1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Can you check my HijackThis log?

Discussion in 'Virus & Other Malware Removal' started by MattS86, Apr 7, 2004.

Thread Status:
Not open for further replies.
  1. MattS86

    MattS86 Thread Starter

    Joined:
    Apr 6, 2004
    Messages:
    2
    Logfile of HijackThis v1.97.7
    Scan saved at 19:59:24, on 06/04/04
    Platform: Windows 98 SE (Win9x 4.10.2222A)
    MSIE: Internet Explorer v5.50 (5.50.4134.0600)

    Running processes:
    C:\WINDOWS\SYSTEM\KERNEL32.DLL
    C:\WINDOWS\SYSTEM\MSGSRV32.EXE
    C:\WINDOWS\SYSTEM\MPREXE.EXE
    C:\WINDOWS\SYSTEM\mmtask.tsk
    C:\WINDOWS\SYSTEM\MSTASK.EXE
    C:\PROGRAM FILES\COMMON FILES\SYMANTEC SHARED\CCEVTMGR.EXE
    C:\PROGRAM FILES\COMMON FILES\SYMANTEC SHARED\CCSETMGR.EXE
    C:\WINDOWS\TASKMON.EXE
    C:\WINDOWS\SYSTEM\SYSTRAY.EXE
    C:\WINDOWS\STARTER.EXE
    C:\PROGRAM FILES\MICROSOFT HARDWARE\MOUSE\POINT32.EXE
    C:\PROGRAM FILES\REAL\REALPLAYER\REALPLAY.EXE
    C:\PROGRAM FILES\COMMON FILES\SYMANTEC SHARED\CCPD-LC\SYMLCSVC.EXE
    C:\PROGRAM FILES\COMMON FILES\SYMANTEC SHARED\CCAPP.EXE
    C:\WINDOWS\SYSTEM\WMIEXE.EXE
    C:\WINDOWS\SYSTEM\ERSIONV.EXE
    C:\PROGRAM FILES\AOL 7.0\WAOL.EXE
    C:\WINDOWS\SYSTEM\SPOOL32.EXE
    C:\WINDOWS\SYSTEM\RNAAPP.EXE
    C:\WINDOWS\SYSTEM\TAPISRV.EXE
    C:\PROGRAM FILES\MSN MESSENGER\MSNMSGR.EXE
    C:\WINDOWS\SYSTEM\DDHELP.EXE
    C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
    C:\WINDOWS\EXPLORER.EXE
    C:\WINDOWS\TEMPORARY INTERNET FILES\CONTENT.IE5\SDGNY7EJ\HIJACKTHIS[1].EXE
    C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
    C:\WINDOWS\SYSTEM\MDM.EXE

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://server224.smartbotpro.net/7search/?hkcu
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://server224.smartbotpro.net/7search/?hklm
    O2 - BHO: (no name) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\PROGRAM FILES\ADOBE\ACROBAT 5.0\READER\ACTIVEX\ACROIEHELPER.OCX
    O2 - BHO: (no name) - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
    O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O2 - BHO: (no name) - {B549456D-F5D0-4641-BCED-8648A0C13D83} - C:\WINDOWS\BrowserHelper.dll
    O3 - Toolbar: @msdxmLC.dll,[email protected],&Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O4 - HKLM\..\Run: [ScanRegistry] C:\WINDOWS\scanregw.exe /autorun
    O4 - HKLM\..\Run: [TaskMonitor] C:\WINDOWS\taskmon.exe
    O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
    O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
    O4 - HKLM\..\Run: [SourcePath] c:\cabs\gwreg.exe
    O4 - HKLM\..\Run: [EnsoniqMixer] starter.exe
    O4 - HKLM\..\Run: [POINTER] point32.exe
    O4 - HKLM\..\Run: [LoadQM] loadqm.exe
    O4 - HKLM\..\Run: [RealTray] C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER
    O4 - HKLM\..\Run: [Symantec Core LC] C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe start
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
    O4 - HKLM\..\Run: [NAV CfgWiz] C:\Program Files\Common Files\Symantec Shared\CfgWiz.exe /GUID NAV /CMDLINE "REBOOT"
    O4 - HKLM\..\Run: [VSN] C:\PROGRAM FILES\VSN\VSN.EXE
    O4 - HKLM\..\Run: [ERSIONV] C:\WINDOWS\SYSTEM\ERSIONV.exe
    O4 - HKLM\..\Run: [PQV804G7.EXE] C:\WINDOWS\PQV804G7.EXE /dk
    O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
    O4 - HKLM\..\RunServices: [Machine Debug Manager] C:\WINDOWS\SYSTEM\MDM.EXE
    O4 - HKLM\..\RunServices: [SchedulingAgent] mstask.exe
    O4 - HKLM\..\RunServices: [ScriptBlocking] "C:\Program Files\Common Files\Symantec Shared\Script Blocking\SBServ.exe" -reg
    O4 - HKLM\..\RunServices: [ccEvtMgr] "C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe"
    O4 - HKLM\..\RunServices: [ccSetMgr] "C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe"
    O4 - HKCU\..\Run: [SpySweeper] C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe /0
    O4 - HKCU\..\Run: [PQV804G7.EXE] C:\WINDOWS\PQV804G7.EXE /dk
    O4 - Startup: EPSON Status Monitor 3 Environment Check.lnk = C:\WINDOWS\SYSTEM\E_SRCV03.EXE
    O4 - Startup: Microsoft Works Calendar Reminders.lnk = C:\Program Files\Common Files\Microsoft Shared\Works Shared\wkcalrem.exe
    O4 - Startup: MORZE5.lnk = C:\WINDOWS\morze5.exe
    O4 - Startup: O37UTC76.lnk = C:\WINDOWS\o37utc76.exe
    O4 - Startup: JHXQICOW.lnk = C:\WINDOWS\jhxqicow.exe
    O4 - Startup: 15X0HY73.lnk = C:\WINDOWS\15x0hy73.exe
    O4 - Startup: MORZE1.lnk = C:\WINDOWS\morze1.exe
    O4 - Startup: HYGGIF0W.lnk = C:\WINDOWS\hyggif0w.exe
    O4 - Startup: OFU6CJUZ.lnk = C:\WINDOWS\ofu6cjuz.exe
    O4 - Startup: Q6A5GB7D.lnk = C:\WINDOWS\q6a5gb7d.exe
    O4 - Startup: OGA2OBVL.lnk = C:\WINDOWS\oga2obvl.exe
    O4 - Startup: UZBJ2Y0Q.lnk = C:\WINDOWS\uzbj2y0q.exe
    O4 - Startup: Y21NUTC0.lnk = C:\WINDOWS\y21nutc0.exe
    O4 - Startup: WPKVIQ4N.lnk = C:\WINDOWS\wpkviq4n.exe
    O4 - Startup: 96A4G2IF.lnk = C:\WINDOWS\96a4g2if.exe
    O4 - Startup: HF5QPFKW.lnk = C:\WINDOWS\hf5qpfkw.exe
    O4 - Startup: WEWTL0ZA.lnk = C:\WINDOWS\wewtl0za.exe
    O4 - Startup: 560RUN1P.lnk = C:\WINDOWS\560run1p.exe
    O4 - Startup: GT08VNTY.lnk = C:\WINDOWS\gt08vnty.exe
    O4 - Startup: 0O7378YO.lnk = C:\WINDOWS\0o7378yo.exe
    O4 - Startup: FCRGI7X1.lnk = C:\WINDOWS\fcrgi7x1.exe
    O4 - Startup: 8ZQ6079T.lnk = C:\WINDOWS\8zq6079t.exe
    O4 - Startup: 7F8YRYKE.lnk = C:\WINDOWS\7f8yryke.exe
    O4 - Startup: DTDR44IQ.lnk = C:\WINDOWS\dtdr44iq.exe
    O4 - Startup: 0GLYZL6B.lnk = C:\WINDOWS\0glyzl6b.exe
    O4 - Startup: FI446JNK.lnk = C:\WINDOWS\fi446jnk.exe
    O4 - Startup: TI357HT0.lnk = C:\WINDOWS\ti357ht0.exe
    O4 - Startup: CIFHRN0V.lnk = C:\WINDOWS\cifhrn0v.exe
    O4 - Startup: C6RUUXY3.lnk = C:\WINDOWS\c6ruuxy3.exe
    O4 - Startup: DFKR1OQU.lnk = C:\WINDOWS\dfkr1oqu.exe
    O4 - Startup: 6PJKQPDO.lnk = C:\WINDOWS\6pjkqpdo.exe
    O4 - Startup: 3NJ0U2EQ.lnk = C:\WINDOWS\3nj0u2eq.exe
    O4 - Startup: 411L9QPV.lnk = C:\WINDOWS\411l9qpv.exe
    O4 - Startup: 5RX6R04N.lnk = C:\WINDOWS\5rx6r04n.exe
    O4 - Startup: PAZ5WPRT.lnk = C:\WINDOWS\paz5wprt.exe
    O4 - Startup: DPM82TTR.lnk = C:\WINDOWS\dpm82ttr.exe
    O4 - Startup: 9LRBCD0M.lnk = C:\WINDOWS\9lrbcd0m.exe
    O4 - Startup: 7LMCCNW3.lnk = C:\WINDOWS\7lmccnw3.exe
    O4 - Startup: XGN1004E.lnk = C:\WINDOWS\xgn1004e.exe
    O4 - Startup: 928EE3BP.lnk = C:\WINDOWS\928ee3bp.exe
    O4 - Startup: AK83W250.lnk = C:\WINDOWS\ak83w250.exe
    O4 - Startup: F5O60279.lnk = C:\WINDOWS\f5o60279.exe
    O4 - Startup: EBOJZONY.lnk = C:\WINDOWS\ebojzony.exe
    O4 - Startup: AWJ5V2YR.lnk = C:\WINDOWS\awj5v2yr.exe
    O4 - Startup: XW6Y7K60.lnk = C:\WINDOWS\xw6y7k60.exe
    O4 - Startup: KD5K0L55.lnk = C:\WINDOWS\kd5k0l55.exe
    O4 - Startup: V0YMQXP0.lnk = C:\WINDOWS\v0ymqxp0.exe
    O4 - Startup: ZGL4LI77.lnk = C:\WINDOWS\zgl4li77.exe
    O4 - Startup: 0OE1CT5T.lnk = C:\WINDOWS\0oe1ct5t.exe
    O4 - Startup: PQV804G7.lnk = C:\WINDOWS\pqv804g7.exe
    O4 - Global Startup: MORZE5.lnk = C:\WINDOWS\15x0hy73.exe
    O4 - Global Startup: O37UTC76.lnk = C:\WINDOWS\15x0hy73.exe
    O4 - Global Startup: JHXQICOW.lnk = C:\WINDOWS\jhxqicow.exe
    O4 - Global Startup: 15X0HY73.lnk = C:\WINDOWS\15x0hy73.exe
    O4 - Global Startup: MORZE1.lnk = C:\WINDOWS\morze1.exe
    O4 - Global Startup: HYGGIF0W.lnk = C:\WINDOWS\hyggif0w.exe
    O4 - Global Startup: OFU6CJUZ.lnk = C:\WINDOWS\hf5qpfkw.exe
    O4 - Global Startup: Q6A5GB7D.lnk = C:\WINDOWS\q6a5gb7d.exe
    O4 - Global Startup: OGA2OBVL.lnk = C:\WINDOWS\oga2obvl.exe
    O4 - Global Startup: UZBJ2Y0Q.lnk = C:\WINDOWS\uzbj2y0q.exe
    O4 - Global Startup: Y21NUTC0.lnk = C:\WINDOWS\y21nutc0.exe
    O4 - Global Startup: WPKVIQ4N.lnk = C:\WINDOWS\wpkviq4n.exe
    O4 - Global Startup: 96A4G2IF.lnk = C:\WINDOWS\96a4g2if.exe
    O4 - Global Startup: HF5QPFKW.lnk = C:\WINDOWS\hf5qpfkw.exe
    O4 - Global Startup: WEWTL0ZA.lnk = C:\WINDOWS\wewtl0za.exe
    O4 - Global Startup: GT08VNTY.lnk = C:\WINDOWS\gt08vnty.exe
    O4 - Global Startup: 0O7378YO.lnk = C:\WINDOWS\0o7378yo.exe
    O4 - Global Startup: FCRGI7X1.lnk = C:\WINDOWS\fcrgi7x1.exe
    O4 - Global Startup: 8ZQ6079T.lnk = C:\WINDOWS\8zq6079t.exe
    O4 - Global Startup: 7F8YRYKE.lnk = C:\WINDOWS\7f8yryke.exe
    O4 - Global Startup: DTDR44IQ.lnk = C:\WINDOWS\dtdr44iq.exe
    O4 - Global Startup: 0GLYZL6B.lnk = C:\WINDOWS\0glyzl6b.exe
    O4 - Global Startup: FI446JNK.lnk = C:\WINDOWS\fi446jnk.exe
    O4 - Global Startup: TI357HT0.lnk = C:\WINDOWS\ti357ht0.exe
    O4 - Global Startup: CIFHRN0V.lnk = C:\WINDOWS\cifhrn0v.exe
    O4 - Global Startup: C6RUUXY3.lnk = C:\WINDOWS\c6ruuxy3.exe
    O4 - Global Startup: DFKR1OQU.lnk = C:\WINDOWS\dfkr1oqu.exe
    O4 - Global Startup: 560RUN1P.lnk = C:\WINDOWS\560run1p.exe
    O4 - Global Startup: 6PJKQPDO.lnk = C:\WINDOWS\6pjkqpdo.exe
    O4 - Global Startup: 3NJ0U2EQ.lnk = C:\WINDOWS\3nj0u2eq.exe
    O4 - Global Startup: 411L9QPV.lnk = C:\WINDOWS\411l9qpv.exe
    O4 - Global Startup: 5RX6R04N.lnk = C:\WINDOWS\5rx6r04n.exe
    O4 - Global Startup: PAZ5WPRT.lnk = C:\WINDOWS\paz5wprt.exe
    O4 - Global Startup: DPM82TTR.lnk = C:\WINDOWS\dpm82ttr.exe
    O4 - Global Startup: 9LRBCD0M.lnk = C:\WINDOWS\9lrbcd0m.exe
    O4 - Global Startup: 7LMCCNW3.lnk = C:\WINDOWS\7lmccnw3.exe
    O4 - Global Startup: XGN1004E.lnk = C:\WINDOWS\xgn1004e.exe
    O4 - Global Startup: 928EE3BP.lnk = C:\WINDOWS\928ee3bp.exe
    O4 - Global Startup: AK83W250.lnk = C:\WINDOWS\ak83w250.exe
    O4 - Global Startup: F5O60279.lnk = C:\WINDOWS\f5o60279.exe
    O4 - Global Startup: EBOJZONY.lnk = C:\WINDOWS\ebojzony.exe
    O4 - Global Startup: AWJ5V2YR.lnk = C:\WINDOWS\awj5v2yr.exe
    O4 - Global Startup: XW6Y7K60.lnk = C:\WINDOWS\xw6y7k60.exe
    O4 - Global Startup: KD5K0L55.lnk = C:\WINDOWS\kd5k0l55.exe
    O4 - Global Startup: V0YMQXP0.lnk = C:\WINDOWS\v0ymqxp0.exe
    O4 - Global Startup: ZGL4LI77.lnk = C:\WINDOWS\zgl4li77.exe
    O4 - Global Startup: 0OE1CT5T.lnk = C:\WINDOWS\0oe1ct5t.exe
    O4 - Global Startup: PQV804G7.lnk = C:\WINDOWS\pqv804g7.exe
    O8 - Extra context menu item: &Google Search - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmsearch.html
    O8 - Extra context menu item: Cac&hed Snapshot of Page - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmcache.html
    O8 - Extra context menu item: Si&milar Pages - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmsimilar.html
    O8 - Extra context menu item: Backward &Links - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmbacklinks.html
    O8 - Extra context menu item: Translate into English - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmtrans.html
    O9 - Extra button: Real.com (HKLM)
    O12 - Plugin for .spop: C:\PROGRA~1\INTERN~1\Plugins\NPDocBox.dll
    O12 - Plugin for .mpeg: C:\PROGRA~1\INTERN~1\PLUGINS\npqtplugin3.dll
    O12 - Plugin for .mp3: C:\PROGRA~1\INTERN~1\PLUGINS\npqtplugin3.dll
    O12 - Plugin for .mov: C:\PROGRA~1\INTERN~1\PLUGINS\npqtplugin.dll
    O12 - Plugin for .mpg: C:\PROGRA~1\INTERN~1\PLUGINS\npqtplugin3.dll
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://active.macromedia.com/flash2/cabs/swflash.cab
    O16 - DPF: {166B1BCA-3F9C-11CF-8075-444553540000} (Shockwave ActiveX Control) - http://download.macromedia.com/pub/...director/sw.cab
    O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/...bin/AvSniff.cab
    O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/...n/bin/cabsa.cab
     
  2. putasolution

    putasolution

    Joined:
    Mar 20, 2003
    Messages:
    4,823
    I would start off by updating your Antivirus program and running a full scan
     
  3. mjack547

    mjack547 Malware Specialist

    Joined:
    Sep 1, 2003
    Messages:
    3,181
    After your virus scan


    Download and unzip or install these programs/applications if you haven't already got them. If you have them, then make sure they are updated and configured as described

    CWshredder from http://www.merijn.org/cwschronicles.html

    Spybot - Search & Destroy from http://security.kolla.de

    AdAware 6 from http://www.lavasoft.de/software/adaware/

    then
    Run CWSHREDDER,

    Close all browser windows, click on the cwshredder.exe then click "FIX" (Not "Scan only") and let it do it's thing.
    and make sure you have all of the Microsoft security updates http://v4.windowsupdate.microsoft.com/en/default.asp

    then reboot &

    Run Sybot S&D

    After installing, first press Online, press search for updates, then tick the updates it finds, then press download updates. Beside the download button is a little down pointed arrow, select one of the servers listed. If it doesn't work or you get an error message then try a different server

    Next, close all Internet Explorer and OE windows, press 'Check for Problems', and have SpyBot remove all it finds that is marked in RED.

    then reboot &

    Run ADAWARE

    Before you scan with AdAware, check for updates of the reference file by using the "webupdate".

    Then ........

    Make sure the following settings are made and on -------"ON=GREEN"
    From main window :Click "Start" then " Activate in-depth scan"

    then......

    click "Use custom scanning options>Customize" and have these options on: "Scan within archives" ,"Scan active processes","Scan registry", "Deep scan registry" ,"Scan my IE Favorites for banned URL" and "Scan my host-files"

    then.........

    Now to scan it´s just to click the "Scan" button.

    When scan is finished, mark everything for removal and get rid of it. .(Right-click the window and choose"select all" from the drop down menu) then press next and then say yes to the prompt, do you want to remove all these entries.

    reboot again

    then post a new hijackthis log to check what is left
     
As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/217986

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice