[RESOLVED] Trojan Vundo H
Page 1 of 3 123 LastLast
Results 1 to 15 of 37

Thread: [RESOLVED] Trojan Vundo H

  1. #1
    Join Date
    Apr 2009
    Posts
    32

    Resolved [RESOLVED] Trojan Vundo H

    I ran into many popups directing me to sites to clean my computer. These were my first clue to the virus. I had an old version of spyware doctor on my computer so i updated and downloaded the anti-virus (this is a paid version). I also have avg running and have been having problems updating. I also have symantic anti-virus which i have no idea how out of date it is (I was using Avg and forgot about it).

    I have ran Spyware doctor which couldn't remove it. I then downloaded vundo fix which didn't even detect it. Malwarebytes found and fixed most things but told me to reboot and upon rebooting the virus is still there. I downloaded spybot - search and destroy and am trying right now but as i have been reading, i feel it will have no effect. I also have HJT. I have also noticed that what Malwarebytes cleans up in terms of the vundo H virus, reappears a while after and spyware doctor dosen't even detect a single threat.

    I am running a computer i purchased from university last year. It is an IBM Think Pad R60 running windows XP. My internet connection is a motorola surfboard cable modem attached to a belkin wireless router. There is another laptop among other things using the same wireless network.

    Please let me know which logs you need to see. Thank you in advance for any help.

  2. #2
    Join Date
    Dec 2007
    Location
    Daly City, CA
    Posts
    22,550
    First, use Norton Removal Tool: http://service1.symantec.com/Support...05033108162039

    Then....

    Print these instructions out.

    NOTE. If any of the programs listed below refuse to run, try renaming executive file to something else; for instance, rename hijackthis.exe to scanner.exe

    STEP 1. Download SUPERAntiSpyware Free for Home Users:
    http://www.superantispyware.com/

    * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
    * An icon will be created on your desktop. Double-click that icon to launch the program.
    * If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
    * Close SUPERAntiSpyware.

    PHYSICALLY DISCONNECT FROM THE INTERNET

    Restart computer in Safe Mode.
    To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

    * Open SUPERAntiSpyware.
    * Under Configuration and Preferences, click the Preferences button.
    * Under General and Startup tab, make sure, Start SUPERAntiSpyware when Windows starts option is UN-checked.
    * Click the Scanning Control tab.
    * Under Scanner Options make sure the following are checked (leave all others unchecked):
    - Close browsers before scanning.
    - Scan for tracking cookies.
    - Terminate memory threats before quarantining.

    * Click the Close button to leave the control center screen.
    * Back on the main screen, under Scan for Harmful Software click Scan your computer.
    * On the left, make sure you check C:\Fixed Drive.
    * On the right, under Complete Scan, choose Perform Complete Scan.
    * Click Next to start the scan. Please be patient while it scans your computer.
    * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click OK.
    * Make sure everything has a checkmark next to it and click Next.
    * A notification will appear that Quarantine and Removal is Complete. Click OK and then click the Finish button to return to the main menu.
    * If asked if you want to reboot, click Yes.
    * To retrieve the removal information after reboot, launch SUPERAntispyware again.
    - Click Preferences, then click the Statistics/Logs tab.
    - Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    - If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    - Please copy and paste the Scan Log results in your next reply.

    * Click Close to exit the program.
    Post SUPERAntiSpyware log.
    NOTE: Tracking cookies may be omitted from the log.

    RECONNECT TO THE INTERNET

    RESTART COMPUTER!

    STEP 2. Download Malwarebytes' Anti-Malware: http://www.malwarebytes.org/mbam.php to your desktop.
    (Malwarebytes is free to use as a manual scanner. Payment is only required if you wish to have it run and update automatically which is not necessary for our purposes)

    * Double-click mbam-setup.exe and follow the prompts to install the program.
    * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    * If an update is found, it will download and install the latest version.
    * Once the program has loaded, select Perform full scan, then click Scan.
    * When the scan is complete, click OK, then Show Results to view the results.
    * Be sure that everything is checked, and click Remove Selected.
    * When completed, a log will open in Notepad.
    * Post the log back here.

    The log can also be found here:
    C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
    Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

    RESTART COMPUTER!

    STEP 3. Download GMER: http://www.gmer.net/files.php, by clicking on Download EXE button.
    Alternative downloads:
    - http://majorgeeks.com/GMER_d5198.html
    - http://www.softpedia.com/get/Interne...ers/GMER.shtml
    Double click on downloaded .exe file, select Rootkit tab and click the Scan button.
    When scan is completed, click Save button, and save the results as gmer.log
    Warning ! Please, do not select the "Show all" checkbox during the scan.
    Post the log to your next reply.

    RESTART COMPUTER

    STEP 4. Download, install, and run HijackThis:
    http://www.snapfiles.com/get/hijackthis.html
    Post HijackThis log.
    Do NOT attempt to "fix" anything!


    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!

  3. #3
    Join Date
    Apr 2009
    Posts
    32
    Thanks for the help. Here is the SuperAntiSpyware log. I will post the rest as i get through them.

    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 04/22/2009 at 05:31 PM

    Application Version : 4.26.1000

    Core Rules Database Version : 3858
    Trace Rules Database Version: 1810

    Scan type : Complete Scan
    Total Scan Time : 00:48:16

    Memory items scanned : 329
    Memory threats detected : 2
    Registry items scanned : 6362
    Registry threats detected : 13
    File items scanned : 75385
    File threats detected : 33

    Adware.Vundo/Variant
    C:\WINDOWS\SYSTEM32\GAGINISE.DLL
    C:\WINDOWS\SYSTEM32\GAGINISE.DLL
    C:\WINDOWS\SYSTEM32\REZIGUGE.DLL
    C:\WINDOWS\SYSTEM32\REZIGUGE.DLL
    C:\WINDOWS\SYSTEM32\FIYINUVI.DLL
    C:\WINDOWS\SYSTEM32\NAVOYUDE.DLL
    C:\WINDOWS\SYSTEM32\RAPIDADE.DLL
    C:\WINDOWS\SYSTEM32\YAVIPEJE.DLL

    Adware.Vundo Variant
    HKLM\Software\Classes\CLSID\{EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4}
    HKCR\CLSID\{EC43E3FD-5C60-46A6-97D7-E0B85DBDD6C4}
    HKCR\CLSID\{EC43E3FD-5C60-46A6-97D7-E0B85DBDD6C4}\InprocServer32
    HKCR\CLSID\{EC43E3FD-5C60-46A6-97D7-E0B85DBDD6C4}\InprocServer32#ThreadingModel
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler#{EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4}
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad#SSODL
    HKCR\CLSID\{EC43E3FD-5C60-46A6-97D7-E0B85DBDD6C4}
    C:\WINDOWS\SYSTEM32\RUFUPIBA.DLL

    Adware.Tracking Cookie
    C:\Documents and Settings\flivermo\Cookies\flivermo@adopt.specificclick[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@mediatraffic[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@adlegend[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@zedo[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@msnportal.112.2o7[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@ads.pointroll[2].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@247realmedia[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@tradedoubler[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@questionmarket[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@atdmt[2].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@clickbank[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@lynxtrack[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@hypertracker[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@collective-media[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@mediabuys.yourdegree[2].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@realmedia[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@hornymatches[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@tribalfusion[2].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@advertising[1].txt
    statse.webtrendslive.com [ C:\Documents and Settings\LocalService\Application Data\Mozilla\Firefox\Profiles\p46kdvbe.default\cookies.txt ]

    Adware.Vundo Variant/Rel
    HKLM\SOFTWARE\Microsoft\contim
    HKLM\SOFTWARE\Microsoft\contim#SysShell
    HKLM\SOFTWARE\Microsoft\rdfa
    HKLM\SOFTWARE\Microsoft\rdfa#F
    HKLM\SOFTWARE\Microsoft\rdfa#N

    Rogue.Component/Trace
    HKU\S-1-5-21-3117126494-784369001-1145765600-1007\Software\Microsoft\FIAS4057

    Adware.Vundo/Variant-EC
    C:\WINDOWS\SYSTEM32\DOLIVOWA.DLL

    Trace.Known Threat Sources
    C:\Documents and Settings\flivermo\Local Settings\Temporary Internet Files\Content.IE5\DR62ZO3X\indexsg[1].htm
    C:\Documents and Settings\flivermo\Local Settings\Temporary Internet Files\Content.IE5\Z8GTN15C\l.s.bg1z[1].gif
    C:\Documents and Settings\flivermo\Local Settings\Temporary Internet Files\Content.IE5\DR62ZO3X\indexsg[4].htm
    C:\Documents and Settings\flivermo\Local Settings\Temporary Internet Files\Content.IE5\ISMPF3M6\l.s.bg2z[1].gif
    C:\Documents and Settings\flivermo\Local Settings\Temporary Internet Files\Content.I

  4. #4
    Join Date
    Apr 2009
    Posts
    32
    I cut off the last line in that post. Here it is again.

    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 04/22/2009 at 05:31 PM

    Application Version : 4.26.1000

    Core Rules Database Version : 3858
    Trace Rules Database Version: 1810

    Scan type : Complete Scan
    Total Scan Time : 00:48:16

    Memory items scanned : 329
    Memory threats detected : 2
    Registry items scanned : 6362
    Registry threats detected : 13
    File items scanned : 75385
    File threats detected : 33

    Adware.Vundo/Variant
    C:\WINDOWS\SYSTEM32\GAGINISE.DLL
    C:\WINDOWS\SYSTEM32\GAGINISE.DLL
    C:\WINDOWS\SYSTEM32\REZIGUGE.DLL
    C:\WINDOWS\SYSTEM32\REZIGUGE.DLL
    C:\WINDOWS\SYSTEM32\FIYINUVI.DLL
    C:\WINDOWS\SYSTEM32\NAVOYUDE.DLL
    C:\WINDOWS\SYSTEM32\RAPIDADE.DLL
    C:\WINDOWS\SYSTEM32\YAVIPEJE.DLL

    Adware.Vundo Variant
    HKLM\Software\Classes\CLSID\{EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4}
    HKCR\CLSID\{EC43E3FD-5C60-46A6-97D7-E0B85DBDD6C4}
    HKCR\CLSID\{EC43E3FD-5C60-46A6-97D7-E0B85DBDD6C4}\InprocServer32
    HKCR\CLSID\{EC43E3FD-5C60-46A6-97D7-E0B85DBDD6C4}\InprocServer32#ThreadingModel
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler#{EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4}
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad#SSODL
    HKCR\CLSID\{EC43E3FD-5C60-46A6-97D7-E0B85DBDD6C4}
    C:\WINDOWS\SYSTEM32\RUFUPIBA.DLL

    Adware.Tracking Cookie
    C:\Documents and Settings\flivermo\Cookies\flivermo@adopt.specificclick[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@mediatraffic[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@adlegend[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@zedo[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@msnportal.112.2o7[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@ads.pointroll[2].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@247realmedia[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@tradedoubler[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@questionmarket[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@atdmt[2].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@clickbank[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@lynxtrack[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@hypertracker[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@collective-media[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@mediabuys.yourdegree[2].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@realmedia[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@hornymatches[1].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@tribalfusion[2].txt
    C:\Documents and Settings\flivermo\Cookies\flivermo@advertising[1].txt
    statse.webtrendslive.com [ C:\Documents and Settings\LocalService\Application Data\Mozilla\Firefox\Profiles\p46kdvbe.default\cookies.txt ]

    Adware.Vundo Variant/Rel
    HKLM\SOFTWARE\Microsoft\contim
    HKLM\SOFTWARE\Microsoft\contim#SysShell
    HKLM\SOFTWARE\Microsoft\rdfa
    HKLM\SOFTWARE\Microsoft\rdfa#F
    HKLM\SOFTWARE\Microsoft\rdfa#N

    Rogue.Component/Trace
    HKU\S-1-5-21-3117126494-784369001-1145765600-1007\Software\Microsoft\FIAS4057

    Adware.Vundo/Variant-EC
    C:\WINDOWS\SYSTEM32\DOLIVOWA.DLL

    Trace.Known Threat Sources
    C:\Documents and Settings\flivermo\Local Settings\Temporary Internet Files\Content.IE5\DR62ZO3X\indexsg[1].htm
    C:\Documents and Settings\flivermo\Local Settings\Temporary Internet Files\Content.IE5\Z8GTN15C\l.s.bg1z[1].gif
    C:\Documents and Settings\flivermo\Local Settings\Temporary Internet Files\Content.IE5\DR62ZO3X\indexsg[4].htm
    C:\Documents and Settings\flivermo\Local Settings\Temporary Internet Files\Content.IE5\ISMPF3M6\l.s.bg2z[1].gif
    C:\Documents and Settings\flivermo\Local Settings\Temporary Internet Files\Content.IE5\3L0T44QR\favicon[2].ico

  5. #5
    Join Date
    Dec 2007
    Location
    Daly City, CA
    Posts
    22,550

  6. #6
    Join Date
    Apr 2009
    Posts
    32
    Ok, I ran malwarebytes and the log is below. When i tried to run GMER, it went well for a little while but before it could finish i got the blue screen of death but my computer didnt shut down. Only the screen did and the rest froze. Upon restarting, I tried to rename the file and run it but i got the same thing. When the computer restarts, it goes to the setup screen. then when i exit i can restart windows. Any suggestions? Thanks

    Malwarebytes' Anti-Malware 1.36
    Database version: 2028
    Windows 5.1.2600 Service Pack 2

    4/22/2009 7:28:29 PM
    mbam-log-2009-04-22 (19-28-29).txt

    Scan type: Full Scan (C:\|)
    Objects scanned: 156857
    Time elapsed: 52 minute(s), 10 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 1
    Registry Keys Infected: 4
    Registry Values Infected: 5
    Registry Data Items Infected: 2
    Folders Infected: 0
    Files Infected: 4

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    c:\WINDOWS\system32\reziguge.dll (Trojan.Vundo.H) -> Delete on reboot.

    Registry Keys Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{92c860cb-9514-4dd4-913c-960584e987b2} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{92c860cb-9514-4dd4-913c-960584e987b2} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.

    Registry Values Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dekiseneso (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\684152db (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cpm6b726147 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\ssodl (Trojan.Vundo.H) -> Quarantined and deleted successfully.

    Registry Data Items Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\reziguge.dll -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    c:\WINDOWS\system32\reziguge.dll (Trojan.Vundo.H) -> Delete on reboot.
    C:\Documents and Settings\flivermo\Local Settings\Application Data\Mozilla\Firefox\Profiles\vs2bq06n.default\Cache\96490AAAd01 (Rogue.Installer) -> Quarantined and deleted successfully.
    C:\Documents and Settings\flivermo\Local Settings\Temp\7zSA.tmp\Antispyware\SpyCleaner.dll (Rogue.SpyCleaner) -> Quarantined and deleted successfully.
    C:\WINDOWS\Tasks\Antispyware Scheduled Scan.job (Rogue.Antispyware) -> Quarantined and deleted successfully.

  7. #7
    Join Date
    Dec 2007
    Location
    Daly City, CA
    Posts
    22,550
    Please download The Avenger by Swandog46 to your Desktop.
    - Right click on the Avenger.zip folder and select Extract All...
    - Follow the prompts and extract the avenger folder to your desktop

    Double click on avenger.exe.
    Click OK in pop-up window.

    Avenger window will open.

    Click on Execute button.
    Click OK in two consecutive pop-up windows.

    Your computer will re-boot now.

    Upon re-boot, Notepad window will open.
    Select all text, copy it, and paste it into next reply.

    NOTE. If the log doesn't open on reboot, open Avenger again, and go File>Open Log File.

  8. #8
    Join Date
    Apr 2009
    Posts
    32
    Ok, while i was waiting, i tried GMER again and this time got all the way through and as soon as it finished, GMER froze and would not let me save. I downloaded avenger and ran it. the first few tries it wouldn't let me but then i realized that my spyware doctor intelliguard wasn't letting it run so i disabled it and then it ran. Here is the log. Thanks.

    //////////////////////////////////////////
    Avenger Pre-Processor log
    //////////////////////////////////////////

    Platform: Windows XP (build 2600, Service Pack 2)
    Thu Apr 23 00:11:24 2009

    00:11:23: Error: Could not set driver ImagePath.
    Aborting execution! (error 0: the operation completed successfully.)


    //////////////////////////////////////////


    //////////////////////////////////////////
    Avenger Pre-Processor log
    //////////////////////////////////////////

    Platform: Windows XP (build 2600, Service Pack 2)
    Thu Apr 23 00:17:29 2009

    00:17:29: Error: Could not set driver ImagePath.
    Aborting execution! (error 0: the operation completed successfully.)


    //////////////////////////////////////////


    //////////////////////////////////////////
    Avenger Pre-Processor log
    //////////////////////////////////////////

    Platform: Windows XP (build 2600, Service Pack 2)
    Thu Apr 23 00:19:14 2009

    00:19:14: Error: Could not set driver ImagePath.
    Aborting execution! (error 0: the operation completed successfully.)


    //////////////////////////////////////////


    //////////////////////////////////////////
    Avenger Pre-Processor log
    //////////////////////////////////////////

    Platform: Windows XP (build 2600, Service Pack 2)
    Thu Apr 23 00:22:13 2009

    00:22:13: Error: Could not set driver ImagePath.
    Aborting execution! (error 0: the operation completed successfully.)


    //////////////////////////////////////////


    Logfile of The Avenger Version 2.0, (c) by Swandog46
    http://swandog46.geekstogo.com

    Platform: Windows XP

    *******************

    Script file opened successfully.
    Script file read successfully.

    Backups directory opened successfully at C:\Avenger

    *******************

    Beginning to process script file:

    Rootkit scan active.
    No rootkits found!


    Completed script processing.

    *******************

    Finished! Terminate.

  9. #9
    Join Date
    Dec 2007
    Location
    Daly City, CA
    Posts
    22,550
    Proceed to HijackThis log, please.

  10. #10
    Join Date
    Apr 2009
    Posts
    32
    Gmer ran and completed over night but the log file is 2.06 mb of text and i cannot upload it. I made sure the show all was not checked but maybe i made some other mistake? Anyway, if you still want that log let me know what to do. Here is the HJT log.

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 6:55:04 AM, on 4/23/2009
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16827)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\ibmpmsvc.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
    C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\LEXBCES.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\LEXPPS.EXE
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\IPSSVC.EXE
    C:\Program Files\ThinkPad\ConnectUtilities\AcPrfMgrSvc.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
    C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
    C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    c:\WINDOWS\JTrace.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\WINDOWS\SYSTEM32\SPOOL\DRIVERS\W32X86\3\HPZipm12.exe
    C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
    C:\Program Files\Spyware Doctor\pctsAuxs.exe
    C:\Program Files\Spyware Doctor\pctsSvc.exe
    C:\WINDOWS\system32\svchost.exe
    c:\program files\lenovo\system update\suservice.exe
    C:\WINDOWS\System32\TPHDEXLG.EXE
    C:\WINDOWS\system32\TpKmpSVC.exe
    C:\Program Files\IBM ThinkVantage\Client Security Solution\ibmtcsd.exe
    C:\Program Files\IBM ThinkVantage\Rescue and Recovery\rrservice.exe
    C:\Program Files\Common Files\Lenovo\Scheduler\tvtsched.exe
    C:\Program Files\ThinkPad\ConnectUtilities\AcSvc.exe
    C:\Program Files\Windows Media Player\WMPNetwk.exe
    C:\WINDOWS\System32\alg.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\ThinkPad\ConnectUtilities\SvcGuiHlpr.exe
    C:\PROGRA~1\Intel\Wireless\Bin\Dot1XCfg.exe
    C:\WINDOWS\system32\TpScrLk.exe
    C:\PROGRA~1\Lenovo\PkgMgr\HOTKEY\TPHKMGR.exe
    C:\Program Files\Lenovo\PkgMgr\HOTKEY\TPONSCR.exe
    C:\Program Files\Analog Devices\Core\smax4pnp.exe
    C:\Program Files\Lenovo\PkgMgr\HOTKEY_1\TpScrex.exe
    C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\WINDOWS\system32\TpShocks.exe
    C:\WINDOWS\system32\hkcmd.exe
    C:\WINDOWS\system32\igfxpers.exe
    C:\Program Files\Lenovo\AwayTask\AwaySch.EXE
    C:\WINDOWS\system32\rundll32.exe
    C:\Program Files\ThinkPad\ConnectUtilities\ACTray.exe
    C:\Program Files\ThinkPad\ConnectUtilities\ACWLIcon.exe
    C:\PROGRA~1\THINKV~1\PrdCtr\LPMGR.exe
    C:\Program Files\Java\jre6\bin\jusched.exe
    C:\WINDOWS\System32\DLA\DLACTRLW.EXE
    C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe
    C:\PROGRA~1\ThinkPad\UTILIT~1\EzEjMnAp.Exe
    C:\Program Files\IBM ThinkVantage\SafeGuard PrivateDisk\pdservice.exe
    C:\Program Files\Common Files\Lenovo\Scheduler\scheduler_proxy.exe
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\Program Files\Lexmark 4200 Series\lxbmbmgr.exe
    C:\Program Files\Lexmark 4200 Series\lxbmbmon.exe
    C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
    C:\Program Files\Spyware Doctor\pctsTray.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    C:\Program Files\Windows Media Player\WMPNSCFG.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\Digital Line Detect\DLG.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\PIXELA\ImageMixer for HDD Camcorder\IMx3Launcher.exe
    C:\asdf.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    C:\WINDOWS\system32\wbem\wmiprvse.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.acs.nmu.edu/home
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.acs.nmu.edu/home
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\System32\DLA\DLASHX_W.DLL
    O2 - BHO: (no name) - {92c860cb-9514-4dd4-913c-960584e987b2} - C:\WINDOWS\system32\nowotovu.dll (file missing)
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
    O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.1.1309.3572\swg.dll
    O2 - BHO: Google Dictionary Compression sdch - {C84D72FE-E17D-4195-BB24-76C02E2E7C4E} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_219B3E1547538286.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O3 - Toolbar: &Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
    O4 - HKLM\..\Run: [TPKBDLED] C:\WINDOWS\system32\TpScrLk.exe
    O4 - HKLM\..\Run: [TPHOTKEY] C:\PROGRA~1\Lenovo\PkgMgr\HOTKEY\TPHKMGR.exe
    O4 - HKLM\..\Run: [TP4EX] tp4ex.exe
    O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\Core\smax4pnp.exe
    O4 - HKLM\..\Run: [SoundMAX] C:\Program Files\Analog Devices\SoundMAX\Smax4.exe /tray
    O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [TpShocks] TpShocks.exe
    O4 - HKLM\..\Run: [TPKMAPHELPER] C:\Program Files\ThinkPad\Utilities\TpKmapAp.exe -helper
    O4 - HKLM\..\Run: [igfxtray] C:\WINDOWS\system32\igfxtray.exe
    O4 - HKLM\..\Run: [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe
    O4 - HKLM\..\Run: [igfxpers] C:\WINDOWS\system32\igfxpers.exe
    O4 - HKLM\..\Run: [AwaySch] C:\Program Files\Lenovo\AwayTask\AwaySch.EXE
    O4 - HKLM\..\Run: [PWRMGRTR] rundll32 C:\PROGRA~1\ThinkPad\UTILIT~1\PWRMGRTR.DLL,PwrMgrBkGndMonitor
    O4 - HKLM\..\Run: [BLOG] rundll32 C:\PROGRA~1\ThinkPad\UTILIT~1\BatLogEx.DLL,StartBattLog
    O4 - HKLM\..\Run: [ACTray] C:\Program Files\ThinkPad\ConnectUtilities\ACTray.exe
    O4 - HKLM\..\Run: [ACWLIcon] C:\Program Files\ThinkPad\ConnectUtilities\ACWLIcon.exe
    O4 - HKLM\..\Run: [LPManager] C:\PROGRA~1\THINKV~1\PrdCtr\LPMGR.exe
    O4 - HKLM\..\Run: [Backup Reminder] c:\nmutools\backup_reminder.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
    O4 - HKLM\..\Run: [DLA] C:\WINDOWS\System32\DLA\DLACTRLW.EXE
    O4 - HKLM\..\Run: [ISUSPM Startup] C:\PROGRA~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
    O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe" -start
    O4 - HKLM\..\Run: [EZEJMNAP] C:\PROGRA~1\ThinkPad\UTILIT~1\EzEjMnAp.Exe
    O4 - HKLM\..\Run: [PDService.exe] "C:\Program Files\IBM ThinkVantage\SafeGuard PrivateDisk\pdservice.exe"
    O4 - HKLM\..\Run: [TVT Scheduler Proxy] C:\Program Files\Common Files\Lenovo\Scheduler\scheduler_proxy.exe
    O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
    O4 - HKLM\..\Run: [Lexmark 4200 Series] "C:\Program Files\Lexmark 4200 Series\lxbmbmgr.exe"
    O4 - HKLM\..\Run: [FaxCenterServer4_in_1] "C:\Program Files\Lexmark 4200 Series\Fax\fm3032.exe" /s
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
    O4 - HKLM\..\Run: [RCScheduleCheck] C:\Program Files\VCOM\Recovery Commander\RCSCHED.EXE -CHECK
    O4 - HKLM\..\Run: [ISTray] "C:\Program Files\Spyware Doctor\pctsTray.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [dekiseneso] Rundll32.exe "C:\WINDOWS\system32\putamusu.dll",s
    O4 - HKLM\..\Run: [CPM6b726147] Rundll32.exe "c:\windows\system32\reziguge.dll",a
    O4 - HKLM\..\Run: [684152db] rundll32.exe "C:\WINDOWS\system32\rufupiba.dll",b
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
    O4 - HKCU\..\Run: [updateMgr] "C:\Program Files\Adobe\Acrobat 7.0\Reader\AdobeUpdateManager.exe" AcRdB7_0_9 -reboot 1
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-19\..\Run: [dekiseneso] Rundll32.exe "C:\WINDOWS\system32\putamusu.dll",s (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'SYSTEM')
    O4 - HKUS\S-1-5-18\..\RunOnce: [TSClientMSIUninstaller] cmd.exe /C "cscript %systemroot%\Installer\TSClientMsiTrans\tscuinst.vbs" (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'Default user')
    O4 - HKUS\.DEFAULT\..\RunOnce: [TSClientMSIUninstaller] cmd.exe /C "cscript %systemroot%\Installer\TSClientMsiTrans\tscuinst.vbs" (User 'Default user')
    O4 - S-1-5-18 Startup: iWin Desktop Alerts.lnk = C:\Documents and Settings\All Users\Application Data\iWin Games\DesktopAlerts\DesktopAlerts.exe (User 'SYSTEM')
    O4 - .DEFAULT Startup: iWin Desktop Alerts.lnk = C:\Documents and Settings\All Users\Application Data\iWin Games\DesktopAlerts\DesktopAlerts.exe (User 'Default user')
    O4 - Startup: iWin Desktop Alerts.lnk = C:\Documents and Settings\All Users\Application Data\iWin Games\DesktopAlerts\DesktopAlerts.exe
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    O4 - Global Startup: Digital Line Detect.lnk = ?
    O4 - Global Startup: ImageMixer for HDD Camcorder.lnk = ?
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: Software Installer - {D1A4DEBD-C2EE-449f-B9FB-E8409F9A0BC5} - C:\Program Files\Lenovo\PkgMgr\PkgMgr.exe
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {149E45D8-163E-4189-86FC-45022AB2B6C9} (SpinTop DRM Control) - file:///C:/Program%20Files/Monopoly/Images/stg_drm.ocx
    O16 - DPF: {615F158E-D5CA-422F-A8E7-F6A5EED7063B} (Bejeweled Control) - http://www.worldwinner.com/games/v46.../bejeweled.cab
    O16 - DPF: {8A94C905-FF9D-43B6-8708-F0F22D22B1CB} (Wwlaunch Control) - http://www.worldwinner.com/games/shared/wwlaunch.cab
    O16 - DPF: {CAFECAFE-0013-0001-0018-ABCDEFABCDEF} (JInitiator 1.3.1.18) -
    O16 - DPF: {CC450D71-CC90-424C-8638-1F2DBAC87A54} (ArmHelper Control) - file:///C:/Program%20Files/Monopoly/Images/armhelper.ocx
    O16 - DPF: {CF969D51-F764-4FBF-9E90-475248601C8A} (FamilyFeud Control) - http://www.worldwinner.com/games/v47...familyfeud.cab
    O16 - DPF: {D30CA0FD-1CA0-11D4-AC78-006008A9A8BC} (WebBasedClientInstall Class) - http://liveupdate.nmu.edu/savceinstall/webinst.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{F79977B4-10F5-4DE5-80A9-72A351753C1C}: NameServer = 198.110.200.10,198.110.192.40
    O20 - AppInit_DLLs: C:\WINDOWS\system32\gaginise.dll
    O20 - Winlogon Notify: ACNotify - ACNotify.dll (file missing)
    O20 - Winlogon Notify: AwayNotify - C:\Program Files\Lenovo\AwayTask\AwayNotify.dll
    O23 - Service: Ac Profile Manager Service (AcPrfMgrSvc) - Unknown owner - C:\Program Files\ThinkPad\ConnectUtilities\AcPrfMgrSvc.exe
    O23 - Service: Access Connections Main Service (AcSvc) - Lenovo - C:\Program Files\ThinkPad\ConnectUtilities\AcSvc.exe
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
    O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: Intel(R) PROSet/Wireless Event Log (EvtEng) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: ThinkPad PM Service (IBMPMSVC) - Unknown owner - C:\WINDOWS\system32\ibmpmsvc.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: IPS Core Service (IPSSVC) - Lenovo Group Limited - C:\WINDOWS\system32\IPSSVC.EXE
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: System Profile Monitor (JTrace) - Northern Michigan University - c:\WINDOWS\JTrace.exe
    O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\SYSTEM32\SPOOL\DRIVERS\W32X86\3\HPZipm12.exe
    O23 - Service: IBM PSA Access Driver Control (PsaSrv) - Unknown owner - C:\WINDOWS\system32\PsaSrv.exe
    O23 - Service: Intel(R) PROSet/Wireless Registry Service (RegSrvc) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
    O23 - Service: Intel(R) PROSet/Wireless Service (S24EventMonitor) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
    O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
    O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
    O23 - Service: System Update (SUService) - - c:\program files\lenovo\system update\suservice.exe
    O23 - Service: ThinkPad HDD APS Logging Service (TPHDEXLGSVC) - Lenovo. - C:\WINDOWS\System32\TPHDEXLG.EXE
    O23 - Service: IBM KCU Service (TpKmpSVC) - Unknown owner - C:\WINDOWS\system32\TpKmpSVC.exe
    O23 - Service: TSS Core Service (TSSCoreService) - IBM - C:\Program Files\IBM ThinkVantage\Client Security Solution\ibmtcsd.exe
    O23 - Service: TVT Backup Service - Unknown owner - C:\Program Files\IBM ThinkVantage\Rescue and Recovery\rrservice.exe
    O23 - Service: TVT Scheduler - Lenovo Group Limited - C:\Program Files\Common Files\Lenovo\Scheduler\tvtsched.exe

    --
    End of file - 16407 bytes

  11. #11
    Join Date
    Dec 2007
    Location
    Daly City, CA
    Posts
    22,550
    Don't worry about GMER for now.
    There is still a lot of infection.
    One of the reasons, you don't have any working antivirus program.
    AVG 7.5, you're running is no longer supported.
    You need to uninstall it, and install one of these:

    - Avast! free antivirus: http://www.avast.com/eng/download-avast-home.html
    - Avira free antivirus: http://www.free-av.com/en/download/index.html

    - free PC Tools Firewall Plus: http://www.pctools.com/firewall/

    - free Comodo Internet Security (firewall + AV): http://www.personalfirewall.comodo.com/

    If you decide to install Avast, or Avira, make sure, Windows firewall is turned on, or use PC Tools Firewall Plus.
    If you decide to install Comodo, make sure, Windows firewall is turned off.

    IMPORTANT! Make sure, you use only ONE antivirus, and ONE firewall.

    After installation, update the program, run full scan.

    When done, re-run Superantispyware, Malwarebytes, and HJT.
    Post all three logs.

  12. #12
    Join Date
    Apr 2009
    Posts
    32
    I have Pc tools spyware doctor with anti-virus but i disabled all the intelliguard features to run the avenger and havent yet turned it back on. Does that make any difference or should I still use one of those programs. I am deleting AVG now.

  13. #13
    Join Date
    Dec 2007
    Location
    Daly City, CA
    Posts
    22,550
    If you have this: http://www.pctools.com/spyware-doctor-antivirus/, you're fine then.

    When done with AVG....

    Please download ComboFix from Here or Here to your Desktop.

    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
    1. Please, never rename Combofix unless instructed.
    2. Close any open browsers.
    3. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
      • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
      • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

      • Close any open browsers.
      • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
      • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
      • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
    4. Double click on combofix.exe & follow the prompts.
    5. When finished, it will produce a report for you.
    6. Please post the "C:\ComboFix.txt" along with a new HijackThis log for further review.

    **Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

  14. #14
    Join Date
    Apr 2009
    Posts
    32
    ok combofix still says its preparing to run. I disabled everything i could possibly think of from that list plus windows firewall and the only time i clicked was when i got combofix'es disclaimer. Its been like this for 20 mins. is it froze or does it take a really long time? can i close it out and try again?

  15. #15
    Join Date
    Apr 2009
    Posts
    32
    I also closed firefox - i am using a different computer to reply

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •