Welcome guest. Before posting on our computer help forum, you must register. Click here it's easy and free.

Author Topic: All of my Icons and my tool bar are missing from my desktop "start" is gone(2)  (Read 6967 times)

0 Members and 1 Guest are viewing this topic.

blueeyes127

    Topic Starter


    Greenhorn

    Hi!!! I'm having the exact same problem!!!
    Icons, Toolbar won't load...
    Only way to get around it is like they said ctrl, alt, delete, run new task
    It's rather annoying...
    and i get an userinit error and a rundll.exe error

    Please help...

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 11:02:04 PM, on 7/7/2008
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16640)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Symantec\LiveUpdate\AluSchedulerSvc.exe
    C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\lxddserv.exe
    C:\WINDOWS\system32\lxddcoms.exe
    C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\PROGRA~1\COMMON~1\SYMANT~1\CCPD-LC\symlcsvc.exe
    C:\Program Files\Flock\flock\flock.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\WINDOWS\system32\msiexec.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://securityresponse.symantec.com/avcenter/fix_homepage/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://securityresponse.symantec.com/avcenter/fix_homepage/
    O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\PROGRA~1\COMMON~1\SYMANT~1\IDS\IPSBHO.dll
    O2 - BHO: {c1ae7fc7-b4b9-f878-9134-94e2b184eaf6} - {6fae481b-2e49-4319-878f-9b4b7cf7ea1c} - C:\WINDOWS\system32\kktjxygu.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
    O2 - BHO: (no name) - {9914230F-8C55-45A5-9D8B-599153897A7C} - C:\WINDOWS\system32\iifddbcD.dll (file missing)
    O2 - BHO: (no name) - {A40C6E93-B163-4F6D-B71F-89662A0534A8} - C:\WINDOWS\system32\efcARkkH.dll (file missing)
    O2 - BHO: (no name) - {AC213B6E-001F-40B3-AFDE-DF964289B9E5} - C:\WINDOWS\system32\tuvWqNFw.dll
    O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
    O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
    O4 - HKLM\..\Run: [SoundMAX] "C:\Program Files\Analog Devices\SoundMAX\Smax4.exe" /tray
    O4 - HKLM\..\Run: [SiSPower] Rundll32.exe SiSPower.dll,ModeAgent
    O4 - HKLM\..\Run: [SDTray] "C:\Program Files\Spyware Doctor\SDTrayApp.exe"
    O4 - HKLM\..\Run: [osCheck] "C:\Program Files\Norton AntiVirus\osCheck.exe"
    O4 - HKLM\..\Run: [lxddmon.exe] "C:\Program Files\Lexmark 2500 Series\lxddmon.exe"
    O4 - HKLM\..\Run: [lxddamon] "C:\Program Files\Lexmark 2500 Series\lxddamon.exe"
    O4 - HKLM\..\Run: [Lexmark 1200 Series] "C:\Program Files\Lexmark 1200 Series\lxczbmgr.exe"
    O4 - HKLM\..\Run: [dbar_starter] C:\Documents and Settings\Mark Buffaloe\Application Data\Deskbar_{9B45545C-9B0B-4caf-A30B-F21C4128173D}\starter.exe
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
    O4 - HKLM\..\Run: [BM834b42a3] Rundll32.exe "C:\WINDOWS\system32\ocwecxja.dll",s
    O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
    O4 - HKLM\..\Run: [8078713f] rundll32.exe "C:\WINDOWS\system32\rbqmcwih.dll",b
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe"
    O4 - HKLM\..\RunOnce: [SymLnch] "C:\Documents and Settings\Mark Buffaloe\Application Data\Symantec\Layouts\NSW-Norton AntiVirus\15.0\SymAllLanguages\NAVCD_RETAIL\20070826\Support\SymLnch\SymLnch.exe" "C:\Documents and Settings\Mark Buffaloe\Application Data\Symantec\Layouts\NSW-Norton AntiVirus\15.0\SymAllLanguages\NAVCD_RETAIL\20070826\Setup.exe" "/SCANUPREBOOT /temp /patched"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [WinUpdater] "C:\Program Files\winvi\update.exe" /background
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - Global Startup: Utility Tray.lnk = C:\WINDOWS\system32\sistray.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
    O9 - Extra button: Express Cleanup - {5E638779-1818-4754-A595-EF1C63B87A56} - C:\Program Files\Norton SystemWorks\Norton Cleanup\WCQuick.lnk (file missing)
    O9 - Extra 'Tools' menuitem: Express Cleanup - {5E638779-1818-4754-A595-EF1C63B87A56} - C:\Program Files\Norton SystemWorks\Norton Cleanup\WCQuick.lnk (file missing)
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx1.hotmail.com/mail/w2/resources/MSNPUpld.cab
    O20 - AppInit_DLLs: fdpssmsh.dll
    O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\AluSchedulerSvc.exe
    O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    O23 - Service: LiveUpdate - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\LuComServer_3_4.EXE
    O23 - Service: LiveUpdate Notice - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    O23 - Service: lxddCATSCustConnectService - Lexmark International, Inc. - C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxddserv.exe
    O23 - Service: lxdd_device -   - C:\WINDOWS\system32\lxddcoms.exe
    O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
    O23 - Service: Symantec Core LC - Unknown owner - C:\PROGRA~1\COMMON~1\SYMANT~1\CCPD-LC\symlcsvc.exe

    --
    End of file - 7180 bytes
    « Last Edit: July 07, 2008, 09:09:48 PM by Broni »

    Broni


      Mastermind
    • Kraków my love :)
    • Thanked: 614
      • Computer Help Forum
    • Computer: Specs
    • Experience: Experienced
    • OS: Windows 8
    Next time, start your own topic. I just created it for you, this time.

    Broni


      Mastermind
    • Kraków my love :)
    • Thanked: 614
      • Computer Help Forum
    • Computer: Specs
    • Experience: Experienced
    • OS: Windows 8
    Is your Norton paid for, and up to date, because it doesn't look active to me?

    blueeyes127

      Topic Starter


      Greenhorn

      Yes, we installed it about two months ago and it automatically updates.

      Broni


        Mastermind
      • Kraków my love :)
      • Thanked: 614
        • Computer Help Forum
      • Computer: Specs
      • Experience: Experienced
      • OS: Windows 8
      There is some infection.

      Print these instructions out.

      1. Download SUPERAntiSpyware Free for Home Users:
      http://www.superantispyware.com/

          * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
          * An icon will be created on your desktop. Double-click that icon to launch the program.
          * If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
          * Close SUPERAntiSpyware.

      PHYSICALLY DISCONNECT  FROM THE INTERNET

      Restart computer in Safe Mode.
      To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

          * Open SUPERAntiSpyware.
          * Under "Configuration and Preferences", click the Preferences button.
          * Click the Scanning Control tab.
          * Under Scanner Options make sure the following are checked (leave all others unchecked):
                o Close browsers before scanning.
                o Scan for tracking cookies.
                o Terminate memory threats before quarantining.
          * Click the "Close" button to leave the control center screen.
          * Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
          * On the left, make sure you check C:\Fixed Drive.
          * On the right, under "Complete Scan", choose Perform Complete Scan.
          * Click "Next" to start the scan. Please be patient while it scans your computer.
          * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
          * Make sure everything has a checkmark next to it and click "Next".
          * A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
          * If asked if you want to reboot, click "Yes".
          * To retrieve the removal information after reboot, launch SUPERAntispyware again.
                o Click Preferences, then click the Statistics/Logs tab.
                o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
                o If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
                o Please copy and paste the Scan Log results in your next reply.
          * Click Close to exit the program.
      Post SUPERAntiSpyware log.

      RECONNECT TO THE INTERNET

      RESTART COMPUTER!

      2. Download Malwarebytes' Anti-Malware: http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html to your desktop.

          * Double-click mbam-setup.exe and follow the prompts to install the program.
          * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
          * If an update is found, it will download and install the latest version.
          * Once the program has loaded, select Perform full scan, then click Scan.
          * When the scan is complete, click OK, then Show Results to view the results.
          * Be sure that everything is checked, and click Remove Selected.
          * When completed, a log will open in Notepad.
          * Post the log back here.

      The log can also be found here:
      C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
      Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

      RESTART COMPUTER!

      3. Post new HijackThis log.

      blueeyes127

        Topic Starter


        Greenhorn

        SUPERAntiSpyware log
        « Reply #5 on: July 10, 2008, 10:48:45 AM »
        Going on to step two...


