1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

HJT log pls take a look

Discussion in 'Virus & Other Malware Removal' started by tkh, Feb 10, 2007.

Thread Status:
Not open for further replies.
Advertisement
  1. tkh

    tkh Thread Starter

    Joined:
    Jan 10, 2004
    Messages:
    138
    Hi guys, recently found that my sis's comp has been running slow. Suspected that it might be due to trojans, I did a scan using S&D and Lavasoft and true enough it did turn up some tojans which I removed.

    To be on the safe side, I did a HJT log to see check to see if there was any perculiarites. Please advise as necessary. Thanks

    Logfile of HijackThis v1.99.1
    Scan saved at 20:12:48, on 10/02/2007
    Platform: Windows XP (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 (6.00.2600.0000)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINDOWS\System32\nvsvc32.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    C:\WINDOWS\System32\SVCH0ST.EXE
    C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe
    C:\WINDOWS\SOUNDMAN.EXE
    C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\Microsoft\svhost32.exe
    C:\WINDOWS\System32\system43.exe
    C:\WINDOWS\System32\wwww.exe
    C:\Program Files\Ares\Ares.exe
    C:\WINDOWS\System32\ctfmon.exe
    C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\WINDOWS\System32\DllHost.exe
    C:\WINDOWS\System32\wuauclt.exe
    C:\WINDOWS\System32\wuauclt.exe
    C:\Documents and Settings\Administrator\Desktop\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.soccernet.com/
    O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [SW20] C:\WINDOWS\System32\sw20.exe
    O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\System32\NvMcTray.dll,NvTaskbarInit
    O4 - HKLM\..\Run: [pccguide.exe] "C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe"
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [IMJPMIG8.1] C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE /Spoil /RemAdvDef /Migration32
    O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\System32\IME\PINTLGNT\ImScInst.exe /SYNC
    O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\System32\IME\TINTLGNT\TINTSETP.EXE /SYNC
    O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\System32\IME\TINTLGNT\TINTSETP.EXE /IMEName
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [ms] C:\Program Files\Microsoft\svhost32.exe
    O4 - HKLM\..\Run: [system43.exe] C:\WINDOWS\System32\system43.exe
    O4 - HKLM\..\Run: [tavpes] C:\WINDOWS\System32\wwww.exe
    O4 - HKCU\..\Run: [ares] "C:\Program Files\Ares\Ares.exe" -h
    O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\ctfmon.exe
    O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
    O23 - Service: Trend Micro Central Control Component (PcCtlCom) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    O23 - Service: Trend Micro Real-time Service (Tmntsrv) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe

    Regards
    tkh
     
  2. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    I suggest you remove Ares and any other P2P programs as they are the likely source of the infections
    =========
    Download http://downloads.andymanchesta.com/RemovalTools/SDFix.exe and save it to your Desktop.

    Double click SDFix.exe and it will extract the files to %systemdrive%
    (Drive that contains the Windows Directory, typically C:\SDFix)

    Please then reboot your computer in Safe Mode by doing the following :
    · Restart your computer
    · After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
    · Instead of Windows loading as normal, the Advanced Options Menu should appear;
    · Select the first option, to run Windows in Safe Mode, then press Enter.
    · Choose your usual account.
    · Open the extracted SDFix folder and double click RunThis.bat to start the script.
    · Type Y to begin the cleanup process.
    · It will remove any Trojan Services and Registry Entries that it finds then prompt you to press any key to Reboot.
    · Press any Key and it will restart the PC.
    · When the PC restarts the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
    · Once the desktop icons load the SDFix report will open on screen and also save into the SDFix folder as Report.txt
    (Report.txt will also be copied to Clipboard ready for posting back on the forum).
    · Finally paste the contents of the Report.txt back on the forum with a new HijackThis log
    ====================

    Download Superantispyware (SAS)

    http://www.superantispyware.com/superantispywarefreevspro.html

    Install it and double-click the icon on your desktop to run it.
    · It will ask if you want to update the program definitions, click Yes.
    · Under Configuration and Preferences, click the Preferences button.
    · Click the Scanning Control tab.
    · Under Scanner Options make sure the following are checked:
    o Close browsers before scanning
    o Scan for tracking cookies
    o Terminate memory threats before quarantining.
    o Please leave the others unchecked.
    o Click the Close button to leave the control center screen.
    · On the main screen, under Scan for Harmful Software click Scan your computer.
    · On the left check C:\Fixed Drive.
    · On the right, under Complete Scan, choose Perform Complete Scan.
    · Click Next to start the scan. Please be patient while it scans your computer.
    · After the scan is complete a summary box will appear. Click OK.
    · Make sure everything in the white box has a check next to it, then click Next.
    · It will quarantine what it found and if it asks if you want to reboot, click Yes.
    · To retrieve the removal information for me please do the following:
    o After reboot, double-click the SUPERAntispyware icon on your desktop.
    o Click Preferences. Click the Statistics/Logs tab.
    o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    o It will open in your default text editor (such as Notepad/Wordpad).
    o Please highlight everything in the notepad, then right-click and choose copy.
    · Click close and close again to exit the program.
    · Please paste that information here for me with a new HijackThis log.
     
  3. tkh

    tkh Thread Starter

    Joined:
    Jan 10, 2004
    Messages:
    138
    Heya I followed your instructions and here are the various reports:

    SDFix report:


    SDFix: Version 1.64

    Run by: Administrator - 11/02/2007 @ 10:23:53.45

    Microsoft Windows XP [Version 5.1.2600]

    Running From: C:\SDFix

    Safe Mode:
    Checking Services:

    Name:

    Path:


    Restoring Windows Registry Entries
    Restoring Default Hosts File


    Rebooting...

    Normal Mode:
    Checking Files:

    Below files will be copied to Backups folder then removed:

    C:\Program Files\Microsoft\svhost32.exe - Deleted
    C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\svchost.exe - Deleted
    C:\WINDOWS\system32\system43.exe - Deleted
    C:\WINDOWS\system32\winsys.exe - Deleted

    Could Not Remove C:\WINDOWS\system32\jbhook.dll
    Could Not Remove C:\WINDOWS\system32\svch0st.exe


    ADS Check:

    C:\WINDOWS\system32
    No streams found.

    Final Check:



    Remaining Files:
    ---------------
    C:\WINDOWS\system32\jbhook.dll Found
    C:\WINDOWS\system32\svch0st.exe Found

    Backups Folder: - C:\SDFix\backups\backups.zip


    Checking For Files with Hidden Attributes :

    C:\WINDOWS\system32\jbloader.dll
    C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Shortcut Bar\Off2.tmp
    C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Shortcut Bar\Off2h.tmp
    C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Shortcut Bar\Off2s.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL0152.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL0512.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL0719.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL0945.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL1120.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL1239.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL1362.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL1706.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL2302.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL2537.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL2627.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL2725.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL3103.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL3183.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL3441.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL3802.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL3876.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL0001.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL0003.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL0005.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL0006.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL0497.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL1461.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL1572.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL2126.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL2129.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL2295.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL2360.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL3643.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\english\~WRL0993.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\english\~WRL3558.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL0001.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL0002.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL0003.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL0004.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL0822.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL1482.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL1627.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL2300.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL3396.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL3542.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL3677.tmp
    C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL3890.tmp
    C:\Documents and Settings\Administrator\Local Settings\Temp\Off2.tmp
    C:\Documents and Settings\Administrator\Local Settings\Temp\Off2h.tmp
    C:\Documents and Settings\Administrator\Local Settings\Temp\Off2s.tmp
    C:\Documents and Settings\Administrator\Local Settings\Temp\Off5Bh.tmp
    C:\Documents and Settings\Administrator\Local Settings\Temp\Off5Bs.tmp
    C:\Documents and Settings\Administrator\Local Settings\Temp\Officeh.tmp
    C:\Documents and Settings\Administrator\Local Settings\Temp\Offices.tmp
    C:\Documents and Settings\Administrator\My Documents\My Received Files\~WRL1736.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc100.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc101.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc102.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc103.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc104.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc105.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc106.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc107.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc108.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc109.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc110.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc111.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc112.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc17.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc18.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc19.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc20.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc21.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc24.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc25.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc26.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc27.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc28.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc29.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc30.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc31.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc32.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc33.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc75.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc78.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc79.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc80.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc87.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc88.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc89.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc90.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc91.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc92.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc93.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc94.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc95.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc96.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc97.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc98.tmp
    C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc99.tmp
    C:\WINDOWS\LastGood.Tmp\INF\oem0.inf
    C:\WINDOWS\LastGood.Tmp\INF\oem0.PNF
    C:\WINDOWS\LastGood.Tmp\INF\oem1.inf
    C:\WINDOWS\LastGood.Tmp\INF\oem1.PNF

    Finished

    SAS report:

    SUPERAntiSpyware Scan Log
    Generated 02/11/2007 at 10:55 AM

    Application Version : 3.5.1016

    Core Rules Database Version : 3182
    Trace Rules Database Version: 1192

    Scan type : Complete Scan
    Total Scan Time : 00:23:46

    Memory items scanned : 360
    Memory threats detected : 1
    Registry items scanned : 4303
    Registry threats detected : 6
    File items scanned : 29399
    File threats detected : 41

    Bogus MS SVCHOST.EXE
    C:\WINDOWS\SYSTEM32\SVCH0ST.EXE
    C:\WINDOWS\SYSTEM32\SVCH0ST.EXE
    C:\WINDOWS\Prefetch\SVCH0ST.EXE-0A302197.pf

    Trojan.JBLoader
    HKLM\Software\Classes\CLSID\{55667788-ABCD-1234-5678-00C04FD8DBD8}
    HKCR\CLSID\{55667788-ABCD-1234-5678-00C04FD8DBD8}
    HKCR\CLSID\{55667788-ABCD-1234-5678-00C04FD8DBD8}
    HKCR\CLSID\{55667788-ABCD-1234-5678-00C04FD8DBD8}\InprocServer32
    HKCR\CLSID\{55667788-ABCD-1234-5678-00C04FD8DBD8}\InprocServer32#ThreadingModel
    C:\WINDOWS\SYSTEM32\JBLOADER.DLL
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks#{55667788-ABCD-1234-5678-00C04FD8DBD8}

    Adware.Tracking Cookie
    C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][3].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
    C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt

    Final HJT log:

    Logfile of HijackThis v1.99.1
    Scan saved at 11:02:58, on 11/02/2007
    Platform: Windows XP (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 (6.00.2600.0000)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\SOUNDMAN.EXE
    C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\WINDOWS\System32\wwww.exe
    C:\WINDOWS\System32\ctfmon.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    C:\WINDOWS\System32\DllHost.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINDOWS\System32\nvsvc32.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\WINDOWS\System32\wuauclt.exe
    C:\WINDOWS\System32\wuauclt.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Documents and Settings\Administrator\Desktop\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.soccernet.com/
    O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [SW20] C:\WINDOWS\System32\sw20.exe
    O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\System32\NvMcTray.dll,NvTaskbarInit
    O4 - HKLM\..\Run: [pccguide.exe] "C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe"
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [IMJPMIG8.1] C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE /Spoil /RemAdvDef /Migration32
    O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\System32\IME\PINTLGNT\ImScInst.exe /SYNC
    O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\System32\IME\TINTLGNT\TINTSETP.EXE /SYNC
    O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\System32\IME\TINTLGNT\TINTSETP.EXE /IMEName
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [tavpes] C:\WINDOWS\System32\wwww.exe
    O4 - HKCU\..\Run: [ares] "C:\Program Files\Ares\Ares.exe" -h
    O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\ctfmon.exe
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
    O23 - Service: Trend Micro Central Control Component (PcCtlCom) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    O23 - Service: Trend Micro Real-time Service (Tmntsrv) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe

    Please advise if necessary. Thanks for all your help, much appreciated.

    Regards
    tkh
     
  4. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Empty the recycle bin
    ==============
    DownLoad EasyCleaner http://www.majorgeeks.com/download414.html

    Use the clear files and Unnecessary files buttons – I do not recommend
    using the Duplicates files button
    as many dupes are there on purpose.

    Not all files will delete – that is normal.

    In the unnecessary button I check the top 4 entries
    =======================
    Run ActiveScan online virus scan

    http://www.pandasoftware.com/products/activescan.htm

    When the scan completes, if anything malicious is detected, click the See Report button, then Save Report and save it to a convenient location. Post the contents of the ActiveScan report

    Post a new HiJackThis log along with the results from ActiveScan
     
As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/542818

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice