ganjamon33 Posted July 25, 2008 ID:23782 Share Posted July 25, 2008 Hello. I was stupid and downloaded something that gave me a bunch of trojans it seems. I've followed the Pre - HJT Post Instructions, hopefully correctly. My MBAM log is as follows:Malwarebytes' Anti-Malware 1.23Database version: 990Windows 6.0.6001 Service Pack 110:42:56 PM 7/24/2008mbam-log-7-24-2008 (22-42-56).txtScan type: Quick ScanObjects scanned: 33912Time elapsed: 3 minute(s), 31 second(s)Memory Processes Infected: 2Memory Modules Infected: 5Registry Keys Infected: 5Registry Values Infected: 7Registry Data Items Infected: 1Folders Infected: 13Files Infected: 21Memory Processes Infected:C:\Program Files\rhc592j0eeph\rhc592j0eeph.exe (Rogue.Multiple) -> Unloaded process successfully.C:\Windows\System32\lphc192j0eeph.exe (Trojan.FakeAlert) -> Unloaded process successfully.Memory Modules Infected:C:\Program Files\rhc592j0eeph\MFC71.dll (Rogue.Multiple) -> Delete on reboot.C:\Program Files\rhc592j0eeph\MFC71ENU.DLL (Rogue.Multiple) -> Delete on reboot.C:\Program Files\rhc592j0eeph\msvcp71.dll (Rogue.Multiple) -> Delete on reboot.C:\Program Files\rhc592j0eeph\msvcr71.dll (Rogue.Multiple) -> Delete on reboot.C:\Windows\System32\blphc192j0eeph.scr (Trojan.FakeAlert) -> Delete on reboot.Registry Keys Infected:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\rhc592j0eeph (Rogue.Multiple) -> Quarantined and deleted successfully.HKEY_LOCAL_MACHINE\SOFTWARE\rhc592j0eeph (Rogue.Multiple) -> Quarantined and deleted successfully.HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Software Notifier (Rogue.Multiple) -> Quarantined and deleted successfully.HKEY_CLASSES_ROOT\qndsfmao.bvqe (Trojan.FakeAlert) -> Quarantined and deleted successfully.HKEY_CLASSES_ROOT\qndsfmao.toolbar.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.Registry Values Infected:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smrhc592j0eeph (Rogue.Multiple) -> Quarantined and deleted successfully.HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lphc192j0eeph (Trojan.FakeAlert) -> Quarantined and deleted successfully.HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lphc192j0eeph (Trojan.FakeAlert) -> Quarantined and deleted successfully.HKEY_CURRENT_USER\Control Panel\Desktop\wallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.HKEY_CURRENT_USER\Control Panel\Desktop\originalwallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.HKEY_CURRENT_USER\Control Panel\Desktop\convertedwallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.HKEY_CURRENT_USER\Control Panel\Desktop\scrnsave.exe (Hijack.Wallpaper) -> Quarantined and deleted successfully.Registry Data Items Infected:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispBackgroundPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.Folders Infected:C:\Program Files\rhc592j0eeph (Rogue.Multiple) -> Quarantined and deleted successfully.C:\Users\erik\AppData\Roaming\rhc592j0eeph (Rogue.Multiple) -> Quarantined and deleted successfully.C:\Users\erik\AppData\Roaming\rhc592j0eeph\Quarantine (Rogue.Multiple) -> Quarantined and deleted successfully.C:\Users\erik\AppData\Roaming\rhc592j0eeph\Quarantine\Autorun (Rogue.Multiple) -> Quarantined and deleted successfully.C:\Users\erik\AppData\Roaming\rhc592j0eeph\Quarantine\Autorun\HKCU (Rogue.Multiple) -> Quarantined and deleted successfully.C:\Users\erik\AppData\Roaming\rhc592j0eeph\Quarantine\Autorun\HKCU\RunOnce (Rogue.Multiple) -> Quarantined and deleted successfully.C:\Users\erik\AppData\Roaming\rhc592j0eeph\Quarantine\Autorun\HKLM (Rogue.Multiple) -> Quarantined and deleted successfully.C:\Users\erik\AppData\Roaming\rhc592j0eeph\Quarantine\Autorun\HKLM\RunOnce (Rogue.Multiple) -> Quarantined and deleted successfully.C:\Users\erik\AppData\Roaming\rhc592j0eeph\Quarantine\Autorun\StartMenuAllUsers (Rogue.Multiple) -> Quarantined and deleted successfully.C:\Users\erik\AppData\Roaming\rhc592j0eeph\Quarantine\Autorun\StartMenuCurrentUser (Rogue.Multiple) -> Quarantined and deleted successfully.C:\Users\erik\AppData\Roaming\rhc592j0eeph\Quarantine\BrowserObjects (Rogue.Multiple) -> Quarantined and deleted successfully.C:\Users\erik\AppData\Roaming\rhc592j0eeph\Quarantine\Packages (Rogue.Multiple) -> Quarantined and deleted successfully.C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008 (Rogue.AntivirusXP2008) -> Quarantined and deleted successfully.Files Infected:C:\Program Files\rhc592j0eeph\database.dat (Rogue.Multiple) -> Quarantined and deleted successfully.C:\Program Files\rhc592j0eeph\license.txt (Rogue.Multiple) -> Quarantined and deleted successfully.C:\Program Files\rhc592j0eeph\MFC71.dll (Rogue.Multiple) -> Quarantined and deleted successfully.C:\Program Files\rhc592j0eeph\MFC71ENU.DLL (Rogue.Multiple) -> Quarantined and deleted successfully.C:\Program Files\rhc592j0eeph\msvcp71.dll (Rogue.Multiple) -> Quarantined and deleted successfully.C:\Program Files\rhc592j0eeph\msvcr71.dll (Rogue.Multiple) -> Quarantined and deleted successfully.C:\Program Files\rhc592j0eeph\rhc592j0eeph.exe (Rogue.Multiple) -> Quarantined and deleted successfully.C:\Program Files\rhc592j0eeph\rhc592j0eeph.exe.local (Rogue.Multiple) -> Quarantined and deleted successfully.C:\Program Files\rhc592j0eeph\Uninstall.exe (Rogue.Multiple) -> Quarantined and deleted successfully.C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008\Antivirus XP 2008.lnk (Rogue.AntivirusXP2008) -> Quarantined and deleted successfully.C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008\How to Register Antivirus XP 2008.lnk (Rogue.AntivirusXP2008) -> Quarantined and deleted successfully.C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008\License Agreement.lnk (Rogue.AntivirusXP2008) -> Quarantined and deleted successfully.C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008\Register Antivirus XP 2008.lnk (Rogue.AntivirusXP2008) -> Quarantined and deleted successfully.C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008\Uninstall.lnk (Rogue.AntivirusXP2008) -> Quarantined and deleted successfully.C:\Windows\System32\blphc192j0eeph.scr (Trojan.FakeAlert) -> Quarantined and deleted successfully.C:\Windows\System32\lphc192j0eeph.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.C:\Windows\System32\phc192j0eeph.bmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.C:\Windows\System32\pphc192j0eeph.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008.lnk (Rogue.AntivirusXP) -> Quarantined and deleted successfully.C:\Users\Public\Desktop\Antivirus XP 2008.lnk (Rogue.Antivirus) -> Quarantined and deleted successfully.C:\Users\erik\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Antivirus XP 2008.lnk (Rogue.Antivirus2008) -> Quarantined and deleted successfully.Panda Active Scan and HiJack This Scan logs will follow in my replies. Thanks in advance for your help! I hope I'm doing this right. Link to post Share on other sites More sharing options...
ganjamon33 Posted July 25, 2008 Author ID:23784 Share Posted July 25, 2008 Ok, here's my Panda log, looks like it only detected cookies:;***********************************************************************************************************************************************************************************ANALYSIS: 2008-07-24 23:55:17PROTECTIONS: 1MALWARE: 14SUSPECTS: 0;***********************************************************************************************************************************************************************************PROTECTIONSDescription Version Active Updated;===================================================================================================================================================================================Windows Defender 1.1.3704.0 No No;===================================================================================================================================================================================MALWAREId Description Type Active Severity Disinfectable Disinfected Location;===================================================================================================================================================================================00139061 Cookie/Doubleclick TrackingCookie No 0 Yes No C:\Users\erik\AppData\Roaming\Microsoft\Windows\Cookies\Low\erik@doubleclick[1].txt00139064 Cookie/Atlas DMT TrackingCookie No 0 Yes No C:\Users\erik\AppData\Roaming\Microsoft\Windows\Cookies\Low\erik@atdmt[2].txt00145457 Cookie/FastClick TrackingCookie No 0 Yes No C:\Users\erik\AppData\Roaming\Microsoft\Windows\Cookies\Low\erik@fastclick[1].txt00145731 Cookie/Tribalfusion TrackingCookie No 0 Yes No C:\Users\erik\AppData\Roaming\Microsoft\Windows\Cookies\Low\erik@tribalfusion[2].txt00145738 Cookie/Mediaplex TrackingCookie No 0 Yes No C:\Users\erik\AppData\Roaming\Microsoft\Windows\Cookies\Low\erik@mediaplex[1].txt00168056 Cookie/YieldManager TrackingCookie No 0 Yes No C:\Users\erik\AppData\Roaming\Microsoft\Windows\Cookies\Low\erik@ad.yieldmanager[2].txt00168061 Cookie/Apmebf TrackingCookie No 0 Yes No C:\Users\erik\AppData\Roaming\Microsoft\Windows\Cookies\Low\erik@apmebf[1].txt00168076 Cookie/BurstNet TrackingCookie No 0 Yes No C:\Users\erik\AppData\Roaming\Microsoft\Windows\Cookies\Low\erik@burstnet[2].txt00169190 Cookie/Advertising TrackingCookie No 0 Yes No C:\Users\erik\AppData\Roaming\Microsoft\Windows\Cookies\Low\erik@advertising[1].txt00170556 Cookie/RealMedia TrackingCookie No 0 Yes No C:\Users\erik\AppData\Roaming\Microsoft\Windows\Cookies\Low\erik@realmedia[2].txt00171982 Cookie/QuestionMarket TrackingCookie No 0 Yes No C:\Users\erik\AppData\Roaming\Microsoft\Windows\Cookies\Low\erik@questionmarket[1].txt00172221 Cookie/Zedo TrackingCookie No 0 Yes No C:\Users\erik\AppData\Roaming\Microsoft\Windows\Cookies\Low\erik@zedo[2].txt00184846 Cookie/Adrevolver TrackingCookie No 0 Yes No C:\Users\erik\AppData\Roaming\Microsoft\Windows\Cookies\Low\erik@adrevolver[2].txt00262020 Cookie/Atwola TrackingCookie No 0 Yes No C:\Users\erik\AppData\Roaming\Microsoft\Windows\Cookies\Low\erik@atwola[1].txt;===================================================================================================================================================================================SUSPECTSSent Location 1s5;===================================================================================================================================================================================;===================================================================================================================================================================================VULNERABILITIESId Severity Description 1s5;===================================================================================================================================================================================;=================================================================================================================================================================================== Link to post Share on other sites More sharing options...
ganjamon33 Posted July 25, 2008 Author ID:23785 Share Posted July 25, 2008 Ok, and finally here's my HijackThis log, so am I clean now? Logfile of Trend Micro HijackThis v2.0.2Scan saved at 11:58:29 PM, on 7/24/2008Platform: Windows Vista SP1 (WinNT 6.00.1905)MSIE: Internet Explorer v7.00 (7.00.6001.18000)Boot mode: NormalRunning processes:C:\Windows\system32\taskeng.exeC:\Windows\system32\Dwm.exeC:\Windows\Explorer.EXEC:\Program Files\Windows Defender\MSASCui.exeC:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exeC:\Program Files\Microsoft Office\Office12\GrooveMonitor.exeC:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\avp.exeC:\Program Files\Windows Sidebar\sidebar.exeC:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exeC:\Program Files\Internet Explorer\ieuser.exeC:\Program Files\Internet Explorer\iexplore.exeC:\Windows\system32\Macromed\Flash\FlashUtil9f.exeC:\Windows\WindowsMobile\wmdc.exeC:\Program Files\Google\Google Calendar Sync\GoogleCalendarSync.exeC:\Windows\System32\mobsync.exeC:\Windows\system32\NOTEPAD.EXEC:\Program Files\Trend Micro\HijackThis\HijackThis.exeC:\Windows\system32\SearchFilterHost.exeR1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = O1 - Hosts: ::1 localhostO2 - BHO: IEVkbdBHO - {59273AB4-E7D3-40F9-A1A8-6FA9CCA1862C} - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\ievkbd.dllO2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files\Microsoft Office\Office12\GrooveShellExtensions.dllO2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dllO3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dllO3 - Toolbar: (no name) - {3FCAEB7D-F8AE-4A67-AE6C-57EE1416BB6D} - (no file)O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hideO4 - HKLM\..\Run: [CmPCIaudio] RunDll32 CMICNFG3.CPL,CMICtrlWndO4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartupO4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInitO4 - HKLM\..\Run: [PWRISOVM.EXE] C:\Program Files\PowerISO\PWRISOVM.EXEO4 - HKLM\..\Run: [GrooveMonitor] "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe"O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\avp.exe"O4 - HKLM\..\Run: [Windows Mobile Device Center] %windir%\WindowsMobile\wmdc.exeO4 - HKCU\..\Run: [sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRunO4 - HKCU\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenterO4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exeO4 - HKUS\S-1-5-19\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')O4 - HKUS\S-1-5-20\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')O4 - Global Startup: Google Calendar Sync.lnk = C:\Program Files\Google\Google Calendar Sync\GoogleCalendarSync.exeO8 - Extra context menu item: Add to Banner Ad Blocker - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\ie_banner_deny.htmO8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000O9 - Extra button: Web traffic protection statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\SCIEPlgn.dllO9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dllO9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dllO9 - Extra button: @C:\Windows\WindowsMobile\INetRepl.dll,-222 - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dllO9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dllO9 - Extra 'Tools' menuitem: @C:\Windows\WindowsMobile\INetRepl.dll,-223 - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dllO9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLLO13 - Gopher Prefix: O15 - Trusted Zone: http://www.pandasecurity.comO16 - DPF: vzTCPConfig - http://www2.verizon.net/help/fios_settings...vzTCPConfig.CABO16 - DPF: {2D8ED06D-3C30-438B-96AE-4D110FDC1FB8} (ActiveScan 2.0 Installer Class) - http://acs.pandasoftware.com/activescan/cabs/as2stubie.cabO18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dllO20 - AppInit_DLLs: C:\PROGRA~1\KASPER~1\KASPER~1\mzvkbd.dll,C:\PROGRA~1\KASPER~1\KASPER~1\adialhk.dll,C:\PROGRA~1\KASPER~1\KASPER~1\kloehk.dll,O23 - Service: Kaspersky Internet Security (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\avp.exeO23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exeO23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exeO23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe--End of file - 6436 bytes Link to post Share on other sites More sharing options...
1972vet Posted July 25, 2008 ID:23800 Share Posted July 25, 2008 Greetings ganjamon33 and Welcome to the Forums,I'm looking over your log currently and will have some suggestions for you in a short while. Thanks for you patience! Link to post Share on other sites More sharing options...
