Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

"adminestrator" Appears


  • Please log in to reply
5 replies to this topic

#1 sp00nk

sp00nk

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:12:35 AM

Posted 20 January 2007 - 02:45 PM

My family computer got infected. And I'm trying to get it fixed.

Unfortunately for me, it's not going well.

After running AVG anti-spyware, and AVG Antivirus, then afterwards, even adaware, still to no avail: the problem persists.

AVG found some "clicker" thing trojan or something. Due to the fact I assumed all would be resolved, I didn't bother to double-check the name of what was removed.

Anyhow;

I have a new account, password protected, called "Adminestrator", yes - with that spelling. I didn't create that account, and nobody else here didn't either. So - I want it removed, naturally, as I see it a threat and a part of a viral infection. (Geez, bring on the computer-doctors)

Anyhows, I'm attaching a HJT log, hoping it'll give you guys some insight.

Please help. I want my computer clean.

-Dan.

- - - - - - - -- - -

Attached HjT:

Logfile of HijackThis v1.99.1
Scan saved at 21:43:49, on 20.01.2007
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Internet Explorer\iexplore.exe
D:\Programs\HijackThis v1.99\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [QuickTime Task] "D:\programs\quicktime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [AIM] D:\Program Files\AIM95\aim.exe -cnetwait.odl
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: ICQ Pro - {6224f700-cba3-4071-b251-47cb894244cd} - C:\Program Files\ICQ\ICQ.exe
O9 - Extra 'Tools' menuitem: ICQ - {6224f700-cba3-4071-b251-47cb894244cd} - C:\Program Files\ICQ\ICQ.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O16 - DPF: {D77EF652-9A6B-40C8-A4B9-1C0697C6CF41} (TikGames Online Control) - http://download.games.yahoo.com/games/web_...inematycoon.cab
O20 - Winlogon Notify: partnershipreg - C:\Documents and Settings\All Users\Documents\Settings\partnership.dll
O20 - Winlogon Notify: rpcc - C:\WINDOWS\System32\rpcc.dll
O21 - SSODL: System - {7C7038A3-036C-48C1-AB54-D42ECAD06935} - dgflib.dll (file missing)
O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: ieupdater (Microsoft IE Updater) - Unknown owner - D:\Temp\ieupdate.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - %ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini (file missing)
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe

BC AdBot (Login to Remove)

 


m

#2 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:05:35 PM

Posted 20 January 2007 - 05:01 PM

Download http://downloads.andymanchesta.com/RemovalTools/SDFix.exe and save it to your Desktop.

Double click SDFix.exe and it will extract the files to %systemdrive%
(Drive that contains the Windows Directory, typically C:\SDFix)

Please then reboot your computer in Safe Mode by doing the following :
· Restart your computer
· After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
· Instead of Windows loading as normal, the Advanced Options Menu should appear;
· Select the first option, to run Windows in Safe Mode, then press Enter.
· Choose your usual account.
· Open the extracted SDFix folder and double click RunThis.bat to start the script.
· Type Y to begin the cleanup process.
· It will remove any Trojan Services and Registry Entries that it finds then prompt you to press any key to Reboot.
· Press any Key and it will restart the PC.
· When the PC restarts the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
· Once the desktop icons load the SDFix report will open on screen and also save into the SDFix folder as Report.txt
(Report.txt will also be copied to Clipboard ready for posting back on the forum).
· Finally paste the contents of the Report.txt back on the forum with a new HijackThis log


=================
Download Superantispyware

http://www.superantispyware.com/superantis...efreevspro.html

Install it and double-click the icon on your desktop to run it.
· It will ask if you want to update the program definitions, click Yes.
· Under Configuration and Preferences, click the Preferences button.
· Click the Scanning Control tab.
· Under Scanner Options make sure the following are checked:
o Close browsers before scanning
o Scan for tracking cookies
o Terminate memory threats before quarantining.
o Please leave the others unchecked.
o Click the Close button to leave the control center screen.
· On the main screen, under Scan for Harmful Software click Scan your computer.
· On the left check C:\Fixed Drive.
· On the right, under Complete Scan, choose Perform Complete Scan.
· Click Next to start the scan. Please be patient while it scans your computer.
· After the scan is complete a summary box will appear. Click OK.
· Make sure everything in the white box has a check next to it, then click Next.
· It will quarantine what it found and if it asks if you want to reboot, click Yes.
· To retrieve the removal information for me please do the following:
o After reboot, double-click the SUPERAntispyware icon on your desktop.
o Click Preferences. Click the Statistics/Logs tab.
o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
o It will open in your default text editor (such as Notepad/Wordpad).
o Please highlight everything in the notepad, then right-click and choose copy.
· Click close and close again to exit the program.
· Please paste that information here for me with a new HijackThis log.
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#3 sp00nk

sp00nk
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:12:35 AM

Posted 21 January 2007 - 12:01 AM

This sure was a long night for me.

I would like to thank you very much, :thumbsup: - as the "Administrator" user is gone.

the second spyware/adware program has found a LOT of crap too.

so, here's the HJT log after the run of first proggie, and right before running the second:

-------
HJT LOG
-----

Logfile of HijackThis v1.99.1
Scan saved at 5:44:04 AM, on 1/21/2007
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS\System32\msiexec.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
D:\Programs\HijackThis v1.99\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page_bak = http://www.yahoo.com/
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: ICQ Pro - {6224f700-cba3-4071-b251-47cb894244cd} - C:\Program Files\ICQ\ICQ.exe
O9 - Extra 'Tools' menuitem: ICQ - {6224f700-cba3-4071-b251-47cb894244cd} - C:\Program Files\ICQ\ICQ.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O20 - Winlogon Notify: partnershipreg - C:\Documents and Settings\All Users\Documents\Settings\partnership.dll
O20 - Winlogon Notify: rpcc - C:\WINDOWS\System32\rpcc.dll
O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - %ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini (file missing)
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe

========================
Log of SuperAntiSpyware;

SUPERAntiSpyware Scan Log
Generated 01/21/2007 at 06:37 AM

Application Version : 3.5.1016

Core Rules Database Version : 3168
Trace Rules Database Version: 1179

Scan type : Complete Scan
Total Scan Time : 00:52:30

Memory items scanned : 310
Memory threats detected : 0
Registry items scanned : 5323
Registry threats detected : 45
File items scanned : 34638
File threats detected : 115

Trojan.Downloader-Gen/Win
[ttool] C:\WINDOWS\9129837.EXE
C:\WINDOWS\9129837.EXE
[ttool] C:\WINDOWS\9129837.EXE

Trojan.Downloader-RPCC
Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\rpcc
C:\WINDOWS\SYSTEM32\RPCC.DLL
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\rpcc
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\rpcc#DllName
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\rpcc#Asynchronous
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\rpcc#Impersonate
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\rpcc#Startup

Adware.Tracking Cookie
C:\Documents and Settings\Michelle\Cookies\michelle@pro.imedia.co[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@pro-market[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@casalemedia[2].txt
C:\Documents and Settings\Michelle\Cookies\michelle@tribalfusion[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@fastclick[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@cgi-bin[3].txt
C:\Documents and Settings\Michelle\Cookies\michelle@advertising[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@msnisrael.122.2o7[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@partygaming.122.2o7[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@doubleclick[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@counter.credo[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@1072563589[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@adbrite[2].txt
C:\Documents and Settings\Michelle\Cookies\michelle@2o7[2].txt
C:\Documents and Settings\Michelle\Cookies\michelle@www.burstnet[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@list[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@atwola[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@mb[4].txt
C:\Documents and Settings\Michelle\Cookies\michelle@msnportal.112.2o7[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@statcounter[2].txt
C:\Documents and Settings\Michelle\Cookies\michelle@rambler[2].txt
C:\Documents and Settings\Michelle\Cookies\michelle@S154521[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@clicksor[2].txt
C:\Documents and Settings\Michelle\Cookies\michelle@mb[2].txt
C:\Documents and Settings\Michelle\Cookies\michelle@xiti[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@ad.msn.co[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@media.fastclick[2].txt
C:\Documents and Settings\Michelle\Cookies\michelle@ad.yieldmanager[2].txt
C:\Documents and Settings\Michelle\Cookies\michelle@mediaplex[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@stat.onestat[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@ads.addynamix[2].txt
C:\Documents and Settings\Michelle\Cookies\michelle@a.total-media[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@partypoker[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@a[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@ads.keshet-i[2].txt
C:\Documents and Settings\Michelle\Cookies\michelle@cgi-bin[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@S119579[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@amazonbebe.122.2o7[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@ads.cartoonnetwork[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@zedo[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@ads.israel-radio[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@ads.addesktop[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@1070588165[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@mb[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@mb[5].txt
C:\Documents and Settings\Michelle\Cookies\michelle@ads.cartoonnetworkya[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@reduxads.valuead[2].txt
C:\Documents and Settings\Michelle\Cookies\michelle@revsci[2].txt
C:\Documents and Settings\Michelle\Cookies\michelle@1072314339[1].txt
C:\Documents and Settings\Elena\Cookies\elena@100.media.lbn[2].txt
C:\Documents and Settings\Elena\Cookies\elena@120.media.lbn[1].txt
C:\Documents and Settings\Elena\Cookies\elena@150.media.lbn[1].txt
C:\Documents and Settings\Elena\Cookies\elena@150.rbcmedia[1].txt
C:\Documents and Settings\Elena\Cookies\elena@234.media.lbn[2].txt
C:\Documents and Settings\Elena\Cookies\elena@468.media.lbn[1].txt
C:\Documents and Settings\Elena\Cookies\elena@a.total-media[1].txt
C:\Documents and Settings\Elena\Cookies\elena@ad.bannerbank[1].txt
C:\Documents and Settings\Elena\Cookies\elena@ad.bb[2].txt
C:\Documents and Settings\Elena\Cookies\elena@ad.ir[1].txt
C:\Documents and Settings\Elena\Cookies\elena@ad.msn.co[1].txt
C:\Documents and Settings\Elena\Cookies\elena@ad.rmbn.bb[1].txt
C:\Documents and Settings\Elena\Cookies\elena@ad.tbn[2].txt
C:\Documents and Settings\Elena\Cookies\elena@ad.yieldmanager[2].txt
C:\Documents and Settings\Elena\Cookies\elena@ad1.litbn[2].txt
C:\Documents and Settings\Elena\Cookies\elena@ad2.litbn[1].txt
C:\Documents and Settings\Elena\Cookies\elena@adbrite[2].txt
C:\Documents and Settings\Elena\Cookies\elena@ads.adfox[1].txt
C:\Documents and Settings\Elena\Cookies\elena@ads.maxlab[1].txt
C:\Documents and Settings\Elena\Cookies\elena@ads.sharereactor[1].txt
C:\Documents and Settings\Elena\Cookies\elena@ads2.narod.co[2].txt
C:\Documents and Settings\Elena\Cookies\elena@atdmt[1].txt
C:\Documents and Settings\Elena\Cookies\elena@biz.advertarium.com[1].txt
C:\Documents and Settings\Elena\Cookies\elena@bizrate[1].txt
C:\Documents and Settings\Elena\Cookies\elena@casalemedia[2].txt
C:\Documents and Settings\Elena\Cookies\elena@counter.credo[2].txt
C:\Documents and Settings\Elena\Cookies\elena@engine.context.medialand[1].txt
C:\Documents and Settings\Elena\Cookies\elena@half.advertarium.com[1].txt
C:\Documents and Settings\Elena\Cookies\elena@hotlog[2].txt
C:\Documents and Settings\Elena\Cookies\elena@keywordmax[1].txt
C:\Documents and Settings\Elena\Cookies\elena@members.tripod[1].txt
C:\Documents and Settings\Elena\Cookies\elena@pro-market[1].txt
C:\Documents and Settings\Elena\Cookies\elena@rotabanner.izvestia[1].txt
C:\Documents and Settings\Elena\Cookies\elena@rotabanner.rian[1].txt
C:\Documents and Settings\Elena\Cookies\elena@rotabanner.utro[2].txt
C:\Documents and Settings\Elena\Cookies\elena@rotabanner100.utro[2].txt
C:\Documents and Settings\Elena\Cookies\elena@rotabanner234.utro[2].txt
C:\Documents and Settings\Elena\Cookies\elena@rotabanner468.utro[1].txt
C:\Documents and Settings\Elena\Cookies\elena@smileycentral[1].txt
C:\Documents and Settings\Elena\Cookies\elena@spylog[1].txt
C:\Documents and Settings\Elena\Cookies\elena@tns-counter[1].txt
C:\Documents and Settings\Elena\Cookies\elena@tribalfusion[1].txt
C:\Documents and Settings\Elena\Cookies\elena@tripod[1].txt
C:\Documents and Settings\Elena\Cookies\elena@txt.advertarium.com[2].txt
C:\Documents and Settings\Elena\Cookies\elena@txt.media.lbn[1].txt
C:\Documents and Settings\Elena\Cookies\elena@txt.medialand[1].txt
C:\Documents and Settings\Elena\Cookies\elena@upspiral[1].txt
C:\Documents and Settings\Elena\Cookies\elena@warlog[2].txt
C:\Documents and Settings\Elena\Cookies\elena@www.100.media.lbn[2].txt
C:\Documents and Settings\Elena\Cookies\elena@www.120.rbcmedia[1].txt
C:\Documents and Settings\Elena\Cookies\elena@www.234.media.lbn[2].txt
C:\Documents and Settings\Elena\Cookies\elena@www.234.rbcmedia[1].txt
C:\Documents and Settings\Elena\Cookies\elena@www.468.rbcmedia[1].txt
C:\Documents and Settings\Elena\Cookies\elena@www.bannerhouse[1].txt
C:\Documents and Settings\Elena\Cookies\elena@www.tns-counter[1].txt
C:\Documents and Settings\Elena\Cookies\elena@www.upspiral[1].txt
C:\Documents and Settings\Elena\Cookies\elena@www1.468.rbcmedia[1].txt
C:\Documents and Settings\Elena\Cookies\elena@www2.234.rbcmedia[1].txt
C:\Documents and Settings\Elena\Cookies\elena@www5.234.rbcmedia[1].txt
C:\Documents and Settings\Elena\Cookies\elena@yadro[2].txt
C:\Documents and Settings\Michelle\Cookies\michelle@banners[2].txt

Trojan.Downloadsr-NetHood
HKCR\CLSID\{9F143C3A-1457-6CCA-03A7-7AA23B61E40F}
HKCR\CLSID\{9F143C3A-1457-6CCA-03A7-7AA23B61E40F}\InProcServer32
HKCR\CLSID\{9F143C3A-1457-6CCA-03A7-7AA23B61E40F}\InProcServer32#ThreadingModel
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler#{9F143C3A-1457-6CCA-03A7-7AA23B61E40F} [ Network Neighborhood ]

Adware.MyWay
HKLM\Software\MyWay
HKLM\Software\MyWay\myBar
HKLM\Software\MyWay\myBar#Dir
HKLM\Software\MyWay\myBar#pid
HKLM\Software\MyWay\myBar#CurInstall
HKLM\Software\MyWay\myBar#sr
HKLM\Software\MyWay\myBar#pl
HKLM\Software\MyWay\myBar#Id
HKLM\Software\MyWay\myBar#CacheDir
HKLM\Software\MyWay\myBar#HistoryDir
HKLM\Software\MyWay\myBar#Visible
HKLM\Software\MyWay\myBar#Maximized
HKLM\Software\MyWay\myBar#SettingsDir
HKLM\Software\MyWay\myBar#ConfigRevisionURL
HKLM\Software\MyWay\myBar#ConfigDateStamp
HKLM\Software\MyWay\SearchAssistant
HKLM\Software\MyWay\SearchAssistant#Dir
HKLM\Software\MyWay\SearchAssistant#pid
HKLM\Software\MyWay\SearchAssistant#CurInstall
HKLM\Software\MyWay\SearchAssistant#sr
HKLM\Software\MyWay\SearchAssistant#pl
HKLM\Software\MyWay\SearchAssistant#Id
HKLM\Software\MyWay\SearchAssistant#CacheDir
HKLM\Software\MyWay\SearchAssistant#ConfigDateStamp

Trojan.Downloader-MS IE Updater
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000#DeviceDesc

Adware.Lop
C:\DOCUMENTS AND SETTINGS\MICHELLE\APPLICATION DATA\CASHAXIS\START META.EXE

Trojan.TaskDir
C:\RECYCLER\S-1-5-21-1390067357-152049171-839522115-1003\DC6.DLL

Trojan.Unknown Origin
C:\RECYCLER\S-1-5-21-1390067357-152049171-839522115-1006\DC21.EXE

-------------------


LOG of HJT after running the second program;

---------

Logfile of HijackThis v1.99.1
Scan saved at 7:51:56 AM, on 1/21/2007
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE
D:\Programs\HijackThis v1.99\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page_bak = http://www.yahoo.com/
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: ICQ Pro - {6224f700-cba3-4071-b251-47cb894244cd} - C:\Program Files\ICQ\ICQ.exe
O9 - Extra 'Tools' menuitem: ICQ - {6224f700-cba3-4071-b251-47cb894244cd} - C:\Program Files\ICQ\ICQ.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O20 - Winlogon Notify: partnershipreg - C:\Documents and Settings\All Users\Documents\Settings\partnership.dll
O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - %ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini (file missing)
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe


===================================

Finally, there is just one last issue I wanted to ask about, and I'm not sure it's inter-related to the former, but I've noticed this problem as I was working on the computer this night;
When the computer starts up, whenever it reaches the point where the log-on screen should appear, it hangs with a black screen for about an entire minute, and only then it goes "click" and turns on the log-on screen, loads, and allows for logon selection.

I am wondering if it's some sort of spyware/adware, or maybe something to do with my graphic driver (?) - I just believe that I've removed, according to your instructions, every last bit of spyware anywhere on this computer.

Please advise, and also tell me if I'm clean.

Thanks kindly,
(I truly appriciate your wonderful work, and your investment of your time)

-Dan

#4 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:05:35 PM

Posted 21 January 2007 - 10:20 AM

IE - Block Third party cookies
1. Click on the Tools button on the Internet Explorer tool bar.
2. Highlight and click on Internet options at the bottom of the Tools menu.
3. Select the Privacy Tab of the Internet Options menu.
4. Select the Advanced... button at the bottom of the screen.
5. Select override automatic cookie handling button.
6. To block third party cookies select block under "Third-party cookies".
7. Select "always allow session cookies".
8. Click on the OK button at the bottom of the screen
====================

DownLoad EasyCleaner http://www.majorgeeks.com/download414.html

Use the clear files and Unnecessary files buttons – I do not recommend
using the Duplicates files button
as many dupes are there on purpose.

Not all files will delete – that is normal.

In the unnecessary button I check the top 4 entries

=======================
You may want to print this or save it to notepad as we will go to safe mode.

Fix these with HiJackThis – mark them, close IE, click fix checked

O20 - Winlogon Notify: partnershipreg - C:\Documents and Settings\All Users\Documents\Settings\partnership.dll
====================
Click Start > Run > and type in:

services.msc

Click OK.

In the services window find this exact name

partnershipreg

Rightclick and choose "Properties". Beside "Startup Type" in the dropdown menu select "Disabled". On the "General" tab under "Service Status" click the "Stop" button to stop the service. Click Apply then OK. File-Exit the Services utility.

=====================
DownLoad http://www.downloads.subratam.org/KillBox.zip or
http://www.thespykiller.co.uk/files/killbox.exe

Restart your computer into safe mode now. (Tapping F8 at the first black screen) Perform the following steps in safe mode:

Double-click on Killbox.exe to run it. Now put a tick by Standard File Kill. In the "Full Path of File to Delete" box, copy and paste each of the following lines one at a time then click on the button that has the red circle with the X in the middle after you enter each file. It will ask for confimation to delete the file. Click Yes. Continue with that same procedure until you have copied and pasted all of these in the "Paste Full Path of File to Delete" box.

C:\Documents and Settings\All Users\Documents\Settings\partnership.dll


Note: It is possible that Killbox will tell you that one or more files do not exist. If that happens, just continue on with all the files. Be sure you don't miss any.

START – RUN – type in %temp% - OK - Edit – Select all – File – Delete

Delete everything in the C:\Windows\Temp folder or C:\WINNT\temp

Not all temp files will delete and that is normal
Empty the recycle bin
Boot and post a new hijack log from normal NOT safe mode

Please give feedback on what worked/didn’t work and the current status of your system
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#5 sp00nk

sp00nk
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:12:35 AM

Posted 21 January 2007 - 06:20 PM

Alright.

I did the cleaning files thing.

Then, downloaded killbox, and put the rest of your reply in fix.txt on desktop.

When in safe mode, I couldn't get the darn thing to delete the file, until I did the replace-with-dummy-delete-on-restart option selection.

Then restarted into normal XP. tried to delete temp files. Didn't work: denied. Tried to delete the DLL: but that one was already gone. Then ran HJT to see the dll has the file missing. Yeah!

Then went back into safe mode and cleared the temp folder, and emptied recycle bin.

Now all seems clean. Order is restored in the house, it would seem.

attached HJT to confirm the previously mentioned peace and order:

- ----------------------

Logfile of HijackThis v1.99.1
Scan saved at 2:18:32, on 22.01.2007
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program Files\Mozilla Firefox\firefox.exe
D:\Programs\HijackThis v1.99\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [AIM] D:\Program Files\AIM95\aim.exe -cnetwait.odl
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: ICQ Pro - {6224f700-cba3-4071-b251-47cb894244cd} - C:\Program Files\ICQ\ICQ.exe
O9 - Extra 'Tools' menuitem: ICQ - {6224f700-cba3-4071-b251-47cb894244cd} - C:\Program Files\ICQ\ICQ.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - %ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini (file missing)
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe

------------

Thank you kindly, again, for your time and efforts.

Greatly appriciated.

-Dan.

#6 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:05:35 PM

Posted 21 January 2007 - 06:29 PM

Clean Posted Image

Turn off restore points, boot, turn them back on – here’s how

http://service1.symantec.com/SUPPORT/tsgen...src=sec_doc_nam
"Nothing could be finer than to be in South Carolina ............"

Member ASAP




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users