Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Hijacked?


  • Please log in to reply
7 replies to this topic

#1 lvanlith

lvanlith

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:05:46 PM

Posted 17 June 2006 - 07:37 PM

In safemode I did all recommended virus scans. Here is my hijack log. Can you tell me what else I have to do? Thanks!

Logfile of HijackThis v1.99.1
Scan saved at 8:28:12 PM, on 6/17/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\DOCUME~1\ALEXTU~1\LOCALS~1\Temp\Temporary Directory 2 for HijackThis.zip\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://monstercrawler.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = about:blank
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
R3 - Default URLSearchHook is missing
F2 - REG:system.ini: UserInit=userinit.exe
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: AOL Toolbar - {DE9C389F-3316-41A7-809B-AA305ED9D922} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll
O3 - Toolbar: Search - {9C7DF2A2-8EFF-48B5-9CAB-2EBD16CD26A5} - C:\WINDOWS\Onvjvauj.dll (file missing)
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [RealTray] C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER
O4 - HKLM\..\Run: [NNTray] C:\Program Files\Net Nanny\nnstart.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
O4 - HKLM\..\Run: [NaviSearch] C:\Program Files\NaviSearch\bin\nls.exe
O4 - HKLM\..\Run: [ViewMgr] C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
O4 - HKLM\..\Run: [Network] C:\Program Files\Network\network.exe
O4 - HKLM\..\Run: [MediaGateway] C:\Program Files\MediaGateway\MediaGateway.exe
O4 - HKLM\..\Run: [WinTask driver] C:\WINDOWS\system32\wintask.exe
O4 - HKLM\..\Run: [loadadv64] C:\WINDOWS\system32\loadadv64
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [CAS2] "C:\Program Files\System Files\System.exe"
O4 - HKCU\..\Run: [muqu] C:\PROGRA~1\COMMON~1\muqu\muqum.exe
O4 - HKCU\..\Run: [CU1] C:\Program Files\Common Files\VCClient\VCClient.exe
O4 - HKCU\..\Run: [CU2] C:\Program Files\Common Files\VCClient\VCMain.exe
O4 - HKCU\..\Run: [Shell] "C:\Program Files\Common Files\Microsoft Shared\Web Folders\ibm00001.exe"
O4 - HKCU\..\Run: [Steam] C:\Program Files\Valve\Steam\\Steam.exe -silent
O4 - Startup: PowerReg Scheduler V3.exe
O4 - Startup: RollerCoaster Tycoon 3 Registration.lnk = C:\Documents and Settings\Alex Turner\Local Settings\Temp\{2F3F3909-5200-41E0-8A8D-C993860E961D}\{907B4640-266B-4A21-92FB-CD1A86CD0F63}\ATR1.exe
O4 - Startup: Zeno.lnk = C:\WINDOWS\system32\swinprag.exe
O4 - Startup: Z_Start.lnk = C:\WINDOWS\system32\dwdsregt.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O8 - Extra context menu item: &AOL Toolbar Search - c:\program files\aol\aol toolbar 2.0\resources\en-US\local\search.html
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar3.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar3.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar3.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar3.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar3.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar3.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: AOL Toolbar - {3369AF0D-62E9-4bda-8103-B4C75499B578} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\Netscape\Communicator\Program\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {26098EA2-C95D-48EA-89B4-63C5A63BD42F} - http://www.pacimedia.com/install/pcs_0021.exe
O16 - DPF: {2B1AA38D-2D12-11D5-AAD0-00C04FA03D78} (LocalExec Control) - https://my.uga.edu/nps/portal/gadgets/com.n...t/LocalExec.CAB
O16 - DPF: {3A7FE611-1994-4EF1-A09F-99456752289D} - http://install.wildtangent.com/ActiveLaunc...iveLauncher.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.com/v5co...b?1102358000948
O16 - DPF: {8A0DCBDB-6E20-489C-9041-C1E8A0352E75} - http://awbeta.net-nucleus.com/FIX/WinATS.cab
O16 - DPF: {B49C4597-8721-4789-9250-315DFBD9F525} (IWinAmpActiveX Class) - http://cdn.digitalcity.com/radio/ampx/ampx2.6.1.11_en_dl.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://aolsvc.aol.com/onlinegames/popzuma/...aploader_v7.cab
O18 - Filter: text/html - {BA576CDE-9949-4473-A8F7-6C17C2A7E600} - (no file)
O20 - Winlogon Notify: App Paths - C:\WINDOWS\system32\fpl6033se.dll (file missing)
O20 - Winlogon Notify: ShellScrap - C:\WINDOWS\system32\guard.tmp (file missing)
O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: ewido security suite control - ewido networks - C:\Documents and Settings\Alex Turner\Desktop\security suite\ewidoctrl.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: Network Monitor - Unknown owner - C:\Program Files\Network Monitor\netmon.exe (file missing)
O23 - Service: NNSvc - BioNet Systems, LLC. - C:\Program Files\Net Nanny\nnsvc.exe
O23 - Service: Norton AntiVirus Firewall Monitor Service (NPFMntor) - Symantec Corporation - C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe

BC AdBot (Login to Remove)

 


#2 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:05:46 PM

Posted 17 June 2006 - 08:20 PM

Please post the logs from normal mode not safe mode

http://www.atribune.org/ccount/click.php?id=7 to download Look2Me-Destroyer.exe and save it to your desktop.
· Close all windows before continuing.
· Double-click Look2Me-Destroyer.exe to run it.
· click the Scan for L2M button, your desktop icons will disappear, this is normal.
· Once it's done scanning, click the Remove L2M button.
· You will receive a Done Scanning message, click OK.
· When completed, you will receive this message: Done removing infected files! Look2Me-Destroyer will now shutdown your computer, click OK.
· Your computer will then shutdown.
· Turn your computer back on.
· Please post the contents of C:\Look2Me-Destroyer.txt and a new HiJackThis log.
If Look2Me-Destroyer does not reopen automatically, reboot and try again.

If you receive a message from your firewall about this program accessing the internet please allow it.

