1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

QoS

Discussion in 'Virus & Other Malware Removal' started by chauncey005, Feb 9, 2007.

Thread Status:
Not open for further replies.
Advertisement
  1. chauncey005

    chauncey005 Thread Starter

    Joined:
    Oct 15, 2004
    Messages:
    72
    Hello! Could someone please take a look at this HJT log? I cleaned what I could, but need your help in finishing it off. Thanks in advance.

    Logfile of HijackThis v1.99.1
    Scan saved at 9:00:12 AM, on 2/9/2007
    Platform: Windows 2000 SP4 (WinNT 5.00.2195)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINNT\System32\smss.exe
    C:\WINNT\system32\winlogon.exe
    C:\WINNT\system32\services.exe
    C:\WINNT\system32\lsass.exe
    C:\WINNT\system32\svchost.exe
    C:\WINNT\system32\spoolsv.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    C:\WINNT\System32\svchost.exe
    C:\WINNT\system32\MSTask.exe
    C:\WINNT\system32\stisvc.exe
    C:\WINNT\System32\WBEM\WinMgmt.exe
    C:\WINNT\system32\svchost.exe
    C:\WINNT\Explorer.EXE
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    C:\WINNT\system32\mobsync.exe
    C:\WINNT\system32\igfxtray.exe
    C:\WINNT\system32\hkcmd.exe
    C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
    C:\Program Files\PeoplePC\ISP6300\Browser\Bartshel.exe
    C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
    C:\Program Files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
    C:\PROGRA~1\PeoplePC\ISP6300\Browser\PPShared.exe
    C:\WINNT\system32\wuauclt.exe
    C:\Documents and Settings\Owner\Desktop\HijackThis.exe
    C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
    C:\Program Files\HP\Digital Imaging\Product Assistant\bin\hprblog.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://home.peoplepc.com/search
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://home.peoplepc.com/websearch
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://home.peoplepc.com/search
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://home.peoplepc.com/homepage
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://home.peoplepc.com/search
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O3 - Toolbar: @msdxmLC.dll,[email protected],&Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\System32\msdxm.ocx
    O3 - Toolbar: PeoplePal Toolbar - {A8FB8EB3-183B-4598-924D-86F0E5E37085} - C:\Program Files\PeoplePC\Toolbar\PPCToolbar.dll
    O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
    O4 - HKLM\..\Run: [AVG7_EMC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    O4 - HKLM\..\Run: [IgfxTray] C:\WINNT\system32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINNT\system32\hkcmd.exe
    O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
    O4 - HKLM\..\Run: [Quatro] C:\WINNT\SYSTEM32\peraljam.exe
    O4 - HKLM\..\Run: [Bart Station] C:\Program Files\PeoplePC\ISP6300\BIN\PPCOLink.exe -STATION
    O4 - HKLM\..\RunServices: [Beawver] saqevre.exe
    O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
    O4 - Global Startup: QuickBooks Update Agent.lnk = C:\Program Files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=48835
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1141001656057
    O20 - Winlogon Notify: avload32 - avload32.dll (file missing)
    O20 - Winlogon Notify: Extensions - C:\WINNT\system32\en28l1fu1.dll (file missing)
    O20 - Winlogon Notify: lgn1216a - C:\WINNT\SYSTEM32\lgn1216a.dll
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
    O23 - Service: mdn475 - Unknown owner - \\4.227.248.110\Admin$\mdn_251.exe (file missing)
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINNT\system32\HPZipm12.exe
    O23 - Service: QoS RSVP Service (RSVPService) - Unknown owner - C:\WINNT\system32\QoSService.exe (file missing)
     
  2. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    1. Download this file :

    http://download.bleepingcomputer.com/sUBs/combofix.exe
    http://www.techsupportforum.com/sectools/combofix.exe

    2. Double click combofix.exe & follow the prompts.
    3. When finished, it shall produce a log for you. Post that log and a HiJack log in your next reply

    Note:
    Do not mouseclick combofix's window while its running. That may cause it to stall
    ====================

    Download Superantispyware

    http://www.superantispyware.com/superantispywarefreevspro.html

    Install it and double-click the icon on your desktop to run it.
    · It will ask if you want to update the program definitions, click Yes.
    · Under Configuration and Preferences, click the Preferences button.
    · Click the Scanning Control tab.
    · Under Scanner Options make sure the following are checked:
    o Close browsers before scanning
    o Scan for tracking cookies
    o Terminate memory threats before quarantining.
    o Please leave the others unchecked.
    o Click the Close button to leave the control center screen.
    · On the main screen, under Scan for Harmful Software click Scan your computer.
    · On the left check C:\Fixed Drive.
    · On the right, under Complete Scan, choose Perform Complete Scan.
    · Click Next to start the scan. Please be patient while it scans your computer.
    · After the scan is complete a summary box will appear. Click OK.
    · Make sure everything in the white box has a check next to it, then click Next.
    · It will quarantine what it found and if it asks if you want to reboot, click Yes.
    · To retrieve the removal information for me please do the following:
    o After reboot, double-click the SUPERAntispyware icon on your desktop.
    o Click Preferences. Click the Statistics/Logs tab.
    o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    o It will open in your default text editor (such as Notepad/Wordpad).
    o Please highlight everything in the notepad, then right-click and choose copy.
    · Click close and close again to exit the program.
    · Please paste that information here for me with a new HijackThis log.
     
  3. chauncey005

    chauncey005 Thread Starter

    Joined:
    Oct 15, 2004
    Messages:
    72
    Thanks for helping again, MFD! The requested logs:

    "Owner" - Fri 02/09/2007 10:58:33 Service Pack 4
    ComboFix 07-02-08.2 - Running from: "C:\Documents and Settings\Owner\Desktop"

    ((((((((((((((((((((((((((((((((((((((((((((( Look2Me's Log ))))))))))))))))))))))))))))))))))))))))))))))))))

    REGISTRY ENTRIES REMOVED:
    Windows Registry Editor Version 5.00

    [HKEY_CLASSES_ROOT\clsid\{453b27c1-8e5f-41bb-b7b3-f42f5cc21d9f}]Windows Registry Editor Version 5.00

    [HKEY_CLASSES_ROOT\clsid\{3e686c04-76a0-4513-843b-98bb498fd446}]
    @=""

    [HKEY_CLASSES_ROOT\clsid\{3e686c04-76a0-4513-843b-98bb498fd446}\Implemented Categories]
    @=""

    [HKEY_CLASSES_ROOT\clsid\{3e686c04-76a0-4513-843b-98bb498fd446}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
    @=""

    [HKEY_CLASSES_ROOT\clsid\{3e686c04-76a0-4513-843b-98bb498fd446}\InprocServer32]
    @="C:\\WINNT\\system32\\MCOERT2.DLL"
    "ThreadingModel"="Apartment"Windows Registry Editor Version 5.00

    [HKEY_CLASSES_ROOT\clsid\{7c4d3030-b3a4-4262-bbf9-1174aa733899}]
    @=""

    [HKEY_CLASSES_ROOT\clsid\{7c4d3030-b3a4-4262-bbf9-1174aa733899}\Implemented Categories]
    @=""

    [HKEY_CLASSES_ROOT\clsid\{7c4d3030-b3a4-4262-bbf9-1174aa733899}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
    @=""

    [HKEY_CLASSES_ROOT\clsid\{7c4d3030-b3a4-4262-bbf9-1174aa733899}\InprocServer32]
    @="C:\\WINNT\\system32\\wgnsta.dll"
    "ThreadingModel"="Apartment"

    * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *


    FILES REMOVED:

    C:\WINNT\system32\DXWSOCKX.DLL
    C:\WINNT\system32\ir6ml5j11.dll


    Granting SeDebugPrivilege to Administrators ... successful


    (((((((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))


    C:\WINNT\tool1.exe
    C:\WINNT\tool3.exe
    C:\WINNT\tool4.exe
    C:\WINNT\tool5.exe
    C:\ZICORN001.exe
    C:\WINNT\system32\bszip.dll
    C:\zicorn001.exe


    ((((((((((((((((((((((((((((((( Files Created from 2007-01-09 to 2007-02-09 ))))))))))))))))))))))))))))))))))


    2007-02-09 11:02 16,384 --a----t- C:\WINNT\system32\Perflib_Perfdata_398.dat
    2007-02-08 10:06 <DIR> d-a------ C:\WINNT\system32\appmgmt
    2007-02-08 10:05 <DIR> d-------- C:\Program Files\CAM Development
    2007-02-08 09:51 <DIR> d-------- C:\DOCUME~1\ALLUSE~1\Application Data\Spybot - Search & Destroy
    2007-02-08 09:47 <DIR> d-------- C:\DOCUME~1\Owner\Application Data\Lavasoft
    2007-02-08 09:41 <DIR> d-------- C:\Program Files\Lavasoft
    2007-02-08 09:39 9,216 --a------ C:\WINNT\system32\drivers\avgtdi64.sys
    2007-02-08 09:39 27,776 --a------ C:\WINNT\system32\drivers\avg7rsxp.sys
    2007-02-08 09:39 26,848 --a------ C:\WINNT\system32\drivers\avg7rsnt.sys
    2007-02-08 09:24 16,016 --a------ C:\WINNT\system32\drivers\ne2000.sys


    (((((((((((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))))


    2007-02-08 10:06 -------- d-------- C:\Program Files\microsoft antispyware
    2007-02-08 09:47 -------- d-------- C:\Documents and Settings\Owner\Application Data\lavasoft


    (((((((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))

    *Note* empty entries & legit default entries are not shown

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run]
    "Synchronization Manager"="mobsync.exe /logon"
    "AVG7_CC"="C:\\PROGRA~1\\Grisoft\\AVGFRE~1\\avgcc.exe /STARTUP"
    "AVG7_EMC"="C:\\PROGRA~1\\Grisoft\\AVGFRE~1\\avgemc.exe"
    "IgfxTray"="C:\\WINNT\\system32\\igfxtray.exe"
    "HotKeysCmds"="C:\\WINNT\\system32\\hkcmd.exe"
    "HP Software Update"="C:\\Program Files\\HP\\HP Software Update\\HPWuSchd2.exe"
    "Quatro"="C:\\WINNT\\SYSTEM32\\peraljam.exe"
    "Bart Station"="C:\\Program Files\\PeoplePC\\ISP6300\\BIN\\PPCOLink.exe -STATION"

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices]
    "Beawver"="saqevre.exe"

    [HKEY_USERS\.default\software\microsoft\windows\currentversion\runonce]
    "^SetupICWDesktop"=""


    [HKEY_USERS\.default\software\microsoft\windows\currentversion\run]
    "AVG7_Run"="C:\\PROGRA~1\\Grisoft\\AVGFRE~1\\avgw.exe /RUNONCE"
    "Shell"="\"C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\ibm00001.exe\""
    "CU1"="C:\\Program Files\\Common Files\\VCClient\\VCClient.exe"
    "CU2"="C:\\Program Files\\Common Files\\VCClient\\VCMain.exe"
    "UCmd"="fallfour.exe"

    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avload32
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\lgn1216a

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\securityproviders]
    "SecurityProviders"="msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll"

    [HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Svchost]
    rpcss REG_MULTI_SZ RpcSs\0\0
    wugroup REG_MULTI_SZ wuauserv\0\0
    BITSgroup REG_MULTI_SZ BITS\0\0

    HKLM\software\Microsoft\Windows NT\CurrentVersion\Svchost *netsvcs*
    WmdmPmSN



    ********************************************************************

    catchme 0.1 W2K/XP - userland rootkit detector by Gmer, 17 October 2006
    http://www.gmer.net

    scanning hidden processes ...

    scanning hidden services ...

    scanning hidden autostart entries ...

    HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices
    Beawver = saqevre.exe??????????????????????????????????????????????????????

    scanning hidden files ...

    C:\WINNT\system32\lgn1216a.dll 20480 bytes
    C:\WINNT\system32\mm77lgn.sys 8192 bytes

    scan completed successfully
    hidden processes: 0
    hidden services: 0
    hidden files: 2

    ********************************************************************

    Completion time: Fri 2007-02-09 11:04:24

    SUPERAntiSpyware Scan Log
    Generated 02/09/2007 at 09:56 PM

    Application Version : 3.5.1016

    Core Rules Database Version : 3165
    Trace Rules Database Version: 1176

    Scan type : Complete Scan
    Total Scan Time : 00:41:43

    Memory items scanned : 368
    Memory threats detected : 0
    Registry items scanned : 3784
    Registry threats detected : 59
    File items scanned : 18536
    File threats detected : 9

    Adware.Tracking Cookie
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
    C:\Documents and Settings\Owner\Cookies\[email protected][1].txt

    Adware.SurfSideKick
    HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run#CU1 [ C:\Program Files\Common Files\VCClient\VCClient.exe ]
    HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run#CU2 [ C:\Program Files\Common Files\VCClient\VCMain.exe ]

    Trojan.WnLogoW
    HKLM\SYSTEM\CurrentControlSet\Services\wnlogow
    HKLM\SYSTEM\CurrentControlSet\Services\wnlogow#Type
    HKLM\SYSTEM\CurrentControlSet\Services\wnlogow#Start
    HKLM\SYSTEM\CurrentControlSet\Services\wnlogow#ErrorControl
    HKLM\SYSTEM\CurrentControlSet\Services\wnlogow#ImagePath
    HKLM\SYSTEM\CurrentControlSet\Services\wnlogow#DisplayName
    HKLM\SYSTEM\CurrentControlSet\Services\wnlogow\Security
    HKLM\SYSTEM\CurrentControlSet\Services\wnlogow\Security#Security
    HKLM\SYSTEM\CurrentControlSet\Services\wnlogow\Enum
    HKLM\SYSTEM\CurrentControlSet\Services\wnlogow\Enum#0
    HKLM\SYSTEM\CurrentControlSet\Services\wnlogow\Enum#Count
    HKLM\SYSTEM\CurrentControlSet\Services\wnlogow\Enum#NextInstance
    HKLM\SYSTEM\CurrentControlSet\Services\wnlogow\Enum#INITSTARTFAILED
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WNLOGOW
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WNLOGOW#NextInstance
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WNLOGOW\0000
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WNLOGOW\0000#Service
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WNLOGOW\0000#Legacy
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WNLOGOW\0000#ConfigFlags
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WNLOGOW\0000#Class
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WNLOGOW\0000#ClassGUID
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WNLOGOW\0000#DeviceDesc
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WNLOGOW\0000#Capabilities
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WNLOGOW\0000\Control
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WNLOGOW\0000\Control#DeviceReference

    Trojan.Haxdoor-LGN
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MM77LGN
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MM77LGN#NextInstance
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MM77LGN\0000
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MM77LGN\0000#Service
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MM77LGN\0000#Legacy
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MM77LGN\0000#ConfigFlags
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MM77LGN\0000#Class
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MM77LGN\0000#ClassGUID
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MM77LGN\0000#DeviceDesc
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MM77LGN\0000#Capabilities
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MM77LGN\0000\Control
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MM77LGN\0000\Control#DeviceReference
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MM77LGN\0000\Control#ActiveService
    HKLM\SYSTEM\CurrentControlSet\Services\mm77lgn
    HKLM\SYSTEM\CurrentControlSet\Services\mm77lgn#Type
    HKLM\SYSTEM\CurrentControlSet\Services\mm77lgn#Start
    HKLM\SYSTEM\CurrentControlSet\Services\mm77lgn#ErrorControl
    HKLM\SYSTEM\CurrentControlSet\Services\mm77lgn#ImagePath
    HKLM\SYSTEM\CurrentControlSet\Services\mm77lgn#DisplayName
    HKLM\SYSTEM\CurrentControlSet\Services\mm77lgn\Security
    HKLM\SYSTEM\CurrentControlSet\Services\mm77lgn\Security#Security
    HKLM\SYSTEM\CurrentControlSet\Services\mm77lgn\Enum
    HKLM\SYSTEM\CurrentControlSet\Services\mm77lgn\Enum#0
    HKLM\SYSTEM\CurrentControlSet\Services\mm77lgn\Enum#Count
    HKLM\SYSTEM\CurrentControlSet\Services\mm77lgn\Enum#NextInstance
    HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\lgn1216a
    HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\lgn1216a#DllName
    HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\lgn1216a#Startup
    HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\lgn1216a#Impersonate
    HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\lgn1216a#Asynchronous
    HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\lgn1216a#MaxWait
    HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\lgn1216a#nkbk4

    Browser Hijacker.Favorites
    C:\DOCUMENTS AND SETTINGS\OWNER\DESKTOP\MISC. FOLDER\CHEAP HOLIDAY TRAVEL.URL
    C:\DOCUMENTS AND SETTINGS\OWNER\DESKTOP\MISC. FOLDER\FREE ONLINE MUSIC.URL
    C:\DOCUMENTS AND SETTINGS\OWNER\DESKTOP\MISC. FOLDER\ONLINE DATING.URL

    Trojan.NewDotNet
    C:\PROGRAM FILES\MICROSOFT ANTISPYWARE\QUARANTINE\53500071-03E5-46D1-A369-53526B\B025E856-36AC-48D2-88B4-A8638F


    ******HJT*********

    Logfile of HijackThis v1.99.1
    Scan saved at 10:14:16 PM, on 2/9/2007
    Platform: Windows 2000 SP4 (WinNT 5.00.2195)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINNT\System32\smss.exe
    C:\WINNT\system32\winlogon.exe
    C:\WINNT\system32\services.exe
    C:\WINNT\system32\lsass.exe
    C:\WINNT\system32\svchost.exe
    C:\WINNT\system32\spoolsv.exe
    C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
    C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
    C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
    C:\WINNT\System32\svchost.exe
    C:\WINNT\system32\MSTask.exe
    C:\WINNT\system32\stisvc.exe
    C:\WINNT\System32\WBEM\WinMgmt.exe
    C:\WINNT\system32\svchost.exe
    C:\WINNT\Explorer.EXE
    C:\WINNT\system32\igfxtray.exe
    C:\WINNT\system32\hkcmd.exe
    C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
    C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\PeoplePC\ISP6300\Browser\Bartshel.exe
    C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
    C:\Program Files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
    C:\PROGRA~1\PeoplePC\ISP6300\Browser\PPShared.exe
    C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
    C:\Program Files\HP\Digital Imaging\Product Assistant\bin\hprblog.exe
    C:\Documents and Settings\Owner\Desktop\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://home.peoplepc.com/search
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O3 - Toolbar: @msdxmLC.dll,[email protected],&Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\System32\msdxm.ocx
    O3 - Toolbar: PeoplePal Toolbar - {A8FB8EB3-183B-4598-924D-86F0E5E37085} - C:\Program Files\PeoplePC\Toolbar\PPCToolbar.dll
    O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
    O4 - HKLM\..\Run: [IgfxTray] C:\WINNT\system32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINNT\system32\hkcmd.exe
    O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
    O4 - HKLM\..\Run: [Quatro] C:\WINNT\SYSTEM32\peraljam.exe
    O4 - HKLM\..\Run: [Bart Station] C:\Program Files\PeoplePC\ISP6300\BIN\PPCOLink.exe -STATION
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
    O4 - HKLM\..\RunServices: [Beawver] saqevre.exe
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
    O4 - Global Startup: QuickBooks Update Agent.lnk = C:\Program Files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=48835
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1141001656057
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O20 - Winlogon Notify: avload32 - avload32.dll (file missing)
    O20 - Winlogon Notify: lgn1216a - C:\WINNT\
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
    O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
    O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
    O23 - Service: mdn475 - Unknown owner - \\4.227.248.110\Admin$\mdn_251.exe (file missing)
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINNT\system32\HPZipm12.exe
    O23 - Service: QoS RSVP Service (RSVPService) - Unknown owner - C:\WINNT\system32\QoSService.exe (file missing)
     
  4. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    You may want to print this or save it to notepad as we will go to safe mode.

    Fix these with HiJackThis – mark them, close IE, click fix checked

    O4 - HKLM\..\Run: [Quatro] C:\WINNT\SYSTEM32\peraljam.exe

    O4 - HKLM\..\RunServices: [Beawver] saqevre.exe

    O20 - Winlogon Notify: avload32 - avload32.dll (file missing)

    O20 - Winlogon Notify: lgn1216a - C:\WINNT\

    O23 - Service: mdn475 - Unknown owner - \\4.227.248.110\Admin$\mdn_251.exe (file missing)

    O23 - Service: QoS RSVP Service (RSVPService) - Unknown owner - C:\WINNT\system32\QoSService.exe (file missing)
    ================
    Click Start > Run > and type in:

    services.msc

    Click OK.

    In the services window find this exact name

    mdn475

    Rightclick and choose "Properties". Beside "Startup Type" in the dropdown menu select "Disabled". On the "General" tab under "Service Status" click the "Stop" button to stop the service. Click Apply then OK. File-Exit the Services utility.

    Repeat for - QoS RSVP Service
    ================
    DownLoad http://www.downloads.subratam.org/KillBox.zip or
    http://www.thespykiller.co.uk/files/killbox.exe

    Restart your computer into safe mode now. (Tapping F8 at the first black screen) Perform the following steps in safe mode:

    Double-click on Killbox.exe to run it. Now put a tick by Standard File Kill. In the "Full Path of File to Delete" box, copy and paste each of the following lines one at a time then click on the button that has the red circle with the X in the middle after you enter each file. It will ask for confimation to delete the file. Click Yes. Continue with that same procedure until you have copied and pasted all of these in the "Paste Full Path of File to Delete" box.

    C:\WINNT\SYSTEM32\peraljam.exe
    C:\WINNT\SYSTEM32\saqevre.exe

    Note: It is possible that Killbox will tell you that one or more files do not exist. If that happens, just continue on with all the files. Be sure you don't miss any.

    START – RUN – type in %temp% - OK - Edit – Select all – File – Delete

    Delete everything in the C:\Windows\Temp folder or C:\WINNT\temp

    Not all temp files will delete and that is normal
    Empty the recycle bin
    Boot


    Run ActiveScan online virus scan

    http://www.pandasoftware.com/products/activescan.htm

    When the scan completes, if anything malicious is detected, click the See Report button, then Save Report and save it to a convenient location. Post the contents of the ActiveScan report

    Post a new HiJackThis log along with the results from ActiveScan


    Please give feedback on what worked/didn’t work and the current status of your system
     
  5. chauncey005

    chauncey005 Thread Starter

    Joined:
    Oct 15, 2004
    Messages:
    72
    Well currently it would appear that Panda ActiveScan is having issues, however, I will scan later and run killbox on the files that in finds, sound good? Here is the new HJT log, which looks clean, what do you think?

    Logfile of HijackThis v1.99.1
    Scan saved at 8:28:10 AM, on 2/12/2007
    Platform: Windows 2000 SP4 (WinNT 5.00.2195)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINNT\System32\smss.exe
    C:\WINNT\system32\winlogon.exe
    C:\WINNT\system32\services.exe
    C:\WINNT\system32\lsass.exe
    C:\WINNT\system32\svchost.exe
    C:\WINNT\system32\spoolsv.exe
    C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
    C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
    C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
    C:\WINNT\System32\svchost.exe
    C:\WINNT\system32\MSTask.exe
    C:\WINNT\system32\stisvc.exe
    C:\WINNT\System32\WBEM\WinMgmt.exe
    C:\WINNT\system32\svchost.exe
    C:\WINNT\Explorer.EXE
    C:\WINNT\system32\igfxtray.exe
    C:\WINNT\system32\hkcmd.exe
    C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
    C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\PeoplePC\ISP6300\Browser\Bartshel.exe
    C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
    C:\PROGRA~1\PeoplePC\ISP6300\Browser\PPShared.exe
    C:\Program Files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
    C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
    C:\Program Files\HP\Digital Imaging\Product Assistant\bin\hprblog.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\Documents and Settings\Owner\Desktop\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://home.peoplepc.com/search
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O3 - Toolbar: @msdxmLC.dll,[email protected],&Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\System32\msdxm.ocx
    O3 - Toolbar: PeoplePal Toolbar - {A8FB8EB3-183B-4598-924D-86F0E5E37085} - C:\Program Files\PeoplePC\Toolbar\PPCToolbar.dll
    O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
    O4 - HKLM\..\Run: [IgfxTray] C:\WINNT\system32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINNT\system32\hkcmd.exe
    O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
    O4 - HKLM\..\Run: [Bart Station] C:\Program Files\PeoplePC\ISP6300\BIN\PPCOLink.exe -STATION
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
    O4 - Global Startup: QuickBooks Update Agent.lnk = C:\Program Files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=48835
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1141001656057
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
    O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
    O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINNT\system32\HPZipm12.exe
     
  6. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
  7. chauncey005

    chauncey005 Thread Starter

    Joined:
    Oct 15, 2004
    Messages:
    72
    Again, thank you for all your help. Is there an online tutorial that I can go through to decifer the HJT logs so I dont bother you guys and maybe lend a hand?
     
  8. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    No, it takes a lot of time to learn how to do it

    There are schools but they take a lot of time
     
  9. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/542593

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice