Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Help! - "your Privacy Is In Danger" Issue Here


  • Please log in to reply
8 replies to this topic

#1 help please please

help please please

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:53 AM

Posted 13 August 2007 - 01:56 AM

I have the same problem a lot of others have mentioned. Here is my hijack this log... Can anyone help me?? I would really rreally appreciate it. This sucks!

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:41:45 PM, on 8/12/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16473)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\DRIVERS\CDANTSRV.EXE
C:\WINDOWS\System32\nvsvc32.exe
C:\Program Files\Spyware Doctor\sdhelp.exe
C:\WINDOWS\System32\tcpsvcs.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Trend Micro\PC-cillin 2000\Tmntsrv.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\WINDOWS\system32\UStorSrv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\System32\WScript.exe
D:\hwpdic.exe
C:\Program Files\Trend Micro\PC-cillin 2000\Pop3trap.exe
C:\Program Files\Trend Micro\PC-cillin 2000\WebTrapNT.exe
C:\Program Files\Iomega\DriveIcons\ImgIcon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\PROGRA~1\SPYWAR~1\swdoctor.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Cisco Systems\Clean Access Agent\CCAAgent.exe
C:\Program Files\Trend Micro\PC-cillin 2000\PNTIOMON.exe
c:\progra~1\Support.com\client\bin\tgcmd.exe
C:\Program Files\Trend Micro\PC-cillin 2000\pccntupd.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\tom ne nam pyon\Local Settings\Temporary Internet Files\Content.IE5\E4M01SD7\HiJackThis[1].exe
C:\WINDOWS\System32\wbem\wmiprvse.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Windows Internet Explorer provided by Yahoo!
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
F3 - REG:win.ini: run=d:\HDICSVR.EXE
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
O2 - BHO: MSVPS System - {47C54F02-1B28-45F1-AE46-B5CDFB6E7926} - C:\WINDOWS\duocore.dll
O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~1\tools\iesdsg.dll
O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O4 - HKLM\..\Run: [ZTgServerSwitch] c:\program files\support.com\client\lserver\server.vbs
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
O4 - HKLM\..\Run: [Pop3trap.exe] "C:\Program Files\Trend Micro\PC-cillin 2000\Pop3trap.exe"
O4 - HKLM\..\Run: [WebTrapNT.exe] "C:\Program Files\Trend Micro\PC-cillin 2000\WebTrapNT.exe"
O4 - HKLM\..\Run: [Iomega Startup Options] C:\Program Files\Iomega\Common\ImgStart.exe
O4 - HKLM\..\Run: [Iomega Drive Icons] C:\Program Files\Iomega\DriveIcons\ImgIcon.exe
O4 - HKLM\..\Run: [EPSON Stylus C84 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2D1.EXE /P23 "EPSON Stylus C84 Series" /O6 "USB001" /M "Stylus C84"
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Spyware Doctor] C:\PROGRA~1\SPYWAR~1\swdoctor.exe /Q
O4 - HKCU\..\Run: [Spyware Begone] c:\begone-fs\freescan.exe -FastScan
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-18\..\Run: [Spyware Doctor] "C:\Program Files\Spyware Doctor\swdoctor.exe" /Q (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\GetFlash.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [Spyware Doctor] "C:\Program Files\Spyware Doctor\swdoctor.exe" /Q (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\GetFlash.exe (User 'Default user')
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Clean Access Agent.lnk = C:\Program Files\Cisco Systems\Clean Access Agent\CCAAgent.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: Real-time Monitor.lnk = ?
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O14 - IERESET.INF: START_PAGE_URL=http://www.sony.com/vaiopeople
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1158891161811
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1158891154092
O16 - DPF: {9B75502C-BBED-4BBD-8FE2-822E5E0AD32C} (MagicLockOCX Control) - http://www.diodeo.com/ActiveDiodeoPlayer.cab
O16 - DPF: {BD6BB450-7C69-43B8-96F3-689CAE57AB51} (SBSWebPlayer Class) - http://netv.sbs.co.kr/object/player/SBSWebPlayer.cab
O16 - DPF: {C9F2C949-1D30-43BF-A712-2D21048EFE1B} (SBSWebStudio Class) - http://netv.sbs.co.kr/object/editor/SBSWebStudio.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = hyojung
O17 - HKLM\Software\..\Telephony: DomainName = hyojung
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = hyojung
O21 - SSODL: wmpenv - {13FB7BEC-CB42-459B-81A5-32039745CEBA} - C:\WINDOWS\wmpenv.dll
O21 - SSODL: wmpconf - {C159688B-8D17-436A-92A3-4AA734D68DF0} - C:\WINDOWS\wmpconf.dll
O23 - Service: C-DillaSrv - C-Dilla Ltd - C:\WINDOWS\System32\DRIVERS\CDANTSRV.EXE
O23 - Service: IomegaAccess - Iomega Corporation - C:\WINDOWS\System32\IomegaAccess.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: PC Tools Spyware Doctor (SDhelper) - PC Tools Research Pty Ltd - C:\Program Files\Spyware Doctor\sdhelp.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: Trend NT Realtime Service (Tmntsrv) - Trend Micro Inc. - C:\Program Files\Trend Micro\PC-cillin 2000\Tmntsrv.exe
O23 - Service: UStorage Server Service - OTi - C:\WINDOWS\system32\UStorSrv.exe
O23 - Service: ZipToA - Iomega Corporation - C:\WINDOWS\System32\ZipToA.exe
O24 - Desktop Component 0: Privacy Protection - file:///C:\WINDOWS\privacy_danger\index.htm

--
End of file - 8001 bytes

BC AdBot (Login to Remove)

 


#2 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:12:53 PM

Posted 13 August 2007 - 06:51 AM

Welcome to the BleepingComputer HijackThis Logs and Analysis forum help please plea... :thumbsup:
My name is Richie and i'll be helping you to fix your problems.

