HJT log pls take a look

Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

tkh

Thread Starter
Joined
Jan 10, 2004
Messages
138
Hi guys, recently found that my sis's comp has been running slow. Suspected that it might be due to trojans, I did a scan using S&D and Lavasoft and true enough it did turn up some tojans which I removed.

To be on the safe side, I did a HJT log to see check to see if there was any perculiarites. Please advise as necessary. Thanks

Logfile of HijackThis v1.99.1
Scan saved at 20:12:48, on 10/02/2007
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 (6.00.2600.0000)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
C:\WINDOWS\System32\SVCH0ST.EXE
C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Microsoft\svhost32.exe
C:\WINDOWS\System32\system43.exe
C:\WINDOWS\System32\wwww.exe
C:\Program Files\Ares\Ares.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\System32\DllHost.exe
C:\WINDOWS\System32\wuauclt.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Documents and Settings\Administrator\Desktop\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.soccernet.com/
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [SW20] C:\WINDOWS\System32\sw20.exe
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\System32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [pccguide.exe] "C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe"
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [IMJPMIG8.1] C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\System32\IME\PINTLGNT\ImScInst.exe /SYNC
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\System32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\System32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [ms] C:\Program Files\Microsoft\svhost32.exe
O4 - HKLM\..\Run: [system43.exe] C:\WINDOWS\System32\system43.exe
O4 - HKLM\..\Run: [tavpes] C:\WINDOWS\System32\wwww.exe
O4 - HKCU\..\Run: [ares] "C:\Program Files\Ares\Ares.exe" -h
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\ctfmon.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: Trend Micro Central Control Component (PcCtlCom) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
O23 - Service: Trend Micro Real-time Service (Tmntsrv) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe

Regards
tkh
 
Joined
Sep 7, 2004
Messages
49,014
I suggest you remove Ares and any other P2P programs as they are the likely source of the infections
=========
Download http://downloads.andymanchesta.com/RemovalTools/SDFix.exe and save it to your Desktop.

Double click SDFix.exe and it will extract the files to %systemdrive%
(Drive that contains the Windows Directory, typically C:\SDFix)

Please then reboot your computer in Safe Mode by doing the following :
· Restart your computer
· After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
· Instead of Windows loading as normal, the Advanced Options Menu should appear;
· Select the first option, to run Windows in Safe Mode, then press Enter.
· Choose your usual account.
· Open the extracted SDFix folder and double click RunThis.bat to start the script.
· Type Y to begin the cleanup process.
· It will remove any Trojan Services and Registry Entries that it finds then prompt you to press any key to Reboot.
· Press any Key and it will restart the PC.
· When the PC restarts the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
· Once the desktop icons load the SDFix report will open on screen and also save into the SDFix folder as Report.txt
(Report.txt will also be copied to Clipboard ready for posting back on the forum).
· Finally paste the contents of the Report.txt back on the forum with a new HijackThis log
====================

Download Superantispyware (SAS)

http://www.superantispyware.com/superantispywarefreevspro.html

Install it and double-click the icon on your desktop to run it.
· It will ask if you want to update the program definitions, click Yes.
· Under Configuration and Preferences, click the Preferences button.
· Click the Scanning Control tab.
· Under Scanner Options make sure the following are checked:
o Close browsers before scanning
o Scan for tracking cookies
o Terminate memory threats before quarantining.
o Please leave the others unchecked.
o Click the Close button to leave the control center screen.
· On the main screen, under Scan for Harmful Software click Scan your computer.
· On the left check C:\Fixed Drive.
· On the right, under Complete Scan, choose Perform Complete Scan.
· Click Next to start the scan. Please be patient while it scans your computer.
· After the scan is complete a summary box will appear. Click OK.
· Make sure everything in the white box has a check next to it, then click Next.
· It will quarantine what it found and if it asks if you want to reboot, click Yes.
· To retrieve the removal information for me please do the following:
o After reboot, double-click the SUPERAntispyware icon on your desktop.
o Click Preferences. Click the Statistics/Logs tab.
o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
o It will open in your default text editor (such as Notepad/Wordpad).
o Please highlight everything in the notepad, then right-click and choose copy.
· Click close and close again to exit the program.
· Please paste that information here for me with a new HijackThis log.
 

tkh

Thread Starter
Joined
Jan 10, 2004
Messages
138
Heya I followed your instructions and here are the various reports:

SDFix report:


SDFix: Version 1.64

Run by: Administrator - 11/02/2007 @ 10:23:53.45

Microsoft Windows XP [Version 5.1.2600]

Running From: C:\SDFix

Safe Mode:
Checking Services:

Name:

Path:


Restoring Windows Registry Entries
Restoring Default Hosts File


Rebooting...

Normal Mode:
Checking Files:

Below files will be copied to Backups folder then removed:

C:\Program Files\Microsoft\svhost32.exe - Deleted
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\svchost.exe - Deleted
C:\WINDOWS\system32\system43.exe - Deleted
C:\WINDOWS\system32\winsys.exe - Deleted

Could Not Remove C:\WINDOWS\system32\jbhook.dll
Could Not Remove C:\WINDOWS\system32\svch0st.exe


ADS Check:

C:\WINDOWS\system32
No streams found.

Final Check:



Remaining Files:
---------------
C:\WINDOWS\system32\jbhook.dll Found
C:\WINDOWS\system32\svch0st.exe Found

Backups Folder: - C:\SDFix\backups\backups.zip


Checking For Files with Hidden Attributes :

C:\WINDOWS\system32\jbloader.dll
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Shortcut Bar\Off2.tmp
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Shortcut Bar\Off2h.tmp
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Shortcut Bar\Off2s.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL0152.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL0512.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL0719.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL0945.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL1120.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL1239.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL1362.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL1706.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL2302.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL2537.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL2627.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL2725.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL3103.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL3183.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL3441.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL3802.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\rgtt\~WRL3876.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL0001.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL0003.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL0005.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL0006.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL0497.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL1461.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL1572.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL2126.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL2129.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL2295.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL2360.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\chemistry\~WRL3643.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\english\~WRL0993.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\english\~WRL3558.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL0001.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL0002.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL0003.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL0004.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL0822.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL1482.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL1627.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL2300.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL3396.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL3542.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL3677.tmp
C:\Documents and Settings\Administrator\Desktop\yiyun\Work\sln\~WRL3890.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Off2.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Off2h.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Off2s.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Off5Bh.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Off5Bs.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Officeh.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Offices.tmp
C:\Documents and Settings\Administrator\My Documents\My Received Files\~WRL1736.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc100.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc101.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc102.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc103.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc104.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc105.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc106.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc107.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc108.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc109.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc110.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc111.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc112.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc17.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc18.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc19.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc20.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc21.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc24.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc25.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc26.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc27.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc28.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc29.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc30.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc31.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc32.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc33.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc75.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc78.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc79.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc80.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc87.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc88.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc89.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc90.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc91.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc92.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc93.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc94.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc95.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc96.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc97.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc98.tmp
C:\RECYCLER\S-1-5-21-861567501-1284227242-839522115-500\Dc99.tmp
C:\WINDOWS\LastGood.Tmp\INF\oem0.inf
C:\WINDOWS\LastGood.Tmp\INF\oem0.PNF
C:\WINDOWS\LastGood.Tmp\INF\oem1.inf
C:\WINDOWS\LastGood.Tmp\INF\oem1.PNF

Finished

SAS report:

SUPERAntiSpyware Scan Log
Generated 02/11/2007 at 10:55 AM

Application Version : 3.5.1016

Core Rules Database Version : 3182
Trace Rules Database Version: 1192

Scan type : Complete Scan
Total Scan Time : 00:23:46

Memory items scanned : 360
Memory threats detected : 1
Registry items scanned : 4303
Registry threats detected : 6
File items scanned : 29399
File threats detected : 41

Bogus MS SVCHOST.EXE
C:\WINDOWS\SYSTEM32\SVCH0ST.EXE
C:\WINDOWS\SYSTEM32\SVCH0ST.EXE
C:\WINDOWS\Prefetch\SVCH0ST.EXE-0A302197.pf

Trojan.JBLoader
HKLM\Software\Classes\CLSID\{55667788-ABCD-1234-5678-00C04FD8DBD8}
HKCR\CLSID\{55667788-ABCD-1234-5678-00C04FD8DBD8}
HKCR\CLSID\{55667788-ABCD-1234-5678-00C04FD8DBD8}
HKCR\CLSID\{55667788-ABCD-1234-5678-00C04FD8DBD8}\InprocServer32
HKCR\CLSID\{55667788-ABCD-1234-5678-00C04FD8DBD8}\InprocServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\JBLOADER.DLL
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks#{55667788-ABCD-1234-5678-00C04FD8DBD8}

Adware.Tracking Cookie
C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected]aonenetwork[1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][3].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Administrator\Cookies\[email protected][2].txt

Final HJT log:

Logfile of HijackThis v1.99.1
Scan saved at 11:02:58, on 11/02/2007
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 (6.00.2600.0000)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\WINDOWS\System32\wwww.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\WINDOWS\System32\DllHost.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\System32\wuauclt.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Administrator\Desktop\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.soccernet.com/
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [SW20] C:\WINDOWS\System32\sw20.exe
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\System32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [pccguide.exe] "C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe"
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [IMJPMIG8.1] C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\System32\IME\PINTLGNT\ImScInst.exe /SYNC
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\System32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\System32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [tavpes] C:\WINDOWS\System32\wwww.exe
O4 - HKCU\..\Run: [ares] "C:\Program Files\Ares\Ares.exe" -h
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: Trend Micro Central Control Component (PcCtlCom) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
O23 - Service: Trend Micro Real-time Service (Tmntsrv) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe

Please advise if necessary. Thanks for all your help, much appreciated.

Regards
tkh
 
Joined
Sep 7, 2004
Messages
49,014
Empty the recycle bin
==============
DownLoad EasyCleaner http://www.majorgeeks.com/download414.html

Use the clear files and Unnecessary files buttons – I do not recommend
using the Duplicates files button
as many dupes are there on purpose.

Not all files will delete – that is normal.

In the unnecessary button I check the top 4 entries
=======================
Run ActiveScan online virus scan

http://www.pandasoftware.com/products/activescan.htm

When the scan completes, if anything malicious is detected, click the See Report button, then Save Report and save it to a convenient location. Post the contents of the ActiveScan report

Post a new HiJackThis log along with the results from ActiveScan
 
Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 807,865 other people just like you!

Latest posts

Staff online

Members online

Top