Jump to content

Build Theme!
  •  
  • Infected?

WE'RE SURE THAT YOU'LL LOVE US!

Hey there! :wub: Looks like you're enjoying the discussion, but you're not signed up for an account. When you create an account, we remember exactly what you've read, so you always come right back where you left off. You also get notifications, here and via email, whenever new posts are made. You can like posts to share the love. :D Join 93099 other members! Anybody can ask, anybody can answer. Consistently helpful members may be invited to become staff. Here's how it works. Virus cleanup? Start here -> Malware Removal Forum.

Try What the Tech -- It's free!


Photo

Baseline hijack this + spywarequakre removal


  • This topic is locked This topic is locked
7 replies to this topic

#1 cwjdmitr

cwjdmitr

    New Member

  • New Member
  • Pip
  • 5 posts

Posted 20 April 2006 - 06:26 AM

Hi I had an out break of spywareQuake, and a couple of other nasty things happen a day or so ago, a college of mine stumbled across this site and I followed the instructions on how to clean my system of SpywareQuake, before finding the site, I ran sybot search and destroy and also adware se, both with the latest defs.

Here are the logs I was asked to put up

rapport.txt

SmitFraudFix v2.33b

Scan done at 12:12:56.19, 20/04/2006
Run from C:\SmitfraudFix\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600]

»»»»»»»»»»»»»»»»»»»»»»»» Killing process


»»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files

C:\WINDOWS\system32\hp????.tmp Deleted
C:\WINDOWS\system32\ld????.tmp Deleted
C:\WINDOWS\system32\ncompat.tlb Deleted
C:\WINDOWS\system32\ot.ico Deleted
C:\WINDOWS\system32\xenadot.dll Deleted
C:\WINDOWS\system32\1024\ Deleted

»»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


»»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

Registry Cleaning done.

»»»»»»»»»»»»»»»»»»»»»»»» End

ewido log

---------------------------------------------------------
ewido anti-malware - Scan report
---------------------------------------------------------

+ Created on: 13:10:23, 20/04/2006
+ Report-Checksum: CA609096

+ Scan result:

:mozilla.9:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Adviva : Cleaned with backup
:mozilla.16:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Googleadservices : Cleaned with backup
:mozilla.17:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Tradedoubler : Cleaned with backup
:mozilla.26:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Mediaplex : Cleaned with backup
:mozilla.27:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Serving-sys : Cleaned with backup
:mozilla.48:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Euroclick : Cleaned with backup
:mozilla.49:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Euroclick : Cleaned with backup
:mozilla.50:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Euroclick : Cleaned with backup
:mozilla.51:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Euroclick : Cleaned with backup
:mozilla.53:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Pointroll : Cleaned with backup
:mozilla.54:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Pointroll : Cleaned with backup
:mozilla.55:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Pointroll : Cleaned with backup
:mozilla.56:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Pointroll : Cleaned with backup
:mozilla.57:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Pointroll : Cleaned with backup
:mozilla.58:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Adtech : Cleaned with backup
:mozilla.59:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Adtech : Cleaned with backup
:mozilla.64:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup
:mozilla.89:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Casalemedia : Cleaned with backup
:mozilla.93:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Clickbank : Cleaned with backup
:mozilla.217:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Revenue : Cleaned with backup
:mozilla.242:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Tacoda : Cleaned with backup
:mozilla.258:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Tribalfusion : Cleaned with backup
:mozilla.275:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Valueclick : Cleaned with backup
:mozilla.304:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Adserver : Cleaned with backup
:mozilla.305:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Zedo : Cleaned with backup
:mozilla.306:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Zedo : Cleaned with backup
:mozilla.314:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup
:mozilla.315:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup
:mozilla.316:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup
:mozilla.317:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup
:mozilla.318:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup
:mozilla.354:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Liveperson : Cleaned with backup
:mozilla.355:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Liveperson : Cleaned with backup
:mozilla.360:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Liveperson : Cleaned with backup
:mozilla.361:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Liveperson : Cleaned with backup
:mozilla.404:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Googleadservices : Cleaned with backup
:mozilla.405:C:\Documents and Settings\ianp\Application Data\Mozilla\Firefox\Profiles\q7mbs5et.default\cookies.txt -> TrackingCookie.Googleadservices : Cleaned with backup
C:\Utils\vnc-3.3.3r9_x86_win32.exe/vnc_x86_win32/vncviewer/vncviewer.exe -> Not-A-Virus.RemoteAdmin.Win32.WinVNC.333 : Error during cleaning
D:\Utils\vnc-3.3.3r9_x86_win32.exe/vnc_x86_win32/vncviewer/vncviewer.exe -> Not-A-Virus.RemoteAdmin.Win32.WinVNC.333 : Error during cleaning
D:\ZipFiles\southpm2.zip/southpm2.exe -> Hijacker.StartPage.oz : Error during cleaning
D:\ZipFiles\vnc-3.3.3r9_x86_win32.exe/vnc_x86_win32/vncviewer/vncviewer.exe -> Not-A-Virus.RemoteAdmin.Win32.WinVNC.333 : Error during cleaning