If you receive a runtime error '339' please download MSWINSCK.OCX from the link below and place it in your C:\Windows\System32 Directory.

http://www.ascentive.com/support/new/images/lib/MSWINSCK.OCX
====================================

Go to the link below and download the trial version of SpySweeper:

SpySweeper http://www.webroot.com/consumer/products/s...&rc=4129&ac=tsg

* Click the Free Trial link under "SpySweeper" to download the program.
* Install it. Once the program is installed, it will open.
* It will prompt you to update to the latest definitions, click Yes.
* Once the definitions are installed, click Options on the left side.
* Click the Sweep Options tab.
* Under What to Sweep please put a check next to the following:
o Sweep Memory
o Sweep Registry
o Sweep Cookies
o Sweep All User Accounts
o Enable Direct Disk Sweeping
o Sweep Contents of Compressed Files
o Sweep for Rootkits

o Please UNCHECK Do not Sweep System Restore Folder.

* Click Sweep Now on the left side.
* Click the Start button.
* When it's done scanning, click the Next button.
* Make sure everything has a check next to it, then click the Next button.
* It will remove all of the items found.
* Click Session Log in the upper right corner, copy everything in that window.
* Click the Summary tab and click Finish.
* Paste the contents of the session log you copied into your next reply.
Also post a new Hijack This log.
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#3 lvanlith

lvanlith
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:05:46 PM

Posted 19 June 2006 - 12:05 PM

Logfile of HijackThis v1.99.1
Scan saved at 1:00:20 PM, on 6/19/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\Real\RealPlayer\RealPlay.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\Documents and Settings\Alex Turner\Desktop\security suite\ewidoctrl.exe
C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\WINDOWS\system32\wscntfy.exe
C:\DOCUME~1\ALEXTU~1\LOCALS~1\Temp\Temporary Directory 3 for HijackThis.zip\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://monstercrawler.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = about:blank
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
R3 - Default URLSearchHook is missing
F2 - REG:system.ini: UserInit=userinit.exe
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: AOL Toolbar - {DE9C389F-3316-41A7-809B-AA305ED9D922} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll
O3 - Toolbar: Search - {9C7DF2A2-8EFF-48B5-9CAB-2EBD16CD26A5} - C:\WINDOWS\Onvjvauj.dll (file missing)
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [RealTray] C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
O4 - HKLM\..\Run: [ViewMgr] C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
O4 - HKLM\..\Run: [Network] C:\Program Files\Network\network.exe
O4 - HKLM\..\Run: [loadadv64] C:\WINDOWS\system32\loadadv64
O4 - HKLM\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe" /startintray
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [muqu] C:\PROGRA~1\COMMON~1\muqu\muqum.exe
O4 - HKCU\..\Run: [Steam] C:\Program Files\Valve\Steam\\Steam.exe -silent
O4 - Startup: PowerReg Scheduler V3.exe
O4 - Startup: RollerCoaster Tycoon 3 Registration.lnk = C:\Documents and Settings\Alex Turner\Local Settings\Temp\{2F3F3909-5200-41E0-8A8D-C993860E961D}\{907B4640-266B-4A21-92FB-CD1A86CD0F63}\ATR1.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O8 - Extra context menu item: &AOL Toolbar Search - c:\program files\aol\aol toolbar 2.0\resources\en-US\local\search.html
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar3.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar3.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar3.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar3.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar3.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar3.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: AOL Toolbar - {3369AF0D-62E9-4bda-8103-B4C75499B578} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\Netscape\Communicator\Program\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {26098EA2-C95D-48EA-89B4-63C5A63BD42F} - http://www.pacimedia.com/install/pcs_0021.exe
O16 - DPF: {2B1AA38D-2D12-11D5-AAD0-00C04FA03D78} (LocalExec Control) - https://my.uga.edu/nps/portal/gadgets/com.n...t/LocalExec.CAB
O16 - DPF: {3A7FE611-1994-4EF1-A09F-99456752289D} - http://install.wildtangent.com/ActiveLaunc...iveLauncher.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.com/v5co...b?1102358000948
O16 - DPF: {B49C4597-8721-4789-9250-315DFBD9F525} (IWinAmpActiveX Class) - http://cdn.digitalcity.com/radio/ampx/ampx2.6.1.11_en_dl.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://aolsvc.aol.com/onlinegames/popzuma/...aploader_v7.cab
O18 - Filter: text/html - {BA576CDE-9949-4473-A8F7-6C17C2A7E600} - (no file)
O20 - Winlogon Notify: WRNotifier - C:\WINDOWS\SYSTEM32\WRLogonNTF.dll
O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: ewido security suite control - ewido networks - C:\Documents and Settings\Alex Turner\Desktop\security suite\ewidoctrl.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: Network Monitor - Unknown owner - C:\Program Files\Network Monitor\netmon.exe (file missing)
O23 - Service: NNSvc - Unknown owner - C:\Program Files\Net Nanny\nnsvc.exe (file missing)
O23 - Service: Norton AntiVirus Firewall Monitor Service (NPFMntor) - Symantec Corporation - C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Webroot Spy Sweeper Engine (svcWRSSSDK) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe

Look2Me-Destroyer V1.0.12

Scanning for infected files.....
Scan started at 6/19/2006 11:15:26 AM

Infected! C:\WINDOWS\system32\fpl6033se.dll
Infected! C:\WINDOWS\system32\guard.tmp

Attempting to delete infected files...

Making registry repairs.

Removing: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\App Paths
Removing: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ShellScrap

Removing: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved "{E8EEBF52-6C35-4364-873D-1865C330EFF0}"
HKCR\Clsid\{E8EEBF52-6C35-4364-873D-1865C330EFF0}

Removing: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved "{59931037-EA95-4A7F-8CC1-BC53AF3C4C86}"
HKCR\Clsid\{59931037-EA95-4A7F-8CC1-BC53AF3C4C86}

Removing: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved "{D0C631ED-7218-4906-8405-56C76754FBD2}"
HKCR\Clsid\{D0C631ED-7218-4906-8405-56C76754FBD2}

Restoring Windows certificates.

Replaced hosts file with default windows hosts file


Restoring SeDebugPrivilege for Administrators - Succeeded

********
11:55 AM: | Start of Session, Monday, June 19, 2006 |
11:55 AM: Spy Sweeper started
11:55 AM: Sweep initiated using definitions version 701
11:55 AM: Starting Memory Sweep
11:58 AM: Memory Sweep Complete, Elapsed Time: 00:02:52
11:58 AM: Starting Registry Sweep
11:58 AM: Registry Sweep Complete, Elapsed Time:00:00:09
11:58 AM: Starting Cookie Sweep
11:58 AM: Cookie Sweep Complete, Elapsed Time: 00:00:00
11:58 AM: Starting File Sweep
12:13 PM: Warning: Unhandled Archive Type
12:13 PM: Warning: Unhandled Archive Type
12:16 PM: Warning: Unhandled Archive Type
12:16 PM: Warning: Unhandled Archive Type
12:16 PM: Warning: Unhandled Archive Type
12:16 PM: Warning: Unhandled Archive Type
12:16 PM: File Sweep Complete, Elapsed Time: 00:18:15
12:16 PM: Full Sweep has completed. Elapsed time 00:21:29
12:16 PM: Traces Found: 0
********
11:34 AM: | Start of Session, Monday, June 19, 2006 |
11:34 AM: Spy Sweeper started
11:34 AM: Sweep initiated using definitions version 701
11:34 AM: Starting Memory Sweep
11:37 AM: Memory Sweep Complete, Elapsed Time: 00:03:01
11:37 AM: Starting Registry Sweep
11:37 AM: Found Adware: exact navisearch
11:37 AM: HKLM\software\microsoft\windows\currentversion\run\ || navisearch (ID = 135582)
11:37 AM: Found Adware: elitemediagroup-mediamotor
11:37 AM: HKCR\clsid\{7149e79c-dc19-4c5e-a53c-a54ddf75eee9}\ (27 subtraces) (ID = 140032)
11:37 AM: HKLM\software\classes\clsid\{7149e79c-dc19-4c5e-a53c-a54ddf75eee9}\inprocserver32\ (2 subtraces) (ID = 140081)
11:37 AM: HKLM\software\classes\clsid\{7149e79c-dc19-4c5e-a53c-a54ddf75eee9}\miscstatus\ (3 subtraces) (ID = 140082)
11:37 AM: HKLM\software\classes\clsid\{7149e79c-dc19-4c5e-a53c-a54ddf75eee9}\progid\ (1 subtraces) (ID = 140083)
11:37 AM: HKLM\software\classes\clsid\{7149e79c-dc19-4c5e-a53c-a54ddf75eee9}\toolboxbitmap32\ (1 subtraces) (ID = 140084)
11:37 AM: HKLM\software\classes\clsid\{7149e79c-dc19-4c5e-a53c-a54ddf75eee9}\typelib\ (1 subtraces) (ID = 140085)
11:37 AM: HKLM\software\classes\clsid\{7149e79c-dc19-4c5e-a53c-a54ddf75eee9}\version\ (1 subtraces) (ID = 140086)
11:37 AM: HKLM\software\mm\ (1 subtraces) (ID = 140211)
11:37 AM: Found Trojan Horse: trojan-downloader-topinstalls
11:37 AM: HKLM\software\microsoft\windows\currentversion\run\ || wintask driver (ID = 144815)
11:37 AM: Found System Monitor: netnanny chat monitor
11:37 AM: HKCR\nnsvc.usermanager\ (3 subtraces) (ID = 595233)
11:37 AM: HKCR\nnsvc.usermanager\clsid\ (1 subtraces) (ID = 595235)
11:37 AM: HKCR\nnsvc.usermanager.1\ (3 subtraces) (ID = 595237)
11:37 AM: HKCR\nnsvc.usermanager.1\clsid\ (1 subtraces) (ID = 595239)
11:37 AM: HKCR\appid\nnsvc.exe\ (1 subtraces) (ID = 595241)
11:37 AM: HKLM\software\net nanny software, inc.\ (7 subtraces) (ID = 595246)
11:37 AM: HKLM\software\net nanny software, inc.\net nanny\ (6 subtraces) (ID = 595247)
11:37 AM: HKLM\software\net nanny software, inc.\net nanny\5\ (5 subtraces) (ID = 595248)
11:37 AM: HKLM\software\net nanny software, inc.\net nanny\5\ || processhashstring (ID = 595249)
11:37 AM: HKLM\software\net nanny software, inc.\net nanny\5\ || hasappdirectory (ID = 595250)
11:37 AM: HKLM\software\net nanny software, inc.\net nanny\5\ || activated (ID = 595251)
11:37 AM: HKLM\software\net nanny software, inc.\net nanny\5\ || shell_object_folder (ID = 595253)
11:37 AM: HKLM\software\net nanny software, inc.\net nanny\5\ || path (ID = 595254)
11:37 AM: HKLM\software\nns\ (4 subtraces) (ID = 595256)
11:37 AM: HKLM\software\nns\5\ (3 subtraces) (ID = 595257)
11:37 AM: HKLM\software\nns\5\ || a (ID = 595258)
11:37 AM: HKLM\software\microsoft\windows\currentversion\app paths\nnsvc.exe\ (2 subtraces) (ID = 595276)
11:37 AM: HKLM\software\microsoft\windows\currentversion\app paths\nnsvc.exe\ || path (ID = 595277)
11:37 AM: HKLM\software\microsoft\windows\currentversion\run\ || nntray (ID = 595284)
11:37 AM: HKLM\software\microsoft\windows\currentversion\run\ || navisearch (ID = 601633)
11:37 AM: HKLM\software\microsoft\windows\currentversion\uninstall\{51945e07-120d-4e78-a368-c4c8d5042d21}\ (4 subtraces) (ID = 612464)
11:37 AM: Found Adware: command
11:37 AM: HKLM\software\microsoft\windows\currentversion\uninstall\{3877c2cd-f137-4144-bdb2-0a811492f920}\ (7 subtraces) (ID = 892523)
11:37 AM: Found Adware: enbrowser
11:37 AM: HKLM\software\system\sysold\ (2 subtraces) (ID = 926808)
11:37 AM: HKLM\software\microsoft\windows\currentversion\uninstall\{3877c2cd-f137-4144-bdb2-0a811492f920}\ || nomodify (ID = 958653)
11:37 AM: HKLM\software\microsoft\windows\currentversion\uninstall\{3877c2cd-f137-4144-bdb2-0a811492f920}\ || noremove (ID = 958654)
11:37 AM: HKLM\software\microsoft\windows\currentversion\uninstall\{3877c2cd-f137-4144-bdb2-0a811492f920}\ || norepair (ID = 958655)
11:37 AM: HKLM\system\currentcontrolset\services\cmdservice\ (15 subtraces) (ID = 958670)
11:37 AM: Found Adware: safesurf
11:37 AM: HKLM\software\rasmon\ (8 subtraces) (ID = 966765)
11:37 AM: HKLM\system\currentcontrolset\enum\root\legacy_cmdservice\0000\ (6 subtraces) (ID = 1016064)
11:37 AM: HKLM\system\currentcontrolset\enum\root\legacy_cmdservice\ (8 subtraces) (ID = 1016072)
11:37 AM: Found Adware: winad
11:37 AM: HKCR\mediagateway.licenseinstaller\ (5 subtraces) (ID = 1026546)
11:37 AM: HKLM\software\classes\mediagateway.licenseinstaller\ (5 subtraces) (ID = 1026584)
11:37 AM: HKLM\software\microsoft\windows\currentversion\run\ || mediagateway (ID = 1026625)
11:37 AM: HKLM\software\microsoft\windows\currentversion\uninstall\mediagateway\ (2 subtraces) (ID = 1026626)
11:37 AM: Found Adware: mirar webband
11:37 AM: HKLM\software\microsoft\windows\currentversion\shareddlls\ || c:\windows\system32\winats.dll (ID = 1055333)
11:37 AM: HKLM\software\microsoft\windows\currentversion\moduleusage\c:/windows/system32/winats.dll\ (2 subtraces) (ID = 1066860)
11:37 AM: HKLM\software\microsoft\code store database\distribution units\{8a0dcbdb-6e20-489c-9041-c1e8a0352e75}\ (11 subtraces) (ID = 1074498)
11:37 AM: HKLM\software\microsoft\windows\currentversion\uninstall\{a394e835-c8d6-4b4b-884b-d2709059f3be}\ (7 subtraces) (ID = 1110756)
11:37 AM: HKLM\software\microsoft\windows\currentversion\uninstall\{3877c2cd-f137-4144-bdb2-0a811492f920}\ || uninstallstring (ID = 1134952)
11:37 AM: Found Adware: 180search assistant/zango
11:37 AM: HKCR\lmgr180.wmdrmax.1\ (3 subtraces) (ID = 1151708)
11:37 AM: HKLM\software\classes\lmgr180.wmdrmax.1\ (3 subtraces) (ID = 1151753)
11:37 AM: Found Adware: linkmaker
11:37 AM: HKCR\fseytdc.ariaqudok\ (3 subtraces) (ID = 1180460)
11:37 AM: HKCR\fseytdc.ariaqudok.1\ (3 subtraces) (ID = 1180464)
11:37 AM: HKCR\fseytdc.yvakt\ (3 subtraces) (ID = 1180468)
11:37 AM: HKCR\fseytdc.yvakt.1\ (3 subtraces) (ID = 1180472)
11:37 AM: HKLM\software\classes\fseytdc.ariaqudok\ (3 subtraces) (ID = 1180510)
11:37 AM: HKLM\software\classes\fseytdc.ariaqudok.1\ (3 subtraces) (ID = 1180514)
11:37 AM: HKLM\software\classes\fseytdc.yvakt\ (3 subtraces) (ID = 1180518)
11:37 AM: HKLM\software\classes\fseytdc.yvakt.1\ (3 subtraces) (ID = 1180522)
11:37 AM: Found Adware: starware toolbar
11:37 AM: HKU\S-1-5-21-1708537768-1957994488-854245398-1005\software\microsoft\internet explorer\explorer bars\{2d51d869-c36b-42bd-ae68-0a81bc771fa5}\ (ID = 142855)
11:37 AM: HKU\S-1-5-21-1708537768-1957994488-854245398-1005\software\system\sysuid\ (1 subtraces) (ID = 731748)
11:37 AM: Found Adware: cas
11:37 AM: HKU\S-1-5-21-1708537768-1957994488-854245398-1005\software\cas2\ (13 subtraces) (ID = 862278)
11:37 AM: HKU\S-1-5-21-1708537768-1957994488-854245398-1005\software\microsoft\windows\currentversion\run\ || cas2 (ID = 871018)
11:37 AM: Found Adware: maxifiles
11:37 AM: HKU\S-1-5-21-1708537768-1957994488-854245398-1005\software\microsoft\internet explorer\extensions\cmdmapping\ || {77fbf9b8-1d37-4ff2-9ced-192d8e3aba6f} (ID = 1021025)
11:37 AM: Found Trojan Horse: trojan-backdoor-satellite
11:37 AM: HKU\S-1-5-21-1708537768-1957994488-854245398-1005\software\microsoft\moviemaker\recordsettings\captureset\ (1 subtraces) (ID = 1021450)
11:37 AM: Found Adware: surfsidekick
11:37 AM: HKU\S-1-5-21-1708537768-1957994488-854245398-1005\software\microsoft\windows\currentversion\run\ || cu1 (ID = 1140965)
11:37 AM: HKU\S-1-5-21-1708537768-1957994488-854245398-1005\software\microsoft\windows\currentversion\run\ || cu2 (ID = 1140966)
11:37 AM: Found Trojan Horse: trojan-backdoor-us15info
11:37 AM: HKU\S-1-5-21-1708537768-1957994488-854245398-1005\software\microsoft\windows\currentversion\run\ || Shell (ID = 1375273)
11:37 AM: HKU\WRSS_Profile_S-1-5-21-1708537768-1957994488-854245398-1004\software\microsoft\internet explorer\toolbar\webbrowser\ || {2d51d869-c36b-42bd-ae68-0a81bc771fa5} (ID = 142860)
11:37 AM: HKU\WRSS_Profile_S-1-5-21-1708537768-1957994488-854245398-1004\software\microsoft\internet explorer\toolbar\webbrowser\ || {d49e9d35-254c-4c6a-9d17-95018d228ff5} (ID = 142862)
11:37 AM: HKU\WRSS_Profile_S-1-5-21-1708537768-1957994488-854245398-1004\software\microsoft\internet explorer\urlsearchhooks\ || {02ee5b04-f144-47bb-83fb-a60bd91b74a9} (ID = 143397)
11:37 AM: HKU\WRSS_Profile_S-1-5-21-1708537768-1957994488-854245398-1004\software\microsoft\windows\currentversion\run\ || surfsidekick 3 (ID = 143403)
11:37 AM: HKU\WRSS_Profile_S-1-5-21-1708537768-1957994488-854245398-1004\software\surfsidekick3\ (3 subtraces) (ID = 143412)
11:37 AM: HKU\WRSS_Profile_S-1-5-21-1708537768-1957994488-854245398-1004\software\microsoft\internet explorer\urlsearchhooks\ || _{02ee5b04-f144-47bb-83fb-a60bd91b74a9} (ID = 165102)
11:37 AM: HKU\WRSS_Profile_S-1-5-21-1708537768-1957994488-854245398-1004\software\system\sysuid\ (1 subtraces) (ID = 731748)
11:37 AM: Found Adware: cws_secure32.html hijack
11:37 AM: HKU\WRSS_Profile_S-1-5-21-1708537768-1957994488-854245398-1004\software\microsoft\internet explorer\main\ || local page (ID = 946022)
11:37 AM: HKU\WRSS_Profile_S-1-5-21-1708537768-1957994488-854245398-1004\software\microsoft\internet explorer\main\ || start page (ID = 946023)
11:37 AM: HKU\WRSS_Profile_S-1-5-21-1708537768-1957994488-854245398-1004\software\microsoft\internet explorer\main\ || default_page_url (ID = 946026)
11:37 AM: Registry Sweep Complete, Elapsed Time:00:00:11
11:37 AM: Starting Cookie Sweep
11:37 AM: Found Spy Cookie: adknowledge cookie
11:37 AM: alex turner@adknowledge[2].txt (ID = 2072)
11:37 AM: Found Spy Cookie: atwola cookie
11:37 AM: alex turner@atwola[2].txt (ID = 2255)
11:37 AM: Found Spy Cookie: belnk cookie
11:37 AM: alex turner@belnk[1].txt (ID = 2292)
11:37 AM: alex turner@dist.belnk[2].txt (ID = 2293)
11:37 AM: Found Spy Cookie: screensavers.com cookie
11:37 AM: alex turner@i.screensavers[1].txt (ID = 3298)
11:37 AM: Found Spy Cookie: realmedia cookie
11:37 AM: alex turner@network.realmedia[1].txt (ID = 3236)
11:37 AM: alex turner@www.screensavers[1].txt (ID = 3298)
11:37 AM: Found Spy Cookie: exitexchange cookie
11:37 AM: user@exitexchange[2].txt (ID = 2633)
11:37 AM: Found Spy Cookie: bizrate cookie
11:37 AM: system@bizrate[1].txt (ID = 2308)
11:37 AM: Found Spy Cookie: dealtime cookie
11:37 AM: system@dealtime[1].txt (ID = 2505)
11:37 AM: Found Spy Cookie: monstermarketplace cookie
11:37 AM: system@monstermarketplace[2].txt (ID = 3006)
11:37 AM: Found Spy Cookie: mygeek cookie
11:37 AM: system@mygeek[1].txt (ID = 3041)
11:37 AM: system@stat.dealtime[1].txt (ID = 2506)
11:37 AM: Cookie Sweep Complete, Elapsed Time: 00:00:00
11:37 AM: Starting File Sweep
11:37 AM: c:\program files\network monitor (ID = -2147459771)
11:37 AM: c:\program files\common files\vcclient (7 subtraces) (ID = -2147461290)
11:37 AM: c:\program files\mediagateway (ID = -2147463340)
11:37 AM: c:\program files\cas2stub (ID = -2147466322)
11:37 AM: c:\program files\net nanny\others (1 subtraces) (ID = -2147475686)
11:37 AM: c:\program files\net nanny\temp (ID = -2147475684)
11:37 AM: c:\documents and settings\all users\start menu\programs\net nanny 5 (6 subtraces) (ID = -2147475694)
11:37 AM: c:\program files\net nanny\errorlogs (2 subtraces) (ID = -2147475689)
11:37 AM: c:\program files\net nanny\help (11 subtraces) (ID = -2147475688)
11:37 AM: c:\program files\net nanny\logs (1 subtraces) (ID = -2147475687)
11:37 AM: c:\program files\net nanny\chatscripts (ID = -2147475690)
11:37 AM: c:\program files\net nanny\blockpage (2 subtraces) (ID = -2147475691)
11:37 AM: c:\program files\net nanny (40 subtraces) (ID = -2147475693)
11:37 AM: Found Trojan Horse: trojan downloader matcash
11:37 AM: c:\program files\common files\inetget (ID = -2147477182)
11:37 AM: c:\documents and settings\alex turner\start menu\programs\navisearch (1 subtraces) (ID = -2147470942)
11:37 AM: amm06.inf (ID = 288272)
11:38 AM: Found Adware: bookedspace
11:38 AM: edfzhywgl.xpi (ID = 158990)
11:38 AM: gddmcnap.cem (ID = 159029)
11:38 AM: zfxjxriijz.lup (ID = 159010)
11:38 AM: bwpuoxu.nyq (ID = 159015)
11:38 AM: kvhhwsax.kkk (ID = 159046)
11:38 AM: xlkbyyrku.zuy (ID = 159059)
11:38 AM: mxkyijlentf.tqt (ID = 159023)
11:39 AM: dfbudeaaf.nqp (ID = 164344)
11:39 AM: oqfvlfwc.wap (ID = 158997)
11:40 AM: uninstall_nmon.vbs (ID = 231442)
11:45 AM: vcupdate.exe.config (ID = 212361)
11:45 AM: bk.exe (ID = 254071)
11:45 AM: Found Adware: zenosearchassistant
11:45 AM: nt68rrtc12.sys (ID = 220230)
11:45 AM: f50i.tcp (ID = 276229)
11:45 AM: Found Adware: targetsaver
11:45 AM: vocabulary (ID = 78283)
11:45 AM: class-barrel (ID = 78229)
11:45 AM: vcmain.exe (ID = 212830)
11:45 AM: HKU\S-1-5-21-1708537768-1957994488-854245398-1005\Software\Microsoft\Windows\CurrentVersion\Run || CU2 (ID = 0)
11:47 AM: ajqfqafoevk.yfd (ID = 164348)
11:48 AM: cxtmoldv.phw (ID = 164416)
11:48 AM: yaoxnojedz.edp (ID = 158998)
11:48 AM: tjylnnvbxe.ulz (ID = 164350)
11:48 AM: zrjnohevwkn.itu (ID = 159040)
11:48 AM: berpvittt.ram (ID = 164357)
11:48 AM: epuymcloi.hct (ID = 159013)
11:48 AM: cruvowxirws.qap (ID = 159017)
11:48 AM: wqkxkmz.blz (ID = 159027)
11:48 AM: nqopqyds.phu (ID = 158991)
11:48 AM: gdjkhysrz.kbv (ID = 164392)
11:48 AM: jdblusgdve.qzy (ID = 159005)
11:48 AM: mfexcraztr.mqj (ID = 159030)
11:48 AM: puwbfcajl.jwq (ID = 159004)
11:48 AM: lqmnnasc.soh (ID = 159003)
11:48 AM: aboxmwus.dos (ID = 158995)
11:48 AM: sbownjpvxmc.dpv (ID = 159020)
11:48 AM: qwavjqxcm.ovb (ID = 159037)
11:48 AM: ailbzbg.isg (ID = 159016)
11:48 AM: fecoyrqmgk.ggc (ID = 164403)
11:48 AM: vocjdtnchfv.kgz (ID = 164398)
11:48 AM: vwxzqwmhy.ucd (ID = 164380)
11:48 AM: hgrbdrxjd.nlc (ID = 158988)
11:48 AM: vpzeiquyhx.qmy (ID = 164351)
11:48 AM: tmroesb.moh (ID = 159047)
11:48 AM: jorfbdk.dmo (ID = 159045)
11:48 AM: lqvoabtaili.cyr (ID = 159060)
11:48 AM: iaabeiwrxp.icl (ID = 158986)
11:48 AM: hpokehmu.zkv (ID = 164361)
11:48 AM: fgrorfsout.uub (ID = 164410)
11:48 AM: tcsbirv.sqf (ID = 159024)
11:48 AM: izkmrcwp.zuo (ID = 159019)
11:48 AM: alechtr.oyv (ID = 257808)
11:48 AM: gcxxzqtox.lkr (ID = 159056)
11:48 AM: pjkptth.jdg (ID = 159014)
11:48 AM: qyngfcrcexx.tdd (ID = 159058)
11:48 AM: gcluvwtyxoe.tsr (ID = 164404)
11:48 AM: vfguhuqvr.ydh (ID = 164372)
11:48 AM: rpdpypxrxlf.uug (ID = 164377)
11:48 AM: woeiaki.wfn (ID = 257809)
11:48 AM: bbkvagegh.oca (ID = 159028)
11:48 AM: bdlyjujwb.her (ID = 159061)
11:48 AM: fvbtjah.uzq (ID = 164354)
11:48 AM: hiwmerzace.znj (ID = 159012)
11:48 AM: ykqonehasx.yrt (ID = 159025)
11:48 AM: logxqncazuj.sxb (ID = 164373)
11:48 AM: ksrnqgjjzfe.xju (ID = 164390)
11:48 AM: gsafvpnen.rxh (ID = 164342)
11:48 AM: hdpoxvlkbjm.zxk (ID = 159026)
11:48 AM: qoomherlqr.uxg (ID = 164415)
11:49 AM: pgspvxjg.wer (ID = 159018)
11:49 AM: gwrkxsdu.zon (ID = 158994)
11:49 AM: klquerrvhky.psr (ID = 164408)
11:49 AM: Found Adware: spysheriff fakealert
11:49 AM: secure32.html (ID = 184319)
11:49 AM: sskknwrd.dll (ID = 77733)
11:49 AM: mpmamievx.jwt (ID = 159031)
11:49 AM: tngmhmqc.mhs (ID = 159035)
11:49 AM: nsslbgy.tuy (ID = 158987)
11:49 AM: ireapsnmnj.czu (ID = 159052)
11:49 AM: rhtvgxxijw.pmd (ID = 159038)
11:49 AM: wafdqtxux.zex (ID = 159001)
11:49 AM: zjrvjepd.ikh (ID = 159051)
11:49 AM: xhuqowpulkq.etz (ID = 164367)
11:49 AM: net nanny quick start guide.lnk (ID = 125235)
11:49 AM: net nanny user guide.lnk (ID = 125237)
11:49 AM: zeno.lnk (ID = 146127)
11:49 AM: msnav32.ax (ID = 220229)
11:49 AM: z_start.lnk (ID = 235994)
11:49 AM: zeno.lnk (ID = 146127)
11:49 AM: readme.lnk (ID = 125240)
11:49 AM: winats.inf (ID = 208224)
11:49 AM: clientupdater.bat (ID = 212353)
11:49 AM: vcclient.exe.config (ID = 212358)
11:49 AM: File Sweep Complete, Elapsed Time: 00:12:05
11:49 AM: Full Sweep has completed. Elapsed time 00:15:27
11:49 AM: Traces Found: 473
11:50 AM: Removal process initiated
11:50 AM: Quarantining All Traces: 180search assistant/zango
11:50 AM: Quarantining All Traces: netnanny chat monitor
11:50 AM: netnanny chat monitor is in use. It will be removed on reboot.
11:50 AM: c:\program files\net nanny\others is in use. It will be removed on reboot.
11:50 AM: c:\program files\net nanny\chatscripts is in use. It will be removed on reboot.
11:50 AM: c:\program files\net nanny is in use. It will be removed on reboot.
11:50 AM: Quarantining All Traces: spysheriff fakealert
11:50 AM: Quarantining All Traces: trojan downloader matcash
11:50 AM: Quarantining All Traces: trojan-backdoor-satellite
11:50 AM: Quarantining All Traces: trojan-backdoor-us15info
11:50 AM: Quarantining All Traces: zenosearchassistant
11:50 AM: Quarantining All Traces: bookedspace
11:50 AM: Quarantining All Traces: cas
11:50 AM: Quarantining All Traces: elitemediagroup-mediamotor
11:50 AM: Quarantining All Traces: enbrowser
11:50 AM: Quarantining All Traces: linkmaker
11:50 AM: Quarantining All Traces: maxifiles
11:50 AM: Quarantining All Traces: starware toolbar
11:50 AM: Quarantining All Traces: surfsidekick
11:50 AM: Quarantining All Traces: targetsaver
11:50 AM: Quarantining All Traces: trojan-downloader-topinstalls
11:50 AM: Quarantining All Traces: winad
11:50 AM: Quarantining All Traces: command
11:50 AM: Quarantining All Traces: cws_secure32.html hijack
11:50 AM: Quarantining All Traces: exact navisearch
11:50 AM: Quarantining All Traces: mirar webband
11:50 AM: Quarantining All Traces: safesurf
11:50 AM: Quarantining All Traces: adknowledge cookie
11:50 AM: Quarantining All Traces: atwola cookie
11:50 AM: Quarantining All Traces: belnk cookie
11:50 AM: Quarantining All Traces: bizrate cookie
11:50 AM: Quarantining All Traces: dealtime cookie
11:50 AM: Quarantining All Traces: exitexchange cookie
11:50 AM: Quarantining All Traces: monstermarketplace cookie
11:50 AM: Quarantining All Traces: mygeek cookie
11:50 AM: Quarantining All Traces: realmedia cookie
11:50 AM: Quarantining All Traces: screensavers.com cookie
11:51 AM: Preparing to restart your computer. Please wait...
11:51 AM: Removal process completed. Elapsed time 00:01:03
********
11:14 AM: | Start of Session, Monday, June 19, 2006 |
11:14 AM: Spy Sweeper started
11:16 AM: Your spyware definitions have been updated.

#4 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:05:46 PM

Posted 19 June 2006 - 12:47 PM

Sorry - HiJackThis is runing from a temp directory and must be moved to run correctly

Click here to download HJTsetup.exe:
http://www.thespykiller.co.uk/forum/index....=tpmod;dl=item5

Save HJTsetup.exe to your desktop.

Double click on the HJTsetup.exe icon on your desktop.
By default it will install to C:\Program Files\Hijack This.
Continue to click Next in the setup dialogue boxes until you get to the Select Addition Tasks dialogue.
Put a check by Create a desktop icon then click Next again.
Continue to follow the rest of the prompts from there.
At the final dialogue box click Finish and it will launch Hijack This.
Click on the Do a system scan and save a log file button. It will scan and then ask you to save the log.
Click Save to save the log file and then the log will open in notepad.
Click on "Edit > Select All" then click on "Edit > Copy" to copy the entire contents of the log.
Come back here to this thread and Paste the log in your next reply.
DO NOT have Hijack This fix anything yet. Most of what it finds will be harmless or even required.
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#5 lvanlith

lvanlith
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:05:46 PM

Posted 19 June 2006 - 02:23 PM

Logfile of HijackThis v1.99.1
Scan saved at 3:22:19 PM, on 6/19/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\Real\RealPlayer\RealPlay.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\Documents and Settings\Alex Turner\Desktop\security suite\ewidoctrl.exe
C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Adobe\Acrobat 6.0\Reader\AcroRd32.exe
C:\Program Files\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://monstercrawler.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = about:blank
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
R3 - Default URLSearchHook is missing
F2 - REG:system.ini: UserInit=userinit.exe
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: AOL Toolbar - {DE9C389F-3316-41A7-809B-AA305ED9D922} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll
O3 - Toolbar: Search - {9C7DF2A2-8EFF-48B5-9CAB-2EBD16CD26A5} - C:\WINDOWS\Onvjvauj.dll (file missing)
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [RealTray] C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
O4 - HKLM\..\Run: [ViewMgr] C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
O4 - HKLM\..\Run: [Network] C:\Program Files\Network\network.exe
O4 - HKLM\..\Run: [loadadv64] C:\WINDOWS\system32\loadadv64
O4 - HKLM\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe" /startintray
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [muqu] C:\PROGRA~1\COMMON~1\muqu\muqum.exe
O4 - HKCU\..\Run: [Steam] C:\Program Files\Valve\Steam\\Steam.exe -silent
O4 - Startup: PowerReg Scheduler V3.exe
O4 - Startup: RollerCoaster Tycoon 3 Registration.lnk = C:\Documents and Settings\Alex Turner\Local Settings\Temp\{2F3F3909-5200-41E0-8A8D-C993860E961D}\{907B4640-266B-4A21-92FB-CD1A86CD0F63}\ATR1.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O8 - Extra context menu item: &AOL Toolbar Search - c:\program files\aol\aol toolbar 2.0\resources\en-US\local\search.html
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar3.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar3.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar3.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar3.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar3.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar3.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: AOL Toolbar - {3369AF0D-62E9-4bda-8103-B4C75499B578} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\Netscape\Communicator\Program\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {26098EA2-C95D-48EA-89B4-63C5A63BD42F} - http://www.pacimedia.com/install/pcs_0021.exe
O16 - DPF: {2B1AA38D-2D12-11D5-AAD0-00C04FA03D78} (LocalExec Control) - https://my.uga.edu/nps/portal/gadgets/com.n...t/LocalExec.CAB
O16 - DPF: {3A7FE611-1994-4EF1-A09F-99456752289D} - http://install.wildtangent.com/ActiveLaunc...iveLauncher.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.com/v5co...b?1102358000948
O16 - DPF: {B49C4597-8721-4789-9250-315DFBD9F525} (IWinAmpActiveX Class) - http://cdn.digitalcity.com/radio/ampx/ampx2.6.1.11_en_dl.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://aolsvc.aol.com/onlinegames/popzuma/...aploader_v7.cab
O18 - Filter: text/html - {BA576CDE-9949-4473-A8F7-6C17C2A7E600} - (no file)
O20 - Winlogon Notify: WRNotifier - C:\WINDOWS\SYSTEM32\WRLogonNTF.dll
O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: ewido security suite control - ewido networks - C:\Documents and Settings\Alex Turner\Desktop\security suite\ewidoctrl.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: Network Monitor - Unknown owner - C:\Program Files\Network Monitor\netmon.exe (file missing)
O23 - Service: NNSvc - Unknown owner - C:\Program Files\Net Nanny\nnsvc.exe (file missing)
O23 - Service: Norton AntiVirus Firewall Monitor Service (NPFMntor) - Symantec Corporation - C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Webroot Spy Sweeper Engine (svcWRSSSDK) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe

#6 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:05:46 PM

Posted 19 June 2006 - 02:38 PM

DownLoad http://www.intermute.com/spysubtract/cwshr...r_download.html
Close all browser windows,UnZip the file, click on the cwshredder.exe then click "Fix"

Download About:Buster from:
http://www.majorgeeks.com/AboutBuster_d4289.html
Double click aboutbuster.exe, Click begin removal, click yes to shutdown IE, click Start, then click OK.

Add remove programs – remove all occurrences of Viewpoint

You may want to print this or save it to notepad as we will go to safe mode.

Fix these with HJT – mark them, close IE, click fix checked

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = about:blank

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = about:blank

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = about:blank

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = about:blank

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = about:blank

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank

R3 - Default URLSearchHook is missing

O3 - Toolbar: Search - {9C7DF2A2-8EFF-48B5-9CAB-2EBD16CD26A5} - C:\WINDOWS\Onvjvauj.dll (file missing)

O4 - HKLM\..\Run: [ViewMgr] C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe

O4 - HKLM\..\Run: [Network] C:\Program Files\Network\network.exe

O4 - HKLM\..\Run: [loadadv64] C:\WINDOWS\system32\loadadv64

O4 - HKCU\..\Run: [muqu] C:\PROGRA~1\COMMON~1\muqu\muqum.exe

O4 - Startup: PowerReg Scheduler V3.exe

O4 - Startup: RollerCoaster Tycoon 3 Registration.lnk = C:\Documents and Settings\Alex Turner\Local Settings\Temp\{2F3F3909-5200-41E0-8A8D-C993860E961D}\{907B4640-266B-4A21-92FB-CD1A86CD0F63}\ATR1.exe

O16 - DPF: {3A7FE611-1994-4EF1-A09F-99456752289D} - http://install.wildtangent.com/ActiveLaunc...iveLauncher.cab

O18 - Filter: text/html - {BA576CDE-9949-4473-A8F7-6C17C2A7E600} - (no file)

O23 - Service: Network Monitor - Unknown owner - C:\Program Files\Network Monitor\netmon.exe (file missing)

DownLoad http://www.downloads.subratam.org/KillBox.zip

Restart your computer into safe mode now. (Tapping F8 at the first black screen) Perform the following steps in safe mode:

Double-click on Killbox.exe to run it. Now put a tick by Standard File Kill. In the "Full Path of File to Delete" box, copy and paste each of the following lines one at a time then click on the button that has the red circle with the X in the middle after you enter each file. It will ask for confimation to delete the file. Click Yes. Continue with that same procedure until you have copied and pasted all of these in the "Paste Full Path of File to Delete" box.

C:\Program Files\Viewpoint\Viewpoint Manager
C:\Program Files\Network\network.exe
C:\WINDOWS\system32\loadadv64
C:\PROGRAM FILES\COMMON FILES\muqu

Note: It is possible that Killbox will tell you that one or more files do not exist. If that happens, just continue on with all the files. Be sure you don't miss any.

START – RUN – type in %temp% OK - Edit – Select all – File – Delete

Delete everything in the C:\Windows\Temp folder or C:\WINNT\temp

Not all temp files will delete and that is normal
Empty the recycle bin
Boot and post a new log from normal NOT safe mode

Please give feedback on what worked/didn’t work and the current status of your system
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#7 lvanlith

lvanlith
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:05:46 PM

Posted 19 June 2006 - 04:13 PM

Logfile of HijackThis v1.99.1
Scan saved at 5:11:50 PM, on 6/19/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\Real\RealPlayer\RealPlay.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Java\jre1.5.0_04\bin\jucheck.exe
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\Documents and Settings\Alex Turner\Desktop\security suite\ewidoctrl.exe
C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://monstercrawler.com/
F2 - REG:system.ini: UserInit=userinit.exe
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: AOL Toolbar - {DE9C389F-3316-41A7-809B-AA305ED9D922} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [RealTray] C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
O4 - HKLM\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe" /startintray
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Steam] C:\Program Files\Valve\Steam\\Steam.exe -silent
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O8 - Extra context menu item: &AOL Toolbar Search - c:\program files\aol\aol toolbar 2.0\resources\en-US\local\search.html
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar3.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar3.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar3.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar3.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar3.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar3.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: AOL Toolbar - {3369AF0D-62E9-4bda-8103-B4C75499B578} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\Netscape\Communicator\Program\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {26098EA2-C95D-48EA-89B4-63C5A63BD42F} - http://www.pacimedia.com/install/pcs_0021.exe
O16 - DPF: {2B1AA38D-2D12-11D5-AAD0-00C04FA03D78} (LocalExec Control) - https://my.uga.edu/nps/portal/gadgets/com.n...t/LocalExec.CAB
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.com/v5co...b?1102358000948
O16 - DPF: {B49C4597-8721-4789-9250-315DFBD9F525} (IWinAmpActiveX Class) - http://cdn.digitalcity.com/radio/ampx/ampx2.6.1.11_en_dl.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://aolsvc.aol.com/onlinegames/popzuma/...aploader_v7.cab
O20 - Winlogon Notify: WRNotifier - C:\WINDOWS\SYSTEM32\WRLogonNTF.dll
O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: ewido security suite control - ewido networks - C:\Documents and Settings\Alex Turner\Desktop\security suite\ewidoctrl.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: NNSvc - Unknown owner - C:\Program Files\Net Nanny\nnsvc.exe (file missing)
O23 - Service: Norton AntiVirus Firewall Monitor Service (NPFMntor) - Symantec Corporation - C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Webroot Spy Sweeper Engine (svcWRSSSDK) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe

Thanks! I'll check it out. As usual, you guys are awesome!

#8 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:05:46 PM

Posted 19 June 2006 - 04:18 PM

Clean!

Turn off restore points, boot, turn them back on – here’s how

XP
http://service1.symantec.com/SUPPORT/tsgen...src=sec_doc_nam
"Nothing could be finer than to be in South Carolina ............"

Member ASAP




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users