1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

need help removing a Trojan-spy [email protected]

Discussion in 'Virus & Other Malware Removal' started by 89SiR, Jul 15, 2007.

Thread Status:
Not open for further replies.
Advertisement
  1. 89SiR

    89SiR Thread Starter

    Joined:
    Jul 15, 2007
    Messages:
    7
    Please help. I'm not sure what to check for HJT to remove. Here is the current log file. Can a mod please help out?

    Any help is much appreciated.

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 11:19:46 AM, on 7/15/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Safe mode

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\rundll32.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://securityresponse.symantec.com/avcenter/expanded_threats/virus_worm_trojan_horse.html
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    R3 - Default URLSearchHook is missing
    O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\System32\spool\drivers\w32x86\3\hpztsb06.exe
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
    O4 - HKCU\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe
    O4 - HKCU\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE
    O4 - HKLM\..\Policies\Explorer\Run: [rare] C:\Program Files\Video ActiveX Access\imsmain.exe
    O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
    O4 - Global Startup: Adobe Gamma Loader.exe.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
    O4 - Global Startup: NkvMon.exe.lnk = C:\Program Files\Nikon\NkView6\NkvMon.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O12 - Plugin for .pdf: C:\Program Files\Internet Explorer\PLUGINS\nppdf32.dll
    O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://groups.msn.com/controls/PhotoUC/MsnPUpld.cab
    O22 - SharedTaskScheduler: firstlings - {9af8f31b-b778-4413-b8ed-ae63a62e1f7d} - C:\WINDOWS\system32\wfcof.dll (file missing)
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
    O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: System Startup Service (SvcProc) - Unknown owner - C:\WINDOWS\svcproc.exe (file missing)

    --
    End of file - 3529 bytes
     
  2. 89SiR

    89SiR Thread Starter

    Joined:
    Jul 15, 2007
    Messages:
    7
    also here is my normal boot mode log if it helps out any.

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 11:37:26 AM, on 7/15/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
    C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
    C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Video ActiveX Access\imsmain.exe
    C:\WINDOWS\System32\spool\drivers\w32x86\3\hpztsb06.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
    C:\Program Files\MySpace\IM\MySpaceIM.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\Video ActiveX Access\imsmn.exe
    C:\Program Files\Nikon\NkView6\NkvMon.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\System32\spool\drivers\w32x86\3\hpztsb06.exe
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe
    O4 - HKLM\..\Policies\Explorer\Run: [rare] C:\Program Files\Video ActiveX Access\imsmain.exe
    O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
    O4 - Global Startup: Adobe Gamma Loader.exe.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
    O4 - Global Startup: NkvMon.exe.lnk = C:\Program Files\Nikon\NkView6\NkvMon.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra button: (no name) - {6685509E-B47B-4f47-8E16-9A5F3A62F683} - file://C:\Program Files\Ebates_MoeMoneyMaker\Sy350\Tp350\scri350a.htm (file missing) (HKCU)
    O12 - Plugin for .pdf: C:\Program Files\Internet Explorer\PLUGINS\nppdf32.dll
    O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://groups.msn.com/controls/PhotoUC/MsnPUpld.cab
    O22 - SharedTaskScheduler: firstlings - {9af8f31b-b778-4413-b8ed-ae63a62e1f7d} - C:\WINDOWS\system32\wfcof.dll (file missing)
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
    O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: System Startup Service (SvcProc) - Unknown owner - C:\WINDOWS\svcproc.exe (file missing)

    --
    End of file - 3990 bytes
     
  3. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Always post HiJack logs from normal mode unless directed otherwise

    You should print out these instructions, or copy them to a NotePad file for reading while in Safe Mode, because you will not be able to connect to the Internet to read from this site.

    Please download SmitfraudFix (by S!Ri)
    Extract the content (a folder named SmitfraudFix) to your Desktop.

    Next, please reboot your computer in Safe Mode by doing the following :
    • Restart your computer
    • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
    • Instead of Windows loading as normal, a menu with options should appear;
    • Select the first option, to run Windows in Safe Mode, then press "Enter".
    • Choose your usual account.
    Once in Safe Mode, open the SmitfraudFix folder again and double-click smitfraudfix.cmd
    Select option #2 - Clean by typing 2 and press "Enter" to delete infected files.

    You will be prompted: "Registry cleaning - Do you want to clean the registry?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.

    The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".

    The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart it into Normal Windows.

    A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply along with a new hijack log.

    The report can also be found at the root of the system drive, usually at C:\rapport.txt

    Warning: running option #2 on a non infected computer will remove your Desktop background.

    =================

    Download Superantispyware (SAS) free home version

    http://www.superantispyware.com/superantispywarefreevspro.html

    Install it and double-click the icon on your desktop to run it.
    · It will ask if you want to update the program definitions, click Yes.
    · Under Configuration and Preferences, click the Preferences button.
    · Click the Scanning Control tab.
    · Under Scanner Options make sure the following are checked:
    o Close browsers before scanning
    o Scan for tracking cookies
    o Terminate memory threats before quarantining.
    o Please leave the others unchecked.
    o Click the Close button to leave the control center screen.
    · On the main screen, under Scan for Harmful Software click Scan your computer.
    · On the left check C:\Fixed Drive.
    · On the right, under Complete Scan, choose Perform Complete Scan.
    · Click Next to start the scan. Please be patient while it scans your computer.
    · After the scan is complete a summary box will appear. Click OK.
    · Make sure everything in the white box has a check next to it, then click Next.
    · It will quarantine what it found and if it asks if you want to reboot, click Yes.
    · To retrieve the removal information for me please do the following:
    o After reboot, double-click the SUPERAntispyware icon on your desktop.
    o Click Preferences. Click the Statistics/Logs tab.
    o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    o It will open in your default text editor (such as Notepad/Wordpad).
    o Please highlight everything in the notepad, then right-click and choose copy.
    · Click close and close again to exit the program.
    · Please paste that information here for me with a new HijackThis log.

    This will take some time!!!!!!!!
     
  4. 89SiR

    89SiR Thread Starter

    Joined:
    Jul 15, 2007
    Messages:
    7
    will do! thanks for the quick reply! I'll post up as soon as I get the results.
     
  5. 89SiR

    89SiR Thread Starter

    Joined:
    Jul 15, 2007
    Messages:
    7
    Okay here is the rapport file.

    SmitFraudFix v2.204

    Scan done at 12:20:52.98, Sun 07/15/2007
    Run from C:\Documents and Settings\Sheila\Desktop\SmitfraudFix\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    The filesystem type is NTFS
    Fix run in safe mode

    »»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
    "{9af8f31b-b778-4413-b8ed-ae63a62e1f7d}"="firstlings"

    [HKEY_CLASSES_ROOT\CLSID\{9af8f31b-b778-4413-b8ed-ae63a62e1f7d}\InProcServer32]
    @="C:\WINDOWS\system32\wfcof.dll"

    [HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{9af8f31b-b778-4413-b8ed-ae63a62e1f7d}\InProcServer32]
    @="C:\WINDOWS\system32\wfcof.dll"


    »»»»»»»»»»»»»»»»»»»»»»»» Killing process


    »»»»»»»»»»»»»»»»»»»»»»»» hosts


    127.0.0.1 localhost

    »»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

    GenericRenosFix by S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files

    C:\Program Files\Video ActiveX Access\ Deleted
    C:\Program Files\VirusProtectPro 3.3\ Deleted

    »»»»»»»»»»»»»»»»»»»»»»»» DNS

    HKLM\SYSTEM\CCS\Services\Tcpip\..\{3F344244-163D-435E-A7AE-B35174CAA209}: DhcpNameServer=74.128.1.31 74.128.1.33
    HKLM\SYSTEM\CS1\Services\Tcpip\..\{3F344244-163D-435E-A7AE-B35174CAA209}: DhcpNameServer=74.128.1.31 74.128.1.33
    HKLM\SYSTEM\CS3\Services\Tcpip\..\{3F344244-163D-435E-A7AE-B35174CAA209}: DhcpNameServer=74.128.1.31 74.128.1.33
    HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=74.128.1.31 74.128.1.33
    HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=74.128.1.31 74.128.1.33
    HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=74.128.1.31 74.128.1.33


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


    »»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "System"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

    Registry Cleaning done.

    »»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll


    »»»»»»»»»»»»»»»»»»»»»»»» End



    And here is the new HJT log file.

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 12:30:08 PM, on 7/15/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\System32\spool\drivers\w32x86\3\hpztsb06.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
    C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
    C:\Program Files\MySpace\IM\MySpaceIM.exe
    C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
    C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
    C:\Program Files\Nikon\NkView6\NkvMon.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\System32\spool\drivers\w32x86\3\hpztsb06.exe
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe
    O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
    O4 - Global Startup: Adobe Gamma Loader.exe.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
    O4 - Global Startup: NkvMon.exe.lnk = C:\Program Files\Nikon\NkView6\NkvMon.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra button: (no name) - {6685509E-B47B-4f47-8E16-9A5F3A62F683} - file://C:\Program Files\Ebates_MoeMoneyMaker\Sy350\Tp350\scri350a.htm (file missing) (HKCU)
    O12 - Plugin for .pdf: C:\Program Files\Internet Explorer\PLUGINS\nppdf32.dll
    O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://groups.msn.com/controls/PhotoUC/MsnPUpld.cab
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
    O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: System Startup Service (SvcProc) - Unknown owner - C:\WINDOWS\svcproc.exe (file missing)

    --
    End of file - 3623 bytes
     
  6. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Keep going, do all of my post!!
     
  7. 89SiR

    89SiR Thread Starter

    Joined:
    Jul 15, 2007
    Messages:
    7
    Sorry, I misunderstood your first post. I thought Option #2 was well...optional. But anyway here is the logfile from SuperAnti Spyware along with a new HJT logfile.

    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 07/15/2007 at 06:31 PM

    Application Version : 3.9.1008

    Core Rules Database Version : 3269
    Trace Rules Database Version: 1280

    Scan type : Complete Scan
    Total Scan Time : 05:39:26

    Memory items scanned : 171
    Memory threats detected : 0
    Registry items scanned : 3735
    Registry threats detected : 95
    File items scanned : 109294
    File threats detected : 352

    Adware.Tracking Cookie
    C:\Documents and Settings\Sheila\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sheila\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sheila\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sheila\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sheila\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sheila\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sheila\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sheila\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sheila\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sheila\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][2].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Local Settings\Temp\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Local Settings\Temp\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Local Settings\Temp\Cookies\[email protected][1].txt
    C:\Documents and Settings\Carley\Local Settings\Temp\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Local Settings\Temp\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Local Settings\Temp\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Local Settings\Temp\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Local Settings\Temp\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Local Settings\Temp\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Local Settings\Temp\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Local Settings\Temp\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sam\Cookies\[email protected][1].txt

    Spyware.WebSearch (WinTools/Huntbar)
    C:\Program Files\Common Files\WinTools\rezasc.wzg
    C:\Program Files\Common Files\WinTools\rmhgxlmu.wzg
    C:\Program Files\Common Files\WinTools\temp
    C:\Program Files\Common Files\WinTools\Update
    C:\Program Files\Common Files\WinTools\WToolsB.dll
    C:\Program Files\Common Files\WinTools\WToolsC.cfg
    C:\Program Files\Common Files\WinTools\WToolsD.cfg
    C:\Program Files\Common Files\WinTools\WToolsP.cfg
    C:\Program Files\Common Files\WinTools\WToolsS.exe
    C:\Program Files\Common Files\WinTools

    Registry Cleaner Trial
    HKCR\Install.Install
    HKCR\Install.Install\CLSID
    HKCR\Install.Install\CurVer
    HKCR\Install.Install.1
    HKCR\Install.Install.1\CLSID
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs#C:\WINDOWS\Downloaded Program Files\Install.dll [  ]

    Adware.MyWay
    C:\Program Files\MyWay\myBar\1.bin\MY2NS.EXE
    C:\Program Files\MyWay\myBar\1.bin\MYWAYPLUGINPROXY.CLASS
    C:\Program Files\MyWay\myBar\1.bin\PARTNER.BMP
    C:\Program Files\MyWay\myBar\1.bin\PARTNER.DAT
    C:\Program Files\MyWay\myBar\1.bin\PARTNER2.DAT
    C:\Program Files\MyWay\myBar\1.bin\PARTNER3.DAT
    C:\Program Files\MyWay\myBar\1.bin\PARTNER4.DAT
    C:\Program Files\MyWay\myBar\1.bin\PARTNER5.DAT
    C:\Program Files\MyWay\myBar\1.bin\PARTNER6.DAT
    C:\Program Files\MyWay\myBar\1.bin\UNINSTALL.INF
    C:\Program Files\MyWay\myBar\1.bin
    C:\Program Files\MyWay\myBar\Cache\04C60789.bmp
    C:\Program Files\MyWay\myBar\Cache\04C61C5A.bmp
    C:\Program Files\MyWay\myBar\Cache\04C61FD4.bmp
    C:\Program Files\MyWay\myBar\Cache
    C:\Program Files\MyWay\myBar\History\search
    C:\Program Files\MyWay\myBar\History
    C:\Program Files\MyWay\myBar\Settings
    C:\Program Files\MyWay\myBar
    C:\Program Files\MyWay

    Trojan.Media-Codec/V3
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Internet Explorer Secure Bar
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Internet Explorer Secure Bar#DisplayName
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Internet Explorer Secure Bar#UninstallString

    Malware.VirusProtectPro
    HKCR\TypeLib\{3FB89201-04DE-4430-B5C6-FD57EA654E56}
    HKCR\TypeLib\{3FB89201-04DE-4430-B5C6-FD57EA654E56}\1.0
    HKCR\TypeLib\{3FB89201-04DE-4430-B5C6-FD57EA654E56}\1.0\0
    HKCR\TypeLib\{3FB89201-04DE-4430-B5C6-FD57EA654E56}\1.0\0\win32
    HKCR\TypeLib\{3FB89201-04DE-4430-B5C6-FD57EA654E56}\1.0\FLAGS
    HKCR\TypeLib\{3FB89201-04DE-4430-B5C6-FD57EA654E56}\1.0\HELPDIR
    HKCR\Interface\{057299D6-7EDB-47B8-934C-ED17535A501C}
    HKCR\Interface\{057299D6-7EDB-47B8-934C-ED17535A501C}\ProxyStubClsid
    HKCR\Interface\{057299D6-7EDB-47B8-934C-ED17535A501C}\ProxyStubClsid32
    HKCR\Interface\{057299D6-7EDB-47B8-934C-ED17535A501C}\TypeLib
    HKCR\Interface\{057299D6-7EDB-47B8-934C-ED17535A501C}\TypeLib#Version
    HKCR\Interface\{1C54613A-A5EC-461B-9643-6F18598036A8}
    HKCR\Interface\{1C54613A-A5EC-461B-9643-6F18598036A8}\ProxyStubClsid
    HKCR\Interface\{1C54613A-A5EC-461B-9643-6F18598036A8}\ProxyStubClsid32
    HKCR\Interface\{1C54613A-A5EC-461B-9643-6F18598036A8}\TypeLib
    HKCR\Interface\{1C54613A-A5EC-461B-9643-6F18598036A8}\TypeLib#Version
    HKCR\Interface\{321FE2F3-D621-4FC2-97E6-F03B1E106163}
    HKCR\Interface\{321FE2F3-D621-4FC2-97E6-F03B1E106163}\ProxyStubClsid
    HKCR\Interface\{321FE2F3-D621-4FC2-97E6-F03B1E106163}\ProxyStubClsid32
    HKCR\Interface\{321FE2F3-D621-4FC2-97E6-F03B1E106163}\TypeLib
    HKCR\Interface\{321FE2F3-D621-4FC2-97E6-F03B1E106163}\TypeLib#Version
    HKCR\Interface\{3510AA0D-C620-42A7-BCA4-5424E887BFBE}
    HKCR\Interface\{3510AA0D-C620-42A7-BCA4-5424E887BFBE}\ProxyStubClsid
    HKCR\Interface\{3510AA0D-C620-42A7-BCA4-5424E887BFBE}\ProxyStubClsid32
    HKCR\Interface\{3510AA0D-C620-42A7-BCA4-5424E887BFBE}\TypeLib
    HKCR\Interface\{3510AA0D-C620-42A7-BCA4-5424E887BFBE}\TypeLib#Version
    HKCR\Interface\{3E4FBCA2-CF8F-4897-AC8B-AD3FB68DD794}
    HKCR\Interface\{3E4FBCA2-CF8F-4897-AC8B-AD3FB68DD794}\ProxyStubClsid
    HKCR\Interface\{3E4FBCA2-CF8F-4897-AC8B-AD3FB68DD794}\ProxyStubClsid32
    HKCR\Interface\{3E4FBCA2-CF8F-4897-AC8B-AD3FB68DD794}\TypeLib
    HKCR\Interface\{3E4FBCA2-CF8F-4897-AC8B-AD3FB68DD794}\TypeLib#Version
    HKCR\Interface\{423E470A-EFEC-4B61-80DF-7CEBAEA33912}
    HKCR\Interface\{423E470A-EFEC-4B61-80DF-7CEBAEA33912}\ProxyStubClsid
    HKCR\Interface\{423E470A-EFEC-4B61-80DF-7CEBAEA33912}\ProxyStubClsid32
    HKCR\Interface\{423E470A-EFEC-4B61-80DF-7CEBAEA33912}\TypeLib
    HKCR\Interface\{423E470A-EFEC-4B61-80DF-7CEBAEA33912}\TypeLib#Version
    HKCR\Interface\{465CD1AB-1A0E-4644-A818-4EEA483137F1}
    HKCR\Interface\{465CD1AB-1A0E-4644-A818-4EEA483137F1}\ProxyStubClsid
    HKCR\Interface\{465CD1AB-1A0E-4644-A818-4EEA483137F1}\ProxyStubClsid32
    HKCR\Interface\{465CD1AB-1A0E-4644-A818-4EEA483137F1}\TypeLib
    HKCR\Interface\{465CD1AB-1A0E-4644-A818-4EEA483137F1}\TypeLib#Version
    HKCR\Interface\{48F5A09E-1F9A-45F6-9028-D3D4AF690727}
    HKCR\Interface\{48F5A09E-1F9A-45F6-9028-D3D4AF690727}\ProxyStubClsid
    HKCR\Interface\{48F5A09E-1F9A-45F6-9028-D3D4AF690727}\ProxyStubClsid32
    HKCR\Interface\{48F5A09E-1F9A-45F6-9028-D3D4AF690727}\TypeLib
    HKCR\Interface\{48F5A09E-1F9A-45F6-9028-D3D4AF690727}\TypeLib#Version
    HKCR\Interface\{9946C825-9E64-4CBB-99C3-D853A4CCB6D5}
    HKCR\Interface\{9946C825-9E64-4CBB-99C3-D853A4CCB6D5}\ProxyStubClsid
    HKCR\Interface\{9946C825-9E64-4CBB-99C3-D853A4CCB6D5}\ProxyStubClsid32
    HKCR\Interface\{9946C825-9E64-4CBB-99C3-D853A4CCB6D5}\TypeLib
    HKCR\Interface\{9946C825-9E64-4CBB-99C3-D853A4CCB6D5}\TypeLib#Version
    HKCR\Interface\{9B3F8419-B82F-439C-8D5C-0CF7B9AE00AA}
    HKCR\Interface\{9B3F8419-B82F-439C-8D5C-0CF7B9AE00AA}\ProxyStubClsid
    HKCR\Interface\{9B3F8419-B82F-439C-8D5C-0CF7B9AE00AA}\ProxyStubClsid32
    HKCR\Interface\{9B3F8419-B82F-439C-8D5C-0CF7B9AE00AA}\TypeLib
    HKCR\Interface\{9B3F8419-B82F-439C-8D5C-0CF7B9AE00AA}\TypeLib#Version
    HKCR\Interface\{AEF1CB9F-75C1-43D0-944D-773BEB807C4E}
    HKCR\Interface\{AEF1CB9F-75C1-43D0-944D-773BEB807C4E}\ProxyStubClsid
    HKCR\Interface\{AEF1CB9F-75C1-43D0-944D-773BEB807C4E}\ProxyStubClsid32
    HKCR\Interface\{AEF1CB9F-75C1-43D0-944D-773BEB807C4E}\TypeLib
    HKCR\Interface\{AEF1CB9F-75C1-43D0-944D-773BEB807C4E}\TypeLib#Version
    HKCR\Interface\{BDABFCDE-65AB-4FD8-9DD5-B250CABDC4B2}
    HKCR\Interface\{BDABFCDE-65AB-4FD8-9DD5-B250CABDC4B2}\ProxyStubClsid
    HKCR\Interface\{BDABFCDE-65AB-4FD8-9DD5-B250CABDC4B2}\ProxyStubClsid32
    HKCR\Interface\{BDABFCDE-65AB-4FD8-9DD5-B250CABDC4B2}\TypeLib
    HKCR\Interface\{BDABFCDE-65AB-4FD8-9DD5-B250CABDC4B2}\TypeLib#Version
    HKCR\Interface\{D74EB6F1-1C83-4D06-9DAC-B6BE82C5FE70}
    HKCR\Interface\{D74EB6F1-1C83-4D06-9DAC-B6BE82C5FE70}\ProxyStubClsid
    HKCR\Interface\{D74EB6F1-1C83-4D06-9DAC-B6BE82C5FE70}\ProxyStubClsid32
    HKCR\Interface\{D74EB6F1-1C83-4D06-9DAC-B6BE82C5FE70}\TypeLib
    HKCR\Interface\{D74EB6F1-1C83-4D06-9DAC-B6BE82C5FE70}\TypeLib#Version
    HKCR\Interface\{EEBD5970-8E94-4E4D-A2C8-124CB9B5EBAC}
    HKCR\Interface\{EEBD5970-8E94-4E4D-A2C8-124CB9B5EBAC}\ProxyStubClsid
    HKCR\Interface\{EEBD5970-8E94-4E4D-A2C8-124CB9B5EBAC}\ProxyStubClsid32
    HKCR\Interface\{EEBD5970-8E94-4E4D-A2C8-124CB9B5EBAC}\TypeLib
    HKCR\Interface\{EEBD5970-8E94-4E4D-A2C8-124CB9B5EBAC}\TypeLib#Version
    HKCR\Interface\{F928FA33-FDF8-4332-A626-CA9F7D12E5AD}
    HKCR\Interface\{F928FA33-FDF8-4332-A626-CA9F7D12E5AD}\ProxyStubClsid
    HKCR\Interface\{F928FA33-FDF8-4332-A626-CA9F7D12E5AD}\ProxyStubClsid32
    HKCR\Interface\{F928FA33-FDF8-4332-A626-CA9F7D12E5AD}\TypeLib
    HKCR\Interface\{F928FA33-FDF8-4332-A626-CA9F7D12E5AD}\TypeLib#Version
    HKCR\Interface\{FFA41A18-F50E-459E-80B7-6EA78AD9D365}
    HKCR\Interface\{FFA41A18-F50E-459E-80B7-6EA78AD9D365}\ProxyStubClsid
    HKCR\Interface\{FFA41A18-F50E-459E-80B7-6EA78AD9D365}\ProxyStubClsid32
    HKCR\Interface\{FFA41A18-F50E-459E-80B7-6EA78AD9D365}\TypeLib
    HKCR\Interface\{FFA41A18-F50E-459E-80B7-6EA78AD9D365}\TypeLib#Version
    C:\RECYCLER\NPROTECT\00099418.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{3434ED23-A3FE-42CF-B3C1-E85D796D0D1C}\RP1007\A0116066.EXE

    Browser Hijacker.Favorites
    C:\DOCUMENTS AND SETTINGS\CARLEY\FAVORITES\ONLINE SECURITY TEST.URL
    C:\RECYCLER\NPROTECT\00099432.URL
    C:\RECYCLER\NPROTECT\00099433.URL
    C:\RECYCLER\NPROTECT\00100298.URL
    C:\RECYCLER\NPROTECT\00100299.URL

    Adware.Avenue Media/Web Rebates (TopRebates)
    C:\DOCUMENTS AND SETTINGS\CARLEY\LOCAL SETTINGS\TEMP\DJTOPR1150.EXE

    Trojan.Downloader-JKill
    C:\DOCUMENTS AND SETTINGS\CARLEY\LOCAL SETTINGS\TEMP\JKILL.EXE

    Adware.HotBar (Low Risk)
    C:\PROGRAM FILES\HOTBAR\BIN\4.0.8.0\HBINST.EXE
    C:\PROGRAM FILES\HOTBAR\BIN\4.0.8.0\HBSRV.EXE
    C:\PROGRAM FILES\HOTBAR\BIN\4.0.9.0\HBINST.EXE
    C:\PROGRAM FILES\HOTBAR\BIN\HBINST.EXE

    Trojan.Unknown Origin
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{3434ED23-A3FE-42CF-B3C1-E85D796D0D1C}\RP1007\A0116064.ICO
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{3434ED23-A3FE-42CF-B3C1-E85D796D0D1C}\RP1007\A0116065.ICO

    Adware.eXactAdvertising-Installer
    C:\WINDOWS\ENHTB.EXE

    Trace.Known Threat Sources
    C:\Documents and Settings\Carley\Local Settings\Temporary Internet Files\Content.IE5\SLQF8T2Z\how[1].gif
    C:\Documents and Settings\Carley\Local Settings\Temporary Internet Files\Content.IE5\ER4VTMJU\top_head[1].gif
    C:\Documents and Settings\Carley\Local Settings\Temporary Internet Files\Content.IE5\0PIFWPQ7\button_buy_now[1].gif
    C:\Documents and Settings\Carley\Local Settings\Temporary Internet Files\Content.IE5\0PIFWPQ7\menu_right[1].gif
    C:\Documents and Settings\Carley\Local Settings\Temporary Internet Files\Content.IE5\8D2JSLMV\menu_left[1].gif
    C:\Documents and Settings\Carley\Local Settings\Temporary Internet Files\Content.IE5\ER4VTMJU\dbver[1].dat
    C:\Documents and Settings\Carley\Local Settings\Temporary Internet Files\Content.IE5\SLQF8T2Z\style[1].css
    C:\Documents and Settings\Carley\Local Settings\Temporary Internet Files\Content.IE5\ER4VTMJU\icon_scanner[1].gif
    C:\Documents and Settings\Carley\Local Settings\Temporary Internet Files\Content.IE5\ER4VTMJU\virusprotectpro[1].htm
    C:\Documents and Settings\Carley\Local Settings\Temporary Internet Files\Content.IE5\0PIFWPQ7\main_fill[1].gif
    C:\Documents and Settings\Carley\Local Settings\Temporary Internet Files\Content.IE5\SLQF8T2Z\icon_update[1].gif
    C:\Documents and Settings\Carley\Local Settings\Temporary Internet Files\Content.IE5\ER4VTMJU\menu_fill[1].gif
    C:\Documents and Settings\Carley\Local Settings\Temporary Internet Files\Content.IE5\8D2JSLMV\freescan_button[1].gif
    C:\Documents and Settings\Carley\Local Settings\Temporary Internet Files\Content.IE5\8D2JSLMV\main_features[1].gif
    C:\Documents and Settings\Carley\Local Settings\Temporary Internet Files\Content.IE5\SLQF8T2Z\protect[1].gif
    C:\Documents and Settings\Carley\Local Settings\Temporary Internet Files\Content.IE5\0PIFWPQ7\footer[1].gif
    C:\Documents and Settings\Carley\Local Settings\Temporary Internet Files\Content.IE5\0PIFWPQ7\button_download[1].gif
    C:\Documents and Settings\Carley\Local Settings\Temporary Internet Files\Content.IE5\8D2JSLMV\icon_shield[1].gif
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\G651Q677\top1_menu[1].gif
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\G651Q677\checksoft[1].js
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\X65ZUKTZ\download[1].gif
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\G651Q677\shield-small[1].gif
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\OD6F8DIJ\ico1[1].gif
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\RLTMZXJP\top_pic2[1].gif
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\RLTMZXJP\table-3[1].gif
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\G651Q677\side-left[1].jpg
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\X65ZUKTZ\shield[1].gif
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\X65ZUKTZ\test[1].gif
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\G651Q677\small-part-b[1].jpg
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\G651Q677\button2[1].gif
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\X65ZUKTZ\logo[2].gif
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\OD6F8DIJ\table-2[1].gif
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\X65ZUKTZ\small-part-c[1].jpg
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\RLTMZXJP\ico2[1].gif
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\RLTMZXJP\table-1[1].gif
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\OD6F8DIJ\index[14].htm
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\X65ZUKTZ\wav_banner[1].swf
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\G651Q677\index[14].htm
    C:\Documents and Settings\Sheila\Local Settings\Temporary Internet Files\Content.IE5\RLTMZXJP\top1[1].gif
     
  8. 89SiR

    89SiR Thread Starter

    Joined:
    Jul 15, 2007
    Messages:
    7
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 6:50:52 PM, on 7/15/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
    C:\WINDOWS\System32\spool\drivers\w32x86\3\hpztsb06.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
    C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
    C:\Program Files\MySpace\IM\MySpaceIM.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Nikon\NkView6\NkvMon.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\Windows NT\Accessories\wordpad.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\System32\spool\drivers\w32x86\3\hpztsb06.exe
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
    O4 - Global Startup: Adobe Gamma Loader.exe.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
    O4 - Global Startup: NkvMon.exe.lnk = C:\Program Files\Nikon\NkView6\NkvMon.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra button: (no name) - {6685509E-B47B-4f47-8E16-9A5F3A62F683} - file://C:\Program Files\Ebates_MoeMoneyMaker\Sy350\Tp350\scri350a.htm (file missing) (HKCU)
    O12 - Plugin for .pdf: C:\Program Files\Internet Explorer\PLUGINS\nppdf32.dll
    O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://groups.msn.com/controls/PhotoUC/MsnPUpld.cab
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
    O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: System Startup Service (SvcProc) - Unknown owner - C:\WINDOWS\svcproc.exe (file missing)

    --
    End of file - 3943 bytes
     
  9. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    When I post a fix, nothing is optional

    Fix these with HiJackThis – mark them, close IE, click fix checked

    O9 - Extra button: (no name) - {6685509E-B47B-4f47-8E16-9A5F3A62F683} - file://C:\Program Files\Ebates_MoeMoneyMaker\Sy350\Tp350\scri350a.htm (file missing) (HKCU)

    O23 - Service: System Startup Service (SvcProc) - Unknown owner - C:\WINDOWS\svcproc.exe (file missing)

    START – RUN – type in %temp% - OK - Edit – Select all – File – Delete

    Delete everything in the C:\Windows\Temp folder or C:\WINNT\temp

    Not all temp files will delete and that is normal
    Empty the recycle bin
    Boot and post a new hijack log from normal NOT safe mode

    Please give feedback on what worked/didn’t work and the current status of your system
     
  10. 89SiR

    89SiR Thread Starter

    Joined:
    Jul 15, 2007
    Messages:
    7
    Well, I've done all you requested and everything seems to have worked. I haven't gotten the Trojan message since running SuperAnti-Spyware.

    Here's my latest HJT log:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 2:30:09 PM, on 7/16/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
    C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
    C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
    C:\WINDOWS\System32\spool\drivers\w32x86\3\hpztsb06.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Nikon\NkView6\NkvMon.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\System32\spool\drivers\w32x86\3\hpztsb06.exe
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
    O4 - Global Startup: Adobe Gamma Loader.exe.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
    O4 - Global Startup: NkvMon.exe.lnk = C:\Program Files\Nikon\NkView6\NkvMon.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O12 - Plugin for .pdf: C:\Program Files\Internet Explorer\PLUGINS\nppdf32.dll
    O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://groups.msn.com/controls/PhotoUC/MsnPUpld.cab
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
    O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: System Startup Service (SvcProc) - Unknown owner - C:\WINDOWS\svcproc.exe (file missing)

    --
    End of file - 3587 bytes
     
  11. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    If left something out

    Fix this

    Fix these with HiJackThis – mark them, close IE, click fix checked

    O23 - Service: System Startup Service (SvcProc) - Unknown owner - C:\WINDOWS\svcproc.exe (file missing)


    Click Start > Run > and type in:

    services.msc

    Click OK.

    In the services window find this exact name

    System Startup Service

    Rightclick and choose "Properties". Beside "Startup Type" in the dropdown menu select "Disabled". On the "General" tab under "Service Status" click the "Stop" button to stop the service. Click Apply then OK. File-Exit the Services utility.
     
  12. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/596115

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice