Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

HJT Log Need help


  • Please log in to reply
1 reply to this topic

#1 damagicmilkman

damagicmilkman

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:09:30 PM

Posted 31 May 2005 - 09:39 PM

help popups slowness and other problems like desktop no pictures of screensaver
Heres da log
i dunno what the trusted site stuff is me think porn popup causer me want delete

Logfile of HijackThis v1.99.1
Scan saved at 7:37:05 PM, on 5/31/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Unable to get Internet Explorer version!

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\inet20060\services.exe
C:\WINDOWS\yahoo22.exe
C:\WINDOWS\apioc.exe
C:\WINDOWS\System32\vavknn.exe
C:\WINDOWS\System32\pd33.exe
C:\Program Files\PornoTop\ptop.exe
C:\WINDOWS\isrvs\desktop.exe
C:\WINDOWS\system32\atlrf32.exe
C:\WINDOWS\System32\svchost.exe
c:\windows\system32\uqwbrjo.exe
C:\WINDOWS\loader.exe
C:\WINDOWS\System32\TASKMGRU.EXE
C:\WINDOWS\System32\MSIMN32.EXE
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Netscape\Netscape\Netscp.exe
C:\WINDOWS\Explorer.exe
C:\WINDOWS\System32\dwwin.exe
C:\Documents and Settings\Owner\Desktop\hijackthis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\rqgla.dll/sp.html#66987
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\rqgla.dll/sp.html#66987
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\rqgla.dll/sp.html#66987
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\rqgla.dll/sp.html#66987
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\rqgla.dll/sp.html#66987
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\rqgla.dll/sp.html#66987
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\rqgla.dll/sp.html#66987
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,HomeOldSP = about:blank
R3 - Default URLSearchHook is missing
F2 - REG:system.ini: Shell=Explorer.exe C:\WINDOWS\Nail.exe
F3 - REG:win.ini: run=C:\WINDOWS\inet20060\services.exe
O2 - BHO: BHDP Class - {1A1488CB-8028-49ba-AD19-18D13CDC650F} - C:\WINDOWS\bhoass.dll
O2 - BHO: HBO Class - {5321E378-FFAD-4999-8C62-03CA8155F0B3} - C:\WINDOWS\inet20060\3.00.05.dll
O2 - BHO: (no name) - {A0269420-A638-4509-889C-8FC3CC85DA7E} - C:\WINDOWS\drexinit.dll
O2 - BHO: Class - {FD0CAC5A-E9FB-F570-4AD2-4EDA67ADF7C7} - C:\WINDOWS\system32\mfcov32.dll
O4 - HKLM\..\Run: [apioc.exe] C:\WINDOWS\apioc.exe
O4 - HKLM\..\Run: [KavSvc] C:\WINDOWS\System32\vavknn.exe reg_run
O4 - HKLM\..\Run: [Windows Service] C:\WINDOWS\System32\pd33.exe
O4 - HKLM\..\Run: [PornoTop] "C:\Program Files\PornoTop\ptop.exe" hide
O4 - HKLM\..\Run: [sp] rundll32 C:\DOCUME~1\Owner\LOCALS~1\Temp\se.dll,DllInstall
O4 - HKLM\..\Run: [IST Service] C:\Program Files\ISTsvc\istsvc.exe
O4 - HKLM\..\Run: [YCFP] C:\WINDOWS\lfopdwf.exe
O4 - HKLM\..\Run: [Desktop Search] C:\WINDOWS\isrvs\desktop.exe
O4 - HKLM\..\Run: [ffis] C:\WINDOWS\isrvs\ffisearch.exe
O4 - HKLM\..\Run: [system32.exe] C:\WINDOWS\System32\system32.exe
O4 - HKLM\..\Run: [System backup] C:\WINDOWS\System32\151be4c6.exe
O4 - HKLM\..\Run: [PCEi] C:\WINDOWS\cyjukv.exe
O4 - HKLM\..\Run: [G9bBXgBEe] C:\WINDOWS\bstledc.exe
O4 - HKLM\..\Run: [erVL3jZx9] C:\WINDOWS\lfopdwf.exe
O4 - HKLM\..\Run: [oCUeGtqF] C:\WINDOWS\hyahqj.exe
O4 - HKLM\..\Run: [CP8T2bB] C:\WINDOWS\unkwngg.exe
O4 - HKLM\..\Run: [klMsrELq] C:\WINDOWS\lfopdwf.exe
O4 - HKLM\..\Run: [55cbSmN72] C:\WINDOWS\xesvriso.exe
O4 - HKLM\..\Run: [XdaZGy] C:\WINDOWS\vqdfgnlt.exe
O4 - HKLM\..\Run: [r1Gga] C:\WINDOWS\agnihb.exe
O4 - HKLM\..\Run: [89ZS3] C:\WINDOWS\gtclkyy.exe
O4 - HKLM\..\Run: [axeT] C:\WINDOWS\meyhftcp.exe
O4 - HKLM\..\Run: [HjA4bTjE] C:\WINDOWS\objno.exe
O4 - HKLM\..\Run: [GLxaSCE] C:\WINDOWS\lfopdwf.exe
O4 - HKLM\..\Run: [nscN4ibe] C:\WINDOWS\qafdxp.exe
O4 - HKLM\..\Run: [WT3bTUd] C:\WINDOWS\qcebx.exe
O4 - HKLM\..\Run: [xp_system] C:\WINDOWS\inet20060\services.exe
O4 - HKLM\..\Run: [WindowsFZ] C:\WINDOWS\loader.exe /1
O4 - HKLM\..\Run: [ylaonmb] c:\windows\system32\uqwbrjo.exe
O4 - HKCU\..\Run: [TASKMGRU] C:\WINDOWS\System32\TASKMGRU.EXE
O4 - HKCU\..\Run: [MSIMN32] C:\WINDOWS\System32\MSIMN32.EXE
O4 - HKCU\..\Run: [Windows Service] C:\WINDOWS\System32\pd33.exe
O4 - HKCU\..\Run: [Windows installer] C:\winstall.exe
O4 - HKCU\..\Run: [System backup] C:\WINDOWS\System32\151be4c6.exe
O4 - HKCU\..\Run: [DNS] C:\Program Files\Common Files\mc-58-12-0000093.exe
O4 - HKCU\..\Run: [SpySheriff] C:\Program Files\SpySheriff\SpySheriff.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [xp_system] C:\WINDOWS\inet20060\services.exe
O8 - Extra context menu item: &Search - http://kb.bar.need2find.com/KB/menusearch.html?p=KB
O13 - DefaultPrefix: http://htpp.ws?
O13 - WWW Prefix: http://htpp.ws?
O15 - Trusted Zone: *.addictivetechnologies.com
O15 - Trusted Zone: *.addictivetechnologies.net
O15 - Trusted Zone: *.awmdabest.com
O15 - Trusted Zone: *.c4tdownload.com
O15 - Trusted Zone: *.clickspring.net
O15 - Trusted Zone: *.crazywinnings.com
O15 - Trusted Zone: *.f1organizer.com
O15 - Trusted Zone: *.frame.crazywinnings.com
O15 - Trusted Zone: *.media-motor.net
O15 - Trusted Zone: *.megapornix.com
O15 - Trusted Zone: *.mt-download.com
O15 - Trusted Zone: *.overpro.com
O15 - Trusted Zone: *.searchmiracle.com
O15 - Trusted Zone: *.slotch.com
O15 - Trusted Zone: *.slotchbar.com
O15 - Trusted Zone: *.static.topconverting.com
O15 - Trusted Zone: *.topconverting.com
O15 - Trusted Zone: *.windupdates.com
O15 - Trusted Zone: *.xxxtoolbar.com
O15 - Trusted Zone: *.ysbweb.com
O15 - Trusted Zone: *.addictivetechnologies.com (HKLM)
O15 - Trusted Zone: *.addictivetechnologies.net (HKLM)
O15 - Trusted Zone: *.awmdabest.com (HKLM)
O15 - Trusted Zone: *.c4tdownload.com (HKLM)
O15 - Trusted Zone: *.clickspring.net (HKLM)
O15 - Trusted Zone: *.crazywinnings.com (HKLM)
O15 - Trusted Zone: *.f1organizer.com (HKLM)
O15 - Trusted Zone: *.frame.crazywinnings.com (HKLM)
O15 - Trusted Zone: *.media-motor.net (HKLM)
O15 - Trusted Zone: *.megapornix.com (HKLM)
O15 - Trusted Zone: *.mt-download.com (HKLM)
O15 - Trusted Zone: *.overpro.com (HKLM)
O15 - Trusted Zone: *.searchmiracle.com (HKLM)
O15 - Trusted Zone: *.slotch.com (HKLM)
O15 - Trusted Zone: *.slotchbar.com (HKLM)
O15 - Trusted Zone: *.static.topconverting.com (HKLM)
O15 - Trusted Zone: *.topconverting.com (HKLM)
O15 - Trusted Zone: *.windupdates.com (HKLM)
O15 - Trusted Zone: *.xxxtoolbar.com (HKLM)
O15 - Trusted Zone: *.ysbweb.com (HKLM)
O15 - ProtocolDefaults: 'http' protocol is in Trusted Zone, should be Internet Zone
O15 - ProtocolDefaults: 'http' protocol is in Trusted Zone, should be Internet Zone (HKLM)
O16 - DPF: {11111111-1111-1111-1111-111111111123} -
O16 - DPF: {527196A4-B1A3-4647-931D-37BA5AF23037} - http://crazy-toolbar.com/mt/62/soft.exe
O23 - Service: Workstation NetLogon Service ( 11F#`I) - Unknown owner - C:\WINDOWS\system32\atlrf32.exe
O23 - Service: Trace network connections (ACCRA) - Unknown owner - C:\WINDOWS\System32\mocih.exe (file missing)
O23 - Service: Provides three management service (FreeBSD) - Unknown owner - C:\WINDOWS\System32\dev32.exe (file missing)
O23 - Service: System Startup Service (SvcProc) - Unknown owner - C:\WINDOWS\svcproc.exe

Edited by damagicmilkman, 31 May 2005 - 09:41 PM.


BC AdBot (Login to Remove)

 


#2 OldTimer

OldTimer

    Malware Expert


  • Members
  • 11,092 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:North Carolina
  • Local time:10:30 PM

Posted 02 June 2005 - 05:06 PM

Hello damagicmilkman and welcome to the BC forums. After reviewing your log I see a few items that require our attention. Please print these directions and then proceed with the following steps in order.

Step #1

Download and install ewido security suite. Update the program and then close it. Do not run it yet.

Download nailfix.zip and unzip it to its own folder.

Step #2

Now we need to remove a service.

Part 1
  • Click Start>Run, type services.msc into the Open editbox and click the Ok button.
  • Locate the Workstation NetLogon Service service and double-click on it to open the Properties dialog.
  • Click the Stop button.
  • In the Startup type dropdown select Disabled.
  • Click the Apply button and then the Ok button.
  • Repeat the above steps for the Trace network connections service.
  • Close the Services window
Part 2
  • Click Start>Run, type cmd into the Open editbox and click the Ok button.
  • Copy/paste each line below into the Command Prompt window and press the Enter key after each one:
    • sc delete 11F#`I
      sc delete ACCRA
  • Close the Command Prompt window
Step #3

Start in Safe Mode Using the F8 method:
  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until the boot menu appears.
  • Use the arrow keys to select the Safe Mode menu item.
  • Press the Enter key.
Step #4

Navigate to the folder you unzipped nailfix.zip into and double-click on nailfix.cmd. Your desktop and icons will disappear and reappear, and a window should open and close very quickly --- this is normal.