::Report End

and the hijack this log

Logfile of HijackThis v1.99.1
Scan saved at 13:16:21, on 20/04/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Program Files\ewido anti-malware\ewidoctrl.exe
C:\Program Files\ewido anti-malware\ewidoguard.exe
C:\PROGRA~1\Iomega\System32\AppServices.exe
C:\Program Files\MySQL\MySQL Server 4.1\bin\mysqld-nt.exe
C:\Program Files\Symantec AntiVirus\SavRoam.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\Program Files\Microsoft Office\Office\OUTLOOK.EXE
C:\Program Files\Common Files\System\MAPI\1033\nt\MAPISP32.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\ianp\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://intranet
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://intranet
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by Würth UK Ltd
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = 10.23.1.253:8080
O3 - Toolbar: &Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\COMPAN~1\Installs\cpn\ycomp5_3_12_0.dll (file missing)
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKLM\..\Run: [SpybotSnD] "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe" /autocheck
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - Global Startup: Adobe Reader Speed Launch.lnk.disabled
O4 - Global Startup: Microsoft Office.lnk.disabled
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\inetrepl.dll
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\inetrepl.dll
O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\inetrepl.dll
O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0527.dll
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0527.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://intranet
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupd...b?1106316842343
O16 - DPF: {CAFEEFAC-0015-0000-0004-ABCDEFFEDCBA} (Java Plug-in 1.5.0_04) -
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = Wurth.UK.local
O17 - HKLM\Software\..\Telephony: DomainName = Wurth.UK.local
O17 - HKLM\System\CCS\Services\Tcpip\..\{5C95DCA6-7858-42A4-97DC-34503CFACA93}: NameServer = 10.23.100.25,10.23.100.11
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = Wurth.UK.local
O17 - HKLM\System\CS1\Services\Tcpip\..\{5C95DCA6-7858-42A4-97DC-34503CFACA93}: NameServer = 10.23.100.25,10.23.100.11
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = Wurth.UK.local
O17 - HKLM\System\CS2\Services\Tcpip\..\{5C95DCA6-7858-42A4-97DC-34503CFACA93}: NameServer = 10.23.100.25,10.23.100.11
O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido anti-malware\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido anti-malware\ewidoguard.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Iomega App Services - Iomega Corporation - C:\PROGRA~1\Iomega\System32\AppServices.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: MySQL - Unknown owner - C:\Program.exe (file missing)
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - %ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini (file missing)
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
O23 - Service: VNC Server Version 4 (WinVNC4) - Unknown owner - C:\Program Files\RealVNC\VNC4\WinVNC4.exe" -service (file missing)


Is there anything else I need to do to get my system clean?

Thanking you in advance

Ian

    Advertisements

Register to Remove


#2 cwjdmitr

cwjdmitr

    New Member

  • New Member
  • Pip
  • 5 posts

Posted 24 April 2006 - 02:14 AM

bump

#3 LDTate

LDTate

    Grand Poobah

  • Root Admin
  • 57,211 posts

Posted 24 April 2006 - 05:43 PM

Hello cwjdmitr, welcome to the TC forums

Log looks pretty good.

Please download ATF Cleaner by Atribune.
Download - ATF Cleaner»
This program is for XP and Windows 2000 only
Double-click ATF-Cleaner.exe to run the program.
Under Main choose: Select All
Click the Empty Selected button.

Reboot and "copy/paste" a new HijackThis log file into this thread.

Also please describe how your computer behaves at the moment.

The forum is run by volunteers who donate their time and expertise.

Want to help others? Join the ClassRoom and learn how.

Logs will be closed if you haven't replied within 3 days

 

If you would like to paypal.gif for the help you received.
 

Proud graduate of TC/WTT Classroom

 


#4 cwjdmitr

cwjdmitr

    New Member

  • New Member
  • Pip
  • 5 posts

Posted 25 April 2006 - 12:30 AM

Here is the new hijack this log, after downloading and running the AFT cleaner and then rebooting.

Logfile of HijackThis v1.99.1
Scan saved at 07:30:59, on 25/04/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Program Files\ewido anti-malware\ewidoctrl.exe
C:\PROGRA~1\Iomega\System32\AppServices.exe
C:\Program Files\MySQL\MySQL Server 4.1\bin\mysqld-nt.exe
C:\Program Files\Symantec AntiVirus\SavRoam.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Documents and Settings\ianp\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://intranet
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://intranet
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by Würth UK Ltd
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = 10.23.1.253:8080
O3 - Toolbar: &Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\COMPAN~1\Installs\cpn\ycomp5_3_12_0.dll (file missing)
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKLM\..\Run: [SpybotSnD] "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe" /autocheck
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - Global Startup: Adobe Reader Speed Launch.lnk.disabled
O4 - Global Startup: Microsoft Office.lnk.disabled
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\inetrepl.dll
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\inetrepl.dll
O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\inetrepl.dll
O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0527.dll
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0527.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://intranet
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.syma...bin/AvSniff.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupd...b?1106316842343
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.syma...n/bin/cabsa.cab
O16 - DPF: {CAFEEFAC-0015-0000-0004-ABCDEFFEDCBA} (Java Plug-in 1.5.0_04) -
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = Wurth.UK.local
O17 - HKLM\Software\..\Telephony: DomainName = Wurth.UK.local
O17 - HKLM\System\CCS\Services\Tcpip\..\{5C95DCA6-7858-42A4-97DC-34503CFACA93}: NameServer = 10.23.100.25,10.23.100.11
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = Wurth.UK.local
O17 - HKLM\System\CS1\Services\Tcpip\..\{5C95DCA6-7858-42A4-97DC-34503CFACA93}: NameServer = 10.23.100.25,10.23.100.11
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = Wurth.UK.local
O17 - HKLM\System\CS2\Services\Tcpip\..\{5C95DCA6-7858-42A4-97DC-34503CFACA93}: NameServer = 10.23.100.25,10.23.100.11
O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido anti-malware\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido anti-malware\ewidoguard.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Iomega App Services - Iomega Corporation - C:\PROGRA~1\Iomega\System32\AppServices.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: MySQL - Unknown owner - C:\Program.exe (file missing)
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - %ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini (file missing)
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
O23 - Service: VNC Server Version 4 (WinVNC4) - Unknown owner - C:\Program Files\RealVNC\VNC4\WinVNC4.exe" -service (file missing)

Also my system seems to be pretty stable, no popups or anything nasty at the moment..

Regards

Ian

#5 LDTate

LDTate

    Grand Poobah

  • Root Admin
  • 57,211 posts

Posted 25 April 2006 - 05:53 AM

Good Job :thumbup:

use Add/Remove Programs and remove Ewido unless you want to keep it. It's only a 14 day trial version.


Log looks good :D :thumbup: How is it running any issues?

Note: This will remove all previous Restore Points

Turn off System Restore:

On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
Check Turn off System Restore.
Click Apply, and then click OK.

Restart your computer, turn it back on.

On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
Remove the Check Turn off System Restore.
Click Apply, and then click OK.

Double-click My Computer.
Click the Tools menu, and then click Folder Options.
Click the View tab.
Check "Hide file extensions for known file types."
Under the "Hidden files" folder, Uncheck "Show hidden files and folders."
Check "Hide protected operating system files."
Click Apply, and then click OK.





If you dont have these three programs I would recommend that you get them. Spywareblaster, Spywareguard and IESPY AD. They will add 1000's of sites to your resticted zone and block some hijacks from happening. I also have a FREE FIREWALL and FREE ANTI VIRUS if you need one.

It is critical to have both a firewall and anti virus to protect your system.

Keep your system up to date and run Adaware & Spybot, once a week works, and hopefully you will be ok from here on. Both are available below.

Safe Surfing. :D

I would also suggest you read this:
So how did I get infected in the first place?
by Tony Klein

The forum is run by volunteers who donate their time and expertise.

Want to help others? Join the ClassRoom and learn how.

Logs will be closed if you haven't replied within 3 days

 

If you would like to paypal.gif for the help you received.
 

Proud graduate of TC/WTT Classroom

 


#6 cwjdmitr

cwjdmitr

    New Member

  • New Member
  • Pip
  • 5 posts

Posted 26 April 2006 - 12:34 AM

Well all done and dusted, stopped and started the system restore and created a new restore point. Downloaded what was suggested, and am installing now :-) The system is running just fine :-) Thanks for your help Regards Ian

#7 LDTate

LDTate

    Grand Poobah

  • Root Admin
  • 57,211 posts

Posted 26 April 2006 - 05:41 AM

Great job :thumbup: You're more then welcome. Glad we were able to help Peace be with you :wavey:

The forum is run by volunteers who donate their time and expertise.

Want to help others? Join the ClassRoom and learn how.

Logs will be closed if you haven't replied within 3 days

 

If you would like to paypal.gif for the help you received.
 

Proud graduate of TC/WTT Classroom

 


#8 LDTate

LDTate

    Grand Poobah

  • Root Admin
  • 57,211 posts

Posted 26 April 2006 - 08:47 PM

Glad we could be of assistance. This topic is now closed. If you wish it reopened, please send us an email (Click for address) with a link to your thread.

Do not bother contacting us if you are not the topic starter. A valid, working link to the closed topic is required along with the user name used. If the user name does not match the one in the thread linked, the email will be deleted.
Make sure you use proper prevention to keep from having problems occur to your computer in the future.

Coyote's Installed programs for prevention:

http://forums.tomcoy...showtopic=31418

The help you receive here is free. If you wish to show your appreciation, then you may donate to help keep us online.

Visit the CoyoteStore http://TomCoyote.org/coyotestore.php

The forum is run by volunteers who donate their time and expertise.

Want to help others? Join the ClassRoom and learn how.

Logs will be closed if you haven't replied within 3 days

 

If you would like to paypal.gif for the help you received.
 

Proud graduate of TC/WTT Classroom

 

Related Topics



0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users