Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

HijackThis Log: Needs Diagnosing


  • This topic is locked This topic is locked
8 replies to this topic

#1 aceman

aceman

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:04:43 PM

Posted 26 October 2004 - 03:20 AM

I am not one who likes to bother others with my own problems, but I am at my witts end with these people and companies which have hijacked my cpu. Someone PLEASE advise. I am having severe problems with pop-ups and other things loading whenever I start IE. I am now using FireFox, but would still like help in cleaning out my cpu of hijackers. Thanks all, in advance!

Aaron


Logfile of HijackThis v1.98.2
Scan saved at 3:48:35 AM, on 10/26/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
e:\Program Files\Ahead\InCD\InCDsrv.exe
C:\WINDOWS\system32\spoolsv.exe
e:\Program Files\AVPersonal\AVWUPSRV.EXE
C:\WINDOWS\System32\DRIVERS\CDANTSRV.EXE
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\Explorer.EXE
E:\Program Files\Ahead\InCD\InCD.exe
C:\WINDOWS\System32\vdpfiu.exe
C:\Program Files\VVSN\VVSN.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Documents and Settings\acohen\Application Data\aprp.exe
E:\PROGRA~1\Ahead\NEROPH~1\data\Xtras\mssysmgr.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\inetg\winlogon.exe
E:\Program Files\AVPersonal\AVWIN.EXE
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE
E:\Program Files\Hijackthis1977\HijackThis.exe

R3 - URLSearchHook: (no name) - {C7EDAB2E-D7F9-11D8-BA48-C79B0C409D70} - (no file)
F3 - REG:win.ini: run=C:\WINDOWS\inetg\winlogon.exe
O2 - BHO: MultimppObj Class - {002EB272-2590-4693-B166-FBD5D9B6FEA6} - C:\WINDOWS\multimpp.dll
O2 - BHO: Band Class - {01F44A8A-8C97-4325-A378-76E68DC4AB2E} - C:\WINDOWS\systb.dll (file missing)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - D:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {5321E378-FFAD-4999-8C62-03CA8155F0B3} - (no file)
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - E:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: ADP UrlCatcher Class - {F4E04583-354E-4076-BE7D-ED6A80FD66DA} - C:\WINDOWS\System32\msbe.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: (no name) - {815A82AE-CDEF-11D8-BA48-A6D245798277} - (no file)
O3 - Toolbar: (no name) - {2CDE1A7D-A478-4291-BF31-E1B4C16F92EB} - (no file)
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet
O4 - HKLM\..\Run: [xp_system] C:\WINDOWS\inetg\winlogon.exe
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [InCD] e:\Program Files\Ahead\InCD\InCD.exe
O4 - HKLM\..\Run: [qradcxcxmevcw] C:\WINDOWS\System32\vdpfiu.exe
O4 - HKLM\..\Run: [ctkt] C:\WINDOWS\ctkt.exe
O4 - HKLM\..\Run: [conscorr] C:\WINDOWS\conscorr.exe
O4 - HKLM\..\Run: [VVSN] C:\Program Files\VVSN\VVSN.exe
O4 - HKLM\..\RunOnce: [SpybotSnD] "E:\Program Files\Spybot - Search & Destroy\SpybotSD.exe" /autocheck
O4 - HKCU\..\Run: [warez] "E:\Program Files\Warez P2P Client\warez.exe" -h
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [AIM] E:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [Otaa] C:\Documents and Settings\acohen\Application Data\aprp.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [PhotoShow Deluxe Media Manager] E:\PROGRA~1\Ahead\NEROPH~1\data\Xtras\mssysmgr.exe
O4 - HKCU\..\Run: [xp_system] C:\WINDOWS\inetg\winlogon.exe
O4 - Global Startup: Microsoft Office.lnk = D:\Program Files\Microsoft Office\Office10\OSA.EXE
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = SalesInc.net
O17 - HKLM\Software\..\Telephony: DomainName = SalesInc.net
O17 - HKLM\System\CCS\Services\Tcpip\..\{14793540-AD6D-4C20-B8BC-47294F23BD3C}: NameServer = 192.168.1.1
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = SalesInc.net
O17 - HKLM\System\CS1\Services\Tcpip\..\{14793540-AD6D-4C20-B8BC-47294F23BD3C}: NameServer = 192.168.1.1
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = SalesInc.net

BC AdBot (Login to Remove)

 


#2 aceman

aceman
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:04:43 PM

Posted 26 October 2004 - 07:39 AM

Hello all :thumbsup: .... I am new to this forum and was wondering how I am supposed to go about asking/recieving help in regards to my hijacked cpu? I could really use the help, but I wanna make sure I don't get anyone frusstrated with me by going about this in the wrong way. Any response would be greatly appreciated. Thanks much in advance!

Aaron (newbie)

#3 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,504 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:05:43 PM

Posted 26 October 2004 - 10:21 AM

First you should only post your problem in one topic. People help here on a volunteer basis with noone getting paid to help. With that in mind, the volunteers all have lives outside of this forum so if they do not get back to you immediately you must be patient. If you do not get a response within a couple of days, then reply to the topic with the single word of bump so it goes to the top of the list and will get noticed. You unfortunately, can not expect an answer within 3 hours of posting your topic though this does happen quite often


I want you to fix some of those entries. Please do the following:

Please make sure that you can view all hidden files. Instructions on how to do this can be found here:

How to see hidden files in Windows

Run Hijackthis again, click scan, and Put a checkmark next to each of these. Then click the Fix button

R3 - URLSearchHook: (no name) - {C7EDAB2E-D7F9-11D8-BA48-C79B0C409D70} - (no file)
F3 - REG:win.ini: run=C:\WINDOWS\inetg\winlogon.exe
O2 - BHO: MultimppObj Class - {002EB272-2590-4693-B166-FBD5D9B6FEA6} - C:\WINDOWS\multimpp.dll
O2 - BHO: Band Class - {01F44A8A-8C97-4325-A378-76E68DC4AB2E} - C:\WINDOWS\systb.dll (file missing)
O2 - BHO: (no name) - {5321E378-FFAD-4999-8C62-03CA8155F0B3} - (no file)
O2 - BHO: ADP UrlCatcher Class - {F4E04583-354E-4076-BE7D-ED6A80FD66DA} - C:\WINDOWS\System32\msbe.dll
O3 - Toolbar: (no name) - {815A82AE-CDEF-11D8-BA48-A6D245798277} - (no file)
O3 - Toolbar: (no name) - {2CDE1A7D-A478-4291-BF31-E1B4C16F92EB} - (no file)
O4 - HKLM\..\Run: [xp_system] C:\WINDOWS\inetg\winlogon.exe
O4 - HKLM\..\Run: [qradcxcxmevcw] C:\WINDOWS\System32\vdpfiu.exe
O4 - HKLM\..\Run: [ctkt] C:\WINDOWS\ctkt.exe
O4 - HKLM\..\Run: [conscorr] C:\WINDOWS\conscorr.exe
O4 - HKLM\..\Run: [VVSN] C:\Program Files\VVSN\VVSN.exe
O4 - HKCU\..\Run: [warez] "E:\Program Files\Warez P2P Client\warez.exe" -h
O4 - HKCU\..\Run: [Otaa] C:\Documents and Settings\acohen\Application Data\aprp.exe
O4 - HKCU\..\Run: [xp_system] C:\WINDOWS\inetg\winlogon.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present

Reboot your computer into Safe Mode

Then delete these files or directories (Do not be concerned if they do not exist)

C:\WINDOWS\inetg\
C:\WINDOWS\multimpp.dll
C:\WINDOWS\System32\vdpfiu.exe
C:\WINDOWS\ctkt.exe
C:\WINDOWS\conscorr.exe
C:\Program Files\VVSN\
C:\Documents and Settings\acohen\Application Data\aprp.exe

Reboot your computer to go back to normal mode and post a new log.

#4 aceman

aceman
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:04:43 PM

Posted 26 October 2004 - 02:07 PM

Thank you so much Grinler... I completely understand what you are saying and I didn't mean to sound pushy or insistent. Its great, just the fact that people are willing to help outta the goodness of their hearts is something I am very thankful for.

Anyways, I did all of what you said and this is my new hijack log:

Logfile of HijackThis v1.98.2
Scan saved at 3:12:13 PM, on 10/26/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
e:\Program Files\Ahead\InCD\InCDsrv.exe
C:\WINDOWS\system32\spoolsv.exe
e:\Program Files\AVPersonal\AVWUPSRV.EXE
C:\WINDOWS\System32\DRIVERS\CDANTSRV.EXE
E:\Program Files\GFI\DownloadSecurity\msecatt.exe
C:\WINDOWS\System32\nvsvc32.exe
E:\Program Files\GFI\DownloadSecurity\autdlsvc.exe
C:\WINDOWS\Explorer.EXE
E:\Program Files\Ahead\InCD\InCD.exe
C:\WINDOWS\System32\ctfmon.exe
E:\PROGRA~1\Ahead\NEROPH~1\data\Xtras\mssysmgr.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\inetg\winlogon.exe
E:\Program Files\Hijackthis1977\HijackThis.exe

F3 - REG:win.ini: run=C:\WINDOWS\inetg\winlogon.exe
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - D:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {5321E378-FFAD-4999-8C62-03CA8155F0B3} - (no file)
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [InCD] e:\Program Files\Ahead\InCD\InCD.exe
O4 - HKLM\..\Run: [xp_system] C:\WINDOWS\inetg\winlogon.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [AIM] E:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [PhotoShow Deluxe Media Manager] E:\PROGRA~1\Ahead\NEROPH~1\data\Xtras\mssysmgr.exe
O4 - HKCU\..\Run: [xp_system] C:\WINDOWS\inetg\winlogon.exe
O4 - Global Startup: Microsoft Office.lnk = D:\Program Files\Microsoft Office\Office10\OSA.EXE
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - E:\Program Files\AIM\aim.exe
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = SalesInc.net
O17 - HKLM\Software\..\Telephony: DomainName = SalesInc.net
O17 - HKLM\System\CCS\Services\Tcpip\..\{14793540-AD6D-4C20-B8BC-47294F23BD3C}: NameServer = 192.168.1.1
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = SalesInc.net
O17 - HKLM\System\CS1\Services\Tcpip\..\{14793540-AD6D-4C20-B8BC-47294F23BD3C}: NameServer = 192.168.1.1
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = SalesInc.net
O17 - HKLM\System\CS2\Services\Tcpip\..\{14793540-AD6D-4C20-B8BC-47294F23BD3C}: NameServer = 192.168.1.1

#5 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,504 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:05:43 PM

Posted 26 October 2004 - 02:14 PM

Fix these two entries:

F3 - REG:win.ini: run=C:\WINDOWS\inetg\winlogon.exe
O4 - HKCU\..\Run: [xp_system] C:\WINDOWS\inetg\winlogon.exe


Reboot into safe mode and delete:

c:\windows\inetg\

reboot and post a last log

#6 aceman

aceman
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:04:43 PM

Posted 26 October 2004 - 02:29 PM

I did just as you said and here is my new hijack log:

Logfile of HijackThis v1.98.2
Scan saved at 3:38:25 PM, on 10/26/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
e:\Program Files\Ahead\InCD\InCDsrv.exe
C:\WINDOWS\system32\spoolsv.exe
e:\Program Files\AVPersonal\AVWUPSRV.EXE
C:\WINDOWS\System32\DRIVERS\CDANTSRV.EXE
E:\Program Files\GFI\DownloadSecurity\msecatt.exe
C:\WINDOWS\System32\nvsvc32.exe
E:\Program Files\GFI\DownloadSecurity\autdlsvc.exe
C:\WINDOWS\Explorer.EXE
E:\Program Files\Ahead\InCD\InCD.exe
C:\WINDOWS\System32\ctfmon.exe
E:\PROGRA~1\Ahead\NEROPH~1\data\Xtras\mssysmgr.exe
C:\WINDOWS\System32\svchost.exe
E:\Program Files\Hijackthis1977\HijackThis.exe
C:\WINDOWS\inetg\winlogon.exe
C:\WINDOWS\System32\wuauclt.exe
C:\WINDOWS\system32\userinit.exe

F3 - REG:win.ini: run=C:\WINDOWS\inetg\winlogon.exe
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - D:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {5321E378-FFAD-4999-8C62-03CA8155F0B3} - (no file)
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [InCD] e:\Program Files\Ahead\InCD\InCD.exe
O4 - HKLM\..\Run: [xp_system] C:\WINDOWS\inetg\winlogon.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [AIM] E:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [PhotoShow Deluxe Media Manager] E:\PROGRA~1\Ahead\NEROPH~1\data\Xtras\mssysmgr.exe
O4 - HKCU\..\Run: [warez] "E:\Program Files\Warez P2P Client\warez.exe" -h
O4 - HKCU\..\Run: [xp_system] C:\WINDOWS\inetg\winlogon.exe
O4 - Global Startup: Microsoft Office.lnk = D:\Program Files\Microsoft Office\Office10\OSA.EXE
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - E:\Program Files\AIM\aim.exe
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = SalesInc.net
O17 - HKLM\Software\..\Telephony: DomainName = SalesInc.net
O17 - HKLM\System\CCS\Services\Tcpip\..\{14793540-AD6D-4C20-B8BC-47294F23BD3C}: NameServer = 192.168.1.1
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = SalesInc.net
O17 - HKLM\System\CS1\Services\Tcpip\..\{14793540-AD6D-4C20-B8BC-47294F23BD3C}: NameServer = 192.168.1.1
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = SalesInc.net
O17 - HKLM\System\CS2\Services\Tcpip\..\{14793540-AD6D-4C20-B8BC-47294F23BD3C}: NameServer = 192.168.1.1

#7 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,504 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:05:43 PM

Posted 26 October 2004 - 02:55 PM

Download killbox here:

KillBox


Unzip the folder to your desktop.

Start Killbox.exe

When it is open, enter C:\WINDOWS\inetg\winlogon.exe into the field labeled "Full path of file to delete".

Select the Delete on reboot option.

Then press the button that looks like a red circle with a white X in it.

Once your computer has reboot, check to see if the file is gone.

Then fix those two lines again and post a new log

#8 aceman

aceman
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:04:43 PM

Posted 26 October 2004 - 03:25 PM

Thank you sooo much, Grinler, for all of your help. I was about to go crazy with all those pop-ups and web changes. I did what you just said, and it seems to me (a Novice), that all is finally well. Please let me know if there is anything else I need to do to finalize this cleaning out or any suggestions of how I can help keep my cpu clean (anti-virus progs, sys cleaners, etc...). Thank you sooo much again for all your valuable time spent helping me resolve my dilemma.

Here's the final hijack log:

Logfile of HijackThis v1.98.2
Scan saved at 4:27:28 PM, on 10/26/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
e:\Program Files\Ahead\InCD\InCDsrv.exe
C:\WINDOWS\system32\spoolsv.exe
e:\Program Files\AVPersonal\AVWUPSRV.EXE
C:\WINDOWS\System32\DRIVERS\CDANTSRV.EXE
E:\Program Files\GFI\DownloadSecurity\msecatt.exe
C:\WINDOWS\System32\nvsvc32.exe
E:\Program Files\GFI\DownloadSecurity\autdlsvc.exe
C:\WINDOWS\Explorer.EXE
E:\Program Files\Ahead\InCD\InCD.exe
C:\WINDOWS\System32\ctfmon.exe
E:\PROGRA~1\Ahead\NEROPH~1\data\Xtras\mssysmgr.exe
C:\WINDOWS\System32\svchost.exe
E:\Program Files\Hijackthis1977\HijackThis.exe

O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - D:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [InCD] e:\Program Files\Ahead\InCD\InCD.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [AIM] E:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [PhotoShow Deluxe Media Manager] E:\PROGRA~1\Ahead\NEROPH~1\data\Xtras\mssysmgr.exe
O4 - HKCU\..\Run: [warez] "E:\Program Files\Warez P2P Client\warez.exe" -h
O4 - Global Startup: Microsoft Office.lnk = D:\Program Files\Microsoft Office\Office10\OSA.EXE
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - E:\Program Files\AIM\aim.exe
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = SalesInc.net
O17 - HKLM\Software\..\Telephony: DomainName = SalesInc.net
O17 - HKLM\System\CCS\Services\Tcpip\..\{14793540-AD6D-4C20-B8BC-47294F23BD3C}: NameServer = 192.168.1.1
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = SalesInc.net
O17 - HKLM\System\CS1\Services\Tcpip\..\{14793540-AD6D-4C20-B8BC-47294F23BD3C}: NameServer = 192.168.1.1
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = SalesInc.net
O17 - HKLM\System\CS2\Services\Tcpip\..\{14793540-AD6D-4C20-B8BC-47294F23BD3C}: NameServer = 192.168.1.1

#9 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,504 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:05:43 PM

Posted 26 October 2004 - 04:42 PM

Do you use this:

O4 - HKCU\..\Run: [warez] "E:\Program Files\Warez P2P Client\warez.exe" -h

If not fix it.

And if this directory :

c:\windows\inetg\

still exists, you can delete it.

Other than ...

Log looks clean...great job!

Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  • Disable and Enable System Restore. - If you are using Windows ME or XP then you should disable and reenable system restore to make sure there are no infected files found in a restore point.

    You can find instructions on how to enable and reenable system restore here:

    Managing Windows Millenium System Restore

    or

    Windows XP System Restore Guide

    Renable system restore with instructions from tutorial above

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    • From within Internet Explorer click on the Tools menu and then click on Options.
    • Click once on the Security tab
    • Click once on the Internet icon so it becomes highlighted.
    • Click once on the Custom Level button.
      • Change the Download signed ActiveX controls to Prompt
      • Change the Download unsigned ActiveX controls to Disable
      • Change the Initialize and script ActiveX controls not marked as safe to Disable
      • Change the Installation of desktop items to Prompt
      • Change the Launching programs and files in an IFRAME to Prompt
      • Change the Navigate sub-frames across different domains to Prompt
      • When all these settings have been made, click on the OK button.
      • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    • Next press the Apply button and then the OK to exit the Internet Properties page.
  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

    A tutorial on installing & using this product can be found here:

    Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  • Install Ad-Aware - Install and download Ad-Aware. ou should also scan your computer with program on a regular basis just as you would an antivirus software in conjunction with Spybot.

    A tutorial on installing & using this product can be found here:

    Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

Glad I was able to help.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users