Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Vundo And Trojan Please Help!


  • This topic is locked This topic is locked
13 replies to this topic

#1 invisiblelady

invisiblelady

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:02:35 AM

Posted 24 April 2008 - 11:04 AM

Im really sorry if im doin this wrong but I cant open any of the guidance messages or other peoples posts for example, my pc is so slow and i get 50 screens pop up sometimes!!

Here is my hijackthis log

Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\System32\hkcmd.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\McAfee\MSK\mskagent.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Windows Mail\WinMail.exe
c:\PROGRA~1\mcafee.com\agent\mcagent.exe
c:\PROGRA~1\mcafee\VIRUSS~1\mcvsshld.exe
C:\Program Files\McAfee\MPS\mpsevh.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.hotmail.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://support.thetechguys.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Internet Explorer Provided By Sky Broadband
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - c:\PROGRA~1\mcafee\VIRUSS~1\scriptcl.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [Dell AIO Printer A920] "C:\Program Files\Dell AIO Printer A920\dlbkbmgr.exe"
O4 - HKLM\..\Run: [MSServer] rundll32.exe C:\Windows\system32\hgGywXom.dll,#1
O4 - HKLM\..\Run: [MskAgentexe] C:\Program Files\McAfee\MSK\MskAgent.exe
O4 - HKCU\..\Run: [Reminder_MUI] C:\Applications\oem\Reminder\Reminder_MUI.exe
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [cmds] rundll32.exe C:\Users\SARAH-~1\AppData\Local\Temp\oPiHAtSI.dll,c
O4 - HKCU\..\Run: [MSServer] rundll32.exe C:\Users\SARAH-~1\AppData\Local\Temp\fcCULdBQ.dll,#1
O4 - HKCU\..\Run: [BMb33ad6ce] Rundll32.exe "C:\Users\SARAH-~1\AppData\Local\Temp\fsiftpjy.dll",s
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: Sky - {08E730A4-FB02-45BD-A900-01E4AD8016F6} - http://www.sky.com (file missing)
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O13 - Gopher Prefix:
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Unknown owner - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
O23 - Service: dlbk_device - - C:\Windows\system32\dlbkcoms.exe
O23 - Service: McAfee E-mail Proxy (Emproxy) - McAfee, Inc. - C:\PROGRA~1\COMMON~1\McAfee\EmProxy\emproxy.exe
O23 - Service: McAfee HackerWatch Service - McAfee, Inc. - C:\Program Files\Common Files\McAfee\HackerWatch\HWAPI.exe
O23 - Service: McAfee Update Manager (mcmispupdmgr) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcupdmgr.exe
O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\program files\common files\mcafee\mna\mcnasvc.exe
O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
O23 - Service: McAfee Protection Manager (mcpromgr) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcpromgr.exe
O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
O23 - Service: McAfee Redirector Service (McRedirector) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\redirsvc\redirsvc.exe
O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe
O23 - Service: McAfee Privacy Service (MPS9) - McAfee, Inc. - C:\PROGRA~1\McAfee\MPS\mps.exe
O23 - Service: McAfee SpamKiller Service (MSK80Service) - McAfee Inc. - C:\Program Files\McAfee\MSK\MskSrver.exe
O23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe

I have tried so many things and I have more than 8 Vundo variant and 5 trojan vundo. I think I made it worse by deleting things from the hijackthis list. I only had 3 before. It has made my keyboard stop working properly so im sorry if there are typing errors. Please someone tell me what i can do

Thanks in advance and sorry again if i have posted this wrong. Oh and i have windows vista in case that makes a difference

BC AdBot (Login to Remove)

 


m

#2 Thunder

Thunder

  • Members
  • 3,294 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Belgium
  • Local time:04:35 AM

Posted 25 April 2008 - 03:06 AM

Hello Invisiblelady and welcome to BleepingComputer,

1. * Clean your Cache and Cookies in IE:
  • Close all instances of Outlook Express and Internet Explorer
  • Go to Control Panel > Internet Options > General tab
  • Under Browsing History, click Delete.
  • Click Delete Files, Delete cookies and Delete history
  • Click Close below.
* Clean your Cache and Cookies in Firefox (In case you also have Firefox installed):
  • Go to Tools > Options.
  • Click Privacy in the menu..
  • Click the Clear now button below.. A new window will popup what to clear.
  • Select all and click the Clear button again.
  • Click OK to close the Options window
* Clean other Temporary files + Recycle bin
  • Go to start > run and type: cleanmgr and click ok.
  • Let it scan your system for files to remove.
  • Make sure Temporary Files, Temporary Internet Files, and Recycle Bin are the only things checked.
  • Press OK to remove them.
2. Please download Malwarebytes' Anti-Malware from Here or Here

Doubleclick mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply along with a fresh HijackThis log.
Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

3. Please visit this webpage for instructions for downloading and running ComboFix:

http://www.bleepingcomputer.com/combofix/how-to-use-combofix

Please ensure you read this guide carefully and install the Recovery Console first.
The Windows Recovery Console will allow you to boot up into a special recovery mode, in case your computer has a problem after an attempted removal of malware. This allows us to help you .

In the event you already have Combofix, delete your current version and download the latest version as described in the tutorial.
It must be saved directly to your desktop.


Note: Make sure not to click ComboFix's window while it's running. That may cause it to stall or freeze.

Please post the log from ComboFix (can also be found as C:\ComboFix.txt) in your next reply. :thumbsup:

If you have any questions along the way, STOP and ask them before proceeding !!

Greetings,
Thunder
Whatever happens, make believe it was intended to ...
-----------------------------------------------------------------------
Posted Image - If I have helped you in any way, please consider a donation to help me continue the fight against malware.
-----------------------------------------------------------------------
Stand Up & Be Counted --> Posted Image <-- And make a difference

#3 invisiblelady

invisiblelady
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:02:35 AM

Posted 26 April 2008 - 04:35 AM

Hi Thunder

Thank you for your in depth reply. I havent followd your advice yet as I wasnt abl to get online at all. Yesterdy though a friend looked at it. He made a new user account ad advised I move everything from the old one onto a disk and then delete the account and put all the stuff on the new one. He has never done it but thinks it would work. So far on the new account the internt has been fine, no pop ups etc. If I delete the old account though will that delete the viruses? And if i put everything on a disk first wont that put the virus on a disk?

Thanks in advance.

:thumbsup:

#4 invisiblelady

invisiblelady
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:02:35 AM

Posted 26 April 2008 - 05:14 AM

Hi again

My question was answered I started gettingthepopups on the new username.

Im running the scan you told me to and I just wondered should i be doing it on the new username or the old one or both? at the moment im scanning the new one

thanks

#5 invisiblelady

invisiblelady
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:02:35 AM

Posted 26 April 2008 - 05:47 AM

Hello I have done the malware scan and this is the new hijacklog

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:42:33, on 26/04/2008
Platform: Windows Vista (WinNT 6.00.1904)
MSIE: Internet Explorer v7.00 (7.00.6000.16643)
Boot mode: Normal

Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\System32\igfxtray.exe
C:\Windows\System32\hkcmd.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\McAfee\MSK\mskagent.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Windows Mail\WinMail.exe
c:\PROGRA~1\mcafee.com\agent\mcagent.exe
c:\PROGRA~1\mcafee\VIRUSS~1\mcvsshld.exe
C:\Program Files\McAfee\MPS\mpsevh.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://support.thetechguys.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://support.thetechguys.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - c:\PROGRA~1\mcafee\VIRUSS~1\scriptcl.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O3 - Toolbar: (no name) - {0BF43445-2F28-4351-9252-17FE6E806AA0} - (no file)
O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [Dell AIO Printer A920] "C:\Program Files\Dell AIO Printer A920\dlbkbmgr.exe"
O4 - HKLM\..\Run: [MskAgentexe] C:\Program Files\McAfee\MSK\MskAgent.exe
O4 - HKLM\..\Run: [Malwarebytes Anti-Malware Reboot] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [MSServer] rundll32.exe C:\Users\Test\AppData\Local\Temp\ljJaxurR.dll,#1
O4 - HKCU\..\Run: [cmds] rundll32.exe C:\Users\Test\AppData\Local\Temp\jKAstrPG.dll,c
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O9 - Extra button: Sky - {08E730A4-FB02-45BD-A900-01E4AD8016F6} - http://www.sky.com (file missing)
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O13 - Gopher Prefix:
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Unknown owner - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
O23 - Service: dlbk_device - - C:\Windows\system32\dlbkcoms.exe
O23 - Service: McAfee E-mail Proxy (Emproxy) - McAfee, Inc. - C:\PROGRA~1\COMMON~1\McAfee\EmProxy\emproxy.exe
O23 - Service: McAfee HackerWatch Service - McAfee, Inc. - C:\Program Files\Common Files\McAfee\HackerWatch\HWAPI.exe
O23 - Service: McAfee Update Manager (mcmispupdmgr) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcupdmgr.exe
O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\program files\common files\mcafee\mna\mcnasvc.exe
O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
O23 - Service: McAfee Protection Manager (mcpromgr) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcpromgr.exe
O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
O23 - Service: McAfee Redirector Service (McRedirector) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\redirsvc\redirsvc.exe
O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe
O23 - Service: McAfee Privacy Service (MPS9) - McAfee, Inc. - C:\PROGRA~1\McAfee\MPS\mps.exe
O23 - Service: McAfee SpamKiller Service (MSK80Service) - McAfee Inc. - C:\Program Files\McAfee\MSK\MskSrver.exe
O23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe

--
End of file - 6494 bytes

and here is the mbam log

Malwarebytes' Anti-Malware 1.11
Database version: 683

Scan type: Quick Scan
Objects scanned: 32382
Time elapsed: 12 minute(s), 40 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 2
Registry Keys Infected: 2
Registry Values Infected: 4
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 31

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\Users\Test\AppData\Local\Temp\ljJaxurR.dll (Trojan.Vundo) -> Unloaded module successfully.
C:\Users\Test\AppData\Local\Temp\jKAstrPG.dll (Trojan.Vundo) -> Unloaded module successfully.

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{f50b3f5e-856e-4757-9bb1-b35d46ca7719} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\WR (Malware.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSServer (Trojan.Vundo) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmds (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{f50b3f5e-856e-4757-9bb1-b35d46ca7719} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSServer (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Users\Test\AppData\Local\Temp\ljJaxurR.dll (Trojan.Vundo) -> Delete on reboot.
C:\Users\Test\AppData\Local\Temp\jKAstrPG.dll (Trojan.Vundo) -> Delete on reboot.
C:\Windows\System32\hgGywXom.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\cbXQhHwv.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\urqNDTJA.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Test\AppData\Local\Temp\ssqrRiGA.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Test\AppData\Local\Temp\tmp00046d62 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\efcCuVll.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\efcCvVMF.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\lujhcsri.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\oPiHAtSI.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\pmnoNGVn.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\qlejwtra.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\qoMeBuUm.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\rppxpdkq.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\ssqQigGY.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\tmp0000931a (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\tmp0000932a (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\tmp000099ce (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\tmp00009b83 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\tmp00009c8c (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\tmp00009d86 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\tmp00009e41 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\tmp0000bdc2 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\tmp0001001f (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\tmp0001082a (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\tmp0001a9a6 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\tmp0002c86c (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\yayXOFxY.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\AppData\Local\Temp\yayxxwwX.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Sarah-Jane\Local Settings\Temporary Internet Files\Content.IE5\VJHR4F3G\glas[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

There were some that couldnt be deleted but i clicked restart like you said. I havent done number 3 on your list yet because I havent got a recovery DVD made. There were 39 trojan vundo! I hope theyve gone now. I get 3 error messages when i turn the pc on saying such and such couldnt be loaded...

#6 Thunder

Thunder

  • Members
  • 3,294 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Belgium
  • Local time:04:35 AM

Posted 26 April 2008 - 06:16 AM

Hello Invisiblelady,

It doesn't look like everything is gone yet. :thumbsup:

For a Vista system, you shouldn't have any problem running ComboFix,
as long as you follow these instructions correctly :
http://www.bleepingcomputer.com/combofix/how-to-use-combofix :blink:

Greetings,
Thunder
Whatever happens, make believe it was intended to ...
-----------------------------------------------------------------------
Posted Image - If I have helped you in any way, please consider a donation to help me continue the fight against malware.
-----------------------------------------------------------------------
Stand Up & Be Counted --> Posted Image <-- And make a difference

#7 invisiblelady

invisiblelady
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:02:35 AM

Posted 26 April 2008 - 10:14 AM

Hi! I have recently ran a combifix scan to remove trojan and vundo variants. Please can someone help me understand the following combifix report and what to do next?

ComboFix 08-04-24.1 - Sarah-Jane 2008-04-26 15:57:50.1 - NTFSx86
Microsoft® Windows Vista™ Home Premium 6.0.6000.0.1252.1.1033.18.396 [GMT 1:00]
Running from: C:\Users\Sarah-Jane\Desktop\ComboFix.exe
* Created a new restore point
.

((((((((((((((((((((((((( Files Created from 2008-03-26 to 2008-04-26 )))))))))))))))))))))))))))))))
.

