:45 . 2009-06-15 17:45 169312 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\lavamessage.dll
2009-06-15 17:45 . 2009-06-15 17:45 15688 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\lsdelete.exe
2009-06-15 17:45 . 2009-06-15 17:45 348496 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\lavalicense.dll
2009-06-15 17:45 . 2009-06-15 17:45 294240 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\UpdateManager.dll
2009-06-15 17:45 . 2009-06-15 17:45 83808 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\ShellExt.dll
2009-06-15 17:44 . 2009-06-15 17:44 1630048 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Resources.dll
2009-06-15 17:44 . 2009-06-15 17:44 64160 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Drivers\32\lbd.sys
2009-06-15 17:44 . 2009-06-15 17:44 40288 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\PrivacyClean.dll
2009-06-15 17:44 . 2009-06-15 17:44 212848 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\RPAPI.dll
2009-06-15 17:44 . 2009-06-15 17:44 640360 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\CEAPI.dll
2009-06-15 17:44 . 2009-06-15 17:44 540536 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-AwareCommand.exe
2009-06-15 17:44 . 2009-06-15 17:44 559464 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-AwareAdmin.exe
2009-06-15 17:44 . 2009-06-15 17:44 2352456 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-Aware.exe
2009-06-15 17:44 . 2009-06-15 17:44 627536 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AAWWSC.exe
2009-06-15 17:44 . 2009-06-15 17:44 518488 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AAWTray.exe
2009-06-15 17:44 . 2009-06-15 17:44 1005904 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AAWService.exe
2009-06-15 17:39 . 2009-06-15 17:39 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{7972B2E5-3E09-4E5E-81B7-FE5819D6772F}
2009-06-15 17:39 . 2009-03-12 08:17 2902048 -c--a-w- c:\documents and settings\All Users\Application Data\{7972B2E5-3E09-4E5E-81B7-FE5819D6772F}\Ad-AwareAE.exe
2009-06-13 03:14 . 2009-06-13 05:11 -------- d-----w- c:\documents and settings\Owner\.housecall6.6
2009-06-13 03:06 . 2009-06-13 03:06 -------- d-s---r- C:\assembly
2009-06-11 14:40 . 2009-06-11 14:40 -------- d-sh--w- c:\windows\system32\config\systemprofile\PrivacIE
2009-06-10 18:26 . 2009-06-10 18:26 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Mozilla
2009-06-10 18:24 . 2009-06-13 14:19 -------- d-----w- c:\documents and settings\Administrator\Application Data\.clamwin
2009-06-05 00:43 . 2009-06-05 00:46 -------- d-----w- c:\documents and settings\Owner\tmp
2009-05-28 23:55 . 2009-05-28 23:55 -------- d-----w- c:\program files\NortonInstaller
2009-05-28 23:55 . 2009-05-28 23:55 -------- d-----w- c:\documents and settings\All Users\Application Data\NortonInstaller
2009-05-28 21:10 . 2009-05-28 21:11 -------- d-----w- C:\b36a23ba899725aee97877da
2009-05-26 23:37 . 2009-05-26 23:37 -------- d-sh--w- c:\documents and settings\Guest\PrivacIE
2009-05-26 23:37 . 2009-05-26 23:37 -------- d-sh--w- c:\documents and settings\Guest\IETldCache

.

descriptionMore system security problems EmptyCombo Fix report2 part 2

more_horiz
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-06-15 19:20 . 2007-01-08 19:39 -------- d-----w- c:\program files\ClamWin
2009-06-15 18:47 . 2008-04-08 19:18 -------- d-----w- c:\program files\Mozilla Thunderbird
2009-06-15 17:56 . 2004-11-23 22:33 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2009-06-15 17:39 . 2007-01-08 17:14 -------- d-----w- c:\program files\Lavasoft
2009-06-15 17:29 . 2004-11-23 22:33 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-06-13 16:49 . 2006-08-28 21:20 -------- d-----w- c:\documents and settings\All Users\Application Data\Kodak
2009-06-07 19:03 . 2008-11-28 04:58 -------- d-----w- c:\program files\Common Files\Symantec Shared
2009-06-03 01:00 . 2005-07-19 01:08 -------- d-----w- c:\documents and settings\Owner\Application Data\AdobeUM
2009-04-30 12:55 . 2004-11-24 04:18 -------- d-----w- c:\documents and settings\Owner\Application Data\MSN6
2009-04-19 17:21 . 2007-11-23 05:56 65816 -c--a-w- c:\documents and settings\Guest\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2008-09-06 07:35 . 2008-09-06 07:35 774144 -c--a-w- c:\program files\RngInterstitial.dll
.

((((((((((((((((((((((((((((( SnapShot@2009-06-16_18.23.15 )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-06-17 13:32 . 2009-06-17 13:32 16384 c:\windows\temp\Perflib_Perfdata_7f4.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"PhotoShow Deluxe Media Manager"="c:\progra~1\SIMPLE~1\PHOTOS~1\data\Xtras\mssysmgr.exe" [2005-01-22 163840]
"MoneyAgent"="c:\program files\Microsoft Money\System\mnyexpr.exe" [2003-06-18 200704]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"StorageGuard"="c:\program files\Common Files\Sonic\Update Manager\sgtray.exe" [2003-02-13 155648]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2007-11-15 286720]
"PCMService"="c:\program files\Dell\Media Experience\PCMService.exe" [2003-08-27 204800]
"MimBoot"="c:\progra~1\MUSICM~1\MUSICM~1\mimboot.exe" [2006-01-19 11776]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-09-20 94208]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-09-20 114688]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-09-20 77824]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2006-02-19 49152]
"Dell AIO Printer A960"="c:\program files\Dell AIO Printer A960\dlbfbmgr.exe" [2003-09-21 270336]
"Ad-Watch"="c:\program files\Lavasoft\Ad-Aware\AAWTray.exe" [2009-06-15 518488]
"ClamWin"="c:\program files\ClamWin\bin\ClamTray.exe" [2009-06-12 86016]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2006-2-19 288472]
HP Photosmart Premier Fast Start.lnk - c:\program files\HP\Digital Imaging\bin\hpqthb08.exe [2006-2-10 73728]
Kodak EasyShare software.lnk - c:\program files\Kodak\Kodak EasyShare software\bin\EasyShare.exe [2005-11-4 176128]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Kodak\\KODAK Software Updater\\7288971\\Program\\Kodak Software Updater.exe"=
"c:\\Program Files\\Kodak\\Kodak EasyShare software\\bin\\EasyShare.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\mmc.exe"=
"c:\\WINDOWS\\system32\\LEXPPS.EXE"=

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [6/15/2009 12:45 PM 64160]
R2 MrHealthyService;MrHealthy;c:\program files\Norton PC Checkup\executables\mrHealthy\MrHealthy.exe -service --> c:\program files\Norton PC Checkup\executables\mrHealthy\MrHealthy.exe -service [?]
S3 getPlus(R) Helper;getPlus(R) Helper;c:\program files\NOS\bin\getPlus_HelperSvc.exe [1/12/2009 10:52 PM 33752]
S3 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [3/9/2009 2:06 PM 1005904]

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\>{60B49E34-C7CC-11D0-8953-00A0C90347FF}]
"c:\windows\system32\rundll32.exe" "c:\windows\system32\iedkcs32.dll",BrandIEActiveSetup SIGNUP
.
Contents of the 'Scheduled Tasks' folder

2009-06-15 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-03-09 17:44]

2009-06-04 c:\windows\Tasks\Norton PC Checkup Weekday Scanner.job
- c:\program files\Norton PC Checkup\PC_Checkup.exe [2009-01-29 22:10]

2009-06-13 c:\windows\Tasks\Norton PC Checkup Weekend Scanner.job
- c:\program files\Norton PC Checkup\PC_Checkup.exe [2009-01-29 22:10]
.
- - - - ORPHANS REMOVED - - - -

BHO-{3fd9cb96-2379-472b-8d7c-722de0eb19e6} - (no file)


.
------- Supplementary Scan -------
.
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr7/*http://www.yahoo.com/ext/search/search.html
uInternet Connection Wizard,ShellNext = iexplore
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
Trusted Zone: musicmatch.com\online
FF - ProfilePath -
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-06-17 08:31
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,e5,70,95,ff,91,6a,25,4d,b2,cb,43,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,e5,70,95,ff,91,6a,25,4d,b2,cb,43,\
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(976)
c:\windows\system32\ieframe.dll
c:\windows\system32\OneX.DLL
c:\windows\system32\eappprxy.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\LEXBCES.EXE
c:\windows\system32\LEXPPS.EXE
c:\program files\Norton PC Checkup\executables\mrHealthy\MrHealthy.exe
c:\progra~1\MUSICM~1\MUSICM~1\MMDiag.exe
c:\program files\Dell AIO Printer A960\dlbfbmon.exe
c:\program files\HP\Digital Imaging\bin\hpqimzone.exe
c:\program files\MUSICMATCH\MUSICMATCH Jukebox\mim.exe
c:\windows\system32\wscntfy.exe
c:\program files\HP\Digital Imaging\bin\hpqste08.exe
c:\windows\system32\msiexec.exe
c:\windows\system32\wbem\unsecapp.exe
.
**************************************************************************
.
Completion time: 2009-06-17 8:40 - machine was rebooted
ComboFix-quarantined-files.txt 2009-06-17 13:40
ComboFix2.txt 2009-06-17 00:24
ComboFix3.txt 2009-06-16 18:32

Pre-Run: 60,642,181,120 bytes free
Post-Run: 60,609,331,200 bytes free

240 --- E O F --- 2009-04-17 15:04

descriptionMore system security problems EmptyRe: More system security problems

more_horiz
Please download and run this tool.

Download Malwarebytes' Anti-Malware from Here

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.


Post the contents of the MBAM Log.

............................................................................................

While my help is always free, please consider donating to keep this site alive: Donate

More system security problems 2wg6fte

descriptionMore system security problems EmptyMBam log

more_horiz
Here is what came up after running Malwarebytes and a restart.

Malwarebytes' Anti-Malware 1.37
Database version: 2296
Windows 5.1.2600 Service Pack 3

6/17/2009 9:29:18 AM
mbam-log-2009-06-17 (09-29-18).txt

Scan type: Quick Scan
Objects scanned: 108629
Time elapsed: 6 minute(s), 47 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 6
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 7
Files Infected: 22

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\minibugtransporter.minibugtransporterx (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\minibugtransporter.minibugtransporterx.1 (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{04a38f6b-006f-4247-ba4c-02a139d5531c} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{3c2d2a1e-031f-4397-9614-87c932a848e0} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\ErrorFix (Rogue.ErrorFix) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\ErrorFix (Rogue.ErrorFix) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\WINDOWS\system32\NetworkService32 (Worm.Archive) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\Application Data\ErrorFix (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\Logs (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\QuarantineW (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\quarantinew\2009-01-12 22-12-410 (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\quarantinew\2009-01-12 22-12-410 (Rogue.ErrorFix) -> Files: 601 -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\quarantinew\2009-01-13 16-00-260 (Rogue.ErrorFix) -> Quarantined and deleted successfully.

Files Infected:
c:\WINDOWS\system32\networkservice32\101.crack.zip (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\101.crack.zip.kwd (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\102.keygen.zip (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\102.keygen.zip.kwd (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\103.serial.zip (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\103.serial.zip.kwd (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\104.setup.zip (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\104.setup.zip.kwd (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\105.music.mp3 (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\105.music.mp3.kwd (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\106.music.snd (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\106.music.snd.kwd (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\107.music.au (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\107.music.au.kwd (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\108.video.wmv (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\108.video.wmv.kwd (Worm.Archive) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\resultsw.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\Logs\2009-01-12 22-11-030.log (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\Logs\2009-01-13 12-00-010.log (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\Logs\2009-01-13 12-00-011.log (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\quarantinew\2009-01-13 16-00-260\filelist.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\quarantinew\2009-01-13 16-00-260\regb-0.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.

descriptionMore system security problems EmptyRe: More system security problems

more_horiz
Hello.
This should be fine now.

Click Start > Run and copy/paste the following bolded text into the Run box and click OK:

ComboFix /u

More system security problems CF_Cleanup

This will also reset your restore points.

How is the machine running now?

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
More system security problems DXwU4
More system security problems VvYDg

descriptionMore system security problems EmptyThanks

more_horiz
The machine seems to be running much better. A couple programs are slow to open but no more annoying pop-ups. That system security fake was a nasty one.
I think we got it. Thanks so much. Geek Police are great!!!!!

descriptionMore system security problems EmptyRe: More system security problems

more_horiz
privacy_tip Permissions in this forum:
You cannot reply to topics in this forum