We’d like to remind Forumites to please avoid political debate on the Forum.
This is to keep it a safe and useful space for MoneySaving discussions. Threads that are – or become – political in nature may be removed in line with the Forum’s rules. Thank you for your understanding.
📨 Have you signed up to the Forum's new Email Digest yet? Get a selection of trending threads sent straight to your inbox daily, weekly or monthly!
Items keep reappearing on Reboot and Slowing PC - Hijack this and Combo Fix attached
Comments
-
Thanks
I just re-ran MBAM after rebooting and I was surprised it didn't come back clean. This is the new log
Malwarebytes' Anti-Malware 1.34
Database version: 1749
Windows 5.1.2600 Service Pack 3
17/02/2009 18:17:51
mbam-log-2009-02-17 (18-17-51).txt
Scan type: Quick Scan
Objects scanned: 97718
Time elapsed: 35 minute(s), 40 second(s)
Memory Processes Infected: 1
Memory Modules Infected: 0
Registry Keys Infected: 6
Registry Values Infected: 2
Registry Data Items Infected: 3
Folders Infected: 4
Files Infected: 17
Memory Processes Infected:
C:\WINDOWS\services.exe (Backdoor.ProRat) -> Unloaded process successfully.
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{d5bf4552-94f1-42bd-f434-3604812c807d} (Adware.BHO) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{af2e62b6-f9e1-4d4f-a10a-9dc8e6dcbcc0} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b64f4a7c-97c9-11da-8bde-f66bad1e3f3a} (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CMVideo.XMLDOMDocumentEventsSink (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CMVideo.XMLDOMDocumentEventsSink.1 (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Screensavers.com (Adware.Comet) -> Quarantined and deleted successfully.
Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{d5bf4552-94f1-42bd-f434-3604812c807d} (Adware.BHO) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services (Trojan.Agent) -> Quarantined and deleted successfully.
Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SecurityProviders (Trojan.Agent) -> Data: digeste.dll -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools (Hijack.Regedit) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions (Hijack.FolderOptions) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Folders Infected:
C:\Documents and Settings\john\Application Data\VideoEgg (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\john\Application Data\VideoEgg\Publisher (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\john\Application Data\VideoEgg\Publisher\4115 (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anne\Start Menu\Programs\XP_AntiSpyware (Rogue.XPAntiSpyware) -> Quarantined and deleted successfully.
Files Infected:
C:\Documents and Settings\Anne\Start Menu\Programs\XP_AntiSpyware\Uninstall.lnk (Rogue.XPAntiSpyware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anne\Start Menu\Programs\XP_AntiSpyware\XP_AntiSpyware.lnk (Rogue.XPAntiSpyware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anne\Desktop\XP_AntiSpyware.lnk (Rogue.XPAntiSpyware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anne\Application Data\Microsoft\Internet Explorer\Quick Launch\XP_AntiSpyware.lnk (Rogue.XPAntiSpyware) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\TDSSosvn.dat (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\shell31.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wpv291233948299.cpx (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\digeste.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\services.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Fonts\acrsecB.fon (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Fonts\acrsecI.fon (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wini10801.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anne\Local Settings\Temp\wrdwn4 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anne\Local Settings\Temp\wrdwn5 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anne\Local Settings\Temp\wrdwn6 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anne\Local Settings\Temp\wrdwn9 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\TDSSfpmp.dll (Rootkit.Agent) -> Quarantined and deleted successfully.
I've downloaded Hijack this so will run this and post back0 -
Hiya,
Hopefully you can help. This is the Hijack This Log but I don't have a clue what to do next
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 19:20:08, on 17/02/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\system32\hkcmd.exe
C:\Program Files\Lexmark X1100 Series\lxbkbmgr.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\Lexmark X1100 Series\lxbkbmon.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\zHotkey.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\LEXPPS.EXE
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.medion.co.uk
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1;*.local
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Lexmark X1100 Series] "C:\Program Files\Lexmark X1100 Series\lxbkbmgr.exe"
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [ZoneAlarm Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [lrijh8s73jhbfgfd] C:\WINDOWS\TEMP\winlognn.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [CHotkey] zHotkey.exe
O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
O4 - HKLM\..\Run: [AOLDialer] C:\Program Files\Common Files\AOL\ACS\AOLDial.exe
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [tezrtsjhfr84iusjfo84f] C:\DOCUME~1\Anne\LOCALS~1\Temp\csrssc.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [phnfvrcj.exe] C:\WINDOWS\phnfvrcj.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Reader 8.0\Reader\reader_sl.exe
O4 - Global Startup: Adobe Reader Synchronizer.lnk = C:\Program Files\Adobe\Reader 8.0\Reader\AdobeCollabSync.exe
O4 - Global Startup: broadband medic.lnk = C:\Program Files\ntl\broadband medic\bin\matcli.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - !!08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - !!08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://www.medion.co.uk
O15 - Trusted Zone: *.musicmatch.com
O15 - Trusted Zone: *.musicmatch.com (HKLM)
O16 - DPF: !!138E6DC9-722B-4F4B-B09D-95D191869696} (Bebo Uploader Control) - http://www.bebo.com/files/BeboUploader.5.1.4.cab
O16 - DPF: !!17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: !!2917297F-F02B-4B9D-81DF-494B6333150B} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab31267.cab
O16 - DPF: !!6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1123753183109
O16 - DPF: !!6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1123758956265
O16 - DPF: !!8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
O20 - AppInit_DLLs: karna.dat
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: Task Scheduler (Schedule) - Unknown owner - C:\WINDOWS\system32\drivers\services.exe (file missing)
--
End of file - 6954 bytes0 -
Please update Malware bytes - Update Tab - you are running old definitions.
I see that a memory process has been removed in a previous log and again in this later log. An update may alter this.
On second glance - the MBAM Logs look the same. Please update and then post a fresh log.0 -
Thanks
C:\WINDOWS\system32\TDSSfpmp.dll (Rootkit.Agent) ->
This worrys me - TDSS Rootkit.
Download ComboFix from one of these locations:
Link 1
Link 2
Link 3
* IMPORTANT !!! Save ComboFix.exe to your Desktop- Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
- Double click on ComboFix.exe & follow the prompts.
- As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
- Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.
Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:
Click on Yes, to continue scanning for malware.
When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.0 - Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
-
I googled this...and found this:-
http://forums.whatthetech.com/Computer_infested_virus_Trojan_Even_format_didn_t99700.html
right persistent little blighters by the look of it....
try downloading, updating and running superantispyware...they didn' try it on that forum, but would be worth a go...
edit:- oops !!!!! THAT'LL TEACH ME to check before I post....if the reluctant one is on the case, I'll keep quiet, watch, and learn
......Gettin' There, Wherever There is......
I have a dodgy "i" key, so ignore spelling errors due to "i" issues, ...I blame Apple
0 -
Sorry everyone - I got called away
Apologies for posting the wrong MBAM Log
This was actually the second log that was generated
Malwarebytes' Anti-Malware 1.34
Database version: 1771
Windows 5.1.2600 Service Pack 3
17/02/2009 19:06:59
mbam-log-2009-02-17 (19-06-59).txt
Scan type: Quick Scan
Objects scanned: 103499
Time elapsed: 20 minute(s), 57 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 7
Registry Data Items Infected: 0
Folders Infected: 21
Files Infected: 39
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
(No malicious items detected)
Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\[system] (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rs32net (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rxuqiviyifan (Trojan.Agent) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jhedav (Trojan.Agent) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svschost.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
C:\Documents and Settings\Kieran\Application Data\Starware316 (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\BrowserSearch (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Configurator (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\ErrorSearch (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Games (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Layouts (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Manager (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Movies (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Reference (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\RelatedSearch (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Screensavers (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\ScreensaversMarketingSitePager (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\SearchAssistPlus (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\SearchMatch (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\SearchMatch\searchMatchPages (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Toolbar (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\ToolbarLogo (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\ToolbarSearch (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\TravelSearch (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Weather (Adware.Starware) -> Quarantined and deleted successfully.
C:\Program Files\CMVideoPlugin (Trojan.BHO) -> Quarantined and deleted successfully.
Files Infected:
C:\Documents and Settings\Kieran\Application Data\Starware316\BrowserSearch\BrowserSearch.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\BrowserSearch\BrowserSearch.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Configurator\Configurator.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Configurator\Configurator.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\ErrorSearch\ErrorSearchOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\ErrorSearch\ErrorSearchOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Games\GamesOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Games\GamesOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Layouts\ToolbarLayout.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Layouts\ToolbarLayout.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Manager\ManagerOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Manager\ManagerOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Movies\MoviesOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Movies\MoviesOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Reference\ReferenceOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Reference\ReferenceOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\RelatedSearch\RelatedSearchOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\RelatedSearch\RelatedSearchOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Screensavers\ScreensaversOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Screensavers\ScreensaversOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\ScreensaversMarketingSitePager\ScreensaversMarketingSitePagerOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\ScreensaversMarketingSitePager\ScreensaversMarketingSitePagerOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\SearchAssistPlus\SearchAssistPlusOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\SearchAssistPlus\SearchAssistPlusOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\SearchMatch\SearchMatchOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\SearchMatch\SearchMatchOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Toolbar\TBProductsOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Toolbar\TBProductsOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\ToolbarLogo\ToolbarLogoOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\ToolbarLogo\ToolbarLogoOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\ToolbarSearch\ToolbarSearchOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\ToolbarSearch\ToolbarSearchOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\TravelSearch\TravelSearchOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\TravelSearch\TravelSearchOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Weather\AlertArchive.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Weather\WeatherOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kieran\Application Data\Starware316\Weather\WeatherOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\WINDOWS\Oqanadosexa.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\arujahiga.dll (Trojan.Agent) -> Delete on reboot.0 -
This was the Super Anti Spyware Log
SUPERAntiSpyware Scan Log
http://www.superantispyware.com
Generated 02/17/2009 at 07:45 PM
Application Version : 4.25.1012
Core Rules Database Version : 3763
Trace Rules Database Version: 1724
Scan type : Quick Scan
Total Scan Time : 00:14:37
Memory items scanned : 449
Memory threats detected : 0
Registry items scanned : 413
Registry threats detected : 6
File items scanned : 9060
File threats detected : 80
Rootkit.Dopper/ETH
HKLM\System\ControlSet001\Services\ethsfzup
C:\WINDOWS\SYSTEM32\DRIVERS\ETHSFZUP.SYS
HKLM\System\ControlSet001\Enum\Root\LEGACY_ethsfzup
HKLM\System\ControlSet003\Services\ethsfzup
HKLM\System\ControlSet003\Enum\Root\LEGACY_ethsfzup
HKLM\System\CurrentControlSet\Services\ethsfzup
HKLM\System\CurrentControlSet\Enum\Root\LEGACY_ethsfzup
Adware.Tracking Cookie
server.iad.liveperson.net [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
server.iad.liveperson.net [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
.apmebf.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
.serving-sys.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
.serving-sys.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
.serving-sys.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
.bs.serving-sys.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
.serving-sys.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
.serving-sys.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
.serving-sys.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
.kontera.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
.kontera.com [ C:\Documents and Settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\cookies.txt ]
C:\Documents and Settings\Gillian\Cookies\gillian@nickelodeonuk.112.2o7[1].txt
C:\Documents and Settings\Gillian\Cookies\gillian@ads.stardoll[1].txt
C:\Documents and Settings\Gillian\Cookies\gillian@questionmarket[2].txt
C:\Documents and Settings\Gillian\Cookies\gillian@nbads[2].txt
C:\Documents and Settings\Gillian\Cookies\gillian@mediaservices.myspace[1].txt
C:\Documents and Settings\Gillian\Cookies\gillian@stats.channel4[1].txt
C:\Documents and Settings\Gillian\Cookies\gillian@ads.tibaco[2].txt
C:\Documents and Settings\Gillian\Cookies\gillian@starware[1].txt
C:\Documents and Settings\Gillian\Cookies\gillian@overture[2].txt
C:\Documents and Settings\Gillian\Cookies\gillian@tradedoubler[1].txt
C:\Documents and Settings\Gillian\Cookies\gillian@ehg-debenhams.hitbox[2].txt
C:\Documents and Settings\Gillian\Cookies\gillian@ads.aol.co[2].txt
C:\Documents and Settings\Gillian\Cookies\gillian@h.starware[1].txt
C:\Documents and Settings\Gillian\Cookies\gillian@try.starware[1].txt
C:\Documents and Settings\Gillian\Cookies\gillian@ads.habbogroup[1].txt
C:\Documents and Settings\Gillian\Cookies\gillian@teentrendsgirls.everythinggirl[2].txt
C:\Documents and Settings\Gillian\Cookies\gillian@videoegg.adbureau[2].txt
C:\Documents and Settings\Gillian\Cookies\gillian@apmebf[1].txt
C:\Documents and Settings\Gillian\Cookies\gillian@try.screensavers[1].txt
C:\Documents and Settings\Gillian\Cookies\gillian@www.screensavers[1].txt
C:\Documents and Settings\Gillian\Cookies\gillian@ads.tnt[1].txt
C:\Documents and Settings\Gillian\Cookies\gillian@screensavers.us.intellitxt[1].txt
C:\Documents and Settings\Gillian\Cookies\gillian@ads.adbrite[2].txt
C:\Documents and Settings\Gillian\Cookies\gillian@eyewonder[1].txt
C:\Documents and Settings\Gillian\Cookies\gillian@track.searchignite[1].txt
C:\Documents and Settings\Gillian\Cookies\gillian@hitbox[2].txt
C:\Documents and Settings\Gillian\Cookies\gillian@2o7[2].txt
C:\Documents and Settings\Gillian\Cookies\gillian@statse.webtrendslive[1].txt
C:\Documents and Settings\Gillian\Cookies\gillian@data2.perf.overture[1].txt
.kontera.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.kontera.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.adrevolver.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.adrevolver.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.tribalfusion.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
ad.yieldmanager.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.burstnet.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
media.adrevolver.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.adviva.net [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.adviva.net [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
eas.apm.emediate.eu [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
ad.yieldmanager.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
eas.apm.emediate.eu [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.247realmedia.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.247realmedia.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.247realmedia.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.doubleclick.net [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.atdmt.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.kaspersky.122.2o7.net [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.advertising.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.mediaplex.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.apmebf.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.revsci.net [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.revsci.net [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.revsci.net [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
.revsci.net [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
www.googleadservices.com [ C:\Documents and Settings\john\Application Data\Mozilla\Firefox\Profiles\rco7gtkd.default\cookies.txt ]
C:\Documents and Settings\john\Cookies\john@atdmt[2].txt
C:\Documents and Settings\john\Cookies\john@at.atwola[2].txt
C:\Documents and Settings\john\Cookies\john@www.virginmedia[1].txt
C:\Documents and Settings\john\Cookies\john@247realmedia[2].txt
C:\Documents and Settings\john\Cookies\john@ad.zanox[1].txt
C:\Documents and Settings\john\Cookies\john@help2.virginmedia[1].txt
C:\Documents and Settings\john\Cookies\john@kontera[2].txt
C:\Documents and Settings\john\Cookies\john@tacoda[2].txt
C:\Documents and Settings\john\Cookies\john@virginmedia[2].txt
C:\Documents and Settings\john\Local Settings\Temp\Cookies\john@virginmedia[2].txt
C:\Documents and Settings\john\Local Settings\Temp\Cookies\john@www.virginmedia[1].txt
I0 -
This is the updated Hijack This Log after running Super Anti Spyware
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 21:35:29, on 17/02/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\system32\hkcmd.exe
C:\Program Files\Lexmark X1100 Series\lxbkbmgr.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\Lexmark X1100 Series\lxbkbmon.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\zHotkey.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.medion.co.uk
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1;*.local
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Lexmark X1100 Series] "C:\Program Files\Lexmark X1100 Series\lxbkbmgr.exe"
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [ZoneAlarm Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [lrijh8s73jhbfgfd] C:\WINDOWS\TEMP\winlognn.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [CHotkey] zHotkey.exe
O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
O4 - HKLM\..\Run: [AOLDialer] C:\Program Files\Common Files\AOL\ACS\AOLDial.exe
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [phnfvrcj.exe] C:\WINDOWS\phnfvrcj.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Reader 8.0\Reader\reader_sl.exe
O4 - Global Startup: Adobe Reader Synchronizer.lnk = C:\Program Files\Adobe\Reader 8.0\Reader\AdobeCollabSync.exe
O4 - Global Startup: broadband medic.lnk = C:\Program Files\ntl\broadband medic\bin\matcli.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - !!08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - !!08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://www.medion.co.uk
O15 - Trusted Zone: *.musicmatch.com
O15 - Trusted Zone: *.musicmatch.com (HKLM)
O16 - DPF: !!138E6DC9-722B-4F4B-B09D-95D191869696} (Bebo Uploader Control) - http://www.bebo.com/files/BeboUploader.5.1.4.cab
O16 - DPF: !!17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: !!2917297F-F02B-4B9D-81DF-494B6333150B} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab31267.cab
O16 - DPF: !!6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1123753183109
O16 - DPF: !!6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1123758956265
O16 - DPF: !!8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
O20 - AppInit_DLLs: karna.dat
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: Task Scheduler (Schedule) - Unknown owner - C:\WINDOWS\system32\drivers\services.exe (file missing)
--
End of file - 7272 bytes0 -
Can you run ComboFix as in Post#150
-
Just finished the Combofix scan. This is the log
ComboFix 09-02-15.01 - Anne 2009-02-17 21:44:10.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.247.72 [GMT 0:00]
Running from: c:\documents and settings\Anne\Desktop\ComboFix.exe
AV: avast! antivirus 4.8.1335 [VPS 090216-1] *On-access scanning disabled* (Updated)
* Created a new restore point
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
c:\documents and settings\Anne\Cookies\apanasirav.vbs
c:\documents and settings\Anne\Cookies\mexys.pif
c:\documents and settings\Anne\Cookies\puqesami.com
c:\documents and settings\Anne\Cookies\ryvuxyqo.bin
c:\documents and settings\Anne\Cookies\sily.dat
c:\documents and settings\Anne\Cookies\vafygaxex.inf
c:\documents and settings\Anne\Cookies\xugy.pif
c:\windows\eyoyamukohiyima.dll
c:\windows\system32\drivers\str.sys
.
((((((((((((((((((((((((( Files Created from 2009-01-17 to 2009-02-17 )))))))))))))))))))))))))))))))
.
2009-02-17 19:28 . 2009-02-17 19:28 <DIR> d
c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2009-02-17 19:27 . 2009-02-17 19:27 <DIR> d
c:\program files\SUPERAntiSpyware
2009-02-17 19:27 . 2009-02-17 19:27 <DIR> d
c:\documents and settings\Anne\Application Data\SUPERAntiSpyware.com
2009-02-17 19:19 . 2009-02-17 19:19 <DIR> d
c:\program files\Trend Micro
2009-02-17 17:34 . 2009-02-17 17:34 <DIR> d
c:\program files\Malwarebytes' Anti-Malware
2009-02-17 17:34 . 2009-02-17 17:34 <DIR> d
c:\documents and settings\Anne\Application Data\Malwarebytes
2009-02-17 17:34 . 2009-02-17 17:34 <DIR> d
c:\documents and settings\All Users\Application Data\Malwarebytes
2009-02-17 17:34 . 2009-02-11 10:19 38,496 --a
c:\windows\system32\drivers\mbamswissarmy.sys
2009-02-17 17:34 . 2009-02-11 10:19 15,504 --a
c:\windows\system32\drivers\mbam.sys
2009-02-15 13:15 . 2009-02-15 13:49 <DIR> d
c:\documents and settings\Anne\Application Data\HouseCall 6.6
2009-02-15 12:15 . 2009-02-15 12:15 <DIR> d
c:\program files\CCleaner
2009-02-13 22:14 . 2009-02-13 22:14 <DIR> d
c:\program files\Alwil Software
2009-02-13 20:29 . 2009-02-17 19:27 <DIR> d
c:\program files\Common Files\Wise Installation Wizard
2009-02-13 20:22 . 2009-02-13 20:22 <DIR> d
c:\documents and settings\All Users\Application Data\TEMP
2009-02-13 19:48 . 2009-02-13 20:23 <DIR> d
c:\program files\SpywareBlaster
2009-02-07 09:34 . 2008-07-31 22:17 9,200
c:\windows\system32\drivers\cdralw2k.sys
2009-02-07 09:34 . 2008-07-31 22:17 9,072
c:\windows\system32\drivers\cdr4_xp.sys
2009-02-06 22:44 . 2009-02-06 22:44 <DIR> d
c:\documents and settings\john\Application Data\Talkback
2009-02-06 22:35 . 2004-04-27 04:40 11,264 --a
c:\windows\system32\SpOrder.dll
2009-02-06 21:45 . 2009-02-06 21:45 <DIR> d--h
c:\windows\PIF
2009-02-06 20:53 . 2009-02-06 20:59 <DIR> d
c:\documents and settings\All Users\Application Data\Lavasoft
2009-02-06 20:09 . 2009-02-13 20:30 <DIR> d
c:\program files\Lavasoft
2009-02-06 20:09 . 2009-02-06 20:55 <DIR> d
c:\documents and settings\john\Application Data\Lavasoft
2009-01-28 17:18 . 2009-01-31 19:25 124 --a
c:\windows\adobe.bat
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-02-13 22:10
d
w c:\program files\InstallShield Installation Information
2009-02-13 21:38
d
w c:\documents and settings\All Users\Application Data\Viewpoint
2009-02-13 21:37
d
w c:\documents and settings\Anne\Application Data\Virgin Broadband
2009-02-13 21:37
d
w c:\documents and settings\All Users\Application Data\Virgin Broadband
2009-02-07 09:33
d
w c:\program files\Google
2009-02-06 22:30
d
w c:\documents and settings\john\Application Data\Virgin Broadband
2009-02-06 21:17
d
w c:\documents and settings\Gillian\Application Data\Virgin Broadband
2009-02-06 20:08
d
w c:\documents and settings\Anne\Application Data\Lavasoft
2009-02-06 20:03
d
w c:\program files\Spybot - Search & Destroy
2009-01-29 16:25
d
w c:\documents and settings\Gillian\Application Data\LimeWire
2009-01-21 15:39
d
w c:\documents and settings\Anne\Application Data\LimeWire
2009-01-13 22:03
d
w c:\program files\Lexmark X1100 Series
2008-12-25 17:58
d
w c:\program files\iTunes
2008-12-25 17:58
d
w c:\documents and settings\All Users\Application Data\!!3276BE95_AF08_429F_A64F_CA64CB79BCF6}
2008-12-25 17:57
d
w c:\program files\iPod
2008-12-25 17:53
d
w c:\program files\QuickTime
2008-12-25 17:49
d
w c:\program files\Apple Software Update
2008-11-02 23:50 19,790 ----a-w c:\program files\Common Files\cowubucify.dat
2008-11-02 23:50 18,372 ----a-w c:\program files\Common Files\axukoji._sy
2008-11-02 23:50 17,151 ----a-w c:\program files\Common Files\mymeq.exe
2008-11-02 23:50 16,952 ----a-w c:\documents and settings\All Users\Application Data\leterewi.sys
2008-11-02 23:50 13,618 ----a-w c:\documents and settings\Anne\Application Data\cujeca.dat
2008-11-02 23:50 13,597 ----a-w c:\program files\Common Files\vabodu._sy
2008-11-02 23:50 10,680 ----a-w c:\program files\Common Files\tepobot.dll
2008-11-02 23:50 10,347 ----a-w c:\documents and settings\All Users\Application Data\pimymuzyho.dat
2008-10-19 22:37 19,045 ----a-w c:\documents and settings\Anne\Application Data\udifexen.pif
2008-10-19 22:37 17,532 ----a-w c:\program files\Common Files\ysyva.scr
2008-10-19 22:37 16,155 ----a-w c:\program files\Common Files\tite.bin
2008-10-19 22:37 15,156 ----a-w c:\documents and settings\All Users\Application Data\oweveg.dll
2008-10-19 22:37 13,617 ----a-w c:\documents and settings\Anne\Application Data\qotup.bat
2008-10-19 22:37 13,395 ----a-w c:\documents and settings\Anne\Application Data\ginutocuqa.vbs
2007-02-15 17:38 29,840 ----a-w c:\documents and settings\Anne\Application Data\GDIPFONTCACHEV1.DAT
2009-02-06 22:53 67,696 ----a-w c:\program files\mozilla firefox\components\jar50.dll
2009-02-06 22:53 54,376 ----a-w c:\program files\mozilla firefox\components\jsd3250.dll
2009-02-06 22:53 34,952 ----a-w c:\program files\mozilla firefox\components\myspell.dll
2009-02-06 22:53 46,720 ----a-w c:\program files\mozilla firefox\components\spellchk.dll
2009-02-06 22:53 172,144 ----a-w c:\program files\mozilla firefox\components\xpinstal.dll
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2005-05-31 1415824]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2009-01-15 1830128]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"UserFaultCheck"="c:\windows\system32\dumprep 0 -u" [X]
"avast!"="c:\progra~1\ALWILS~1\Avast4\ashDisp.exe" [2009-02-05 81000]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2005-06-08 77824]
"Lexmark X1100 Series"="c:\program files\Lexmark X1100 Series\lxbkbmgr.exe" [2003-08-19 57344]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2008-11-04 413696]
"Persistence"="c:\windows\system32\igfxpers.exe" [2005-06-08 114688]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2008-11-20 290088]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2005-06-08 94208]
"SoundMan"="SOUNDMAN.EXE" [2005-03-25 c:\windows\SOUNDMAN.EXE]
"CHotkey"="zHotkey.exe" [2004-05-17 c:\windows\zHotkey.exe]
"AGRSMMSG"="AGRSMMSG.exe" [2005-03-08 c:\windows\AGRSMMSG.exe]
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Reader 8.0\Reader\reader_sl.exe [2008-01-11 39792]
Adobe Reader Synchronizer.lnk - c:\program files\Adobe\Reader 8.0\Reader\AdobeCollabSync.exe [2007-05-10 738968]
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"ForceClassicControlPanel"= 1 (0x1)
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"!!5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2008-12-22 11:05 356352 c:\program files\SUPERAntiSpyware\SASWINLO.dll
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"VIDC.VQC4"= VQ318DEC.dll
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001
"FirewallOverride"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\AOL 9.0\\AOL.exe"=
"c:\\Program Files\\AOL 9.0\\WAOL.exe"=
"c:\\WINDOWS\\system32\\fxsclnt.exe"=
"c:\\Program Files\\NetMeeting\\Conf.exe"=
"c:\\Program Files\\Ahead\\Nero MediaHome\\NeroMediaHome.exe"=
"c:\\StubInstaller.exe"=
"c:\\WINDOWS\\system32\\LEXPPS.EXE"=
"c:\\WINDOWS\\system32\\rtcshare.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"8814:TCP"= 8814:TCP:ppLive
"2147:UDP"= 2147:UDP:ppLive
"3401:UDP"= 3401:UDP:Windows Media Format SDK (IEXPLORE.EXE)
"3400:UDP"= 3400:UDP:Windows Media Format SDK (IEXPLORE.EXE)
R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [2009-02-13 114768]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2009-01-15 8944]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2009-01-15 55024]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2009-02-13 20560]
R3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [2009-01-15 7408]
S3 DCamUSBLTN;M318B Digital Video Camera;c:\windows\system32\drivers\vq318vid.sys [2002-04-22 113632]
S3 k600bus;Sony Ericsson 600i driver (WDM);c:\windows\system32\drivers\k600bus.sys [2005-03-04 52384]
S3 k600mdfl;Sony Ericsson 600i USB WMC Modem Filter;c:\windows\system32\drivers\k600mdfl.sys [2006-03-27 6096]
S3 k600mdm;Sony Ericsson 600i USB WMC Modem Drivers;c:\windows\system32\drivers\k600mdm.sys [2006-03-27 87456]
--- Other Services/Drivers In Memory ---
*Deregistered* - Netman
*Deregistered* - Nla
*Deregistered* - PolicyAgent
*Deregistered* - ProtectedStorage
*Deregistered* - RasMan
*Deregistered* - RpcSs
*Deregistered* - SamSs
*Deregistered* - Schedule
*Deregistered* - seclogon
*Deregistered* - SENS
*Deregistered* - SharedAccess
*Deregistered* - ShellHWDetection
*Deregistered* - Spooler
*Deregistered* - srservice
*Deregistered* - SSDPSRV
*Deregistered* - stisvc
*Deregistered* - TapiSrv
*Deregistered* - TermService
*Deregistered* - Themes
*Deregistered* - TrkWks
*Deregistered* - W32Time
*Deregistered* - WebClient
*Deregistered* - winmgmt
*Deregistered* - wscsvc
*Deregistered* - wuauserv
*Deregistered* - WZCSVC
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\!!2b8891d0-f115-11dc-93b3-0013d392c389}]
\Shell\AutoRun\command - c:\windows\system32\RunDLL32.EXE Shell32.DLL,ShellExec_RunDLL http://www.mgae.com/keylauncher/?code=3654331620309651
.
Contents of the 'Scheduled Tasks' folder
2009-01-31 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 12:34]
.
- - - - ORPHANS REMOVED - - - -
HKCU-Run-swg - c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
HKCU-Run-phnfvrcj.exe - c:\windows\phnfvrcj.exe
HKLM-Run-ZoneAlarm Client - c:\program files\Zone Labs\ZoneAlarm\zlclient.exe
HKLM-Run-BJCFD - c:\program files\BroadJump\Client Foundation\CFD.exe
HKLM-Run-AOLDialer - c:\program files\Common Files\AOL\ACS\AOLDial.exe
SafeBoot-ati3glxx.sys
SafeBoot-ati3otxx.sys
SafeBoot-ati8ntxx.sys
MSConfigStartUp-tezrtsjhfr84iusjfo84f - c:\docume~1\Anne\LOCALS~1\Temp\csrssc.exe
.
Supplementary Scan
.
uStart Page = hxxp://www.google.com
uDefault_Search_URL = hxxp://www.google.com/ie
mStart Page = hxxp://www.google.com
uInternet Settings,ProxyOverride = 127.0.0.1;*.local
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: &AOL Toolbar search - c:\program files\AOL Toolbar\toolbar.dll/SEARCH.HTML
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
Trusted Zone: musicmatch.com
Trusted Zone: musicmatch.com
DPF: Microsoft XML Parser for Java - [URL]file://c:\windows\Java\classes\xmldso.cab[/URL]
FF - ProfilePath - c:\documents and settings\Anne\Application Data\Mozilla\Firefox\Profiles\fzzrv6sk.default\
FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=
FF - prefs.js: browser.search.selectedEngine - Google
FF - component: c:\program files\Mozilla Firefox\components\xpinstal.dll
FF - component: c:\program files\Mozilla Firefox\extensions\talkback@mozilla.org\components\qfaservices.dll
.
**************************************************************************
catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-02-17 21:55:23
Windows 5.1.2600 Service Pack 3 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
.
DLLs Loaded Under Running Processes
- - - - - - - > 'winlogon.exe'(380)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
.
Other Running Processes
.
c:\program files\Lavasoft\Ad-Aware\aawservice.exe
c:\program files\Alwil Software\Avast4\aswUpdSv.exe
c:\program files\Alwil Software\Avast4\ashServ.exe
c:\windows\system32\LEXBCES.EXE
c:\windows\system32\LEXPPS.EXE
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Lexmark X1100 Series\lxbkbmon.exe
c:\program files\Alwil Software\Avast4\ashMaiSv.exe
c:\program files\iPod\bin\iPodService.exe
c:\program files\Alwil Software\Avast4\ashWebSv.exe
.
**************************************************************************
.
Completion time: 2009-02-17 22:03:05 - machine was rebooted
ComboFix-quarantined-files.txt 2009-02-17 22:02:57
Pre-Run: 17,295,196,160 bytes free
Post-Run: 18,879,688,704 bytes free
WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect
256 --- E O F --- 2009-02-14 18:53:300
This discussion has been closed.
Confirm your email address to Create Threads and Reply
Categories
- All Categories
- 352.9K Banking & Borrowing
- 253.9K Reduce Debt & Boost Income
- 454.7K Spending & Discounts
- 246K Work, Benefits & Business
- 602K Mortgages, Homes & Bills
- 177.8K Life & Family
- 259.9K Travel & Transport
- 1.5M Hobbies & Leisure
- 16K Discuss & Feedback
- 37.7K Read-Only Boards
