Hi DaniWeb miracle workers! Hope all is well with you.
I was wondering if someone would be so kind to help me out with this.
My desktop at home has gotten slower and slower so I came once again to Daniweb to try to figure out the problem.
I followed PhillliePhan's procedure, except for the Deckard's System Scanner, which has a comment saying to skip and follow the remainder of the procedure. Deckard's is currently unavailable.
I am posting the Malwarebyte AntiMalware log and the ESET Online Scanner Log. (I can't submit the Deckard's log nor the Hijack Uninstall list because these weren't used, according to PhilliPhan's procedure). Here they are:
Note: When I ran Malwarebyte's Antimalware and removed the selected infected items, I got a notice saying that a few items were not able to be removed.
Malwarebytes' Anti-Malware 1.34
Database version: 1814
Windows 5.1.2600 Service Pack 2
3/3/2009 3:25:23 AM
mbam-log-2009-03-03 (03-25-23).txt
Scan type: Full Scan (C:\|D:\|)
Objects scanned: 144033
Time elapsed: 5 hour(s), 56 minute(s), 32 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 2
Registry Keys Infected: 16
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 18
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
D:\WINDOWS\system32\fxjjtlhq.dll (Trojan.Vundo.H) -> Delete on reboot.
D:\WINDOWS\system32\arwehdx.dll (Trojan.Vundo.H) -> Delete on reboot.
Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0ade9f68-2b65-4f0d-9b33-e070d1b5e128} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\muzbeqhn (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{0ade9f68-2b65-4f0d-9b33-e070d1b5e128} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0786af62-346a-4384-9ef2-c7c50ea4d7df} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0786af62-346a-4384-9ef2-c7c50ea4d7df} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{0786af62-346a-4384-9ef2-c7c50ea4d7df} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{2b96d5cc-c5b5-49a5-a69d-cc0a30f9028c} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{dd140a75-b643-4124-97c5-82ba9de5ee99} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\glayrbbs (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\glayrbbs (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\glayrbbs (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{0ade9f68-2b65-4f0d-9b33-e070d1b5e128} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\aldd (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Trojan.Vundo) -> Quarantined and deleted successfully.
Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\searchindexer (Trojan.Vundo.H) -> Quarantined and deleted successfully.
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
D:\WINDOWS\system32\LocalService32 (Worm.P2P) -> Quarantined and deleted successfully.
Files Infected:
d:\WINDOWS\system32\arwehdx.dll (Trojan.Vundo.H) -> Delete on reboot.
D:\WINDOWS\system32\isnaismi.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\imsiansi.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\fxjjtlhq.dll (Trojan.Vundo.H) -> Delete on reboot.
D:\WINDOWS\system32\cwywrgb.dll (Trojan.Vundo.H) -> Delete on reboot.
D:\WINDOWS\system32\LocalService32\39.music.mp3 (Worm.P2P) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\LocalService32\39.music.mp3.kwd (Worm.P2P) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\LocalService32\41.crack.zip.kwd (Worm.P2P) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\LocalService32\42.keymaker.zip.kwd (Worm.P2P) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\LocalService32\43.setup.zip.kwd (Worm.P2P) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\LocalService32\44.unpack.zip.kwd (Worm.P2P) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\LocalService32\45.keygen.zip.kwd (Worm.P2P) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\LocalService32\46.serial.zip.kwd (Worm.P2P) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\LocalService32\47.music.snd (Worm.P2P) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\LocalService32\47.music.snd.kwd (Worm.P2P) -> Quarantined and deleted successfully.
D:\WINDOWS\cookies.ini (Malware.Trace) -> Quarantined and deleted successfully.
D:\WINDOWS\smdat32a.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\smdat32m.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
# version=4
# OnlineScanner.ocx=1.0.0.635
# OnlineScannerDLLA.dll=1, 0, 0, 79
# OnlineScannerDLLW.dll=1, 0, 0, 78
# OnlineScannerUninstaller.exe=1, 0, 0, 49
# vers_standard_module=3905 (20090303)
# vers_arch_module=1.064 (20080214)
# vers_adv_heur_module=1.066 (20070917)
# EOSSerial=91acc07dd563c449a33cde4da64df410
# end=finished
# remove_checked=false
# unwanted_checked=true
# utc_time=2009-03-03 11:46:35
# local_time=2009-03-03 06:46:35 (-0500, SA Pacific Standard Time)
# country="United States"
# osver=5.1.2600 NT Service Pack 2
# scanned=266650
# found=17
# scan_time=20242
C:\Documents and Settings\Algis\Configuración local\Temp\p3s39.tmp probably unknown NewHeur_PE virus 00000000000000000000000000000000
C:\Documents and Settings\Algis\Configuración local\Temp\p3s39.tmp »ZIP »tcp.exe probably unknown NewHeur_PE virus 00000000000000000000000000000000
C:\Documents and Settings\Algis\Configuración local\Temp\p3s3B.tmp probably unknown NewHeur_PE virus 00000000000000000000000000000000
C:\Documents and Settings\Algis\Configuración local\Temp\p3s3B.tmp »ZIP »WINSYSTEM.exe probably unknown NewHeur_PE virus 00000000000000000000000000000000
C:\Documents and Settings\Algis\Configuración local\Temp\p3s6.tmp probably unknown NewHeur_PE virus 00000000000000000000000000000000
C:\Documents and Settings\Algis\Configuración local\Temp\p3s6.tmp »ZIP »tcp.exe probably unknown NewHeur_PE virus 00000000000000000000000000000000
C:\Documents and Settings\Algis\Configuración local\Temp\p3s7.tmp probably unknown NewHeur_PE virus 00000000000000000000000000000000
C:\Documents and Settings\Algis\Configuración local\Temp\p3s7.tmp »ZIP »tcp.exe probably unknown NewHeur_PE virus 00000000000000000000000000000000
C:\Documents and Settings\Algis\Configuración local\Temp\tcp.exe probably unknown NewHeur_PE virus 00000000000000000000000000000000
C:\WINDOWS\system32\resetservice.exe Win32/VB.NUB trojan 8EC4FB27BE7465BFA35F0649DD7F775C
D:\Documents and Settings\Algis\My Documents\LimeWire\Incomplete\T-3545427-esa muchachita.mp3 a variant of WMA/TrojanDownloader.GetCodec.gen trojan DA74DCC9E10DC27928352BA57535BEAD
D:\Documents and Settings\Algis\My Documents\LimeWire\Incomplete\T-3545427-ines gaviria hoy (256k 44800).mp3 a variant of WMA/TrojanDownloader.GetCodec.gen trojan 2427C66950C96F33932B551FACDB6578
D:\Documents and Settings\Algis\My Documents\LimeWire\Incomplete\T-5088466-ines gaviria hoy(192k 44100 stereo).snd a variant of WMA/TrojanDownloader.GetCodec.gen trojan 4AAFDA936E4F6AF42A22DFB14B93D228
D:\Documents and Settings\Algis\My Documents\LimeWire\Saved\esa muchachita.mp3 a variant of WMA/TrojanDownloader.GetCodec.gen trojan 9CE3862437269C76E8BB40BF89ECBF7D
D:\Documents and Settings\Algis\My Documents\LimeWire\Saved\hoy ines gaviria.mp3 a variant of WMA/TrojanDownloader.GetCodec.gen trojan AD18E893F4BD5358B616BDC87D0A0A64
D:\Documents and Settings\Algis\My Documents\LimeWire\Saved\ines gaviria hoy-HQ.mp3 a variant of WMA/TrojanDownloader.GetCodec.gen trojan 99D47E9E5F734FA2BD430689219CF205
D:\Documents and Settings\Algis\My Documents\LimeWire\Saved\mauricio y palo de agua esa [cd rip].mp3 a variant of WMA/TrojanDownloader.GetCodec.gen trojan 0C6DCEA8A74AB98D9FF36882ED310CAD
Eagerly and gratefully looking forward to hearing from you.
Thank you!
Algis