Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Colored Background, Disabled Reg Edit and Task Mngr.


  • This topic is locked This topic is locked
9 replies to this topic

#1 Socha_62

Socha_62

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:05:46 PM

Posted 07 January 2009 - 08:55 PM

Well I guess I went somewhere I wasn't suppose to. I didn't have AVG or SpyWare Guard running because I forgot I disabled everything on start up.

This bug really screwed things up. Changed my background to some weird colors. Everything is running extremely slow. Task Manager is disabled along with anything involving Reg Edit as well as some other things. I scaned with AVG and it found some stuff but I know theres alot left.

I cleaned up some things I knew weren't suppose to be there and here is the HiJack log I have now. I also have the HiJack log before I cleaned up some stuff. From what I've found so far this is a really nasty bug :thumbsup: Thanks for the help in advance!



Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 8:54:35 PM, on 1/7/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\LEXPPS.EXE
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\system32\F5InstallerService.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Microsoft LifeCam\MSCamS32.exe
C:\Program Files\Google\Update\GoogleUpdate.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
C:\WINDOWS\system32\svchost.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe
C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\Program Files\Linksys Wireless-G PCI Wireless Network Monitor\WLService.exe
C:\Program Files\Linksys Wireless-G PCI Wireless Network Monitor\WMP54Gv4.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\runsql.exe
C:\program files\steam\steam.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\SpywareGuard\sgmain.exe
C:\Program Files\SpywareGuard\sgbhp.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Search,Default_Page_URL =

www.google.com/ig/dell?hl=en&client=dell-usuk&channel=us
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R3 - URLSearchHook: AIM Toolbar Search Class - {03402f96-3dc7-4285-bc50-9e81fefafe43} - C:\Program Files\AIM

Toolbar\aimtb.dll
O1 - Hosts: 141.219.240.2 vpn.mtu.edu #ADDED BY F5 NETWORKS SSL TUNNEL - ORIGINAL RECORD#
O1 - Hosts: 141.219.240.2 vpn #ADDED BY F5 NETWORKS SSL TUNNEL - ORIGINAL RECORD#
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat

7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SpywareGuardDLBLOCK.CBrowserHelper - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program

Files\SpywareGuard\dlprotect.dll
O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\System32\DLA\DLASHX_W.DLL
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_02\bin\ssv.dll
O2 - BHO: CBrowserHelperObject Object - {CA6319C0-31B7-401E-A518-A07C3DB8F777} - C:\Program Files\BAE\BAE.dll
O2 - BHO: MSN Toolbar Helper - {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - C:\Program

Files\MSN\Toolbar\3.0.0311.0\msneshellx.dll
O2 - BHO: Google Gears Helper - {E0FEFE40-FBF9-42AE-BA58-794CA7E3FB53} - C:\Program Files\Google\Google Gears\Internet

Explorer\0.5.4.2\gears.dll
O2 - BHO: FlashFXP Helper for Internet Explorer - {E5A1691B-D188-4419-AD02-90002030B8EE} - C:\PROGRA~1\FlashFXP\IEFlash.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: MSN Toolbar - {1E61ED7C-7CB8-49d6-B9E9-AB4C880C8414} - C:\Program Files\MSN\Toolbar\3.0.0311.0\msneshellx.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: AIM Toolbar - {61539ecd-cc67-4437-a03c-9aaccbd14326} - C:\Program Files\AIM Toolbar\aimtb.dll
O4 - HKLM\..\Run: [MioNet] C:\Program Files\MioNet\MioNetLauncher.exe /p
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
O4 - HKLM\..\Run: [ATICustomerCare] "C:\Program Files\ATI\ATICustomerCare\ATICustomerCare.exe"
O4 - HKLM\..\Run: [runsql] C:\WINDOWS\runsql.exe
O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
O4 - HKCU\..\Run: [Steam] "c:\program files\steam\steam.exe" -silent
O7 - HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
O7 - HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
O8 - Extra context menu item: &AIM Toolbar Search - C:\Documents and Settings\All Users\Application Data\AIM

Toolbar\ieToolbar\resources\en-US\local\search.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_02\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program

Files\Java\jre1.6.0_02\bin\ssv.dll
O9 - Extra button: (no name) - {09C04DA7-5B76-4EBC-BBEE-B25EAC5965F5} - C:\Program Files\Google\Google Gears\Internet

Explorer\0.5.4.2\gears.dll
O9 - Extra 'Tools' menuitem: &Gears Settings - {09C04DA7-5B76-4EBC-BBEE-B25EAC5965F5} - C:\Program Files\Google\Google

Gears\Internet Explorer\0.5.4.2\gears.dll
O9 - Extra button: AIM Toolbar - {0b83c99c-1efa-4259-858f-bcb33e007a5b} - C:\Program Files\AIM Toolbar\aimtb.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~4\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search &

Destroy\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program

Files\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network

Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program

Files\Messenger\msmsgs.exe
O16 - DPF: {0742B9EF-8C83-41CA-BFBA-830A59E23533} (Microsoft Data Collection Control) -

https://support.microsoft.com/OAS/ActiveX/MSDcode.cab
O16 - DPF: {2BCDB465-81F9-41CB-832C-8037A4064446} (F5 Networks VPN Manager) - file://C:/Program Files/F5

VPN/F5_TMP/urxvpn.cab
O16 - DPF: {41EF3CD2-D8CC-4438-84B1-280BB4E77C8E} (F5 Networks Dynamic Application Tunnel Control) - file://C:/Program

Files/F5 VPN/F5_TMP/f5tunsrv.cab
O16 - DPF: {45B69029-F3AB-4204-92DE-D5140C3E8E74} (F5 Networks Auto Update) - file://C:/Program Files/F5

VPN/F5_TMP/InstallerControl.cab
O16 - DPF: {57C76689-F052-487B-A19F-855AFDDF28EE} (F5 Networks Policy Agent Host Class) - file://C:/Program Files/F5

VPN/F5_TMP/f5InspectionHost.cab
O16 - DPF: {5AE58FCF-6F6A-49B2-B064-02492C66E3F4} (MUCatalogWebControl Class) -

http://catalog.update.microsoft.com/v7/sit...b?1227585738953
O16 - DPF: {6C275925-A1ED-4DD2-9CEE-9823F5FDAA10} (F5 Networks SSLTunnel) - file://C:/Program Files/F5

VPN/F5_TMP/urTermProxy.cab
O16 - DPF: {7584c670-2274-4efb-b00b-d6aaba6d3850} (Microsoft RDP Client Control (redist)) - file://C:/Program Files/F5

VPN/F5_TMP/msrdp.cab
O16 - DPF: {7E73BE8F-FD87-44EC-8E22-023D5FF960FF} (F5 Virtual Sandbox Class) - file://C:/Program Files/F5

VPN/F5_TMP/vdeskctrl.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) -

http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O16 - DPF: {CC85ACDF-B277-486F-8C70-2C9B2ED2A4E7} (F5 Networks SuperHost Class) - file://C:/Program Files/F5

VPN/F5_TMP/urxshost.cab
O16 - DPF: {E0FF21FA-B857-45C5-8621-F120A0C17FF2} (F5 Networks Host Control) - file://C:/Program Files/F5

VPN/F5_TMP/urxhost.cab
O16 - DPF: {E615C9EA-AD69-4AE9-83C9-9D906A0ACA6D} (F5 Networks OS Policy Agent) - file://C:/Program Files/F5

VPN/F5_TMP/f5syschk.cab
O16 - DPF: {E66D35B8-E70D-42A6-B1F5-DB784CB92B15} (URVNCX Class) - file://C:/Program Files/F5 VPN/F5_TMP/urvncx.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{70F4A7FA-AF21-429A-B91E-1C47CA540F50}: NameServer = 24.247.15.53,24.247.24.53
O17 - HKLM\System\CCS\Services\Tcpip\..\{95248D73-4C96-41BC-954A-1A5B3723BEA9}: NameServer = 192.168.1.1
O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~1\GOEC62~1.DLL,C:\WINDOWS\system32\verahuna.dll
O22 - SharedTaskScheduler: IPC Configuration Utility - IPC Configuration Utility - (no file)
O22 - SharedTaskScheduler: Windows Installer Class - {020487CC-FC04-4B1E-863F-D9801796230B} -

C:\DOCUME~1\Jason\LOCALS~1\Temp\wndutl32.dll
O23 - Service: Adobe LM Service - Unknown owner - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device

Support\bin\AppleMobileDeviceService.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - C:\Program Files\Grisoft\AVG Anti-Spyware

7.5\guard.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: F5 Networks Component Installer - F5 Networks - C:\WINDOWS\system32\F5InstallerService.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet

Publisher\FNPLicensingService.exe
O23 - Service: Google Desktop Manager 5.7.801.1629 (GoogleDesktopManager-010108-205858) - Google - C:\Program

Files\Google\Google Desktop Search\GoogleDesktop.exe
O23 - Service: Google Update Service (gupdate1c934b2b254583c) (gupdate1c934b2b254583c) - Google Inc. - C:\Program

Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google

Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common

Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: MioNet - Unknown owner - C:\Program Files\MioNet\MioNetManager.exe
O23 - Service: Intel NCS NetService (NetSvc) - Intel® Corporation - C:\Program Files\Intel\PROSetWired\NCS\Sync\NetSvc.exe
O23 - Service: Trend Micro Central Control Component (PcCtlCom) - Trend Micro Incorporated. -

C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
O23 - Service: Trend Micro Real-time Service (Tmntsrv) - Trend Micro Incorporated. -

C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Common Files\Ulead

Systems\DVD\ULCDRSvr.exe
O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe
O23 - Service: WMP54Gv4SVC - GEMTEKS - C:\Program Files\Linksys Wireless-G PCI Wireless Network Monitor\WLService.exe

--
End of file - 11891 bytes

BC AdBot (Login to Remove)

 


#2 Hoov

Hoov

  • Malware Response Team
  • 3,519 posts
  • OFFLINE
  •  
  • Location:Mikado Michigan
  • Local time:04:46 PM

Posted 20 January 2009 - 05:34 PM

Howdy, my name is Hoov, and I will be helping you with your dilemma. I appologize for the delay in getting you help.

Please make sure you watch this thread for responses. If you click the options tab at the top of your first post, you can select to track this thread.

Here is what I am asking you to do during the repair of your computer

*Tell me everything that you have done, if anything, to try and fix this problem.

*Please only use 1 forum to help clear up your problem. Posting on more than 1 and following instructions from more than 1 forum will cause those helping you to pull out thier hair.

*Follow my instructions - If you can't for some reason, or if you don't understand something, please tell me. If you deviate from my instructions, tell me, it may make a difference on where we go. Don't install anything, even other programs that have nothing to do with security or malware, it could cause things to change, and I would never know it.

*Have faith. I will do all I can to get your computer working, and if I can't - someone else here will know something else to try.

*Stick with me to the end. My aim is to fix your problems, and give you the tools and knowledge to keep this from happening again.

Now onto trying to fix your computer.
Run an online virus scan called Kaspersky from HERE.1. At the main page. Press on "Accept". After reading the contents.
2. At the next window Select Update. Allow the Database to update.
Note: If prompted to run or update your Java, then follow the prompts to do so. Kaspersky requires Java to run.
3. Once the Database has finished, under the Scan icon Select My Computer to start the scan. The scan may take a few minutes to complete.
4. Select Scan Report.
5. If any threats were found they will appear in the report
6. Select "Save error report as"
Then in the file name just type in kaspersky
Under "save as type" select text .txt
Save it to your Desktop.

Copy and post the results of the Kaspersky Online scan. If no threats were found then report that as well.
Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself.
  • Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install. Alternatively, you can update through MBAM's interface from a clean computer, copy the definitions (rules.ref) located in C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware from that system to a usb stick or CD and then copy it to the infected machine.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you after scanning with MBAM. Please temporarily disable such programs or permit them to allow the changes.
Visiting From SpywareHammer.com and DonHoover.net

Tilting at windmills hurts you more than the windmills.
-From the Notebooks of Lazarus Long
Senior of the Howard Families

Posted Image

#3 Socha_62

Socha_62
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:05:46 PM

Posted 25 January 2009 - 12:01 PM

Hello and thanks for your reply.

Here is what I have done so (before your instructions) to try to remove this stuff.

Have Ran and Updated:
Spybot
Ad-Aware
AVG Anti-Spyware
Spyware Blaster
Malwarebytes Anti Spyware
Prevx CSI

I beleive that it is. The computer is better but still overall much slower then usual, and lots of of pop ups and BHO's.


One last thing also. I selected to rescan on reboot in Malwarebytes but I don't think it actually did scan.

Here are the logs you asked for!

--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7 REPORT
Sunday, January 25, 2009
Operating System: Microsoft Windows XP Professional Service Pack 3 (build 2600)
Kaspersky Online Scanner 7 version: 7.0.25.0
Program database last update: Saturday, January 24, 2009 18:49:06
Records in database: 1699909
--------------------------------------------------------------------------------

Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes

Scan area - My Computer:
C:\
D:\
E:\
F:\
G:\
H:\
I:\
J:\
K:\

Scan statistics:
Files scanned: 374234
Threat name: 30
Infected objects: 107
Suspicious objects: 0
Duration of the scan: 07:49:43


File name / Threat name / Threats count
c:\windows\system32\mulobewe.dll/c:\windows\system32\mulobewe.dll Infected: Trojan-Spy.Win32.Agent.pgl 36
C:\WINDOWS\system32\kozunuko.dll/C:\WINDOWS\system32\kozunuko.dll Infected: Trojan.Win32.Agent.bjxa 1
sgmain.exe\siwoyula.dll/sgmain.exe\siwoyula.dll Infected: Trojan-Spy.Win32.Agent.pni 1
sgbhp.exe\siwoyula.dll/sgbhp.exe\siwoyula.dll Infected: Trojan-Spy.Win32.Agent.pni 1
C:\WINDOWS\system32\kahitepi.dll/C:\WINDOWS\system32\kahitepi.dll Infected: Trojan.Win32.Monder.amxr 1
C:\WINDOWS\system32\vgzufh.dll/C:\WINDOWS\system32\vgzufh.dll Infected: Trojan.Win32.Monderd.l 11
C:\WINDOWS\system32\gzcviw.dll/C:\WINDOWS\system32\gzcviw.dll Infected: Trojan.Win32.Agent.bjxa 9
C:\Documents and Settings\Jason\Application Data\casino.exe Infected: Worm.Win32.Pinit.gen 1
C:\Documents and Settings\Jason\Desktop\backups\backup-20090107-204234-339 Infected: Trojan.DOS.Krepper.a 1
C:\Documents and Settings\Jason\Desktop\regtools.vbs Infected: not-a-virus:RiskTool.VBS.DisReg.a 1
C:\Documents and Settings\Jason\Local Settings\Temp\Stp23_TMP.EXE Infected: not-a-virus:FraudTool.Win32.SpyNoMore.f 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\4DAJG5EN\bleepthislady[1].htm Infected: Trojan-Downloader.JS.Iframe.adv 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\7YONF585\extralargevideos[1].htm Infected: Trojan-Downloader.JS.Iframe.adv 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\7YONF585\hellgay[1].htm Infected: Trojan-Downloader.JS.Iframe.adv 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\7YONF585\kingsizematures[1].htm Infected: Trojan-Downloader.JS.Iframe.adv 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\7YONF585\teenxxxzone[1].htm Infected: Trojan-Downloader.JS.Iframe.adv 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\8T6F8923\avto1[1].exe Infected: Trojan.Win32.Monderc.o 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\8T6F8923\pinnew[1].exe Infected: Trojan.Win32.Buzus.agkh 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\8T6F8923\q3[1].exe Infected: Backdoor.Win32.Agent.abck 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\8T6F8923\teste1_p[1].exe Infected: Trojan-Clicker.Win32.Osewlone.as 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\SBF3UO59\xpornmovies[1].htm Infected: Trojan-Downloader.JS.Iframe.adv 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\SHMZ81EN\avto2[1].exe Infected: Virus.Win32.AutoRun.aku 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\SHMZ81EN\q4[1].exe Infected: Trojan.Win32.Monderc.m 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\SHMZ81EN\q6[1].exe Infected: Trojan.Win32.Monderc.n 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\SHMZ81EN\q8[1].exe Infected: Trojan.Win32.Monderc.l 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\SHMZ81EN\teste2_p[1].exe Infected: Trojan-Downloader.Win32.Agent.bcnh 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\SX6B05EZ\avto4[1].exe Infected: Backdoor.Win32.Agent.abcf 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\SX6B05EZ\file3[1].exe Infected: Trojan-Banker.Win32.Banker.acvx 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\SX6B05EZ\q2[1].exe Infected: Trojan-Clicker.Win32.Osewlone.aq 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\SX6B05EZ\q7[1].exe Infected: Worm.Win32.Pinit.gen 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\SX6B05EZ\q9[1].exe Infected: Backdoor.Win32.Agent.abbf 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\SX6B05EZ\sexmoviesland[1].htm Infected: Trojan-Downloader.JS.Iframe.adv 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\SX6B05EZ\teste4_p[1].exe Infected: Backdoor.Win32.Hupigon.fmtm 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\TWN6VRPN\avto3[1].exe Infected: Worm.Win32.Pinit.gen 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\TWN6VRPN\avto[1].exe Infected: Trojan-Clicker.Win32.Osewlone.ap 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\TWN6VRPN\q1[1].exe Infected: Worm.Win32.Pinit.gen 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\TWN6VRPN\q5[1].exe Infected: Worm.Win32.Pinit.gen 1
C:\Documents and Settings\Jason\Local Settings\Temporary Internet Files\Content.IE5\TWN6VRPN\teste3_p[1].exe Infected: Backdoor.Win32.Hupigon.fmvv 1
C:\Documents and Settings\Jason\My Documents\My Music\Lost Trailers - Hollar Back.mp3 Infected: Trojan-Downloader.WMA.GetCodec.c 1
C:\Documents and Settings\Jason\My Documents\Software Downloads\sysreset253.exe Infected: not-a-virus:Client-IRC.Win32.mIRC.614 1
C:\sysreset\mirc.exe Infected: not-a-virus:Client-IRC.Win32.mIRC.614 1
C:\WINDOWS\system32\dalapuri.dll Infected: Trojan-Spy.Win32.Agent.scb 1
C:\WINDOWS\system32\funuvoyu.dll Infected: Trojan-Spy.Win32.Agent.pni 1
C:\WINDOWS\system32\gzcviw.dll Infected: Trojan.Win32.Agent.bjxa 1
C:\WINDOWS\system32\kahitepi.dll Infected: Trojan.Win32.Monder.amxr 1
C:\WINDOWS\system32\kozunuko.dll Infected: Trojan.Win32.Agent.bjxa 1
C:\WINDOWS\system32\mulobewe.dll Infected: Trojan-Spy.Win32.Agent.pgl 1
C:\WINDOWS\system32\tatawebe.dll Infected: Trojan-Spy.Win32.Agent.pni 1
C:\WINDOWS\system32\vgzufh.dll Infected: Trojan.Win32.Monderd.l 1
C:\WINDOWS\system32\zuheyisi.dll Infected: Trojan.Win32.Monder.aouv 1
C:\WINDOWS\tmp0176900.log Infected: Trojan-Clicker.Win32.Osewlone.as 1
C:\WINDOWS\tmp4366703.log Infected: Backdoor.Win32.Hupigon.fmtm 1
C:\WINDOWS\tmp8064826.log Infected: Backdoor.Win32.Hupigon.fmvv 1
C:\WINDOWS\tmp9667788.log Infected: Trojan-Downloader.Win32.Agent.bcnh 1

The selected area was scanned.



-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------


Malwarebytes' Anti-Malware 1.33
Database version: 1691
Windows 5.1.2600 Service Pack 3

1/25/2009 11:41:19 AM
mbam-log-2009-01-25 (11-41-19).txt

Scan type: Quick Scan
Objects scanned: 81119
Time elapsed: 19 minute(s), 31 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 27
Registry Keys Infected: 13
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 64

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\fepaviwo.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\forilido.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\kahitepi.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\keyibape.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\legayaye.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\safotise.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\sinusumo.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\tinolifa.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\volugulu.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\wegomise.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\zikuseri.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\bijuyedi.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\gitubazo.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\gohahiyi.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\wohovebi.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\jarapepe.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\huduhonu.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\bijopoyu.dll (Trojan.Vundo) -> Delete on reboot.
c:\WINDOWS\system32\mimorise.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\vgzufh.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\okobjm.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\kuctpr.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\xocdcf.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\rbgbad.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\oflpaj.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\zvdfnf.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\ponimero.dll (Trojan.Vundo) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b639337c-8d5f-4e30-8926-7c58fe004f30} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{b639337c-8d5f-4e30-8926-7c58fe004f30} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{cf51e8e2-ae11-49dd-b87e-5ac6059486a2} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{f42e4baf-26fb-40a9-8319-bd8585cb1e4f} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a6f40d79-7262-47ce-b111-5cfd0f386cd7} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1e47ee91-7676-426f-9d43-c8c5271d2c01} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{2d9063ba-0282-4c79-b898-1be7e848c37e} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{998f5ec7-2ed7-45b8-aa34-88f94b90ac72} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{126f9249-727b-4b1b-9057-a551604fa37d} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\98185121 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nikigedegu (Trojan.Vundo.H) -> Delete on reboot.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\bawujasa.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\asajuwab.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\bevahoro.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\orohaveb.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\fepaviwo.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\owivapef.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\forilido.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\odilirof.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ginapede.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\edepanig.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jifibuzo.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ozubifij.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\kahitepi.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\ipetihak.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\keyibape.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\epabiyek.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\legayaye.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\eyayagel.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\safotise.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\esitofas.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\sinusumo.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\omusunis.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tinolifa.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\afilonit.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\vohajiwe.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ewijahov.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\volugulu.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\ulugulov.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wegomise.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\esimogew.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wodiboyi.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\iyobidow.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\zikuseri.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\iresukiz.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\zuheyisi.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\isiyehuz.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\zofuniwe.dll (Trojan.BHO.H) -> Delete on reboot.
C:\WINDOWS\system32\bijuyedi.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\gitubazo.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\gohahiyi.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\wohovebi.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\jarapepe.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\huduhonu.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\bijopoyu.dll (Trojan.Vundo) -> Delete on reboot.
c:\WINDOWS\system32\mimorise.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\vgzufh.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\okobjm.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\kuctpr.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\xocdcf.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\rbgbad.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\oflpaj.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\zvdfnf.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\vozeviye.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dekinate.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\fedowiwe.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\fogasolo.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pusezaso.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\comyrh.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\zedepofi.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jidomuye.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\ponimero.dll (Trojan.Vundo) -> Delete on reboot.
C:\Documents and Settings\Jason\Application Data\casino.exe (Adware.Casino) -> Quarantined and deleted successfully.
C:\Documents and Settings\Jason\Application Data\config.cfg (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\Jason\Application Data\~tmp.html (Malware.Trace) -> Quarantined and deleted successfully.

Edited by Socha_62, 25 January 2009 - 12:03 PM.


#4 Hoov

Hoov

  • Malware Response Team
  • 3,519 posts
  • OFFLINE
  •  
  • Location:Mikado Michigan
  • Local time:04:46 PM

Posted 25 January 2009 - 12:34 PM

Wow. Please update Malwarebytes' Anti-Malware and then run another scan. This time do a FULL scan instead of a quick scan. Post the results.

Also
Download and scan with CCleaner
1. Starting with v1.27.260, CCleaner installs the Yahoo Toolbar as an option which IS checkmarked by default during the installation. IF you do NOT want it, REMOVE the checkmark when provided with the option OR download the toolbar-free or Slim versions instead of the Standard Build.
2. Before first use, select Options > Advanced and UNCHECK "Only delete files in Windows Temp folder older than 48 hours"
3. Then select the items you wish to clean up.
In the Windows Tab:
  • Clean all entries in the "Internet Explorer" section except Cookies if you want to keep those.
  • Clean all the entries in the "Windows Explorer" section.
  • Clean all entries in the "System" section.
  • Clean all entries in the "Advanced" section.
  • Clean any others that you choose.

In the Applications Tab:
  • Clean all except cookies in the Firefox/Mozilla section if you use it.
  • Clean all in the Opera section if you use it.
  • Clean Sun Java in the Internet Section.
  • Clean any others that you choose.
4. Click the "Run Cleaner" button.
5. A pop up box will appear advising this process will permanently delete files from your system.
6. Click "OK" and it will scan and clean your system.
7. Click "exit" when done.

Don't worry about the full log on this, just a summary of the number of files and the size removed.

Visiting From SpywareHammer.com and DonHoover.net

Tilting at windmills hurts you more than the windmills.
-From the Notebooks of Lazarus Long
Senior of the Howard Families

Posted Image

#5 Socha_62

Socha_62
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:05:46 PM

Posted 29 January 2009 - 12:10 AM

Sorry for my delay.

Sorry I didn't have Malwarebytes Updated, I don't know how I looked past that. Again I clicked restart after the Malwarebytes scan but I don't think it actually started when I restarted. Here is the new log. And CCleaner has been ran.

One more thing. Just within the last few days I have been getting pop up dialog boxes for "Antivirus 360". I close the box everytime without clicking Ok or Cancel.

Malwarebytes' Anti-Malware 1.33
Database version: 1698
Windows 5.1.2600 Service Pack 3

1/27/2009 11:09:11 AM
mbam-log-2009-01-27 (11-09-10).txt

Scan type: Full Scan (C:\|)
Objects scanned: 406770
Time elapsed: 2 hour(s), 48 minute(s), 0 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 2
Registry Keys Infected: 8
Registry Values Infected: 5
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 4

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\volamele.dll (Trojan.Vundo.H) -> Delete on reboot.
c:\WINDOWS\system32\tegorabu.dll (Trojan.Vundo.H) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b639337c-8d5f-4e30-8926-7c58fe004f30} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{b639337c-8d5f-4e30-8926-7c58fe004f30} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\98185121 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nikigedegu (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cpm9b2b62bd (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\ssodl (Trojan.Vundo.H) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\tegorabu.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\tegorabu.dll -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\volamele.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\elemalov.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\tegorabu.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\System Volume Information\_restore{46DE8921-1D39-44D2-A9E9-64119261F211}\RP630\A0092599.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

#6 Hoov

Hoov

  • Malware Response Team
  • 3,519 posts
  • OFFLINE
  •  
  • Location:Mikado Michigan
  • Local time:04:46 PM

Posted 29 January 2009 - 06:52 AM

It came back.

Next run ComboFix.exe. Please visit this webpage for download links, and instructions for running the tool:

http://www.bleepingcomputer.com/combofix/how-to-use-combofix

* Ensure you have disabled all anti virus and anti malware programs so they do not interfere with the running of ComboFix. Also make sure you close all your browsers just before the instructions tell you to start the scanner.

Please include the C:\ComboFix.txt in your next reply for further review.

Note:
Do not mouseclick combofix's window while it's running. That may cause it to stall

Edited by Hoov, 29 January 2009 - 06:52 AM.

Visiting From SpywareHammer.com and DonHoover.net

Tilting at windmills hurts you more than the windmills.
-From the Notebooks of Lazarus Long
Senior of the Howard Families

Posted Image

#7 Socha_62

Socha_62
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:05:46 PM

Posted 02 February 2009 - 11:13 PM

Again sorry for the delay!

Here is the ComboFix log and things so far seem to be running much better.

ComboFix 09-02-02.04 - Jason 2009-02-02 10:52:32.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2046.1507 [GMT -5:00]
Running from: c:\documents and settings\Jason\Desktop\ComboFix.exe
AV: Trend Micro PC-cillin Internet Security *On-access scanning disabled* (Outdated)
FW: Trend Micro PC-cillin Internet Security (Firewall) *disabled*
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\aromoyaw.ini
c:\windows\system32\ativiyos.ini
c:\windows\system32\avxmfb.dll
c:\windows\system32\bajujami.dll
c:\windows\system32\bifogizi.dll
c:\windows\system32\dalapuri.dll
c:\windows\system32\dejapodo.dll
c:\windows\system32\dikonuka.dll
c:\windows\system32\erifesip.ini
c:\windows\system32\fafakaza.dll
c:\windows\system32\fhpgyc.dll
c:\windows\system32\fihijebe.dll
c:\windows\system32\fofowoti.dll
c:\windows\system32\folomato.dll
c:\windows\system32\furutedu.dll
c:\windows\system32\geBqQgGW.dll
c:\windows\system32\grkdgn.dll
c:\windows\system32\gumunijo.dll
c:\windows\system32\gzcviw.dll
c:\windows\system32\hcvvkc.dll
c:\windows\system32\hxurxu.dll
c:\windows\system32\ibupihir.ini
c:\windows\system32\igsmsa.dll
c:\windows\system32\irebizuz.ini
c:\windows\system32\izigofib.ini
c:\windows\system32\jalebavi.dll
c:\windows\system32\judonewi.dll
c:\windows\system32\kaguzifu.dll
c:\windows\system32\kamuwowa.dll
c:\windows\system32\kbwpgo.dll
c:\windows\system32\kezotiga.dll
c:\windows\system32\kozunuko.dll
c:\windows\system32\lukopijo.dll
c:\windows\system32\mawiravi.dll
c:\windows\system32\mugaveya.dll
c:\windows\system32\mulobewe.dll
c:\windows\system32\ndnjav.dll
c:\windows\system32\neletoki.dll
c:\windows\system32\nuxlyc.dll
c:\windows\system32\otamolof.ini
c:\windows\system32\pcwjdj.dll
c:\windows\system32\Process.exe
c:\windows\system32\putamusu.dll
c:\windows\system32\qixpih.dll
c:\windows\system32\refemope.dll
c:\windows\system32\rerawuli.dll
c:\windows\system32\rihipubi.dll
c:\windows\system32\roburehe.dll
c:\windows\system32\ruderako.dll
c:\windows\system32\rufowuhi.dll
c:\windows\system32\rwalfj.dll
c:\windows\system32\segivubo.dll.tmp
c:\windows\system32\sepuvupi.dll
c:\windows\system32\siwoyula.dll
c:\windows\system32\SrchSTS.exe
c:\windows\system32\sujegaru.dll
c:\windows\system32\tapusuye.dll
c:\windows\system32\tavajaba.dll
c:\windows\system32\tepejeno.dll
c:\windows\system32\tevifulo.dll
c:\windows\system32\tewigole.dll
c:\windows\system32\tudikike.dll
c:\windows\system32\uivste.dll
c:\windows\system32\umshrv.dll
c:\windows\system32\uzeguluy.ini
c:\windows\system32\vatalura.dll
c:\windows\system32\vedagawa.dll
c:\windows\system32\vekebufo.dll
c:\windows\system32\vimebude.dll
c:\windows\system32\vivakole.dll
c:\windows\system32\wayomora.dll
c:\windows\system32\werusizo.dll
c:\windows\system32\winufame.dll
c:\windows\system32\wuyojeva.dll
c:\windows\system32\ytlcln.dll
c:\windows\system32\yulugezu.dll
c:\windows\system32\zawesali.dll
c:\windows\system32\zdyssa.dll
c:\windows\system32\zfnzwr.dll
c:\windows\system32\zuziberi.dll
c:\windows\system32\zxuzll.dll

.
((((((((((((((((((((((((( Files Created from 2009-01-02 to 2009-02-02 )))))))))))))))))))))))))))))))
.

2009-02-02 10:42 . 2009-02-02 10:42 410,984 --a------ c:\windows\system32\deploytk.dll
2009-02-02 10:31 . 2009-02-02 10:31 <DIR> d-------- c:\program files\Mozilla ActiveX Control v1.7.1
2009-02-02 09:52 . 2009-02-02 09:52 40,960 --a------ c:\windows\system32\ipv6sp.dll
2009-02-02 09:52 . 2009-02-02 09:52 1 --a------ c:\windows\system32\ak
2009-01-28 23:46 . 2009-01-28 23:46 <DIR> d-------- c:\program files\CCleaner
2009-01-18 15:18 . 2009-01-18 15:18 4,096 --a------ c:\windows\system32\crash
2009-01-12 13:37 . 2009-01-25 11:18 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware
2009-01-12 13:37 . 2009-01-12 13:37 <DIR> d-------- c:\documents and settings\Jason\Application Data\Malwarebytes
2009-01-12 13:37 . 2009-01-12 13:37 <DIR> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-01-12 13:37 . 2009-01-14 16:11 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2009-01-12 13:37 . 2009-01-14 16:11 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2009-01-12 13:19 . 2009-01-12 13:19 <DIR> d-------- c:\program files\Common Files\Download Manager
2009-01-09 18:37 . 2009-01-09 18:38 <DIR> d-------- c:\documents and settings\All Users\Application Data\Lavasoft
2009-01-08 17:56 . 2009-01-08 17:56 128 --a------ c:\windows\wininit.ini
2009-01-08 17:34 . 2009-01-08 17:34 16,244 --a------ c:\windows\system32\rrt_is.wav
2009-01-08 17:34 . 2009-01-08 17:34 7,302 --a------ c:\windows\system32\rrt_vf.wav
2009-01-08 17:34 . 2009-01-08 17:34 7,148 --a------ c:\windows\system32\rrt_tv.wav
2009-01-08 17:34 . 2009-01-08 17:34 6,282 --a------ c:\windows\system32\rrt_tn.wav
2009-01-08 16:44 . 2009-01-08 17:04 <DIR> d-------- c:\program files\Security Task Manager
2009-01-08 16:44 . 2009-01-13 08:48 <DIR> d-------- c:\documents and settings\All Users\Application Data\SecTaskMan
2009-01-08 16:35 . 2005-04-15 20:58 1,071,088 --a------ c:\windows\system32\is-SGQS9.tmp
2009-01-08 16:30 . 2009-01-08 16:30 <DIR> d-------- c:\program files\PrevxCSI
2009-01-08 16:30 . 2009-01-29 00:25 <DIR> d-------- c:\documents and settings\All Users\Application Data\PrevxCSI
2009-01-08 16:30 . 2009-01-25 11:51 26,808 --a------ c:\windows\system32\drivers\pxark.sys
2009-01-08 16:13 . 2009-01-08 16:13 2,098 ---hs---- c:\windows\system32\kagobale.exe
2009-01-07 20:27 . 2009-02-02 11:01 2,206 --a------ c:\windows\system32\wpa.dbl
2009-01-07 19:59 . 2009-01-07 19:59 <DIR> d-------- C:\myRTVAULT
2009-01-07 19:49 . 2009-01-07 19:49 <DIR> d--h----- c:\windows\system32\GroupPolicy
2009-01-07 13:35 . 2009-01-07 13:35 <DIR> d-------- c:\documents and settings\All Users\Application Data\ATI
2009-01-07 13:34 . 2009-01-07 13:34 0 --a------ c:\windows\ativpsrm.bin
2009-01-07 11:40 . 2009-01-08 18:42 <DIR> d-------- c:\program files\ATI
2009-01-06 17:38 . 2009-02-02 11:03 <DIR> d-------- c:\program files\Steam
2009-01-02 01:27 . 2009-01-02 01:27 <DIR> d-------- c:\program files\directx
2009-01-02 01:27 . 2009-01-02 01:27 0 --a------ c:\windows\DXTF.tmp
2009-01-02 01:27 . 2009-01-02 01:27 0 --a------ c:\windows\DXTE.tmp
2009-01-02 01:27 . 2009-01-02 01:27 0 --a------ c:\windows\DXTD.tmp
2009-01-02 01:27 . 2009-01-02 01:27 0 --a------ c:\windows\DXT11.tmp
2009-01-02 01:27 . 2009-01-02 01:27 0 --a------ c:\windows\DXT10.tmp
2009-01-02 01:23 . 2009-01-02 01:23 <DIR> d-------- C:\Rune
2009-01-02 01:19 . 2009-01-02 01:29 <DIR> d-------- c:\program files\Rune

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-02-02 15:41 --------- d-----w c:\program files\Java
2009-01-29 05:00 --------- d-----w c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2009-01-25 16:40 --------- d---a-w c:\documents and settings\All Users\Application Data\TEMP
2009-01-18 20:22 --------- d-----w c:\program files\Mozilla Thunderbird
2009-01-14 05:20 --------- d-----w c:\documents and settings\Jason\Application Data\FileZilla
2009-01-14 04:42 --------- d-----w c:\program files\FileZilla FTP Client
2009-01-10 03:29 --------- d-----w c:\documents and settings\Jason\Application Data\Azureus
2009-01-09 23:37 --------- d-----w c:\program files\Lavasoft
2009-01-09 23:36 --------- d-----w c:\program files\Common Files\Wise Installation Wizard
2009-01-09 23:35 --------- d-----w c:\documents and settings\Jason\Application Data\Lavasoft
2009-01-08 22:18 --------- d-----w c:\program files\Spybot - Search & Destroy
2009-01-08 21:51 --------- d-----w c:\program files\BAE
2009-01-08 21:35 --------- d-----w c:\program files\SpywareBlaster
2009-01-08 21:33 --------- d-----w c:\program files\SpywareGuard
2009-01-08 01:54 --------- d-----w c:\program files\Trend Micro
2009-01-07 18:35 --------- d-----w c:\documents and settings\Jason\Application Data\ATI
2009-01-07 16:40 --------- d-----w c:\program files\ATI Technologies
2009-01-07 16:39 --------- d--h--w c:\program files\InstallShield Installation Information
2009-01-04 05:10 --------- d-----w c:\documents and settings\Jason\Application Data\AdobeUM
2009-01-02 03:09 --------- d-----w c:\documents and settings\Jason\Application Data\Hamachi
2009-01-02 01:36 25,280 ----a-w c:\windows\system32\drivers\hamachi.sys
2008-12-29 21:59 --------- d-----w c:\program files\XBCD
2008-12-29 18:48 --------- d-----w c:\program files\San Andreas Mod Installer
2008-12-29 05:35 --------- d-----w c:\program files\Rockstar Games
2008-12-26 00:18 --------- d-----w c:\program files\Winamp
2008-12-26 00:17 --------- d-----w c:\documents and settings\Jason\Application Data\Winamp
2008-12-24 00:47 3,532 ----a-w C:\drmHeader.bin
2008-12-23 15:57 --------- d-----w c:\program files\Azureus
2008-12-18 21:34 --------- d-----w c:\program files\FlashFXP
2008-12-12 05:08 --------- d-----w c:\documents and settings\Jason\Application Data\MioNet
2008-12-12 05:07 --------- d-----w c:\program files\MioNet
2008-12-07 19:29 --------- d-----w c:\program files\Taksi
2008-12-02 04:05 --------- d-----w c:\program files\Misc. Support Library (Spybot - Search & Destroy)
2008-12-02 04:05 --------- d-----w c:\program files\File Scanner Library (Spybot - Search & Destroy)
2008-12-02 01:36 --------- d-----w c:\program files\AIM6
2008-12-02 01:35 --------- d-----w c:\program files\Common Files\Software Update Utility
2008-12-02 01:35 --------- d-----w c:\program files\AIM Toolbar
2008-12-02 01:35 --------- d-----w c:\documents and settings\All Users\Application Data\Viewpoint
2008-12-02 01:35 --------- d-----w c:\documents and settings\All Users\Application Data\AIM Toolbar
2008-12-02 01:35 --------- d-----w c:\documents and settings\All Users\Application Data\acccore
2008-12-02 01:34 --------- d-----w c:\documents and settings\All Users\Application Data\AOL Downloads
2008-02-14 01:49 122,368 ----a-w c:\program files\mozilla firefox\components\GoogleDesktopMozilla.dll
2008-03-31 23:36 88 --sh--r c:\windows\system32\9D64738EF4.sys
.

------- Sigcheck -------

2006-04-20 07:18 360576 b2220c618b42a2212a59d91ebd6fc4b4 c:\windows\$hf_mig$\KB917953\SP2QFE\tcpip.sys
2007-10-30 11:53 360832 64798ecfa43d78c7178375fcdd16d8c8 c:\windows\$hf_mig$\KB941644\SP2QFE\tcpip.sys
2008-06-20 05:44 360960 744e57c99232201ae98c49168b918f48 c:\windows\$hf_mig$\KB951748\SP2QFE\tcpip.sys
2008-06-20 06:51 361600 9aefa14bd6b182d61e3119fa5f436d3d c:\windows\$hf_mig$\KB951748\SP3GDR\tcpip.sys
2008-06-20 06:59 361600 ad978a1b783b5719720cff204b666c8e c:\windows\$hf_mig$\KB951748\SP3QFE\tcpip.sys
2008-06-20 05:45 360320 2a5554fc5b1e04e131230e3ce035c3f9 c:\windows\$NtServicePackUninstall$\tcpip.sys
2004-08-04 04:00 359040 9f4b36614a0fc234525ba224957de55c c:\windows\$NtUninstallKB917953$\tcpip.sys
2006-04-20 06:51 359808 1dbf125862891817f374f407626967f4 c:\windows\$NtUninstallKB941644$\tcpip.sys
2008-04-13 14:20 361344 93ea8d04ec73a85db02eb8805988f733 c:\windows\$NtUninstallKB951748$\tcpip.sys
2007-10-30 12:20 360064 90caff4b094573449a0872a0f919b178 c:\windows\$NtUninstallKB951748_0$\tcpip.sys
2008-04-13 14:20 361344 accf5a9a1ffaa490f33dba1c632b95e1 c:\windows\ServicePackFiles\i386\tcpip.sys
2008-06-20 06:51 361600 9425b72f40257b45d45d24773273dad0 c:\windows\system32\dllcache\tcpip.sys
2008-06-20 06:51 361600 9425b72f40257b45d45d24773273dad0 c:\windows\system32\drivers\tcpip.sys
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Steam"="c:\program files\steam\steam.exe" [2009-01-06 1410296]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-13 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MioNet"="c:\program files\MioNet\MioNetLauncher.exe" [2008-01-14 32768]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2008-08-29 61440]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-02-02 136600]

c:\documents and settings\Jason\Start Menu\Programs\Startup\
SpywareGuard.lnk - c:\program files\SpywareGuard\sgmain.exe [2003-08-29 360448]

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
"NoDevMgrUpdate"= 0 (0x0)

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\0]
Source= c:\documents and settings\Jason\My Documents\My Pictures\Wheeling\New Folder (2)\n663793428_1005453_6887.jpg
FriendlyName=

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"msacm.dvacm"= c:\progra~1\COMMON~1\ULEADS~1\Vio\Dvacm.acm
"msacm.MPEGacm"= c:\progra~1\COMMON~1\ULEADS~1\MPEG\MPEGacm.acm
"msacm.ulmp3acm"= c:\progra~1\COMMON~1\ULEADS~1\MPEG\ulmp3acm.acm

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Gamma Loader.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Adobe Gamma Loader.lnk
backup=c:\windows\pss\Adobe Gamma Loader.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
backup=c:\windows\pss\Adobe Reader Speed Launch.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^WD Anywhere Backup Launcher.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\WD Anywhere Backup Launcher.lnk
backup=c:\windows\pss\WD Anywhere Backup Launcher.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AdobeUpdater]
--a------ 2007-02-28 22:06 2321600 c:\program files\Common Files\Adobe\Updater5\AdobeUpdater.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Aim6]
--a------ 2008-10-31 14:22 50480 c:\program files\AIM6\aim6.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AppleSyncNotifier]
--a------ 2008-09-03 19:12 111936 c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ATIPTA]
--a------ 2005-08-05 20:05 344064 c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
--a------ 2008-04-13 19:12 15360 c:\windows\system32\ctfmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DAEMON Tools-1033]
--a------ 2004-08-22 17:05 81920 c:\program files\D-Tools\daemon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DellSupport]
--a------ 2007-03-15 10:09 460784 c:\program files\DellSupport\DSAgnt.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DLA]
--------- 2005-09-08 04:20 122940 c:\windows\system32\DLA\DLACTRLW.EXE

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DMXLauncher]
--a------ 2006-05-03 02:12 98304 c:\program files\Dell\Media Experience\DMXLauncher.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\dscactivate]
--a------ 2007-11-15 09:24 16384 c:\program files\Dell Support Center\gs_agent\custom\dsca.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DW6]
--a------ 2008-06-10 15:18 785520 c:\program files\The Weather Channel FW\Desktop\DesktopWeather.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Desktop Search]
--a------ 2008-02-13 20:49 29744 c:\program files\Google\Google Desktop Search\GoogleDesktop.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ISUSPM Startup]
--a------ 2005-06-10 09:44 249856 c:\program files\Common Files\InstallShield\UpdateService\ISUSPM.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ISUSScheduler]
--a------ 2005-06-10 09:44 81920 c:\program files\Common Files\InstallShield\UpdateService\issch.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
--a------ 2008-11-20 13:20 290088 c:\program files\iTunes\iTunesHelper.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Lexmark 3100 Series]
--a------ 2003-07-28 18:50 106496 c:\program files\Lexmark 3100 Series\lxbrbmgr.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LifeCam]
--a------ 2006-10-13 16:01 277296 c:\program files\Microsoft LifeCam\LifeExp.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LXBRKsk]
--a------ 2003-06-13 14:57 294912 c:\progra~1\LEXMAR~1\lxbrksk.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MioNet]
-ra------ 2008-01-14 14:16 32768 c:\program files\MioNet\MioNetLauncher.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
--a------ 2008-04-13 19:12 1695232 c:\program files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MsnMsgr]
--a------ 2007-01-19 11:54 5674352 c:\program files\MSN Messenger\msnmsgr.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\OE_OEM]
--a------ 2006-04-11 18:39 176201 c:\program files\Trend Micro\Internet Security 12\TMAS_OE\TMAS_OEMon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\pccguide.exe]
--a------ 2005-08-30 08:36 823362 c:\program files\Trend Micro\Internet Security 12\pccguide.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Picasa Media Detector]
--a------ 2007-02-20 20:18 366400 c:\program files\Picasa2\PicasaMediaDetector.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PWRISOVM.EXE]
--a------ 2007-01-20 02:09 200704 c:\program files\PowerISO\PWRISOVM.EXE

