Hijack Log
#16
Posted 13 July 2006 - 05:44 AM
The forum is run by volunteers who donate their time and expertise.
Want to help others? Join the ClassRoom and learn how.
Logs will be closed if you haven't replied within 3 days
If you would like to for the help you received.
Proud graduate of TC/WTT Classroom
Register to Remove
#17
Posted 13 July 2006 - 05:45 AM
The forum is run by volunteers who donate their time and expertise.
Want to help others? Join the ClassRoom and learn how.
Logs will be closed if you haven't replied within 3 days
If you would like to for the help you received.
Proud graduate of TC/WTT Classroom
#18
Posted 13 July 2006 - 08:24 AM
Logfile of HijackThis v1.99.1
Scan saved at 9:20:38 AM, on 7/13/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\System32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\LEXPPS.EXE
C:\Program Files\MUSICMATCH\MUSICMATCH Jukebox\mm_tray.exe
C:\Program Files\MusicMatch\MusicMatch Jukebox\mmtask.exe
C:\Program Files\Lexmark X1100 Series\lxbkbmgr.exe
C:\WINDOWS\System32\hkcmd.exe
C:\WINDOWS\BCMSMMSG.exe
C:\Program Files\Lexmark X1100 Series\lxbkbmon.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Windows\wWinUpdate.exe
C:\Program Files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\Documents and Settings\Aarons\Desktop\ewido anti-spyware 4.0\guard.exe
C:\WINDOWS\System32\tcpsvcs.exe
C:\WINDOWS\System32\snmp.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Aarons\Desktop\HJT.exe.exe
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_07\bin\ssv.dll
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
O4 - HKLM\..\Run: [MMTray] C:\Program Files\MUSICMATCH\MUSICMATCH Jukebox\mm_tray.exe
O4 - HKLM\..\Run: [mmtask] c:\Program Files\MusicMatch\MusicMatch Jukebox\mmtask.exe
O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\mcafee.com\agent\McUpdate.exe
O4 - HKLM\..\Run: [McRegWiz] c:\PROGRA~1\mcafee.com\agent\mcregwiz.exe /autorun
O4 - HKLM\..\Run: [MCAgentExe] c:\PROGRA~1\mcafee.com\agent\mcagent.exe
O4 - HKLM\..\Run: [Lexmark X1100 Series] "C:\Program Files\Lexmark X1100 Series\lxbkbmgr.exe"
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\System32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [BCMSMMSG] BCMSMMSG.exe
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKCU\..\Run: [MoneyAgent] "C:\Program Files\Microsoft Money\System\mnyexpr.exe"
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: QuickBooks Update Agent.lnk = C:\Program Files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_07\bin\ssv.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.micros...b?1151720462859
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - Unknown owner - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
O23 - Service: ewido anti-spyware 4.0 guard - Anti-Malware Development a.s. - C:\Documents and Settings\Aarons\Desktop\ewido anti-spyware 4.0\guard.exe
#19
Posted 13 July 2006 - 09:33 AM
C:\Program Files\Windows\wWinUpdate.exe
The forum is run by volunteers who donate their time and expertise.
Want to help others? Join the ClassRoom and learn how.
Logs will be closed if you haven't replied within 3 days
If you would like to for the help you received.
Proud graduate of TC/WTT Classroom
#20
Posted 13 July 2006 - 10:55 AM
Logfile of HijackThis v1.99.1
Scan saved at 11:46:35 AM, on 7/13/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\System32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\MUSICMATCH\MUSICMATCH Jukebox\mm_tray.exe
C:\Program Files\MusicMatch\MusicMatch Jukebox\mmtask.exe
C:\Program Files\Lexmark X1100 Series\lxbkbmgr.exe
C:\WINDOWS\System32\hkcmd.exe
C:\WINDOWS\BCMSMMSG.exe
C:\Program Files\Lexmark X1100 Series\lxbkbmon.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\Program Files\NetMeeting\wWB32.exe
C:\Documents and Settings\Aarons\Desktop\ewido anti-spyware 4.0\guard.exe
C:\Program Files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
C:\WINDOWS\System32\tcpsvcs.exe
C:\WINDOWS\System32\snmp.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Documents and Settings\Aarons\Desktop\HJT.exe.exe
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_07\bin\ssv.dll
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
O4 - HKLM\..\Run: [MMTray] C:\Program Files\MUSICMATCH\MUSICMATCH Jukebox\mm_tray.exe
O4 - HKLM\..\Run: [mmtask] c:\Program Files\MusicMatch\MusicMatch Jukebox\mmtask.exe
O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\mcafee.com\agent\McUpdate.exe
O4 - HKLM\..\Run: [McRegWiz] c:\PROGRA~1\mcafee.com\agent\mcregwiz.exe /autorun
O4 - HKLM\..\Run: [MCAgentExe] c:\PROGRA~1\mcafee.com\agent\mcagent.exe
O4 - HKLM\..\Run: [Lexmark X1100 Series] "C:\Program Files\Lexmark X1100 Series\lxbkbmgr.exe"
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\System32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [BCMSMMSG] BCMSMMSG.exe
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKCU\..\Run: [MoneyAgent] "C:\Program Files\Microsoft Money\System\mnyexpr.exe"
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: QuickBooks Update Agent.lnk = C:\Program Files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_07\bin\ssv.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.micros...b?1151720462859
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - Unknown owner - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
O23 - Service: ewido anti-spyware 4.0 guard - Anti-Malware Development a.s. - C:\Documents and Settings\Aarons\Desktop\ewido anti-spyware 4.0\guard.exe
#21
Posted 13 July 2006 - 11:18 AM
C:\Program Files\NetMeeting\wWB32.exe
Download the trial version of Spy Sweeper from Here
Install it using the Standard Install option. (You will be asked for your e-mail address, it is safe to give it. If you receive alerts from your firewall, allow all activities for Spy Sweeper)
You will be prompted to check for updated definitions, please do so.
(This may take several minutes)
Click on Options > Sweep Options and check Sweep all Folders on Selected drives. Check Local Disc C. Under What to Sweep, check every box.
Click on Sweep and allow it to fully scan your system.If you are prompted to restart the computer, do so immediately. This is a necessary step to kill the infection!
When the sweep has finished, click Remove. Click Select All and then Next
From 'Results', select the Session Log tab. Click Save to File and save the log somewhere convenient.
Exit Spy Sweeper.
Empty Recycle Bin
Reboot and "copy/paste" a new HJT log as well as the Resullts from Spy Sweeper file into this thread.
Also please describe how your computer behaves at the moment.
The forum is run by volunteers who donate their time and expertise.
Want to help others? Join the ClassRoom and learn how.
Logs will be closed if you haven't replied within 3 days
If you would like to for the help you received.
Proud graduate of TC/WTT Classroom
#22
Posted 13 July 2006 - 06:57 PM
Logfile of HijackThis v1.99.1
Scan saved at 7:39:07 PM, on 7/13/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\System32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\MUSICMATCH\MUSICMATCH Jukebox\mm_tray.exe
C:\Program Files\MusicMatch\MusicMatch Jukebox\mmtask.exe
C:\Program Files\Lexmark X1100 Series\lxbkbmgr.exe
C:\WINDOWS\System32\hkcmd.exe
C:\WINDOWS\BCMSMMSG.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\Lexmark X1100 Series\lxbkbmon.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\Documents and Settings\Aarons\Desktop\ewido anti-spyware 4.0\guard.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\Program Files\Lexmark X1100 Series\lfpdf13n.exe
C:\Program Files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
C:\WINDOWS\System32\tcpsvcs.exe
C:\WINDOWS\System32\snmp.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\Program Files\Webroot\Spy Sweeper\SSU.EXE
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Documents and Settings\Aarons\Desktop\HJT.exe.exe
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_07\bin\ssv.dll
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
O4 - HKLM\..\Run: [MMTray] "C:\Program Files\MUSICMATCH\MUSICMATCH Jukebox\mm_tray.exe"
O4 - HKLM\..\Run: [mmtask] "c:\Program Files\MusicMatch\MusicMatch Jukebox\mmtask.exe"
O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\mcafee.com\agent\McUpdate.exe
O4 - HKLM\..\Run: [McRegWiz] c:\PROGRA~1\mcafee.com\agent\mcregwiz.exe /autorun
O4 - HKLM\..\Run: [MCAgentExe] c:\PROGRA~1\mcafee.com\agent\mcagent.exe
O4 - HKLM\..\Run: [Lexmark X1100 Series] "C:\Program Files\Lexmark X1100 Series\lxbkbmgr.exe"
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\System32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [BCMSMMSG] BCMSMMSG.exe
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exe" /startintray
O4 - HKCU\..\Run: [MoneyAgent] "C:\Program Files\Microsoft Money\System\mnyexpr.exe"
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: QuickBooks Update Agent.lnk = C:\Program Files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_07\bin\ssv.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.micros...b?1151720462859
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O20 - Winlogon Notify: WRNotifier - C:\WINDOWS\SYSTEM32\WRLogonNTF.dll
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - Unknown owner - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
O23 - Service: ewido anti-spyware 4.0 guard - Anti-Malware Development a.s. - C:\Documents and Settings\Aarons\Desktop\ewido anti-spyware 4.0\guard.exe
O23 - Service: Webroot Spy Sweeper Engine (WebrootSpySweeperService) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
4:55 PM: Detected running threat: targetsaver
4:55 PM: Memory Shield: Found: Memory-resident threat targetsaver, version 1.0.0.0
4:51 PM: Deletion from quarantine completed. Elapsed time 00:00:00
4:51 PM: Processing: targetsaver
4:51 PM: Processing: command
