1.

Solve : All of my Icons and my tool bar are missing from my desktop "start" is gone(2)?

Answer»

Hi!!! I'm having the exact same problem!!!
Icons, Toolbar won't load...
Only way to get around it is like they said ctrl, alt, delete, run new task
It's rather annoying...
and i get an userinit error and a rundll.exe error

Please help...

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:02:04 PM, on 7/7/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16640)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec\LiveUpdate\AluSchedulerSvc.exe
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\lxddserv.exe
C:\WINDOWS\system32\lxddcoms.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\ctfmon.exe
C:\PROGRA~1\COMMON~1\SYMANT~1\CCPD-LC\symlcsvc.exe
C:\Program Files\Flock\flock\flock.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\msiexec.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://securityresponse.symantec.com/avcenter/fix_homepage/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://securityresponse.symantec.com/avcenter/fix_homepage/
O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\PROGRA~1\COMMON~1\SYMANT~1\IDS\IPSBHO.dll
O2 - BHO: {c1ae7fc7-b4b9-f878-9134-94e2b184eaf6} - {6fae481b-2e49-4319-878f-9b4b7cf7ea1c} - C:\WINDOWS\system32\kktjxygu.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O2 - BHO: (no name) - {9914230F-8C55-45A5-9D8B-599153897A7C} - C:\WINDOWS\system32\iifddbcD.dll (file missing)
O2 - BHO: (no name) - {A40C6E93-B163-4F6D-B71F-89662A0534A8} - C:\WINDOWS\system32\efcARkkH.dll (file missing)
O2 - BHO: (no name) - {AC213B6E-001F-40B3-AFDE-DF964289B9E5} - C:\WINDOWS\system32\tuvWqNFw.dll
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
O4 - HKLM\..\Run: [SoundMAX] "C:\Program Files\Analog Devices\SoundMAX\Smax4.exe" /tray
O4 - HKLM\..\Run: [SiSPower] Rundll32.exe SiSPower.dll,ModeAgent
O4 - HKLM\..\Run: [SDTray] "C:\Program Files\Spyware Doctor\SDTrayApp.exe"
O4 - HKLM\..\Run: [osCheck] "C:\Program Files\Norton AntiVirus\osCheck.exe"
O4 - HKLM\..\Run: [lxddmon.exe] "C:\Program Files\Lexmark 2500 Series\lxddmon.exe"
O4 - HKLM\..\Run: [lxddamon] "C:\Program Files\Lexmark 2500 Series\lxddamon.exe"
O4 - HKLM\..\Run: [Lexmark 1200 Series] "C:\Program Files\Lexmark 1200 Series\lxczbmgr.exe"
O4 - HKLM\..\Run: [dbar_starter] C:\Documents and Settings\Mark Buffaloe\Application Data\Deskbar_{9B45545C-9B0B-4caf-A30B-F21C4128173D}\starter.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [BM834b42a3] Rundll32.exe "C:\WINDOWS\system32\ocwecxja.dll",s
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [8078713f] rundll32.exe "C:\WINDOWS\system32\rbqmcwih.dll",b
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe"
O4 - HKLM\..\RunOnce: [SymLnch] "C:\Documents and Settings\Mark Buffaloe\Application Data\Symantec\Layouts\NSW-Norton AntiVirus\15.0\SymAllLanguages\NAVCD_RETAIL\20070826\Support\SymLnch\SymLnch.exe" "C:\Documents and Settings\Mark Buffaloe\Application Data\Symantec\Layouts\NSW-Norton AntiVirus\15.0\SymAllLanguages\NAVCD_RETAIL\20070826\Setup.exe" "/SCANUPREBOOT /temp /patched"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [WinUpdater] "C:\Program Files\winvi\update.exe" /background
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - Global Startup: Utility Tray.lnk = C:\WINDOWS\system32\sistray.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: Express Cleanup - {5E638779-1818-4754-A595-EF1C63B87A56} - C:\Program Files\Norton SystemWorks\Norton Cleanup\WCQuick.lnk (file missing)
O9 - Extra 'Tools' menuitem: Express Cleanup - {5E638779-1818-4754-A595-EF1C63B87A56} - C:\Program Files\Norton SystemWorks\Norton Cleanup\WCQuick.lnk (file missing)
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx1.hotmail.com/mail/w2/resources/MSNPUpld.cab
O20 - AppInit_DLLs: fdpssmsh.dll
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\AluSchedulerSvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\LuComServer_3_4.EXE
O23 - Service: LiveUpdate Notice - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: lxddCATSCustConnectService - Lexmark International, Inc. - C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxddserv.exe
O23 - Service: lxdd_device - - C:\WINDOWS\system32\lxddcoms.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: Symantec Core LC - Unknown owner - C:\PROGRA~1\COMMON~1\SYMANT~1\CCPD-LC\symlcsvc.exe

--
End of file - 7180 bytes
Next time, start your own topic. I just CREATED it for you, this time.Is your Norton paid for, and up to date, because it doesn't look active to me?Yes, we installed it about two MONTHS ago and it automatically updates.There is some infection.

Print these instructions out.

1. Download SUPERAntiSpyware Free for Home Users:
http://www.superantispyware.com/

* Double-click SUPERAntiSpyware.exe and use the default settings for installation.
* An icon will be created on your desktop. Double-click that icon to launch the program.
* If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
* Close SUPERAntiSpyware.

PHYSICALLY DISCONNECT FROM THE INTERNET

Restart computer in Safe Mode.
To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

* Open SUPERAntiSpyware.
* Under "Configuration and Preferences", click the Preferences button.
* Click the Scanning Control tab.
* Under Scanner Options make sure the following are checked (leave all others unchecked):
o Close browsers before scanning.
o Scan for TRACKING cookies.
o Terminate memory threats before quarantining.
* Click the "Close" button to leave the control center screen.
* Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
* On the left, make sure you check C:\Fixed Drive.
* On the right, under "Complete Scan", choose Perform Complete Scan.
* Click "Next" to start the scan. Please be patient while it scans your computer.
* After the scan is complete, a Scan Summary box will appear with POTENTIALLY harmful items that were detected. Click "OK".
* Make sure everything has a checkmark next to it and click "Next".
* A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
* If asked if you want to reboot, click "Yes".
* To retrieve the removal information after reboot, launch SUPERAntispyware again.
o Click Preferences, then click the Statistics/Logs tab.
o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
o If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
o Please copy and paste the Scan Log results in your next reply.
* Click Close to exit the program.
Post SUPERAntiSpyware log.

RECONNECT TO THE INTERNET

RESTART COMPUTER!

2. Download Malwarebytes' Anti-Malware: http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform full scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

RESTART COMPUTER!

3. Post new HijackThis log.Going on to step two...


SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/09/2008 at 03:08 PM

Application Version : 4.15.1000

Core Rules Database Version : 3501
Trace Rules Database Version: 1492

Scan type : Complete Scan
Total Scan Time : 01:08:49

Memory items scanned : 430
Memory threats detected : 0
Registry items scanned : 4172
Registry threats detected : 0
File items scanned : 37625
File threats detected : 77

Adware.Tracking Cookie
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][4].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\mark [emailprotected]
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][3].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected]tclick[2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt

Adware.Vundo Variant
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP12\A0010895.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP12\A0010896.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0013978.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0014046.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0014063.DLL
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\AUOCPKIW.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\RDGVSCNJ.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\VPWMHASN.DLL.VIR

Trojan.Dropper/Gen-Packed
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP12\A0010901.EXE

Unclassified.Unknown Origin
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0013993.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0013995.DLL
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\ENTZHG.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\GAAKSKWY.DLL.VIR

Trojan.Unknown Origin
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0014050.DLL
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\RVGIJKMB.DLL.VIR

Adware.Vundo-Variant/I
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP19\A0017264.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP19\A0017265.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP19\A0017266.DLL

Trojan.Dropper/Gen-MultiPacked
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\BVCTWWEB.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\HCUYSFKU.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\KSBPJSYA.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\MDMBITSN.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\MJUSEIIJ.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\NHMJLHBB.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\NJPNWELS.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\PYUBDMPT.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\XXDUGQNI.DLL.VIR
SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/09/2008 at 03:08 PM

Application Version : 4.15.1000

Core Rules Database Version : 3501
Trace Rules Database Version: 1492

Scan type : Complete Scan
Total Scan Time : 01:08:49

Memory items scanned : 430
Memory threats detected : 0
Registry items scanned : 4172
Registry threats detected : 0
File items scanned : 37625
File threats detected : 77

Adware.Tracking Cookie
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][4].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\mark [emailprotected]
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][3].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Mark Buffaloe\Cookies\[emailprotected][2].txt

Adware.Vundo Variant
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP12\A0010895.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP12\A0010896.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0013978.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0014046.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0014063.DLL
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\AUOCPKIW.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\RDGVSCNJ.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\VPWMHASN.DLL.VIR

Trojan.Dropper/Gen-Packed
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP12\A0010901.EXE

Unclassified.Unknown Origin
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0013993.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0013995.DLL
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\ENTZHG.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\GAAKSKWY.DLL.VIR

Trojan.Unknown Origin
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0014050.DLL
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\RVGIJKMB.DLL.VIR

Adware.Vundo-Variant/I
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP19\A0017264.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP19\A0017265.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP19\A0017266.DLL

Trojan.Dropper/Gen-MultiPacked
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\BVCTWWEB.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\HCUYSFKU.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\KSBPJSYA.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\MDMBITSN.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\MJUSEIIJ.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\NHMJLHBB.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\NJPNWELS.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\PYUBDMPT.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\XXDUGQNI.DLL.VIR
Topics merged, please keep all replies in the same thread.

Go to Start > Run and type c:\combofix.txt then click OK.

Post the contents of the log back here.You posted Superantispyware log twice.
I need Malwarebytes, and HJT logs.Malwarebytes' Anti-Malware 1.20
Database version: 937
Windows 5.1.2600 Service Pack 3

6:59:02 AM 7/10/2008
mbam-log-7-10-2008 (06-59-02).txt

Scan type: Full Scan (C:\|)
Objects scanned: 70384
Time elapsed: 36 minute(s), 17 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 4
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 5
Files Infected: 9

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\DBReg (Adware.SoftMate) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Extensions\{59a40ac9-e67d-4155-b31d-4b7330fcd2d6} (Adware.PurityScan) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\WINDOWS\system32\1036a (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\MUI2 (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\spoolX (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\winRem (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\cdfig (Trojan.Agent) -> Quarantined and deleted successfully.

Files Infected:
C:\System Volume Information\_restore{2BC39B7D-A042-4934-938E-CF559E073197}\RP15\A0013899.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0013964.dll (Adware.SoftMate) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0014007.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0014014.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\Program Files\dbar\deskbar.dll.vir (Adware.SoftMate) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\icetublt.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\jnvhfc.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\BM834b42a3.xml (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\clkcnt.txt (Trojan.Vundo) -> Quarantined and deleted successfully.
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 7:15:39 AM, on 7/10/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16674)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Symantec\LiveUpdate\AluSchedulerSvc.exe
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\lxddserv.exe
C:\WINDOWS\system32\lxddcoms.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\Program Files\Lexmark 2500 Series\lxddmon.exe
C:\Program Files\Lexmark 2500 Series\lxddamon.exe
C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe
C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\WINDOWS\system32\sistray.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\Program Files\Flock\flock\flock.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\SoftwareDistribution\Download\Install\windows-kb890830-v2.0-delta.exe
c:\3aa1db0dd83b3e7e2467f3\mrtstub.exe
C:\WINDOWS\system32\MRT.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://securityresponse.symantec.com/avcenter/fix_homepage/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://securityresponse.symantec.com/avcenter/fix_homepage/
O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\PROGRA~1\COMMON~1\SYMANT~1\IDS\IPSBHO.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
O4 - HKLM\..\Run: [SiSPower] Rundll32.exe SiSPower.dll,ModeAgent
O4 - HKLM\..\Run: [osCheck] "C:\Program Files\Norton AntiVirus\osCheck.exe"
O4 - HKLM\..\Run: [lxddmon.exe] "C:\Program Files\Lexmark 2500 Series\lxddmon.exe"
O4 - HKLM\..\Run: [lxddamon] "C:\Program Files\Lexmark 2500 Series\lxddamon.exe"
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe"
O4 - HKLM\..\RunOnce: [SymLnch] "C:\Documents and Settings\Mark Buffaloe\Application Data\Symantec\Layouts\NSW-Norton AntiVirus\15.0\SymAllLanguages\NAVCD_RETAIL\20070826\Support\SymLnch\SymLnch.exe" "C:\Documents and Settings\Mark Buffaloe\Application Data\Symantec\Layouts\NSW-Norton AntiVirus\15.0\SymAllLanguages\NAVCD_RETAIL\20070826\Setup.exe" "/SCANUPREBOOT /temp /patched"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - Global Startup: Utility Tray.lnk = C:\WINDOWS\system32\sistray.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: Express Cleanup - {5E638779-1818-4754-A595-EF1C63B87A56} - C:\Program Files\Norton SystemWorks\Norton Cleanup\WCQuick.lnk (file missing)
O9 - Extra 'Tools' menuitem: Express Cleanup - {5E638779-1818-4754-A595-EF1C63B87A56} - C:\Program Files\Norton SystemWorks\Norton Cleanup\WCQuick.lnk (file missing)
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx1.hotmail.com/mail/w2/resources/MSNPUpld.cab
O20 - AppInit_DLLs: fdpssmsh.dll
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\AluSchedulerSvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\LuComServer_3_4.EXE
O23 - Service: LiveUpdate Notice - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: lxddCATSCustConnectService - Lexmark International, Inc. - C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxddserv.exe
O23 - Service: lxdd_device - - C:\WINDOWS\system32\lxddcoms.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: Symantec Core LC - Unknown owner - C:\PROGRA~1\COMMON~1\SYMANT~1\CCPD-LC\symlcsvc.exe