        SUPERAntiSpyware Scan Log
        http://www.superantispyware.com

        Generated 07/09/2008 at 03:08 PM

        Application Version : 4.15.1000

        Core Rules Database Version : 3501
        Trace Rules Database Version: 1492

        Scan type       : Complete Scan
        Total Scan Time : 01:08:49

        Memory items scanned      : 430
        Memory threats detected   : 0
        Registry items scanned    : 4172
        Registry threats detected : 0
        File items scanned        : 37625
        File threats detected     : 77

        Adware.Tracking Cookie
           C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@adbrite[2].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@advertising[4].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@adultfriendfinder[2].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@linksynergy[2].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][2].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@interclick[1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@adnetserver[1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark [email protected]
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@findwhat[1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@serving-sys[3].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@casalemedia[2].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@bluestreak[2].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@antispywaresuite[1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@dealtime[2].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@precisionclick[1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@fastclick[2].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@statcounter[2].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@collective-media[1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@atwola[1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@insightexpressai[2].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@specificclick[1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@tradedoubler[2].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@trafficmp[2].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@tribalfusion[2].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@revsci[1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@sextracker[1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@media6degrees[1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@mediaplex[2].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@atdmt[2].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@hypertracker[1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@questionmarket[2].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@realmedia[2].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@apmebf[1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@antispywaremaster[1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@doubleclick[1].txt
           C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][2].txt

        Adware.Vundo Variant
           C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP12\A0010895.DLL
           C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP12\A0010896.DLL
           C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0013978.DLL
           C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0014046.DLL
           C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0014063.DLL
           C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\AUOCPKIW.DLL.VIR
           C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\RDGVSCNJ.DLL.VIR
           C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\VPWMHASN.DLL.VIR

        Trojan.Dropper/Gen-Packed
           C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP12\A0010901.EXE

        Unclassified.Unknown Origin
           C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0013993.DLL
           C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0013995.DLL
           C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\ENTZHG.DLL.VIR
           C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\GAAKSKWY.DLL.VIR

        Trojan.Unknown Origin
           C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0014050.DLL
           C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\RVGIJKMB.DLL.VIR

        Adware.Vundo-Variant/I
           C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP19\A0017264.DLL
           C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP19\A0017265.DLL
           C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP19\A0017266.DLL

        Trojan.Dropper/Gen-MultiPacked
           C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\BVCTWWEB.DLL.VIR
           C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\HCUYSFKU.DLL.VIR
           C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\KSBPJSYA.DLL.VIR
           C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\MDMBITSN.DLL.VIR
           C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\MJUSEIIJ.DLL.VIR
           C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\NHMJLHBB.DLL.VIR
           C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\NJPNWELS.DLL.VIR
           C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\PYUBDMPT.DLL.VIR
           C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\XXDUGQNI.DLL.VIR

        blueeyes127

          Topic Starter


          Greenhorn

          SUPERAntiSpyware log
          « Reply #6 on: July 10, 2008, 10:49:21 AM »
          SUPERAntiSpyware Scan Log
          http://www.superantispyware.com

          Generated 07/09/2008 at 03:08 PM

          Application Version : 4.15.1000

          Core Rules Database Version : 3501
          Trace Rules Database Version: 1492

          Scan type       : Complete Scan
          Total Scan Time : 01:08:49

          Memory items scanned      : 430
          Memory threats detected   : 0
          Registry items scanned    : 4172
          Registry threats detected : 0
          File items scanned        : 37625
          File threats detected     : 77

          Adware.Tracking Cookie
             C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@adbrite[2].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@advertising[4].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@adultfriendfinder[2].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@linksynergy[2].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][2].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@interclick[1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@adnetserver[1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark [email protected]
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@findwhat[1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@serving-sys[3].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@casalemedia[2].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@bluestreak[2].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@antispywaresuite[1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@dealtime[2].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@precisionclick[1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@fastclick[2].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@statcounter[2].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@collective-media[1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@atwola[1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@insightexpressai[2].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@specificclick[1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@tradedoubler[2].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@trafficmp[2].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@tribalfusion[2].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@revsci[1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@sextracker[1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@media6degrees[1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@mediaplex[2].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@atdmt[2].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@hypertracker[1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@questionmarket[2].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@realmedia[2].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@apmebf[1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@antispywaremaster[1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\mark_buffaloe@doubleclick[1].txt
             C:\Documents and Settings\Mark Buffaloe\Cookies\[email protected][2].txt

