Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Smitfraud


  • This topic is locked This topic is locked
14 replies to this topic

#1 jerry109999

jerry109999

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:48 PM

Posted 30 August 2005 - 11:22 AM

Hello,
I hope somebody can help. I got the smitfraud virus and do not know how or what to delete from highjack this. In the hopes of getting some help I am going to post the log as I have seen others posted and could somebody work with me to clear this probem up. Thanks in advance and I am not literate on computors so you may have to bear with me.

Jerry

(moderator edit: move log to HJT forum for team review. jgweed)

Logfile of HijackThis v1.99.1
Scan saved at 1:37:24 PM, on 8/29/2005
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2600.0000)

Running processes:
C:\WINDOWS2\System32\smss.exe
C:\WINDOWS2\system32\winlogon.exe
C:\WINDOWS2\system32\services.exe
C:\WINDOWS2\system32\lsass.exe
C:\WINDOWS2\system32\svchost.exe
C:\WINDOWS2\System32\svchost.exe
C:\WINDOWS2\system32\spoolsv.exe
C:\WINDOWS2\system32\rundll32.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\WINDOWS2\SmVycnkgQmxhY2t3ZWxs\command.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\WINDOWS2\Explorer.EXE
C:\WINDOWS2\System32\inetsrv\inetinfo.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS2\System32\tcpsvcs.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\Program Files\Irfaptec\qmgwuweb.exe
C:\WINDOWS2\System32\asrmem.exe
C:\PROGRA~1\SYMANT~2\VPTray.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS2\System32\APVXDWIN.EXE
C:\Program Files\DSB\dsb.exe
C:\WINDOWS2\System32\RUNDLL32.exe
C:\WINDOWS2\System32\Ijttkz.exe
C:\Program Files\snss\snss.exe
C:\WINDOWS2\System32\ctfmon.exe
C:\Program Files\srtc\csue.exe
C:\WINDOWS2\System32\??plorer.exe
C:\Program Files\Common Files\efax\Dllcmd32.exe
C:\Program Files\Snap UltraSearch\Toolbar.exe
C:\WINDOWS2\System32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Desktop\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
O2 - BHO: SDWin32 Class - {05CF22C3-4503-46AA-A118-238D2E343879} - C:\WINDOWS2\System32\pqojv.dll (file missing)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SDWin32 Class - {1E0FFDCA-99E4-486B-A7AA-70A67AC70A79} - C:\WINDOWS2\System32\nvzvw.dll (file missing)
O2 - BHO: SDWin32 Class - {3B6795D7-73EE-4579-89AA-EE95EEFA845F} - C:\WINDOWS2\System32\zykdj.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: Highlighter Class - {8924A422-F9E1-470A-AA90-528F15BDA39A} - C:\Program Files\Snap UltraSearch\DesktopToolbarHelper.3.1125331283.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS2\System32\msdxm.ocx
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~2\VPTray.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [Apvxdwin] C:\WINDOWS2\System32\APVXDWIN.EXE
O4 - HKLM\..\Run: [IPSecMon] C:\Program Files\Common files\VPN Network\IPSecMon.exe /vpncheck
O4 - HKLM\..\Run: [Windows Update AutoUpdate Client] C:\WINDOWS2\System32\winupd\wuauclt.exe
O4 - HKLM\..\Run: [FoolProof] C:\Program Files\SmartStuff\fpwinldr.exe /load
O4 - HKLM\..\Run: [Recguard] C:\Program Files\HP\recguard.exe
O4 - HKLM\..\Run: [REAL] C:\Program Files\REAL\realjbox.exe
O4 - HKLM\..\Run: [SpybotSnD] "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe" /autocheck
O4 - HKLM\..\Run: [DSB] C:\Program Files\DSB\dsb.exe
O4 - HKLM\..\Run: [AUNPS2] RUNDLL32 AUNPS2.DLL,_Run@16
O4 - HKLM\..\Run: [zykdjc] C:\WINDOWS2\System32\zykdjc.exe
O4 - HKLM\..\Run: [eTrust Realtime Monitor] C:\WINDOWS2\System32\realmon.exe /start
O4 - HKLM\..\Run: [version] C:\WINDOWS2\System32\Vwissm.exe
O4 - HKLM\..\Run: [secure] C:\WINDOWS2\System32\Ijttkz.exe
O4 - HKLM\..\Run: [AdsBlocker] C:\Program Files\AdsBlocker\stopAds.exe
O4 - HKLM\..\Run: [snss Launcher] "C:\Program Files\snss\snss.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS2\System32\ctfmon.exe
O4 - HKCU\..\Run: [Oahu] C:\Program Files\srtc\csue.exe
O4 - HKCU\..\Run: [Lpmhr] C:\WINDOWS2\System32\??plorer.exe
O4 - Global Startup: Live Menu.lnk = C:\Program Files\Common Files\efax\Dllcmd32.exe
O4 - Global Startup: Adobe Acrobat Speed Launcher.lnk = ?
O4 - Global Startup: eFax.com Tray Menu.lnk.disabled
O4 - Global Startup: Snap UltraSearch.lnk = C:\Program Files\Snap UltraSearch\Toolbar.exe
O8 - Extra context menu item: &AIM Search - res://C:\Program Files\AIM Toolbar\AIMBar.dll/aimsearch.htm
O8 - Extra context menu item: Convert link target to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert link target to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert selected links to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert selected links to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Convert selection to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert selection to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS2\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS2\web\related.htm
O16 - DPF: {04E214E5-63AF-4236-83C6-A7ADCBF9BD02} (HouseCall Control) - http://housecall60.trendmicro.com/housecall/xscan60.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {4208FB4D-4E53-4F5A-BF7A-3E047DDB5281} (ActiveX Control) - http://www.icannnews.com/app/ST/ActiveX.ocx
O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} - http://download.mcafee.com/molbin/shared/m...96/mcinsctl.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004061...all/xscan53.cab
O16 - DPF: {85D1F3B2-2A21-11D7-97B9-0010DC2A6243} (SecureLogin class) - http://secure2.comned.com/signuptemplates/...login-devel.cab
O16 - DPF: {972BB342-14A7-4660-83C1-51DDBEE171DB} - http://www.pacimedia.com/install/pcs_0026.exe
O16 - DPF: {A27AD582-5BE5-4C2D-82F0-48B24FE02040} - http://www.adshooter.com/pop_shooter/insta...00/SYSsfitb.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/binFramework/v10/ZIntro.cab27513.cab
O16 - DPF: {BB21F850-63F4-4EC9-BF9D-565BD30C9AE9} (ASquaredScanForm Element) - http://www.windowsecurity.com/trojanscan/axscan.cab
O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} - http://download.mcafee.com/molbin/shared/m...,26/mcgdmgr.cab
O16 - DPF: {F58E1CEF-A068-4C15-BA5E-587CAF3EE8C6} (MSN Chat Control 4.5) - http://chat.msn.com/bin/msnchat45.cab
O20 - Winlogon Notify: MS-DOS Emulation - C:\WINDOWS2\system32\MMC71ITA.DLL
O20 - Winlogon Notify: NavLogon - C:\WINDOWS2\System32\NavLogon.dll
O20 - Winlogon Notify: PCANotify - C:\WINDOWS2\SYSTEM32\PCANotify.dll
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: Command Service (cmdService) - Unknown owner - C:\WINDOWS2\SmVycnkgQmxhY2t3ZWxs\command.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS2\System32\HPZipm12.exe
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe

Edited by jgweed, 30 August 2005 - 12:27 PM.


BC AdBot (Login to Remove)

 


#2 suebaby41

suebaby41

    W.A.M. (Women Against Malware)


  • Malware Response Team
  • 6,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:South Carolina, USA
  • Local time:02:48 PM

Posted 01 September 2005 - 01:02 PM

Welcome to the BleepingComputer forum. We are currently studying your log and will have instructions for you shortly. Thank you for your patience.

There are HiJackThis entries for three anti-virus programs:

NORTON INTERNET SECURITY SUITE which contains anti-virus program and a firewall

Panda anti-virus suite

eTrust Antivirus

This could cause problems. Please read this:

There are basically two types of anti-virus programs:
On-Access and On-Demand

On-Access Scanners
As the name implies, it runs in the background all the time the PC is turned on and running. The main function of an on-access scanner is to monitor activity on your machine.

On-Demand Scanners
As the name implies, are scanners that only run when you ask them to.
Such as:
Online Scans and scanners that run on your machine but are not actively scanning your machine

Anti-virus programs take up an enormous amount of your computer's resources when they are actively scanning your computer. Having two anti-virus programs running at the same time can cause your computer to run very slow, become unstable and even, in rare cases, crash. I notice that you are using more than one anti-virus program. This is very dangerous, as multiple anti-virus programs can interfere with one another and actually allow MORE viruses to get through. Running two anti-virus programs at the same time could lead to both of them trying to scan the same file at the same time, scan the same email at the same time and so on which could lead to conflicts. I strongly suggest you either (1) configure only one anti-virus program to enable automatic realtime scanning, and leave the rest disabled most of the time, or (2) go to Start -> Control Panel -> Add/Remove Programs and uninstall all but one anti-virus program.

Edited by suebaby41, 01 September 2005 - 02:42 PM.

You don't stop laughing when you get old; you get old when you stop laughing.
A Member of U-N-I-T-E (Unified Network of Instructors and Trained Eliminators)
Malware Removal University Masters Graduate

Posted Image
Join The Fight Against Malware
No reply within 5 days will result in your topic being closed. If you need more time, please let me know by posting in this topic so that your topic will not be closed.

#3 suebaby41

suebaby41

    W.A.M. (Women Against Malware)


  • Malware Response Team
  • 6,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:South Carolina, USA
  • Local time:02:48 PM

Posted 01 September 2005 - 03:24 PM

Please download L2mfix from one of these two locations:

http://www.atribune.org/downloads/l2mfix.exe
http://www.downloads.subratam.org/l2mfix.exe

Save the file to your desktop and double click l2mfix.exe. Click the Install button to extract the files and follow the prompts, then open the newly added l2mfix folder on your desktop. Double click l2mfix.bat and select option #1 for Run Find Log by typing 1 and then pressing enter. This will scan your computer and it may appear nothing is happening, then, after a minute or 2, notepad will open with a log.Copy the contents of that log and paste it back into this thread, along with a new hijackthis log.

IMPORTANT: Do NOT run option #2 OR any other files in the l2mfix folder until you are asked to do so!
You don't stop laughing when you get old; you get old when you stop laughing.
A Member of U-N-I-T-E (Unified Network of Instructors and Trained Eliminators)
Malware Removal University Masters Graduate

Posted Image
Join The Fight Against Malware
No reply within 5 days will result in your topic being closed. If you need more time, please let me know by posting in this topic so that your topic will not be closed.

#4 jerry109999

jerry109999
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:48 PM

Posted 01 September 2005 - 03:47 PM

well, here goes. I am not very savy at all this so please bear with me.
L2MFIX find log 1.04a
These are the registry keys present
**********************************************************************************
Winlogon/notify:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\AdminDebug]
"Asynchronous"=dword:00000000
"DllName"="C:\\WINDOWS2\\system32\\MMC71ITA.DLL"
"Impersonate"=dword:00000000
"Logon"="WinLogon"
"Logoff"="WinLogoff"
"Shutdown"="WinShutdown"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt32chain]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,33,00,32,00,2e,00,64,00,6c,00,\
6c,00,00,00
"Logoff"="ChainWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cryptnet]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,6e,00,65,00,74,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Logoff"="CryptnetWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cscdll]
"DLLName"="cscdll.dll"
"Logon"="WinlogonLogonEvent"
"Logoff"="WinlogonLogoffEvent"
"ScreenSaver"="WinlogonScreenSaverEvent"
"Startup"="WinlogonStartupEvent"
"Shutdown"="WinlogonShutdownEvent"
"StartShell"="WinlogonStartShellEvent"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\NavLogon]
"Logoff"="NavLogoffEvent"
"StartShell"="NavStartShellEvent"
"DllName"="C:\\WINDOWS2\\System32\\NavLogon.dll"
"LoginDomain"="ESCOPETA"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\PCANotify]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"Unlock"="WLEventUnlock"
"Lock"="WLEventLock"
"Startup"="WLEventStartup"
"DllName"="PCANotify.dll"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ScCertProp]
"DLLName"="wlnotify.dll"
"Logon"="SCardStartCertProp"
"Logoff"="SCardStopCertProp"
"Lock"="SCardSuspendCertProp"
"Unlock"="SCardResumeCertProp"
"Enabled"=dword:00000001
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Schedule]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"StartShell"="SchedStartShell"
"Logoff"="SchedEventLogOff"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\sclgntfy]
"Logoff"="WLEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001
"DllName"=hex(2):73,00,63,00,6c,00,67,00,6e,00,74,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SensLogn]
"DLLName"="WlNotify.dll"
"Lock"="SensLockEvent"
"Logon"="SensLogonEvent"
"Logoff"="SensLogoffEvent"
"Safe"=dword:00000001
"MaxWait"=dword:00000258
"StartScreenSaver"="SensStartScreenSaverEvent"
"StopScreenSaver"="SensStopScreenSaverEvent"
"Startup"="SensStartupEvent"
"Shutdown"="SensShutdownEvent"
"StartShell"="SensStartShellEvent"
"PostShell"="SensPostShellEvent"
"Disconnect"="SensDisconnectEvent"
"Reconnect"="SensReconnectEvent"
"Unlock"="SensUnlockEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\termsrv]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"Logoff"="TSEventLogoff"
"Logon"="TSEventLogon"
"PostShell"="TSEventPostShell"
"Shutdown"="TSEventShutdown"
"StartShell"="TSEventStartShell"
"Startup"="TSEventStartup"
"MaxWait"=dword:00000258
"Reconnect"="TSEventReconnect"
"Disconnect"="TSEventDisconnect"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlballoon]
"DLLName"="wlnotify.dll"
"Logon"="RegisterTicketExpiredNotificationEvent"
"Logoff"="UnregisterTicketExpiredNotificationEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001


RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright © 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!

Access Control List for Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify:
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-NI) ALLOW Read BUILTIN\Users
(ID-IO) ALLOW Read BUILTIN\Users
(ID-NI) ALLOW Read BUILTIN\Power Users
(ID-IO) ALLOW Read BUILTIN\Power Users
(ID-NI) ALLOW Full access BUILTIN\Administrators
(ID-IO) ALLOW Full access BUILTIN\Administrators
(ID-NI) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access CREATOR OWNER


**********************************************************************************
useragent:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
"{84C269C3-7634-E25E-02D3-064FB355C450}"=""

**********************************************************************************
Shell Extension key:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]
"{00022613-0000-0000-C000-000000000046}"="Multimedia File Property Sheet"
"{176d6597-26d3-11d1-b350-080036a75b03}"="ICM Scanner Management"
"{1F2E5C40-9550-11CE-99D2-00AA006E086C}"="NTFS Security Page"
"{3EA48300-8CF6-101B-84FB-666CCB9BCD32}"="OLE Docfile Property Page"
"{40dd6e20-7c17-11ce-a804-00aa003ca9f6}"="Shell extensions for sharing"
"{41E300E0-78B6-11ce-849B-444553540000}"="PlusPack CPL Extension"
"{42071712-76d4-11d1-8b24-00a0c9068ff3}"="Display Adapter CPL Extension"
"{42071713-76d4-11d1-8b24-00a0c9068ff3}"="Display Monitor CPL Extension"
"{42071714-76d4-11d1-8b24-00a0c9068ff3}"="Display Panning CPL Extension"
"{4E40F770-369C-11d0-8922-00A024AB2DBB}"="DS Security Page"
"{513D916F-2A8E-4F51-AEAB-0CBC76FB1AF8}"="Compatibility Page"
"{56117100-C0CD-101B-81E2-00AA004AE837}"="Shell Scrap DataHandler"
"{59099400-57FF-11CE-BD94-0020AF85B590}"="Disk Copy Extension"
"{59be4990-f85c-11ce-aff7-00aa003ca9f6}"="Shell extensions for Microsoft Windows Network objects"
"{5DB2625A-54DF-11D0-B6C4-0800091AA605}"="ICM Monitor Management"
"{675F097E-4C4D-11D0-B6C1-0800091AA605}"="ICM Printer Management"
"{764BF0E1-F219-11ce-972D-00AA00A14F56}"="Shell extensions for file compression"
"{77597368-7b15-11d0-a0c2-080036af3f03}"="Web Printer Shell Extension"
"{7988B573-EC89-11cf-9C00-00AA00A14F56}"="Disk Quota UI"
"{853FE2B1-B769-11d0-9C4E-00C04FB6C6FA}"="Encryption Context Menu"
"{85BBD920-42A0-1069-A2E4-08002B30309D}"="Briefcase"
"{88895560-9AA2-1069-930E-00AA0030EBC8}"="HyperTerminal Icon Ext"
"{BD84B380-8CA2-1069-AB1D-08000948F534}"="Fonts"
"{DBCE2480-C732-101B-BE72-BA78E9AD5B27}"="ICC Profile"
"{F37C5810-4D3F-11d0-B4BF-00AA00BBB723}"="Printers Security Page"
"{f81e9010-6ea4-11ce-a7ff-00aa003ca9f6}"="Shell extensions for sharing"
"{f92e8c40-3d33-11d2-b1aa-080036a75b03}"="Display TroubleShoot CPL Extension"
"{7444C717-39BF-11D1-8CD9-00C04FC29D45}"="Crypto PKO Extension"
"{7444C719-39BF-11D1-8CD9-00C04FC29D45}"="Crypto Sign Extension"
"{7007ACC7-3202-11D1-AAD2-00805FC1270E}"="Network Connections"
"{992CFFA0-F557-101A-88EC-00DD010CCC48}"="Network Connections"
"{E211B736-43FD-11D1-9EFB-0000F8757FCD}"="Scanners & Cameras"
"{FB0C9C8A-6C50-11D1-9F1D-0000F8757FCD}"="Scanners & Cameras"
"{905667aa-acd6-11d2-8080-00805f6596d2}"="Scanners & Cameras"
"{3F953603-1008-4f6e-A73A-04AAC7A992F1}"="Scanners & Cameras"
"{83bbcbf3-b28a-4919-a5aa-73027445d672}"="Scanners & Cameras"
"{F0152790-D56E-4445-850E-4F3117DB740C}"="Remote Sessions CPL Extension"
"{60254CA5-953B-11CF-8C96-00AA00B8708C}"="Shell extensions for Windows Script Host"
"{2206CDB2-19C1-11D1-89E0-00C04FD7A829}"="Microsoft Data Link"
"{DD2110F0-9EEF-11cf-8D8E-00AA0060F5BF}"="Tasks Folder Icon Handler"
"{797F1E90-9EDD-11cf-8D8E-00AA0060F5BF}"="Tasks Folder Shell Extension"
"{D6277990-4C6A-11CF-8D87-00AA0060F5BF}"="Scheduled Tasks"
"{0DF44EAA-FF21-4412-828E-260A8728E7F1}"="Taskbar and Start Menu"
"{2559a1f0-21d7-11d4-bdaf-00c04f60b9f0}"="Search"
"{2559a1f1-21d7-11d4-bdaf-00c04f60b9f0}"="Help and Support"
"{2559a1f2-21d7-11d4-bdaf-00c04f60b9f0}"="Help and Support"
"{2559a1f3-21d7-11d4-bdaf-00c04f60b9f0}"="Run..."
"{2559a1f4-21d7-11d4-bdaf-00c04f60b9f0}"="Internet"
"{2559a1f5-21d7-11d4-bdaf-00c04f60b9f0}"="E-mail"
"{D20EA4E1-3957-11d2-A40B-0C5020524152}"="Fonts"
"{D20EA4E1-3957-11d2-A40B-0C5020524153}"="Administrative Tools"
"{875CB1A1-0F29-45de-A1AE-CFB4950D0B78}"="Audio Media Properties Handler"
"{40C3D757-D6E4-4b49-BB41-0E5BBEA28817}"="Video Media Properties Handler"
"{E4B29F9D-D390-480b-92FD-7DDB47101D71}"="Wav Properties Handler"
"{87D62D94-71B3-4b9a-9489-5FE6850DC73E}"="Avi Properties Handler"
"{A6FD9E45-6E44-43f9-8644-08598F5A74D9}"="Midi Properties Handler"
"{c5a40261-cd64-4ccf-84cb-c394da41d590}"="Video Thumbnail Extractor"
"{5E6AB780-7743-11CF-A12B-00AA004AE837}"="Microsoft Internet Toolbar"
"{22BF0C20-6DA7-11D0-B373-00A0C9034938}"="Download Status"
"{91EA3F8B-C99B-11d0-9815-00C04FD91972}"="Augmented Shell Folder"
"{6413BA2C-B461-11d1-A18A-080036B11A03}"="Augmented Shell Folder 2"
"{F61FFEC1-754F-11d0-80CA-00AA005B4383}"="BandProxy"
"{7BA4C742-9E81-11CF-99D3-00AA004AE837}"="Microsoft BrowserBand"
"{30D02401-6A81-11d0-8274-00C04FD5AE38}"="Search Band"
"{32683183-48a0-441b-a342-7c2a440a9478}"="Media Band"
"{169A0691-8DF9-11d1-A1C4-00C04FD75D13}"="In-pane search"
"{07798131-AF23-11d1-9111-00A0C98BA67D}"="Web Search"
"{AF4F6510-F982-11d0-8595-00AA004CD6D8}"="Registry Tree Options Utility"
"{01E04581-4EEE-11d0-BFE9-00AA005B4383}"="&Address"
"{A08C11D2-A228-11d0-825B-00AA005B4383}"="Address EditBox"
"{00BB2763-6A77-11D0-A535-00C04FD7D062}"="Microsoft AutoComplete"
"{7376D660-C583-11d0-A3A5-00C04FD706EC}"="TridentImageExtractor"
"{6756A641-DE71-11d0-831B-00AA005B4383}"="MRU AutoComplete List"
"{6935DB93-21E8-4ccc-BEB9-9FE3C77A297A}"="Custom MRU AutoCompleted List"
"{7e653215-fa25-46bd-a339-34a2790f3cb7}"="Accessible"
"{acf35015-526e-4230-9596-becbe19f0ac9}"="Track Popup Bar"
"{E0E11A09-5CB8-4B6C-8332-E00720A168F2}"="Address Bar Parser"
"{00BB2764-6A77-11D0-A535-00C04FD7D062}"="Microsoft History AutoComplete List"
"{03C036F1-A186-11D0-824A-00AA005B4383}"="Microsoft Shell Folder AutoComplete List"
"{00BB2765-6A77-11D0-A535-00C04FD7D062}"="Microsoft Multiple AutoComplete List Container"
"{ECD4FC4E-521C-11D0-B792-00A0C90312E1}"="Shell Band Site Menu"
"{3CCF8A41-5C85-11d0-9796-00AA00B90ADF}"="Shell DeskBarApp"
"{ECD4FC4C-521C-11D0-B792-00A0C90312E1}"="Shell DeskBar"
"{ECD4FC4D-521C-11D0-B792-00A0C90312E1}"="Shell Rebar BandSite"
"{DD313E04-FEFF-11d1-8ECD-0000F87A470C}"="User Assist"
"{EF8AD2D1-AE36-11D1-B2D2-006097DF8C11}"="Global Folder Settings"
"{EFA24E61-B078-11d0-89E4-00C04FC9E26E}"="Favorites Band"
"{0A89A860-D7B1-11CE-8350-444553540000}"="Shell Automation Inproc Service"
"{E7E4BC40-E76A-11CE-A9BB-00AA004AE837}"="Shell DocObject Viewer"
"{A5E46E3A-8849-11D1-9D8C-00C04FC99D61}"="Microsoft Browser Architecture"
"{FBF23B40-E3F0-101B-8488-00AA003E56F8}"="InternetShortcut"
"{3C374A40-BAE4-11CF-BF7D-00AA006946EE}"="Microsoft Url History Service"
"{FF393560-C2A7-11CF-BFF4-444553540000}"="History"
"{7BD29E00-76C1-11CF-9DD0-00A0C9034933}"="Temporary Internet Files"
"{7BD29E01-76C1-11CF-9DD0-00A0C9034933}"="Temporary Internet Files"
"{CFBFAE00-17A6-11D0-99CB-00C04FD64497}"="Microsoft Url Search Hook"
"{A2B0DD40-CC59-11d0-A3A5-00C04FD706EC}"="IE4 Suite Splash Screen"
"{67EA19A0-CCEF-11d0-8024-00C04FD75D13}"="CDF Extension Copy Hook"
"{131A6951-7F78-11D0-A979-00C04FD705A2}"="ISFBand OC"
"{9461b922-3c5a-11d2-bf8b-00c04fb93661}"="Search Assistant OC"
"{3DC7A020-0ACD-11CF-A9BB-00AA004AE837}"="The Internet"
"{871C5380-42A0-1069-A2EA-08002B30309D}"="Internet Name Space"
"{EFA24E64-B078-11d0-89E4-00C04FC9E26E}"="Explorer Band"
"{352EC2B7-8B9A-11D1-B8AE-006008059382}"="Shell Application Manager"
"{0B124F8F-91F0-11D1-B8B5-006008059382}"="Installed Apps Enumerator"
"{CFCCC7A0-A282-11D1-9082-006008059382}"="Darwin App Publisher"
"{e84fda7c-1d6a-45f6-b725-cb260c236066}"="Shell Image Verbs"
"{66e4e4fb-f385-4dd0-8d74-a2efd1bc6178}"="Shell Image Data Factory"
"{3F30C968-480A-4C6C-862D-EFC0897BB84B}"="GDI+ file thumbnail extractor"
"{9DBD2C50-62AD-11d0-B806-00C04FD706EC}"="Summary Info Thumbnail handler (DOCFILES)"
"{EAB841A0-9550-11cf-8C16-00805F1408F3}"="HTML Thumbnail Extractor"
"{eb9b1153-3b57-4e68-959a-a3266bc3d7fe}"="Shell Image Property Handler"
"{CC6EEFFB-43F6-46c5-9619-51D571967F7D}"="Web Publishing Wizard"
"{add36aa8-751a-4579-a266-d66f5202ccbb}"="Print Ordering via the Web"
"{6b33163c-76a5-4b6c-bf21-45de9cd503a1}"="Shell Publishing Wizard Object"
"{58f1f272-9240-4f51-b6d4-fd63d1618591}"="Get a Passport Wizard"
"{7A9D77BD-5403-11d2-8785-2E0420524153}"="User Accounts"
"{BD472F60-27FA-11cf-B8B4-444553540000}"="Compressed (zipped) Folder Right Drag Handler"
"{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}"="Compressed (zipped) Folder SendTo Target"
"{63da6ec0-2e98-11cf-8d82-444553540000}"="FTP Folders Webview"
"{883373C3-BF89-11D1-BE35-080036B11A03}"="Microsoft DocProp Shell Ext"
"{A9CF0EAE-901A-4739-A481-E35B73E47F6D}"="Microsoft DocProp Inplace Edit Box Control"
"{8EE97210-FD1F-4B19-91DA-67914005F020}"="Microsoft DocProp Inplace ML Edit Box Control"
"{0EEA25CC-4362-4A12-850B-86EE61B0D3EB}"="Microsoft DocProp Inplace Droplist Combo Control"
"{6A205B57-2567-4A2C-B881-F787FAB579A3}"="Microsoft DocProp Inplace Calendar Control"
"{28F8A4AC-BBB3-4D9B-B177-82BFC914FA33}"="Microsoft DocProp Inplace Time Control"
"{8A23E65E-31C2-11d0-891C-00A024AB2DBB}"="Directory Query UI"
"{9E51E0D0-6E0F-11d2-9601-00C04FA31A86}"="Shell properties for a DS object"
"{163FDC20-2ABC-11d0-88F0-00A024AB2DBB}"="Directory Object Find"
"{F020E586-5264-11d1-A532-0000F8757D7E}"="Directory Start/Search Find"
"{0D45D530-764B-11d0-A1CA-00AA00C16E65}"="Directory Property UI"
"{62AE1F9A-126A-11D0-A14B-0800361B1103}"="Directory Context Menu Verbs"
"{ECF03A33-103D-11d2-854D-006008059367}"="MyDocs Copy Hook"
"{ECF03A32-103D-11d2-854D-006008059367}"="MyDocs Drop Target"
"{4a7ded0a-ad25-11d0-98a8-0800361b1103}"="MyDocs Properties"
"{750fdf0e-2a26-11d1-a3ea-080036587f03}"="Offline Files Menu"
"{10CFC467-4392-11d2-8DB4-00C04FA31A66}"="Offline Files Folder Options"
"{AFDB1F70-2A4C-11d2-9039-00C04F8EEB3E}"="Offline Files Folder"
"{143A62C8-C33B-11D1-84FE-00C04FA34A14}"="Microsoft Agent Character Property Sheet Handler"
"{ECCDF543-45CC-11CE-B9BF-0080C87CDBA6}"="DfsShell"
"{60fd46de-f830-4894-a628-6fa81bc0190d}"="%DESC_PublishDropTarget%"
"{7A80E4A8-8005-11D2-BCF8-00C04F72C717}"="MMC Icon Handler"
"{0CD7A5C0-9F37-11CE-AE65-08002B2E1262}"=".CAB file viewer"
"{32714800-2E5F-11d0-8B85-00AA0044F941}"="For &People..."
"{8DD448E6-C188-4aed-AF92-44956194EB1F}"="Windows Media Player Play as Playlist Context Menu Handler"
"{CE3FB1D1-02AE-4a5f-A6E9-D9F1B4073E6C}"="Windows Media Player Burn Audio CD Context Menu Handler"
"{F1B9284F-E9DC-4e68-9D7E-42362A59F0FD}"="Windows Media Player Add to Playlist Context Menu Handler"
"{9E1128F1-53FA-11D5-8490-0048548030CA}"="Merriam-Webster"
"{F0CB00CD-5A07-4D91-97F5-A8C92CDA93E4}"="Shell Extensions for RealOne Player"
"{02040CD1-EF11-11D5-BC3F-0003473F5BF0}"="HotShell Shell Extension"
"{E0D79304-84BE-11CE-9641-444553540000}"="WinZip"
"{E0D79305-84BE-11CE-9641-444553540000}"="WinZip"
"{E0D79306-84BE-11CE-9641-444553540000}"="WinZip"
"{32020A01-506E-484D-A2A8-BE3CF17601C3}"="AlcoholShellEx"
"{5F327514-6C5E-4d60-8F16-D07FA08A78ED}"="Auto Update Property Sheet Extension"
"{A5B83E36-5D16-47E8-BADB-6EE748B33093}"="TZ Shredder Context Menu"
"{BDEADF00-C265-11D0-BCED-00A0C90AB50F}"="Web Folders"
"{00020D75-0000-0000-C000-000000000046}"="Microsoft Office Outlook Desktop Icon Handler"
"{0006F045-0000-0000-C000-000000000046}"="Microsoft Office Outlook Custom Icon Handler"
"{42042206-2D85-11D3-8CFF-005004838597}"="Microsoft Office HTML Icon Handler"
"{BDA77241-42F6-11d0-85E2-00AA001FE28C}"="LDVP Shell Extensions"
"{640167b4-59b0-47a6-b335-a6b3c0695aea}"="Portable Media Devices"
"{cc86590a-b60a-48e6-996b-41d25ed39a1e}"="Portable Media Devices Menu"
"{9E56BE60-C50F-11CF-9A2C-00A0C90A90CE}"="Sendmail service"
"{9E56BE61-C50F-11CF-9A2C-00A0C90A90CE}"="Sendmail service"
"{E6FB5E20-DE35-11CF-9C87-00AA005127ED}"="WebCheck"
"{ABBE31D0-6DAE-11D0-BECA-00C04FD940BE}"="Subscription Mgr"
"{F5175861-2688-11d0-9C5E-00AA00A45957}"="Subscription Folder"
"{08165EA0-E946-11CF-9C87-00AA005127ED}"="WebCheckWebCrawler"
"{E3A8BDE6-ABCE-11d0-BC4B-00C04FD929DB}"="WebCheckChannelAgent"
"{E8BB6DC0-6B4E-11d0-92DB-00A0C90C2BD7}"="TrayAgent"
"{7D559C10-9FE9-11d0-93F7-00AA0059CE02}"="Code Download Agent"
"{E6CC6978-6B6E-11D0-BECA-00C04FD940BE}"="ConnectionAgent"
"{D8BD2030-6FC9-11D0-864F-00AA006809D9}"="PostAgent"
"{7FC0B86E-5FA7-11d1-BC7C-00C04FD929DB}"="WebCheck SyncMgr Handler"
"{88C6C381-2E85-11D0-94DE-444553540000}"="ActiveX Cache Folder"
"{5a61f7a0-cde1-11cf-9113-00aa00425c62}"="IIS Shell Extension"
"{e57ce731-33e8-4c51-8354-bb4de9d215d1}"="Universal Plug and Play Devices"
"{D25B2CAB-8A9A-4517-A9B2-CB5F68A5A802}"="Adobe.Acrobat.ContextMenu"
"{2E825AEF-A1EB-466F-839A-D114627330F3}"=""
"{f39a0dc0-9cc8-11d0-a599-00c04fd64433}"="Channel File"
"{f3aa0dc0-9cc8-11d0-a599-00c04fd64434}"="Channel Shortcut"
"{f3ba0dc0-9cc8-11d0-a599-00c04fd64435}"="Channel Handler Object"
"{f3da0dc0-9cc8-11d0-a599-00c04fd64437}"="Channel Menu"
"{f3ea0dc0-9cc8-11d0-a599-00c04fd64438}"="Channel Properties"
"{6F3C71D7-EA47-4124-862E-85D6258FDB59}"=""

**********************************************************************************
HKEY ROOT CLASSIDS:
Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{2E825AEF-A1EB-466F-839A-D114627330F3}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{2E825AEF-A1EB-466F-839A-D114627330F3}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\CLSID\{2E825AEF-A1EB-466F-839A-D114627330F3}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{2E825AEF-A1EB-466F-839A-D114627330F3}\InprocServer32]
@="C:\\WINDOWS2\\system32\\jtdvwsdk.dll"
"ThreadingModel"="Apartment"

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{6F3C71D7-EA47-4124-862E-85D6258FDB59}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{6F3C71D7-EA47-4124-862E-85D6258FDB59}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\CLSID\{6F3C71D7-EA47-4124-862E-85D6258FDB59}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{6F3C71D7-EA47-4124-862E-85D6258FDB59}\InprocServer32]
@="C:\\WINDOWS2\\system32\\ivfgnt5.dll"
"ThreadingModel"="Apartment"

**********************************************************************************
Files Found are not all bad files:
Locate .tmp files:
**********************************************************************************
Directory Listing of system files:
Volume in drive C has no label.
Volume Serial Number is 3D13-08EB

Directory of C:\WINDOWS2\System32

09/01/2005 09:11 AM 417,792 jtdvwsdk.dll
08/29/2005 12:15 PM 417,792 guard.tmp
08/22/2005 10:09 AM 417,792 MMC71ITA.DLL
08/08/2005 08:28 AM 401,408 ??plorer.exe
05/21/2002 12:34 PM <DIR> Microsoft
05/21/2002 11:23 AM <DIR> dllcache
4 File(s) 1,654,784 bytes
2 Dir(s) 19,502,727,168 bytes free


Logfile of HijackThis v1.99.1
Scan saved at 3:45:21 PM, on 9/1/2005
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2600.0000)

Running processes:
C:\WINDOWS2\System32\smss.exe
C:\WINDOWS2\system32\winlogon.exe
C:\WINDOWS2\system32\services.exe
C:\WINDOWS2\system32\lsass.exe
C:\WINDOWS2\system32\svchost.exe
C:\WINDOWS2\System32\svchost.exe
C:\WINDOWS2\system32\rundll32.exe
C:\WINDOWS2\Explorer.EXE
C:\WINDOWS2\System32\ctfmon.exe
C:\WINDOWS2\system32\RUNDLL32.EXE
C:\WINDOWS2\System32\wintask.exe
C:\WINDOWS2\System32\ybub\enfpmjqj.exe
C:\WINDOWS2\System32\bkusewvq\dgyeg.exe
C:\WINDOWS2\System32\ptwtkfg\dipyth.exe
C:\WINDOWS2\System32\swerm\evpohg.exe
C:\WINDOWS2\System32\ngxq\bpxlf.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS2\System32\cmd.exe
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
O1 - Hosts: 216.39.69.102 view.atdmt.com
O2 - BHO: SDWin32 Class - {05CF22C3-4503-46AA-A118-238D2E343879} - C:\WINDOWS2\System32\pqojv.dll (file missing)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SDWin32 Class - {1E0FFDCA-99E4-486B-A7AA-70A67AC70A79} - C:\WINDOWS2\System32\nvzvw.dll (file missing)
O2 - BHO: SDWin32 Class - {2B68B487-999E-4BD9-8A32-DA6EB1A1932A} - C:\WINDOWS2\System32\plirq.dll
O2 - BHO: CControl Object - {3643ABC2-21BF-46B9-B230-F247DB0C6FD6} - C:\Program Files\E2G\IeBHOs.dll
O2 - BHO: SDWin32 Class - {3B6795D7-73EE-4579-89AA-EE95EEFA845F} - C:\WINDOWS2\System32\zykdj.dll (file missing)
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: (no name) - {9F27F00B-194A-31B9-E685-F5BEF216B714} - C:\WINDOWS2\System32\qnxjwyrc\qydnjoey.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS2\System32\msdxm.ocx
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~2\VPTray.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [Apvxdwin] C:\WINDOWS2\System32\APVXDWIN.EXE
O4 - HKLM\..\Run: [IPSecMon] C:\Program Files\Common files\VPN Network\IPSecMon.exe /vpncheck
O4 - HKLM\..\Run: [Windows Update AutoUpdate Client] C:\WINDOWS2\System32\winupd\wuauclt.exe
O4 - HKLM\..\Run: [REAL] C:\Program Files\REAL\realjbox.exe
O4 - HKLM\..\Run: [SpybotSnD] "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe" /autocheck
O4 - HKLM\..\Run: [DSB] C:\Program Files\DSB\dsb.exe
O4 - HKLM\..\Run: [eTrust Realtime Monitor] C:\WINDOWS2\System32\realmon.exe /start
O4 - HKLM\..\Run: [version] C:\WINDOWS2\System32\Uebtbx.exe
O4 - HKLM\..\Run: [secure] C:\WINDOWS2\System32\Ijttkz.exe
O4 - HKLM\..\Run: [SHA256] C:\Program Files\SHA256\secure.exe
O4 - HKLM\..\Run: [winsync] C:\WINDOWS2\System32\lpkdg4.exe reg_run
O4 - HKLM\..\Run: [Recguard] C:\Program Files\HP\recguard.exe
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [AUNPS2] RUNDLL32 AUNPS2.DLL,_Run@16
O4 - HKLM\..\Run: [plirqc] C:\WINDOWS2\System32\plirqc.exe
O4 - HKLM\..\Run: [WinTask driver] C:\WINDOWS2\System32\wintask.exe
O4 - HKLM\..\Run: [VBundleOuterDL] C:\Program Files\VBouncer\BundleOuter.EXE
O4 - HKLM\..\Run: [enfpmjqj] C:\WINDOWS2\System32\ybub\enfpmjqj.exe
O4 - HKLM\..\Run: [dgyeg] C:\WINDOWS2\System32\bkusewvq\dgyeg.exe
O4 - HKLM\..\Run: [dipyth] C:\WINDOWS2\System32\ptwtkfg\dipyth.exe
O4 - HKLM\..\Run: [evpohg] C:\WINDOWS2\System32\swerm\evpohg.exe
O4 - HKLM\..\Run: [bpxlf] C:\WINDOWS2\System32\ngxq\bpxlf.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS2\System32\ctfmon.exe
O4 - HKCU\..\Run: [Oahu] C:\Program Files\srtc\csue.exe
O4 - HKCU\..\Run: [Lpmhr] C:\WINDOWS2\System32\??plorer.exe
O4 - HKCU\..\Run: [msvttk] C:\WINDOWS2\System32\msvttk.exe
O4 - Global Startup: Live Menu.lnk = C:\Program Files\Common Files\efax\Dllcmd32.exe
O4 - Global Startup: eFax.com Tray Menu.lnk.disabled
O4 - Global Startup: nadt.exe
O8 - Extra context menu item: Convert link target to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert link target to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert selected links to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert selected links to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Convert selection to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert selection to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O9 - Extra button: (no name) - {9E248641-0E24-4DDB-9A1F-705087832AD6} - (no file)
O9 - Extra 'Tools' menuitem: Java - {9E248641-0E24-4DDB-9A1F-705087832AD6} - (no file)
O16 - DPF: {04E214E5-63AF-4236-83C6-A7ADCBF9BD02} (HouseCall Control) - http://housecall60.trendmicro.com/housecall/xscan60.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {4208FB4D-4E53-4F5A-BF7A-3E047DDB5281} (ActiveX Control) - http://www.icannnews.com/app/ST/ActiveX.ocx
O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcafee.com/molbin/shared/m...96/mcinsctl.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004061...all/xscan53.cab
O16 - DPF: {85D1F3B2-2A21-11D7-97B9-0010DC2A6243} (SecureLogin class) - http://secure2.comned.com/signuptemplates/...login-devel.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/binFramework/v10/ZIntro.cab27513.cab
O16 - DPF: {BB21F850-63F4-4EC9-BF9D-565BD30C9AE9} (ASquaredScanForm Element) - http://www.windowsecurity.com/trojanscan/axscan.cab
O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} (DwnldGroupMgr Class) - http://download.mcafee.com/molbin/shared/m...,26/mcgdmgr.cab
O16 - DPF: {F58E1CEF-A068-4C15-BA5E-587CAF3EE8C6} (MSN Chat Control 4.5) - http://chat.msn.com/bin/msnchat45.cab
O20 - Winlogon Notify: AdminDebug - C:\WINDOWS2\system32\MMC71ITA.DLL
O20 - Winlogon Notify: NavLogon - C:\WINDOWS2\System32\NavLogon.dll
O20 - Winlogon Notify: PCANotify - C:\WINDOWS2\SYSTEM32\PCANotify.dll
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: Command Service (cmdService) - Unknown owner - C:\WINDOWS2\SmVycnkgQmxhY2t3ZWxs\command.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: dgyegbkusewvq - Unknown owner - C:\WINDOWS2\System32\bkusewvq\dgyeg.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS2\System32\HPZipm12.exe
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe

#5 suebaby41

suebaby41

    W.A.M. (Women Against Malware)


  • Malware Response Team
  • 6,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:South Carolina, USA
  • Local time:02:48 PM

Posted 01 September 2005 - 05:23 PM

Please close any programs you have open since this step requires a reboot.

From the l2mfix folder on your desktop, double click l2mfix.bat and select option #2 for Run Fix by typing 2 and then pressing enter, then press any key to reboot your computer. After a reboot, your desktop and icons will appear, then disappear (this is normal). L2mfix will continue to scan your computer and when it's finished, notepad will open with a log. Copy the contents of that log and paste it back into this thread, along with a new hijackthis log.

IMPORTANT: Do NOT run any other files in the l2mfix folder unless you are asked to do so!
You don't stop laughing when you get old; you get old when you stop laughing.
A Member of U-N-I-T-E (Unified Network of Instructors and Trained Eliminators)
Malware Removal University Masters Graduate

Posted Image
Join The Fight Against Malware
No reply within 5 days will result in your topic being closed. If you need more time, please let me know by posting in this topic so that your topic will not be closed.

#6 jerry109999

jerry109999
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:48 PM

Posted 02 September 2005 - 10:00 AM

Hey,

I will be around until about 3:00 pm cst today. Thanks again for your help. The bug or whatever will not let me on the internet in regular mode but i can still get in in safe mode which is what i am doing. I also am getting error messages on start up. Below is the hijackthis log and below that is the other log.

Logfile of HijackThis v1.99.1
Scan saved at 9:54:07 AM, on 9/2/2005
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2600.0000)

Running processes:
C:\WINDOWS2\System32\smss.exe
C:\WINDOWS2\system32\winlogon.exe
C:\WINDOWS2\system32\services.exe
C:\WINDOWS2\system32\lsass.exe
C:\WINDOWS2\system32\svchost.exe
C:\WINDOWS2\System32\svchost.exe
C:\WINDOWS2\Explorer.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS2\System32\ctfmon.exe
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
O1 - Hosts: 216.39.69.102 view.atdmt.com
O2 - BHO: SDWin32 Class - {05CF22C3-4503-46AA-A118-238D2E343879} - C:\WINDOWS2\System32\pqojv.dll (file missing)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SDWin32 Class - {1E0FFDCA-99E4-486B-A7AA-70A67AC70A79} - C:\WINDOWS2\System32\nvzvw.dll (file missing)
O2 - BHO: SDWin32 Class - {2B68B487-999E-4BD9-8A32-DA6EB1A1932A} - C:\WINDOWS2\System32\plirq.dll
O2 - BHO: CControl Object - {3643ABC2-21BF-46B9-B230-F247DB0C6FD6} - C:\Program Files\E2G\IeBHOs.dll
O2 - BHO: SDWin32 Class - {3B6795D7-73EE-4579-89AA-EE95EEFA845F} - C:\WINDOWS2\System32\zykdj.dll (file missing)
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: (no name) - {9F27F00B-194A-31B9-E685-F5BEF216B714} - C:\WINDOWS2\System32\qnxjwyrc\qydnjoey.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS2\System32\msdxm.ocx
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~2\VPTray.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [Apvxdwin] C:\WINDOWS2\System32\APVXDWIN.EXE
O4 - HKLM\..\Run: [IPSecMon] C:\Program Files\Common files\VPN Network\IPSecMon.exe /vpncheck
O4 - HKLM\..\Run: [Windows Update AutoUpdate Client] C:\WINDOWS2\System32\winupd\wuauclt.exe
O4 - HKLM\..\Run: [REAL] C:\Program Files\REAL\realjbox.exe
O4 - HKLM\..\Run: [SpybotSnD] "C:\Program Files\Spybot - Search & Destroy\spybotsd.exe"
O4 - HKLM\..\Run: [DSB] C:\Program Files\DSB\dsb.exe
O4 - HKLM\..\Run: [eTrust Realtime Monitor] C:\WINDOWS2\System32\realmon.exe /start
O4 - HKLM\..\Run: [version] C:\WINDOWS2\System32\Uebtbx.exe
O4 - HKLM\..\Run: [secure] C:\WINDOWS2\System32\Ijttkz.exe
O4 - HKLM\..\Run: [SHA256] C:\Program Files\SHA256\secure.exe
O4 - HKLM\..\Run: [winsync] C:\WINDOWS2\System32\atnupr.exe reg_run
O4 - HKLM\..\Run: [Recguard] C:\Program Files\HP\recguard.exe
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [plirqc] C:\WINDOWS2\System32\plirqc.exe
O4 - HKLM\..\Run: [WinTask driver] C:\WINDOWS2\System32\wintask.exe
O4 - HKLM\..\Run: [VBundleOuterDL] C:\Program Files\VBouncer\BundleOuter.EXE
O4 - HKLM\..\Run: [enfpmjqj] C:\WINDOWS2\System32\ybub\enfpmjqj.exe
O4 - HKLM\..\Run: [dgyeg] C:\WINDOWS2\System32\bkusewvq\dgyeg.exe
O4 - HKLM\..\Run: [dipyth] C:\WINDOWS2\System32\ptwtkfg\dipyth.exe
O4 - HKLM\..\Run: [evpohg] C:\WINDOWS2\System32\swerm\evpohg.exe
O4 - HKLM\..\Run: [bpxlf] C:\WINDOWS2\System32\ngxq\bpxlf.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS2\System32\ctfmon.exe
O4 - HKCU\..\Run: [Lpmhr] C:\WINDOWS2\System32\??plorer.exe
O4 - HKCU\..\Run: [msvttk] C:\WINDOWS2\System32\msvttk.exe
O4 - HKCU\..\Run: [Oahu] C:\Program Files\srtc\csue.exe
O4 - HKCU\..\RunOnce: [msvttk] C:\WINDOWS2\System32\msvttk.exe
O4 - Global Startup: Live Menu.lnk = C:\Program Files\Common Files\efax\Dllcmd32.exe
O4 - Global Startup: eFax.com Tray Menu.lnk.disabled
O8 - Extra context menu item: Convert link target to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert link target to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert selected links to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert selected links to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Convert selection to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert selection to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O9 - Extra button: (no name) - {9E248641-0E24-4DDB-9A1F-705087832AD6} - C:\WINDOWS2\System32\datadx.dll
O9 - Extra 'Tools' menuitem: Java - {9E248641-0E24-4DDB-9A1F-705087832AD6} - C:\WINDOWS2\System32\datadx.dll
O16 - DPF: {04E214E5-63AF-4236-83C6-A7ADCBF9BD02} (HouseCall Control) - http://housecall60.trendmicro.com/housecall/xscan60.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {4208FB4D-4E53-4F5A-BF7A-3E047DDB5281} (ActiveX Control) - http://www.icannnews.com/app/ST/ActiveX.ocx
O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcafee.com/molbin/shared/m...96/mcinsctl.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004061...all/xscan53.cab
O16 - DPF: {85D1F3B2-2A21-11D7-97B9-0010DC2A6243} (SecureLogin class) - http://secure2.comned.com/signuptemplates/...login-devel.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/binFramework/v10/ZIntro.cab27513.cab
O16 - DPF: {BB21F850-63F4-4EC9-BF9D-565BD30C9AE9} (ASquaredScanForm Element) - http://www.windowsecurity.com/trojanscan/axscan.cab
O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} (DwnldGroupMgr Class) - http://download.mcafee.com/molbin/shared/m...,26/mcgdmgr.cab
O16 - DPF: {F58E1CEF-A068-4C15-BA5E-587CAF3EE8C6} (MSN Chat Control 4.5) - http://chat.msn.com/bin/msnchat45.cab
O20 - Winlogon Notify: NavLogon - C:\WINDOWS2\System32\NavLogon.dll
O20 - Winlogon Notify: PCANotify - C:\WINDOWS2\SYSTEM32\PCANotify.dll
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: Command Service (cmdService) - Unknown owner - C:\WINDOWS2\SmVycnkgQmxhY2t3ZWxs\command.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: dgyegbkusewvq - Unknown owner - C:\WINDOWS2\System32\bkusewvq\dgyeg.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS2\System32\HPZipm12.exe
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe


Setting Directory
C:\
C:\
System Rebooted!

Running From:
C:\

killing explorer and rundll32.exe

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 Craig.Peacock@beyondlogic.org
Killing PID 1148 'explorer.exe'

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 Craig.Peacock@beyondlogic.org
Killing PID 1188 'rundll32.exe'

Scanning First Pass. Please Wait!

First Pass Completed

Second Pass Scanning

Second pass Completed!
Backing Up: C:\WINDOWS2\system32\aeicap.dll
1 file(s) copied.
Backing Up: C:\WINDOWS2\system32\aeicap.dll
1 file(s) copied.
Backing Up: C:\WINDOWS2\system32\MMC71ITA.DLL
1 file(s) copied.
Backing Up: C:\WINDOWS2\system32\MMC71ITA.DLL
1 file(s) copied.
Backing Up: C:\WINDOWS2\system32\guard.tmp
1 file(s) copied.
Backing Up: C:\WINDOWS2\system32\guard.tmp
1 file(s) copied.
deleting: C:\WINDOWS2\system32\aeicap.dll
Successfully Deleted: C:\WINDOWS2\system32\aeicap.dll
deleting: C:\WINDOWS2\system32\aeicap.dll
Successfully Deleted: C:\WINDOWS2\system32\aeicap.dll
deleting: C:\WINDOWS2\system32\MMC71ITA.DLL
Successfully Deleted: C:\WINDOWS2\system32\MMC71ITA.DLL
deleting: C:\WINDOWS2\system32\MMC71ITA.DLL
Successfully Deleted: C:\WINDOWS2\system32\MMC71ITA.DLL
deleting: C:\WINDOWS2\system32\guard.tmp
Successfully Deleted: C:\WINDOWS2\system32\guard.tmp
deleting: C:\WINDOWS2\system32\guard.tmp
Successfully Deleted: C:\WINDOWS2\system32\guard.tmp

Desktop.ini sucessfully removed


Zipping up files for submission:
adding: aeicap.dll (deflated 48%)
adding: MMC71ITA.DLL (deflated 48%)
adding: guard.tmp (deflated 48%)
adding: clear.reg (deflated 36%)
adding: desktop.ini (stored 0%)
adding: lo2.txt (deflated 73%)
adding: test2.txt (deflated 16%)
adding: test3.txt (deflated 16%)
adding: test5.txt (deflated 16%)
adding: test.txt (deflated 72%)
adding: xfind.txt (deflated 68%)

Restoring Registry Permissions:


RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright © 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!


Revoking access for predefined group "Administrators"
Inherited ACE can not be revoked here!
Inherited ACE can not be revoked here!


Registry permissions set too:

RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright © 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!

Access Control List for Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify:
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-NI) ALLOW Read BUILTIN\Users
(ID-IO) ALLOW Read BUILTIN\Users
(ID-NI) ALLOW Read BUILTIN\Power Users
(ID-IO) ALLOW Read BUILTIN\Power Users
(ID-NI) ALLOW Full access BUILTIN\Administrators
(ID-IO) ALLOW Full access BUILTIN\Administrators
(ID-NI) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access CREATOR OWNER


Restoring Sedebugprivilege:

Granting SeDebugPrivilege to Administrators ... successful

Restoring Windows Update Certificates.:

deleting local copy: aeicap.dll
deleting local copy: aeicap.dll
deleting local copy: MMC71ITA.DLL
deleting local copy: MMC71ITA.DLL
deleting local copy: guard.tmp
deleting local copy: guard.tmp

The following Is the Current Export of the Winlogon notify key:
****************************************************************************
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt32chain]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,33,00,32,00,2e,00,64,00,6c,00,\
6c,00,00,00
"Logoff"="ChainWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cryptnet]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,6e,00,65,00,74,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Logoff"="CryptnetWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cscdll]
"DLLName"="cscdll.dll"
"Logon"="WinlogonLogonEvent"
"Logoff"="WinlogonLogoffEvent"
"ScreenSaver"="WinlogonScreenSaverEvent"
"Startup"="WinlogonStartupEvent"
"Shutdown"="WinlogonShutdownEvent"
"StartShell"="WinlogonStartShellEvent"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\NavLogon]
"Logoff"="NavLogoffEvent"
"StartShell"="NavStartShellEvent"
"DllName"="C:\\WINDOWS2\\System32\\NavLogon.dll"
"LoginDomain"="ESCOPETA"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\PCANotify]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"Unlock"="WLEventUnlock"
"Lock"="WLEventLock"
"Startup"="WLEventStartup"
"DllName"="PCANotify.dll"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ScCertProp]
"DLLName"="wlnotify.dll"
"Logon"="SCardStartCertProp"
"Logoff"="SCardStopCertProp"
"Lock"="SCardSuspendCertProp"
"Unlock"="SCardResumeCertProp"
"Enabled"=dword:00000001
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Schedule]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"StartShell"="SchedStartShell"
"Logoff"="SchedEventLogOff"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\sclgntfy]
"Logoff"="WLEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001
"DllName"=hex(2):73,00,63,00,6c,00,67,00,6e,00,74,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SensLogn]
"DLLName"="WlNotify.dll"
"Lock"="SensLockEvent"
"Logon"="SensLogonEvent"
"Logoff"="SensLogoffEvent"
"Safe"=dword:00000001
"MaxWait"=dword:00000258
"StartScreenSaver"="SensStartScreenSaverEvent"
"StopScreenSaver"="SensStopScreenSaverEvent"
"Startup"="SensStartupEvent"
"Shutdown"="SensShutdownEvent"
"StartShell"="SensStartShellEvent"
"PostShell"="SensPostShellEvent"
"Disconnect"="SensDisconnectEvent"
"Reconnect"="SensReconnectEvent"
"Unlock"="SensUnlockEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\termsrv]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"Logoff"="TSEventLogoff"
"Logon"="TSEventLogon"
"PostShell"="TSEventPostShell"
"Shutdown"="TSEventShutdown"
"StartShell"="TSEventStartShell"
"Startup"="TSEventStartup"
"MaxWait"=dword:00000258
"Reconnect"="TSEventReconnect"
"Disconnect"="TSEventDisconnect"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlballoon]
"DLLName"="wlnotify.dll"
"Logon"="RegisterTicketExpiredNotificationEvent"
"Logoff"="UnregisterTicketExpiredNotificationEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wzcnotif]
"DLLName"="wzcdlg.dll"
"Logon"="WZCEventLogon"
"Logoff"="WZCEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000000


The following are the files found:
****************************************************************************
C:\WINDOWS2\system32\aeicap.dll
C:\WINDOWS2\system32\aeicap.dll
C:\WINDOWS2\system32\MMC71ITA.DLL
C:\WINDOWS2\system32\MMC71ITA.DLL
C:\WINDOWS2\system32\guard.tmp
C:\WINDOWS2\system32\guard.tmp

Registry Entries that were Deleted:
Please verify that the listing looks ok.
If there was something deleted wrongly there are backups in the backreg folder.
****************************************************************************
REGEDIT4

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]
"{2E825AEF-A1EB-466F-839A-D114627330F3}"=-
"{6F3C71D7-EA47-4124-862E-85D6258FDB59}"=-
[-HKEY_CLASSES_ROOT\CLSID\{2E825AEF-A1EB-466F-839A-D114627330F3}]
[-HKEY_CLASSES_ROOT\CLSID\{6F3C71D7-EA47-4124-862E-85D6258FDB59}]
REGEDIT4

[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
****************************************************************************
Desktop.ini Contents:
****************************************************************************
[.ShellClassInfo]
CLSID={645FF040-5081-101B-9F08-00AA002F954E}
****************************************************************************


#7 suebaby41

suebaby41

    W.A.M. (Women Against Malware)


  • Malware Response Team
  • 6,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:South Carolina, USA
  • Local time:02:48 PM

Posted 02 September 2005 - 01:33 PM

To help prevent further infection, please download and install SpywareBlaster SpywareBlaster will help to:
  • prevent the installation of ActiveX-based spyware, adware, browser hijackers, dialers, and other potentially unwanted software.
  • block spyware/tracking cookies in Internet Explorer and Mozilla/Firefox.
  • restrict the actions of potentially unwanted sites in Internet Explorer.


Using Windows Explorer, search for and delete this folder:

C:\isubmit


To get rid of the Qoologic infection, we need to use Ewido which is a good program to have. The free version (after the 14 day trial period) scans and removes Trojans. The most notable losses after the 14 day trial period are the automatic updating and the Guard portion. After the 14 day trial period, you will have to update the free version yourself. You can update Ewido HERE

Please download Ewido Security Suite
  • Install Ewido Security Suite
  • When installing, under "Additional Options" uncheck "Install background guard" and "Install scan via context menu."
  • Launch Ewido, there should be a big "E" icon on your desktop, double-click it.
  • The program will prompt you to update click the "OK" button
  • The program will now go to the main screen
  • You will need to update Ewido to the latest definition files.
    • On the left hand side of the main screen click update
    • Click on Start
    • The update will start and a progress bar will show the updates being installed. After the updates are installed, exit Ewido.
  • If you have an "always on" connection to the internet, physically disconnect that connection until you are finished with Safe Mode and have rebooted back into normal mode.
  • Reboot into Safe Mode, you can do this by restarting your computer, then continually tapping F8 until a menu appears. Use your up arrow key to highlight Safe Mode, then hit enter.
  • Run Ewido..
  • Close all open windows/programs/folders. Have nothing else open while Ewido performs its scan!
  • Click on scanner
  • Click on Settings
    • Under "How to scan" all boxes should be selected
    • Under "Possibly unwanted software" all boxes should be selected
    • Under "What to scan" select scan every file
    • Click OK
  • Click on Complete system scan
  • Let the program scan the machine
  • If Ewido finds anything, it will pop up a notification. NOTE: We have been finding some cases of false positives with the new version of Ewido, so we need to step through the fixes one-by-one. If Ewido finds something that you KNOW is legitimate (for example, parts of AVG Antivirus, AOL, pcAnywhere and the game "Risk" have been flagged. In particular, watch for alerts that have the word "Heuristic" in them - if you recognize the file name
    as "friendly," these may actually be false positives) select "none" as the action. DO NOT check "Perform action with all infections." If you are unsure of an entry, select "none" for the time being. I'll see that in the log you will post later and let you know if Ewido needs to be run again.
  • Once the scan has completed, there will be a button located on the bottom of the screen named Save report.
  • Click Save report
  • Save the report to your desktop
  • Exit Ewido.
  • Reboot to normal mode.
When you have completed the Ewido scan, please post the log from Ewido and a new HiJackThis log.

Edited by suebaby41, 02 September 2005 - 01:40 PM.

You don't stop laughing when you get old; you get old when you stop laughing.
A Member of U-N-I-T-E (Unified Network of Instructors and Trained Eliminators)
Malware Removal University Masters Graduate

Posted Image
Join The Fight Against Malware
No reply within 5 days will result in your topic being closed. If you need more time, please let me know by posting in this topic so that your topic will not be closed.

#8 jerry109999

jerry109999
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:48 PM

Posted 02 September 2005 - 02:32 PM

Hey,
I am in the process of doing what you said and following the instructions. I can not find c:isumbit. I left clicked to explorer and did not see it listed on the left side of the screen in the stuff that comes up under c: drive. I then did a search of the files by right clicking start and search and still found nothing. I am going to go forward with the additional instruction and post as requested. Stand-by.

Jerry

#9 suebaby41

suebaby41

    W.A.M. (Women Against Malware)


  • Malware Response Team
  • 6,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:South Carolina, USA
  • Local time:02:48 PM

Posted 02 September 2005 - 03:06 PM

That is fine. I just wanted you to check to make sure that it was not there.
You don't stop laughing when you get old; you get old when you stop laughing.
A Member of U-N-I-T-E (Unified Network of Instructors and Trained Eliminators)
Malware Removal University Masters Graduate

Posted Image
Join The Fight Against Malware
No reply within 5 days will result in your topic being closed. If you need more time, please let me know by posting in this topic so that your topic will not be closed.

#10 jerry109999

jerry109999
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:48 PM

Posted 02 September 2005 - 03:11 PM

Scanning 68% at 34 minutes, so far 150 entries. I started the first scan prior to checking what you told me and deleted 50 entries before canceling. I did not save the log but will do better this time.

Jerry

#11 jerry109999

jerry109999
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:48 PM

Posted 02 September 2005 - 03:50 PM

I have symantic telling me about adaware and trying to fix automatically. I am ignoring all of it and closing it. I did notice that all of my favorites have vanished from my computer.






Scan Report:

---------------------------------------------------------
ewido security suite - Scan report
---------------------------------------------------------

+ Created on: 3:34:22 PM, 9/2/2005
+ Report-Checksum: 670B674

+ Scan result:

