HELP...Trojan

Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

XeqTr

Thread Starter
Joined
Jan 26, 2007
Messages
6
My computer was infected with the last version of PSW.X-Vir trojan...I visited some forums ,i downloaded "Hijacjthis!", i did a full scan and this is what i came up with...Please tell me if i can do something about that trojan or do a format on my hard disk...i think the trojan's name is "[email protected]" or something like that...

Hyjackthis...


Logfile of HijackThis v1.99.1
Scan saved at 11:23:18 AM, on 1/27/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Video ActiveX Object\pmsngr.exe
C:\Program Files\Video ActiveX Object\isamonitor.exe
C:\Program Files\Eset\nod32kui.exe
C:\Program Files\Video ActiveX Object\pmmon.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Video ActiveX Object\isamini.exe
C:\WINDOWS\system32\devldr32.exe
C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe
C:\Program Files\Eset\nod32krn.exe
C:\Program Files\Norton Utilities\NPROTECT.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Speed Disk\nopdb.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Hijackthis\HijackThis.exe

O2 - BHO: (no name) - {67982BB7-0F95-44C5-92DC-E3AF3DC19D6D} - C:\Program Files\Video ActiveX Object\isaddon.dll
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [nod32kui] "C:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKCU\..\Run: [CyberDefender Early Detection Center] "C:\Program Files\CyberDefender\AntiSpyware\cdascc.exe" /minimize
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet
O17 - HKLM\System\CCS\Services\Tcpip\..\{D866F051-0039-460A-910F-3B0E5100FC90}: NameServer = 193.231.100.2,193.231.100.3
O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - C:\Program Files\Eset\nod32krn.exe
O23 - Service: Norton Unerase Protection (NProtectService) - Symantec Corporation - C:\Program Files\Norton Utilities\NPROTECT.EXE
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: RapApp - Internet Security Systems, Inc. - C:\Program Files\ISS\BlackICE\rapapp.exe
O23 - Service: Speed Disk service - Symantec Corporation - C:\Program Files\Speed Disk\nopdb.exe
 

Cheeseball81

Retired Moderator
Joined
Mar 3, 2004
Messages
84,315
Please download SmitfraudFix (by S!Ri)
Extract the content (a folder named SmitfraudFix) to your Desktop.

Open the SmitfraudFix folder and double-click smitfraudfix.cmd
Select option #1 - Search by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present).
Please copy/paste the content of that report into your next reply.

Note : process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
http://www.beyondlogic.org/consulting/proc...processutil.htm
 

XeqTr

Thread Starter
Joined
Jan 26, 2007
Messages
6
SmitFraudFix v2.136

Scan done at 17:06:26.68, Sun 01/28/2007
Run from C:\Documents and Settings\xp\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in normal mode

»»»»»»»»»»»»»»»»»»»»»»»» C:\


»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS


»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system


»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web


»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32


»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\xp


»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\xp\Application Data


»»»»»»»»»»»»»»»»»»»»»»»» Start Menu

C:\DOCUME~1\ALLUSE~1\STARTM~1\Online Security Guide.url FOUND !
C:\DOCUME~1\ALLUSE~1\STARTM~1\Security Troubleshooting.url FOUND !

»»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\xp\FAVORI~1

C:\DOCUME~1\xp\FAVORI~1\Online Security Test.url FOUND !

»»»»»»»»»»»»»»»»»»»»»»»» Desktop


»»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files

C:\Program Files\Video ActiveX Object\ FOUND !

»»»»»»»»»»»»»»»»»»»»»»»» Corrupted keys


»»»»»»»»»»»»»»»»»»»»»»»» Desktop Components

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
"Source"="About:Home"
"SubscribedURL"="About:Home"
"FriendlyName"="My Current Home Page"


»»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
"{fa19bd7e-50bc-4203-80ac-c4edc81ca9a3}"="hirtellous"



»»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"=""


»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""


»»»»»»»»»»»»»»»»»»»»»»»» pe386-msguard-lzx32-huy32


»»»»»»»»»»»»»»»»»»»»»»»» Scanning wininet.dll infection


»»»»»»»»»»»»»»»»»»»»»»»» End
 

Cheeseball81

Retired Moderator
Joined
Mar 3, 2004
Messages
84,315
You should print out these instructions, or copy them to a NotePad file for reading while in Safe Mode, because you will not be able to connect to the Internet to read from this site.

Next, please reboot your computer in Safe Mode by doing the following :
  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
  • Instead of Windows loading as normal, a menu with options should appear;
  • Select the first option, to run Windows in Safe Mode, then press "Enter".
  • Choose your usual account.
Once in Safe Mode, open the SmitfraudFix folder again and double-click smitfraudfix.cmd
Select option #2 - Clean by typing 2 and press "Enter" to delete infected files.

You will be prompted: "Registry cleaning - Do you want to clean the registry?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.

The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".

The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart it into Normal Windows.

A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply.

The report can also be found at the root of the system drive, usually at C:\rapport.txt

Warning: running option #2 on a non infected computer will remove your Desktop background.
 

XeqTr

Thread Starter
Joined
Jan 26, 2007
Messages
6
SmitFraudFix v2.136

Scan done at 0:04:10.89, Mon 01/29/2007
Run from C:\Documents and Settings\xp\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in safe mode

»»»»»»»»»»»»»»»»»»»»»»»» Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
"{fa19bd7e-50bc-4203-80ac-c4edc81ca9a3}"="hirtellous"


»»»»»»»»»»»»»»»»»»»»»»»» Killing process


»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

GenericRenosFix by S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files

C:\DOCUME~1\ALLUSE~1\STARTM~1\Online Security Guide.url Deleted
C:\DOCUME~1\ALLUSE~1\STARTM~1\Security Troubleshooting.url Deleted
C:\DOCUME~1\xp\FAVORI~1\Online Security Test.url Deleted
C:\Program Files\Video ActiveX Object\ Deleted

»»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""


»»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

Registry Cleaning done.

»»»»»»»»»»»»»»»»»»»»»»»» After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


»»»»»»»»»»»»»»»»»»»»»»»» End
 

Cheeseball81

Retired Moderator
Joined
Mar 3, 2004
Messages
84,315
Download AVG Anti-Spyware from HERE and save that file to your desktop.

When the trial period expires it becomes feature-limited freeware but is still worth keeping as a good on-demand scanner.


  1. Once you have downloaded AVG Anti-Spyware, locate the icon on the desktop and double click it to launch the set up program.
  2. Once the setup is complete you will need run AVG Anti-Spyware and update the definition files.
  3. On the main screen select the icon "Update" then select the "Update now" link.
    • Next select the "Start Update" button. The update will start and a progress bar will show the updates being installed.
  4. Once the update has completed, select the "Scanner" icon at the top of the screen, then select the "Settings" tab.
  5. Once in the Settings screen click on "Recommended actions" and then select "Quarantine".
  6. Under "Reports"
    • Select "Automatically generate report after every scan"
    • Un-Select "Only if threats were found"
Close AVG Anti-Spyware. Do Not run a scan just yet, we will run it in safe mode.
  1. Reboot your computer into Safe Mode. You can do this by restarting your computer and continually tapping the F8 key until a menu appears. Use your up arrow key to highlight Safe Mode then hit enter.

    IMPORTANT: Do not open any other windows or programs while AVG Anti-Spyware is scanning as it may interfere with the scanning process:
  2. Launch AVG Anti-Spyware by double clicking the icon on your desktop.
  3. Select the "Scanner" icon at the top and then the "Scan" tab then click on "Complete System Scan".
  4. AVG will now begin the scanning process. Please be patient as this may take a little time.
    Once the scan is complete, do the following:
  5. If you have any infections you will be prompted. Then select "Apply all actions."
  6. Next select the "Reports" icon at the top.
  7. Select the "Save report as" button in the lower lef- hand of the screen and save it to a text file on your system (make sure to remember where you saved that file. This is important).
  8. Close AVG Anti-Spyware and reboot your system back into Normal Mode.


Please go HERE to run Panda's ActiveScan
  • Once you are on the Panda site click the Scan your PC button
  • A new window will open...click the Check Now button
  • Enter your Country
  • Enter your State/Province
  • Enter your e-mail address and click send
  • Select either Home User or Company
  • Click the big Scan Now button
  • If it wants to install an ActiveX component allow it
  • It will start downloading the files it requires for the scan (Note: It may take a couple of minutes)
  • When download is complete, click on My Computer to start the scan
  • When the scan completes, if anything malicious is detected, click the See Report button, then Save Report and save it to a convenient location. Post the contents of the ActiveScan report


Come back here and post a new HijackThis log along with the logs from the AVG and Panda scans.
 

XeqTr

Thread Starter
Joined
Jan 26, 2007
Messages
6
First i ran avg. Note that i first saved the rapport then i selected "apply all actions"...

---------------------------------------------------------
AVG Anti-Spyware - Scan Report
---------------------------------------------------------

+ Created at: 12:19:15 PM 1/30/2007

+ Scan result:



D:\Games\GTA-SA\GTA San Andreas\HLM-INTR.EXE -> Backdoor.Hupigon.kg : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP54\A0014980.EXE -> Downloader.Zlob.bkn : No action taken.
C:\Program Files\Hijackthis\backups\backup-20070125-233247-714.dll -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP51\A0013776.dll -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP51\A0013777.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP51\A0013778.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0013833.dll -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0013834.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0013835.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0014833.dll -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0014834.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0014835.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0014864.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0014865.dll -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0014866.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0014926.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0014927.dll -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP52\A0014928.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP54\A0015038.EXE -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP54\A0015039.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0015969.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0015970.dll -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0015971.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0015981.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0015982.dll -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0015983.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0016077.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0016078.dll -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0016079.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0016095.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0016096.dll -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP55\A0016097.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016117.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016118.dll -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016119.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016131.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016132.dll -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016133.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016194.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016195.dll -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016196.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016223.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016224.dll -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP56\A0016225.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP57\A0016421.dll -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP57\A0016422.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP57\A0016423.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP57\A0016424.exe -> Downloader.Zlob.bls : No action taken.
C:\System Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP57\A0016425.exe -> Downloader.Zlob.bls : No action taken.
C:\Documents and Settings\xp\Cookies\[email protected][1].txt -> TrackingCookie.Trafic : No action taken.


::Report end



Second i ran panda...


Incident Status Location

Potentially unwanted tool:Application/Processor Not disinfected C:\Documents and Settings\xp\Desktop\SmitfraudFix\Process.exe
Potentially unwanted tool:Application/Processor Not disinfected C:\Documents and Settings\xp\Desktop\SmitfraudFix.zip[SmitfraudFix/Process.exe]
Potentially unwanted tool:Application/Processor Not disinfected D:\Kitt\pt spyware\SmitfraudFix.zip[SmitfraudFix/Process.exe]


Finally i ran hijackthis...

Logfile of HijackThis v1.99.1
Scan saved at 1:13:53 PM, on 1/30/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Eset\nod32kui.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\WINDOWS\system32\devldr32.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Program Files\Eset\nod32krn.exe
C:\Program Files\Norton Utilities\NPROTECT.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Speed Disk\nopdb.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\wuauclt.exe
C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe
C:\Program Files\Hijackthis\HijackThis.exe

O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [nod32kui] "C:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKCU\..\Run: [CyberDefender Early Detection Center] "C:\Program Files\CyberDefender\AntiSpyware\cdascc.exe" /minimize
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{D866F051-0039-460A-910F-3B0E5100FC90}: NameServer = 193.231.100.2,193.231.100.3
O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - C:\Program Files\Eset\nod32krn.exe
O23 - Service: Norton Unerase Protection (NProtectService) - Symantec Corporation - C:\Program Files\Norton Utilities\NPROTECT.EXE
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: RapApp - Internet Security Systems, Inc. - C:\Program Files\ISS\BlackICE\rapapp.exe
O23 - Service: Speed Disk service - Symantec Corporation - C:\Program Files\Speed Disk\nopdb.exe
 

XeqTr

Thread Starter
Joined
Jan 26, 2007
Messages
6
nod32 detected Win32/trojanDownloader.Zlob.AQG trojan...It's quarantined
 

XeqTr

Thread Starter
Joined
Jan 26, 2007
Messages
6
D:\system Volume Information\_restore{79BCAD9E-558B-4A28-9843-EB88E87514CF}\RP58\A0016436.EXE.
 

Cheeseball81

Retired Moderator
Joined
Mar 3, 2004
Messages
84,315
Turn off System Restore:

On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
Check Turn off System Restore.
Click Apply, and then click OK.

Restart your computer.

Turn System Restore back on and create a restore point.

To create a restore point:

Single-click Start and point to All Programs.
Mouse over Accessories, then System Tools, and select System Restore.
In the System Restore wizard, select the box next the text labeled "Create a restore point" and click the Next button.
Type a description for your new restore point. Something like "After trojan/spyware cleanup". Click Create and you're done.
 
Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 807,865 other people just like you!

Latest posts

Staff online

Top