--
End of file - 6910 bytes
*** Download, and run CTFMON-Remover: http://www.gerhard-schlager.at/en/projects/ctfmonremover/
The CTFMON-Remover helps you removing the annoying CTFMON.EXE from your Windows operating system. The program is easy to use and displays whether the CTFMON.EXE is installed and running or not. If it was found then you can remove it within seconds. Just in case that you need the CTFMON sometime in the future there is also an option to restore the original one.
Note:The CTFMON.EXE is among other things responsible for changing the language schema of your keyboard (e.g. for switching between the German and English keyboard layout). So in case you are using this feature you shouldn't remove or disable the CTFMON.EXE!

*** You need to update Java:
http://java.sun.com/javase/downloads/index.jsp
Java Runtime Environment (JRE) 6 Update 7
Uninstall all previous versions of Java through Add\Remove.

1. Print this post out, since you won't have an access to it, at some point.

2. Close all windows, except for HijackThis.

3. Put a checkmark next to the following HijackThis entries (some entries will be checkmarked to disable UNNECESSARY startups; in those cases [marked with *], no actual program will be removed):

- *O4 - HKLM\..\RunOnce: [SymLnch] "C:\Documents and Settings\Mark Buffaloe\Application Data\Symantec\Layouts\NSW-Norton AntiVirus\15.0\SymAllLanguages\NAVCD_RETAIL\20070826\Support\SymLnch\SymLnch.exe " "C:\Documents and Settings\Mark Buffaloe\Application Data\Symantec\Layouts\NSW-Norton AntiVirus\15.0\SymAllLanguages\NAVCD_RETAIL\20070826\Setup.exe" "/SCANUPREBOOT /temp /patched"
- *O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
- *O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
- *O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
- *O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
- O9 - Extra button: Express Cleanup - {5E638779-1818-4754-A595-EF1C63B87A56} - C:\Program Files\Norton SystemWorks\Norton Cleanup\WCQuick.lnk (file missing)
- O9 - Extra 'Tools' menuitem: Express Cleanup - {5E638779-1818-4754-A595-EF1C63B87A56} - C:\Program Files\Norton SystemWorks\Norton Cleanup\WCQuick.lnk (file missing)
- O20 - AppInit_DLLs: fdpssmsh.dll

4. Click on Fix checked button.

5. Restart computer in Safe Mode (keep tapping F8 key, when your computer starts, until menu appears)

6. Open Windows Explorer. Go Tools>Folder Options>View tab, put a checkmark next to Show hidden files, and folders.

7. Delete following files/folders (if present):

- search your computer for fdpssmsh.dll, and delete all instances

8. Restart in Normal Mode.

9. Post new HijackThis log.



Discussion

No Comment Found