          Adware.Vundo Variant
             C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP12\A0010895.DLL
             C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP12\A0010896.DLL
             C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0013978.DLL
             C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0014046.DLL
             C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0014063.DLL
             C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\AUOCPKIW.DLL.VIR
             C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\RDGVSCNJ.DLL.VIR
             C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\VPWMHASN.DLL.VIR

          Trojan.Dropper/Gen-Packed
             C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP12\A0010901.EXE

          Unclassified.Unknown Origin
             C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0013993.DLL
             C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0013995.DLL
             C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\ENTZHG.DLL.VIR
             C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\GAAKSKWY.DLL.VIR

          Trojan.Unknown Origin
             C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0014050.DLL
             C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\RVGIJKMB.DLL.VIR

          Adware.Vundo-Variant/I
             C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP19\A0017264.DLL
             C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP19\A0017265.DLL
             C:\SYSTEM VOLUME INFORMATION\_RESTORE{2BC39B7D-A042-4934-938E-CF559E073197}\RP19\A0017266.DLL

          Trojan.Dropper/Gen-MultiPacked
             C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\BVCTWWEB.DLL.VIR
             C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\HCUYSFKU.DLL.VIR
             C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\KSBPJSYA.DLL.VIR
             C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\MDMBITSN.DLL.VIR
             C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\MJUSEIIJ.DLL.VIR
             C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\NHMJLHBB.DLL.VIR
             C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\NJPNWELS.DLL.VIR
             C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\PYUBDMPT.DLL.VIR
             C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\XXDUGQNI.DLL.VIR

          evilfantasy

          • Malware Removal Specialist
          • Moderator


          • Genius
          • Calm like a bomb
          • Thanked: 493
          • Experience: Experienced
          • OS: Windows 11
          Topics merged, please keep all replies in the same thread.

          Go to Start > Run and type c:\combofix.txt then click OK.

          Post the contents of the log back here.

          Broni


            Mastermind
          • Kraków my love :)
          • Thanked: 614
            • Computer Help Forum
          • Computer: Specs
          • Experience: Experienced
          • OS: Windows 8
          You posted Superantispyware log twice.
          I need Malwarebytes, and HJT logs.

          blueeyes127

            Topic Starter


            Greenhorn

            Malwarebytes anti-malware log
            « Reply #9 on: July 10, 2008, 05:02:15 PM »
            Malwarebytes' Anti-Malware 1.20
            Database version: 937
            Windows 5.1.2600 Service Pack 3

            6:59:02 AM 7/10/2008
            mbam-log-7-10-2008 (06-59-02).txt

            Scan type: Full Scan (C:\|)
            Objects scanned: 70384
            Time elapsed: 36 minute(s), 17 second(s)

            Memory Processes Infected: 0
            Memory Modules Infected: 0
            Registry Keys Infected: 4
            Registry Values Infected: 1
            Registry Data Items Infected: 0
            Folders Infected: 5
            Files Infected: 9

            Memory Processes Infected:
            (No malicious items detected)

            Memory Modules Infected:
            (No malicious items detected)

            Registry Keys Infected:
            HKEY_CURRENT_USER\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
            HKEY_CURRENT_USER\SOFTWARE\DBReg (Adware.SoftMate) -> Quarantined and deleted successfully.
            HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
            HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.

            Registry Values Infected:
            HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Extensions\{59a40ac9-e67d-4155-b31d-4b7330fcd2d6} (Adware.PurityScan) -> Quarantined and deleted successfully.

            Registry Data Items Infected:
            (No malicious items detected)

            Folders Infected:
            C:\WINDOWS\system32\1036a (Trojan.Agent) -> Quarantined and deleted successfully.
            C:\WINDOWS\system32\MUI2 (Trojan.Agent) -> Quarantined and deleted successfully.
            C:\WINDOWS\system32\spoolX (Trojan.Agent) -> Quarantined and deleted successfully.
            C:\WINDOWS\system32\winRem (Trojan.Agent) -> Quarantined and deleted successfully.
            C:\WINDOWS\system32\cdfig (Trojan.Agent) -> Quarantined and deleted successfully.