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
--a------ 2008-11-04 10:30 413696 c:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
--a------ 2007-07-12 03:00 132496 c:\program files\Java\jre1.6.0_02\bin\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UVS10 Preload]
--------- 2006-03-06 23:52 36864 c:\program files\Ulead Systems\Ulead VideoStudio 10\uvPL.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\VX3000]
--a------ 2006-10-13 16:04 707376 c:\windows\vVX3000.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\WinampAgent]
--a------ 2008-09-12 11:45 36352 c:\program files\Winamp\winampa.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SigmatelSysTrayApp]
--a------ 2005-03-22 16:20 339968 c:\windows\stsystra.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\TrendAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\TrendFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\FlashFXP\\FlashFXP.exe"=
"c:\\Program Files\\Microsoft LifeCam\\LifeExp.exe"=
"c:\\Program Files\\Microsoft LifeCam\\LifeCam.exe"=
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\MSN Messenger\\msnmsgr.exe"=
"c:\\Program Files\\MSN Messenger\\livecall.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\MioNet\\MioNetManager.exe"=
"c:\\Program Files\\MioNet\\jvm\\bin\\MioNet.exe"=
"c:\\Program Files\\AIM6\\aim6.exe"=
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"1700:TCP"= 1700:TCP:MioNet Remote Drive Access 0
"1701:TCP"= 1701:TCP:MioNet Remote Drive Access 1
"1702:TCP"= 1702:TCP:MioNet Remote Drive Access 2
"1703:TCP"= 1703:TCP:MioNet Remote Drive Access 3
"1704:TCP"= 1704:TCP:MioNet Remote Drive Access 4
"1705:TCP"= 1705:TCP:MioNet Remote Drive Access 5
"1706:TCP"= 1706:TCP:MioNet Remote Drive Access 6
"1707:TCP"= 1707:TCP:MioNet Remote Drive Access 7
"1708:TCP"= 1708:TCP:MioNet Remote Drive Access 8
"1709:TCP"= 1709:TCP:MioNet Remote Drive Access 9
"1641:TCP"= 1641:TCP:MioNet Remote Drive Verification
"1647:TCP"= 1647:TCP:MioNet Storage Device Configuration
"5432:UDP"= 5432:UDP:MioNet Storage Device Discovery

R0 pxark;pxark;c:\windows\system32\drivers\pxark.sys [2009-01-08 26808]
R2 CSIScanner;CSIScanner;c:\program files\PrevxCSI\prevxcsi.exe [2009-01-08 927288]
R2 F5 Networks Component Installer;F5 Networks Component Installer;c:\windows\system32\F5InstallerService.exe [2007-05-12 254848]
R2 Tmfilter;Tmfilter;c:\windows\system32\drivers\tmxpflt.sys [2005-08-30 205328]
R2 Tmntsrv;Trend Micro Real-time Service;c:\progra~1\TRENDM~1\INTERN~1\Tmntsrv.exe [2005-08-30 290889]
R2 TmPfw;Trend Micro Personal Firewall;c:\progra~1\TRENDM~1\INTERN~1\TmPfw.exe [2005-08-30 585792]
R2 Tmpreflt;Tmpreflt;c:\windows\system32\drivers\tmpreflt.sys [2005-08-30 36368]
R2 tmproxy;Trend Micro Proxy Service;c:\progra~1\TRENDM~1\INTERN~1\tmproxy.exe [2005-08-30 262215]
R2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\Viewpoint\Common\ViewpointService.exe [2007-12-12 24652]
R3 urvpndrv;F5 Networks VPN Adapter;c:\windows\system32\drivers\urvpndrv.sys [2006-06-06 27008]
S2 gupdate1c934b2b254583c;Google Update Service (gupdate1c934b2b254583c);c:\program files\Google\Update\GoogleUpdate.exe [2008-10-22 133104]
S2 MioNet;MioNet;c:\program files\MioNet\MioNetManager.exe [2008-01-14 139264]
S3 f5ipfw;F5 Networks StoneWall Filter;c:\windows\system32\drivers\urfltw2k.sys [2007-05-02 10624]
S3 GoogleDesktopManager-010108-205858;Google Desktop Manager 5.7.801.1629;c:\program files\Google\Google Desktop Search\GoogleDesktop.exe [2006-07-27 29744]
S3 RTLWUSB;NETGEAR WG111v2 54Mbps Wireless USB 2.0 Adapter NT Driver;c:\windows\system32\DRIVERS\wg111v2.sys --> c:\windows\system32\DRIVERS\wg111v2.sys [?]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - GTNDIS5
*Deregistered* - NDISRD

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\D]
\Shell\AutoRun\command - D:\SETUP.EXE

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\J]
\Shell\AutoRun\command - J:\setup.exe

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{2b6c418c-bcfa-11dd-9fd0-00183919d2ea}]
\Shell\AutoRun\command - K:\WDSetup.exe

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{3d015655-e05c-11dd-9fdd-00183919d2ea}]
\Shell\AutoRun\command - K:\WDSetup.exe

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{f8038e9e-5dfb-11db-9f41-00146c6c15da}]
\Shell\AutoRun\command - J:\setupSNK.exe
.
Contents of the 'Scheduled Tasks' folder

2009-01-27 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 12:34]

2009-02-02 c:\windows\Tasks\GoogleUpdateTaskMachine.job
- c:\program files\Google\Update\GoogleUpdate.exe [2008-10-22 20:57]
.
- - - - ORPHANS REMOVED - - - -

BHO-{b639337c-8d5f-4e30-8926-7c58fe004f30} - c:\windows\system32\zofuniwe.dll
HKLM-Run-SNM - c:\program files\SpyNoMore\SNM.exe
HKLM-Run-nikigedegu - c:\windows\system32\jidomuye.dll
MSConfigStartUp-ATICCC - c:\program files\ATI Technologies\ATI.ACE\CLIStart.exe


.
------- Supplementary Scan -------
.
uInternet Settings,ProxyOverride = *.local
IE: &AIM Toolbar Search - c:\documents and settings\All Users\Application Data\AIM Toolbar\ieToolbar\resources\en-US\local\search.html
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
DPF: {E66D35B8-E70D-42A6-B1F5-DB784CB92B15} - file://C:/Program Files/F5 VPN/F5_TMP/urvncx.cab
FF - ProfilePath - c:\documents and settings\Jason\Application Data\Mozilla\Firefox\Profiles\d920863x.default\
FF - prefs.js: browser.search.defaulturl - hxxp://slirsredirect.search.aol.com/slirs_http/sredir?sredir=2706&invocationType=tb50fftrie7&query=
FF - prefs.js: browser.search.selectedEngine - AIM Search
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - prefs.js: keyword.URL - hxxp://slirsredirect.search.aol.com/slirs_http/sredir?sredir=2706&invocationType=tb50fftrab&query=
FF - component: c:\program files\Google\Google Gears\Firefox\components\gears.dll
FF - component: c:\program files\Mozilla Firefox\components\GoogleDesktopMozilla.dll
FF - plugin: c:\program files\Google\Update\1.2.133.33\npGoogleOneClick7.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npGoogleGadgetPluginFirefoxWin.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\NPuroamHost.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npViewpoint.dll
FF - plugin: c:\program files\Viewpoint\Viewpoint Experience Technology\npViewpoint.dll
.

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-02-02 11:02:16
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-377818575-3605791315-922889204-1005\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)

[HKEY_USERS\S-1-5-21-377818575-3605791315-922889204-1005\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*U%c%Q%]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)

[HKEY_USERS\S-1-5-21-377818575-3605791315-922889204-1005\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*U%c%Q%\OpenWithList]
@Class="Shell"

[HKEY_USERS\S-1-5-21-377818575-3605791315-922889204-1005\Software\SecuROM\!CAUTION! NEVER A OR CHANGE ANY KEY*]
"??"=hex:7d,2e,30,0b,95,2a,4f,ce,fa,1e,1d,e1,0b,6f,11,14,cb,22,3b,76,ea,4c,00,
47,bb,b1,0c,2f,23,f5,75,39,95,fb,a1,e1,e2,fa,3c,5e,97,70,b8,5f,c3,3d,88,9c,\
"??"=hex:a0,e0,29,64,e2,88,1f,f2,25,35,f9,01,5f,91,08,b0
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(804)
c:\windows\system32\Ati2evxx.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\ati2evxx.exe
c:\windows\system32\ati2evxx.exe
c:\program files\Lavasoft\Ad-Aware\aawservice.exe
c:\windows\system32\LEXBCES.EXE
c:\windows\system32\LEXPPS.EXE
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
c:\program files\Microsoft LifeCam\MSCamS32.exe
c:\progra~1\TRENDM~1\INTERN~1\PcCtlCom.exe
c:\program files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
c:\program files\Linksys Wireless-G PCI Wireless Network Monitor\WLService.exe
c:\program files\Linksys Wireless-G PCI Wireless Network Monitor\WMP54Gv4.exe
c:\progra~1\TRENDM~1\INTERN~1\pccguide.exe
c:\program files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
c:\program files\SpywareGuard\sgbhp.exe
c:\program files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
.
**************************************************************************
.
Completion time: 2009-02-02 11:11:19 - machine was rebooted [Jason]
ComboFix-quarantined-files.txt 2009-02-02 16:11:16
ComboFix2.txt 2006-12-03 19:15:01

Pre-Run: 19,530,596,352 bytes free
Post-Run: 19,485,519,872 bytes free

447 --- E O F --- 2008-12-18 08:01:11

#8 Hoov

Hoov

  • Malware Response Team
  • 3,519 posts
  • OFFLINE
  •  
  • Location:Mikado Michigan
  • Local time:04:46 PM

Posted 02 February 2009 - 11:55 PM

Are you having anymore problems? If not then play around with the computer, reboot it a few times, and then run a Malwarebytes' Anti-Malware scan, a quick one will be fine, update first of course. Also update your AV scanner and run a full scan with it, and post up the results. If everything is clean and you are not having anymore problems, we can clean up a few things, and call it good.
Visiting From SpywareHammer.com and DonHoover.net

Tilting at windmills hurts you more than the windmills.
-From the Notebooks of Lazarus Long
Senior of the Howard Families

Posted Image

#9 Socha_62

Socha_62
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:05:46 PM

Posted 08 February 2009 - 03:01 PM

Things seem to be running much better! I updated Malawarebytes and here is the log.

Malwarebytes' Anti-Malware 1.33
Database version: 1738
Windows 5.1.2600 Service Pack 3

2/8/2009 3:06:48 PM
mbam-log-2009-02-08 (15-06-48).txt

Scan type: Quick Scan
Objects scanned: 63156
Time elapsed: 1 minute(s), 57 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

Edited by Socha_62, 08 February 2009 - 03:07 PM.


#10 Hoov

Hoov

  • Malware Response Team
  • 3,519 posts
  • OFFLINE
  •  
  • Location:Mikado Michigan
  • Local time:04:46 PM

Posted 08 February 2009 - 03:16 PM

Good!

Now there are something's you need to do to fully clean your system and keep it secure.

[*]Please download OTCleanIt from one of the following mirrors and save it to your desktop:[*]Double click the Posted Image icon.
[*] Click the large "Cleanup" button.
[*] A list of tool components used in the Cleanup of malware will be downloaded.
[*] Click Yes to begin the Cleanup process and remove these components, including this application.
[*] You will be asked to reboot the machine to finish the Cleanup process. If you are asked to reboot the machine choose Yes.
[*] Make sure you have an Internet Connection.
[*] If you have a firewall that throws out a message that OTMI3 is attempting to contact the Internet that it should be allowed.
[*]You will be asked to reboot the machine to finish the Cleanup process. If you are asked to reboot the machine choose Yes.
[/list]
Cleaning out Temporary Files etc. There are several different products that you can use for this. You can go thru the Internet Options in the windows Control Panel. There are several programs that also do the job better than windows does it, in my opinion. There is System Security Suite, EasyCleaner, Ccleaner. Also sometimes other program sometimes do it as well as what you originally got it for like ZoneAlarm Security Suite. Just make sure to keep them updated and use them regularly.

Disable and Enable System Restore.
If you are using Windows Vista or XP, then I recommend you turn off System restore, and then turn it back on so that you will not be able to restore your problems to a clean computer.

Here are some good tutorials for that.
Windows Vista Restore Guide
or
Windows XP System Restore Guide
Reboot
Re-enable system restore with instructions from tutorial above

Create a System Restore Point
Go to all programs, then to accessories, then to system tools, then to system restore. Check the box for create restore point (not select a restore point), then click next and follow the instructions.

Make your Internet Explorer more secure - This can be done by following these simple instructions: (unless you are using ZoneAlarm Security Suite or something similar, then you would secure the browser thru the firewall).

From within Internet Explorer click on the Tools menu and then click on Options.
Click once on the Security tab
Click once on the Internet icon so it becomes highlighted.
Click once on the Custom Level button.
Change the Download signed ActiveX controls to Prompt
Change the Download unsigned ActiveX controls to Disable
Change the Initialize and script ActiveX controls not marked as safe to Disable
Change the Installation of desktop items to Prompt
Change the Launching programs and files in an IFRAME to Prompt
Change the Navigate sub-frames across different domains to Prompt
When all these settings have been made, click on the OK button.
If it prompts you as to whether or not you want to save the settings, press the Yes button.
Next press the Apply button and then the OK to exit the Internet Properties page.
Also see the following: Securing Your Web Browser
Working with Internet Explorer 6 Security

Use a different browser other than IE (most exploits are pointed towards IE). One of them is
Firefox.
It is also worth trying Thunderbird for controlling spam in your e-mail.


Always use an UPDATED anti-virus program Make sure you update this at least weekly, if not more often. This is one thing that may Ave you more than anything else.

Run malware scanners. Three free ones are Spybot Search and Destroy, and AdAware and Malwarebytes' Anti-Malware


Always use a firewall.
Any firewall is better than none, and you should pick a firewall that you will use, as even the best firewall is worthless if you turn it off.

Learn how to use your firewall Only programs that need it should have access to the net. But these are specific to the firewall you use, so you will need to learn how. Several firewalls have support forums here. My page will help you with ZoneAlarm if that is what you choose.


Never run two Antivirus programs or two Firewalls at the same time. They can interfere with each other and cause problems. Some people swear that more protection is provided, but the reverse is true. They tend to argue amongst themselves and end up leaving holes. Now I have more than 1 AV installed on my computer, and I keep them up to date. I only run one at a time, but each program has weakness's, so I keep a backup in case my computer starts acting up.


MOST IMPORTANT : Windows and IE, and whatever other software that you have that connects to the net, needs to be kept updated. The reason is, these programs connect to the net, and if there is an internal security problem, you have already told your firewall to allow the communication, and thus you will have allowed a hole. UPDATES are important. I suggest that you make sure that Windows Updates and the updates for your antivirus and antimalware programs are set for automatic updates.

Don't ever use P2P or filesharing software Even the safest P2P file sharing programs that do not contain bundled spyware, still expose you to risks because of the very nature of the P2P file sharing process. By default, most P2P file sharing programs are configured to automatically launch at startup. They are also configured to allow other P2P users on the same network open access to a shared directory on your computer. The reason for this is simple. File sharing relies on its members giving and gaining unfettered access to computers across the P2P network. However, this practice can make you vulnerable to data and identity theft. Even if you change those risky default settings to a safer configuration, the act of downloading files from an anonymous source greatly increases your exposure to infection. That is because the files you are downloading may actually contain a disguised threat. Many very malicious worms and trojans, such as the Storm Worm, target and spread across P2P files sharing networks because of their known vulnerabilities.

Before using any malware detection / removal software Check with Rogue/Suspect Spyware List and Rogue Applications List That way you will know if the program you are looking at is on the up and up. If you want to know how it stacks up against other programs check out SpywareWarrior

We have a good guide at Spyware Hammer on how to prevent Malware in the Future. You might want to peruse this and follow the recommendations in there.
PLEASE READ IT AND FOLLOW THE RECOMMENDATIONS TO PROTECT YOURSELF.

Let us know if you have any more problems, either new or old.
Have a good time surfing the net, but stay safe.
If you have no more problems, let me know and I will mark this as resolved. Or if you have more questions, ask away, that is why I am here.
Visiting From SpywareHammer.com and DonHoover.net

Tilting at windmills hurts you more than the windmills.
-From the Notebooks of Lazarus Long
Senior of the Howard Families

Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users