1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Help Please - something is using my broadband connection

Discussion in 'Virus & Other Malware Removal' started by stevehowley, Jan 30, 2007.

Thread Status:
Not open for further replies.
Advertisement
  1. stevehowley

    stevehowley Thread Starter

    Joined:
    Nov 12, 2006
    Messages:
    10
    Help

    I’ve been having trouble with some sort of virus that has infected my pc. It seems to be transmitting data over my broadband connection (my data counter counts up on both downloaded and uploaded even while I don’t have any pages open)

    I’ll be honest and say that I’m an absolute novice with this stuff, so any help would really be appreciated. I have managed to gather the following information.

    When my computer starts up, two windows open up on start up, they roughly read the following;

    “Please tell Microsoft about this problem”
    ~tmp0374.exe has encountered a problem and needs to close. We are sorry for the inconvenience

    “Please tell Microsoft about this problem”
    update13428241.exe has encountered a problem and needs to close. We are sorry for the inconvenience



    Also, my Trend Micro program has found this problem today;
    real time scan –
    infected file – C:\WINDOWS\system32\update62523833.exe
    virus name – TROJ_DLOADER.ECT
    result – Virus successfully detected, but infected file cannot be cleaned. File was deleted.


    I have run Spybot several times over the last few days, I’ve been getting the same result.

    3 problems found;
    Smitfraud-C.

    Two could be fixed, one could not. Library – C:\WINDOWS\system32\rpcc.dll



    I have also run HijackThis

    Logfile of HijackThis v1.99.1
    Scan saved at 8:45:31 p.m., on 30/01/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Sierra Wireless\AirCard 580\Generic\Components\swiwificomm.exe
    C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
    C:\Program Files\Viewpoint\Common\ViewpointService.exe
    C:\Program Files\UltraVNC\WinVNC.exe
    C:\Program Files\Trend Micro\OfficeScan Client\OfcPfwSvc.exe
    C:\WINDOWS\TEMP\HPE4C.EXE
    C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
    C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE
    C:\PROGRA~1\WINZIP\winzip32.exe
    C:\Documents and Settings\stevenh\Desktop\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.nz/
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O4 - HKLM\..\Run: [LXCFCATS] rundll32 C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\LXCFtime.dll,[email protected]
    O4 - HKLM\..\Run: [OfficeScanNT Monitor] "C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe" -HideWindow
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
    O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = rivermill.co.nz
    O17 - HKLM\Software\..\Telephony: DomainName = rivermill.co.nz
    O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = rivermill.co.nz
    O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = rivermill.co.nz
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
    O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
    O20 - Winlogon Notify: rpcc - C:\WINDOWS\system32\rpcc.dll
    O21 - SSODL: System - {566B1C80-9703-4BBD-92D1-31B6F09EE7D9} - dgflib.dll (file missing)
    O23 - Service: lxcf_device - - C:\WINDOWS\system32\lxcfcoms.exe
    O23 - Service: ieupdater (Microsoft IE Updater) - Unknown owner - C:\Documents and Settings\stevenh\~tmp0374.exe
    O23 - Service: msupdatefs (Microsoft Updater FileSystem) - Unknown owner - C:\WINDOWS\system32\update13428241.exe
    O23 - Service: Trend Micro Client/Server Security Agent RealTime Scan (ntrtscan) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
    O23 - Service: Trend Micro Client/Server Security Agent Personal Firewall (OfcPfwSvc) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\OfcPfwSvc.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\SYSTEM32\SPOOL\DRIVERS\W32X86\3\HPZipm12.exe
    O23 - Service: SwiWiFiComm - Unknown owner - C:\Program Files\Sierra Wireless\AirCard 580\Generic\Components\swiwificomm.exe
    O23 - Service: Trend Micro Client/Server Security Agent Listener (tmlisten) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
    O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe
    O23 - Service: VNC Server (winvnc) - Unknown owner - C:\Program Files\UltraVNC\WinVNC.exe" -service (file missing)




    Please let me know if I can help you help me by providing anything else.

    Many thanks

    Steven
     
  2. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Please do ALL of the following, making sure to post the requested log - it may take multiple posts to post it all.
    ==============
    Add remove programs - remove all occurrences of Viewpoint

    =======================

    Download http://downloads.andymanchesta.com/RemovalTools/SDFix.exe and save it to your Desktop.

    Double click SDFix.exe and it will extract the files to %systemdrive%
    (Drive that contains the Windows Directory, typically C:\SDFix)

    Please then reboot your computer in Safe Mode by doing the following :
    · Restart your computer
    · After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
    · Instead of Windows loading as normal, the Advanced Options Menu should appear;
    · Select the first option, to run Windows in Safe Mode, then press Enter.
    · Choose your usual account.
    · Open the extracted SDFix folder and double click RunThis.bat to start the script.
    · Type Y to begin the cleanup process.
    · It will remove any Trojan Services and Registry Entries that it finds then prompt you to press any key to Reboot.
    · Press any Key and it will restart the PC.
    · When the PC restarts the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
    · Once the desktop icons load the SDFix report will open on screen and also save into the SDFix folder as Report.txt
    (Report.txt will also be copied to Clipboard ready for posting back on the forum).
    · Finally paste the contents of the Report.txt back on the forum with a new HijackThis log
    =================================

    Please download SmitfraudFix (by S!Ri)
    Extract the content (a folder named SmitfraudFix) to your Desktop.

    Open the SmitfraudFix folder and double-click smitfraudfix.cmd
    Select option #1 - Search by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present). We’ll get them next step.
    Please copy/paste the content of that report into your next reply.

    Note : process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
    http://www.beyondlogic.org/consulting/proc...processutil.htm
    ===========================

    Download Superantispyware

    http://www.superantispyware.com/superantispywarefreevspro.html

    Install it and double-click the icon on your desktop to run it.
    · It will ask if you want to update the program definitions, click Yes.
    · Under Configuration and Preferences, click the Preferences button.
    · Click the Scanning Control tab.
    · Under Scanner Options make sure the following are checked:
    o Close browsers before scanning
    o Scan for tracking cookies
    o Terminate memory threats before quarantining.
    o Please leave the others unchecked.
    o Click the Close button to leave the control center screen.
    · On the main screen, under Scan for Harmful Software click Scan your computer.
    · On the left check C:\Fixed Drive.
    · On the right, under Complete Scan, choose Perform Complete Scan.
    · Click Next to start the scan. Please be patient while it scans your computer.
    · After the scan is complete a summary box will appear. Click OK.
    · Make sure everything in the white box has a check next to it, then click Next.
    · It will quarantine what it found and if it asks if you want to reboot, click Yes.
    · To retrieve the removal information for me please do the following:
    o After reboot, double-click the SUPERAntispyware icon on your desktop.
    o Click Preferences. Click the Statistics/Logs tab.
    o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    o It will open in your default text editor (such as Notepad/Wordpad).
    o Please highlight everything in the notepad, then right-click and choose copy.
    · Click close and close again to exit the program.
    · Please paste that information here for me with a new HijackThis log.
     
  3. stevehowley

    stevehowley Thread Starter

    Joined:
    Nov 12, 2006
    Messages:
    10
    Thanks heaps for all of this help. I am just striking a bit of a problem in actioning this. When I try to start in safe mode, i am asked (as usual) for my username and password. However, my usual password is not being accepted???? Is there any way to get around this???
     
  4. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Not that I am aware - make sure capslock and/or num lock are in their normal positions

    If no joy skip SDFix for now
     
  5. stevehowley

    stevehowley Thread Starter

    Joined:
    Nov 12, 2006
    Messages:
    10
    SmitfraudFix report

    SmitFraudFix v2.140

    Scan done at 12:43:58.04, Wed 07/02/2007
    Run from C:\unzipped\SmitfraudFix\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    The filesystem type is NTFS
    Fix run in normal mode

    »»»»»»»»»»»»»»»»»»»»»»»» hosts


    »»»»»»»»»»»»»»»»»»»»»»»» C:\


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\stevenh


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\stevenh\Application Data


    »»»»»»»»»»»»»»»»»»»»»»»» Start Menu


    »»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\stevenh\FAVORI~1


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files


    »»»»»»»»»»»»»»»»»»»»»»»» Corrupted keys


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop Components

    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
    "Source"="About:Home"
    "SubscribedURL"="About:Home"
    "FriendlyName"="My Current Home Page"


    »»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll


    »»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
    "AppInit_DLLs"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "system"=""


    »»»»»»»»»»»»»»»»»»»»»»»» pe386-msguard-lzx32-huy32


    »»»»»»»»»»»»»»»»»»»»»»»» Scanning wininet.dll infection


    »»»»»»»»»»»»»»»»»»»»»»»» End
     
  6. stevehowley

    stevehowley Thread Starter

    Joined:
    Nov 12, 2006
    Messages:
    10
    SUPERAntispyware Log

    SUPERAntiSpyware Scan Log
    Generated 02/07/2007 at 01:58 PM

    Application Version : 3.5.1016

    Core Rules Database Version : 3179
    Trace Rules Database Version: 1189

    Scan type : Complete Scan
    Total Scan Time : 01:01:58

    Memory items scanned : 344
    Memory threats detected : 0
    Registry items scanned : 4889
    Registry threats detected : 35
    File items scanned : 30762
    File threats detected : 28

    Trojan.Downloader-Update/VXPkg
    HKLM\System\ControlSet001\Services\Microsoft Updater FileSystem
    C:\WINDOWS\SYSTEM32\UPDATE13428241.EXE
    HKLM\System\ControlSet002\Services\Microsoft Updater FileSystem
    HKLM\System\CurrentControlSet\Services\Microsoft Updater FileSystem
    C:\WINDOWS\Prefetch\UPDATE13428241.EXE-01424FFC.pf

    Trojan.Downloader-RPCC
    Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\rpcc
    C:\WINDOWS\SYSTEM32\RPCC.DLL
    HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\rpcc
    HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\rpcc#DllName
    HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\rpcc#Asynchronous
    HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\rpcc#Impersonate
    HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\rpcc#Startup

    Adware.Tracking Cookie
    C:\Documents and Settings\stevenh\Cookies\[email protected][1].txt
    C:\Documents and Settings\stevenh\Cookies\[email protected][2].txt
    C:\Documents and Settings\stevenh\Cookies\[email protected][2].txt
    C:\Documents and Settings\stevenh\Cookies\[email protected][1].txt
    C:\Documents and Settings\stevenh\Cookies\[email protected][1].txt
    C:\Documents and Settings\stevenh\Cookies\[email protected][1].txt
    C:\Documents and Settings\stevenh\Cookies\[email protected][1].txt
    C:\Documents and Settings\stevenh\Cookies\[email protected][1].txt
    C:\Documents and Settings\stevenh\Cookies\[email protected][2].txt
    C:\Documents and Settings\Administrator.RIVERMILL\Cookies\[email protected][1].txt
    C:\Documents and Settings\kime\Cookies\[email protected][1].txt
    C:\Documents and Settings\kime\Cookies\[email protected][2].txt
    C:\Documents and Settings\kime\Cookies\[email protected][2].txt
    C:\Documents and Settings\kime\Cookies\[email protected][1].txt
    C:\Documents and Settings\kime\Cookies\[email protected][2].txt
    C:\Documents and Settings\kime\Cookies\[email protected][3].txt
    C:\Documents and Settings\kime\Cookies\[email protected][1].txt
    C:\Documents and Settings\kime\Cookies\[email protected][1].txt
    C:\Documents and Settings\kime\Cookies\[email protected][2].txt

    Trojan.Media-Codec
    HKCR\Media-Codec.Chl
    HKCR\Media-Codec.Chl\CLSID

    Trojan.Downloader-MS IE Updater
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER#NextInstance
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000#Service
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000#Legacy
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000#ConfigFlags
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000#Class
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000#ClassGUID
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000#DeviceDesc
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000\Control
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000\Control#ActiveService
    HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater
    HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater#Type
    HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater#Start
    HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater#ErrorControl
    HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater#ImagePath
    HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater#DisplayName
    HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater#ObjectName
    HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater\Security
    HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater\Security#Security
    HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater\Enum
    HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater\Enum#0
    HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater\Enum#Count
    HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater\Enum#NextInstance

    Trojan.Downloader-MS/Counter
    C:\DOCUMENTS AND SETTINGS\STEVENH\~TMP0374.EXE
    C:\WINDOWS\Prefetch\~TMP0374.EXE-03A91783.pf

    Trojan.IBM/Shell
    C:\PROGRAM FILES\TREND MICRO\OFFICESCAN CLIENT\SUSPECT\IBM00004.DLL
    C:\PROGRAM FILES\TREND MICRO\OFFICESCAN CLIENT\SUSPECT\IBM00006.DLL

    Trojan.DOmen
    C:\WINDOWS\SYSTEM32\CSVQZ.EXE

    Malware.KillAndClean
    C:\WINDOWS\SYSTEM32\{8733C2C7-49CA-492E-8E04-1434BB384A9D}.EXE
     
  7. stevehowley

    stevehowley Thread Starter

    Joined:
    Nov 12, 2006
    Messages:
    10
    New HijackThis Log

    Logfile of HijackThis v1.99.1
    Scan saved at 2:10:48 p.m., on 7/02/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Sierra Wireless\AirCard 580\Generic\Components\swiwificomm.exe
    C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
    C:\Program Files\UltraVNC\WinVNC.exe
    C:\Program Files\Trend Micro\OfficeScan Client\OfcPfwSvc.exe
    C:\WINDOWS\TEMP\CJBD05.EXE
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Sierra Wireless\AirCard 580\Generic\watcher.exe
    C:\Documents and Settings\stevenh\Desktop\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.nz/
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O4 - HKLM\..\Run: [LXCFCATS] rundll32 C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\LXCFtime.dll,[email protected]
    O4 - HKLM\..\Run: [OfficeScanNT Monitor] "C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe" -HideWindow
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
    O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = rivermill.co.nz
    O17 - HKLM\Software\..\Telephony: DomainName = rivermill.co.nz
    O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = rivermill.co.nz
    O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = rivermill.co.nz
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
    O21 - SSODL: System - {566B1C80-9703-4BBD-92D1-31B6F09EE7D9} - dgflib.dll (file missing)
    O23 - Service: lxcf_device - - C:\WINDOWS\system32\lxcfcoms.exe
    O23 - Service: Trend Micro Client/Server Security Agent RealTime Scan (ntrtscan) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
    O23 - Service: Trend Micro Client/Server Security Agent Personal Firewall (OfcPfwSvc) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\OfcPfwSvc.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\SYSTEM32\SPOOL\DRIVERS\W32X86\3\HPZipm12.exe
    O23 - Service: SwiWiFiComm - Unknown owner - C:\Program Files\Sierra Wireless\AirCard 580\Generic\Components\swiwificomm.exe
    O23 - Service: Trend Micro Client/Server Security Agent Listener (tmlisten) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
    O23 - Service: VNC Server (winvnc) - Unknown owner - C:\Program Files\UltraVNC\WinVNC.exe" -service (file missing)
     
  8. stevehowley

    stevehowley Thread Starter

    Joined:
    Nov 12, 2006
    Messages:
    10
    Thanks for all your help so far. On my last reboot those error messages have disappeared.
     
  9. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Fix these with HiJackThis – mark them, close IE, click fix checked

    O21 - SSODL: System - {566B1C80-9703-4BBD-92D1-31B6F09EE7D9} - dgflib.dll (file missing)

    START – RUN – type in %temp% - OK - Edit – Select all – File – Delete

    Delete everything in the C:\Windows\Temp folder or C:\WINNT\temp

    Not all temp files will delete and that is normal
    Empty the recycle bin
    Boot and post a new hijack log from normal NOT safe mode

    Please give feedback on what worked/didn’t work and the current status of your system
     
  10. stevehowley

    stevehowley Thread Starter

    Joined:
    Nov 12, 2006
    Messages:
    10
    Logfile of HijackThis v1.99.1
    Scan saved at 9:47:20 a.m., on 8/02/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Sierra Wireless\AirCard 580\Generic\Components\swiwificomm.exe
    C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
    C:\Program Files\UltraVNC\WinVNC.exe
    C:\WINDOWS\TEMP\QADB4E.EXE
    C:\Program Files\Trend Micro\OfficeScan Client\OfcPfwSvc.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\Sierra Wireless\AirCard 580\Generic\watcher.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Documents and Settings\stevenh\Desktop\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.nz/
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O4 - HKLM\..\Run: [LXCFCATS] rundll32 C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\LXCFtime.dll,[email protected]
    O4 - HKLM\..\Run: [OfficeScanNT Monitor] "C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe" -HideWindow
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
    O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = rivermill.co.nz
    O17 - HKLM\Software\..\Telephony: DomainName = rivermill.co.nz
    O17 - HKLM\System\CCS\Services\Tcpip\..\{CAE557CC-708D-4DC4-93B5-DF15207BC595}: NameServer = 202.27.184.3 202.27.184.5
    O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = rivermill.co.nz
    O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = rivermill.co.nz
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
    O23 - Service: lxcf_device - - C:\WINDOWS\system32\lxcfcoms.exe
    O23 - Service: Trend Micro Client/Server Security Agent RealTime Scan (ntrtscan) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
    O23 - Service: Trend Micro Client/Server Security Agent Personal Firewall (OfcPfwSvc) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\OfcPfwSvc.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\SYSTEM32\SPOOL\DRIVERS\W32X86\3\HPZipm12.exe
    O23 - Service: SwiWiFiComm - Unknown owner - C:\Program Files\Sierra Wireless\AirCard 580\Generic\Components\swiwificomm.exe
    O23 - Service: Trend Micro Client/Server Security Agent Listener (tmlisten) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
    O23 - Service: VNC Server (winvnc) - Unknown owner - C:\Program Files\UltraVNC\WinVNC.exe" -service (file missing)
     
  11. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
  12. stevehowley

    stevehowley Thread Starter

    Joined:
    Nov 12, 2006
    Messages:
    10
    So far I have been able to do everything you have asked except run the SDFix.exe in safe mode. This is because I seem to be unable to get past the password it asks for as I enter safemode.

    At present, the error messages that came up on startup have dissappeared, but when connected to my broadband connection, my computer automatically starts to send and receive (my download counters tick up)
     
  13. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    http://www.pandasoftware.com/products/activescan.htm

    When the scan completes, if anything malicious is detected, click the See Report button, then Save Report and save it to a convenient location. Post the contents of the ActiveScan report

    =====================

    DownLoad EasyCleaner http://www.majorgeeks.com/download414.html

    Use the clear files and Unnecessary files buttons – I do not recommend
    using the Duplicates files button
    as many dupes are there on purpose.

    Not all files will delete – that is normal.

    In the unnecessary button I check the top 4 entries
     
  14. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/539541

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice