Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Please Help Me!


  • Please log in to reply
19 replies to this topic

#1 RDO

RDO

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:11:20 PM

Posted 06 December 2005 - 08:06 PM

PLEASE HELP ME!!. My computer is infected with spyware/adware and I cannot get rid of it. I have numerous popup's and my Mozilla Foxfire browser is constanty being opened to display ads and websites that are of no interest to me. Even when I try to surf the web my browser gets redirected to unfamilar sites. I have done everyhting within my means to fix this. I have tried the following programs:
-Ad aware
-SpyBot S&D
-Spy Sweeper
-AVG Anti-virus...and the list goes on.

I have removed a large amount of spyware, but it still has not fixed my problem. Please excuse me for being a total newbie at this...but i need help! A friend told me to post my HijackThis scan results so here it is:

Logfile of HijackThis v1.99.1
Scan saved at 9:31:30 PM, on 12/06/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Common Files\Symantec Shared\SymSetup\{C6F5B6CF-609C-428E-876F-CA83176C021B}.exe
C:\WINDOWS\System32\msiexec.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\System32\MsiExec.exe
C:\WINDOWS\System32\MsiExec.exe
C:\Documents and Settings\Owner\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [AVG7_EMC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar2.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar2.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar2.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar2.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\PartyPoker.exe
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\PartyPoker.exe
O10 - Broken Internet access because of LSP provider 'mswsck2.dll' missing
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://spaces.msn.com/PhotoUpload/MsnPUpld.cab?10,0,910,0
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.com/v5co...b?1097722150265
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://sympatico.zone.msn.com/binFramework...ro.cab27513.cab
O16 - DPF: {F5C90925-ABBF-4475-88F5-8622B452BA9E} (Compaq System Data Class) - http://wwemail.support.hp.com/fd2/objects/SysQuery.cab
O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
O20 - Winlogon Notify: Telephony - C:\WINDOWS\system32\o0pq0a75ed.dll
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: Softex OmniPass Service (omniserv) - Unknown owner - C:\Program Files\Softex\OmniPass\Omniserv.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe

PLEASE HELP ME ASAP!!!!

THANKS,
RDO

BC AdBot (Login to Remove)

 


#2 -David-

-David-

  • Members
  • 10,603 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London
  • Local time:03:50 AM

Posted 07 December 2005 - 01:18 PM

Hi and :thumbsup: to BleepingComputer!

My name is David Posted Image

Please download WebRoot SpySweeper from HERE (It's a 2 week trial):
  • Click the Free Trial link for "SpySweeper" to download the program. NOTE: DO NOT click the Free Spyware Scan link.
  • Install it.
  • Once the program is installed, it will open.
  • It will prompt you to update to the latest definitions, click Yes.
  • Once the definitions are installed, click Sweep Now on the left side.
  • Click the Start button.
  • When it's done scanning, click the Next button.
  • Make sure everything has a check next to it, then click the Next button.
  • It will remove all of the items found.
  • Click Session Log in the upper right corner, copy everything in that window.
  • Click the Summary tab and click Finish.
  • Paste the contents of the session log you copied into your next reply.
Then reboot your computer - IMPORTANT
Then post a new HJT log

David

#3 RDO

RDO
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:11:20 PM

Posted 07 December 2005 - 06:14 PM

Thanks for your quick response....Here are the things you asked for.

SpySweeper Log

01:47 PM: |··· Start of Session, July 29, 2005 ···|
01:47 PM: Spy Sweeper 3.5.0 (Build 191) started
01:48 PM: Updating spyware definitions
01:49 PM: Your spyware definitions have been updated.
01:51 PM: Found: Memory-resident threat CWS-AboutBlank, version 1
01:51 PM: Found: Memory-resident threat CWS-AboutBlank, version 1
01:52 PM: Sweep initiated using definitions version 507
01:52 PM: Sweeping memory for threats.
01:52 PM: Memory sweep has completed. Elapsed time 00:00:04
01:52 PM: Found: 0 file traces.
01:52 PM: Full Sweep has completed. Elapsed time 00:00:39
0 files swept
02:10 PM: |··· Start of Session, July 29, 2005 ···|
02:10 PM: Spy Sweeper 3.5.0 (Build 191) started
02:13 PM: Processing Startup Alerts
02:13 PM: Removed Startup entry: ccApp
02:13 PM: Removed Startup entry: SSC_UserPrompt
02:13 PM: Removed Startup entry: NAV CfgWiz
02:13 PM: Removed Startup entry: BootWarn
02:14 PM: Sweep initiated using definitions version 507
02:14 PM: Sweeping memory for threats.
02:20 PM: Found: Memory-resident threat CWS-AboutBlank, version 1
02:20 PM: Memory sweep has completed. Elapsed time 00:06:09
02:20 PM: Registry sweep initiated.
02:21 PM: Found: 1 Searchbar Toolbar registry traces.
02:22 PM: Found: 1 Lopdotcom registry traces.
02:22 PM: Registry sweep completed. Elapsed time 00:07:53
02:22 PM: Full sweep on all local drives initiated.
02:22 PM: Now sweeping drive C:
02:23 PM: Found Adware: Twain-Tech, version 1, c:\documents and settings\owner\local settings\temp\polmx.inf
02:23 PM: Found Cookie: IC-live Cookie, version 1, c:\documents and settings\owner\cookies\owner@ic-live[1].txt
02:23 PM: Found Cookie: About Cookie, version 1, c:\documents and settings\owner\cookies\owner@history1900s.about[2].txt
02:23 PM: Found Cookie: Fastclick Cookie, version 1, c:\documents and settings\owner\cookies\owner@fastclick[2].txt
02:23 PM: Found Cookie: Partypoker Cookie, version 1, c:\documents and settings\owner\cookies\owner@partypoker[1].txt
02:23 PM: Found Cookie: Nuker Cookie, version 1, c:\documents and settings\owner\cookies\owner@nuker[2].txt
02:23 PM: Found Cookie: Aptimus Cookie, version 1, c:\documents and settings\owner\cookies\owner@network.aptimus[2].txt
02:23 PM: Found Cookie: Kount Cookie, version 1, c:\documents and settings\owner\cookies\owner@kount[2].txt
02:23 PM: Found Cookie: About Cookie, version 1, c:\documents and settings\owner\cookies\owner@japanese.about[2].txt
02:23 PM: Found Cookie: Accoona Cookie, version 1, c:\documents and settings\owner\cookies\owner@accoona[2].txt
02:23 PM: Found Cookie: HBMediaPro Cookie, version 1, c:\documents and settings\owner\cookies\owner@adopt.hbmediapro[2].txt
02:23 PM: Found Cookie: specificclick.com Cookie, version 1, c:\documents and settings\owner\cookies\owner@adopt.specificclick[1].txt
02:23 PM: Found Cookie: 64.62.232 Cookie, version 1, c:\documents and settings\owner\cookies\owner@64.62.232[2].txt
02:23 PM: Found Cookie: 888 Cookie, version 1, c:\documents and settings\owner\cookies\owner@888[1].txt
02:23 PM: Found Cookie: 888 Cookie, version 1, c:\documents and settings\owner\cookies\owner@888[2].txt
02:23 PM: Found Cookie: Belnk Cookie, version 1, c:\documents and settings\owner\cookies\owner@dist.belnk[1].txt
02:23 PM: Found Cookie: Com.com Cookie, version 1, c:\documents and settings\owner\cookies\owner@com[1].txt
02:23 PM: Found Cookie: About Cookie, version 1, c:\documents and settings\owner\cookies\owner@chineseculture.about[1].txt
02:23 PM: Found Cookie: Cassava Cookie, version 1, c:\documents and settings\owner\cookies\owner@cassava[1].txt
02:23 PM: Found Cookie: Apmebf Cookie, version 1, c:\documents and settings\owner\cookies\owner@apmebf[2].txt
02:23 PM: Found Cookie: Belnk Cookie, version 1, c:\documents and settings\owner\cookies\owner@ath.belnk[1].txt
02:23 PM: Found Cookie: AdProfile Cookie, version 1, c:\documents and settings\owner\cookies\owner@adprofile[1].txt
02:23 PM: Found Cookie: Azjmp Cookie, version 1, c:\documents and settings\owner\cookies\owner@azjmp[2].txt
02:23 PM: Found Cookie: Belnk Cookie, version 1, c:\documents and settings\owner\cookies\owner@belnk[2].txt
02:24 PM: Found Cookie: Adserver Cookie, version 1, c:\documents and settings\owner\cookies\owner@z1.adserver[1].txt
02:24 PM: Found Cookie: myaffiliateprogram.com Cookie, version 1, c:\documents and settings\owner\cookies\owner@www.myaffiliateprogram[1].txt
02:24 PM: Found Cookie: Rn11 Cookie, version 1, c:\documents and settings\owner\cookies\owner@rn11[2].txt
02:24 PM: Found Cookie: DirectTrack Cookie, version 1, c:\documents and settings\owner\cookies\owner@sideshow.directtrack[2].txt
02:24 PM: Found Cookie: Pokerroom Cookie, version 1, c:\documents and settings\owner\cookies\owner@pokerroom[2].txt
02:24 PM: Found Cookie: Paypopup Cookie, version 1, c:\documents and settings\owner\cookies\owner@paypopup[1].txt
02:24 PM: Found Cookie: Qksrv Cookie, version 1, c:\documents and settings\owner\cookies\owner@qksrv[2].txt
02:24 PM: Found Cookie: revenue.net Cookie, version 1, c:\documents and settings\owner\cookies\owner@revenue[2].txt
02:24 PM: Found Cookie: BurstBeacon Cookie, version 1, c:\documents and settings\owner\cookies\owner@www.burstbeacon[1].txt
02:24 PM: Found Cookie: Accoona Cookie, version 1, c:\documents and settings\owner\cookies\owner@www.accoona[2].txt
02:24 PM: Found Cookie: TribalFusion Cookie, version 1, c:\documents and settings\owner\cookies\owner@tribalfusion[2].txt
02:24 PM: Found Cookie: Toplist Cookie, version 1, c:\documents and settings\owner\cookies\owner@toplist[1].txt
02:24 PM: Found Cookie: About Cookie, version 1, c:\documents and settings\owner\cookies\owner@tattoo.about[2].txt
02:24 PM: Found Cookie: YieldManager Cookie, version 1, c:\documents and settings\owner\cookies\owner@ad.yieldmanager[2].txt
02:24 PM: Found Cookie: Rightmedia Cookie, version 1, c:\documents and settings\owner\cookies\owner@rightmedia[2].txt
02:25 PM: Found Adware: PurityScan, version 1, c:\documents and settings\owner\local settings\temp\mediatickets.exe
02:25 PM: Found Cookie: starware.com Cookie, version 1, c:\documents and settings\owner\cookies\owner@h.starware[1].txt
02:25 PM: Found Cookie: Oinadserve Cookie, version 1, c:\documents and settings\owner\cookies\owner@oinadserve[1].txt
02:26 PM: Found Cookie: About Cookie, version 1, c:\documents and settings\owner\cookies\owner@about[2].txt
02:50 PM: Found Adware: PurityScan, version 1, c:\windows\system32\shex.exe
02:51 PM: Found Adware: CWS-AboutBlank, version 1, c:\windows\system32\tyzwoc.dll
02:52 PM: Found: 45 file traces.
02:52 PM: Full Sweep has completed. Elapsed time 00:38:14
59,148 files swept
48 item traces located
03:09 PM: Removal process initiated
03:09 PM: Quarantining: 64.62.232 Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@64.62.232[2].txt
03:09 PM: Quarantining: 888 Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@888[1].txt
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@888[2].txt
03:09 PM: Quarantining: About Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@about[2].txt
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@history1900s.about[2].txt
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@japanese.about[2].txt
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@chineseculture.about[1].txt
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@tattoo.about[2].txt
03:09 PM: Quarantining: Accoona Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@accoona[2].txt
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@www.accoona[2].txt
03:09 PM: Quarantining: AdProfile Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@adprofile[1].txt
03:09 PM: Quarantining: Adserver Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@z1.adserver[1].txt
03:09 PM: Quarantining: Apmebf Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@apmebf[2].txt
03:09 PM: Quarantining: Aptimus Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@network.aptimus[2].txt
03:09 PM: Quarantining: Azjmp Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@azjmp[2].txt
03:09 PM: Quarantining: Belnk Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@belnk[2].txt
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@dist.belnk[1].txt
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@ath.belnk[1].txt
03:09 PM: Quarantining: BurstBeacon Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@www.burstbeacon[1].txt
03:09 PM: Quarantining: Cassava Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@cassava[1].txt
03:09 PM: Quarantining: Com.com Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@com[1].txt
03:09 PM: Quarantining: DirectTrack Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@sideshow.directtrack[2].txt
03:09 PM: Quarantining: Fastclick Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@fastclick[2].txt
03:09 PM: Quarantining: HBMediaPro Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@adopt.hbmediapro[2].txt
03:09 PM: Quarantining: IC-live Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@ic-live[1].txt
03:09 PM: Quarantining: Kount Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@kount[2].txt
03:09 PM: Quarantining: myaffiliateprogram.com Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@www.myaffiliateprogram[1].txt
03:09 PM: Quarantining: Nuker Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@nuker[2].txt
03:09 PM: Quarantining: Oinadserve Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@oinadserve[1].txt
03:09 PM: Quarantining: Partypoker Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@partypoker[1].txt
03:09 PM: Quarantining: Paypopup Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@paypopup[1].txt
03:09 PM: Quarantining: Pokerroom Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@pokerroom[2].txt
03:09 PM: Quarantining: Qksrv Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@qksrv[2].txt
03:09 PM: Quarantining: revenue.net Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@revenue[2].txt
03:09 PM: Quarantining: Rightmedia Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@rightmedia[2].txt
03:09 PM: Quarantining: Rn11 Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@rn11[2].txt
03:09 PM: Quarantining: Searchbar Toolbar
03:09 PM: Registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shell extensions\approved||{0a8ce102-fa03-4612-9bee-7fe5452f4cb1}
03:09 PM: Quarantining: specificclick.com Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@adopt.specificclick[1].txt
03:09 PM: Quarantining: Toplist Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@toplist[1].txt
03:09 PM: Quarantining: TribalFusion Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@tribalfusion[2].txt
03:09 PM: Quarantining: YieldManager Cookie
03:09 PM: Cookie: c:\documents and settings\owner\cookies\owner@ad.yieldmanager[2].txt
03:09 PM: Quarantining: Twain-Tech
03:10 PM: File: c:\documents and settings\owner\local settings\temp\polmx.inf
03:10 PM: Quarantining: starware.com Cookie
03:10 PM: Cookie: c:\documents and settings\owner\cookies\owner@h.starware[1].txt
03:10 PM: Quarantining: CWS-AboutBlank
03:10 PM: Removing from memory: c:\windows\system32\tyzwoc.dll
03:10 PM: File: c:\windows\system32\tyzwoc.dll
03:10 PM: Quarantining: PurityScan
03:10 PM: File: c:\documents and settings\owner\local settings\temp\mediatickets.exe
03:10 PM: File: c:\windows\system32\shex.exe
03:10 PM: Quarantining: Lopdotcom
03:10 PM: Registry: HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run||notn
03:10 PM: Cleaning Traces
03:10 PM: Removing registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shell extensions\approved|| ({0a8ce102-fa03-4612-9bee-7fe5452f4cb1})
03:10 PM: Removing registry: HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run|| (notn)
03:10 PM: Removing file: c:\windows\system32\shex.exe
03:10 PM: Removing file: c:\documents and settings\owner\local settings\temp\mediatickets.exe
03:10 PM: Removing file: c:\windows\system32\tyzwoc.dll
03:10 PM: Removing file: c:\documents and settings\owner\local settings\temp\polmx.inf
03:10 PM: Removing file: c:\documents and settings\owner\cookies\owner@nuker[2].txt
03:10 PM: Removing file: c:\documents and settings\owner\cookies\owner@www.myaffiliateprogram[1].txt
03:10 PM: Removing file: c:\documents and settings\owner\cookies\owner@kount[2].txt
03:10 PM: Removing file: c:\documents and settings\owner\cookies\owner@adprofile[1].txt
03:10 PM: Removal process completed. Elapsed time 00:00:36
38 items (47 traces) quarantined.
03:10 PM: |··· End of Session, July 29, 2005 ···|
03:12 PM: |··· Start of Session, July 29, 2005 ···|
03:12 PM: Spy Sweeper 3.5.0 (Build 191) started
03:14 PM: |··· End of Session, July 29, 2005 ···|
01:18 PM: |··· Start of Session, August 19, 2005 ···|
01:18 PM: Spy Sweeper 3.5.0 (Build 191) started
01:20 PM: Sweep initiated using definitions version 507
01:20 PM: Sweeping memory for threats.
01:20 PM: Found: Memory-resident threat Webhancer, version 1
01:20 PM: Found: Memory-resident threat Webhancer, version 1
01:20 PM: Found: Memory-resident threat Webhancer, version 1
01:20 PM: Found: Memory-resident threat Webhancer, version 1
01:20 PM: Found: Memory-resident threat Webhancer, version 1
01:20 PM: Memory sweep has completed. Elapsed time 00:00:30
01:20 PM: Registry sweep initiated.
01:21 PM: Found: 56 Webhancer registry traces.
01:22 PM: Found: 1 Lopdotcom registry traces.
01:22 PM: Registry sweep completed. Elapsed time 00:02:06
01:22 PM: Full sweep on all local drives initiated.
01:22 PM: Now sweeping drive C:
01:23 PM: Found Cookie: TribalFusion Cookie, version 1, c:\documents and settings\owner\cookies\owner@tribalfusion[1].txt
01:23 PM: Found Cookie: revenue.net Cookie, version 1, c:\documents and settings\owner\cookies\owner@revenue[2].txt
01:23 PM: Found Cookie: BurstNet Cookie, version 1, c:\documents and settings\owner\cookies\owner@burstnet[2].txt
01:23 PM: Found Cookie: Zedo Cookie, version 1, c:\documents and settings\owner\cookies\owner@c4.zedo[1].txt
01:23 PM: Found Cookie: Oinadserve Cookie, version 1, c:\documents and settings\owner\cookies\owner@oinadserve[2].txt
01:23 PM: Found Cookie: Ask Cookie, version 1, c:\documents and settings\owner\cookies\owner@ask[1].txt
01:23 PM: Found Cookie: HBMediaPro Cookie, version 1, c:\documents and settings\owner\cookies\owner@adopt.hbmediapro[2].txt
01:23 PM: Found Cookie: AdKnowledge Cookie, version 1, c:\documents and settings\owner\cookies\owner@adknowledge[1].txt
01:23 PM: Found Cookie: Zedo Cookie, version 1, c:\documents and settings\owner\cookies\owner@zedo[2].txt
01:24 PM: Found Cookie: YieldManager Cookie, version 1, c:\documents and settings\owner\cookies\owner@ad.yieldmanager[2].txt
01:24 PM: Found Cookie: Casalemedia Cookie, version 1, c:\documents and settings\owner\cookies\owner@casalemedia[1].txt
01:24 PM: Found Adware: 180search Assistant, version 1, c:\documents and settings\owner\local settings\temp\del6d.tmp
01:26 PM: Found Cookie: Fastclick Cookie, version 1, c:\documents and settings\owner\cookies\owner@fastclick[2].txt
01:28 PM: Found: 180search Assistant, version 1
01:40 PM: Found: Webhancer, version 1
01:40 PM: Found: Webhancer, version 1
01:41 PM: Found Adware: Webhancer, version 1, c:\program files\webhancer\programs\whagent.ini
01:41 PM: Found Adware: Webhancer, version 1, c:\program files\whinstall\whagent.ini
01:42 PM: Found Adware: Webhancer, version 1, c:\program files\webhancer\programs\webhdll.dll
01:44 PM: Found Adware: Webhancer, version 1, c:\program files\webhancer\programs\whinstaller.exe
01:44 PM: Found Adware: Webhancer, version 1, c:\program files\webhancer\programs\whiehlpr.dll
01:46 PM: Found Adware: Webhancer, version 1, c:\program files\webhancer\programs\whagent.exe
01:47 PM: Found Adware: Webhancer, version 1, c:\program files\whinstall\whinstaller.ini
01:47 PM: Found Adware: Webhancer, version 1, c:\program files\whinstall\whagent.inf
01:47 PM: Found Adware: Webhancer, version 1, c:\program files\webhancer\programs\whsurvey.exe
01:52 PM: Found Adware: Webhancer, version 1, c:\windows\whinstaller.ini
01:54 PM: Found Adware: PurityScan, version 1, c:\windows\system32\shex.exe
01:56 PM: Found Adware: Webhancer, version 1, c:\windows\whagent.inf
01:57 PM: Found Adware: Webhancer, version 1, c:\windows\whinstaller.exe
01:59 PM: Found Adware: Webhancer, version 1, c:\windows\webhdll.dll
02:00 PM: Found: 45 file traces.
02:00 PM: Full Sweep has completed. Elapsed time 00:40:49
57,586 files swept
107 item traces located
02:00 PM: Removal process initiated
02:01 PM: Quarantining: AdKnowledge Cookie
02:01 PM: Cookie: c:\documents and settings\owner\cookies\owner@adknowledge[1].txt
02:01 PM: Quarantining: Ask Cookie
02:01 PM: Cookie: c:\documents and settings\owner\cookies\owner@ask[1].txt
02:01 PM: Quarantining: BurstNet Cookie
02:01 PM: Cookie: c:\documents and settings\owner\cookies\owner@burstnet[2].txt
02:01 PM: Quarantining: Casalemedia Cookie
02:01 PM: Cookie: c:\documents and settings\owner\cookies\owner@casalemedia[1].txt
02:01 PM: Quarantining: Fastclick Cookie
02:01 PM: Cookie: c:\documents and settings\owner\cookies\owner@fastclick[2].txt
02:01 PM: Quarantining: HBMediaPro Cookie
02:01 PM: Cookie: c:\documents and settings\owner\cookies\owner@adopt.hbmediapro[2].txt
02:01 PM: Quarantining: Oinadserve Cookie
02:01 PM: Cookie: c:\documents and settings\owner\cookies\owner@oinadserve[2].txt
02:01 PM: Quarantining: revenue.net Cookie
02:01 PM: Cookie: c:\documents and settings\owner\cookies\owner@revenue[2].txt
02:01 PM: Quarantining: TribalFusion Cookie
02:01 PM: Cookie: c:\documents and settings\owner\cookies\owner@tribalfusion[1].txt
02:01 PM: Quarantining: YieldManager Cookie
02:01 PM: Cookie: c:\documents and settings\owner\cookies\owner@ad.yieldmanager[2].txt
02:01 PM: Quarantining: Webhancer
02:01 PM: Removing from memory: c:\program files\webhancer\programs\webhdll.dll
02:01 PM: Removing from memory: c:\windows\webhdll.dll
02:01 PM: Removing from memory: c:\program files\webhancer\programs\whagent.exe
02:01 PM: Removing from memory: c:\program files\webhancer\programs\whiehlpr.dll
02:01 PM: Removing from memory: c:\program files\webhancer\programs\whsurvey.exe
02:01 PM: Registry: HKEY_CLASSES_ROOT\clsid\{c900b400-cdfe-11d3-976a-00e02913a9e0}
02:01 PM: Registry: HKEY_CLASSES_ROOT\interface\{c89435b0-cdfe-11d3-976a-00e02913a9e0}
02:01 PM: Registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{c900b400-cdfe-11d3-976a-00e02913a9e0}
02:01 PM: Registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run||webhancer agent
02:01 PM: Registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run||webhancer survey companion
02:01 PM: Registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\webhancer agent
02:01 PM: Registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\whsurvey
02:01 PM: Registry: HKEY_LOCAL_MACHINE\software\webhancer
02:01 PM: Registry: HKEY_CLASSES_ROOT\typelib\{c8cb3870-cdfe-11d3-976a-00e02913a9e0}
02:01 PM: Registry: HKEY_CLASSES_ROOT\whiehelperobj.whiehelperobj.1
02:01 PM: Registry: HKEY_CLASSES_ROOT\whiehelperobj.whiehelperobj
02:01 PM: Registry: HKEY_CLASSES_ROOT\whiehelperobj.whiehelperobj\curver
02:01 PM: Registry: HKEY_CLASSES_ROOT\whiehelperobj.whiehelperobj||(-default-)
02:01 PM: Registry: HKEY_CLASSES_ROOT\whiehelperobj.whiehelperobj\curver||(-default-)
02:01 PM: Registry: HKEY_CLASSES_ROOT\whiehelperobj.whiehelperobj.1\clsid
02:01 PM: Registry: HKEY_CLASSES_ROOT\whiehelperobj.whiehelperobj.1||(-default-)
02:01 PM: Registry: HKEY_CLASSES_ROOT\whiehelperobj.whiehelperobj.1\clsid||(-default-)
02:01 PM: Registry: HKEY_CLASSES_ROOT\typelib\{c8cb3870-cdfe-11d3-976a-00e02913a9e0}\1.0
02:01 PM: Registry: HKEY_CLASSES_ROOT\typelib\{c8cb3870-cdfe-11d3-976a-00e02913a9e0}\1.0\0
02:01 PM: Registry: HKEY_CLASSES_ROOT\typelib\{c8cb3870-cdfe-11d3-976a-00e02913a9e0}\1.0\flags
02:01 PM: Registry: HKEY_CLASSES_ROOT\typelib\{c8cb3870-cdfe-11d3-976a-00e02913a9e0}\1.0\helpdir
02:01 PM: Registry: HKEY_CLASSES_ROOT\typelib\{c8cb3870-cdfe-11d3-976a-00e02913a9e0}\1.0\0\win32
02:01 PM: Registry: HKEY_CLASSES_ROOT\typelib\{c8cb3870-cdfe-11d3-976a-00e02913a9e0}\1.0||(-default-)
02:01 PM: Registry: HKEY_CLASSES_ROOT\typelib\{c8cb3870-cdfe-11d3-976a-00e02913a9e0}\1.0\flags||(-default-)
02:01 PM: Registry: HKEY_CLASSES_ROOT\typelib\{c8cb3870-cdfe-11d3-976a-00e02913a9e0}\1.0\helpdir||(-default-)
02:01 PM: Registry: HKEY_CLASSES_ROOT\typelib\{c8cb3870-cdfe-11d3-976a-00e02913a9e0}\1.0\0\win32||(-default-)
02:01 PM: Registry: HKEY_LOCAL_MACHINE\software\webhancer\cc
02:01 PM: Registry: HKEY_LOCAL_MACHINE\software\webhancer\eso
02:01 PM: Registry: HKEY_LOCAL_MACHINE\software\webhancer||(-default-)
02:01 PM: Registry: HKEY_LOCAL_MACHINE\software\webhancer||basedir
02:01 PM: Registry: HKEY_LOCAL_MACHINE\software\webhancer\cc||disttag
02:01 PM: Registry: HKEY_LOCAL_MACHINE\software\webhancer\cc||id
02:01 PM: Registry: HKEY_LOCAL_MACHINE\software\webhancer\eso||aa
02:01 PM: Registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\whsurvey||(-default-)
02:01 PM: Registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\whsurvey||displayname
02:01 PM: Registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\whsurvey||uninstallstring
02:01 PM: Registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\webhancer agent||(-default-)
02:01 PM: Registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\webhancer agent||displayname
02:01 PM: Registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\webhancer agent||uninstallstring
02:01 PM: Registry: HKEY_CLASSES_ROOT\interface\{c89435b0-cdfe-11d3-976a-00e02913a9e0}\proxystubclsid
02:01 PM: Registry: HKEY_CLASSES_ROOT\interface\{c89435b0-cdfe-11d3-976a-00e02913a9e0}\proxystubclsid32
02:01 PM: Registry: HKEY_CLASSES_ROOT\interface\{c89435b0-cdfe-11d3-976a-00e02913a9e0}\typelib
02:01 PM: Registry: HKEY_CLASSES_ROOT\interface\{c89435b0-cdfe-11d3-976a-00e02913a9e0}||(-default-)
02:01 PM: Registry: HKEY_CLASSES_ROOT\interface\{c89435b0-cdfe-11d3-976a-00e02913a9e0}\proxystubclsid||(-default-)
02:01 PM: Registry: HKEY_CLASSES_ROOT\interface\{c89435b0-cdfe-11d3-976a-00e02913a9e0}\proxystubclsid32||(-default-)
02:01 PM: Registry: HKEY_CLASSES_ROOT\interface\{c89435b0-cdfe-11d3-976a-00e02913a9e0}\typelib||(-default-)
02:01 PM: Registry: HKEY_CLASSES_ROOT\interface\{c89435b0-cdfe-11d3-976a-00e02913a9e0}\typelib||version
02:01 PM: Registry: HKEY_CLASSES_ROOT\clsid\{c900b400-cdfe-11d3-976a-00e02913a9e0}\inprocserver32
02:01 PM: Registry: HKEY_CLASSES_ROOT\clsid\{c900b400-cdfe-11d3-976a-00e02913a9e0}\progid
02:01 PM: Registry: HKEY_CLASSES_ROOT\clsid\{c900b400-cdfe-11d3-976a-00e02913a9e0}\programmable
02:01 PM: Registry: HKEY_CLASSES_ROOT\clsid\{c900b400-cdfe-11d3-976a-00e02913a9e0}\versionindependentprogid
02:01 PM: Registry: HKEY_CLASSES_ROOT\clsid\{c900b400-cdfe-11d3-976a-00e02913a9e0}||(-default-)
02:01 PM: Registry: HKEY_CLASSES_ROOT\clsid\{c900b400-cdfe-11d3-976a-00e02913a9e0}\inprocserver32||(-default-)
02:01 PM: Registry: HKEY_CLASSES_ROOT\clsid\{c900b400-cdfe-11d3-976a-00e02913a9e0}\inprocserver32||threadingmodel
02:01 PM: Registry: HKEY_CLASSES_ROOT\clsid\{c900b400-cdfe-11d3-976a-00e02913a9e0}\progid||(-default-)
02:01 PM: Registry: HKEY_CLASSES_ROOT\clsid\{c900b400-cdfe-11d3-976a-00e02913a9e0}\versionindependentprogid||(-default-)
02:01 PM: File: c:\program files\webhancer\programs\webhdll.dll
02:01 PM: File: c:\windows\webhdll.dll
02:01 PM: File: c:\program files\webhancer\programs\whagent.exe
02:01 PM: File: c:\program files\whinstall\whagent.inf
02:01 PM: File: c:\windows\whagent.inf
02:01 PM: File: c:\program files\webhancer\programs\whagent.ini
02:01 PM: File: c:\program files\whinstall\whagent.ini
02:01 PM: File: c:\program files\webhancer\programs\whiehlpr.dll
02:01 PM: File: c:\program files\webhancer\programs\whinstaller.exe
02:01 PM: File: c:\windows\whinstaller.exe
02:01 PM: File: c:\windows\whinstaller.ini
02:01 PM: File: c:\program files\whinstall\whinstaller.ini
02:01 PM: File: c:\program files\webhancer\programs\whsurvey.exe
02:01 PM: File: c:\program files\whinstall\license.txt
02:01 PM: File: c:\program files\whinstall\readme.txt
02:01 PM: File: c:\program files\webhancer\programs\license.txt
02:01 PM: File: c:\program files\webhancer\programs\readme.txt
02:01 PM: File: c:\program files\webhancer\programs\set55.tmp
02:01 PM: File: c:\program files\webhancer\programs\set57.tmp
02:01 PM: File: c:\program files\webhancer\programs\set5b.tmp
02:02 PM: File: c:\program files\webhancer\programs\set5d.tmp
02:02 PM: File: c:\program files\webhancer\programs\set5f.tmp
02:02 PM: File: c:\program files\webhancer\programs\set61.tmp
02:02 PM: File: c:\program files\webhancer\programs\sporder.dll
02:02 PM: File: c:\program files\webhancer\programs\whsurvey.ini
02:02 PM: Folder: c:\program files\webhancer\programs
02:02 PM: Folder: c:\program files\whinstall
02:02 PM: Folder: c:\program files\webhancer
02:02 PM: Quarantining: Zedo Cookie
02:02 PM: Cookie: c:\documents and settings\owner\cookies\owner@zedo[2].txt
02:02 PM: Cookie: c:\documents and settings\owner\cookies\owner@c4.zedo[1].txt
02:02 PM: Quarantining: PurityScan
02:02 PM: File: c:\windows\system32\shex.exe
02:02 PM: Quarantining: Lopdotcom
02:02 PM: Registry: HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run||notn
02:02 PM: Quarantining: 180search Assistant
02:02 PM: File: c:\documents and settings\owner\local settings\temp\del6d.tmp
02:02 PM: Folder: c:\program files\180searchassistant\sa
02:02 PM: Folder: c:\program files\180searchassistant\sa\245
02:02 PM: Folder: c:\program files\180searchassistant
02:02 PM: Cleaning Traces
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\whiehelperobj.whiehelperobj\curver
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\whiehelperobj.whiehelperobj.1\clsid
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\whiehelperobj.whiehelperobj.1
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\whiehelperobj.whiehelperobj
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\typelib\{c8cb3870-cdfe-11d3-976a-00e02913a9e0}\1.0\helpdir
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\typelib\{c8cb3870-cdfe-11d3-976a-00e02913a9e0}\1.0\flags
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\typelib\{c8cb3870-cdfe-11d3-976a-00e02913a9e0}\1.0\0\win32
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\typelib\{c8cb3870-cdfe-11d3-976a-00e02913a9e0}\1.0\0
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\typelib\{c8cb3870-cdfe-11d3-976a-00e02913a9e0}\1.0
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\typelib\{c8cb3870-cdfe-11d3-976a-00e02913a9e0}
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\interface\{c89435b0-cdfe-11d3-976a-00e02913a9e0}\typelib|| (version)
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\interface\{c89435b0-cdfe-11d3-976a-00e02913a9e0}\typelib
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\interface\{c89435b0-cdfe-11d3-976a-00e02913a9e0}\proxystubclsid32
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\interface\{c89435b0-cdfe-11d3-976a-00e02913a9e0}\proxystubclsid
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\interface\{c89435b0-cdfe-11d3-976a-00e02913a9e0}
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\clsid\{c900b400-cdfe-11d3-976a-00e02913a9e0}\versionindependentprogid
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\clsid\{c900b400-cdfe-11d3-976a-00e02913a9e0}\programmable
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\clsid\{c900b400-cdfe-11d3-976a-00e02913a9e0}\progid
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\clsid\{c900b400-cdfe-11d3-976a-00e02913a9e0}\inprocserver32|| (threadingmodel)
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\clsid\{c900b400-cdfe-11d3-976a-00e02913a9e0}\inprocserver32
02:02 PM: Removing registry: HKEY_CLASSES_ROOT\clsid\{c900b400-cdfe-11d3-976a-00e02913a9e0}
02:02 PM: Removing registry: HKEY_LOCAL_MACHINE\software\webhancer\eso|| (aa)
02:02 PM: Removing registry: HKEY_LOCAL_MACHINE\software\webhancer\eso
02:02 PM: Removing registry: HKEY_LOCAL_MACHINE\software\webhancer\cc|| (id)
02:02 PM: Removing registry: HKEY_LOCAL_MACHINE\software\webhancer\cc|| (disttag)
02:02 PM: Removing registry: HKEY_LOCAL_MACHINE\software\webhancer\cc
02:02 PM: Removing registry: HKEY_LOCAL_MACHINE\software\webhancer|| (basedir)
02:02 PM: Removing registry: HKEY_LOCAL_MACHINE\software\webhancer
02:02 PM: Removing registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\whsurvey|| (uninstallstring)
02:02 PM: Removing registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\whsurvey|| (displayname)
02:02 PM: Removing registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\whsurvey
02:02 PM: Removing registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\webhancer agent|| (uninstallstring)
02:02 PM: Removing registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\webhancer agent|| (displayname)
02:02 PM: Removing registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\webhancer agent
02:02 PM: Removing registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run|| (webhancer survey companion)
02:02 PM: Removing registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run|| (webhancer agent)
02:02 PM: Removing registry: HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{c900b400-cdfe-11d3-976a-00e02913a9e0}
02:02 PM: Removing registry: HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run|| (notn)
02:02 PM: Removing file: c:\documents and settings\owner\local settings\temp\del6d.tmp
02:02 PM: Removing file: c:\windows\system32\shex.exe
02:02 PM: Removing file: c:\program files\webhancer\programs\whsurvey.ini
02:02 PM: Removing file: c:\program files\webhancer\programs\sporder.dll
02:02 PM: Removing file: c:\program files\webhancer\programs\set61.tmp
02:02 PM: Removing file: c:\program files\webhancer\programs\set5f.tmp
02:02 PM: Removing file: c:\program files\webhancer\programs\set5d.tmp
02:02 PM: Removing file: c:\program files\webhancer\programs\set5b.tmp
02:02 PM: Removing file: c:\program files\webhancer\programs\set57.tmp
02:02 PM: Removing file: c:\program files\webhancer\programs\set55.tmp
02:02 PM: Removing file: c:\program files\webhancer\programs\readme.txt
02:02 PM: Removing file: c:\program files\webhancer\programs\license.txt
02:02 PM: Removing file: c:\program files\whinstall\readme.txt
02:02 PM: Removing file: c:\program files\whinstall\license.txt
02:02 PM: Removing file: c:\program files\webhancer\programs\whsurvey.exe
02:02 PM: Removing file: c:\program files\whinstall\whinstaller.ini
02:02 PM: Removing file: c:\windows\whinstaller.ini
02:02 PM: Removing file: c:\windows\whinstaller.exe
02:02 PM: Removing file: c:\program files\webhancer\programs\whinstaller.exe
02:02 PM: Removing file: c:\program files\webhancer\programs\whiehlpr.dll
02:02 PM: Removing file: c:\program files\whinstall\whagent.ini
02:02 PM: Removing file: c:\program files\webhancer\programs\whagent.ini
02:02 PM: Removing file: c:\windows\whagent.inf
02:02 PM: Removing file: c:\program files\whinstall\whagent.inf
02:02 PM: Removing file: c:\program files\webhancer\programs\whagent.exe
02:02 PM: Removing file: c:\windows\webhdll.dll
02:02 PM: Removing from memory: c:\windows\webhdll.dll
02:02 PM: Removing file on reboot: c:\windows\webhdll.dll
02:02 PM: Removing file: c:\program files\webhancer\programs\webhdll.dll
02:02 PM: Removing from memory: c:\program files\webhancer\programs\webhdll.dll
02:02 PM: Removing file on reboot: c:\program files\webhancer\programs\webhdll.dll
02:02 PM: Folder: c:\program files\180searchassistant\sa\245
02:02 PM: Folder: c:\program files\180searchassistant\sa
02:02 PM: Folder: c:\program files\webhancer\programs
02:06 PM: Removal pro11:25 AM: |··· Start of Session, August 28, 2005 ···|
11:25 AM: Spy Sweeper 3.5.0 (Build 191) started
11:28 AM: Processing Startup Alerts
11:28 AM: Removed Startup entry: webHancer Agent
11:28 AM: Removed Startup entry: webHancer Survey Companion
11:28 AM: Processing Startup Alerts
11:28 AM: Allowed Startup entry: Symantec NetDriver Monitor
11:29 AM: Sweep initiated using definitions version 507
11:29 AM: Sweeping memory for threats.
11:30 AM: Memory sweep has completed. Elapsed time 00:01:09
11:30 AM: Registry sweep initiated.
11:32 AM: Found: 1 Lopdotcom registry traces.
11:32 AM: Registry sweep completed. Elapsed time 00:02:49
11:32 AM: Full sweep on all local drives initiated.
11:32 AM: Now sweeping drive C:
11:35 AM: Found Cookie: YieldManager Cookie, version 1, c:\documents and settings\owner\cookies\owner@ad.yieldmanager[1].txt
11:52 AM: Found: Webhancer, version 1
12:05 PM: Found: 3 file traces.
12:05 PM: Full Sweep has completed. Elapsed time 00:36:19
58,968 files swept
4 item traces located
12:42 PM: Removal process initiated
12:42 PM: Quarantining: YieldManager Cookie
12:42 PM: Cookie: c:\documents and settings\owner\cookies\owner@ad.yieldmanager[1].txt
12:42 PM: Quarantining: Webhancer
12:42 PM: Folder: c:\program files\webhancer\programs
12:42 PM: Folder: c:\program files\webhancer
12:42 PM: Quarantining: Lopdotcom
12:42 PM: Registry: HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run||notn
12:42 PM: Cleaning Traces
12:42 PM: Removing registry: HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run|| (notn)
12:42 PM: Folder: c:\program files\webhancer\programs
12:42 PM: Folder: c:\program files\webhancer
12:42 PM: Removal process completed. Elapsed time 00:00:08
3 items (4 traces) quarantined.
12:42 PM: |··· End of Session, August 28, 2005 ···|
02:43 PM: |··· Start of Session, September 18, 2005 ···|
02:43 PM: Spy Sweeper 3.5.0 (Build 191) started
02:43 PM: Processing Startup Alerts
02:43 PM: Removed Startup entry: Yhyio
02:43 PM: Removed Startup entry: SunJavaUpdateSched
02:44 PM: Sweep initiated using definitions version 507
02:44 PM: Sweeping memory for threats.
02:46 PM: Memory sweep has completed. Elapsed time 00:01:51
02:46 PM: Registry sweep initiated.
02:47 PM: Found: 1 Lopdotcom registry traces.
02:47 PM: Registry sweep completed. Elapsed time 00:02:42
02:47 PM: Full sweep on all local drives initiated.
02:47 PM: Now sweeping drive C:
02:48 PM: Found Cookie: BurstBeacon Cookie, version 1, c:\documents and settings\owner\cookies\owner@www.burstbeacon[1].txt
02:48 PM: Found Cookie: starware.com Cookie, version 1, c:\documents and settings\owner\cookies\owner@starware[2].txt
02:48 PM: Found Cookie: TribalFusion Cookie, version 1, c:\documents and settings\owner\cookies\owner@tribalfusion[2].txt
02:48 PM: Found Cookie: Statcounter Cookie, version 1, c:\documents and settings\owner\cookies\owner@statcounter[1].txt
02:48 PM: Found Cookie: screensavers.com Cookie, version 1, c:\documents and settings\owner\cookies\owner@www.screensavers[1].txt
02:48 PM: Found Cookie: 2o7.net Cookie, version 1, c:\documents and settings\owner\cookies\owner@2o7[1].txt
02:48 PM: Found Cookie: AdDynamix Cookie, version 1, c:\documents and settings\owner\cookies\owner@ads.addynamix[1].txt
02:48 PM: Found Cookie: Adrevolver Cookie, version 1, c:\documents and settings\owner\cookies\owner@adrevolver[2].txt
02:48 PM: Found Cookie: joetec.net Cookie, version 1, c:\documents and settings\owner\cookies\owner@ads.joetec[1].txt
02:48 PM: Found Cookie: Adrevolver Cookie, version 1, c:\documents and settings\owner\cookies\owner@adrevolver[1].txt
02:48 PM: Found Cookie: AdKnowledge Cookie, version 1, c:\documents and settings\owner\cookies\owner@adknowledge[1].txt
02:49 PM: Found Cookie: screensavers.com Cookie, version 1, c:\documents and settings\owner\cookies\owner@i.screensavers[2].txt
02:49 PM: Found Cookie: Oinadserve Cookie, version 1, c:\documents and settings\owner\cookies\owner@oinadserve[2].txt
02:49 PM: Found Cookie: BurstNet Cookie, version 1, c:\documents and settings\owner\cookies\owner@burstnet[1].txt
02:49 PM: Found Cookie: Ask Cookie, version 1, c:\documents and settings\owner\cookies\owner@ask[1].txt
02:49 PM: Found Cookie: Atwola Cookie, version 1, c:\documents and settings\owner\cookies\owner@atwola[1].txt
02:49 PM: Found Cookie: Apmebf Cookie, version 1, c:\documents and settings\owner\cookies\owner@apmebf[1].txt
02:52 PM: Found Cookie: YieldManager Cookie, version 1, c:\documents and settings\owner\cookies\owner@ad.yieldmanager[2].txt
02:53 PM: Found Cookie: Fastclick Cookie, version 1, c:\documents and settings\owner\cookies\owner@fastclick[1].txt
02:54 PM: Found Cookie: Falkag Cookie, version 1, c:\documents and settings\owner\cookies\owner@as-eu.falkag[1].txt
02:55 PM: Found Cookie: Casalemedia Cookie, version 1, c:\documents and settings\owner\cookies\owner@casalemedia[2].txt
03:31 PM: Found: 21 file traces.
03:31 PM: Full Sweep has completed. Elapsed time 00:47:23
58,654 files swept
22 item traces located
03:37 PM: Removal process initiated
03:37 PM: Quarantining: 2o7.net Cookie
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@2o7[1].txt
03:37 PM: Quarantining: AdDynamix Cookie
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@ads.addynamix[1].txt
03:37 PM: Quarantining: AdKnowledge Cookie
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@adknowledge[1].txt
03:37 PM: Quarantining: Adrevolver Cookie
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@adrevolver[2].txt
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@adrevolver[1].txt
03:37 PM: Quarantining: Apmebf Cookie
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@apmebf[1].txt
03:37 PM: Quarantining: Ask Cookie
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@ask[1].txt
03:37 PM: Quarantining: Atwola Cookie
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@atwola[1].txt
03:37 PM: Quarantining: BurstBeacon Cookie
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@www.burstbeacon[1].txt
03:37 PM: Quarantining: BurstNet Cookie
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@burstnet[1].txt
03:37 PM: Quarantining: Casalemedia Cookie
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@casalemedia[2].txt
03:37 PM: Quarantining: Falkag Cookie
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@as-eu.falkag[1].txt
03:37 PM: Quarantining: Fastclick Cookie
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@fastclick[1].txt
03:37 PM: Quarantining: joetec.net Cookie
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@ads.joetec[1].txt
03:37 PM: Quarantining: Oinadserve Cookie
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@oinadserve[2].txt
03:37 PM: Quarantining: screensavers.com Cookie
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@www.screensavers[1].txt
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@i.screensavers[2].txt
03:37 PM: Quarantining: Statcounter Cookie
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@statcounter[1].txt
03:37 PM: Quarantining: TribalFusion Cookie
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@tribalfusion[2].txt
03:37 PM: Quarantining: YieldManager Cookie
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@ad.yieldmanager[2].txt
03:37 PM: Quarantining: starware.com Cookie
03:37 PM: Cookie: c:\documents and settings\owner\cookies\owner@starware[2].txt
03:37 PM: Quarantining: Lopdotcom
03:37 PM: Registry: HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run||notn
03:37 PM: Cleaning Traces
03:37 PM: Removing registry: HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run|| (notn)
03:37 PM: Removal process completed. Elapsed time 00:00:06
20 items (22 traces) quarantined.
03:38 PM: |··· End of Session, September 18, 2005 ···|
05:27 PM: |··· Start of Session, October 19, 2005 ···|
05:27 PM: Spy Sweeper 3.5.0 (Build 191) started
05:28 PM: Sweep initiated using definitions version 507
05:28 PM: Sweeping memory for threats.
05:29 PM: Memory sweep has completed. Elapsed time 00:00:44
05:29 PM: Registry sweep initiated.
05:29 PM: Found: 1 Lopdotcom registry traces.
05:29 PM: Registry sweep completed. Elapsed time 00:01:17
05:29 PM: Full sweep on all local drives initiated.
05:29 PM: Now sweeping drive C:
05:31 PM: Found Cookie: About Cookie, version 1, c:\documents and settings\owner\cookies\owner@animatedtv.about[1].txt
05:31 PM: Found Cookie: A Cookie, version 1, c:\documents and settings\owner\cookies\owner@a[2].txt
05:31 PM: Found Cookie: Belnk Cookie, version 1, c:\documents and settings\owner\cookies\owner@belnk[1].txt
05:31 PM: Found Cookie: Belnk Cookie, version 1, c:\documents and settings\owner\cookies\owner@dist.belnk[2].txt
05:31 PM: Found Cookie: Partypoker Cookie, version 1, c:\documents and settings\owner\cookies\owner@partypoker[1].txt
05:31 PM: Found Cookie: Pricegrabber Cookie, version 1, c:\documents and settings\owner\cookies\owner@pricegrabber[1].txt
05:34 PM: Found Cookie: About Cookie, version 1, c:\documents and settings\owner\cookies\owner@about[2].txt
05:34 PM: Found Cookie: YieldManager Cookie, version 1, c:\documents and settings\owner\cookies\owner@ad.yieldmanager[1].txt
05:57 PM: Found: 8 file traces.
05:57 PM: Full Sweep has completed. Elapsed time 00:29:32
60,377 files swept
9 item traces located
05:59 PM: Removal process initiated
05:59 PM: Quarantining: A Cookie
05:59 PM: Cookie: c:\documents and settings\owner\cookies\owner@a[2].txt
05:59 PM: Quarantining: About Cookie
05:59 PM: Cookie: c:\documents and settings\owner\cookies\owner@about[2].txt
05:59 PM: Cookie: c:\documents and settings\owner\cookies\owner@animatedtv.about[1].txt
05:59 PM: Quarantining: Belnk Cookie
05:59 PM: Cookie: c:\documents and settings\owner\cookies\owner@belnk[1].txt
05:59 PM: Cookie: c:\documents and settings\owner\cookies\owner@dist.belnk[2].txt
05:59 PM: Quarantining: Partypoker Cookie
05:59 PM: Cookie: c:\documents and settings\owner\cookies\owner@partypoker[1].txt
05:59 PM: Quarantining: Pricegrabber Cookie
05:59 PM: Cookie: c:\documents and settings\owner\cookies\owner@pricegrabber[1].txt
05:59 PM: Quarantining: YieldManager Cookie
05:59 PM: Cookie: c:\documents and settings\owner\cookies\owner@ad.yieldmanager[1].txt
05:59 PM: Quarantining: Lopdotcom
05:59 PM: Registry: HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run||notn
05:59 PM: Cleaning Traces
05:59 PM: Removing registry: HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run|| (notn)
05:59 PM: Removal process completed. Elapsed time 00:00:02
7 items (9 traces) quarantined.
05:59 PM: |··· End of Session, October 19, 2005 ···|
05:41 PM: |··· Start of Session, December 6, 2005 ···|
05:41 PM: Spy Sweeper 3.5.0 (Build 191) started
05:42 PM: Processing Startup Alerts
05:42 PM: Removed Startup entry: Eyze
05:42 PM: Removed Startup entry: MSConfig
05:42 PM: Processing Internet Explorer Favorites Alerts
05:42 PM: Removed IE Favorite: Antivirus Test Online
05:42 PM: Removed IE Favorite: Free XXX Sites List
05:42 PM: Removed IE Favorite: Take It Here - Daily Updated Porn Links
05:42 PM: Sweep initiated using definitions version 507
05:42 PM: Sweeping memory for threats.
05:43 PM: Memory sweep has completed. Elapsed time 00:00:16
05:43 PM: Registry sweep initiated.
05:43 PM: Found: 1 www.oneclicksearches.com Hijack registry traces.
05:43 PM: Registry sweep completed. Elapsed time 00:00:50
05:43 PM: Full sweep on all local drives initiated.
05:43 PM: Now sweeping drive C:
05:44 PM: Found Cookie: screensavers.com Cookie, version 1, c:\documents and settings\owner\cookies\owner@www.screensavers[2].txt
05:44 PM: Found Cookie: starware.com Cookie, version 1, c:\documents and settings\owner\cookies\owner@starware[2].txt
05:44 PM: Found Cookie: Epilot Cookie, version 1, c:\documents and settings\owner\cookies\owner@www.epilot[1].txt
05:46 PM: Found Cookie: screensavers.com Cookie, version 1, c:\documents and settings\owner\cookies\owner@i.screensavers[1].txt
05:47 PM: Found Cookie: YieldManager Cookie, version 1, c:\documents and settings\owner\cookies\owner@ad.yieldmanager[1].txt
05:49 PM: Found Adware: TargetSaver, version 1, c:\program files\common files\iwkk\iwkkd\class-barrel
05:49 PM: Found Adware: TargetSaver, version 1, c:\program files\common files\iwkk\iwkkd\vocabulary
06:09 PM: Found: 7 file traces.
06:09 PM: Full Sweep has completed. Elapsed time 00:26:31
57,450 files swept
8 item traces located
06:40 PM: Removal process initiated
06:40 PM: Quarantining: Epilot Cookie
06:40 PM: Cookie: c:\documents and settings\owner\cookies\owner@www.epilot[1].txt
06:40 PM: Quarantining: screensavers.com Cookie
06:40 PM: Cookie: c:\documents and settings\owner\cookies\owner@www.screensavers[2].txt
06:40 PM: Cookie: c:\documents and settings\owner\cookies\owner@i.screensavers[1].txt
06:40 PM: Quarantining: YieldManager Cookie
06:40 PM: Cookie: c:\documents and settings\owner\cookies\owner@ad.yieldmanager[1].txt
06:40 PM: Quarantining: www.oneclicksearches.com Hijack
06:40 PM: Registry: HKEY_CURRENT_USER\software\microsoft\internet explorer\main||use search asst
06:40 PM: Quarantining: starware.com Cookie
06:40 PM: Cookie: c:\documents and settings\owner\cookies\owner@starware[2].txt
06:40 PM: Quarantining: TargetSaver
06:40 PM: File: c:\program files\common files\iwkk\iwkkd\class-barrel
06:40 PM: File: c:\program files\common files\iwkk\iwkkd\vocabulary
06:40 PM: Cleaning Traces
06:40 PM: Removing registry: HKEY_CURRENT_USER\software\microsoft\internet explorer\main|| (use search asst)
06:40 PM: Removing file: c:\program files\common files\iwkk\iwkkd\vocabulary
06:40 PM: Removing file: c:\program files\common files\iwkk\iwkkd\class-barrel
06:40 PM: Removal process completed. Elapsed time 00:00:06
6 items (8 traces) quarantined.
06:41 PM: |··· End of Session, December 6, 2005 ···|
06:43 PM: |··· Start of Session, December 7, 2005 ···|
06:43 PM: Spy Sweeper 3.5.0 (Build 191) started
06:43 PM: Updating spyware definitions
06:45 PM: Your spyware definitions have been updated.
06:46 PM: Sweep initiated using definitions version 580
06:46 PM: Sweeping memory for threats.
06:46 PM: Memory sweep has completed. Elapsed time 00:00:20
06:46 PM: Registry sweep initiated.
06:47 PM: Found: 9 Command registry traces.
06:47 PM: Found: 2 DollarRevenue registry traces.
06:47 PM: Found: 16 SpamRelayer_Alpiok registry traces.
06:47 PM: Registry sweep completed. Elapsed time 00:00:53
06:47 PM: Full sweep on all local drives initiated.
06:47 PM: Now sweeping drive C:
06:48 PM: Found Cookie: Realmedia Cookie, version 1, c:\documents and settings\owner\cookies\owner@realmedia[1].txt
06:48 PM: Found Cookie: screensavers.com Cookie, version 1, c:\documents and settings\owner\cookies\owner@i.screensavers[1].txt
06:48 PM: Found Cookie: starware.com Cookie, version 1, c:\documents and settings\owner\cookies\owner@starware[2].txt
06:48 PM: Found Cookie: screensavers.com Cookie, version 1, c:\documents and settings\owner\cookies\owner@www.screensavers[1].txt
06:50 PM: Found Cookie: Falkag Cookie, version 1, c:\documents and settings\owner\cookies\owner@as-us.falkag[2].txt
06:50 PM: Found Cookie: YieldManager Cookie, version 1, c:\documents and settings\owner\cookies\owner@ad.yieldmanager[1].txt
06:50 PM: Found Cookie: Trafficmp Cookie, version 1, c:\documents and settings\owner\cookies\owner@trafficmp[2].txt
06:53 PM: Found Adware: Look2Me, version 1, c:\installer.exe
07:03 PM: Found Adware: TargetSaver, version 1, c:\program files\common files\iwkk\iwkkd\iwkkc.dll
07:03 PM: Found Adware: TargetSaver, version 1, c:\program files\common files\iwkk\iwkkl.exe
07:12 PM: Found Adware: DollarRevenue, version 1, c:\windows\drsmartload.dat
07:12 PM: Found Adware: SpySheriff, version 1, c:\secure32.html
07:15 PM: Found Adware: CoolWebSearch (CWS), version 1, c:\windows\inet20003\3.00.11.dll
07:16 PM: Found Adware: SpySheriff, version 1, c:\windows\secure32.html
07:19 PM: Found Adware: Command, version 1, c:\windows\unlhbibpywtl\ob51v21jsqq5.vbs
07:20 PM: Found Adware: TargetSaver, version 1, c:\windows\system32\tsuninst.exe
07:20 PM: Found: 16 file traces.
07:20 PM: Full Sweep has completed. Elapsed time 00:34:28
55,792 files swept
43 item traces located
07:26 PM: Removal process initiated
07:26 PM: Quarantining: Falkag Cookie
07:26 PM: Cookie: c:\documents and settings\owner\cookies\owner@as-us.falkag[2].txt
07:26 PM: Quarantining: Realmedia Cookie
07:26 PM: Cookie: c:\documents and settings\owner\cookies\owner@realmedia[1].txt
07:26 PM: Quarantining: screensavers.com Cookie
07:26 PM: Cookie: c:\documents and settings\owner\cookies\owner@i.screensavers[1].txt
07:26 PM: Cookie: c:\documents and settings\owner\cookies\owner@www.screensavers[1].txt
07:26 PM: Quarantining: Trafficmp Cookie
07:26 PM: Cookie: c:\documents and settings\owner\cookies\owner@trafficmp[2].txt
07:26 PM: Quarantining: starware.com Cookie
07:26 PM: Cookie: c:\documents and settings\owner\cookies\owner@starware[2].txt
07:26 PM: Quarantining: Look2Me
07:26 PM: File: c:\installer.exe
07:26 PM: Quarantining: TargetSaver
07:26 PM: File: c:\windows\system32\tsuninst.exe
07:26 PM: File: c:\program files\common files\iwkk\iwkkd\iwkkc.dll
07:26 PM: File: c:\program files\common files\iwkk\iwkkl.exe
07:26 PM: Quarantining: Command
07:26 PM: Registry: HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_cmdservice\0000
07:26 PM: Registry: HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_cmdservice
07:26 PM: Registry: HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_cmdservice||nextinstance
07:26 PM: Registry: HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_cmdservice\0000||service
07:26 PM: Registry: HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_cmdservice\0000||legacy
07:26 PM: Registry: HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_cmdservice\0000||configflags
07:26 PM:

#4 -David-

-David-

  • Members
  • 10,603 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London
  • Local time:03:50 AM

Posted 08 December 2005 - 11:53 AM

Now, reboot and post a new HJT log
David ;)

#5 RDO

RDO
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:11:20 PM

Posted 08 December 2005 - 05:44 PM

Sorry...I added the HJT log to my last post but I guess it was too big. I did a reboot and here it is:


Logfile of HijackThis v1.99.1
Scan saved at 7:09:39 PM, on 12/08/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\MSN Messenger\msnmsgr.exe
C:\Documents and Settings\Owner\Desktop\HijackThis.exe
C:\PROGRA~1\MOZILL~1\FIREFOX.EXE

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [AVG7_EMC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar2.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar2.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar2.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar2.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\PartyPoker.exe
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\PartyPoker.exe
O10 - Broken Internet access because of LSP provider 'mswsck2.dll' missing
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://spaces.msn.com/PhotoUpload/MsnPUpld.cab?10,0,910,0
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.com/v5co...b?1097722150265
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://sympatico.zone.msn.com/binFramework...ro.cab27513.cab
O16 - DPF: {F5C90925-ABBF-4475-88F5-8622B452BA9E} (Compaq System Data Class) - http://wwemail.support.hp.com/fd2/objects/SysQuery.cab
O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
O20 - Winlogon Notify: Reliability - C:\WINDOWS\system32\kt04l7dq1.dll
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: Softex OmniPass Service (omniserv) - Unknown owner - C:\Program Files\Softex\OmniPass\Omniserv.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe



Hope to hear from you soon
RDO

#6 -David-

-David-

  • Members
  • 10,603 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London
  • Local time:03:50 AM

Posted 09 December 2005 - 12:59 PM

Download L2mfix from one of these two locations:

http://www.atribune.org/downloads/l2mfix.exe
http://www.downloads.subratam.org/l2mfix.exe

Save the file to your desktop and double click l2mfix.exe. Click the Install button to extract the files and follow the prompts, then open the newly added l2mfix folder on your desktop. Double click l2mfix.bat and select option #1 for Run Find Log by typing 1 and then pressing enter. This will scan your computer and it may appear nothing is happening, then, after a minute or 2, notepad will open with a log. Copy the contents of that log and paste it into this thread.

IMPORTANT: Do NOT run option #2 OR any other files in the l2mfix folder until you are asked to do so!

David

#7 RDO

RDO
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:11:20 PM

Posted 10 December 2005 - 01:18 PM

Here's the log you requested...thanks again for your help!


L2MFIX find log 120905
These are the registry keys present
**********************************************************************************
Winlogon/notify:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Reliability]
"Asynchronous"=dword:00000000
"DllName"="C:\\WINDOWS\\system32\\kt04l7dq1.dll"
"Impersonate"=dword:00000000
"Logon"="WinLogon"
"Logoff"="WinLogoff"
"Shutdown"="WinShutdown"

**********************************************************************************
useragent:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
"{4CE69CED-1BD3-11C6-A8B1-A72662C95272}"=""

**********************************************************************************
Shell Extension key:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]
"{00022613-0000-0000-C000-000000000046}"="Multimedia File Property Sheet"
"{176d6597-26d3-11d1-b350-080036a75b03}"="ICM Scanner Management"
"{1F2E5C40-9550-11CE-99D2-00AA006E086C}"="NTFS Security Page"
"{3EA48300-8CF6-101B-84FB-666CCB9BCD32}"="OLE Docfile Property Page"
"{40dd6e20-7c17-11ce-a804-00aa003ca9f6}"="Shell extensions for sharing"
"{41E300E0-78B6-11ce-849B-444553540000}"="PlusPack CPL Extension"
"{42071712-76d4-11d1-8b24-00a0c9068ff3}"="Display Adapter CPL Extension"
"{42071713-76d4-11d1-8b24-00a0c9068ff3}"="Display Monitor CPL Extension"
"{42071714-76d4-11d1-8b24-00a0c9068ff3}"="Display Panning CPL Extension"
"{4E40F770-369C-11d0-8922-00A024AB2DBB}"="DS Security Page"
"{513D916F-2A8E-4F51-AEAB-0CBC76FB1AF8}"="Compatibility Page"
"{56117100-C0CD-101B-81E2-00AA004AE837}"="Shell Scrap DataHandler"
"{59099400-57FF-11CE-BD94-0020AF85B590}"="Disk Copy Extension"
"{59be4990-f85c-11ce-aff7-00aa003ca9f6}"="Shell extensions for Microsoft Windows Network objects"
"{5DB2625A-54DF-11D0-B6C4-0800091AA605}"="ICM Monitor Management"
"{675F097E-4C4D-11D0-B6C1-0800091AA605}"="ICM Printer Management"
"{764BF0E1-F219-11ce-972D-00AA00A14F56}"="Shell extensions for file compression"
"{77597368-7b15-11d0-a0c2-080036af3f03}"="Web Printer Shell Extension"
"{7988B573-EC89-11cf-9C00-00AA00A14F56}"="Disk Quota UI"
"{853FE2B1-B769-11d0-9C4E-00C04FB6C6FA}"="Encryption Context Menu"
"{85BBD920-42A0-1069-A2E4-08002B30309D}"="Briefcase"
"{88895560-9AA2-1069-930E-00AA0030EBC8}"="HyperTerminal Icon Ext"
"{BD84B380-8CA2-1069-AB1D-08000948F534}"="Fonts"
"{DBCE2480-C732-101B-BE72-BA78E9AD5B27}"="ICC Profile"
"{F37C5810-4D3F-11d0-B4BF-00AA00BBB723}"="Printers Security Page"
"{f81e9010-6ea4-11ce-a7ff-00aa003ca9f6}"="Shell extensions for sharing"
"{f92e8c40-3d33-11d2-b1aa-080036a75b03}"="Display TroubleShoot CPL Extension"
"{7444C717-39BF-11D1-8CD9-00C04FC29D45}"="Crypto PKO Extension"
"{7444C719-39BF-11D1-8CD9-00C04FC29D45}"="Crypto Sign Extension"
"{7007ACC7-3202-11D1-AAD2-00805FC1270E}"="Network Connections"
"{992CFFA0-F557-101A-88EC-00DD010CCC48}"="Network Connections"
"{E211B736-43FD-11D1-9EFB-0000F8757FCD}"="Scanners & Cameras"
"{FB0C9C8A-6C50-11D1-9F1D-0000F8757FCD}"="Scanners & Cameras"
"{905667aa-acd6-11d2-8080-00805f6596d2}"="Scanners & Cameras"
"{3F953603-1008-4f6e-A73A-04AAC7A992F1}"="Scanners & Cameras"
"{83bbcbf3-b28a-4919-a5aa-73027445d672}"="Scanners & Cameras"
"{F0152790-D56E-4445-850E-4F3117DB740C}"="Remote Sessions CPL Extension"
"{5F327514-6C5E-4d60-8F16-D07FA08A78ED}"="Auto Update Property Sheet Extension"
"{60254CA5-953B-11CF-8C96-00AA00B8708C}"="Shell extensions for Windows Script Host"
"{2206CDB2-19C1-11D1-89E0-00C04FD7A829}"="Microsoft Data Link"
"{DD2110F0-9EEF-11cf-8D8E-00AA0060F5BF}"="Tasks Folder Icon Handler"
"{797F1E90-9EDD-11cf-8D8E-00AA0060F5BF}"="Tasks Folder Shell Extension"
"{D6277990-4C6A-11CF-8D87-00AA0060F5BF}"="Scheduled Tasks"
"{0DF44EAA-FF21-4412-828E-260A8728E7F1}"="Taskbar and Start Menu"
"{2559a1f0-21d7-11d4-bdaf-00c04f60b9f0}"="Search"
"{2559a1f1-21d7-11d4-bdaf-00c04f60b9f0}"="Help and Support"
"{2559a1f2-21d7-11d4-bdaf-00c04f60b9f0}"="Help and Support"
"{2559a1f3-21d7-11d4-bdaf-00c04f60b9f0}"="Run..."
"{2559a1f4-21d7-11d4-bdaf-00c04f60b9f0}"="Internet"
"{2559a1f5-21d7-11d4-bdaf-00c04f60b9f0}"="E-mail"
"{D20EA4E1-3957-11d2-A40B-0C5020524152}"="Fonts"
"{D20EA4E1-3957-11d2-A40B-0C5020524153}"="Administrative Tools"
"{875CB1A1-0F29-45de-A1AE-CFB4950D0B78}"="Audio Media Properties Handler"
"{40C3D757-D6E4-4b49-BB41-0E5BBEA28817}"="Video Media Properties Handler"
"{E4B29F9D-D390-480b-92FD-7DDB47101D71}"="Wav Properties Handler"
"{87D62D94-71B3-4b9a-9489-5FE6850DC73E}"="Avi Properties Handler"
"{A6FD9E45-6E44-43f9-8644-08598F5A74D9}"="Midi Properties Handler"
"{c5a40261-cd64-4ccf-84cb-c394da41d590}"="Video Thumbnail Extractor"
"{5E6AB780-7743-11CF-A12B-00AA004AE837}"="Microsoft Internet Toolbar"
"{22BF0C20-6DA7-11D0-B373-00A0C9034938}"="Download Status"
"{91EA3F8B-C99B-11d0-9815-00C04FD91972}"="Augmented Shell Folder"
"{6413BA2C-B461-11d1-A18A-080036B11A03}"="Augmented Shell Folder 2"
"{F61FFEC1-754F-11d0-80CA-00AA005B4383}"="BandProxy"
"{7BA4C742-9E81-11CF-99D3-00AA004AE837}"="Microsoft BrowserBand"
"{30D02401-6A81-11d0-8274-00C04FD5AE38}"="Search Band"
"{32683183-48a0-441b-a342-7c2a440a9478}"="Media Band"
"{169A0691-8DF9-11d1-A1C4-00C04FD75D13}"="In-pane search"
"{07798131-AF23-11d1-9111-00A0C98BA67D}"="Web Search"
"{AF4F6510-F982-11d0-8595-00AA004CD6D8}"="Registry Tree Options Utility"
"{01E04581-4EEE-11d0-BFE9-00AA005B4383}"="&Address"
"{A08C11D2-A228-11d0-825B-00AA005B4383}"="Address EditBox"
"{00BB2763-6A77-11D0-A535-00C04FD7D062}"="Microsoft AutoComplete"
"{7376D660-C583-11d0-A3A5-00C04FD706EC}"="TridentImageExtractor"
"{6756A641-DE71-11d0-831B-00AA005B4383}"="MRU AutoComplete List"
"{6935DB93-21E8-4ccc-BEB9-9FE3C77A297A}"="Custom MRU AutoCompleted List"
"{7e653215-fa25-46bd-a339-34a2790f3cb7}"="Accessible"
"{acf35015-526e-4230-9596-becbe19f0ac9}"="Track Popup Bar"
"{E0E11A09-5CB8-4B6C-8332-E00720A168F2}"="Address Bar Parser"
"{00BB2764-6A77-11D0-A535-00C04FD7D062}"="Microsoft History AutoComplete List"
"{03C036F1-A186-11D0-824A-00AA005B4383}"="Microsoft Shell Folder AutoComplete List"
"{00BB2765-6A77-11D0-A535-00C04FD7D062}"="Microsoft Multiple AutoComplete List Container"
"{ECD4FC4E-521C-11D0-B792-00A0C90312E1}"="Shell Band Site Menu"
"{3CCF8A41-5C85-11d0-9796-00AA00B90ADF}"="Shell DeskBarApp"
"{ECD4FC4C-521C-11D0-B792-00A0C90312E1}"="Shell DeskBar"
"{ECD4FC4D-521C-11D0-B792-00A0C90312E1}"="Shell Rebar BandSite"
"{DD313E04-FEFF-11d1-8ECD-0000F87A470C}"="User Assist"
"{EF8AD2D1-AE36-11D1-B2D2-006097DF8C11}"="Global Folder Settings"
"{EFA24E61-B078-11d0-89E4-00C04FC9E26E}"="Favorites Band"
"{0A89A860-D7B1-11CE-8350-444553540000}"="Shell Automation Inproc Service"
"{E7E4BC40-E76A-11CE-A9BB-00AA004AE837}"="Shell DocObject Viewer"
"{A5E46E3A-8849-11D1-9D8C-00C04FC99D61}"="Microsoft Browser Architecture"
"{FBF23B40-E3F0-101B-8488-00AA003E56F8}"="InternetShortcut"
"{3C374A40-BAE4-11CF-BF7D-00AA006946EE}"="Microsoft Url History Service"
"{FF393560-C2A7-11CF-BFF4-444553540000}"="History"
"{7BD29E00-76C1-11CF-9DD0-00A0C9034933}"="Temporary Internet Files"
"{7BD29E01-76C1-11CF-9DD0-00A0C9034933}"="Temporary Internet Files"
"{CFBFAE00-17A6-11D0-99CB-00C04FD64497}"="Microsoft Url Search Hook"
"{A2B0DD40-CC59-11d0-A3A5-00C04FD706EC}"="IE4 Suite Splash Screen"
"{67EA19A0-CCEF-11d0-8024-00C04FD75D13}"="CDF Extension Copy Hook"
"{131A6951-7F78-11D0-A979-00C04FD705A2}"="ISFBand OC"
"{9461b922-3c5a-11d2-bf8b-00c04fb93661}"="Search Assistant OC"
"{3DC7A020-0ACD-11CF-A9BB-00AA004AE837}"="The Internet"
"{871C5380-42A0-1069-A2EA-08002B30309D}"="Internet Name Space"
"{EFA24E64-B078-11d0-89E4-00C04FC9E26E}"="Explorer Band"
"{9E56BE60-C50F-11CF-9A2C-00A0C90A90CE}"="Sendmail service"
"{9E56BE61-C50F-11CF-9A2C-00A0C90A90CE}"="Sendmail service"
"{88C6C381-2E85-11D0-94DE-444553540000}"="ActiveX Cache Folder"
"{E6FB5E20-DE35-11CF-9C87-00AA005127ED}"="WebCheck"
"{ABBE31D0-6DAE-11D0-BECA-00C04FD940BE}"="Subscription Mgr"
"{F5175861-2688-11d0-9C5E-00AA00A45957}"="Subscription Folder"
"{08165EA0-E946-11CF-9C87-00AA005127ED}"="WebCheckWebCrawler"
"{E3A8BDE6-ABCE-11d0-BC4B-00C04FD929DB}"="WebCheckChannelAgent"
"{E8BB6DC0-6B4E-11d0-92DB-00A0C90C2BD7}"="TrayAgent"
"{7D559C10-9FE9-11d0-93F7-00AA0059CE02}"="Code Download Agent"
"{E6CC6978-6B6E-11D0-BECA-00C04FD940BE}"="ConnectionAgent"
"{D8BD2030-6FC9-11D0-864F-00AA006809D9}"="PostAgent"
"{7FC0B86E-5FA7-11d1-BC7C-00C04FD929DB}"="WebCheck SyncMgr Handler"
"{352EC2B7-8B9A-11D1-B8AE-006008059382}"="Shell Application Manager"
"{0B124F8F-91F0-11D1-B8B5-006008059382}"="Installed Apps Enumerator"
"{CFCCC7A0-A282-11D1-9082-006008059382}"="Darwin App Publisher"
"{e84fda7c-1d6a-45f6-b725-cb260c236066}"="Shell Image Verbs"
"{66e4e4fb-f385-4dd0-8d74-a2efd1bc6178}"="Shell Image Data Factory"
"{3F30C968-480A-4C6C-862D-EFC0897BB84B}"="GDI+ file thumbnail extractor"
"{9DBD2C50-62AD-11d0-B806-00C04FD706EC}"="Summary Info Thumbnail handler (DOCFILES)"
"{EAB841A0-9550-11cf-8C16-00805F1408F3}"="HTML Thumbnail Extractor"
"{eb9b1153-3b57-4e68-959a-a3266bc3d7fe}"="Shell Image Property Handler"
"{CC6EEFFB-43F6-46c5-9619-51D571967F7D}"="Web Publishing Wizard"
"{add36aa8-751a-4579-a266-d66f5202ccbb}"="Print Ordering via the Web"
"{6b33163c-76a5-4b6c-bf21-45de9cd503a1}"="Shell Publishing Wizard Object"
"{58f1f272-9240-4f51-b6d4-fd63d1618591}"="Get a Passport Wizard"
"{7A9D77BD-5403-11d2-8785-2E0420524153}"="User Accounts"
"{BD472F60-27FA-11cf-B8B4-444553540000}"="Compressed (zipped) Folder Right Drag Handler"
"{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}"="Compressed (zipped) Folder SendTo Target"
"{f39a0dc0-9cc8-11d0-a599-00c04fd64433}"="Channel File"
"{f3aa0dc0-9cc8-11d0-a599-00c04fd64434}"="Channel Shortcut"
"{f3ba0dc0-9cc8-11d0-a599-00c04fd64435}"="Channel Handler Object"
"{f3da0dc0-9cc8-11d0-a599-00c04fd64437}"="Channel Menu"
"{f3ea0dc0-9cc8-11d0-a599-00c04fd64438}"="Channel Properties"
"{63da6ec0-2e98-11cf-8d82-444553540000}"="FTP Folders Webview"
"{883373C3-BF89-11D1-BE35-080036B11A03}"="Microsoft DocProp Shell Ext"
"{A9CF0EAE-901A-4739-A481-E35B73E47F6D}"="Microsoft DocProp Inplace Edit Box Control"
"{8EE97210-FD1F-4B19-91DA-67914005F020}"="Microsoft DocProp Inplace ML Edit Box Control"
"{0EEA25CC-4362-4A12-850B-86EE61B0D3EB}"="Microsoft DocProp Inplace Droplist Combo Control"
"{6A205B57-2567-4A2C-B881-F787FAB579A3}"="Microsoft DocProp Inplace Calendar Control"
"{28F8A4AC-BBB3-4D9B-B177-82BFC914FA33}"="Microsoft DocProp Inplace Time Control"
"{8A23E65E-31C2-11d0-891C-00A024AB2DBB}"="Directory Query UI"
"{9E51E0D0-6E0F-11d2-9601-00C04FA31A86}"="Shell properties for a DS object"
"{163FDC20-2ABC-11d0-88F0-00A024AB2DBB}"="Directory Object Find"
"{F020E586-5264-11d1-A532-0000F8757D7E}"="Directory Start/Search Find"
"{0D45D530-764B-11d0-A1CA-00AA00C16E65}"="Directory Property UI"
"{62AE1F9A-126A-11D0-A14B-0800361B1103}"="Directory Context Menu Verbs"
"{ECF03A33-103D-11d2-854D-006008059367}"="MyDocs Copy Hook"
"{ECF03A32-103D-11d2-854D-006008059367}"="MyDocs Drop Target"
"{4a7ded0a-ad25-11d0-98a8-0800361b1103}"="MyDocs Properties"
"{750fdf0e-2a26-11d1-a3ea-080036587f03}"="Offline Files Menu"
"{10CFC467-4392-11d2-8DB4-00C04FA31A66}"="Offline Files Folder Options"
"{AFDB1F70-2A4C-11d2-9039-00C04F8EEB3E}"="Offline Files Folder"
"{143A62C8-C33B-11D1-84FE-00C04FA34A14}"="Microsoft Agent Character Property Sheet Handler"
"{ECCDF543-45CC-11CE-B9BF-0080C87CDBA6}"="DfsShell"
"{60fd46de-f830-4894-a628-6fa81bc0190d}"="%DESC_PublishDropTarget%"
"{7A80E4A8-8005-11D2-BCF8-00C04F72C717}"="MMC Icon Handler"
"{0CD7A5C0-9F37-11CE-AE65-08002B2E1262}"=".CAB file viewer"
"{32714800-2E5F-11d0-8B85-00AA0044F941}"="For &People..."
"{8DD448E6-C188-4aed-AF92-44956194EB1F}"="Windows Media Player Play as Playlist Context Menu Handler"
"{CE3FB1D1-02AE-4a5f-A6E9-D9F1B4073E6C}"="Windows Media Player Burn Audio CD Context Menu Handler"
"{F1B9284F-E9DC-4e68-9D7E-42362A59F0FD}"="Windows Media Player Add to Playlist Context Menu Handler"
"{1D2680C9-0E2A-469d-B787-065558BC7D43}"="Fusion Cache"
"{F0CB00CD-5A07-4D91-97F5-A8C92CDA93E4}"="Shell Extensions for RealOne Player"
"{7F67036B-66F1-411A-AD85-759FB9C5B0DB}"="SampleView"
"{1CDB2949-8F65-4355-8456-263E7C208A5D}"="Desktop Explorer"
"{1E9B04FB-F9E5-4718-997B-B8DA88302A47}"="Desktop Explorer Menu"
"{CCFE56EE-C7DE-44EE-A160-4553A5A912C9}"="OmniPass Shell Extension"
"{0006F045-0000-0000-C000-000000000046}"="Microsoft Outlook Custom Icon Handler"
"{E0D79304-84BE-11CE-9641-444553540000}"="WinZip"
"{E0D79305-84BE-11CE-9641-444553540000}"="WinZip"
"{E0D79306-84BE-11CE-9641-444553540000}"="WinZip"
"{E0D79307-84BE-11CE-9641-444553540000}"="WinZip"
"{043308A2-3CF7-4ED5-A668-2B4FB0BD307A}"="dBpowerAMP dAP Scripting"
"{FED7043D-346A-414D-ACD7-550D052499A7}"="dBpowerAMP Popup Info"
"{7C9D5882-CB4A-4090-96C8-430BFE8B795B}"="Webroot Spy Sweeper Context Menu Integration"
"{640167b4-59b0-47a6-b335-a6b3c0695aea}"="Portable Media Devices"
"{cc86590a-b60a-48e6-996b-41d25ed39a1e}"="Portable Media Devices Menu"
"{C536DCF5-D944-4997-AA7C-66BB9AB91EBE}"=""
"{9A69C3DB-5982-4030-874D-12A534C44FAE}"=""
"{268416D0-36FA-45C1-95C8-1AB44FF6E500}"=""
"{44A46A80-6334-4B0E-AE1D-F01A491EFF09}"=""
"{EBDF1F20-C829-11D1-8233-FF20AF3E97A9}"="TrojanHunter Menu Shell Extension"
"{9F97547E-4609-42C5-AE0C-81C61FFAEBC3}"="AVG7 Shell Extension"
"{9F97547E-460A-42C5-AE0C-81C61FFAEBC3}"="AVG7 Find Extension"

**********************************************************************************
HKEY ROOT CLASSIDS:
Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{268416D0-36FA-45C1-95C8-1AB44FF6E500}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{268416D0-36FA-45C1-95C8-1AB44FF6E500}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\CLSID\{268416D0-36FA-45C1-95C8-1AB44FF6E500}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{268416D0-36FA-45C1-95C8-1AB44FF6E500}\InprocServer32]
@="C:\\WINDOWS\\system32\\mfvcp50.dll"
"ThreadingModel"="Apartment"

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{44A46A80-6334-4B0E-AE1D-F01A491EFF09}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{44A46A80-6334-4B0E-AE1D-F01A491EFF09}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\CLSID\{44A46A80-6334-4B0E-AE1D-F01A491EFF09}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{44A46A80-6334-4B0E-AE1D-F01A491EFF09}\InprocServer32]
@="C:\\WINDOWS\\system32\\desetup.dll"
"ThreadingModel"="Apartment"

**********************************************************************************
Files Found are not all bad files:

C:\WINDOWS\SYSTEM32\
desetup.dll Wed Dec 7 2005 7:30:38p ..S.R 234,252 228.76 K
dmdiagn.dll Tue Dec 6 2005 5:31:44p ..S.R 236,546 231.00 K
dnconfig.dll Mon Dec 5 2005 8:48:20p ..S.R 234,161 228.67 K
dnnu01~1.dll Tue Dec 6 2005 9:41:18p ..S.R 233,682 228.20 K
kt04l7~1.dll Tue Dec 6 2005 9:08:22p ..S.R 234,252 228.76 K
kt62l7~1.dll Mon Dec 5 2005 8:46:42p ..S.R 236,106 230.57 K
mensspc.dll Tue Dec 6 2005 5:40:42p ..S.R 233,682 228.20 K
mfvcp50.dll Mon Dec 5 2005 8:30:42p ..S.R 236,106 230.57 K
pncrt.dll Wed Nov 30 2005 9:58:38p A.... 278,528 272.00 K
pndx5016.dll Wed Nov 30 2005 9:58:50p A.... 6,656 6.50 K
pndx5032.dll Wed Nov 30 2005 9:58:50p A.... 5,632 5.50 K
q2rq0c~1.dll Mon Dec 5 2005 7:27:14p ..S.R 234,864 229.36 K
rmoc3260.dll Wed Nov 30 2005 9:59:26p A.... 176,167 172.04 K
sirenacm.dll Wed Oct 12 2005 4:11:06p A.... 118,784 116.00 K
wininet.dll Tue Oct 18 2005 10:27:36p A.... 599,040 585.00 K

15 items found: 15 files (9 H/S), 0 directories.
Total of file sizes: 3,298,458 bytes 3.14 M
Locate .tmp files:

C:\WINDOWS\SYSTEM32\
guard.tmp Wed Dec 7 2005 7:31:38p ..S.R 234,252 228.76 K

1 item found: 1 file (1 H/S), 0 directories.
Total of file sizes: 234,252 bytes 228.76 K
**********************************************************************************
Directory Listing of system files:
Volume in drive C is PRESARIO
Volume Serial Number is B8A5-6D43

Directory of C:\WINDOWS\System32

12/07/2005 07:31 PM 234,252 guard.tmp
12/07/2005 07:30 PM 234,252 desetup.dll
12/06/2005 09:41 PM 233,682 dnnu0159e.dll
12/06/2005 09:08 PM 234,252 kt04l7dq1.dll
12/06/2005 05:40 PM 233,682 mensspc.dll
12/06/2005 05:31 PM 236,546 dmdiagn.dll
12/05/2005 08:48 PM 234,161 dnconfig.dll
12/05/2005 08:46 PM 236,106 kt62l7jo1.dll
12/05/2005 08:30 PM 236,106 mfvcp50.dll
12/05/2005 07:27 PM 234,864 q2rq0c95ef.dll
09/25/2005 10:40 AM <DIR> dllcache
10/21/2004 12:28 AM 56 9EE5F5CD89.sys
07/24/2003 05:20 AM <DIR> Microsoft
11 File(s) 2,347,959 bytes
2 Dir(s) 4,142,125,056 bytes free

#8 -David-

-David-

  • Members
  • 10,603 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London
  • Local time:03:50 AM

Posted 11 December 2005 - 08:54 AM

Close any programs you have open since this step requires a reboot.

From the l2mfix folder on your desktop, double click l2mfix.bat and select option #2 for Run Fix by typing 2 and then pressing enter, then press any key to reboot your computer. After a reboot, your desktop and icons will appear, then disappear (this is normal). L2mfix will continue to scan your computer and when it's finished, notepad will open with a log. Copy the contents of that log and paste it back into this thread, along with a new hijackthis log.

IMPORTANT: Do NOT run any other files in the l2mfix folder until you are asked to do so!

Note : Once the pc has restarted if a log does not appear or the icons didn't dissappear, run the "second.bat" located inside the L2mfix folder.

David

#9 RDO

RDO
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:11:20 PM

Posted 11 December 2005 - 09:15 AM

L2mfix Beta 120905
Creating Account.
The command completed successfully.

Adding Administrative privleges.
The command completed successfully.

Checking for L2MFix account(0=no 1=yes):
1
Granting SeDebugPrivilege to L2MFIX ... successful

Running From:
C:\WINDOWS\system32

Killing Processes!

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 Craig.Peacock@beyondlogic.org
Killing PID 412 'smss.exe'

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 Craig.Peacock@beyondlogic.org
Killing PID 492 'winlogon.exe'

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 Craig.Peacock@beyondlogic.org
Killing PID 1968 'explorer.exe'

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 Craig.Peacock@beyondlogic.org
Killing PID 1704 'rundll32.exe'
Granting SeDebugPrivilege to Administrators ... successful
Granting SeDebugPrivilege to Administrateurs ... failed (GetAccountSid(Administrateurs)=1332
Granting SeDebugPrivilege to Administrat÷rer ... failed (GetAccountSid(Administrat÷rer)=1332
Granting SeDebugPrivilege to Administradores ... failed (GetAccountSid(Administradores)=1332
Granting SeDebugPrivilege to Amministratore ... failed (GetAccountSid(Amministratore)=1332
Granting SeDebugPrivilege to Administratoren ... failed (GetAccountSid(Administratoren)=1332

Scanning First Pass. Please Wait!

First Pass Completed

Second Pass Scanning

Second pass Completed!
Backing Up: C:\WINDOWS\system32\dmdiagn.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\dnconfig.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\dnnu0159e.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\kt62l7jo1.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mensspc.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mfvcp50.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\q2rq0c95ef.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\r46u0ej9eho.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\umer32.dll
1 file(s) copied.
deleting: C:\WINDOWS\system32\dmdiagn.dll
Successfully Deleted: C:\WINDOWS\system32\dmdiagn.dll
deleting: C:\WINDOWS\system32\dnconfig.dll
Successfully Deleted: C:\WINDOWS\system32\dnconfig.dll
deleting: C:\WINDOWS\system32\dnnu0159e.dll
Successfully Deleted: C:\WINDOWS\system32\dnnu0159e.dll
deleting: C:\WINDOWS\system32\kt62l7jo1.dll
Successfully Deleted: C:\WINDOWS\system32\kt62l7jo1.dll
deleting: C:\WINDOWS\system32\mensspc.dll
Successfully Deleted: C:\WINDOWS\system32\mensspc.dll
deleting: C:\WINDOWS\system32\mfvcp50.dll
Successfully Deleted: C:\WINDOWS\system32\mfvcp50.dll
deleting: C:\WINDOWS\system32\q2rq0c95ef.dll
Successfully Deleted: C:\WINDOWS\system32\q2rq0c95ef.dll
deleting: C:\WINDOWS\system32\r46u0ej9eho.dll
Successfully Deleted: C:\WINDOWS\system32\r46u0ej9eho.dll
deleting: C:\WINDOWS\system32\umer32.dll
Successfully Deleted: C:\WINDOWS\system32\umer32.dll


Zipping up files for submission:
zip warning: name not matched: guard.tmp

zip error: Nothing to do! (backup.zip)
adding: Documents and Settings/Owner/Desktop/l2mfix/backregs/notibac.reg (224 bytes security) (deflated 87%)
adding: Documents and Settings/Owner/Desktop/l2mfix/backregs/shell.reg (224 bytes security) (deflated 73%)

Restoring Sedebugprivilege:

Restoring Windows Update Certificates.:

deleting local copy: dmdiagn.dll
deleting local copy: dnconfig.dll
deleting local copy: dnnu0159e.dll
deleting local copy: kt62l7jo1.dll
deleting local copy: mensspc.dll
deleting local copy: mfvcp50.dll
deleting local copy: q2rq0c95ef.dll
deleting local copy: r46u0ej9eho.dll
deleting local copy: umer32.dll

The following Is the Current Export of the Winlogon notify key:
****************************************************************************
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt32chain]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,33,00,32,00,2e,00,64,00,6c,00,\
6c,00,00,00
"Logoff"="ChainWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cryptnet]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,6e,00,65,00,74,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Logoff"="CryptnetWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cscdll]
"DLLName"="cscdll.dll"
"Logon"="WinlogonLogonEvent"
"Logoff"="WinlogonLogoffEvent"
"ScreenSaver"="WinlogonScreenSaverEvent"
"Startup"="WinlogonStartupEvent"
"Shutdown"="WinlogonShutdownEvent"
"StartShell"="WinlogonStartShellEvent"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ScCertProp]
"DLLName"="wlnotify.dll"
"Logon"="SCardStartCertProp"
"Logoff"="SCardStopCertProp"
"Lock"="SCardSuspendCertProp"
"Unlock"="SCardResumeCertProp"
"Enabled"=dword:00000001
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Schedule]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"StartShell"="SchedStartShell"
"Logoff"="SchedEventLogOff"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\sclgntfy]
"Logoff"="WLEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001
"DllName"=hex(2):73,00,63,00,6c,00,67,00,6e,00,74,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SensLogn]
"DLLName"="WlNotify.dll"
"Lock"="SensLockEvent"
"Logon"="SensLogonEvent"
"Logoff"="SensLogoffEvent"
"Safe"=dword:00000001
"MaxWait"=dword:00000258
"StartScreenSaver"="SensStartScreenSaverEvent"
"StopScreenSaver"="SensStopScreenSaverEvent"
"Startup"="SensStartupEvent"
"Shutdown"="SensShutdownEvent"
"StartShell"="SensStartShellEvent"
"PostShell"="SensPostShellEvent"
"Disconnect"="SensDisconnectEvent"
"Reconnect"="SensReconnectEvent"
"Unlock"="SensUnlockEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SMDEn]
"Asynchronous"=dword:00000000
"DllName"="C:\\WINDOWS\\system32\\dnnu0159e.dll"
"Impersonate"=dword:00000000
"Logon"="WinLogon"
"Logoff"="WinLogoff"
"Shutdown"="WinShutdown"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\termsrv]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"Logoff"="TSEventLogoff"
"Logon"="TSEventLogon"
"PostShell"="TSEventPostShell"
"Shutdown"="TSEventShutdown"
"StartShell"="TSEventStartShell"
"Startup"="TSEventStartup"
"MaxWait"=dword:00000258
"Reconnect"="TSEventReconnect"
"Disconnect"="TSEventDisconnect"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlballoon]
"DLLName"="wlnotify.dll"
"Logon"="RegisterTicketExpiredNotificationEvent"
"Logoff"="UnregisterTicketExpiredNotificationEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wzcnotif]
"DLLName"="wzcdlg.dll"
"Logon"="WZCEventLogon"
"Logoff"="WZCEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000000


The following are the files found:
****************************************************************************
C:\WINDOWS\system32\dmdiagn.dll
C:\WINDOWS\system32\dnconfig.dll
C:\WINDOWS\system32\dnnu0159e.dll
C:\WINDOWS\system32\kt62l7jo1.dll
C:\WINDOWS\system32\mensspc.dll
C:\WINDOWS\system32\mfvcp50.dll
C:\WINDOWS\system32\q2rq0c95ef.dll
C:\WINDOWS\system32\r46u0ej9eho.dll
C:\WINDOWS\system32\umer32.dll

Registry Entries that were Deleted:
Please verify that the listing looks ok.
If there was something deleted wrongly there are backups in the backreg folder.
****************************************************************************
Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{268416D0-36FA-45C1-95C8-1AB44FF6E500}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{268416D0-36FA-45C1-95C8-1AB44FF6E500}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\CLSID\{268416D0-36FA-45C1-95C8-1AB44FF6E500}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{268416D0-36FA-45C1-95C8-1AB44FF6E500}\InprocServer32]
@="C:\\WINDOWS\\system32\\mfvcp50.dll"
"ThreadingModel"="Apartment"

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{44A46A80-6334-4B0E-AE1D-F01A491EFF09}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{44A46A80-6334-4B0E-AE1D-F01A491EFF09}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\CLSID\{44A46A80-6334-4B0E-AE1D-F01A491EFF09}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{44A46A80-6334-4B0E-AE1D-F01A491EFF09}\InprocServer32]
@="C:\\WINDOWS\\system32\\umer32.dll"
"ThreadingModel"="Apartment"

REGEDIT4

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]
"{C536DCF5-D944-4997-AA7C-66BB9AB91EBE}"=-
"{9A69C3DB-5982-4030-874D-12A534C44FAE}"=-
"{268416D0-36FA-45C1-95C8-1AB44FF6E500}"=-
"{44A46A80-6334-4B0E-AE1D-F01A491EFF09}"=-
[-HKEY_CLASSES_ROOT\CLSID\{C536DCF5-D944-4997-AA7C-66BB9AB91EBE}]
[-HKEY_CLASSES_ROOT\CLSID\{9A69C3DB-5982-4030-874D-12A534C44FAE}]
[-HKEY_CLASSES_ROOT\CLSID\{268416D0-36FA-45C1-95C8-1AB44FF6E500}]
[-HKEY_CLASSES_ROOT\CLSID\{44A46A80-6334-4B0E-AE1D-F01A491EFF09}]
REGEDIT4

[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
****************************************************************************
Desktop.ini Contents:
****************************************************************************

****************************************************************************
C:\WINDOWS\System32\268416D0-36FA-45C1-95C8-1AB44FF6E500.reg
C:\WINDOWS\System32\44A46A80-6334-4B0E-AE1D-F01A491EFF09.reg
Checking for L2MFix account(0=no 1=yes):
0
adding: dlls/dmdiagn.dll (224 bytes security) (deflated 5%)
adding: dlls/dnconfig.dll (224 bytes security) (deflated 4%)
adding: dlls/dnnu0159e.dll (224 bytes security) (deflated 4%)
adding: dlls/kt62l7jo1.dll (224 bytes security) (deflated 5%)
adding: dlls/mensspc.dll (224 bytes security) (deflated 4%)
adding: dlls/mfvcp50.dll (224 bytes security) (deflated 5%)
adding: dlls/q2rq0c95ef.dll (224 bytes security) (deflated 5%)
adding: dlls/r46u0ej9eho.dll (224 bytes security) (deflated 4%)
adding: dlls/umer32.dll (224 bytes security) (deflated 4%)



HJT LOG
Logfile of HijackThis v1.99.1
Scan saved at 10:40:48 AM, on 12/11/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\VCClient\VCClient.exe
C:\Program Files\Common Files\VCClient\VCMain.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Documents and Settings\Owner\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [AVG7_EMC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
O4 - HKCU\..\Run: [CU1] C:\Program Files\Common Files\VCClient\VCClient.exe
O4 - HKCU\..\Run: [CU2] C:\Program Files\Common Files\VCClient\VCMain.exe
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar2.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar2.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar2.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar2.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\PartyPoker.exe
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\PartyPoker.exe
O10 - Broken Internet access because of LSP provider 'mswsck2.dll' missing
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://spaces.msn.com/PhotoUpload/MsnPUpld.cab?10,0,910,0
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.com/v5co...b?1097722150265
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://sympatico.zone.msn.com/binFramework...ro.cab27513.cab
O16 - DPF: {F5C90925-ABBF-4475-88F5-8622B452BA9E} (Compaq System Data Class) - http://wwemail.support.hp.com/fd2/objects/SysQuery.cab
O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
O20 - Winlogon Notify: SMDEn - C:\WINDOWS\system32\dnnu0159e.dll (file missing)
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: Softex OmniPass Service (omniserv) - Unknown owner - C:\Program Files\Softex\OmniPass\Omniserv.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe

#10 -David-

-David-

  • Members
  • 10,603 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London
  • Local time:03:50 AM

Posted 11 December 2005 - 09:42 AM

Download the following file:

http://www.thatcomputerguy.us/downloads/finditnt2000xp.zip

and unzip the contents to a folder. When it has unzipped, open that folder and double click on Find.bat. It will run for a while, so be patient, and then produce a log (ignore any File not found messages on the screen, it should continue anyway).

Please copy and paste that log here.

David

#11 RDO

RDO
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:11:20 PM

Posted 11 December 2005 - 12:29 PM

The link that you directed me to will not work. Is there anohter link I can use to download the file?

#12 -David-

-David-

  • Members
  • 10,603 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London
  • Local time:03:50 AM

Posted 12 December 2005 - 12:56 PM

Hmm, it appears to work for me....

Try copying and pasting this link into the address bar of internet explorer, or mozilla etc... and let me know if it works that way.

If that doesn't work try going here:

http://www.thatcomputerguy.us/downloads

and find the finditnt2000xp.zip

If not then i can attatch it here.

David :thumbsup:

#13 RDO

RDO
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:11:20 PM

Posted 12 December 2005 - 04:20 PM

I tired to download the file again today from the same link and it worked fine. Here is the log...



Warning! This utility will find legitimate files in addition to malware.
Do not remove anything unless you are sure you know what you're doing.

Find.bat is running from: C:\Documents and Settings\Owner\Desktop\Find It NT-2K-XP

------- System Files in System32 Directory -------

Volume in drive C is PRESARIO
Volume Serial Number is B8A5-6D43

Directory of C:\WINDOWS\System32

09/25/2005 10:40 AM <DIR> dllcache
10/21/2004 12:28 AM 56 9EE5F5CD89.sys
07/24/2003 05:20 AM <DIR> Microsoft
1 File(s) 56 bytes
2 Dir(s) 3,456,389,120 bytes free

------- Hidden Files in System32 Directory -------

Volume in drive C is PRESARIO
Volume Serial Number is B8A5-6D43

Directory of C:\WINDOWS\System32

09/25/2005 10:40 AM <DIR> dllcache
10/21/2004 12:28 AM 56 9EE5F5CD89.sys
10/14/2004 10:16 AM 4,212 zllictbl.dat
07/24/2003 04:57 AM 488 WindowsLogon.manifest
07/24/2003 04:57 AM 488 logonui.exe.manifest
07/24/2003 04:57 AM 749 cdplayer.exe.manifest
07/24/2003 04:57 AM 749 wuaucpl.cpl.manifest
07/24/2003 04:57 AM 749 sapi.cpl.manifest
07/24/2003 04:57 AM 749 nwc.cpl.manifest
07/24/2003 04:57 AM 749 ncpa.cpl.manifest
9 File(s) 8,989 bytes
1 Dir(s) 3,456,385,024 bytes free

------------ Files Named "Guard" ---------------

Volume in drive C is PRESARIO
Volume Serial Number is B8A5-6D43

Directory of C:\WINDOWS\System32

07/29/2005 12:45 PM 71,764 pguard.dat
1 File(s) 71,764 bytes
0 Dir(s) 3,456,385,024 bytes free

------ Temp Files in System32 Directory ------

Volume in drive C is PRESARIO
Volume Serial Number is B8A5-6D43

Directory of C:\WINDOWS\System32


------------------ User Agent ----------------

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]


------------- Keys Under Notify -------------

REGEDIT4

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt32chain]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,72,79,70,74,33,32,2e,64,6c,6c,00
"Logoff"="ChainWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cryptnet]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,72,79,70,74,6e,65,74,2e,64,6c,6c,00
"Logoff"="CryptnetWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cscdll]
"DLLName"="cscdll.dll"
"Logon"="WinlogonLogonEvent"
"Logoff"="WinlogonLogoffEvent"
"ScreenSaver"="WinlogonScreenSaverEvent"
"Startup"="WinlogonStartupEvent"
"Shutdown"="WinlogonShutdownEvent"
"StartShell"="WinlogonStartShellEvent"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ScCertProp]
"DLLName"="wlnotify.dll"
"Logon"="SCardStartCertProp"
"Logoff"="SCardStopCertProp"
"Lock"="SCardSuspendCertProp"
"Unlock"="SCardResumeCertProp"
"Enabled"=dword:00000001
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Schedule]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,6c,6e,6f,74,69,66,79,2e,64,6c,6c,00
"Impersonate"=dword:00000000
"StartShell"="SchedStartShell"
"Logoff"="SchedEventLogOff"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\sclgntfy]
"Logoff"="WLEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001
"DllName"=hex(2):73,63,6c,67,6e,74,66,79,2e,64,6c,6c,00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SensLogn]
"DLLName"="WlNotify.dll"
"Lock"="SensLockEvent"
"Logon"="SensLogonEvent"
"Logoff"="SensLogoffEvent"
"Safe"=dword:00000001
"MaxWait"=dword:00000258
"StartScreenSaver"="SensStartScreenSaverEvent"
"StopScreenSaver"="SensStopScreenSaverEvent"
"Startup"="SensStartupEvent"
"Shutdown"="SensShutdownEvent"
"StartShell"="SensStartShellEvent"
"PostShell"="SensPostShellEvent"
"Disconnect"="SensDisconnectEvent"
"Reconnect"="SensReconnectEvent"
"Unlock"="SensUnlockEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SMDEn]
"Asynchronous"=dword:00000000
"DllName"="C:\\WINDOWS\\system32\\dnnu0159e.dll"
"Impersonate"=dword:00000000
"Logon"="WinLogon"
"Logoff"="WinLogoff"
"Shutdown"="WinShutdown"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\termsrv]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,6c,6e,6f,74,69,66,79,2e,64,6c,6c,00
"Impersonate"=dword:00000000
"Logoff"="TSEventLogoff"
"Logon"="TSEventLogon"
"PostShell"="TSEventPostShell"
"Shutdown"="TSEventShutdown"
"StartShell"="TSEventStartShell"
"Startup"="TSEventStartup"
"MaxWait"=dword:00000258
"Reconnect"="TSEventReconnect"
"Disconnect"="TSEventDisconnect"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlballoon]
"DLLName"="wlnotify.dll"
"Logon"="RegisterTicketExpiredNotificationEvent"
"Logoff"="UnregisterTicketExpiredNotificationEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wzcnotif]
"DLLName"="wzcdlg.dll"
"Logon"="WZCEventLogon"
"Logoff"="WZCEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000000


------------- Locate.com Results -------------

No matches found.

-------- Strings.exe Qoologic Results --------


--------- Strings.exe Aspack Results ---------


-------------- HKLM Run Key ----------------

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AVG7_CC"="C:\\PROGRA~1\\Grisoft\\AVGFRE~1\\avgcc.exe /STARTUP"
"AVG7_EMC"="C:\\PROGRA~1\\Grisoft\\AVGFRE~1\\avgemc.exe"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL]
"Installed"="1"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI]
"NoChange"="1"
"Installed"="1"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS]
"Installed"="1"




#14 -David-

-David-

  • Members
  • 10,603 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London
  • Local time:03:50 AM

Posted 12 December 2005 - 05:42 PM

Download killbox from here:

KillBox

Unzip the folder to your desktop.

1. Start Killbox.exe
2. Select the Delete on Reboot option.
3. Copy the complete text in bold below to the clipboard by highlighting the filepaths and pressing Control + C:

C:\WINDOWS\System32\9EE5F5CD89.sys
C:\WINDOWS\system32\dnnu0159e.dll


4. Go to the File menu of Killbox, and choose Paste from Clipboard.
5. Click the Delete File button that is a red-and-white X. When asked if you want to delete these files say Yes. When asked if you want to reboot now, say No.
6. Exit Killbox.
___________

Now post a new HJT log and tell me how your computer feels.

David

#15 RDO

RDO
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:11:20 PM

Posted 12 December 2005 - 06:30 PM

Computer seems to be working fine now. No more pop-ups. Everything is running smoothly!
Here is the log you requested...


Logfile of HijackThis v1.99.1
Scan saved at 7:56:58 PM, on 12/12/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
C:\Program Files\Common Files\VCClient\VCClient.exe
C:\Program Files\Common Files\VCClient\VCMain.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\MSN Messenger\msnmsgr.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Documents and Settings\Owner\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [AVG7_EMC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
O4 - HKCU\..\Run: [CU1] C:\Program Files\Common Files\VCClient\VCClient.exe
O4 - HKCU\..\Run: [CU2] C:\Program Files\Common Files\VCClient\VCMain.exe
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar2.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar2.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar2.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar2.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\PartyPoker.exe
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\PartyPoker.exe
O10 - Broken Internet access because of LSP provider 'mswsck2.dll' missing
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://spaces.msn.com/PhotoUpload/MsnPUpld.cab?10,0,910,0
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.com/v5co...b?1097722150265
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://sympatico.zone.msn.com/binFramework...ro.cab27513.cab
O16 - DPF: {F5C90925-ABBF-4475-88F5-8622B452BA9E} (Compaq System Data Class) - http://wwemail.support.hp.com/fd2/objects/SysQuery.cab
O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
O20 - Winlogon Notify: SMDEn - C:\WINDOWS\system32\dnnu0159e.dll (file missing)
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: Softex OmniPass Service (omniserv) - Unknown owner - C:\Program Files\Softex\OmniPass\Omniserv.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users