            Files Infected:
            C:\System Volume Information\_restore{2BC39B7D-A042-4934-938E-CF559E073197}\RP15\A0013899.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
            C:\System Volume Information\_restore{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0013964.dll (Adware.SoftMate) -> Quarantined and deleted successfully.
            C:\System Volume Information\_restore{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0014007.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
            C:\System Volume Information\_restore{2BC39B7D-A042-4934-938E-CF559E073197}\RP16\A0014014.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
            C:\QooBox\Quarantine\C\Program Files\dbar\deskbar.dll.vir (Adware.SoftMate) -> Quarantined and deleted successfully.
            C:\QooBox\Quarantine\C\WINDOWS\system32\icetublt.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
            C:\QooBox\Quarantine\C\WINDOWS\system32\jnvhfc.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
            C:\WINDOWS\BM834b42a3.xml (Trojan.Vundo) -> Quarantined and deleted successfully.
            C:\WINDOWS\system32\clkcnt.txt (Trojan.Vundo) -> Quarantined and deleted successfully.

            blueeyes127

              Topic Starter


              Greenhorn

              HijackThis Log
              « Reply #10 on: July 10, 2008, 05:17:54 PM »
              Logfile of Trend Micro HijackThis v2.0.2
              Scan saved at 7:15:39 AM, on 7/10/2008
              Platform: Windows XP SP3 (WinNT 5.01.2600)
              MSIE: Internet Explorer v7.00 (7.00.6000.16674)
              Boot mode: Normal

              Running processes:
              C:\WINDOWS\System32\smss.exe
              C:\WINDOWS\system32\winlogon.exe
              C:\WINDOWS\system32\services.exe
              C:\WINDOWS\system32\lsass.exe
              C:\WINDOWS\system32\svchost.exe
              C:\WINDOWS\System32\svchost.exe
              C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
              C:\WINDOWS\Explorer.EXE
              C:\WINDOWS\system32\spoolsv.exe
              C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
              C:\Program Files\Symantec\LiveUpdate\AluSchedulerSvc.exe
              C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\lxddserv.exe
              C:\WINDOWS\system32\lxddcoms.exe
              C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
              C:\WINDOWS\system32\svchost.exe
              C:\WINDOWS\system32\wuauclt.exe
              C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
              C:\Program Files\Lexmark 2500 Series\lxddmon.exe
              C:\Program Files\Lexmark 2500 Series\lxddamon.exe
              C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe
              C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe
              C:\WINDOWS\system32\ctfmon.exe
              C:\Program Files\Messenger\msmsgs.exe
              C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
              C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
              C:\WINDOWS\system32\sistray.exe
              C:\WINDOWS\system32\wuauclt.exe
              C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
              C:\Program Files\Flock\flock\flock.exe
              C:\WINDOWS\system32\wuauclt.exe
              C:\WINDOWS\SoftwareDistribution\Download\Install\windows-kb890830-v2.0-delta.exe
              c:\3aa1db0dd83b3e7e2467f3\mrtstub.exe
              C:\WINDOWS\system32\MRT.exe

              R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://securityresponse.symantec.com/avcenter/fix_homepage/
              R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
              R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
              R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
              R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://securityresponse.symantec.com/avcenter/fix_homepage/
              O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\PROGRA~1\COMMON~1\SYMANT~1\IDS\IPSBHO.dll
              O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
              O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
              O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
              O4 - HKLM\..\Run: [SiSPower] Rundll32.exe SiSPower.dll,ModeAgent
              O4 - HKLM\..\Run: [osCheck] "C:\Program Files\Norton AntiVirus\osCheck.exe"
              O4 - HKLM\..\Run: [lxddmon.exe] "C:\Program Files\Lexmark 2500 Series\lxddmon.exe"
              O4 - HKLM\..\Run: [lxddamon] "C:\Program Files\Lexmark 2500 Series\lxddamon.exe"
              O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
              O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
              O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe"
              O4 - HKLM\..\RunOnce: [SymLnch] "C:\Documents and Settings\Mark Buffaloe\Application Data\Symantec\Layouts\NSW-Norton AntiVirus\15.0\SymAllLanguages\NAVCD_RETAIL\20070826\Support\SymLnch\SymLnch.exe" "C:\Documents and Settings\Mark Buffaloe\Application Data\Symantec\Layouts\NSW-Norton AntiVirus\15.0\SymAllLanguages\NAVCD_RETAIL\20070826\Setup.exe" "/SCANUPREBOOT /temp /patched"
              O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
              O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
              O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
              O4 - Global Startup: Utility Tray.lnk = C:\WINDOWS\system32\sistray.exe
              O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
              O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
              O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
              O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
              O9 - Extra button: Express Cleanup - {5E638779-1818-4754-A595-EF1C63B87A56} - C:\Program Files\Norton SystemWorks\Norton Cleanup\WCQuick.lnk (file missing)
              O9 - Extra 'Tools' menuitem: Express Cleanup - {5E638779-1818-4754-A595-EF1C63B87A56} - C:\Program Files\Norton SystemWorks\Norton Cleanup\WCQuick.lnk (file missing)
              O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
              O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
              O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
              O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
              O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx1.hotmail.com/mail/w2/resources/MSNPUpld.cab
              O20 - AppInit_DLLs: fdpssmsh.dll
              O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
              O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
              O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\AluSchedulerSvc.exe
              O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
              O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
              O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
              O23 - Service: LiveUpdate - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\LuComServer_3_4.EXE
              O23 - Service: LiveUpdate Notice - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
              O23 - Service: lxddCATSCustConnectService - Lexmark International, Inc. - C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxddserv.exe
              O23 - Service: lxdd_device -   - C:\WINDOWS\system32\lxddcoms.exe
              O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
              O23 - Service: Symantec Core LC - Unknown owner - C:\PROGRA~1\COMMON~1\SYMANT~1\CCPD-LC\symlcsvc.exe

              --
              End of file - 6910 bytes

              Broni


                Mastermind
              • Kraków my love :)
              • Thanked: 614
                • Computer Help Forum
              • Computer: Specs
              • Experience: Experienced
              • OS: Windows 8
              *** Download, and run  CTFMON-Remover: http://www.gerhard-schlager.at/en/projects/ctfmonremover/
              The CTFMON-Remover helps you removing the annoying CTFMON.EXE from your Windows operating system. The program is easy to use and displays whether the CTFMON.EXE is installed and running or not. If it was found then you can remove it within seconds. Just in case that you need the CTFMON sometime in the future there is also an option to restore the original one.
              Note:The CTFMON.EXE is among other things responsible for changing the language schema of your keyboard (e.g. for switching between the German and English keyboard layout). So in case you are using this feature you shouldn't remove or disable the CTFMON.EXE!

              *** You need to update Java:
              http://java.sun.com/javase/downloads/index.jsp
              Java Runtime Environment (JRE) 6 Update 7
              Uninstall all previous versions of Java through Add\Remove.

              1. Print this post out, since you won't have an access to it, at some point.

              2. Close all windows, except for HijackThis.

              3. Put a checkmark next to the following HijackThis entries (some entries will be checkmarked to disable unnecessary startups; in those cases [marked with *], no actual program will be removed):

              - *O4 - HKLM\..\RunOnce: [SymLnch] "C:\Documents and Settings\Mark Buffaloe\Application Data\Symantec\Layouts\NSW-Norton AntiVirus\15.0\SymAllLanguages\NAVCD_RETAIL\20070826\Support\SymLnch\SymLnch.exe " "C:\Documents and Settings\Mark Buffaloe\Application Data\Symantec\Layouts\NSW-Norton AntiVirus\15.0\SymAllLanguages\NAVCD_RETAIL\20070826\Setup.exe" "/SCANUPREBOOT /temp /patched"
              - *O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
              - *O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
              - *O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
              - *O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
              - O9 - Extra button: Express Cleanup - {5E638779-1818-4754-A595-EF1C63B87A56} - C:\Program Files\Norton SystemWorks\Norton Cleanup\WCQuick.lnk (file missing)
              - O9 - Extra 'Tools' menuitem: Express Cleanup - {5E638779-1818-4754-A595-EF1C63B87A56} - C:\Program Files\Norton SystemWorks\Norton Cleanup\WCQuick.lnk (file missing)
              - O20 - AppInit_DLLs: fdpssmsh.dll


              4. Click on Fix checked button.

              5. Restart computer in Safe Mode (keep tapping F8 key, when your computer starts, until menu appears)

              6. Open Windows Explorer. Go Tools>Folder Options>View tab, put a checkmark next to Show hidden files, and folders.

              7. Delete following files/folders (if present):

              - search your computer for fdpssmsh.dll, and delete all instances

              8. Restart in Normal Mode.

              9. Post new HijackThis log.