2008-04-26 12:18 . 2008-04-26 12:18 <DIR> d-------- C:\Users\Sarah-Jane\AppData\Roaming\Malwarebytes
2008-04-26 11:11 . 2008-04-26 11:11 <DIR> d-------- C:\Users\Test\AppData\Roaming\Malwarebytes
2008-04-26 11:10 . 2008-04-26 11:10 <DIR> d-------- C:\ProgramData\Malwarebytes
2008-04-26 11:10 . 2008-04-26 11:11 <DIR> d-------- C:\Program Files\Malwarebytes' Anti-Malware
2008-04-25 18:39 . 2008-04-25 18:39 <DIR> dr------- C:\Users\Test\Searches
2008-04-25 18:39 . 2008-04-25 19:25 <DIR> dr------- C:\Users\Test\Contacts
2008-04-25 18:37 . 2008-04-25 18:39 <DIR> dr------- C:\Users\Test\Videos
2008-04-25 18:37 . 2008-04-25 18:39 <DIR> dr------- C:\Users\Test\Saved Games
2008-04-25 18:37 . 2008-04-25 18:39 <DIR> dr------- C:\Users\Test\Pictures
2008-04-25 18:37 . 2008-04-25 18:39 <DIR> dr------- C:\Users\Test\Music
2008-04-25 18:37 . 2008-04-25 18:39 <DIR> dr------- C:\Users\Test\Links
2008-04-25 18:37 . 2008-04-26 11:33 <DIR> dr------- C:\Users\Test\Downloads
2008-04-25 18:37 . 2008-04-25 19:26 <DIR> dr------- C:\Users\Test\Documents
2008-04-25 18:37 . 2006-11-02 13:37 <DIR> d-------- C:\Users\Test\AppData\Roaming\Media Center Programs
2008-04-25 18:37 . 2008-04-25 18:39 <DIR> d--h----- C:\Users\Test\AppData
2008-04-25 18:37 . 2008-04-25 18:39 <DIR> d-------- C:\Users\Test
2008-04-25 18:37 . 2008-04-25 20:05 524,288 --ahs---- C:\Users\Test\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TMContainer00000000000000000002.regtrans-ms
2008-04-25 18:37 . 2008-04-25 20:05 524,288 --ahs---- C:\Users\Test\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TMContainer00000000000000000001.regtrans-ms
2008-04-25 18:37 . 2008-04-26 15:57 262,144 --ah----- C:\Users\Test\ntuser.dat.LOG1
2008-04-25 18:37 . 2008-04-25 20:05 65,536 --ahs---- C:\Users\Test\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TM.blf
2008-04-25 18:37 . 2008-04-25 18:37 0 --ah----- C:\Users\Test\ntuser.dat.LOG2
2008-04-23 19:17 . 2008-04-23 19:17 <DIR> d-------- C:\Program Files\Trend Micro
2008-04-23 18:29 . 2008-04-26 03:23 <DIR> d-------- C:\ProgramData\Spybot - Search & Destroy
2008-04-23 18:29 . 2008-04-23 18:29 <DIR> d-------- C:\Program Files\Spybot - Search & Destroy
2008-04-23 18:13 . 2008-04-23 18:13 <DIR> d-------- C:\Program Files\RogueRemover FREE
2008-04-22 22:11 . 2008-04-26 15:54 5,054 --a------ C:\Windows\System32\Config.MPF
2008-04-22 21:35 . 2006-03-03 11:07 143,360 --a------ C:\Windows\System32\dunzip32.dll
2008-04-22 21:32 . 2007-06-25 10:57 32,008 --a------ C:\Windows\System32\drivers\mferkdk.sys
2008-04-22 21:31 . 2008-02-06 09:51 171,400 --a------ C:\Windows\System32\drivers\mfehidk.sys
2008-04-22 21:31 . 2007-03-02 14:17 120,360 --a------ C:\Windows\System32\drivers\Mpfp.sys
2008-04-22 21:31 . 2007-06-25 14:54 71,496 --a------ C:\Windows\System32\drivers\mfeavfk.sys
2008-04-22 21:31 . 2007-06-25 10:57 37,480 --a------ C:\Windows\System32\drivers\mfesmfk.sys
2008-04-22 21:31 . 2007-06-25 10:57 34,184 --a------ C:\Windows\System32\drivers\mfebopk.sys
2008-04-22 21:29 . 2008-04-22 21:29 <DIR> d-------- C:\Program Files\McAfee.com
2008-04-22 21:28 . 2008-04-26 11:29 <DIR> d-------- C:\Program Files\McAfee
2008-04-22 21:28 . 2008-04-22 21:35 <DIR> d-------- C:\Program Files\Common Files\McAfee
2008-04-20 10:17 . 2008-04-20 10:18 <DIR> d--hsc--- C:\Program Files\Common Files\WindowsLiveInstaller
2008-04-20 10:16 . 2008-04-20 10:16 <DIR> d-------- C:\ProgramData\WLInstaller
2008-04-20 10:16 . 2008-04-20 10:19 <DIR> d-------- C:\Program Files\Windows Live
2008-04-18 22:32 . 2008-02-15 00:19 944,184 --a------ C:\Windows\System32\winload.exe
2008-04-18 22:32 . 2008-02-19 06:10 620,088 --a------ C:\Windows\System32\ci.dll
2008-04-18 22:32 . 2008-02-29 07:39 371,712 --a------ C:\Windows\System32\srcore.dll
2008-04-18 22:32 . 2008-02-29 07:38 313,856 --a------ C:\Windows\System32\rstrui.exe
2008-04-18 22:32 . 2008-02-29 07:39 40,960 --a------ C:\Windows\System32\srclient.dll
2008-04-18 22:32 . 2008-02-29 07:51 19,000 --a------ C:\Windows\System32\kd1394.dll
2008-04-18 22:32 . 2008-02-29 07:38 16,384 --a------ C:\Windows\System32\srdelayed.exe
2008-04-18 22:32 . 2008-02-29 07:34 7,168 --a------ C:\Windows\System32\f3ahvoas.dll
2008-04-18 22:32 . 2008-02-29 07:35 6,656 --a------ C:\Windows\System32\kbd106n.dll
2008-04-14 21:07 . 2008-02-21 05:43 296,448 --a------ C:\Windows\System32\gdi32.dll
2008-04-14 20:58 . 2008-02-29 05:16 2,027,008 --a------ C:\Windows\System32\win32k.sys
2008-04-14 20:53 . 2007-12-16 12:42 83,968 --a------ C:\Windows\System32\dnsrslvr.dll
2008-04-14 20:53 . 2007-12-16 12:41 24,576 --a------ C:\Windows\System32\dnscacheugc.exe
2008-04-14 20:19 . 2008-04-14 20:19 524,288 --ahs---- C:\Users\Public\NTUSER.DAT{9f6c959e-0a50-11dd-930b-00030d6ccb77}.TMContainer00000000000000000002.regtrans-ms
2008-04-14 20:19 . 2008-04-14 20:19 524,288 --ahs---- C:\Users\Public\NTUSER.DAT{9f6c959e-0a50-11dd-930b-00030d6ccb77}.TMContainer00000000000000000001.regtrans-ms
2008-04-14 20:19 . 2008-04-14 20:19 65,536 --ahs---- C:\Users\Public\NTUSER.DAT{9f6c959e-0a50-11dd-930b-00030d6ccb77}.TM.blf
2008-04-14 17:47 . 2008-04-14 17:47 <DIR> d-------- C:\Program Files\Sky Broadband

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-04-24 16:32 --------- d-----w C:\Program Files\SUPERAntiSpyware
2008-04-22 20:39 --------- d-----w C:\ProgramData\McAfee
2008-04-15 09:51 --------- d-----w C:\Program Files\Windows Mail
2008-04-14 16:26 --------- d-----w C:\Program Files\InstallShield Installation Information
2008-04-14 16:25 --------- d-----w C:\Users\Sarah-Jane\AppData\Roaming\Virgin Broadband
2008-04-14 16:20 319,984 ----a-w C:\Windows\DIFxAPI.dll
2008-04-14 16:20 --------- d-----w C:\Program Files\Realtek
2008-04-14 16:18 --------- d-----w C:\ProgramData\Symantec
2008-04-14 16:18 --------- d-----w C:\Program Files\Common Files\Symantec Shared
2008-03-19 20:34 --------- d-----w C:\Program Files\SopCast
2008-03-14 11:32 --------- d-----w C:\Program Files\Dell AIO Printer A920
2008-02-21 04:43 826,368 ----a-w C:\Windows\System32\wininet.dll
2008-02-21 04:43 56,320 ----a-w C:\Windows\System32\iesetup.dll
2008-02-21 04:43 52,736 ----a-w C:\Windows\AppPatch\iebrshim.dll
2008-02-21 04:43 26,624 ----a-w C:\Windows\System32\ieUnatt.exe
2008-02-15 03:04 194,560 ----a-w C:\Windows\System32\WebClnt.dll
2008-02-14 03:14 3,504,696 ----a-w C:\Windows\System32\ntkrnlpa.exe
2008-02-14 03:14 3,470,392 ----a-w C:\Windows\System32\ntoskrnl.exe
2008-02-14 03:13 24,064 ----a-w C:\Windows\System32\netcfg.exe
2008-02-14 03:13 22,016 ----a-w C:\Windows\System32\netiougc.exe
2008-02-14 03:13 167,424 ----a-w C:\Windows\System32\tcpipcfg.dll
2008-02-14 03:11 537,600 ----a-w C:\Windows\AppPatch\AcLayers.dll
2008-02-14 03:11 449,536 ----a-w C:\Windows\AppPatch\AcSpecfc.dll
2008-02-14 03:11 4,247,552 ----a-w C:\Windows\System32\GameUXLegacyGDFs.dll
2008-02-14 03:11 2,560 ----a-w C:\Windows\AppPatch\AcRes.dll
2008-02-14 03:11 2,144,256 ----a-w C:\Windows\AppPatch\AcGenral.dll
2008-02-14 03:11 173,056 ----a-w C:\Windows\AppPatch\AcXtrnal.dll
2008-02-14 03:11 1,686,528 ----a-w C:\Windows\System32\gameux.dll
2007-11-09 12:48 53,744 ----a-w C:\Users\Sarah-Jane\AppData\Roaming\GDIPFONTCACHEV1.DAT
2007-10-01 18:39 174 --sha-w C:\Program Files\desktop.ini
2007-12-03 22:37 16,384 --sha-w C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
2007-12-03 22:37 32,768 --sha-w C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
2007-12-03 22:37 16,384 --sha-w C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray.exe"="C:\Windows\ehome\ehTray.exe" [2006-11-02 13:35 125440]
"WMPNSCFG"="C:\Program Files\Windows Media Player\WMPNSCFG.exe" [2006-11-02 13:36 201728]
"SpybotSD TeaTimer"="C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe" [2008-01-28 11:43 2097488]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\shellexecutehooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= C:\Program Files\SUPERAntiSpyware\SASSEH.DLL [2006-12-20 14:55 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
C:\Program Files\SUPERAntiSpyware\SASWINLO.dll 2007-04-19 14:41 294912 C:\Program Files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"msacm.clmp3enc"= C:\PROGRA~1\CYBERL~1\Power2Go\CLMP3Enc.ACM