Step #5

Start ewido and click on the Scanner button. On the Scanner page click on My Computer and then click the Start button to begin the scan. Let it run to completion and fix anything that it finds.

Step #6

Start HijackThis and click the Scan button to perform a scan. Look for the following items and click in the checkbox in front of each item to select it:R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\rqgla.dll/sp.html#66987
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\rqgla.dll/sp.html#66987
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\rqgla.dll/sp.html#66987
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\rqgla.dll/sp.html#66987
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\rqgla.dll/sp.html#66987
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\rqgla.dll/sp.html#66987
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\rqgla.dll/sp.html#66987
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,HomeOldSP = about:blank
R3 - Default URLSearchHook is missing
F2 - REG:system.ini: Shell=Explorer.exe C:\WINDOWS\Nail.exe
F3 - REG:win.ini: run=C:\WINDOWS\inet20060\services.exe
O2 - BHO: BHDP Class - {1A1488CB-8028-49ba-AD19-18D13CDC650F} - C:\WINDOWS\bhoass.dll
O2 - BHO: HBO Class - {5321E378-FFAD-4999-8C62-03CA8155F0B3} - C:\WINDOWS\inet20060\3.00.05.dll
O2 - BHO: (no name) - {A0269420-A638-4509-889C-8FC3CC85DA7E} - C:\WINDOWS\drexinit.dll
O2 - BHO: Class - {FD0CAC5A-E9FB-F570-4AD2-4EDA67ADF7C7} - C:\WINDOWS\system32\mfcov32.dll
O4 - HKLM\..\Run: [apioc.exe] C:\WINDOWS\apioc.exe
O4 - HKLM\..\Run: [KavSvc] C:\WINDOWS\System32\vavknn.exe reg_run
O4 - HKLM\..\Run: [Windows Service] C:\WINDOWS\System32\pd33.exe
O4 - HKLM\..\Run: [PornoTop] "C:\Program Files\PornoTop\ptop.exe" hide
O4 - HKLM\..\Run: [sp] rundll32 C:\DOCUME~1\Owner\LOCALS~1\Temp\se.dll,DllInstall
O4 - HKLM\..\Run: [IST Service] C:\Program Files\ISTsvc\istsvc.exe
O4 - HKLM\..\Run: [YCFP] C:\WINDOWS\lfopdwf.exe
O4 - HKLM\..\Run: [Desktop Search] C:\WINDOWS\isrvs\desktop.exe
O4 - HKLM\..\Run: [ffis] C:\WINDOWS\isrvs\ffisearch.exe
O4 - HKLM\..\Run: [system32.exe] C:\WINDOWS\System32\system32.exe
O4 - HKLM\..\Run: [System backup] C:\WINDOWS\System32\151be4c6.exe
O4 - HKLM\..\Run: [PCEi] C:\WINDOWS\cyjukv.exe
O4 - HKLM\..\Run: [G9bBXgBEe] C:\WINDOWS\bstledc.exe
O4 - HKLM\..\Run: [erVL3jZx9] C:\WINDOWS\lfopdwf.exe
O4 - HKLM\..\Run: [oCUeGtqF] C:\WINDOWS\hyahqj.exe
O4 - HKLM\..\Run: [CP8T2bB] C:\WINDOWS\unkwngg.exe
O4 - HKLM\..\Run: [klMsrELq] C:\WINDOWS\lfopdwf.exe
O4 - HKLM\..\Run: [55cbSmN72] C:\WINDOWS\xesvriso.exe
O4 - HKLM\..\Run: [XdaZGy] C:\WINDOWS\vqdfgnlt.exe
O4 - HKLM\..\Run: [r1Gga] C:\WINDOWS\agnihb.exe
O4 - HKLM\..\Run: [89ZS3] C:\WINDOWS\gtclkyy.exe
O4 - HKLM\..\Run: [axeT] C:\WINDOWS\meyhftcp.exe
O4 - HKLM\..\Run: [HjA4bTjE] C:\WINDOWS\objno.exe
O4 - HKLM\..\Run: [GLxaSCE] C:\WINDOWS\lfopdwf.exe
O4 - HKLM\..\Run: [nscN4ibe] C:\WINDOWS\qafdxp.exe
O4 - HKLM\..\Run: [WT3bTUd] C:\WINDOWS\qcebx.exe
O4 - HKLM\..\Run: [xp_system] C:\WINDOWS\inet20060\services.exe
O4 - HKLM\..\Run: [WindowsFZ] C:\WINDOWS\loader.exe /1
O4 - HKLM\..\Run: [ylaonmb] c:\windows\system32\uqwbrjo.exe
O4 - HKCU\..\Run: [TASKMGRU] C:\WINDOWS\System32\TASKMGRU.EXE
O4 - HKCU\..\Run: [MSIMN32] C:\WINDOWS\System32\MSIMN32.EXE
O4 - HKCU\..\Run: [Windows Service] C:\WINDOWS\System32\pd33.exe
O4 - HKCU\..\Run: [Windows installer] C:\winstall.exe
O4 - HKCU\..\Run: [System backup] C:\WINDOWS\System32\151be4c6.exe
O4 - HKCU\..\Run: [DNS] C:\Program Files\Common Files\mc-58-12-0000093.exe
O4 - HKCU\..\Run: [SpySheriff] C:\Program Files\SpySheriff\SpySheriff.exe
O4 - HKCU\..\Run: [xp_system] C:\WINDOWS\inet20060\services.exe
O8 - Extra context menu item: &Search - http://kb.bar.need2find.com/KB/menusearch.html?p=KB
O13 - DefaultPrefix: http://htpp.ws?
O13 - WWW Prefix: http://htpp.ws?
O15 - Trusted Zone: *.addictivetechnologies.com
O15 - Trusted Zone: *.addictivetechnologies.net
O15 - Trusted Zone: *.awmdabest.com
O15 - Trusted Zone: *.c4tdownload.com
O15 - Trusted Zone: *.clickspring.net
O15 - Trusted Zone: *.crazywinnings.com
O15 - Trusted Zone: *.f1organizer.com
O15 - Trusted Zone: *.frame.crazywinnings.com
O15 - Trusted Zone: *.media-motor.net
O15 - Trusted Zone: *.megapornix.com
O15 - Trusted Zone: *.mt-download.com
O15 - Trusted Zone: *.overpro.com
O15 - Trusted Zone: *.searchmiracle.com
O15 - Trusted Zone: *.slotch.com
O15 - Trusted Zone: *.slotchbar.com
O15 - Trusted Zone: *.static.topconverting.com
O15 - Trusted Zone: *.topconverting.com
O15 - Trusted Zone: *.windupdates.com
O15 - Trusted Zone: *.xxxtoolbar.com
O15 - Trusted Zone: *.ysbweb.com
O15 - Trusted Zone: *.addictivetechnologies.com (HKLM)
O15 - Trusted Zone: *.addictivetechnologies.net (HKLM)
O15 - Trusted Zone: *.awmdabest.com (HKLM)
O15 - Trusted Zone: *.c4tdownload.com (HKLM)
O15 - Trusted Zone: *.clickspring.net (HKLM)
O15 - Trusted Zone: *.crazywinnings.com (HKLM)
O15 - Trusted Zone: *.f1organizer.com (HKLM)
O15 - Trusted Zone: *.frame.crazywinnings.com (HKLM)
O15 - Trusted Zone: *.media-motor.net (HKLM)
O15 - Trusted Zone: *.megapornix.com (HKLM)
O15 - Trusted Zone: *.mt-download.com (HKLM)
O15 - Trusted Zone: *.overpro.com (HKLM)
O15 - Trusted Zone: *.searchmiracle.com (HKLM)
O15 - Trusted Zone: *.slotch.com (HKLM)
O15 - Trusted Zone: *.slotchbar.com (HKLM)
O15 - Trusted Zone: *.static.topconverting.com (HKLM)
O15 - Trusted Zone: *.topconverting.com (HKLM)
O15 - Trusted Zone: *.windupdates.com (HKLM)
O15 - Trusted Zone: *.xxxtoolbar.com (HKLM)
O15 - Trusted Zone: *.ysbweb.com (HKLM)
O15 - ProtocolDefaults: 'http' protocol is in Trusted Zone, should be Internet Zone
O15 - ProtocolDefaults: 'http' protocol is in Trusted Zone, should be Internet Zone (HKLM)
O16 - DPF: {11111111-1111-1111-1111-111111111123} -
O16 - DPF: {527196A4-B1A3-4647-931D-37BA5AF23037} - http://crazy-toolbar.com/mt/62/soft.exe

Now close ALL open windows except HijackThis and click the Fix Checked button to finish the repair.

Step #7

We need to make sure all hidden files are showing so please:
  • Click Start.
  • Open My Computer.
  • Select the Tools menu and click Folder Options.
  • Select the View tab.
  • Under the Hidden files and folders heading select Show hidden files and folders.
  • Uncheck the Hide file extensions for known types option.
  • Uncheck the Hide protected operating system files (recommended) option.
  • Click Yes to confirm.
  • Click OK.
Find the following files/folders and delete them (don't worry if they are already gone):C:\WINDOWS\rqgla.dll
C:\WINDOWS\bhoass.dll
C:\WINDOWS\drexinit.dll
C:\WINDOWS\system32\mfcov32.dll
C:\WINDOWS\apioc.exe
C:\WINDOWS\lfopdwf.exe
C:\WINDOWS\cyjukv.exe
C:\WINDOWS\bstledc.exe
C:\WINDOWS\lfopdwf.exe
C:\WINDOWS\hyahqj.exe
C:\WINDOWS\unkwngg.exe
C:\WINDOWS\lfopdwf.exe
C:\WINDOWS\xesvriso.exe
C:\WINDOWS\vqdfgnlt.exe
C:\WINDOWS\agnihb.exe
C:\WINDOWS\gtclkyy.exe
C:\WINDOWS\meyhftcp.exe
C:\WINDOWS\objno.exe
C:\WINDOWS\lfopdwf.exe
C:\WINDOWS\qafdxp.exe
C:\WINDOWS\qcebx.exe
C:\WINDOWS\loader.exe
C:\WINDOWS\inet20060\ <--folder
C:\WINDOWS\isrvs\ <--folder
c:\windows\system32\uqwbrjo.exe
C:\WINDOWS\System32\TASKMGRU.EXE
C:\WINDOWS\System32\MSIMN32.EXE
C:\WINDOWS\System32\vavknn.exe
C:\WINDOWS\System32\pd33.exe
C:\WINDOWS\System32\system32.exe
C:\WINDOWS\System32\151be4c6.exe
C:\Program Files\PornoTop\ <--folder
C:\Program Files\ISTsvc\ <--folder
C:\Program Files\Common Files\mc-58-12-0000093.exe
C:\Program Files\SpySheriff\ <--folder
C:\DOCUMENTS AND SETTINGS\Owner\LOCAL SETTINGS\Temp\se.dll
C:\winstall.exe

Step #8

OK. Reboot your computer normally, start HijackThis and perform a new scan. Use the Add Reply button to post your new log file back here along with details of any problems you encountered performing the above steps and I will review it when it comes in.

OT
I do not respond to PM's requesting help. That's what the forums are here for. Please use them so that others may benefit from your questions and the responses you receive.
OldTimer

Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users