1972vet Posted July 25, 2008 ID:23802 Share Posted July 25, 2008 I see no other malicious software in this log. There are a couple items to mention...one stray registry entry and one questionable entry.Before we try to fix them though we need to disable your Microsoft Windows Defender Real-time Protection as it will interfere with the HijackThis application. Open Microsoft Windows Defender. Click Start, Programs, Windows Defender Click on Tools, General Settings Under Real-time protection options, unselect the Turn on real-time protection check box Click SaveAfter all of the fixes are complete it is very important that you enable Real-time Protection again.The Trusted Zone is something that should really only be used under an "Intranet" type of a setup (which is usually a corporate atmosphere), not "Internet".You can place anything you want in your trusted zone but when you consider that any web site can be hacked (yes, even security web sites) then your "elevated" privilege given to that web site makes your system vulnerable. It is akin to leaving your house keys in the front door lock while you go away on vacation. If you agree that is a bad idea, then please run HijackThis again and check/fix these entries:This "O3" entry is the stray item mentioned:O3 - Toolbar: (no name) - {3FCAEB7D-F8AE-4A67-AE6C-57EE1416BB6D} - (no file)...and this "O15" entry is the questionable item mentioned:O15 - Trusted Zone: http://www.pandasecurity.comClose all windows now except for the HijackThis application's window, then click the Fix Checked button. Reboot to properly record the changes made to the hard disk. Post back a fresh HijackThis log and advise if you are having any other issues and how the system behaves for you now. Thanks! Link to post Share on other sites More sharing options...
ganjamon33 Posted July 25, 2008 Author ID:23813 Share Posted July 25, 2008 Great! Thanks 1972vet! I removed those entries, everything seems to be running fine. Malwarebytes Anti-Malware is quite an awesome program to remove all those nasty trojans when my Anti-virus couldn't even touch them.I might be posting another post when I get the chance in the near future, as I am dual-booting with Vista and XP and I stupidly ran the software that infected my system on both.Thanks for your help again, you guys are doing a great service! Here's my new HijackThis log:Logfile of Trend Micro HijackThis v2.0.2Scan saved at 9:23:08 AM, on 7/25/2008Platform: Windows Vista SP1 (WinNT 6.00.1905)MSIE: Internet Explorer v7.00 (7.00.6001.18000)Boot mode: NormalRunning processes:C:\Windows\system32\Dwm.exeC:\Windows\system32\taskeng.exeC:\Windows\Explorer.EXEC:\Program Files\Windows Defender\MSASCui.exeC:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exeC:\Program Files\Microsoft Office\Office12\GrooveMonitor.exeC:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\avp.exeC:\Windows\WindowsMobile\wmdc.exeC:\Program Files\Windows Sidebar\sidebar.exeC:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exeC:\Program Files\Google\Google Calendar Sync\GoogleCalendarSync.exeC:\Windows\System32\mobsync.exeC:\Program Files\Mozilla Firefox\firefox.exeC:\Program Files\Trend Micro\HijackThis\HijackThis.exeC:\Windows\system32\SearchProtocolHost.exeR1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = O1 - Hosts: ::1 localhostO2 - BHO: IEVkbdBHO - {59273AB4-E7D3-40F9-A1A8-6FA9CCA1862C} - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\ievkbd.dllO2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files\Microsoft Office\Office12\GrooveShellExtensions.dllO2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dllO3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dllO4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hideO4 - HKLM\..\Run: [CmPCIaudio] RunDll32 CMICNFG3.CPL,CMICtrlWndO4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartupO4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInitO4 - HKLM\..\Run: [PWRISOVM.EXE] C:\Program Files\PowerISO\PWRISOVM.EXEO4 - HKLM\..\Run: [GrooveMonitor] "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe"O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\avp.exe"O4 - HKLM\..\Run: [Windows Mobile Device Center] %windir%\WindowsMobile\wmdc.exeO4 - HKCU\..\Run: [sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRunO4 - HKCU\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenterO4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exeO4 - HKUS\S-1-5-19\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')O4 - HKUS\S-1-5-20\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')O4 - Global Startup: Google Calendar Sync.lnk = C:\Program Files\Google\Google Calendar Sync\GoogleCalendarSync.exeO8 - Extra context menu item: Add to Banner Ad Blocker - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\ie_banner_deny.htmO8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000O9 - Extra button: Web traffic protection statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\SCIEPlgn.dllO9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dllO9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dllO9 - Extra button: @C:\Windows\WindowsMobile\INetRepl.dll,-222 - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dllO9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dllO9 - Extra 'Tools' menuitem: @C:\Windows\WindowsMobile\INetRepl.dll,-223 - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dllO9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLLO13 - Gopher Prefix: O16 - DPF: vzTCPConfig - http://www2.verizon.net/help/fios_settings...vzTCPConfig.CABO16 - DPF: {2D8ED06D-3C30-438B-96AE-4D110FDC1FB8} (ActiveScan 2.0 Installer Class) - http://acs.pandasoftware.com/activescan/cabs/as2stubie.cabO18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dllO20 - AppInit_DLLs: C:\PROGRA~1\KASPER~1\KASPER~1\mzvkbd.dll,C:\PROGRA~1\KASPER~1\KASPER~1\adialhk.dll,C:\PROGRA~1\KASPER~1\KASPER~1\kloehk.dll,O23 - Service: Kaspersky Internet Security (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\avp.exeO23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exeO23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exeO23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe--End of file - 6174 bytes Link to post Share on other sites More sharing options...
1972vet Posted July 25, 2008 ID:23838 Share Posted July 25, 2008 Looks clean...congratulations!Now that your system is clean and running the way you expect, let's create a new restore point you can refer to should the need arise at some point in the future.Please click "Start->Programs->Accessories->System Tools->System Restore". In the new window, check the 'Create a restore point' in the right pane and click "Next". In the "Restore point description" textbox, name your restore point to something you will easily recognize. I recommend something like yyyymmdd_Clean (ex. 20060101_Clean) Click "Create" and reboot your computer.To assist in the prevention of spyware infections:Immunize your browser by installing Spywareblaster. What does it do? Prevents the installation of ActiveX-based spyware, adware, browser hijackers, dialers, and other potentially unwanted software. Blocks spyware/tracking cookies in Internet Explorer and Mozilla/Firefox. Restricts the actions of potentially unwanted sites in Internet Explorer.Keep your anti-virus and spyware definitions up to date. Be sure to scan often.Windows Vista has a software firewall built in and activated by default. And, just as with Windows XP, it's not quite the best defense, although it is a little better than it's predecessor. For those Vista users concerned about web safety, consider using the free software firewall by Comodo. It is, in my opinion, the best free firewall for Vista to date.Stay updated with the most recent Windows patches using Microsoft's Windows Update. Make it easy on yourself, and set this feature to Automatic.Using an alternate browser can reduce your chance of certain infections installing themselves. We recommend installing Mozilla Firefox. If you don't already have "Firefox", please consider installing and using this browser for surfing.If you still wish to use Internet Explorer, please make sure you install SpywareBlaster (from above) to protect you from most ActiveX infections.Run CCleaner often. The Yahoo Toolbar is included by default during the installation...if you DO NOT WANT IT, be sure to remove the check from the "Add CCleaner Yahoo! Toolbar and use CCleaner from your browser" option during installation setup.Or if you just want to run your on board Disk Cleanup ("Start--> Programs-->Accessories-->System Tools-->Disk Cleanup" ), just open the utility and check off the following:Downloaded Program Files, Temporary Internet Files, Recycle Bin, and Temporary Files. Don't forget to check your system's "defragmenter" settings. With Windows Vista, you have the option to set this as a scheduled event. It is best to have your system's "defrag" function scheduled for at least once a week.So how did I get infected in the first place?Regards, and Happy Surfing! Link to post Share on other sites More sharing options...
Recommended Posts