Tech Support Guy banner
  • IMPORTANT: Only authorized members may reply to threads in this forum due to the complexity of the malware removal process. Authorized members include Malware Specialists and Trainees, Administrators, Moderators, and Trusted Advisors. Regular members are not permitted to reply, and any such posts will be deleted without notice or further explanation. Notice
Status
Not open for further replies.

another browser hijacked to topiesecurity.com

778 views 5 replies 2 participants last post by  MFDnNC 
#1 ·
Hello TechGuy,

I'm helping a friend with a PC that's also been hijacked. I've got the log file pasted below. I promise this one won't be a waste of your time--I really don't want to reinstall from a disc image or anything like that.

Thanks very much for your help.

Regards,
Mike

Logfile of HijackThis v1.99.1
Scan saved at 3:34:49 PM, on 7/5/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\Program Files\Common Files\Symantec Shared\AppCore\AppSvc32.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Video ActiveX Access\imsmain.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\BroadJump\Client Foundation\CFD.exe
C:\PROGRA~1\Yahoo!\browser\ybrwicon.exe
C:\PROGRA~1\SBCSEL~1\SMARTB~1\MotiveSB.exe
C:\Program Files\Video ActiveX Access\imsmn.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\PROGRA~1\Yahoo!\browser\ycommon.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Common Files\WinAntiSpyware 2007\WAS7Mon.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\PROGRA~1\Yahoo!\browser\YBrowser.exe
C:\Program Files\Hijackthis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/cus.../sbcydsl/*http://www.yahoo.com/search/ie.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://red.clientapps.yahoo.com/customize/ie/defaults/sp/sbcydsl/*http://www.yahoo.com
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {184746EC-9E9D-4C7D-B9E7-9039EBD801A9} - C:\Program Files\Video ActiveX Access\iesplg.dll
O2 - BHO: (no name) - {1E8A6170-7264-4D0F-BEAE-D42A53123C75} - C:\Program Files\Common Files\Symantec Shared\coShared\Browser\1.5\NppBho.dll
O2 - BHO: UberButton Class - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\common\yiesrvc.dll
O2 - BHO: YahooTaggedBM Class - {65D886A2-7CA7-479B-BB95-14D1EFB7946A} - C:\Program Files\Yahoo!\common\YIeTagBm.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: SidebarAutoLaunch Class - {F2AA9440-6328-4933-B7C9-A6CCDF9CBF6D} - C:\Program Files\Yahoo!\browser\YSidebarIEBHO.dll
O3 - Toolbar: Easy-WebPrint - {327C2873-E90D-4c37-AA9D-10AC9BABA46C} - C:\Program Files\Canon\Easy-WebPrint\Toolband.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: Protection Bar - {29C5A3B6-9A8D-4FA0-B5AD-3E20F4AA5C00} - C:\Program Files\Video ActiveX Access\iesbpl.dll
O3 - Toolbar: Show Norton Toolbar - {90222687-F593-4738-B738-FBEE9C7B26DF} - C:\Program Files\Common Files\Symantec Shared\coShared\Browser\1.5\UIBHO.dll
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
O4 - HKLM\..\Run: [YBrowser] C:\PROGRA~1\Yahoo!\browser\ybrwicon.exe
O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\SBCSEL~1\SMARTB~1\MotiveSB.exe
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [Salestart] "C:\Program Files\Common Files\WinAntiSpyware 2007\WAS7Mon.exe"
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [osCheck] "C:\Program Files\Norton Internet Security\osCheck.exe"
O4 - HKCU\..\Run: [Yahoo! Pager] 1
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe
O4 - Global Startup: Cisco Systems VPN Client.lnk = C:\Program Files\Cisco Systems\VPN Client\vpngui.exe
O4 - Global Startup: SBC Self Support Tool.lnk = C:\Program Files\SBC Self Support Tool\bin\matcli.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O8 - Extra context menu item: Easy-WebPrint Add To Print List - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_AddToList.html
O8 - Extra context menu item: Easy-WebPrint High Speed Print - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_HSPrint.html
O8 - Extra context menu item: Easy-WebPrint Preview - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_Preview.html
O8 - Extra context menu item: Easy-WebPrint Print - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_Print.html
O9 - Extra button: SBC Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\common\yiesrvc.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\common\yinsthelper.dll
O16 - DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} (Symantec Download Manager) - https://webdl.symantec.com/activex/symdlmgr.cab
O16 - DPF: {7584C670-2274-4EFB-B00B-D6AABA6D3850} (Microsoft RDP Client Control (redist)) - https://owa.sellerscapital.com/Remote/msrdp.cab
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Unknown owner - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe" /h ccCommon (file missing)
O23 - Service: Symantec Settings Manager (ccSetMgr) - Unknown owner - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe" /h ccCommon (file missing)
O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Unknown owner - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe" /h ccCommon (file missing)
O23 - Service: COM Host (comHost) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\VAScanner\comHost.exe
O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Symantec IS Password Validation (ISPwdSvc) - Symantec Corporation - C:\Program Files\Norton Internet Security\isPwdSvc.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
O23 - Service: Symantec AppCore Service (SymAppCore) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\AppCore\AppSvc32.exe
 
See less See more
#2 ·
You should print out these instructions, or copy them to a NotePad file for reading while in Safe Mode, because you will not be able to connect to the Internet to read from this site.

Please download SmitfraudFix (by S!Ri)
Extract the content (a folder named SmitfraudFix) to your Desktop.

Next, please reboot your computer in Safe Mode by doing the following :
  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
  • Instead of Windows loading as normal, a menu with options should appear;
  • Select the first option, to run Windows in Safe Mode, then press "Enter".
  • Choose your usual account.
Once in Safe Mode, open the SmitfraudFix folder again and double-click smitfraudfix.cmd
Select option #2 - Clean by typing 2 and press "Enter" to delete infected files.

You will be prompted: "Registry cleaning - Do you want to clean the registry?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.

The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".

The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart it into Normal Windows.

A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply along with a new hijack log.

The report can also be found at the root of the system drive, usually at C:\rapport.txt

Warning: running option #2 on a non infected computer will remove your Desktop background.
==============

Download Superantispyware (SAS) free home version

http://www.superantispyware.com/superantispywarefreevspro.html

Install it and double-click the icon on your desktop to run it.
· It will ask if you want to update the program definitions, click Yes.
· Under Configuration and Preferences, click the Preferences button.
· Click the Scanning Control tab.
· Under Scanner Options make sure the following are checked:
o Close browsers before scanning
o Scan for tracking cookies
o Terminate memory threats before quarantining.
o Please leave the others unchecked.
o Click the Close button to leave the control center screen.
· On the main screen, under Scan for Harmful Software click Scan your computer.
· On the left check C:\Fixed Drive.
· On the right, under Complete Scan, choose Perform Complete Scan.
· Click Next to start the scan. Please be patient while it scans your computer.
· After the scan is complete a summary box will appear. Click OK.
· Make sure everything in the white box has a check next to it, then click Next.
· It will quarantine what it found and if it asks if you want to reboot, click Yes.
· To retrieve the removal information for me please do the following:
o After reboot, double-click the SUPERAntispyware icon on your desktop.
o Click Preferences. Click the Statistics/Logs tab.
o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
o It will open in your default text editor (such as Notepad/Wordpad).
o Please highlight everything in the notepad, then right-click and choose copy.
· Click close and close again to exit the program.
· Please paste that information here for me with a new HijackThis log.

This will take some time!!!!!!!!
 
#3 ·
Thanks very much, MFDnNC. Below are the requested log files after running HijackThis and SuperAnti.

Hijack This:
SmitFraudFix v2.200

Scan done at 9:34:57.03, Fri 07/06/2007
Run from C:\Documents and Settings\Melanie Dart\Desktop\SmitfraudFix\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in safe mode

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» Killing process

»»»»»»»»»»»»»»»»»»»»»»»» hosts

127.0.0.1 localhost

»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

GenericRenosFix by S!Ri

»»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files

C:\Program Files\Video ActiveX Access\ Deleted

»»»»»»»»»»»»»»»»»»»»»»»» DNS

HKLM\SYSTEM\CCS\Services\Tcpip\..\{4411CF61-79EF-4051-AFEB-BA02D0F0CBE2}: DhcpNameServer=64.80.249.66 64.80.255.252 64.80.125.114
HKLM\SYSTEM\CS1\Services\Tcpip\..\{4411CF61-79EF-4051-AFEB-BA02D0F0CBE2}: DhcpNameServer=64.80.249.66 64.80.255.252 64.80.125.114
HKLM\SYSTEM\CS3\Services\Tcpip\..\{4411CF61-79EF-4051-AFEB-BA02D0F0CBE2}: DhcpNameServer=64.80.249.66 64.80.255.252 64.80.125.114
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=64.80.249.66 64.80.255.252 64.80.125.114
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=64.80.249.66 64.80.255.252 64.80.125.114
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=64.80.249.66 64.80.255.252 64.80.125.114

»»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files

»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""

»»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

Registry Cleaning done.

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» End

SuperAnti:
SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/06/2007 at 11:50 AM

Application Version : 3.9.1008

Core Rules Database Version : 3265
Trace Rules Database Version: 1276

Scan type : Complete Scan
Total Scan Time : 01:02:59

Memory items scanned : 447
Memory threats detected : 0
Registry items scanned : 5467
Registry threats detected : 12
File items scanned : 73450
File threats detected : 141

Trojan.Media-Codec/V3
HKLM\Software\Classes\CLSID\{184746EC-9E9D-4C7D-B9E7-9039EBD801A9}
HKCR\CLSID\{184746EC-9E9D-4C7D-B9E7-9039EBD801A9}
HKCR\CLSID\{184746EC-9E9D-4C7D-B9E7-9039EBD801A9}#xxx
HKCR\CLSID\{184746EC-9E9D-4C7D-B9E7-9039EBD801A9}\InprocServer32
HKCR\CLSID\{184746EC-9E9D-4C7D-B9E7-9039EBD801A9}\InprocServer32#ThreadingModel
C:\PROGRAM FILES\VIDEO ACTIVEX ACCESS\IESPLG.DLL
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{184746EC-9E9D-4C7D-B9E7-9039EBD801A9}
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IExplorer Security Plug-in
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IExplorer Security Plug-in#DisplayName
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IExplorer Security Plug-in#UninstallString
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Internet Explorer Secure Bar
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Internet Explorer Secure Bar#DisplayName
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Internet Explorer Secure Bar#UninstallString

Adware.Tracking Cookie
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@atdmt[2].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@stats.privacyprotector[2].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@stats1.reliablestats[1].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@adinterax[1].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@advertising[1].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@lynxtrack[1].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@stats.drivecleaner[2].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@winantivirus[1].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@msnportal.112.2o7[1].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@burstnet[1].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@topiesecurity[1].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@ad[2].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@dr1[8].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@www.drantispy[1].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@winantispyware[2].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@2o7[1].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@ad.yieldmanager[2].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@ads.us.e-planning[1].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@ads.us.e-planning[2].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@adserver[1].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@advertising[1].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@advertising[3].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@as-eu.falkag[1].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@as-eu.falkag[3].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@atdmt[1].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@atdmt[2].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@doubleclick[1].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@doubleclick[3].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@drivecleaner[1].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@ehg-traderelectronicmedia.hitbox[2].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@fastclick[2].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@go.drivecleaner[1].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@go.winantivirus[1].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@go.winantivirus[2].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@hitbox[2].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@m1.webstats.motigo[2].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@m1.webstats.motigo[3].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@overture[1].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@partner2profit[1].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@stats.drivecleaner[2].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@stats.privacyprotector[1].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@stats1.reliablestats[1].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@tacoda[1].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@tremor.adbureau[1].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@tribalfusion[2].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@winantivirus[2].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@winantivirus[3].txt
C:\Documents and Settings\Marcelo Armijos\Cookies\marcelo armijos@zedo[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@2o7[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@ad.abum[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@ad.yieldmanager[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@ad1.clickhype[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@adbrite[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@adopt.specificclick[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@adrevolver[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@adrevolver[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@ads.addynamix[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@ads.as4x.tmcs[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@ads.e-planning[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@ads.miarroba[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@ads.revsci[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@ads.us.e-planning[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@adserver[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@advertising[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@alladultchannel[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@apmebf[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@as-eu.falkag[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@atdmt[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@atwola[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@belnk[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@bs.serving-sys[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@c.alladultchannel[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@counter11.sextracker[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@counter4.sextracker[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@cpvfeed[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@cs.sexcounter[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@dist.belnk[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@doubleclick[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@ds.clickexperts[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@ecnext.advertserve[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@fastclick[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@freepornlessons[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@homestore.122.2o7[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@i.screensavers[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@image.masterstats[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@kanoodle[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@lan.advertserve[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@m1.webstats4u[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@media.fastclick[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@mediaplex[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@msnportal.112.2o7[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@nextag[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@overture[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@partner2profit[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@perf.overture[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@petiteteenager[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@questionmarket[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@realhonestporn[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@revenue[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@revsci[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@server.iad.liveperson[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@serving-sys[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@sexlist[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@sextracker[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@statcounter[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@stats.awms-network[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@superstats[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@tacoda[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@teencoreclub[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@teensnaturalway[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@thebestporn[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@trafficmp[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@tribalfusion[2].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@tryteens[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@www.alladultchannel[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@www.burstnet[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@www.realhonestporn[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@xiti[1].txt
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Cookies\marcelo armijos@zedo[2].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@drivecleaner[2].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@drivecleaner[3].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@go.drivecleaner[1].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@go.winantivirus[1].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@stats.privacyprotector[1].txt
C:\Documents and Settings\Melanie Dart\Cookies\melanie dart@winantivirus[2].txt

Trojan.Unknown Origin
C:\DOCUMENTS AND SETTINGS\MARCELO ARMIJOS\LOCAL SETTINGS\TEMP\LAF40F.TMP

Adware.ClickSpring/Yazzle
C:\PROGRAM FILES\COMMON FILES\YAZZLE1552OINUNINSTALLER.EXE

Trace.Known Threat Sources
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Temporary Internet Files\Content.IE5\G1IZ4TM7\CInfo[1].class
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temp\Temporary Internet Files\Content.IE5\KL2J0PEB\index[4].htm
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temporary Internet Files\Content.IE5\OPMFOLE7\small-part-b[1].jpg
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temporary Internet Files\Content.IE5\TSZMNZLV\small-part-c[1].jpg
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temporary Internet Files\Content.IE5\OPMFOLE7\10-30935822[1].htm
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temporary Internet Files\Content.IE5\01QBWLM3\table-2[1].gif
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temporary Internet Files\Content.IE5\R54C4NVJ\shield[2].gif
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temporary Internet Files\Content.IE5\6WPLRFB3\side-left[1].jpg
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temporary Internet Files\Content.IE5\TSZMNZLV\corner-left[1].gif
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temporary Internet Files\Content.IE5\W9YF0PY3\download[1].gif
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temporary Internet Files\Content.IE5\TSZMNZLV\2007[1].htm
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temporary Internet Files\Content.IE5\8PUNW12R\table-4[1].gif
C:\Documents and Settings\Marcelo Armijos\Local Settings\Temporary Internet Files\Content.IE5\G12FW1I7\table-3[1].gif

Thanks very much,
Mike
 
#5 ·
Right, sorry. Here you go.

Logfile of HijackThis v1.99.1
Scan saved at 4:44:20 PM, on 7/6/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\Program Files\Common Files\Symantec Shared\AppCore\AppSvc32.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\BroadJump\Client Foundation\CFD.exe
C:\PROGRA~1\Yahoo!\browser\ybrwicon.exe
C:\PROGRA~1\SBCSEL~1\SMARTB~1\MotiveSB.exe
C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe
C:\Program Files\QuickTime\qttask.exe
C:\PROGRA~1\Yahoo!\browser\ycommon.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Common Files\WinAntiSpyware 2007\WAS7Mon.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe
C:\Program Files\SBC Self Support Tool\bin\mpbtn.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\Program Files\Hijackthis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {1E8A6170-7264-4D0F-BEAE-D42A53123C75} - C:\Program Files\Common Files\Symantec Shared\coShared\Browser\1.5\NppBho.dll
O2 - BHO: UberButton Class - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\common\yiesrvc.dll
O2 - BHO: YahooTaggedBM Class - {65D886A2-7CA7-479B-BB95-14D1EFB7946A} - C:\Program Files\Yahoo!\common\YIeTagBm.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: SidebarAutoLaunch Class - {F2AA9440-6328-4933-B7C9-A6CCDF9CBF6D} - C:\Program Files\Yahoo!\browser\YSidebarIEBHO.dll
O3 - Toolbar: Easy-WebPrint - {327C2873-E90D-4c37-AA9D-10AC9BABA46C} - C:\Program Files\Canon\Easy-WebPrint\Toolband.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: Show Norton Toolbar - {90222687-F593-4738-B738-FBEE9C7B26DF} - C:\Program Files\Common Files\Symantec Shared\coShared\Browser\1.5\UIBHO.dll
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
O4 - HKLM\..\Run: [YBrowser] C:\PROGRA~1\Yahoo!\browser\ybrwicon.exe
O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\SBCSEL~1\SMARTB~1\MotiveSB.exe
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [Salestart] "C:\Program Files\Common Files\WinAntiSpyware 2007\WAS7Mon.exe"
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [osCheck] "C:\Program Files\Norton Internet Security\osCheck.exe"
O4 - HKCU\..\Run: [Yahoo! Pager] 1
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - Global Startup: Cisco Systems VPN Client.lnk = C:\Program Files\Cisco Systems\VPN Client\vpngui.exe
O4 - Global Startup: SBC Self Support Tool.lnk = C:\Program Files\SBC Self Support Tool\bin\matcli.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O8 - Extra context menu item: Easy-WebPrint Add To Print List - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_AddToList.html
O8 - Extra context menu item: Easy-WebPrint High Speed Print - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_HSPrint.html
O8 - Extra context menu item: Easy-WebPrint Preview - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_Preview.html
O8 - Extra context menu item: Easy-WebPrint Print - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_Print.html
O9 - Extra button: SBC Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\common\yiesrvc.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\common\yinsthelper.dll
O16 - DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} (Symantec Download Manager) - https://webdl.symantec.com/activex/symdlmgr.cab
O16 - DPF: {7584C670-2274-4EFB-B00B-D6AABA6D3850} (Microsoft RDP Client Control (redist)) - https://owa.sellerscapital.com/Remote/msrdp.cab
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Unknown owner - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe" /h ccCommon (file missing)
O23 - Service: Symantec Settings Manager (ccSetMgr) - Unknown owner - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe" /h ccCommon (file missing)
O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Unknown owner - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe" /h ccCommon (file missing)
O23 - Service: COM Host (comHost) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\VAScanner\comHost.exe
O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Symantec IS Password Validation (ISPwdSvc) - Symantec Corporation - C:\Program Files\Norton Internet Security\isPwdSvc.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
O23 - Service: Symantec AppCore Service (SymAppCore) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\AppCore\AppSvc32.exe
 
#6 ·
Status
Not open for further replies.
You have insufficient privileges to reply here.
Top