C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP2\A0001001.exe -> TrojanDropper.Agent.hl : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP4\A0001086.exe -> Spyware.Adstart : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP4\A0001088.EXE -> TrojanDownloader.Small.aal : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP4\A0001099.exe -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP4\A0001117.exe -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP4\A0001119.dll -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP4\A0001121.dll -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP5\A0001129.EXE -> TrojanDownloader.Small.aal : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP5\A0001133.exe -> Trojan.Lazar.b : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP5\A0002088.EXE -> TrojanDownloader.Small.aal : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP5\A0002092.dll -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP5\A0002093.exe -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP5\A0002094.exe -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP5\A0002095.dll -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP5\A0002103.exe -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP5\A0002104.dll -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP5\A0002105.dll -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP5\A0002106.dll -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP7\A0002117.exe -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP7\A0002118.exe -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP7\A0002119.dll -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP7\A0002120.dll -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP8\A0002133.exe -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP8\A0002134.exe -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP8\A0002135.dll -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP8\A0002136.dll -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP8\A0002139.dll -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0002145.dll -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0002146.dll -> Spyware.E2Give : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0002147.DLL -> Spyware.Hijacker.Generic : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0002151.dll -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0002155.exe -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0002157.dll -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0002158.dll -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0003159.dll -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0003167.exe -> TrojanDropper.Agent.lu : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0003169.EXE -> TrojanDownloader.Agent.hw : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0003174.exe -> Spyware.Adstart : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0003175.exe -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0003176.exe -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0003177.dll -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0003178.dll -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0003181.dll -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0003196.dll -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0003197.exe -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0003198.exe -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0003204.dll -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0003205.DLL -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{7DAF20C1-492B-4D23-AFCE-C2A9DFA4D053}\RP10\A0003207.dll -> Spyware.Hijacker.Generic : Cleaned with backup
C:\Program Files\Common Files\VPN Network\IPSecMon.exe -> Trojan.Lazar.b : Cleaned with backup
C:\Program Files\SmartStuff\fpwinldr.exe -> Trojan.Lazar.b : Cleaned with backup
C:\Program Files\HP\recguard.exe -> Trojan.Lazar.b : Cleaned with backup
C:\Program Files\E2G\IeBHOs.dll -> Spyware.E2Give : Cleaned with backup
C:\Program Files\Real\realjbox.exe -> Dialer.Generic : Cleaned with backup
C:\Program Files\Lime_Shop\Limeshop0.exe -> Spyware.HelpExpress : Cleaned with backup
:mozilla.6:C:\Backup\Application Data\Mozilla\Profiles\default\yd5i8s2v.slt\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.7:C:\Backup\Application Data\Mozilla\Profiles\default\yd5i8s2v.slt\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.8:C:\Backup\Application Data\Mozilla\Profiles\default\yd5i8s2v.slt\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.9:C:\Backup\Application Data\Mozilla\Profiles\default\yd5i8s2v.slt\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.16:C:\Backup\Application Data\Mozilla\Profiles\default\yd5i8s2v.slt\cookies.txt -> Spyware.Cookie.Ru4 : Cleaned with backup
:mozilla.17:C:\Backup\Application Data\Mozilla\Profiles\default\yd5i8s2v.slt\cookies.txt -> Spyware.Cookie.Ru4 : Cleaned with backup
:mozilla.18:C:\Backup\Application Data\Mozilla\Profiles\default\yd5i8s2v.slt\cookies.txt -> Spyware.Cookie.Ru4 : Cleaned with backup
:mozilla.35:C:\Backup\Application Data\Mozilla\Profiles\default\yd5i8s2v.slt\cookies.txt -> Spyware.Cookie.Questionmarket : Cleaned with backup
:mozilla.42:C:\Backup\Application Data\Mozilla\Profiles\default\yd5i8s2v.slt\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
C:\Backup\Cookies\jerry blackwell@image.masterstats[1].txt -> Spyware.Cookie.Masterstats : Cleaned with backup
C:\Backup\Cookies\jerry blackwell@statcounter[2].txt -> Spyware.Cookie.Statcounter : Cleaned with backup
C:\Backup\Cookies\jerry blackwell@ad.yieldmanager[2].txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
C:\Backup\Cookies\jerry blackwell@tribalfusion[2].txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
C:\Backup\Cookies\jerry blackwell@bluestreak[1].txt -> Spyware.Cookie.Bluestreak : Cleaned with backup
C:\Backup\Cookies\jerry blackwell@trafficmp[2].txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
C:\Backup\Cookies\jerry blackwell@ivwbox[1].txt -> Spyware.Cookie.Ivwbox : Cleaned with backup
C:\Backup\Cookies\jerry blackwell@ads.addynamix[1].txt -> Spyware.Cookie.Addynamix : Cleaned with backup
C:\Backup\Cookies\jerry blackwell@casalemedia[2].txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
C:\Documents and Settings\LocalService\Cookies\system@www.epilot[1].txt -> Spyware.Cookie.Epilot : Cleaned with backup
C:\Documents and Settings\LocalService\Cookies\system@paypopup[1].txt -> Spyware.Cookie.Paypopup : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Local Settings\Temp\ei.exe -> TrojanDownloader.Small.bgl : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@z1.adserver[1].txt -> Spyware.Cookie.Adserver : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@doubleclick[2].txt -> Spyware.Cookie.Doubleclick : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@centrport[1].txt -> Spyware.Cookie.Centrport : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@perf.overture[1].txt -> Spyware.Cookie.Overture : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@e-2dj6wfkiokdzido.stats.esomniture[2].txt -> Spyware.Cookie.Esomniture : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@e-2dj6wjnyqldzmdq.stats.esomniture[2].txt -> Spyware.Cookie.Esomniture : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@e-2dj6wgkyqkczelp.stats.esomniture[2].txt -> Spyware.Cookie.Esomniture : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@ads.addynamix[2].txt -> Spyware.Cookie.Addynamix : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@counter2.hitslink[1].txt -> Spyware.Cookie.Hitslink : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@advertising[1].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@statcounter[1].txt -> Spyware.Cookie.Statcounter : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@casalemedia[1].txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@image.masterstats[1].txt -> Spyware.Cookie.Masterstats : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@valueclick[1].txt -> Spyware.Cookie.Valueclick : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@atdmt[2].txt -> Spyware.Cookie.Atdmt : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@as1.falkag[2].txt -> Spyware.Cookie.Falkag : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@2o7[1].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@questionmarket[1].txt -> Spyware.Cookie.Questionmarket : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@vitacost.122.2o7[2].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@trafficmp[2].txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@revenue[1].txt -> Spyware.Cookie.Revenue : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@adopt.specificclick[2].txt -> Spyware.Cookie.Specificclick : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@paypopup[2].txt -> Spyware.Cookie.Paypopup : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@cs.sexcounter[2].txt -> Spyware.Cookie.Sexcounter : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@tribalfusion[2].txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@yieldmanager[2].txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@shopathomeselect[2].txt -> Spyware.Cookie.Shopathomeselect : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@mediaplex[1].txt -> Spyware.Cookie.Mediaplex : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@stat.onestat[2].txt -> Spyware.Cookie.Onestat : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@statse.webtrendslive[1].txt -> Spyware.Cookie.Webtrendslive : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@sextracker[2].txt -> Spyware.Cookie.Sextracker : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@ad.yieldmanager[2].txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@ad1.clickhype[2].txt -> Spyware.Cookie.Clickhype : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@a.shopathomeselect[2].txt -> Spyware.Cookie.Shopathomeselect : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@hypertracker[1].txt -> Spyware.Cookie.Hypertracker : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@www.shopathomeselect[2].txt -> Spyware.Cookie.Shopathomeselect : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@fastclick[1].txt -> Spyware.Cookie.Fastclick : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@247realmedia[1].txt -> Spyware.Cookie.247realmedia : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@bluestreak[1].txt -> Spyware.Cookie.Bluestreak : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@as-us.falkag[1].txt -> Spyware.Cookie.Falkag : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@targetnet[2].txt -> Spyware.Cookie.Targetnet : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@counter8.sextracker[2].txt -> Spyware.Cookie.Sextracker : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@counter15.sextracker[1].txt -> Spyware.Cookie.Sextracker : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@server.iad.liveperson[1].txt -> Spyware.Cookie.Liveperson : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@e-2dj6wjnywjajmlo.stats.esomniture[2].txt -> Spyware.Cookie.Esomniture : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@adtech[2].txt -> Spyware.Cookie.Adtech : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@servedby.advertising[1].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Cookies\jerry blackwell@edge.ru4[2].txt -> Spyware.Cookie.Ru4 : Cleaned with backup
:mozilla.6:C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Application Data\Mozilla\Profiles\default\yd5i8s2v.slt\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.7:C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Application Data\Mozilla\Profiles\default\yd5i8s2v.slt\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.8:C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Application Data\Mozilla\Profiles\default\yd5i8s2v.slt\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.9:C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Application Data\Mozilla\Profiles\default\yd5i8s2v.slt\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.16:C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Application Data\Mozilla\Profiles\default\yd5i8s2v.slt\cookies.txt -> Spyware.Cookie.Ru4 : Cleaned with backup
:mozilla.17:C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Application Data\Mozilla\Profiles\default\yd5i8s2v.slt\cookies.txt -> Spyware.Cookie.Ru4 : Cleaned with backup
:mozilla.18:C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Application Data\Mozilla\Profiles\default\yd5i8s2v.slt\cookies.txt -> Spyware.Cookie.Ru4 : Cleaned with backup
:mozilla.35:C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Application Data\Mozilla\Profiles\default\yd5i8s2v.slt\cookies.txt -> Spyware.Cookie.Questionmarket : Cleaned with backup
:mozilla.42:C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Application Data\Mozilla\Profiles\default\yd5i8s2v.slt\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
C:\Documents and Settings\Administrator\Cookies\administrator@atdmt[2].txt -> Spyware.Cookie.Atdmt : Cleaned with backup
C:\Documents and Settings\mike\Cookies\mike@2o7[1].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Documents and Settings\mike\Cookies\mike@centrport[1].txt -> Spyware.Cookie.Centrport : Cleaned with backup
C:\Documents and Settings\mike\Cookies\mike@atdmt[2].txt -> Spyware.Cookie.Atdmt : Cleaned with backup
C:\Documents and Settings\mike\Cookies\mike@trafficmp[1].txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
C:\Documents and Settings\mike\Cookies\mike@z1.adserver[1].txt -> Spyware.Cookie.Adserver : Cleaned with backup
C:\Documents and Settings\mike\Cookies\mike@paypopup[1].txt -> Spyware.Cookie.Paypopup : Cleaned with backup
C:\Documents and Settings\mike\Cookies\mike@as-us.falkag[1].txt -> Spyware.Cookie.Falkag : Cleaned with backup
C:\Documents and Settings\mike\Cookies\mike@hypertracker[1].txt -> Spyware.Cookie.Hypertracker : Cleaned with backup
C:\Documents and Settings\mike\Cookies\mike@statse.webtrendslive[1].txt -> Spyware.Cookie.Webtrendslive : Cleaned with backup
C:\Documents and Settings\mike\Cookies\mike@revenue[1].txt -> Spyware.Cookie.Revenue : Cleaned with backup
C:\Documents and Settings\mike\Cookies\mike@ad.yieldmanager[1].txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
C:\Documents and Settings\mike\Cookies\mike@linksynergy[1].txt -> Spyware.Cookie.Linksynergy : Cleaned with backup
C:\Documents and Settings\mike\Cookies\mike@doubleclick[1].txt -> Spyware.Cookie.Doubleclick : Cleaned with backup
:mozilla.6:C:\Documents and Settings\mike\Application Data\Mozilla\Profiles\default\t948n7g4.slt\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.7:C:\Documents and Settings\mike\Application Data\Mozilla\Profiles\default\t948n7g4.slt\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\backup.zip/aeicap.dll -> Spyware.Look2Me : Cleaned with backup
C:\backup.zip/MMC71ITA.DLL -> Spyware.Look2Me : Cleaned with backup
C:\backup.zip/guard.tmp -> Spyware.Look2Me : Cleaned with backup
C:\WINDOWS2\system32\realmon.exe -> Trojan.Lazar.b : Cleaned with backup
C:\WINDOWS2\system32\APVXDWIN.EXE -> Trojan.Lazar.b : Cleaned with backup
C:\WINDOWS2\system32\winupd\wuauclt.exe -> Trojan.Lazar.b : Cleaned with backup
C:\WINDOWS2\system32\pqojvd.exe -> Spyware.Adstart : Cleaned with backup
C:\WINDOWS2\system32\dun.exe -> Spyware.DealHelper : Cleaned with backup
C:\WINDOWS2\system32\Vwissm.exe -> Spyware.DealHelper : Cleaned with backup
C:\WINDOWS2\system32\Uebtbx.exe -> Spyware.DealHelper : Cleaned with backup
C:\WINDOWS2\system32\zykdjd.exe -> Spyware.Adstart : Cleaned with backup
C:\WINDOWS2\system32\zykdjf.exe -> Spyware.Adstart : Cleaned with backup
C:\WINDOWS2\system32\plirqd.exe -> Spyware.Adstart : Cleaned with backup
C:\WINDOWS2\system32\plirqc.exe -> Spyware.Adstart : Cleaned with backup
C:\WINDOWS2\system32\nvzvwd.exe -> Spyware.Adstart : Cleaned with backup
C:\WINDOWS2\system32\lpkdg4.exe -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\WINDOWS2\system32\puqva.dat -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\WINDOWS2\system32\ssdgjks.dll -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\WINDOWS2\system32\jadbn.dll -> TrojanDownloader.Qoologic.ac : Cleaned with backup
C:\WINDOWS2\system32\wintask.exe -> TrojanDownloader.Small.abd : Cleaned with backup
C:\WINDOWS2\system32\plirqf.exe -> Spyware.Adstart : Cleaned with backup
C:\WINDOWS2\Temp\b.com -> TrojanDropper.Agent.pb : Cleaned with backup
C:\WINDOWS2\Temp\MTE2ODI6ODoxNg -> Spyware.ISearch : Cleaned with backup
C:\WINDOWS2\Temp\ei.exe -> TrojanDownloader.Small.bgl : Cleaned with backup
C:\WINDOWS2\Temp\f535970.exe -> TrojanDownloader.Qoologic.ac : Cleaned with backup


::Report End



Highjack log:

Logfile of HijackThis v1.99.1
Scan saved at 3:46:29 PM, on 9/2/2005
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2600.0000)

Running processes:
C:\WINDOWS2\System32\smss.exe
C:\WINDOWS2\system32\csrss.exe
C:\WINDOWS2\system32\winlogon.exe
C:\WINDOWS2\system32\services.exe
C:\WINDOWS2\system32\lsass.exe
C:\WINDOWS2\system32\svchost.exe
C:\WINDOWS2\System32\svchost.exe
C:\WINDOWS2\System32\svchost.exe
C:\WINDOWS2\System32\svchost.exe
C:\WINDOWS2\system32\spoolsv.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\WINDOWS2\SmVycnkgQmxhY2t3ZWxs\command.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\WINDOWS2\System32\bkusewvq\dgyeg.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\WINDOWS2\System32\inetsrv\inetinfo.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS2\System32\tcpsvcs.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS2\Explorer.EXE
C:\PROGRA~1\SYMANT~2\VPTray.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS2\System32\wuauclt.exe
C:\Program Files\DSB\dsb.exe
C:\WINDOWS2\System32\ybub\enfpmjqj.exe
C:\WINDOWS2\System32\ptwtkfg\dipyth.exe
C:\WINDOWS2\System32\swerm\evpohg.exe
C:\WINDOWS2\System32\ngxq\bpxlf.exe
C:\WINDOWS2\System32\msvttk.exe
C:\WINDOWS2\System32\ctfmon.exe
C:\WINDOWS2\System32\msvttk.exe
C:\Program Files\srtc\csue.exe
C:\WINDOWS2\System32\wuauclt.exe
C:\DOCUME~1\JERRYB~1.ESC\LOCALS~1\Temp\ei.exe
C:\Program Files\Common Files\efax\Dllcmd32.exe
C:\WINDOWS2\system32\??plorer.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
O1 - Hosts: 216.39.69.102 view.atdmt.com
O2 - BHO: SDWin32 Class - {05CF22C3-4503-46AA-A118-238D2E343879} - C:\WINDOWS2\System32\pqojv.dll (file missing)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SDWin32 Class - {1E0FFDCA-99E4-486B-A7AA-70A67AC70A79} - C:\WINDOWS2\System32\nvzvw.dll (file missing)
O2 - BHO: SDWin32 Class - {2B68B487-999E-4BD9-8A32-DA6EB1A1932A} - C:\WINDOWS2\System32\plirq.dll
O2 - BHO: CControl Object - {3643ABC2-21BF-46B9-B230-F247DB0C6FD6} - C:\Program Files\E2G\IeBHOs.dll
O2 - BHO: SDWin32 Class - {3B6795D7-73EE-4579-89AA-EE95EEFA845F} - C:\WINDOWS2\System32\zykdj.dll (file missing)
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: (no name) - {9F27F00B-194A-31B9-E685-F5BEF216B714} - C:\WINDOWS2\System32\qnxjwyrc\qydnjoey.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS2\System32\msdxm.ocx
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~2\VPTray.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [IPSecMon] C:\Program Files\Common files\VPN Network\IPSecMon.exe /vpncheck
O4 - HKLM\..\Run: [REAL] C:\Program Files\REAL\realjbox.exe
O4 - HKLM\..\Run: [SpybotSnD] "C:\Program Files\Spybot - Search & Destroy\spybotsd.exe"
O4 - HKLM\..\Run: [DSB] C:\Program Files\DSB\dsb.exe
O4 - HKLM\..\Run: [SHA256] C:\Program Files\SHA256\secure.exe
O4 - HKLM\..\Run: [winsync] C:\WINDOWS2\System32\atnupr.exe reg_run
O4 - HKLM\..\Run: [Recguard] C:\Program Files\HP\recguard.exe
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [VBundleOuterDL] C:\Program Files\VBouncer\BundleOuter.EXE
O4 - HKLM\..\Run: [enfpmjqj] C:\WINDOWS2\System32\ybub\enfpmjqj.exe
O4 - HKLM\..\Run: [dgyeg] C:\WINDOWS2\System32\bkusewvq\dgyeg.exe
O4 - HKLM\..\Run: [dipyth] C:\WINDOWS2\System32\ptwtkfg\dipyth.exe
O4 - HKLM\..\Run: [evpohg] C:\WINDOWS2\System32\swerm\evpohg.exe
O4 - HKLM\..\Run: [bpxlf] C:\WINDOWS2\System32\ngxq\bpxlf.exe
O4 - HKLM\..\Run: [LocalProxy] C:\Program Files\LocalProxy\proxy4free.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS2\System32\ctfmon.exe
O4 - HKCU\..\Run: [Lpmhr] C:\WINDOWS2\System32\??plorer.exe
O4 - HKCU\..\Run: [msvttk] C:\WINDOWS2\System32\msvttk.exe
O4 - HKCU\..\Run: [Oahu] C:\Program Files\srtc\csue.exe
O4 - Global Startup: Live Menu.lnk = C:\Program Files\Common Files\efax\Dllcmd32.exe
O4 - Global Startup: eFax.com Tray Menu.lnk.disabled
O8 - Extra context menu item: Convert link target to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert link target to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert selected links to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert selected links to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Convert selection to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert selection to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O9 - Extra button: (no name) - {9E248641-0E24-4DDB-9A1F-705087832AD6} - (no file)
O9 - Extra 'Tools' menuitem: Java - {9E248641-0E24-4DDB-9A1F-705087832AD6} - (no file)
O16 - DPF: {04E214E5-63AF-4236-83C6-A7ADCBF9BD02} (HouseCall Control) - http://housecall60.trendmicro.com/housecall/xscan60.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {4208FB4D-4E53-4F5A-BF7A-3E047DDB5281} (ActiveX Control) - http://www.icannnews.com/app/ST/ActiveX.ocx
O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcafee.com/molbin/shared/m...96/mcinsctl.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004061...all/xscan53.cab
O16 - DPF: {85D1F3B2-2A21-11D7-97B9-0010DC2A6243} (SecureLogin class) - http://secure2.comned.com/signuptemplates/...login-devel.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/binFramework/v10/ZIntro.cab27513.cab
O16 - DPF: {BB21F850-63F4-4EC9-BF9D-565BD30C9AE9} (ASquaredScanForm Element) - http://www.windowsecurity.com/trojanscan/axscan.cab
O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} (DwnldGroupMgr Class) - http://download.mcafee.com/molbin/shared/m...,26/mcgdmgr.cab
O16 - DPF: {F58E1CEF-A068-4C15-BA5E-587CAF3EE8C6} (MSN Chat Control 4.5) - http://chat.msn.com/bin/msnchat45.cab
O20 - Winlogon Notify: NavLogon - C:\WINDOWS2\System32\NavLogon.dll
O20 - Winlogon Notify: PCANotify - C:\WINDOWS2\SYSTEM32\PCANotify.dll
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: Command Service (cmdService) - Unknown owner - C:\WINDOWS2\SmVycnkgQmxhY2t3ZWxs\command.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: dgyegbkusewvq - Unknown owner - C:\WINDOWS2\System32\bkusewvq\dgyeg.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS2\System32\HPZipm12.exe
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe

#12 suebaby41

suebaby41

    W.A.M. (Women Against Malware)


  • Malware Response Team
  • 6,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:South Carolina, USA
  • Local time:02:48 PM

Posted 02 September 2005 - 07:06 PM

We have some work to do. Please do not reboot until you are instructed to do so.

You may want to print out this page.. Make sure to work through the fixes in the order it is mentioned below. If there's anything that you don't understand, ask your question(s) before proceeding with the fixes.

Step 1

Please download the free tool Hoster

If needed, Tutorial on Using Hoster
  • Unzip the file to your desktop. It will create a folder called: Hoster
  • Open the folder and doubleclick on Hoster.exe to run it.
  • Press 'Restore Original Hosts' and press 'OK'
  • Exit Program
Step 2

Please go to the following web addresses and download Cleanup HERE CleanUp! is a powerful and easy-to-use application that removes temporary files created while surfing the web, empties the Recycle Bin, deletes files from your temporary folders and more. Run CleanUp.
*IMPORTANT NOTE*
CleanUp deletes EVERYTHING out of your temp/temporary folders; it does not make backups.
If you have any documents or programs that are saved in any Temporary Folders, please make a backup of these before running CleanUp

You have a Nail, Epolvy, and/or DSR infection.

Step 3

Please download DSRFix. Extract the files to your Desktop. Don't run anything in the folder yet.

Step 4

Please download AdAware SE Personal. Install it and check for updates.

Please download the VX2 Cleaner Make sure Ad-Aware SE Personal is closed and install the VX2 Cleaner.

Step 5

Run Ad-Aware SE Personal.
  • Click Add-Ons.
  • Double-click VX2 Cleaner.
  • Click Ok to Execute this tool.
  • If nothing is found click Ok and exit the program.
    or
  • If malware is found click Clean System.
  • When it's done click Start in Ad-Aware SE Personal.
  • Make sure Perform smart system scan is checked.
  • Click Next.
  • Let it clean anything it finds.
Step 6

Open the DSRFix folder on your Desktop. Double click dsrfix.bat to run the program. A DOS window should open and close quickly, this is normal. Once the fix has completed the tool will close on its own.

Step 7

Let’s address the HijackThis fixes.

Uninstall the following via the Add/Remove Panel (Start->(Settings)->Control Panel->Add/Remove Programs) Do not worry if they are not there:

ActiveSecurity

DSB

VirtualBouncer or VBouncer

srtc


Use 'ctrl' + 'alt' + 'del' (Three keys together) to get task manager. Find these processes and 'end task' them.
OR]
Use the process viewer in Hijackthis, Open the Misc Tools Section then Open Process Manager, find these programs and “kill process” the following running processes (Do not worry if they are not there)


command.exe

dgyeg.exe

dsb.exe

enfpmjqj.exe

dipyth.exe

evpohg.exe

bpxlf.exe

msvttk.exe

csue.exe

ei.exe

??plorer.exe

atnupr.exe

BundleOuter.EXE

proxy4free.exe


This entry appears to be part of an old program. If you do not know what this is, have HiJackThis fix it.

O4 - HKLM\..\Run: [IPSecMon] C:\Program Files\Common files\VPN Network\IPSecMon.exe /vpncheck
Microsoft L2TP/IPSec VPN Client for Win98/Me/NT. Secure technology for making remote access virtual private network (VPN) connections across public networks such as the Internet

If you do not know what this is, have HiJackThis fix it.

O4 - HKLM\..\Run: [SHA256] C:\Program Files\SHA256\ secure.exe

Please run HijackThis and click "Scan." Place checks next to the following entries (make sure not to miss any):

O1 - Hosts: 216.39.69.102 view.atdmt.com

O2 - BHO: CControl Object - {3643ABC2-21BF-46B9-B230-F247DB0C6FD6} - C:\Program Files\E2G\IeBHOs.dll

O4 - HKLM\..\Run: [DSB] C:\Program Files\DSB\dsb.exe

O4 - HKLM\..\Run: [winsync] C:\WINDOWS2\System32\atnupr.exe reg_run

O4 - HKLM\..\Run: [VBundleOuterDL] C:\Program Files\VBouncer\BundleOuter.EXE

O4 - HKLM\..\Run: [LocalProxy] C:\Program Files\LocalProxy\proxy4free.exe

O4 - HKCU\..\Run: [Lpmhr] C:\WINDOWS2\System32\??plorer.exe

O4 - Global Startup: eFax.com Tray Menu.lnk.disabled

O16 - DPF: {4208FB4D-4E53-4F5A-BF7A-3E047DDB5281} (ActiveX Control) - http://www.icannnews.com/app/ST/ActiveX.ocx

O16 - DPF: {85D1F3B2-2A21-11D7-97B9-0010DC2A6243} (SecureLogin class) - http://secure2.comned.com/signuptemplates/...login-devel.cab

O23 - Service: Command Service (cmdService) - Unknown owner - C:\WINDOWS2\SmVycnkgQmxhY2t3ZWxs\command.exe

O23 - Service: dgyegbkusewvq - Unknown owner - C:\WINDOWS2\System32\bkusewvq\dgyeg.exe


The following have randomly named file names, and as such are normally malware, UNLESS you know what they are and they are from a safe source, please check to fix.

O2 - BHO: SDWin32 Class - {05CF22C3-4503-46AA-A118-238D2E343879} - C:\WINDOWS2\System32\pqojv.dll (file missing)

O2 - BHO: SDWin32 Class - {1E0FFDCA-99E4-486B-A7AA-70A67AC70A79} - C:\WINDOWS2\System32\nvzvw.dll (file missing)

O2 - BHO: SDWin32 Class - {2B68B487-999E-4BD9-8A32-DA6EB1A1932A} - C:\WINDOWS2\System32\plirq.dll

O2 - BHO: SDWin32 Class - {3B6795D7-73EE-4579-89AA-EE95EEFA845F} - C:\WINDOWS2\System32\zykdj.dll (file missing)

O2 - BHO: (no name) - {9F27F00B-194A-31B9-E685-F5BEF216B714} - C:\WINDOWS2\System32\qnxjwyrc\qydnjoey.dll

O4 - HKLM\..\Run: [enfpmjqj] C:\WINDOWS2\System32\ybub\enfpmjqj.exe

O4 - HKLM\..\Run: [dgyeg] C:\WINDOWS2\System32\bkusewvq\dgyeg.exe

O4 - HKLM\..\Run: [dipyth] C:\WINDOWS2\System32\ptwtkfg\dipyth.exe

O4 - HKLM\..\Run: [evpohg] C:\WINDOWS2\System32\swerm\evpohg.exe

O4 - HKLM\..\Run: [bpxlf] C:\WINDOWS2\System32\ngxq\bpxlf.exe

O4 - HKCU\..\Run: [msvttk] C:\WINDOWS2\System32\msvttk.exe

O4 - HKCU\..\Run: [Oahu] C:\Program Files\srtc\csue.exe


Close all browsers and other windows except for HijackThis, and click "Fix Checked" to have HijackThis fix the entries you checked.

Let’s get rid of the O23 service:
  • Open HiJackThis
  • Click on “Open The Misc Tools Section”
  • Click on “Delete NT Service”
  • Copy/paste the O23 section in parenthesis
  • Click OK.
O23 - Service: Command Service (cmdService) - Unknown owner - C:\WINDOWS2\SmVycnkgQmxhY2t3ZWxs\command.exe

If this one is still there, it may not delete since it does not have parenthesis around the red entry.

O23 - Service: dgyegbkusewvq - Unknown owner - C:\WINDOWS2\System32\bkusewvq\dgyeg.exe

Reboot to safe mode. If you don’t know how to boot in safe mode, there is a tutorial HERE .
NOTE: To avoid the risk of any of the files or folders not being found due to their having the 'Hidden' attribute, first make sure that in Folder Options > View hidden and operating system files are set to show:
http://www.xtra.co.nz/help/0,,4155-1916458,00.html
Or items 8 & 9 from this link :
http://www.russelltexas.com/malware/faqhijackthis.htm

Using Windows Explorer, locate the following files/folders, and DELETE them (Do not worry if they are not there):

Search for and delete these folders:

C:\Program Files\DSB which contains dsb.exe

C:\Program Files\srtc which contains csue.exe

C:\Program Files\E2G which contains IeBHOs.dll

C:\Program Files\VBouncer which contains BundleOuter.EXE

C:\Program Files\LocalProxy which contains proxy4free.exe

Search for and delete these files :

C:\WINDOWS2\SmVycnkgQmxhY2t3ZWxs which contains command.exe

C:\WINDOWS2\System32\bkusewvq which contains dgyeg.exe

C:\WINDOWS2\System32\ybub which contains enfpmjqj.exe

C:\WINDOWS2\System32\ptwtkfg which contains dipyth.exe

C:\WINDOWS2\System32\swerm which contains evpohg.exe

C:\WINDOWS2\System32\ngxq which contains bpxlf.exe

C:\WINDOWS2\System32\msvttk.exe
C:\WINDOWS2\System32\pqojv.dll (file missing)

C:\WINDOWS2\System32\nvzvw.dll (file missing)

C:\WINDOWS2\System32\plirq.dll

C:\WINDOWS2\System32\zykdj.dll (file missing)

C:\WINDOWS2\System32\qnxjwyrc which contains qydnjoey.dll

C:\WINDOWS2\System32\atnupr.exe reg_run

C:\WINDOWS2\System32\??plorer.exe Note: Be sure that the file has the “??” before the “plorer.exe”.

C:\WINDOWS\Downloaded Programs\activesecurity.ocx

Step 8

Still in safe mode, run Ewido.
  • Click on scanner. (Don't do anything on the computer while Ewido is running.)
  • Click Complete System Scan.
  • If you get a prompt asking to clean files then click OK.
  • Once the scan is done choose Save Report and save it your desktop.
  • Close Ewido.
Step 9

Run Ad-Aware SE Personal.
  • Click Start in Ad-Aware SE Personal.
  • Make sure Perform smart system scan is checked.
  • Click Next.
  • Let it clean anything it finds.
Step 10

Let’s run Cleanup again to ensure no malware is hiding in temporary folders and for general computer cleanup to free space on your computer.

Step 11

Reboot to normal mode.

Step 12

Please run HijackThis in normal mode and post a new HiJackThis log and the log from Ewido. just so I can make sure that all the malware was deleted according to plan.
You don't stop laughing when you get old; you get old when you stop laughing.
A Member of U-N-I-T-E (Unified Network of Instructors and Trained Eliminators)
Malware Removal University Masters Graduate

Posted Image
Join The Fight Against Malware
No reply within 5 days will result in your topic being closed. If you need more time, please let me know by posting in this topic so that your topic will not be closed.

#13 jerry109999

jerry109999
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:48 PM

Posted 06 September 2005 - 01:11 PM

Hello,

Hope you had a good labor day. I have been working on your directions and some of the items were not in the system or I could not find them. One of them is the cmdservice, said it was running and could not delete. If I could not find the spefic items I just past it up and continued. Here are the logs you requested.

Logfile of HijackThis v1.99.1
Scan saved at 12:58:42 PM, on 9/6/2005
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2600.0000)

Running processes:
C:\WINDOWS2\System32\smss.exe
C:\WINDOWS2\system32\winlogon.exe
C:\WINDOWS2\system32\services.exe
C:\WINDOWS2\system32\lsass.exe
C:\WINDOWS2\system32\svchost.exe
C:\WINDOWS2\System32\svchost.exe
C:\WINDOWS2\system32\spoolsv.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\WINDOWS2\System32\inetsrv\inetinfo.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS2\System32\tcpsvcs.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS2\Explorer.EXE
C:\PROGRA~1\SYMANT~2\VPTray.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\SHA256\secure.exe
C:\WINDOWS2\System32\msvttk.exe
C:\WINDOWS2\System32\ctfmon.exe
C:\Program Files\Common Files\efax\Dllcmd32.exe
C:\WINDOWS2\System32\msvttk.exe
C:\WINDOWS2\System32\wuauclt.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\Jerry Blackwell.ESCOPETA\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: CControl Object - {3643ABC2-21BF-46B9-B230-F247DB0C6FD6} - C:\Program Files\E2G\IeBHOs.dll (file missing)
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS2\System32\msdxm.ocx
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~2\VPTray.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [REAL] C:\Program Files\REAL\realjbox.exe
O4 - HKLM\..\Run: [SpybotSnD] "C:\Program Files\Spybot - Search & Destroy\spybotsd.exe"
O4 - HKLM\..\Run: [SHA256] C:\Program Files\SHA256\secure.exe
O4 - HKLM\..\Run: [Recguard] C:\Program Files\HP\recguard.exe
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [winsync] C:\WINDOWS2\System32\atnupr.exe reg_run
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS2\System32\ctfmon.exe
O4 - HKCU\..\Run: [msvttk] C:\WINDOWS2\System32\msvttk.exe
O4 - HKCU\..\RunOnce: [msvttk] C:\WINDOWS2\System32\msvttk.exe
O4 - Global Startup: Live Menu.lnk = C:\Program Files\Common Files\efax\Dllcmd32.exe
O8 - Extra context menu item: Convert link target to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert link target to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert selected links to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert selected links to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Convert selection to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert selection to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O9 - Extra button: (no name) - {9E248641-0E24-4DDB-9A1F-705087832AD6} - (no file)
O9 - Extra 'Tools' menuitem: Java - {9E248641-0E24-4DDB-9A1F-705087832AD6} - (no file)
O16 - DPF: {04E214E5-63AF-4236-83C6-A7ADCBF9BD02} (HouseCall Control) - http://housecall60.trendmicro.com/housecall/xscan60.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcafee.com/molbin/shared/m...96/mcinsctl.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004061...all/xscan53.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/binFramework/v10/ZIntro.cab27513.cab
O16 - DPF: {BB21F850-63F4-4EC9-BF9D-565BD30C9AE9} (ASquaredScanForm Element) - http://www.windowsecurity.com/trojanscan/axscan.cab
O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} (DwnldGroupMgr Class) - http://download.mcafee.com/molbin/shared/m...,26/mcgdmgr.cab
O16 - DPF: {F58E1CEF-A068-4C15-BA5E-587CAF3EE8C6} (MSN Chat Control 4.5) - http://chat.msn.com/bin/msnchat45.cab
O20 - Winlogon Notify: NavLogon - C:\WINDOWS2\System32\NavLogon.dll
O20 - Winlogon Notify: PCANotify - C:\WINDOWS2\SYSTEM32\PCANotify.dll
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: Command Service (cmdService) - Unknown owner - C:\WINDOWS2\SmVycnkgQmxhY2t3ZWxs\command.exe (file missing)
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS2\System32\HPZipm12.exe
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe


Could not find the other logs from Ewido. It is not on the desktop. Do I need to run another scan.

Jerry

#14 suebaby41

suebaby41

    W.A.M. (Women Against Malware)


  • Malware Response Team
  • 6,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:South Carolina, USA
  • Local time:02:48 PM

Posted 06 September 2005 - 04:51 PM

I was hoping we could get rid of some of the bad stuff and we did. The next step in this process is to apply Service Pack 1a for Windows XP. Without this update, you're wide open to re-infection, and we're both just wasting our time.
Click HERE.

Please do not install Service Pack 2 because some hijacks interfere with the installation of Service Pack 2. When we're finished cleaning your computer we highly recommend installing SP2. Click HERE
-or-
It's a very large download, so if you're on dial-up, order a free CD HERE


After you have updated to SP1:

Please download the Pocket Killbox

If needed, a tutorial on using Pocket Killbox. It will guide you through the installation process and the removal process.

You may want to print these instructions since you will be off the internet for the rest of these steps. Do not reboot or reconnect to the internet until told to do so.
  • Unzip the contents of KillBox.zip to a convenient location.
  • Disconnect from internet and shut down all running programs
  • Double-click on KillBox.exe.
  • Click on Tools > Delete Temp Files and click ok.
  • As you Paste each entry into Killbox, place a check by any of these Selections available
    "Delete on Reboot"
    "Unregister .dll before Deleting"
    "End Explorer Shell while Killing File"
  • Paste this file into the top "Full Path of File to Delete" box.

    C:\WINDOWS2\System32\atnupr.exe reg_run
  • Click the "Delete File" button which looks like a stop sign.
  • Click "Yes" at the Replace on Reboot prompt.
  • Click "No" at the Pending Operations prompt.
  • Repeat steps 5-9 above for these files:

    C:\WINDOWS2\SmVycnkgQmxhY2t3ZWxs\command.exe
  • Click the "Delete File" button which looks like a stop sign.
  • Killbox will tell you that all listed files will be deleted on next reboot, click YES
  • When it asks if you would like to Reboot now, click YES
  • If you get a "PendingFileRenameOperations Registry Data has been Removed by External Process!" message then just restart manually.
Reboot to safe mode. If you don’t know how to boot in safe mode, there is a tutorial HERE
NOTE: To avoid the risk of any of the files or folders not being found due to their having the 'Hidden' attribute, first make sure that in Folder Options > View hidden and operating system files are set to show:
http://www.xtra.co.nz/help/0,,4155-1916458,00.html
Or items 8 & 9 from this link :
http://www.russelltexas.com/malware/faqhijackthis.htm

Run Ad-Aware SE Personal.
  • Click Add-Ons.
  • Double-click VX2 Cleaner.
  • Click Ok to Execute this tool.
  • If nothing is found click Ok and exit the program.
    or
  • If malware is found click Clean System.
  • When it's done click Start in Ad-Aware SE Personal.
  • Make sure Perform smart system scan is checked.
  • Click Next.
  • Let it clean anything it finds.
and

Still in safe mode, run Ewido.Don't do anything on the computer while Ewido is running.
  • Click on scanner.
  • Click Complete System Scan.
  • If you get a prompt asking to clean files then click OK.
  • Once the scan is done choose Save Report and save it your desktop.
  • Close Ewido.
Still in safe mode:

Please run HijackThis and click "Scan." Place checks next to the following entries (make sure not to miss any):

O23 - Service: Command Service (cmdService) - Unknown owner - C:\WINDOWS2\SmVycnkgQmxhY2t3ZWxs\command.exe

Close all browsers and other windows except for HijackThis, and click "Fix Checked" to have HijackThis fix the entries you checked.

Still in safe mode:

* Open HiJackThis
* Click on “Open The Misc Tools Section”
* Click on “Delete NT Service”
* Copy/paste the O23 section in parenthesis Make sure it is the same spelling.
* Click OK.

O23 - Service: Command Service (cmdService) - Unknown owner - C:\WINDOWS2\SmVycnkgQmxhY2t3ZWxs\command.exe

Reboot to normal mode and reconnect to the internet.

Please post a new HiJackThis log and the log from Ewido
You don't stop laughing when you get old; you get old when you stop laughing.
A Member of U-N-I-T-E (Unified Network of Instructors and Trained Eliminators)
Malware Removal University Masters Graduate

Posted Image
Join The Fight Against Malware
No reply within 5 days will result in your topic being closed. If you need more time, please let me know by posting in this topic so that your topic will not be closed.

#15 suebaby41

suebaby41

    W.A.M. (Women Against Malware)


  • Malware Response Team
  • 6,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:South Carolina, USA
  • Local time:02:48 PM

Posted 11 September 2005 - 12:42 PM

Due to someone else trying to help user, he has had to reload everything. When he gets his computer working again, he will start a new thread since this thread will no longer be applicable. This thread is closed.
You don't stop laughing when you get old; you get old when you stop laughing.
A Member of U-N-I-T-E (Unified Network of Instructors and Trained Eliminators)
Malware Removal University Masters Graduate

Posted Image
Join The Fight Against Malware
No reply within 5 days will result in your topic being closed. If you need more time, please let me know by posting in this topic so that your topic will not be closed.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users