Download SDFix.exe and save it to your desktop:
http://downloads.andymanchesta.com/RemovalTools/SDFix.exe

* Double click on SDFix on your desktop,and install the fix to C:\

Please then reboot your computer into Safe Mode by doing the following:

* Restart your computer
* After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
* Instead of Windows loading as normal, a menu with options should appear;
* Select the first option, to run Windows in Safe Mode, then press "Enter".
* Choose your usual account.

* In Safe Mode,go to and open the C:\SDFix folder,then double click on RunThis.bat to start the script.
* Type Y to begin the script.
* It will remove the Trojan Services then make some repairs to the registry and prompt you to press any key to Reboot.
* Press any Key and it will restart the PC.
* Your system will take longer that normal to restart as the fixtool will be running and removing files.
* When the desktop loads the Fixtool will complete the removal and display Finished, then press any key to end the script and load your desktop icons.
* Finally open the SDFix folder on your desktop and copy and paste the contents of the results file Report.txt into your next reply.


Download Combofix and save to your desktop:
Note:
It is important that it is saved directly to your desktop

Close any open browsers.
Double click on combofix.exe and follow the prompts.
When it's finished it will produce a log.
Post the entire contents of C:\ComboFix.txt into your next reply.
Note:
Do not mouseclick combofix's window while it's running.
That may cause the program to freeze/hang.

Do NOT post the ComboFix-quarantined-files.txt unless I ask.

Download SmitfraudFix (by S!Ri), to your desktop.
Double click on Smitfraudfix.cmd
Select option 1 Search, by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present).
Please copy and paste the content of that report into your next reply.

*IMPORTANT*
Do NOT run any other options until you are asked to do so!

Also post a new Hijackthis log please.
Posted Image
Posted Image

#3 help please please

help please please
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:53 AM

Posted 13 August 2007 - 11:28 AM

Richie:

Thanks so much for your help. I will do this as soon as I get home from work. In the meantime, i've been reading about trojan viruses and am a little freaked out. Do you think that any of my personal information has been comprimised or can you tell yet?

#4 help please please

help please please
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:53 AM

Posted 13 August 2007 - 01:38 PM

Here is the SDFIX report-


SDFix: Version 1.98

Run by tom ne nam pyon on Mon 08/13/2007 at 08:50 AM

Microsoft Windows XP [Version 5.1.2600]

Running From: C:\SDFix

Safe Mode:
Checking Services:


Restoring Windows Registry Values
Restoring Windows Default Hosts File
Restoring Default IE HomePage
Restoring Default Desktop Components Value

Rebooting...


Normal Mode:
Checking Files:

Trojan Files Found:

C:\Documents and Settings\tom ne nam pyon\Desktop\Error Cleaner.url - Deleted
C:\Documents and Settings\tom ne nam pyon\Favorites\Error Cleaner.url - Deleted
C:\Documents and Settings\tom ne nam pyon\Desktop\Privacy Protector.url - Deleted
C:\Documents and Settings\tom ne nam pyon\Favorites\Privacy Protector.url - Deleted
C:\Documents and Settings\tom ne nam pyon\Desktop\Spyware&Malware Protection.url - Deleted
C:\Documents and Settings\tom ne nam pyon\Favorites\Spyware&Malware Protection.url - Deleted
C:\WINDOWS\privacy_danger\index.htm - Deleted
C:\WINDOWS\privacy_danger\images\capt.gif - Deleted
C:\WINDOWS\privacy_danger\images\danger.jpg - Deleted
C:\WINDOWS\privacy_danger\images\down.gif - Deleted
C:\WINDOWS\privacy_danger\images\spacer.gif - Deleted
C:\DOCUME~1\TOMNEN~1\LOCALS~1\Temp\vpncore.exe - Deleted
C:\WINDOWS\dat.txt - Deleted
C:\WINDOWS\duocore.dll - Deleted
C:\WINDOWS\main_uninstaller.exe - Deleted
C:\WINDOWS\wmpconf.dll - Deleted
C:\WINDOWS\wmpenv.dll - Deleted


Folder C:\WINDOWS\privacy_danger - Removed

Removing Temp Files...

ADS Check:

C:\WINDOWS
No streams found.

C:\WINDOWS\system32
No streams found.

C:\WINDOWS\system32\svchost.exe
No streams found.

C:\WINDOWS\system32\ntoskrnl.exe
No streams found.



Final Check:

Remaining Services:
------------------



Authorized Application Key Export:

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\Trend Micro\\PC-cillin 2000\\WebTrapNT.exe"="C:\\Program Files\\Trend Micro\\PC-cillin 2000\\WebTrapNT.exe:*:Disabled:WebTrap"
"C:\\Program Files\\support.com\\client\\bin\\tgcmd.exe"="C:\\Program Files\\support.com\\client\\bin\\tgcmd.exe:*:Disabled:tgcmd Module"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\Program Files\\Internet Explorer\\iexplore.exe"="C:\\Program Files\\Internet Explorer\\iexplore.exe:*:Enabled:Internet Explorer"
"C:\\Program Files\\Real\\RealPlayer\\realplay.exe"="C:\\Program Files\\Real\\RealPlayer\\realplay.exe:*:Enabled:RealPlayer"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"

Remaining Files:
---------------

Backups Folder: - C:\SDFix\backups\backups.zip

Files with Hidden Attributes:

C:\Documents and Settings\All Users\DRM\Cache\Indiv01.tmp
C:\Documents and Settings\All Users\DRM\Cache\Indiv02.tmp
C:\Documents and Settings\All Users\DRM\Cache\Indiv03.tmp
C:\Documents and Settings\All Users\DRM\Cache\Indiv04.tmp
C:\Documents and Settings\tom ne nam pyon\Application Data\Microsoft\Word\~WRL0003.tmp
C:\Documents and Settings\tom ne nam pyon\Application Data\Microsoft\Word\~WRL0004.tmp
C:\Documents and Settings\tom ne nam pyon\Application Data\Microsoft\Word\~WRL0005.tmp
C:\Documents and Settings\tom ne nam pyon\Application Data\Microsoft\Word\~WRL0006.tmp
C:\Documents and Settings\tom ne nam pyon\Application Data\Microsoft\Word\~WRL0046.tmp
C:\Documents and Settings\tom ne nam pyon\Application Data\Microsoft\Word\~WRL0133.tmp
C:\Documents and Settings\tom ne nam pyon\Application Data\Microsoft\Word\~WRL0874.tmp
C:\Documents and Settings\tom ne nam pyon\Application Data\Microsoft\Word\~WRL0917.tmp
C:\Documents and Settings\tom ne nam pyon\Application Data\Microsoft\Word\~WRL1081.tmp
C:\Documents and Settings\tom ne nam pyon\Application Data\Microsoft\Word\~WRL1175.tmp
C:\Documents and Settings\tom ne nam pyon\Application Data\Microsoft\Word\~WRL1374.tmp
C:\Documents and Settings\tom ne nam pyon\Application Data\Microsoft\Word\~WRL1385.tmp
C:\Documents and Settings\tom ne nam pyon\Application Data\Microsoft\Word\~WRL1552.tmp
C:\Documents and Settings\tom ne nam pyon\Application Data\Microsoft\Word\~WRL1576.tmp
C:\Documents and Settings\tom ne nam pyon\Application Data\Microsoft\Word\~WRL2387.tmp
C:\Documents and Settings\tom ne nam pyon\Application Data\Microsoft\Word\~WRL2928.tmp
C:\Documents and Settings\tom ne nam pyon\Application Data\Microsoft\Word\~WRL3104.tmp
C:\Documents and Settings\tom ne nam pyon\Application Data\Microsoft\Word\~WRL3427.tmp
C:\Documents and Settings\tom ne nam pyon\Application Data\Microsoft\Word\~WRL4000.tmp
C:\Documents and Settings\tom ne nam pyon\Desktop\~WRL1930.tmp
C:\Documents and Settings\tom ne nam pyon\Desktop\~WRL1945.tmp
C:\Documents and Settings\tom ne nam pyon\Desktop\~WRL2487.tmp
C:\Documents and Settings\tom ne nam pyon\Desktop\~WRL3558.tmp
C:\RECYCLER\S-1-5-21-2541319435-3293823761-810355832-1005\Dc366\~WRL0326.tmp

Finished


Here is the COMBOFIX--->
ComboFix 07-08-13.3 - "tom ne nam pyon" 2007-08-13 9:12:44.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.205 [GMT -7:00]
* Created a new restore point


((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))


C:\Program Files\VideoAccessCodec
C:\Program Files\VideoAccessCodec\install.ico
C:\Program Files\VideoAccessCodec\Uninstall.exe
C:\Program Files\VideoAccessCodec\VideoAccessCodec.ocx


((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))


-------\LEGACY_IPRIP
-------\Iprip


((((((((((((((((((((((((( Files Created from 2007-07-13 to 2007-08-13 )))))))))))))))))))))))))))))))


2007-08-13 09:08 51,200 --a------ C:\WINDOWS\nircmd.exe
2007-08-13 08:48 <DIR> d-------- C:\WINDOWS\ERUNT
2007-08-13 08:41 1,049,821 --a------ C:\Program Files\SDFix.exe


(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

2007-08-13 09:20 0 --a------ C:\AUTOEXEC.BAT
2007-08-12 22:00 --------- d-------- C:\Program Files\Spyware Doctor
2007-06-11 11:39 1851392 --a------ C:\WINDOWS\system32\SBSWebPlayerCore.dll
2007-05-16 08:12 86528 -----c--- C:\WINDOWS\system32\dllcache\directdb.dll
2007-05-16 08:12 85504 --a--c--- C:\WINDOWS\system32\dllcache\wabimp.dll
2007-05-16 08:12 683520 --a------ C:\WINDOWS\system32\inetcomm.dll
2007-05-16 08:12 683520 -----c--- C:\WINDOWS\system32\dllcache\inetcomm.dll
2007-05-16 08:12 510976 -----c--- C:\WINDOWS\system32\dllcache\wab32.dll
2007-05-16 08:12 1314816 -----c--- C:\WINDOWS\system32\dllcache\msoe.dll
2004-07-22 08:51 3432656 --a--c--- C:\Program Files\ManagedDX.CAB
2004-07-19 20:58 1156363 --a--c--- C:\Program Files\BDANT.cab
2004-07-19 20:53 976020 --a--c--- C:\Program Files\BDAXP.cab
2004-07-09 12:17 13265040 --a--c--- C:\Program Files\dxnt.cab
2004-07-09 07:13 703080 --a--c--- C:\Program Files\BDA.cab
2004-07-09 07:13 15493481 --a--c--- C:\Program Files\DirectX.cab
2004-07-09 02:08 472576 --a--c--- C:\Program Files\dxsetup.exe
2004-07-09 02:08 2242560 --a--c--- C:\Program Files\dsetup32.dll
2004-07-09 01:03 62976 --a--c--- C:\Program Files\DSETUP.dll
2001-12-14 19:56 17408 --ahsc--- C:\Program Files\Thumbs.db


((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))


*Note* empty entries & legit default entries are not shown

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ZTgServerSwitch"="c:\program files\support.com\client\lserver\server.vbs" [2001-04-26 12:02]
"NvCplDaemon"="NvQTwk" []
"Pop3trap.exe"="C:\Program Files\Trend Micro\PC-cillin 2000\Pop3trap.exe" [2001-12-18 20:09]
"WebTrapNT.exe"="C:\Program Files\Trend Micro\PC-cillin 2000\WebTrapNT.exe" [2001-12-18 19:58]
"Iomega Startup Options"="C:\Program Files\Iomega\Common\ImgStart.exe" [2000-06-02 10:57]
"Iomega Drive Icons"="C:\Program Files\Iomega\DriveIcons\ImgIcon.exe" [2000-06-13 07:48]
"EPSON Stylus C84 Series"="C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2D1.exe" [2003-05-27 02:00]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSMSGS"="C:\Program Files\Messenger\msmsgs.exe" [2004-10-13 09:24]
"Spyware Doctor"="C:\PROGRA~1\SPYWAR~1\swdoctor.exe" [2006-12-27 13:47]
"Spyware Begone"="c:\begone-fs\freescan.exe" []
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-04 00:56]

[HKEY_USERS\.default\software\microsoft\windows\currentversion\runonce]
"FlashPlayerUpdate"=C:\WINDOWS\system32\Macromed\Flash\GetFlash.exe

[HKEY_USERS\.default\software\microsoft\windows\currentversion\run]
"Spyware Doctor"="C:\Program Files\Spyware Doctor\swdoctor.exe" /Q

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Adobe Gamma Loader.lnk - C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2002-03-21 14:33:04]
Clean Access Agent.lnk - C:\Program Files\Cisco Systems\Clean Access Agent\CCAAgent.exe [2007-02-23 15:27:12]
Microsoft Office.lnk - C:\Program Files\Microsoft Office\Office\OSA9.EXE [1999-02-17 13:05:56]
Real-time Monitor.lnk - C:\WINDOWS\Installer\{A839294B-70A9-11D5-9F5A-0050DAD742CD}\_106B5A0.exe [2001-12-19 15:59:22]

R0 ppa;Iomega Parallel Port Filter Driver;C:\WINDOWS\system32\DRIVERS\ppa.sys
R1 DMICall;Sony DMI Call service;C:\WINDOWS\system32\DRIVERS\DMICall.sys
R2 MLPTDR_B;MLPTDR_B;\??\C:\WINDOWS\System32\MLPTDR_B.sys
R2 SimpTcp;Simple TCP/IP Services;C:\WINDOWS\System32\tcpsvcs.exe
R2 SonyFKC;FAN and Keyboard Control Service;C:\WINDOWS\system32\Drivers\SonyFKC.sys
R2 V7;V7;C:\WINDOWS\system32\drivers\V7.sys
R3 SONYWBMS;Sony Memory Stick controller(WB);C:\WINDOWS\system32\DRIVERS\SonyWBMS.SYS
S3 BCM42XX;Broadcom iLine10™ Network Adapter Driver;C:\WINDOWS\system32\DRIVERS\bcm42xx5.sys
S3 BCMModem;BCM V.90 56K Modem;C:\WINDOWS\system32\DRIVERS\BCMDM.sys
S3 C-Dilla;C-Dilla;\??\C:\WINDOWS\System32\drivers\CDANT.SYS
S3 SMBE;Sony MPEG2 Encoder Board (WDM);C:\WINDOWS\system32\Drivers\SMBE.SYS


Contents of the 'Scheduled Tasks' folder
2002-04-07 23:01:12 C:\WINDOWS\Tasks\Registration reminder 2.job - C:\WINDOWS\System32\OOBE\oobebaln.exe

**************************************************************************

catchme 0.3.1061 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2007-08-13 09:33:11
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

**************************************************************************

Completion time: 2007-08-13 9:36:40 - machine was rebooted
C:\ComboFix-quarantined-files.txt ... 2007-08-13 09:36

--- E O F ---


Here is the SMITFRAUD--->

SmitFraudFix v2.211

Scan done at 11:23:49.91, Mon 08/13/2007
Run from C:\Documents and Settings\tom ne nam pyon\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in normal mode

Process

C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\DRIVERS\CDANTSRV.EXE
C:\WINDOWS\System32\nvsvc32.exe
C:\Program Files\Spyware Doctor\sdhelp.exe
C:\WINDOWS\System32\tcpsvcs.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Trend Micro\PC-cillin 2000\Tmntsrv.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\WINDOWS\system32\UStorSrv.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\System32\WScript.exe
C:\Program Files\Trend Micro\PC-cillin 2000\Pop3trap.exe
C:\Program Files\Trend Micro\PC-cillin 2000\WebTrapNT.exe
C:\Program Files\Iomega\DriveIcons\ImgIcon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\PROGRA~1\SPYWAR~1\swdoctor.exe
C:\Program Files\Cisco Systems\Clean Access Agent\CCAAgent.exe
C:\Program Files\Trend Micro\PC-cillin 2000\PNTIOMON.exe
C:\Program Files\Trend Micro\PC-cillin 2000\pccntupd.exe
c:\progra~1\Support.com\client\bin\tgcmd.exe
C:\Program Files\internet explorer\iexplore.exe
C:\WINDOWS\system32\cmd.exe
C:\WINDOWS\System32\wbem\wmiprvse.exe

hosts


C:\


C:\WINDOWS


C:\WINDOWS\system


C:\WINDOWS\Web


C:\WINDOWS\system32


C:\WINDOWS\system32\LogFiles


C:\Documents and Settings\tom ne nam pyon


C:\Documents and Settings\tom ne nam pyon\Application Data


Start Menu


C:\DOCUME~1\TOMNEN~1\FAVORI~1


Desktop


C:\Program Files


Corrupted keys


Desktop Components

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
"Source"="About:Home"
"SubscribedURL"="About:Home"
"FriendlyName"="My Current Home Page"


Sharedtaskscheduler
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


AppInit_DLLs
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"=""


Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""


Rustock



DNS

Description: Realtek RTL8139 Family PCI Fast Ethernet NIC - Packet Scheduler Miniport
DNS Server Search Order: 128.200.1.201
DNS Server Search Order: 128.200.192.202

HKLM\SYSTEM\CCS\Services\Tcpip\..\{30B5C3EE-ACE9-42D7-8B74-E73AE607D958}: DhcpNameServer=128.200.1.201 128.200.192.202
HKLM\SYSTEM\CS1\Services\Tcpip\..\{30B5C3EE-ACE9-42D7-8B74-E73AE607D958}: DhcpNameServer=128.200.1.201 128.200.192.202
HKLM\SYSTEM\CS3\Services\Tcpip\..\{30B5C3EE-ACE9-42D7-8B74-E73AE607D958}: DhcpNameServer=128.200.1.201 128.200.192.202
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=128.200.1.201 128.200.192.202
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=128.200.1.201 128.200.192.202
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=128.200.1.201 128.200.192.202


Scanning for wininet.dll infection


End



Finally, here's the new Hijack this report-->


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:37:24 AM, on 8/13/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16473)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\DRIVERS\CDANTSRV.EXE
C:\WINDOWS\System32\nvsvc32.exe
C:\Program Files\Spyware Doctor\sdhelp.exe
C:\WINDOWS\System32\tcpsvcs.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Trend Micro\PC-cillin 2000\Tmntsrv.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\WINDOWS\system32\UStorSrv.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\System32\WScript.exe
C:\Program Files\Trend Micro\PC-cillin 2000\Pop3trap.exe
C:\Program Files\Trend Micro\PC-cillin 2000\WebTrapNT.exe
C:\Program Files\Iomega\DriveIcons\ImgIcon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\PROGRA~1\SPYWAR~1\swdoctor.exe
C:\Program Files\Cisco Systems\Clean Access Agent\CCAAgent.exe
C:\Program Files\Trend Micro\PC-cillin 2000\PNTIOMON.exe
C:\Program Files\Trend Micro\PC-cillin 2000\pccntupd.exe
c:\progra~1\Support.com\client\bin\tgcmd.exe
C:\Program Files\internet explorer\iexplore.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\WINDOWS\system32\NOTEPAD.EXE
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Documents and Settings\tom ne nam pyon\Desktop\HiJackThis.exe
C:\WINDOWS\System32\wbem\wmiprvse.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~1\tools\iesdsg.dll
O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O4 - HKLM\..\Run: [ZTgServerSwitch] c:\program files\support.com\client\lserver\server.vbs
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
O4 - HKLM\..\Run: [Pop3trap.exe] "C:\Program Files\Trend Micro\PC-cillin 2000\Pop3trap.exe"
O4 - HKLM\..\Run: [WebTrapNT.exe] "C:\Program Files\Trend Micro\PC-cillin 2000\WebTrapNT.exe"
O4 - HKLM\..\Run: [Iomega Startup Options] C:\Program Files\Iomega\Common\ImgStart.exe
O4 - HKLM\..\Run: [Iomega Drive Icons] C:\Program Files\Iomega\DriveIcons\ImgIcon.exe
O4 - HKLM\..\Run: [EPSON Stylus C84 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2D1.EXE /P23 "EPSON Stylus C84 Series" /O6 "USB001" /M "Stylus C84"
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Spyware Doctor] C:\PROGRA~1\SPYWAR~1\swdoctor.exe /Q
O4 - HKCU\..\Run: [Spyware Begone] c:\begone-fs\freescan.exe -FastScan
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-18\..\Run: [Spyware Doctor] "C:\Program Files\Spyware Doctor\swdoctor.exe" /Q (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\GetFlash.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [Spyware Doctor] "C:\Program Files\Spyware Doctor\swdoctor.exe" /Q (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\GetFlash.exe (User 'Default user')
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Clean Access Agent.lnk = C:\Program Files\Cisco Systems\Clean Access Agent\CCAAgent.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: Real-time Monitor.lnk = ?
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O14 - IERESET.INF: START_PAGE_URL=http://www.sony.com/vaiopeople
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1158891161811
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1158891154092
O16 - DPF: {9B75502C-BBED-4BBD-8FE2-822E5E0AD32C} (MagicLockOCX Control) - http://www.diodeo.com/ActiveDiodeoPlayer.cab
O16 - DPF: {BD6BB450-7C69-43B8-96F3-689CAE57AB51} (SBSWebPlayer Class) - http://netv.sbs.co.kr/object/player/SBSWebPlayer.cab
O16 - DPF: {C9F2C949-1D30-43BF-A712-2D21048EFE1B} (SBSWebStudio Class) - http://netv.sbs.co.kr/object/editor/SBSWebStudio.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = hyojung
O17 - HKLM\Software\..\Telephony: DomainName = hyojung
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = hyojung
O23 - Service: C-DillaSrv - C-Dilla Ltd - C:\WINDOWS\System32\DRIVERS\CDANTSRV.EXE
O23 - Service: IomegaAccess - Iomega Corporation - C:\WINDOWS\System32\IomegaAccess.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: PC Tools Spyware Doctor (SDhelper) - PC Tools Research Pty Ltd - C:\Program Files\Spyware Doctor\sdhelp.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: Trend NT Realtime Service (Tmntsrv) - Trend Micro Inc. - C:\Program Files\Trend Micro\PC-cillin 2000\Tmntsrv.exe
O23 - Service: UStorage Server Service - OTi - C:\WINDOWS\system32\UStorSrv.exe
O23 - Service: ZipToA - Iomega Corporation - C:\WINDOWS\System32\ZipToA.exe

--
End of file - 7361 bytes

#5 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:12:53 PM

Posted 13 August 2007 - 03:46 PM

Do you think that any of my personal information has been comprimised

I have'nt noticed anything we've removed would tell me your imformation has been compromised.
For your own peace of mind though you might want to do the following:
If your computer is used for online banking or has credit card information on it, all passwords should be changed to include those used for email, eBay and forums.
You may also want to contact your banking and credit card institutions regarding the matter.

Download\install 'SuperAntiSpyware Home Edition Free Version' from here:
http://www.superantispyware.com/downloadfi...ANTISPYWAREFREE

Launch SuperAntiSpyware and click on 'Check for updates'.
Once the updates have been installed,on the main screen click on 'Scan your computer'.
Check: 'Perform Complete Scan'.
Click 'Next' to start the scan.

Superantispyware will now scan your computer,when it's finished it will list all/any infections found.
Make sure everything found has a checkmark next to it,then press 'Next'.
Click on 'Finish' when you've done.

It's possible that the program will ask you to reboot in order to delete some files.

Obtain the SuperAntiSpyware log as follows:
Click on 'Preferences'.
Click on the 'Statistics/Logs' tab.
Under 'Scanner Logs' double click on 'SuperAntiSpyware Scan Log'.
It will then open in your default text editor,such as Notepad.
Copy and paste the contents of that report into your next reply.

Run this online virus/spyware scan using Internet Explorer:
Kaspersky WebScanner
Next click Kaspersky Online Scanner
You will be prompted to install an ActiveX component from Kaspersky, Click Yes.
The program will launch and then begin downloading the latest definition files:
Once the files have been downloaded click on NEXT
Now click on Scan Settings
In the scan settings make that the following are selected:
Scan using the following Anti-Virus database:
Standard
Scan Options:
Scan Archives
Scan Mail Bases
Click OK
Now under select a target to scan:
Select My Computer
This will start the program and scan your system.
The scan will take a while so be patient and let it run.
Once the scan is complete it will display if your system has been infected.
Now click on the Save as Text button:
Save the file to your desktop.
Copy and paste the contents of that file into your next reply.

Also post a new Hijackthis log,let me know how your pc is running now.
Posted Image
Posted Image

#6 help please please

help please please
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:53 AM

Posted 14 August 2007 - 12:03 AM

Here is the SuperAntispamware report-->

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 08/13/2007 at 06:58 PM

Application Version : 3.9.1008

Core Rules Database Version : 3285
Trace Rules Database Version: 1296

Scan type : Complete Scan
Total Scan Time : 01:02:51

Memory items scanned : 436
Memory threats detected : 0
Registry items scanned : 4750
Registry threats detected : 0
File items scanned : 46115
File threats detected : 142

Adware.Tracking Cookie
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@revsci[1].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@adultreviews[2].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@ad1.dmcmedia.co[1].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@adlegend[1].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@www.myxpornclips[1].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@hqthefilmsxxx[1].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@ads.adbrite[1].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@hqthefilmsxxx[3].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@richmedia.yahoo[2].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@tacoda[1].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@e-2dj6wjliggdjchp.stats.esomniture[2].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@adopt.specificclick[1].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@ad-indicator[1].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@ad.interclick[2].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@hqthefilmsxxx[5].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@image.masterstats[1].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@e-2dj6wjlyagcpgcp.stats.esomniture[2].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@adbrite[2].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@hqthefilmsxxx[6].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@indexstats[2].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@ad1.targetgraph[2].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@ads.revsci[1].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@adinterax[1].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@hqthefilmsxxx[2].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@www.bigboobspornspy[1].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@xxxboobpost[2].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@www.bigboobspornshots[1].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@myxpornclips[2].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@interclick[2].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@specificclick[2].txt
C:\Documents and Settings\tom ne nam pyon\Cookies\tom_ne_nam_pyon@anad.tacoda[1].txt
C:\Documents and Settings\Hyojung Lee\Cookies\hyojung lee@ad1.targetgraph[2].txt
C:\Documents and Settings\Hyojung Lee\Cookies\hyojung lee@ads.adsquare.co[1].txt
C:\Documents and Settings\Hyojung Lee\Cookies\hyojung lee@ads.vnuemedia[2].txt
C:\Documents and Settings\Hyojung Lee\Cookies\hyojung lee@adserver[1].txt
C:\Documents and Settings\Hyojung Lee\Cookies\hyojung lee@atdmt[2].txt
C:\Documents and Settings\Hyojung Lee\Cookies\hyojung lee@doubleclick[1].txt
C:\Documents and Settings\Hyojung Lee\Cookies\hyojung lee@hitbox[2].txt
C:\Documents and Settings\Hyojung Lee\Cookies\hyojung lee@mediaplex[2].txt
C:\Documents and Settings\Hyojung Lee\Cookies\hyojung lee@phg.hitbox[2].txt
C:\Documents and Settings\Hyojung Lee\Cookies\hyojung lee@realmedia.co[1].txt
C:\Documents and Settings\Hyojung Lee\Cookies\hyojung lee@stats.klsoft[1].txt
C:\Documents and Settings\Hyojung Lee\Cookies\hyojung lee@statse.webtrendslive[1].txt
C:\Documents and Settings\Hyojung Lee\Cookies\hyojung lee@superstats[1].txt
C:\Documents and Settings\Hyojung Lee\Cookies\hyojung lee@trafficmp[2].txt
C:\Documents and Settings\Hyojung Lee\Cookies\hyojung lee@webpower[1].txt
C:\Documents and Settings\Hyojung Lee\Cookies\hyojung lee@www.qksrv[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@2o7[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ad-city.co[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ad-indicator[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ad.donga[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ad.nasmedia.co[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ad1.emediate[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ad1.targetgraph[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@addynamix[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@adrenalinesk[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ads.adworldnetwork[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ads.as4x.tmcs[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ads.enliven[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ads.guardian.co[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ads.monster[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ads.multimania.lycos[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ads.specificpop[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ads.vnuemedia[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ads.x10[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ads.zap2it[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@adserv4.ads360[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@adserver.ads360[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@adserver.trb[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@adtech[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@advertising[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@atdmt[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@bizrate[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@blueclick.co[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@bluestreak[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@board.adultinsider[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@clickagents[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@clickbank[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@counter.hitslink[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@doubleclick[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@edge.ru4[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ehg-autodesk.hitbox[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ehg-bizjournals.hitbox[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ehg-dig.hitbox[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ehg-editorialpro.hitbox[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ehg-ogilvy.hitbox[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ehg-pennwell.hitbox[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@ehg.hitbox[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@fastclick[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@fastclick[3].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@findwhat[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@focalex[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@fortunecity[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@hc2.humanclick[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@hg1.hitbox[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@hit1.vioclicks[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@hitbox[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@macromedia[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@mediaplex[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@mediatrack.popupsponsor[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@media[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@media[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@netfastmedia[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@overture[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@phg.hitbox[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@pointroll[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@pornopds[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@pro-market[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@questionmarket[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@rccl.bridgetrack[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@realmedia.co[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@realmedia[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@servedby.advertising[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@server.iad.liveperson[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@sex[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@sprinks-clicks.about[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@spylog[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@stat.dealtime[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@stats.klsoft[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@statse.webtrendslive[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@targetnet[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@trafficmp[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@tribalfusion[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@tripod[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@valueclick[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@valueclick[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@w104.hitbox[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@web1.realtracker[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@windowsmedia[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@www.azoogleads[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@www.commission-junction[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@www.macromedia[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@www.media-alliance[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@www.publicadvertising[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@www.qksrv[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@www.sex[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@www.ticketsnow2[2].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@z1.adserver[1].txt
C:\Documents and Settings\Yongsoon Kim\Cookies\yongsoon kim@zedo[1].txt

Trojan.Downloader/Media-Codec
C:\QOOBOX\QUARANTINE\C\PROGRAM FILES\VIDEOACCESSCODEC\VIDEOACCESSCODEC.OCX.VIR

Trojan.Net-MSV/VPS
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B6441411-87B0-4BDA-9E4A-8AC5B81921CD}\RP990\A0197332.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B6441411-87B0-4BDA-9E4A-8AC5B81921CD}\RP990\A0197340.DLL


Here is the new Hijack this -->

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 9:43:55 PM, on 8/13/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16473)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\DRIVERS\CDANTSRV.EXE
C:\WINDOWS\System32\nvsvc32.exe
C:\Program Files\Spyware Doctor\sdhelp.exe
C:\WINDOWS\System32\tcpsvcs.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Trend Micro\PC-cillin 2000\Tmntsrv.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\WINDOWS\system32\UStorSrv.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\System32\WScript.exe
C:\Program Files\Trend Micro\PC-cillin 2000\Pop3trap.exe
C:\Program Files\Trend Micro\PC-cillin 2000\WebTrapNT.exe
C:\Program Files\Iomega\DriveIcons\ImgIcon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\PROGRA~1\SPYWAR~1\swdoctor.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Cisco Systems\Clean Access Agent\CCAAgent.exe
C:\Program Files\Trend Micro\PC-cillin 2000\PNTIOMON.exe
C:\Program Files\Trend Micro\PC-cillin 2000\pccntupd.exe
c:\progra~1\Support.com\client\bin\tgcmd.exe
C:\Program Files\internet explorer\iexplore.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Documents and Settings\tom ne nam pyon\Desktop\HiJackThis.exe
C:\WINDOWS\System32\wbem\wmiprvse.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~1\tools\iesdsg.dll
O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O4 - HKLM\..\Run: [ZTgServerSwitch] c:\program files\support.com\client\lserver\server.vbs
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
O4 - HKLM\..\Run: [Pop3trap.exe] "C:\Program Files\Trend Micro\PC-cillin 2000\Pop3trap.exe"
O4 - HKLM\..\Run: [WebTrapNT.exe] "C:\Program Files\Trend Micro\PC-cillin 2000\WebTrapNT.exe"
O4 - HKLM\..\Run: [Iomega Startup Options] C:\Program Files\Iomega\Common\ImgStart.exe
O4 - HKLM\..\Run: [Iomega Drive Icons] C:\Program Files\Iomega\DriveIcons\ImgIcon.exe
O4 - HKLM\..\Run: [EPSON Stylus C84 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2D1.EXE /P23 "EPSON Stylus C84 Series" /O6 "USB001" /M "Stylus C84"
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Spyware Doctor] C:\PROGRA~1\SPYWAR~1\swdoctor.exe /Q
O4 - HKCU\..\Run: [Spyware Begone] c:\begone-fs\freescan.exe -FastScan
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - HKUS\S-1-5-18\..\Run: [Spyware Doctor] "C:\Program Files\Spyware Doctor\swdoctor.exe" /Q (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\GetFlash.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [Spyware Doctor] "C:\Program Files\Spyware Doctor\swdoctor.exe" /Q (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\GetFlash.exe (User 'Default user')
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Clean Access Agent.lnk = C:\Program Files\Cisco Systems\Clean Access Agent\CCAAgent.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: Real-time Monitor.lnk = ?
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O14 - IERESET.INF: START_PAGE_URL=http://www.sony.com/vaiopeople
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1158891161811
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1158891154092
O16 - DPF: {9B75502C-BBED-4BBD-8FE2-822E5E0AD32C} (MagicLockOCX Control) - http://www.diodeo.com/ActiveDiodeoPlayer.cab
O16 - DPF: {BD6BB450-7C69-43B8-96F3-689CAE57AB51} (SBSWebPlayer Class) - http://netv.sbs.co.kr/object/player/SBSWebPlayer.cab
O16 - DPF: {C9F2C949-1D30-43BF-A712-2D21048EFE1B} (SBSWebStudio Class) - http://netv.sbs.co.kr/object/editor/SBSWebStudio.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = hyojung
O17 - HKLM\Software\..\Telephony: DomainName = hyojung
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = hyojung
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: C-DillaSrv - C-Dilla Ltd - C:\WINDOWS\System32\DRIVERS\CDANTSRV.EXE
O23 - Service: IomegaAccess - Iomega Corporation - C:\WINDOWS\System32\IomegaAccess.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: PC Tools Spyware Doctor (SDhelper) - PC Tools Research Pty Ltd - C:\Program Files\Spyware Doctor\sdhelp.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: Trend NT Realtime Service (Tmntsrv) - Trend Micro Inc. - C:\Program Files\Trend Micro\PC-cillin 2000\Tmntsrv.exe
O23 - Service: UStorage Server Service - OTi - C:\WINDOWS\system32\UStorSrv.exe
O23 - Service: ZipToA - Iomega Corporation - C:\WINDOWS\System32\ZipToA.exe

--
End of file - 7776 bytes


The Kaspersky is over 500 pages so I couldn't include it here. Can I email you the text file?

#7 help please please

help please please
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:53 AM

Posted 14 August 2007 - 12:04 AM

By the way, the computer seems to be running fine but I'm scared to do anything beyond what you tell me.

#8 help please please

help please please
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:53 AM

Posted 18 August 2007 - 02:18 PM

Are we done then? Or is there another step? Let me know if you need the Kaspersky log. Thanks!

#9 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:12:53 PM

Posted 18 August 2007 - 05:07 PM

Your log is clean :thumbsup:
If all's ok,please do the following.

Find and delete:
Combofix.exe
SDFix.exe
SmitfraudFix.exe

C:\SDFix
C:\Qoobox

Download ATF Cleaner by Atribune:
http://www.atribune.org/ccount/click.php?id=1

Double-click ATF-Cleaner.exe to run the program.
Click 'Select All' found at the bottom of the list.
Click the 'Empty Selected' button.

If you use Firefox browser, do this also:
Click Firefox at the top and choose 'Select All' from the list.
Click the 'Empty Selected' button.
NOTE:
If you would like to keep your saved passwords,please click 'No' at the prompt.

If you use Opera browser,do this also:
Click Opera at the top and choose 'Select All' from the list.
Click the 'Empty Selected' button.
NOTE:
If you would like to keep your saved passwords,please click 'No' at the prompt.

Click 'Exit' on the Main menu to close the program.

-------------------------------------------------

Click on Start/All Programs/Accessories/System Tools/System Restore.
In the 'System Restore' window,click on the 'Create a Restore Point' button,then click 'Next'.
In the window that appears,enter a description\name for the Restore Point,then click on 'Create',wait,then click 'Close'.
The date and time will be created automatically.

Next click on Start/All Programs/Accessories/System Tools/Disk Cleanup.
The 'Select Drive' box will appear,click on Ok.
The 'Disk Cleanup for [C:]' box will appear,click on the 'More Options' tab.
At the bottom in the 'System Restore' window,click on the 'Clean up...' button.
A box will pop up 'Are you sure you want to delete all but the most recent restore point?',click on 'Yes'.
Click on 'Yes' at 'Are you sure you want to perform these actions?'.
Now wait until 'Disk Cleanup' finishes and the box disappears.

Read through the information found here,to help you prevent any possible future infections.
'How to prevent Malware' by miekiemoes:
http://users.telenet.be/bluepatchy/miekiem...prevention.html
Posted Image
Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users