[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
path=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
backup=C:\Windows\pss\Adobe Reader Speed Launch.lnk.CommonStartup
backupExtension=.CommonStartup

[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Microsoft Office.lnk]
path=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office.lnk
backup=C:\Windows\pss\Microsoft Office.lnk.CommonStartup
backupExtension=.CommonStartup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\b009e552]
C:\Users\SARAH-~1\AppData\Local\Temp\qlejwtra.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BMb33ad6ce]
C:\Users\SARAH-~1\AppData\Local\Temp\jkloyhcq.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\cmds]
C:\Users\SARAH-~1\AppData\Local\Temp\oPiHAtSI.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Dell AIO Printer A920]
C:\Program Files\Dell AIO Printer A920\dlbkbmgr.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HotKeysCmds]
--a------ 2006-12-13 03:19 106496 C:\Windows\system32\hkcmd.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IgfxTray]
--a------ 2006-12-13 03:17 98304 C:\Windows\system32\igfxtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Malwarebytes Anti-Malware Reboot]
--a------ 2008-04-07 20:17 1175160 C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MskAgentexe]
--a------ 2007-01-17 17:30 152144 C:\Program Files\McAfee\MSK\MskAgent.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSServer]
C:\Users\SARAH-~1\AppData\Local\Temp\pmnoNGVn.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Persistence]
--a------ 2006-12-13 03:17 81920 C:\Windows\system32\igfxpers.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
--a------ 2008-01-10 16:27 385024 C:\Program Files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Reminder_MUI]
-ra------ 2007-04-26 11:22 1085440 C:\Applications\oem\Reminder\Reminder_MUI.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SpybotSD TeaTimer]
-rahs---- 2008-01-28 11:43 2097488 C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Windows Defender]
--a------ 2007-05-21 08:48 1006264 C:\Program Files\Windows Defender\MSASCui.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"UacDisableNotify"=dword:00000001
"InternetSettingsDisableNotify"=dword:00000001
"AutoUpdateDisableNotify"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\DomainProfile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\FirewallRules]
"{8D771594-0958-48B8-A5DE-D9348B2CF162}"= UDP:C:\Windows\ehome\ehshell.exe:Windows Media Center
"{9CA13480-C80B-41A4-9CAA-61B67DBC48DB}"= TCP:C:\Windows\ehome\ehshell.exe:Windows Media Center
"{F3D3B063-5373-4A82-8593-97749497CF99}"= UDP:C:\Program Files\Windows Mail\WinMail.exe:Windows Mail
"{2109090E-A033-494B-935B-113965C28831}"= TCP:C:\Program Files\Windows Mail\WinMail.exe:Windows Mail
"{03A60952-8365-4600-9AD0-BC3420BAD628}"= UDP:C:\Program Files\Windows Photo Gallery\WindowsPhotoGallery.exe:Windows Photo Gallery
"{AE79C245-F01C-4322-B73F-E815CBAEC19E}"= TCP:C:\Program Files\Windows Photo Gallery\WindowsPhotoGallery.exe:Windows Photo Gallery
"{4E6B218F-6A67-4A6B-9BEF-C80E4566574C}"= UDP:C:\Program Files\Shareaza\Shareaza.exe:Shareaza
"{F17C203C-E1F7-4393-8DF9-FE5B1F0DE4A9}"= TCP:C:\Program Files\Shareaza\Shareaza.exe:Shareaza
"{A6AE02EC-23E1-4BCE-8BC0-423C37ED6D23}"= UDP:C:\Program Files\Bonjour\mDNSResponder.exe:Bonjour
"{817F1C8E-5AEF-4256-8BA3-B3AE54563E22}"= TCP:C:\Program Files\Bonjour\mDNSResponder.exe:Bonjour
"TCP Query User{91EC07B7-ED1D-41A4-892E-816CD80F224D}C:\\program files\\shareaza applications\\shareaza\\shareaza.exe"= UDP:C:\program files\shareaza applications\shareaza\shareaza.exe:Shareaza
"UDP Query User{EBE59A0B-6568-4BB5-8385-D9D3906F8536}C:\\program files\\shareaza applications\\shareaza\\shareaza.exe"= TCP:C:\program files\shareaza applications\shareaza\shareaza.exe:Shareaza
"TCP Query User{0E352F57-EC4F-4F60-9916-6EBB5781AD71}C:\\program files\\sopcast\\adv\\sopadver.exe"= UDP:C:\program files\sopcast\adv\sopadver.exe:SopCast Adver
"UDP Query User{EE3CB603-B950-4F29-93A2-453325CD30CC}C:\\program files\\sopcast\\adv\\sopadver.exe"= TCP:C:\program files\sopcast\adv\sopadver.exe:SopCast Adver
"TCP Query User{95316B77-C1C6-4FE8-BEEE-F48DF6C07AFE}C:\\program files\\sopcast\\sopcast.exe"= UDP:C:\program files\sopcast\sopcast.exe:SopCast Main Application
"UDP Query User{C0B8810E-4980-402C-89FA-BDC78C3EBD6B}C:\\program files\\sopcast\\sopcast.exe"= TCP:C:\program files\sopcast\sopcast.exe:SopCast Main Application
"TCP Query User{3B08A83B-1ED3-4CB6-9B8D-8FDE39E353B2}C:\\program files\\sopcast\\sopvod.exe"= UDP:C:\program files\sopcast\sopvod.exe:sopvod
"UDP Query User{430F6CE3-EEEB-4327-B047-B86BF8F55DBF}C:\\program files\\sopcast\\sopvod.exe"= TCP:C:\program files\sopcast\sopvod.exe:sopvod
"TCP Query User{8121DC93-7E60-4E68-BBB2-8F942C89133D}C:\\program files\\sopcast\\sopcast.exe"= UDP:C:\program files\sopcast\sopcast.exe:SopCast Main Application
"UDP Query User{6E869D61-2725-4E1E-8A84-81A497F53464}C:\\program files\\sopcast\\sopcast.exe"= TCP:C:\program files\sopcast\sopcast.exe:SopCast Main Application
"{0C07CA25-16A2-4317-8711-8DE8FD2F5248}"= UDP:C:\Windows\System32\dlbkcoms.exe:AIO Printer A920 Server
"{944DF04E-7DDD-4E0D-9EE9-72E2702515FC}"= TCP:C:\Windows\System32\dlbkcoms.exe:AIO Printer A920 Server
"{DAB1492B-2F5D-490D-AC2C-4B68070ACC15}"= UDP:C:\Program Files\Common Files\McAfee\MNA\McNASvc.exe:McAfee Network Agent
"{022C8E94-7120-451B-80DB-D31BA8946435}"= C:\Program Files\Windows Live\Messenger\livecall.exe:Windows Live Messenger (Phone)
"{5A987C03-F208-4E4D-A1C4-26CB794DD648}"= UDP:C:\Program Files\Common Files\McAfee\MNA\McNASvc.exe:McAfee Network Agent
"{10A2E33B-106D-417E-B4F7-BD2373162AF4}"= TCP:C:\Program Files\Common Files\McAfee\MNA\McNASvc.exe:McAfee Network Agent

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\PublicProfile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\RestrictedServices\Static\System]
"DFSR-1"= RPort=5722|UDP:%SystemRoot%\system32\svchost.exe|Svc=DFSR:Allow inbound TCP traffic|

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\StandardProfile]
"EnableFirewall"= 0 (0x0)

R2 dlbk_device;dlbk_device;C:\Windows\system32\dlbkcoms.exe [2007-06-25 22:17]
R2 SBSDWSCService;SBSD Security Center Service;C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe [2008-01-28 11:43]
R3 igfx;igfx;C:\Windows\system32\DRIVERS\igdkmd32.sys [2006-12-13 04:32]
R3 netr73;RT73 USB Wireless LAN Card Driver for Vista;C:\Windows\system32\DRIVERS\netr73.sys [2006-09-28 22:41]

*Newly Created Service* - CATCHME
.
Contents of the 'Scheduled Tasks' folder
"2008-04-22 22:09:08 C:\Windows\Tasks\McDefragTask.job"
- c:\program files\mcafee\mqc\QcConsol.exe'
"2008-04-22 22:09:08 C:\Windows\Tasks\McQcTask.job"
- c:\program files\mcafee\mqc\QcConsol.exe
.
**************************************************************************

catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-04-26 16:00:51
Windows 6.0.6000 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
Completion time: 2008-04-26 16:02:41
ComboFix-quarantined-files.txt 2008-04-26 15:02:07

Pre-Run: 9,611,702,272 bytes free
Post-Run: 9,393,909,760 bytes free

229 --- E O F --- 2008-04-19 10:55:30

THANKS X

#8 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,723 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:09:35 PM

Posted 26 April 2008 - 05:36 PM

Hello invisiblelady,

I have merged your new topic containing the ComboFix log Thunder asked for to your previously existing topic. Please keep to this thread using Add/Reply for this issue. Starting new topics confuses things and delays the assistance you receive.

Back to you Thunder.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript

#9 Thunder

Thunder

  • Members
  • 3,294 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Belgium
  • Local time:04:35 AM

Posted 27 April 2008 - 05:29 AM

Thanks Orange Blossom :thumbsup:

Hello Invisiblelady,

Let's clean up some more :

1. Start HijackThis, close all open windows leaving only HijackThis running. Place a check against each of the following, if still present :O3 - Toolbar: (no name) - {0BF43445-2F28-4351-9252-17FE6E806AA0} - (no file)
O4 - HKCU\..\Run: [MSServer] rundll32.exe C:\Users\Test\AppData\Local\Temp\ljJaxurR.dll,#1
O4 - HKCU\..\Run: [cmds] rundll32.exe C:\Users\Test\AppData\Local\Temp\jKAstrPG.dll,c

Click on Fix Checked when finished and exit HijackThis.
Make sure your Internet Explorer is closed when you click Fix Checked!

2. Go to Start > Run, and copy and paste next command in the field:sc delete CLTNetCnService and click OK/Enter
3. Open Notepad - don't use any other texteditor than Notepad or the script will fail !
Copy/paste the bold, blue text below into an empty notepad window:Registry::
[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\b009e552]
[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BMb33ad6ce]
[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\cmds]
[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSServer]

Save this as txtfile CFScript

Then drag the CFScript into ComboFix.exe as you see in the screenshot below.

Posted Image

This will start ComboFix again. Upon reboot, (in case it asks to reboot), post the contents of the Combofix log in your next reply, as well as a fresh HijackThislog.

Are you still having problems ?

Greetings,
Thunder
Whatever happens, make believe it was intended to ...
-----------------------------------------------------------------------
Posted Image - If I have helped you in any way, please consider a donation to help me continue the fight against malware.
-----------------------------------------------------------------------
Stand Up & Be Counted --> Posted Image <-- And make a difference

#10 invisiblelady

invisiblelady
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:02:35 AM

Posted 27 April 2008 - 10:19 AM

Hi. I've followed your instructions. Here's the cmbofix log:
ComboFix 08-04-24.1 - Sarah-Jane 2008-04-27 16:04:29.2 - NTFSx86
Microsoft® Windows Vista™ Home Premium 6.0.6000.0.1252.1.1033.18.408 [GMT 1:00]
Running from: C:\Users\Sarah-Jane\Desktop\ComboFix.exe
Command switches used :: C:\Users\Sarah-Jane\Desktop\CFScript.txt
* Created a new restore point
* Resident AV is active

.

((((((((((((((((((((((((( Files Created from 2008-03-27 to 2008-04-27 )))))))))))))))))))))))))))))))
.

2008-04-27 03:27 . 2008-04-27 03:27 <DIR> d-------- C:\Users\Sarah-Jane\AppData\Roaming\Shareaza
2008-04-27 03:27 . 2008-04-27 03:27 <DIR> d-------- C:\Program Files\Shareaza
2008-04-26 12:18 . 2008-04-26 12:18 <DIR> d-------- C:\Users\Sarah-Jane\AppData\Roaming\Malwarebytes
2008-04-26 11:11 . 2008-04-26 11:11 <DIR> d-------- C:\Users\Test\AppData\Roaming\Malwarebytes
2008-04-26 11:10 . 2008-04-26 11:10 <DIR> d-------- C:\ProgramData\Malwarebytes
2008-04-26 11:10 . 2008-04-26 11:11 <DIR> d-------- C:\Program Files\Malwarebytes' Anti-Malware
2008-04-25 18:39 . 2008-04-25 18:39 <DIR> dr------- C:\Users\Test\Searches
2008-04-25 18:39 . 2008-04-25 19:25 <DIR> dr------- C:\Users\Test\Contacts
2008-04-25 18:37 . 2008-04-25 18:39 <DIR> dr------- C:\Users\Test\Videos
2008-04-25 18:37 . 2008-04-25 18:39 <DIR> dr------- C:\Users\Test\Saved Games
2008-04-25 18:37 . 2008-04-25 18:39 <DIR> dr------- C:\Users\Test\Pictures
2008-04-25 18:37 . 2008-04-25 18:39 <DIR> dr------- C:\Users\Test\Music
2008-04-25 18:37 . 2008-04-25 18:39 <DIR> dr------- C:\Users\Test\Links
2008-04-25 18:37 . 2008-04-26 11:33 <DIR> dr------- C:\Users\Test\Downloads
2008-04-25 18:37 . 2008-04-25 19:26 <DIR> dr------- C:\Users\Test\Documents
2008-04-25 18:37 . 2006-11-02 13:37 <DIR> d-------- C:\Users\Test\AppData\Roaming\Media Center Programs
2008-04-25 18:37 . 2008-04-25 18:39 <DIR> d--h----- C:\Users\Test\AppData
2008-04-25 18:37 . 2008-04-25 18:39 <DIR> d-------- C:\Users\Test
2008-04-25 18:37 . 2008-04-25 20:05 524,288 --ahs---- C:\Users\Test\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TMContainer00000000000000000002.regtrans-ms
2008-04-25 18:37 . 2008-04-25 20:05 524,288 --ahs---- C:\Users\Test\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TMContainer00000000000000000001.regtrans-ms
2008-04-25 18:37 . 2008-04-26 15:57 262,144 --ah----- C:\Users\Test\ntuser.dat.LOG1
2008-04-25 18:37 . 2008-04-25 20:05 65,536 --ahs---- C:\Users\Test\NTUSER.DAT{3a539871-6a70-11db-887c-d362bd253390}.TM.blf
2008-04-25 18:37 . 2008-04-25 18:37 0 --ah----- C:\Users\Test\ntuser.dat.LOG2
2008-04-23 19:17 . 2008-04-23 19:17 <DIR> d-------- C:\Program Files\Trend Micro
2008-04-23 18:29 . 2008-04-26 03:23 <DIR> d-------- C:\ProgramData\Spybot - Search & Destroy
2008-04-23 18:29 . 2008-04-23 18:29 <DIR> d-------- C:\Program Files\Spybot - Search & Destroy
2008-04-23 18:13 . 2008-04-23 18:13 <DIR> d-------- C:\Program Files\RogueRemover FREE
2008-04-22 22:11 . 2008-04-27 16:08 6,122 --a------ C:\Windows\System32\Config.MPF
2008-04-22 21:35 . 2006-03-03 11:07 143,360 --a------ C:\Windows\System32\dunzip32.dll
2008-04-22 21:32 . 2007-06-25 10:57 32,008 --a------ C:\Windows\System32\drivers\mferkdk.sys
2008-04-22 21:31 . 2008-02-06 09:51 171,400 --a------ C:\Windows\System32\drivers\mfehidk.sys
2008-04-22 21:31 . 2007-03-02 14:17 120,360 --a------ C:\Windows\System32\drivers\Mpfp.sys
2008-04-22 21:31 . 2007-06-25 14:54 71,496 --a------ C:\Windows\System32\drivers\mfeavfk.sys
2008-04-22 21:31 . 2007-06-25 10:57 37,480 --a------ C:\Windows\System32\drivers\mfesmfk.sys
2008-04-22 21:31 . 2007-06-25 10:57 34,184 --a------ C:\Windows\System32\drivers\mfebopk.sys
2008-04-22 21:29 . 2008-04-22 21:29 <DIR> d-------- C:\Program Files\McAfee.com
2008-04-22 21:28 . 2008-04-27 15:44 <DIR> d-------- C:\Program Files\McAfee
2008-04-22 21:28 . 2008-04-22 21:35 <DIR> d-------- C:\Program Files\Common Files\McAfee
2008-04-20 10:17 . 2008-04-20 10:18 <DIR> d--hsc--- C:\Program Files\Common Files\WindowsLiveInstaller
2008-04-20 10:16 . 2008-04-20 10:16 <DIR> d-------- C:\ProgramData\WLInstaller
2008-04-20 10:16 . 2008-04-20 10:19 <DIR> d-------- C:\Program Files\Windows Live
2008-04-18 22:32 . 2008-02-15 00:19 944,184 --a------ C:\Windows\System32\winload.exe
2008-04-18 22:32 . 2008-02-19 06:10 620,088 --a------ C:\Windows\System32\ci.dll
2008-04-18 22:32 . 2008-02-29 07:39 371,712 --a------ C:\Windows\System32\srcore.dll
2008-04-18 22:32 . 2008-02-29 07:38 313,856 --a------ C:\Windows\System32\rstrui.exe
2008-04-18 22:32 . 2008-02-29 07:39 40,960 --a------ C:\Windows\System32\srclient.dll
2008-04-18 22:32 . 2008-02-29 07:51 19,000 --a------ C:\Windows\System32\kd1394.dll
2008-04-18 22:32 . 2008-02-29 07:38 16,384 --a------ C:\Windows\System32\srdelayed.exe
2008-04-18 22:32 . 2008-02-29 07:34 7,168 --a------ C:\Windows\System32\f3ahvoas.dll
2008-04-18 22:32 . 2008-02-29 07:35 6,656 --a------ C:\Windows\System32\kbd106n.dll
2008-04-14 21:07 . 2008-02-21 05:43 296,448 --a------ C:\Windows\System32\gdi32.dll
2008-04-14 20:58 . 2008-02-29 05:16 2,027,008 --a------ C:\Windows\System32\win32k.sys
2008-04-14 20:53 . 2007-12-16 12:42 83,968 --a------ C:\Windows\System32\dnsrslvr.dll
2008-04-14 20:53 . 2007-12-16 12:41 24,576 --a------ C:\Windows\System32\dnscacheugc.exe
2008-04-14 20:19 . 2008-04-14 20:19 524,288 --ahs---- C:\Users\Public\NTUSER.DAT{9f6c959e-0a50-11dd-930b-00030d6ccb77}.TMContainer00000000000000000002.regtrans-ms
2008-04-14 20:19 . 2008-04-14 20:19 524,288 --ahs---- C:\Users\Public\NTUSER.DAT{9f6c959e-0a50-11dd-930b-00030d6ccb77}.TMContainer00000000000000000001.regtrans-ms
2008-04-14 20:19 . 2008-04-14 20:19 65,536 --ahs---- C:\Users\Public\NTUSER.DAT{9f6c959e-0a50-11dd-930b-00030d6ccb77}.TM.blf
2008-04-14 17:47 . 2008-04-14 17:47 <DIR> d-------- C:\Program Files\Sky Broadband

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-04-27 01:41 --------- d-----w C:\Program Files\SUPERAntiSpyware
2008-04-22 20:39 --------- d-----w C:\ProgramData\McAfee
2008-04-15 09:51 --------- d-----w C:\Program Files\Windows Mail
2008-04-14 16:26 --------- d-----w C:\Program Files\InstallShield Installation Information
2008-04-14 16:25 --------- d-----w C:\Users\Sarah-Jane\AppData\Roaming\Virgin Broadband
2008-04-14 16:20 319,984 ----a-w C:\Windows\DIFxAPI.dll
2008-04-14 16:20 --------- d-----w C:\Program Files\Realtek
2008-04-14 16:18 --------- d-----w C:\ProgramData\Symantec
2008-04-14 16:18 --------- d-----w C:\Program Files\Common Files\Symantec Shared
2008-03-19 20:34 --------- d-----w C:\Program Files\SopCast
2008-03-14 11:32 --------- d-----w C:\Program Files\Dell AIO Printer A920
2008-02-21 04:43 826,368 ----a-w C:\Windows\System32\wininet.dll
2008-02-21 04:43 56,320 ----a-w C:\Windows\System32\iesetup.dll
2008-02-21 04:43 52,736 ----a-w C:\Windows\AppPatch\iebrshim.dll
2008-02-21 04:43 26,624 ----a-w C:\Windows\System32\ieUnatt.exe
2008-02-15 03:04 194,560 ----a-w C:\Windows\System32\WebClnt.dll
2008-02-14 03:14 3,504,696 ----a-w C:\Windows\System32\ntkrnlpa.exe
2008-02-14 03:14 3,470,392 ----a-w C:\Windows\System32\ntoskrnl.exe
2008-02-14 03:13 24,064 ----a-w C:\Windows\System32\netcfg.exe
2008-02-14 03:13 22,016 ----a-w C:\Windows\System32\netiougc.exe
2008-02-14 03:13 167,424 ----a-w C:\Windows\System32\tcpipcfg.dll
2008-02-14 03:11 537,600 ----a-w C:\Windows\AppPatch\AcLayers.dll
2008-02-14 03:11 449,536 ----a-w C:\Windows\AppPatch\AcSpecfc.dll
2008-02-14 03:11 4,247,552 ----a-w C:\Windows\System32\GameUXLegacyGDFs.dll
2008-02-14 03:11 2,560 ----a-w C:\Windows\AppPatch\AcRes.dll
2008-02-14 03:11 2,144,256 ----a-w C:\Windows\AppPatch\AcGenral.dll
2008-02-14 03:11 173,056 ----a-w C:\Windows\AppPatch\AcXtrnal.dll
2008-02-14 03:11 1,686,528 ----a-w C:\Windows\System32\gameux.dll
2007-11-09 12:48 53,744 ----a-w C:\Users\Sarah-Jane\AppData\Roaming\GDIPFONTCACHEV1.DAT
2007-10-01 18:39 174 --sha-w C:\Program Files\desktop.ini
2007-12-03 22:37 16,384 --sha-w C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
2007-12-03 22:37 32,768 --sha-w C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
2007-12-03 22:37 16,384 --sha-w C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
.

((((((((((((((((((((((((((((( snapshot@2008-04-26_16.01.44.75 )))))))))))))))))))))))))))))))))))))))))
.
- 2008-04-26 11:05:55 67,584 --s-a-w C:\Windows\bootstat.dat
+ 2008-04-27 14:43:33 67,584 --s-a-w C:\Windows\bootstat.dat
- 2008-04-26 11:05:57 2,048 --sha-w C:\Windows\ServiceProfiles\LocalService\AppData\Local\lastalive0.dat
+ 2008-04-27 14:43:34 2,048 --sha-w C:\Windows\ServiceProfiles\LocalService\AppData\Local\lastalive0.dat
- 2008-04-26 11:05:57 2,048 --sha-w C:\Windows\ServiceProfiles\LocalService\AppData\Local\lastalive1.dat
+ 2008-04-27 14:43:34 2,048 --sha-w C:\Windows\ServiceProfiles\LocalService\AppData\Local\lastalive1.dat
- 2008-04-26 11:08:43 262,144 --sha-w C:\Windows\ServiceProfiles\LocalService\ntuser.dat
+ 2008-04-27 14:46:08 262,144 --sha-w C:\Windows\ServiceProfiles\LocalService\ntuser.dat
+ 2008-04-27 14:46:08 262,144 ---ha-w C:\Windows\ServiceProfiles\LocalService\ntuser.dat.LOG1
- 2008-04-26 11:08:38 262,144 --sha-w C:\Windows\ServiceProfiles\NetworkService\ntuser.dat
+ 2008-04-27 14:46:02 262,144 --sha-w C:\Windows\ServiceProfiles\NetworkService\ntuser.dat
+ 2008-04-27 14:46:02 262,144 ---ha-w C:\Windows\ServiceProfiles\NetworkService\ntuser.dat.LOG1
- 2008-04-26 13:33:22 16,384 --sha-w C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
+ 2008-04-27 14:09:50 16,384 --sha-w C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
- 2008-04-26 13:33:22 196,608 --sha-w C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
+ 2008-04-27 14:09:50 196,608 --sha-w C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
- 2008-04-26 13:33:22 32,768 --sha-w C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
+ 2008-04-27 14:09:50 32,768 --sha-w C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
- 2008-04-26 11:09:02 14,450 ----a-w C:\Windows\System32\WDI\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\S-1-5-21-3780324414-3892256287-4210071181-1000_UserData.bin
+ 2008-04-27 14:46:24 14,450 ----a-w C:\Windows\System32\WDI\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\S-1-5-21-3780324414-3892256287-4210071181-1000_UserData.bin
- 2008-04-26 11:09:02 62,040 ----a-w C:\Windows\System32\WDI\BootPerformanceDiagnostics_SystemData.bin
+ 2008-04-27 14:46:24 62,190 ----a-w C:\Windows\System32\WDI\BootPerformanceDiagnostics_SystemData.bin
- 2008-04-16 18:17:45 4,870 ----a-w C:\Windows\System32\WDI\ERCQueuedResolutions.dat
+ 2008-04-26 18:20:12 4,870 ----a-w C:\Windows\System32\WDI\ERCQueuedResolutions.dat
- 2008-04-26 11:09:01 60,534 ----a-w C:\Windows\System32\WDI\ShutdownPerformanceDiagnostics_SystemData.bin
+ 2008-04-27 14:46:23 60,598 ----a-w C:\Windows\System32\WDI\ShutdownPerformanceDiagnostics_SystemData.bin
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray.exe"="C:\Windows\ehome\ehTray.exe" [2006-11-02 13:35 125440]
"SpybotSD TeaTimer"="C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe" [2008-01-28 11:43 2097488]
"b009e552"="C:\Users\SARAH-~1\AppData\Local\Temp\qlejwtra.dll" [ ]
"Reminder_MUI"="C:\Applications\oem\Reminder\Reminder_MUI.exe" [2007-04-26 11:22 1085440]
"WMPNSCFG"="C:\Program Files\Windows Media Player\WMPNSCFG.exe" [2006-11-02 13:36 201728]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\shellexecutehooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= C:\Program Files\SUPERAntiSpyware\SASSEH.DLL [2006-12-20 14:55 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
C:\Program Files\SUPERAntiSpyware\SASWINLO.dll 2007-04-19 14:41 294912 C:\Program Files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"msacm.clmp3enc"= C:\PROGRA~1\CYBERL~1\Power2Go\CLMP3Enc.ACM

[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
path=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
backup=C:\Windows\pss\Adobe Reader Speed Launch.lnk.CommonStartup
backupExtension=.CommonStartup

[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Microsoft Office.lnk]
path=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office.lnk
backup=C:\Windows\pss\Microsoft Office.lnk.CommonStartup
backupExtension=.CommonStartup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\b009e552]
C:\Users\SARAH-~1\AppData\Local\Temp\qlejwtra.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BMb33ad6ce]
C:\Users\SARAH-~1\AppData\Local\Temp\jkloyhcq.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\cmds]
C:\Users\SARAH-~1\AppData\Local\Temp\oPiHAtSI.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Dell AIO Printer A920]
C:\Program Files\Dell AIO Printer A920\dlbkbmgr.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HotKeysCmds]
--a------ 2006-12-13 03:19 106496 C:\Windows\system32\hkcmd.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IgfxTray]
--a------ 2006-12-13 03:17 98304 C:\Windows\system32\igfxtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Malwarebytes Anti-Malware Reboot]
--a------ 2008-04-07 20:17 1175160 C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MskAgentexe]
--a------ 2007-01-17 17:30 152144 C:\Program Files\McAfee\MSK\MskAgent.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSServer]
C:\Users\SARAH-~1\AppData\Local\Temp\pmnoNGVn.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Persistence]
--a------ 2006-12-13 03:17 81920 C:\Windows\system32\igfxpers.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
--a------ 2008-01-10 16:27 385024 C:\Program Files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Reminder_MUI]
-ra------ 2007-04-26 11:22 1085440 C:\Applications\oem\Reminder\Reminder_MUI.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SpybotSD TeaTimer]
-rahs---- 2008-01-28 11:43 2097488 C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Windows Defender]
--a------ 2007-05-21 08:48 1006264 C:\Program Files\Windows Defender\MSASCui.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"UacDisableNotify"=dword:00000001
"InternetSettingsDisableNotify"=dword:00000001
"AutoUpdateDisableNotify"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\DomainProfile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\FirewallRules]
"{8D771594-0958-48B8-A5DE-D9348B2CF162}"= UDP:C:\Windows\ehome\ehshell.exe:Windows Media Center
"{9CA13480-C80B-41A4-9CAA-61B67DBC48DB}"= TCP:C:\Windows\ehome\ehshell.exe:Windows Media Center
"{F3D3B063-5373-4A82-8593-97749497CF99}"= UDP:C:\Program Files\Windows Mail\WinMail.exe:Windows Mail
"{2109090E-A033-494B-935B-113965C28831}"= TCP:C:\Program Files\Windows Mail\WinMail.exe:Windows Mail
"{03A60952-8365-4600-9AD0-BC3420BAD628}"= UDP:C:\Program Files\Windows Photo Gallery\WindowsPhotoGallery.exe:Windows Photo Gallery
"{AE79C245-F01C-4322-B73F-E815CBAEC19E}"= TCP:C:\Program Files\Windows Photo Gallery\WindowsPhotoGallery.exe:Windows Photo Gallery
"{4E6B218F-6A67-4A6B-9BEF-C80E4566574C}"= UDP:C:\Program Files\Shareaza\Shareaza.exe:Shareaza
"{F17C203C-E1F7-4393-8DF9-FE5B1F0DE4A9}"= TCP:C:\Program Files\Shareaza\Shareaza.exe:Shareaza
"{A6AE02EC-23E1-4BCE-8BC0-423C37ED6D23}"= UDP:C:\Program Files\Bonjour\mDNSResponder.exe:Bonjour
"{817F1C8E-5AEF-4256-8BA3-B3AE54563E22}"= TCP:C:\Program Files\Bonjour\mDNSResponder.exe:Bonjour
"TCP Query User{91EC07B7-ED1D-41A4-892E-816CD80F224D}C:\\program files\\shareaza applications\\shareaza\\shareaza.exe"= UDP:C:\program files\shareaza applications\shareaza\shareaza.exe:Shareaza
"UDP Query User{EBE59A0B-6568-4BB5-8385-D9D3906F8536}C:\\program files\\shareaza applications\\shareaza\\shareaza.exe"= TCP:C:\program files\shareaza applications\shareaza\shareaza.exe:Shareaza
"TCP Query User{0E352F57-EC4F-4F60-9916-6EBB5781AD71}C:\\program files\\sopcast\\adv\\sopadver.exe"= UDP:C:\program files\sopcast\adv\sopadver.exe:SopCast Adver
"UDP Query User{EE3CB603-B950-4F29-93A2-453325CD30CC}C:\\program files\\sopcast\\adv\\sopadver.exe"= TCP:C:\program files\sopcast\adv\sopadver.exe:SopCast Adver
"TCP Query User{95316B77-C1C6-4FE8-BEEE-F48DF6C07AFE}C:\\program files\\sopcast\\sopcast.exe"= UDP:C:\program files\sopcast\sopcast.exe:SopCast Main Application
"UDP Query User{C0B8810E-4980-402C-89FA-BDC78C3EBD6B}C:\\program files\\sopcast\\sopcast.exe"= TCP:C:\program files\sopcast\sopcast.exe:SopCast Main Application
"TCP Query User{3B08A83B-1ED3-4CB6-9B8D-8FDE39E353B2}C:\\program files\\sopcast\\sopvod.exe"= UDP:C:\program files\sopcast\sopvod.exe:sopvod
"UDP Query User{430F6CE3-EEEB-4327-B047-B86BF8F55DBF}C:\\program files\\sopcast\\sopvod.exe"= TCP:C:\program files\sopcast\sopvod.exe:sopvod
"TCP Query User{8121DC93-7E60-4E68-BBB2-8F942C89133D}C:\\program files\\sopcast\\sopcast.exe"= UDP:C:\program files\sopcast\sopcast.exe:SopCast Main Application
"UDP Query User{6E869D61-2725-4E1E-8A84-81A497F53464}C:\\program files\\sopcast\\sopcast.exe"= TCP:C:\program files\sopcast\sopcast.exe:SopCast Main Application
"{0C07CA25-16A2-4317-8711-8DE8FD2F5248}"= UDP:C:\Windows\System32\dlbkcoms.exe:AIO Printer A920 Server
"{944DF04E-7DDD-4E0D-9EE9-72E2702515FC}"= TCP:C:\Windows\System32\dlbkcoms.exe:AIO Printer A920 Server
"{DAB1492B-2F5D-490D-AC2C-4B68070ACC15}"= UDP:C:\Program Files\Common Files\McAfee\MNA\McNASvc.exe:McAfee Network Agent
"{022C8E94-7120-451B-80DB-D31BA8946435}"= C:\Program Files\Windows Live\Messenger\livecall.exe:Windows Live Messenger (Phone)
"{5A987C03-F208-4E4D-A1C4-26CB794DD648}"= UDP:C:\Program Files\Common Files\McAfee\MNA\McNASvc.exe:McAfee Network Agent
"{10A2E33B-106D-417E-B4F7-BD2373162AF4}"= TCP:C:\Program Files\Common Files\McAfee\MNA\McNASvc.exe:McAfee Network Agent

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\PublicProfile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\RestrictedServices\Static\System]
"DFSR-1"= RPort=5722|UDP:%SystemRoot%\system32\svchost.exe|Svc=DFSR:Allow inbound TCP traffic|

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\StandardProfile]
"EnableFirewall"= 0 (0x0)

R2 dlbk_device;dlbk_device;C:\Windows\system32\dlbkcoms.exe [2007-06-25 22:17]
R2 SBSDWSCService;SBSD Security Center Service;C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe [2008-01-28 11:43]
R3 igfx;igfx;C:\Windows\system32\DRIVERS\igdkmd32.sys [2006-12-13 04:32]
R3 netr73;RT73 USB Wireless LAN Card Driver for Vista;C:\Windows\system32\DRIVERS\netr73.sys [2006-09-28 22:41]

.
Contents of the 'Scheduled Tasks' folder
"2008-04-22 22:09:08 C:\Windows\Tasks\McDefragTask.job"
- c:\program files\mcafee\mqc\QcConsol.exe'
"2008-04-22 22:09:08 C:\Windows\Tasks\McQcTask.job"
- c:\program files\mcafee\mqc\QcConsol.exe
.
**************************************************************************

catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-04-27 16:08:04
Windows 6.0.6000 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
Completion time: 2008-04-27 16:09:32
ComboFix-quarantined-files.txt 2008-04-27 15:09:11
ComboFix2.txt 2008-04-26 15:02:42

Pre-Run: 9,850,142,720 bytes free
Post-Run: 9,830,952,960 bytes free

264 --- E O F --- 2008-04-19 10:55:30

Here's the HiJackThis Log:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 15:51:48, on 27/04/2008
Platform: Windows Vista (WinNT 6.00.1904)
MSIE: Internet Explorer v7.00 (7.00.6000.16643)
Boot mode: Normal

Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\ehome\ehtray.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Windows\ehome\ehmsas.exe
c:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\Program Files\McAfee\MPS\mpsevh.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - c:\PROGRA~1\mcafee\VIRUSS~1\scriptcl.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O3 - Toolbar: (no name) - {0BF43445-2F28-4351-9252-17FE6E806AA0} - (no file)
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [b009e552] rundll32.exe "C:\Users\SARAH-~1\AppData\Local\Temp\qlejwtra.dll",b
O4 - HKCU\..\Run: [Reminder_MUI] C:\Applications\oem\Reminder\Reminder_MUI.exe
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: Sky - {08E730A4-FB02-45BD-A900-01E4AD8016F6} - http://www.sky.com (file missing)
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O13 - Gopher Prefix:
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Unknown owner - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
O23 - Service: dlbk_device - - C:\Windows\system32\dlbkcoms.exe
O23 - Service: McAfee E-mail Proxy (Emproxy) - McAfee, Inc. - C:\PROGRA~1\COMMON~1\McAfee\EmProxy\emproxy.exe
O23 - Service: McAfee HackerWatch Service - McAfee, Inc. - C:\Program Files\Common Files\McAfee\HackerWatch\HWAPI.exe
O23 - Service: McAfee Update Manager (mcmispupdmgr) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcupdmgr.exe
O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\program files\common files\mcafee\mna\mcnasvc.exe
O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
O23 - Service: McAfee Protection Manager (mcpromgr) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcpromgr.exe
O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
O23 - Service: McAfee Redirector Service (McRedirector) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\redirsvc\redirsvc.exe
O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe
O23 - Service: McAfee Privacy Service (MPS9) - McAfee, Inc. - C:\PROGRA~1\McAfee\MPS\mps.exe
O23 - Service: McAfee SpamKiller Service (MSK80Service) - McAfee Inc. - C:\Program Files\McAfee\MSK\MskSrver.exe
O23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe

--
End of file - 5331 bytes

#11 Thunder

Thunder

  • Members
  • 3,294 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Belgium
  • Local time:04:35 AM

Posted 28 April 2008 - 09:42 AM

Hello Invisiblelady,

I see you are running Teatimer.
I suggest you to disable it because it can interfere with the changes you'll make on your system.
When everything is done and your log is clean again, you can enable it again.
If teatimer gives you a warning afterwards that some changes were made, allow this instead of blocking it.

Open Notepad and copy and paste the bold, blue text below in it:
(don't forget to copy and paste REGEDIT4)REGEDIT4

[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\b009e552]

[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BMb33ad6ce]

[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\cmds]

[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSServer]

Save this as fix.reg Choose to save as "all files" and place it on your Desktop.
It should look like this: Posted Image
Rightclick on it, choose to "Run as administrator" and when it asks you if you want to merge the contents to the registry, click Yes/OK.
(In case you are unsure how to create a reg file, take a look here with screenshots.)

Are you still having problems ?

Greetings,
Thunder
Whatever happens, make believe it was intended to ...
-----------------------------------------------------------------------
Posted Image - If I have helped you in any way, please consider a donation to help me continue the fight against malware.
-----------------------------------------------------------------------
Stand Up & Be Counted --> Posted Image <-- And make a difference

#12 invisiblelady

invisiblelady
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:02:35 AM

Posted 28 April 2008 - 11:33 AM

Hi Thunder

Thanks again, Im not having problems anymore but I just scanned again with the Malware scan you told me to use and it found a Trojan.agent. I deleted it but I wonder why it is there. Is it because of the teatimer? also I followed your instructions regarding the fix.reg and there is no option to run as administrator when i right click so what should I do?

Thank you so much for all your help and fixing my computer!!

Edited by invisiblelady, 28 April 2008 - 11:34 AM.


#13 Thunder

Thunder

  • Members
  • 3,294 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Belgium
  • Local time:04:35 AM

Posted 28 April 2008 - 02:57 PM

Hello Invisiblelady,

If you don't see the "Run as administrator" option, then just double click the reg file to add the changes to the registry. :thumbsup:

Spybot's TeaTimer can indeed replace some deleted keys or values,
although in your case they should be no longer harmful.

In case of doubt, feel free to run ComboFix once more and post an additional log for checking.

Greetings,
Thunder
Whatever happens, make believe it was intended to ...
-----------------------------------------------------------------------
Posted Image - If I have helped you in any way, please consider a donation to help me continue the fight against malware.
-----------------------------------------------------------------------
Stand Up & Be Counted --> Posted Image <-- And make a difference

#14 Thunder

Thunder

  • Members
  • 3,294 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Belgium
  • Local time:04:35 AM

Posted 25 May 2008 - 05:05 PM

Since there is no feedback anymore, I assume this issue is resolved ... so, this Topic is closed.
If you need this topic reopened for continuations of existing problems, please request this by sending me a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.
Whatever happens, make believe it was intended to ...
-----------------------------------------------------------------------
Posted Image - If I have helped you in any way, please consider a donation to help me continue the fight against malware.
-----------------------------------------------------------------------
Stand Up & Be Counted --> Posted Image <-- And make a difference




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users