4:51 PM: Deletion from quarantine initiated
4:51 PM: IE Tracking Cookies Shield: On
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
4:49 PM: Shield States
4:49 PM: Spyware Definitions: 691
4:47 PM: Spy Sweeper 5.0.5.1286 started
4:27 PM: | End of Session, Thursday, July 13, 2006 |
4:27 PM: Detected running threat: targetsaver
4:27 PM: Memory Shield: Found: Memory-resident threat targetsaver, version 1.0.0.0
4:26 PM: Deletion from quarantine completed. Elapsed time 00:00:05
4:26 PM: Processing: 2o7.net cookie
4:26 PM: Processing: targetsaver
4:26 PM: Processing: targetsaver
4:26 PM: Processing: targetsaver
4:26 PM: Processing: targetsaver
4:26 PM: Processing: targetsaver
4:26 PM: Processing: targetsaver
4:26 PM: Processing: targetsaver
4:26 PM: Processing: targetsaver
4:26 PM: Processing: command
4:26 PM: Processing: spywareno! components
4:26 PM: Processing: winantivirus pro
4:26 PM: Processing: winantivirus pro
4:26 PM: Processing: winantivirus pro
4:26 PM: Processing: winantivirus pro
4:26 PM: Processing: winantivirus pro
4:26 PM: Processing: winantivirus pro
4:26 PM: Processing: winantivirus pro
4:26 PM: Processing: winantivirus pro
4:26 PM: Processing: winantivirus pro
4:26 PM: Processing: winantivirus pro
4:26 PM: Processing: winantivirus pro
4:26 PM: Processing: winantivirus pro
4:26 PM: Processing: findthewebsiteyouneed hijack
4:26 PM: Processing: findthewebsiteyouneed hijack
4:26 PM: Processing: findthewebsiteyouneed hijack
4:26 PM: Processing: findthewebsiteyouneed hijack
4:26 PM: Processing: findthewebsiteyouneed hijack
4:26 PM: Processing: findthewebsiteyouneed hijack
4:26 PM: Processing: zeropopup
4:26 PM: Processing: cws_secure32.html hijack
4:26 PM: Processing: cws_secure32.html hijack
4:26 PM: Processing: cws_secure32.html hijack
4:26 PM: Processing: spysheriff
4:26 PM: Processing: spysheriff
4:26 PM: Processing: spysheriff
4:26 PM: Processing: maxifiles
4:26 PM: Processing: iwantsearch
4:26 PM: Processing: ez-finder toolbar
4:26 PM: Processing: enbrowser
4:26 PM: Processing: enbrowser
4:26 PM: Processing: dollarrevenue
4:26 PM: Processing: trojan-backdoor-msdcom32
4:26 PM: Processing: potentially rootkit-masked files
4:26 PM: Processing: trojan downloader matcash
4:26 PM: Processing: lopdotcom
4:26 PM: Processing: clkoptimizer
4:26 PM: Processing: clkoptimizer
4:26 PM: Processing: spysheriff fakealert
4:26 PM: Processing: trojan-backdoor-goldun
4:26 PM: Deletion from quarantine initiated
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
4:21 PM: Shield States
4:21 PM: Spyware Definitions: 691
4:21 PM: Spy Sweeper 5.0.5.1286 started
2:35 PM: | End of Session, Thursday, July 13, 2006 |
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
2:31 PM: Shield States
2:31 PM: Spyware Definitions: 691
2:30 PM: Spy Sweeper 5.0.5.1286 started
2:30 PM: Spy Sweeper 5.0.5.1286 started
2:30 PM: | Start of Session, Thursday, July 13, 2006 |
********
4:16 PM: Removal process completed. Elapsed time 00:02:06
4:16 PM: Preparing to restart your computer. Please wait...
4:16 PM: Quarantining All Traces: 2o7.net cookie
4:16 PM: Quarantining All Traces: command
4:16 PM: Quarantining All Traces: targetsaver
4:16 PM: Quarantining All Traces: cws_secure32.html hijack
4:16 PM: Quarantining All Traces: spywareno! components
4:16 PM: Quarantining All Traces: winantivirus pro
4:16 PM: Quarantining All Traces: findthewebsiteyouneed hijack
4:16 PM: Quarantining All Traces: ietoolbar
4:16 PM: Quarantining All Traces: zeropopup
4:16 PM: Quarantining All Traces: start4search toolbar
4:15 PM: Quarantining All Traces: maxifiles
4:15 PM: Quarantining All Traces: dollarrevenue
4:15 PM: Quarantining All Traces: enbrowser
4:15 PM: Quarantining All Traces: spysheriff
4:15 PM: Quarantining All Traces: ez-finder toolbar
4:15 PM: Quarantining All Traces: iwantsearch
4:15 PM: c:\windows\system32\pe386.sys is in use. It will be removed on reboot.
4:15 PM: potentially rootkit-masked files is in use. It will be removed on reboot.
4:15 PM: Quarantining All Traces: potentially rootkit-masked files
4:15 PM: Quarantining All Traces: trojan downloader matcash
4:15 PM: Quarantining All Traces: lopdotcom
4:15 PM: Quarantining All Traces: trojan-backdoor-goldun
4:15 PM: Quarantining All Traces: clkoptimizer
4:15 PM: Quarantining All Traces: trojan-backdoor-msdcom32
4:15 PM: Quarantining All Traces: spysheriff fakealert
4:14 PM: Removal process initiated
3:15 PM: The Spy Communication shield has blocked access to: LOP.COM
3:15 PM: The Spy Communication shield has blocked access to: LOP.COM
3:13 PM: The Spy Communication shield has blocked access to: FLOWGO.COM
3:13 PM: The Spy Communication shield has blocked access to: FLOWGO.COM
2:54 PM: Traces Found: 76
2:54 PM: Full Sweep has completed. Elapsed time 00:19:21
2:54 PM: File Sweep Complete, Elapsed Time: 00:13:51
2:52 PM: c:\windows\system32\pe386.sys (ID = 0)
2:52 PM: Found System Monitor: potentially rootkit-masked files
2:52 PM: C:\WINDOWS\QWFyb25z\kqIVvZcW.vbs (ID = 185675)
2:52 PM: Found Adware: command
2:52 PM: Warning: Failed to access drive D:
2:51 PM: Warning: Failed to open file "c:\windows\temp\_avast4_\webshlock.txt". The operation completed successfully
2:50 PM: C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP2\A0000062.exe (ID = 302229)
2:50 PM: C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP2\A0000053.exe (ID = 302229)
2:48 PM: C:\Program Files\ACW\ACWRuntime.exe (ID = 302229)
2:48 PM: C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP3\A0000096.exe (ID = 302229)
2:43 PM: C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP1\A0000038.exe (ID = 302229)
2:42 PM: C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP3\A0000108.exe (ID = 302229)
2:42 PM: C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP3\A0000084.exe (ID = 302229)
2:42 PM: C:\SpySheriff\SpySheriff.lnk (ID = 143527)
2:42 PM: C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP1\A0000019.exe (ID = 302229)
2:42 PM: Found Adware: targetsaver
2:40 PM: C:\Program Files\WinAntiVirus Pro 2006 (1 subtraces) (ID = 2147513780)
2:40 PM: C:\Documents and Settings\All Users\Application Data\WinAntiVirus Pro 2006 (1 subtraces) (ID = 2147513771)
2:40 PM: C:\Program Files\Common Files\InetGet (ID = 2147490114)
2:40 PM: Found Trojan Horse: trojan downloader matcash
2:40 PM: C:\Program Files\ToolBar888 (1 subtraces) (ID = 2147510985)
2:40 PM: Found Adware: maxifiles
2:40 PM: Starting File Sweep
2:40 PM: Warning: Failed to access drive A:
2:40 PM: Cookie Sweep Complete, Elapsed Time: 00:00:01
2:40 PM: c:\documents and settings\aarons\cookies\aarons@2o7[2].txt (ID = 1957)
2:40 PM: Found Spy Cookie: 2o7.net cookie
2:40 PM: Starting Cookie Sweep
2:40 PM: Registry Sweep Complete, Elapsed Time:00:01:23
2:40 PM: HKU\S-1-5-18\software\microsoft\internet explorer\main\ || default_page_url (ID = 946026)
2:40 PM: HKU\S-1-5-18\software\microsoft\internet explorer\main\ || start page (ID = 946023)
2:40 PM: HKU\S-1-5-18\software\microsoft\internet explorer\main\ || local page (ID = 946022)
2:40 PM: Found Adware: cws_secure32.html hijack
2:40 PM: HKU\S-1-5-18\software\microsoft\internet explorer\main\ || default_search_url (ID = 790269)
2:40 PM: HKU\S-1-5-18\software\microsoft\internet explorer\main\ || search bar (ID = 790268)
2:40 PM: HKU\S-1-5-18\software\sno2\ (ID = 782236)
2:40 PM: Found Adware: spywareno! components
2:40 PM: HKU\S-1-5-18\software\system\sysuid\ (ID = 731748)
2:40 PM: HKU\S-1-5-18\software\microsoft\internet explorer\search\searchassistant explorer\main\ || default_search_url (ID = 555437)
2:40 PM: HKU\S-1-5-18\software\spysheriff\ (ID = 142125)
2:40 PM: HKU\S-1-5-18\software\microsoft\windows\currentversion\run\ || spysheriff (ID = 142123)
2:40 PM: HKU\S-1-5-18\software\microsoft\windows\currentversion\run\ || aida (ID = 130496)
2:40 PM: Found Adware: lopdotcom
2:40 PM: HKU\S-1-5-18\software\microsoft\internet explorer\main\ || search page (ID = 125238)
2:40 PM: HKU\S-1-5-18\software\microsoft\internet explorer\main\ || search bar (ID = 125237)
2:40 PM: HKU\S-1-5-18\software\microsoft\internet explorer\main\ || default_search_url (ID = 125236)
2:40 PM: HKU\S-1-5-21-1442216685-1081075486-836707799-1007\software\winantivirus pro 2006\ (ID = 1216147)
2:40 PM: HKU\S-1-5-21-1442216685-1081075486-836707799-1007\software\microsoft\internet explorer\search\searchassistant explorer\main\ || default_search_url (ID = 555437)
2:40 PM: HKLM\system\currentcontrolset\services\se500mdmd\ (ID = 1364102)
2:40 PM: Found Trojan Horse: trojan-backdoor-goldun
2:40 PM: HKLM\software\classes\typelib\{2bc32ef8-bb73-4099-bb2e-0f2951b3e276}\ (ID = 1335986)
2:40 PM: HKLM\software\classes\clsid\{b5141620-c2b2-4d95-9f0f-134d99c87ab0}\ (ID = 1335967)
2:40 PM: HKLM\software\classes\iefwbho.iefw\ (ID = 1335957)
2:40 PM: HKCR\typelib\{2bc32ef8-bb73-4099-bb2e-0f2951b3e276}\ (ID = 1335922)
2:40 PM: HKCR\clsid\{b5141620-c2b2-4d95-9f0f-134d99c87ab0}\ (ID = 1335909)
2:40 PM: HKCR\iefwbho.iefw\ (ID = 1335899)
2:40 PM: HKLM\software\classes\typelib\{367a86a5-d048-4785-86be-4e2706aafdd9}\ (ID = 1216315)
2:40 PM: HKLM\software\classes\typelib\{1234890a-5e6e-4867-8136-ca6f1456b235}\ (ID = 1216305)
2:40 PM: HKLM\software\classes\clsid\{b2a3156e-3332-4b47-af5a-5b121503514f}\ (ID = 1216288)
2:40 PM: HKLM\software\classes\winpgintegrator.ieintegrator\ (ID = 1216231)
2:40 PM: HKLM\software\winantivirus pro 2006\ (ID = 1216196)
2:40 PM: HKCR\typelib\{367a86a5-d048-4785-86be-4e2706aafdd9}\ (ID = 1216126)
2:40 PM: HKCR\typelib\{1234890a-5e6e-4867-8136-ca6f1456b235}\ (ID = 1216116)
2:40 PM: HKCR\clsid\{b2a3156e-3332-4b47-af5a-5b121503514f}\ (ID = 1216099)
2:40 PM: HKCR\winpgintegrator.ieintegrator\ (ID = 1216042)
2:40 PM: HKCR\wap6.pcheck\ (ID = 1216032)
2:40 PM: Found Adware: winantivirus pro
2:40 PM: HKLM\software\microsoft\drsmartload2\ (ID = 1134137)
2:40 PM: Found Adware: dollarrevenue
2:39 PM: HKLM\software\system\sysold\ (ID = 926808)
2:39 PM: Found Adware: enbrowser
2:39 PM: HKLM\software\qstat\ || brr (ID = 877670)
2:39 PM: HKLM\software\qstat\ (ID = 769771)
2:39 PM: Found Adware: clkoptimizer
2:39 PM: HKU\.default\software\microsoft\internet explorer\search\searchassistant explorer\main\ || default_search_url (ID = 555438)
2:39 PM: Found Adware: findthewebsiteyouneed hijack
2:39 PM: HKLM\software\microsoft\windows\currentversion\explorer\sharedtaskscheduler\ || {2c1cd3d7-86ac-4068-93bc-a02304bb8c34} (ID = 510271)
2:39 PM: Found Trojan Horse: trojan-backdoor-msdcom32
2:39 PM: HKLM\software\classes\interface\{95b92d92-8b7d-4a19-a3f1-43113b4dbcaf}\ (ID = 147950)
2:39 PM: HKCR\interface\{95b92d92-8b7d-4a19-a3f1-43113b4dbcaf}\ (ID = 143013)
2:39 PM: HKU\.default\software\spysheriff\ (ID = 142122)
2:39 PM: HKU\.default\software\microsoft\windows\currentversion\run\ || spysheriff (ID = 142121)
2:39 PM: Found Adware: spysheriff
2:39 PM: HKCR\typelib\{5297e905-1dfb-4a9c-9871-a4f95fd58945}\ (ID = 125913)
2:39 PM: Found Adware: ietoolbar
2:39 PM: HKCR\typelib\{5297e905-1dfb-4a9c-9871-a4f95fd58945}\ (ID = 125913)
2:39 PM: HKCR\typelib\{5297e905-1dfb-4a9c-9871-a4f95fd58945}\ (ID = 125913)
2:39 PM: HKCR\typelib\{5297e905-1dfb-4a9c-9871-a4f95fd58945}\ (ID = 125913)
2:39 PM: HKLM\software\classes\typelib\{5297e905-1dfb-4a9c-9871-a4f95fd58945}\ (ID = 125907)
2:39 PM: HKLM\software\classes\typelib\{5297e905-1dfb-4a9c-9871-a4f95fd58945}\ (ID = 125907)
2:39 PM: HKLM\software\classes\typelib\{5297e905-1dfb-4a9c-9871-a4f95fd58945}\ (ID = 125907)
2:39 PM: Found Adware: zeropopup
2:39 PM: HKLM\software\classes\clsid\{0e1230f8-ea50-42a9-983c-d22abc2eed3b}\ (ID = 125905)
2:39 PM: HKLM\software\classes\clsid\{0e1230f8-ea50-42a9-983c-d22abc2eed3b}\ (ID = 125905)
2:39 PM: HKLM\software\classes\clsid\{0e1230f8-ea50-42a9-983c-d22abc2eed3b}\ (ID = 125905)
2:39 PM: HKCR\clsid\{0e1230f8-ea50-42a9-983c-d22abc2eed3b}\ (ID = 125903)
2:39 PM: Found Adware: ez-finder toolbar
2:39 PM: HKCR\clsid\{0e1230f8-ea50-42a9-983c-d22abc2eed3b}\ (ID = 125903)
2:39 PM: Found Adware: start4search toolbar
2:39 PM: HKCR\clsid\{0e1230f8-ea50-42a9-983c-d22abc2eed3b}\ (ID = 125903)
2:39 PM: Found Adware: iwantsearch
2:39 PM: Starting Registry Sweep
2:39 PM: Memory Sweep Complete, Elapsed Time: 00:03:44
2:35 PM: Starting Memory Sweep
2:35 PM: HKU\S-1-5-18\software\microsoft\windows\currentversion\run\ || windows installer (ID = 1247030)
2:35 PM: Found Adware: spysheriff fakealert
2:35 PM: Sweep initiated using definitions version 691
2:35 PM: Spy Sweeper 5.0.5.1286 started
2:35 PM: | Start of Session, Thursday, July 13, 2006 |
********
4:43 PM: Removal process completed. Elapsed time 00:00:35
4:43 PM: Preparing to restart your computer. Please wait...
4:43 PM: Quarantining All Traces: command
4:42 PM: Quarantining All Traces: targetsaver
4:42 PM: Removal process initiated
4:41 PM: Traces Found: 3
4:41 PM: Full Sweep has completed. Elapsed time 00:14:44
4:41 PM: File Sweep Complete, Elapsed Time: 00:11:15
4:41 PM: C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP3\A0000118.vbs (ID = 185675)
4:41 PM: Found Adware: command
4:41 PM: Warning: Failed to access drive D:
4:40 PM: Warning: Failed to open file "c:\windows\temp\_avast4_\webshlock.txt". The operation completed successfully
4:36 PM: C:\Program Files\Lexmark X1100 Series\lfmac13n.exe (ID = 302229)
4:30 PM: Starting File Sweep
4:30 PM: Warning: Failed to access drive A:
4:30 PM: Cookie Sweep Complete, Elapsed Time: 00:00:00
4:30 PM: Starting Cookie Sweep
4:30 PM: Registry Sweep Complete, Elapsed Time:00:00:45
4:29 PM: Starting Registry Sweep
4:29 PM: Memory Sweep Complete, Elapsed Time: 00:02:24
4:27 PM: Detected running threat: C:\Program Files\Lexmark X1100 Series\lfmac13n.exe (ID = 302229)
4:27 PM: Found Adware: targetsaver
4:27 PM: Starting Memory Sweep
4:27 PM: Sweep initiated using definitions version 691
4:27 PM: Spy Sweeper 5.0.5.1286 started
4:27 PM: | Start of Session, Thursday, July 13, 2006 |
********
#23
Posted 13 July 2006 - 07:09 PM
C:\WINDOWS\System32\tcpsvcs.exe
Download SmitfraudFix (by S!Ri) to your Desktop.
http://siri.urz.free...mitfraudFix.zip
Extract all the files to your Destop. A folder named SmitfraudFix will be created on your Desktop.
______________________________
Open the SmitfraudFix folder and double-click smitfraudfix.cmd
Select option #1 - Search by typing 1 and press Enter
This program will scan large amounts of files on your computer for known patterns so please be patient while it works. It will create a file named:
c:\rapport.txt
IMPORTANT: Do NOT run any other options until you are asked to do so!
Note : process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
Please post:
C:\rapport.txt
Edited by LDTate, 13 July 2006 - 07:10 PM.
The forum is run by volunteers who donate their time and expertise.
Want to help others? Join the ClassRoom and learn how.
Logs will be closed if you haven't replied within 3 days
If you would like to for the help you received.
Proud graduate of TC/WTT Classroom
#24
Posted 13 July 2006 - 07:34 PM
#25
Posted 13 July 2006 - 07:38 PM
Running the Clean
Warning: running option #2 on a non infected computer will remove your Desktop background.
Please print out or copy these instructions/tutorial to Notepad as the internet will not be (while in Safe Mode) available to you at certain points of the removal process. Make sure to work through all the Steps in the exact order in which they are listed below. If there's anything that you don't understand, ask your question(s) before moving on with the fixes.
Reboot your computer in Safe Mode.
- If the computer is running, shut down Windows, and then turn off the power.
- Wait 30 seconds, and then turn the computer on.
- Start tapping the F8 key. The Windows Advanced Options Menu appears. If you begin tapping the F8 key too soon, some computers display a "keyboard error" message. To resolve this, restart the computer and try again.
- Ensure that the Safe Mode option is selected.
- Press Enter. The computer then begins to start in Safe mode.
- Login on your usual account.
Open the SmitfraudFix Folder, then double-click smitfraudfix.cmd file to start the tool.
Select option #2 - Clean by typing 2 and press Enter.
Wait for the tool to complete and disk cleanup to finish.
You will be prompted : "Registry cleaning - Do you want to clean the registry ?" answer Yes by typing Y and hit Enter.
The tool will also check if wininet.dll is infected. If a clean version is found, you will be prompted to replace wininet.dll. Answer Yes to the question "Replace infected file ?" by typing Y and hit Enter.
A reboot may be needed to finish the cleaning process, if you computer does not restart automatically please do it yourself manually. Reboot in Safe Mode.
The tool will create a log named rapport.txt in the root of your drive, eg: Local Disk C: or partition where your operating system is installed. Please post that log along with all others requested in your next reply.
______________________________
Clean out your Temporary Internet files. Proceed like this:
- Quit Internet Explorer and quit any instances of Windows Explorer.
- Click Start, click Control Panel, and then double-click Internet Options.
- On the General tab, click Delete Files under Temporary Internet Files.
- In the Delete Files dialog box, tick the Delete all offline content check box , and then click OK.
- On the General tab, click Delete Cookies under Temporary Internet Files, and then click OK.
- Click on the Programs tab then click the Reset Web Settings button. Click Apply then OK.
- Click OK.
Empty the Recycle Bin by right-clicking the Recycle Bin icon on your Desktop, and then clicking Empty Recycle Bin.
______________________________
Close ALL open Windows / Programs / Folders. Please start Ewido, and run a full scan.
- IMPORTANT: Do not open any other windows or
programs while ewido is scanning, it may interfere with the scanning proccess: - Lauch ewido-anti-spyware by double-clicking the icon on your desktop.
- Select the "Scanner" icon at the top and then the "Scan" tab
then click on "Complete System Scan". - ewido will now begin the scanning process, be patient this may take a little
time.
Once the scan is complete do the following: - If you have any infections you will prompted, then select "Apply all
actions" - Next select the "Reports" icon at the top.
- Select the "Save report as" button in the lower left hand of the
screen and save it as a text file on your Desktop (make sure to remember where you saved that file, this is important).
______________________________
Open the SmitfraudFix folder and double-click smitfraudfix.cmd
Select option #3 - Delete Trusted zone by typing 3 and press Enter
Answer Yes to the question "Restore Trusted Zone ?" by typing
Y and hit Enter.
Note, if you use SpywareBlaster and/or IE-SPYAD, it will be necessary to re-install the protection both afford. For SpywareBlaster, run the program and re-protect all items. For IE-SPYAD, run the batch file and reinstall the protection.
______________________________
Please post:
[*]c:\rapport.txt
[*]Ewido log
[*]A new HijackThis log
[/list]Your may need several replies to post the requested logs, otherwise they might get cut off.
The forum is run by volunteers who donate their time and expertise.
Want to help others? Join the ClassRoom and learn how.
Logs will be closed if you haven't replied within 3 days
If you would like to for the help you received.
Proud graduate of TC/WTT Classroom
Register to Remove
#26
Posted 14 July 2006 - 07:10 PM
SmitFraudFix v2.70
Scan done at 18:59:01.65, Fri 07/14/2006
Run from C:\Documents and Settings\Aarons\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
Fix ran in safe mode
»»»»»»»»»»»»»»»»»»»»»»»» Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» Killing process
»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix
GenericRenosFix by S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files
»»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files
»»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning
Registry Cleaning done.
»»»»»»»»»»»»»»»»»»»»»»»» After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» End
---------------------------------------------------------
ewido anti-spyware - Scan Report
---------------------------------------------------------
+ Created at: 7:49:15 PM 7/14/2006
+ Scan result:
C:\Program Files\ErrorKiller\Errors.exe -> Adware.Agent : Cleaned.
C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP5\A0000274.exe -> Adware.Agent : Cleaned.
C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP5\A0000316.exe -> Adware.Agent : Cleaned.
C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP5\A0000336.exe -> Adware.Agent : Cleaned.
C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP5\A0000348.exe -> Adware.Agent : Cleaned.
C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP3\A0000117.dll -> Adware.Softomate : Cleaned.
::Report end
Logfile of HijackThis v1.99.1
Scan saved at 8:06:48 PM, on 7/14/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\System32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\LEXPPS.EXE
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\Documents and Settings\Aarons\Desktop\ewido anti-spyware 4.0\guard.exe
C:\WINDOWS\System32\tcpsvcs.exe
C:\WINDOWS\System32\snmp.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\MUSICMATCH\MUSICMATCH Jukebox\mm_tray.exe
C:\Program Files\MusicMatch\MusicMatch Jukebox\mmtask.exe
C:\Program Files\Lexmark X1100 Series\lxbkbmgr.exe
C:\WINDOWS\System32\hkcmd.exe
C:\WINDOWS\BCMSMMSG.exe
C:\Program Files\Lexmark X1100 Series\lxbkbmon.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\CCleaner\winsys.exe
C:\Program Files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Aarons\Desktop\HJT.exe.exe
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_07\bin\ssv.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
O4 - HKLM\..\Run: [MMTray] "C:\Program Files\MUSICMATCH\MUSICMATCH Jukebox\mm_tray.exe"
O4 - HKLM\..\Run: [mmtask] "c:\Program Files\MusicMatch\MusicMatch Jukebox\mmtask.exe"
O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\mcafee.com\agent\McUpdate.exe
O4 - HKLM\..\Run: [McRegWiz] c:\PROGRA~1\mcafee.com\agent\mcregwiz.exe /autorun
O4 - HKLM\..\Run: [MCAgentExe] c:\PROGRA~1\mcafee.com\agent\mcagent.exe
O4 - HKLM\..\Run: [Lexmark X1100 Series] "C:\Program Files\Lexmark X1100 Series\lxbkbmgr.exe"
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\System32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [BCMSMMSG] BCMSMMSG.exe
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKCU\..\Run: [MoneyAgent] "C:\Program Files\Microsoft Money\System\mnyexpr.exe"
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: QuickBooks Update Agent.lnk = C:\Program Files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_07\bin\ssv.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.micros...b?1151720462859
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O20 - Winlogon Notify: WRNotifier - WRLogonNTF.dll (file missing)
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - Unknown owner - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
O23 - Service: ewido anti-spyware 4.0 guard - Anti-Malware Development a.s. - C:\Documents and Settings\Aarons\Desktop\ewido anti-spyware 4.0\guard.exe
#27
Posted 14 July 2006 - 07:16 PM
Log looks good How is it running any issues?
You need to create a new Clean restore point.
Note: This will remove all previous Restore Points
Turn off System Restore:
On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
Check Turn off System Restore.
Click Apply, and then click OK.
Restart your computer, turn it back on.
On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
Remove the Check Turn off System Restore.
Click Apply, and then click OK.
Double-click My Computer.
Click the Tools menu, and then click Folder Options.
Click the View tab.
Check "Hide file extensions for known file types."
Under the "Hidden files" folder, Uncheck "Show hidden files and folders."
Check "Hide protected operating system files."
Click Apply, and then click OK.
If you dont have these programs I would recommend that you get them. Spywareblaster, Spywareguard. They will add 1000's of sites to your resticted zone and block some hijacks from happening. I also have a FREE FIREWALL and FREE ANTI VIRUS if you need one.
It is critical to have both a firewall and anti virus to protect your system.
Keep your system up to date and run Adaware & Spybot, once a week works, and hopefully you will be ok from here on. Both are available below.
Safe Surfing.
I would also suggest you read this:
So how did I get infected in the first place?
by Tony Klein
The forum is run by volunteers who donate their time and expertise.
Want to help others? Join the ClassRoom and learn how.
Logs will be closed if you haven't replied within 3 days
If you would like to for the help you received.
Proud graduate of TC/WTT Classroom
#28
Posted 15 July 2006 - 09:03 AM
#29
Posted 15 July 2006 - 09:14 AM
The forum is run by volunteers who donate their time and expertise.
Want to help others? Join the ClassRoom and learn how.
Logs will be closed if you haven't replied within 3 days
If you would like to for the help you received.
Proud graduate of TC/WTT Classroom
#30
Posted 15 July 2006 - 09:50 AM
Do not bother contacting us if you are not the topic starter. A valid, working link to the closed topic is required along with the user name used. If the user name does not match the one in the thread linked, the email will be deleted.
Make sure you use proper prevention to keep from having problems occur to your computer in the future.
Coyote's Installed programs for prevention:
http://forums.tomcoy...showtopic=31418
The help you receive here is free. If you wish to show your appreciation, then you may donate to help keep us online.
Visit the CoyoteStore http://TomCoyote.org/coyotestore.php
The forum is run by volunteers who donate their time and expertise.
Want to help others? Join the ClassRoom and learn how.
Logs will be closed if you haven't replied within 3 days
If you would like to for the help you received.
Proud graduate of TC/WTT Classroom
1 user(s) are reading this topic
0 members, 1 guests, 0 anonymous users