1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Solved: Adware halts IE Browser

Discussion in 'Virus & Other Malware Removal' started by b52sacman, Jul 28, 2006.

Thread Status:
Not open for further replies.
Advertisement
  1. b52sacman

    b52sacman Thread Starter

    Joined:
    Sep 24, 2004
    Messages:
    90
    My computer was used recently to visit an illegal site causing it to be severely infected with phony prompts such as worm_attck_v122.02. There are continuous popups notifying me that there is spyware that might cause computer to crash. It prompts me to a site to purchase "SYSTEM DOCTOR." After downloading System Doctor it requested money to clear up problem. I did the same wiih wiih and adware. I am attaching my latest Hijack this Log. Please help. I cannot do certain functions on line because I am locked by some adware that System is imforming me abLogfile of HijackThis v1.99.1
    Scan saved at 3:16:24 PM, on 7/28/2006
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Media-Codec\isamonitor.exe
    C:\Program Files\Media-Codec\pmsngr.exe
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\Program Files\Norton AntiVirus\navapsvc.exe
    C:\Program Files\Media-Codec\pmmon.exe
    C:\Program Files\Media-Codec\isamini.exe
    C:\progra~1\yahoo!\YCentral\YahooCentral.exe
    C:\Program Files\Babylon\Babylon-Pro\Babylon.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\SpywareBot\SpywareBot.exe
    C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
    C:\Program Files\HijackThis\HijackThis.exe

    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn2\yt.dll (file missing)
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {5753791b-f607-48ca-814e-91c14d081f9e} - C:\Program Files\Media-Codec\isaddon.dll
    O2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn2\yt.dll (file missing)
    O4 - HKLM\..\Run: [ccApp] C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    O4 - HKLM\..\Run: [ccRegVfy] C:\Program Files\Common Files\Symantec Shared\ccRegVfy.exe
    O4 - HKLM\..\Run: [YCentral] c:\progra~1\yahoo!\YCentral\YahooCentral.exe
    O4 - HKLM\..\Run: [Babylon Client] C:\Program Files\Babylon\Babylon-Pro\Babylon.exe -AutoStart
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [LXCFCATS] rundll32 C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\LXCFtime.dll,[email protected]
    O4 - HKLM\..\Run: [SystemDoctor 2006 Free] C:\Program Files\SystemDoctor 2006 Free\sd2006.exe -scan
    O4 - HKLM\..\Run: [spywarebot] C:\Program Files\SpywareBot\SpywareBot.exe -boot
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - Startup: .protected
    O4 - Global Startup: .protected
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html
    O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html
    O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
    O16 - DPF: {F04A8AE2-A59D-11D2-8792-00C04F8EF29D} (Hotmail Attachments Control) - http://by101fd.bay101.hotmail.msn.com/activex/HMAtchmt.ocx
    O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    O23 - Service: Symantec Password Validation Service (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
    O23 - Service: lxcf_device - - C:\WINDOWS\system32\lxcfcoms.exe
    O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
    O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
    O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
    O23 - Service: VET Message Service (VETMSGNT) - Computer Associates International, Inc. - C:\Program Files\Yahoo!\Antivirus\VetMsg.exe

    out but, I cannot find it. Yellow triangle in toolbar is continuously causing popups
     
  2. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Please download SmitfraudFix (by S!Ri)
    Extract the content (a folder named SmitfraudFix) to your Desktop.

    Open the SmitfraudFix folder and double-click smitfraudfix.cmd
    Select option #1 - Search by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present). We’ll get them next step.
    Please copy/paste the content of that report into your next reply.

    Note : process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
    http://www.beyondlogic.org/consulting/proc...processutil.htm
    =========================
    Download the trial version of Ewido Security Suite http://www.ewido.net/en/download/ (W2K/XP Only)
    · Install ewido.
    · Run the application
    · Click on scanner
    · Click Complete System Scan and the scan will begin.
    · When the scan is finished, Set all items to delete
    · Apply all actions
    · look at the bottom of the screen and click the Save report button.
    · Save the report to your C: Drive
    This will take some time to run!
    RE-Boot
    Post that log and a new HiJack log
     
  3. b52sacman

    b52sacman Thread Starter

    Joined:
    Sep 24, 2004
    Messages:
    90
    Thanks very,very much. Everything seems to be okay at the moment. I have attached Hijackthis log and rhe E---------------------------------------------------------
    ewido anti-spyware - Scan Report
    ---------------------------------------------------------

    + Created at: 6:16:01 PM 7/28/2006

    + Scan result:



    C:\Program Files\Seekmo\seekmo.exe -> Adware.180Solutions : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\CLSID\{5753791b-f607-48ca-814e-91c14d081f9e} -> Adware.Generic : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5753791b-f607-48ca-814e-91c14d081f9e} -> Adware.Generic : Cleaned with backup (quarantined).
    HKU\S-1-5-21-515967899-790525478-725345543-1004\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{5753791B-F607-48CA-814E-91C14D081F9E} -> Adware.Generic : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\Activate.dat -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\Activate.exe -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\DataBase.sav -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\License.rtf -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\ReportListFile.dat -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\SafeMedia -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\SafeMedia\Mp3DB -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\SafeMedia\MpegDB -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\SafeMedia\WaveDB -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\Sd2006.exe -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\bnlink.dat -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\hmlink.dat -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\insthelp.exe -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\lapv.dat -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\lock.dat -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\order.dll -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\pv.dat -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\sd2006url.url -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\sr.log -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\st.dat -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\support.url -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\umain.xml -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\unins000.dat -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\unins000.exe -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\up.dat -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\updater.dat -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\Program Files\SystemDoctor 2006 Free\updater.exe -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\SystemDoctor 2006 Free -> Adware.SystemDoctor2006 : Cleaned with backup (quarantined).
    C:\WINDOWS\Setup1.exe -> Backdoor.Agobot.xb : Cleaned with backup (quarantined).
    C:\Documents and Settings\Charles Pearson\Local Settings\Temporary Internet Files\Content.IE5\C9QVGBEN\SystemDoctor2006FreeInstall[1].exe -> Not-A-Virus.Downloader.Win32.WinFixer.l : Ignored.
    C:\WINDOWS\system32\yephk.dll -> Not-A-Virus.Hoax.Win32.Renos.dw : Ignored.
    :mozilla.81:C:\Documents and Settings\Charles Pearson\Application Data\Mozilla\Firefox\Profiles\fq9ue404.default\cookies.txt -> TrackingCookie.2o7 : Cleaned.
    :mozilla.39:C:\Documents and Settings\Charles Pearson\Application Data\Mozilla\Firefox\Profiles\fq9ue404.default\cookies.txt -> TrackingCookie.Advertising : Cleaned.
    :mozilla.40:C:\Documents and Settings\Charles Pearson\Application Data\Mozilla\Firefox\Profiles\fq9ue404.default\cookies.txt -> TrackingCookie.Advertising : Cleaned.
    :mozilla.41:C:\Documents and Settings\Charles Pearson\Application Data\Mozilla\Firefox\Profiles\fq9ue404.default\cookies.txt -> TrackingCookie.Advertising : Cleaned.
    :mozilla.42:C:\Documents and Settings\Charles Pearson\Application Data\Mozilla\Firefox\Profiles\fq9ue404.default\cookies.txt -> TrackingCookie.Advertising : Cleaned.
    :mozilla.38:C:\Documents and Settings\Charles Pearson\Application Data\Mozilla\Firefox\Profiles\fq9ue404.default\cookies.txt -> TrackingCookie.Atdmt : Cleaned.
    C:\Documents and Settings\Charles Pearson\Cookies\charles [email protected][1].txt -> TrackingCookie.Clickbank : Cleaned.
    :mozilla.43:C:\Documents and Settings\Charles Pearson\Application Data\Mozilla\Firefox\Profiles\fq9ue404.default\cookies.txt -> TrackingCookie.Doubleclick : Cleaned.
    :mozilla.93:C:\Documents and Settings\Charles Pearson\Application Data\Mozilla\Firefox\Profiles\fq9ue404.default\cookies.txt -> TrackingCookie.Googleadservices : Cleaned.
    C:\Documents and Settings\Charles Pearson\Cookies\charles [email protected][1].txt -> TrackingCookie.Liveperson : Cleaned.
    :mozilla.55:C:\Documents and Settings\Charles Pearson\Application Data\Mozilla\Firefox\Profiles\fq9ue404.default\cookies.txt -> TrackingCookie.Mediaplex : Cleaned.
    C:\Documents and Settings\Charles Pearson\Cookies\charles [email protected][2].txt -> TrackingCookie.Reliablestats : Cleaned.
    :mozilla.32:C:\Documents and Settings\Charles Pearson\Application Data\Mozilla\Firefox\Profiles\fq9ue404.default\cookies.txt -> TrackingCookie.Statcounter : Cleaned.
    :mozilla.33:C:\Documents and Settings\Charles Pearson\Application Data\Mozilla\Firefox\Profiles\fq9ue404.default\cookies.txt -> TrackingCookie.Statcounter : Cleaned.
    C:\Documents and Settings\Charles Pearson\Cookies\charles [email protected][1].txt -> TrackingCookie.Statcounter : Cleaned.
    :mozilla.49:C:\Documents and Settings\Charles Pearson\Application Data\Mozilla\Firefox\Profiles\fq9ue404.default\cookies.txt -> TrackingCookie.Tribalfusion : Cleaned.
    :mozilla.50:C:\Documents and Settings\Charles Pearson\Application Data\Mozilla\Firefox\Profiles\fq9ue404.default\cookies.txt -> TrackingCookie.Tribalfusion : Cleaned.
    :mozilla.51:C:\Documents and Settings\Charles Pearson\Application Data\Mozilla\Firefox\Profiles\fq9ue404.default\cookies.txt -> TrackingCookie.Tribalfusion : Cleaned.
    :mozilla.52:C:\Documents and Settings\Charles Pearson\Application Data\Mozilla\Firefox\Profiles\fq9ue404.default\cookies.txt -> TrackingCookie.Tribalfusion : Cleaned.
    :mozilla.53:C:\Documents and Settings\Charles Pearson\Application Data\Mozilla\Firefox\Profiles\fq9ue404.default\cookies.txt -> TrackingCookie.Tribalfusion : Cleaned.
    :mozilla.54:C:\Documents and Settings\Charles Pearson\Application Data\Mozilla\Firefox\Profiles\fq9ue404.default\cookies.txt -> TrackingCookie.Tribalfusion : Cleaned.
    C:\Program Files\Media-Codec -> Trojan.Small : Cleaned with backup (quarantined).
    C:\Program Files\Media-Codec\__delete_on_reboot__p_m_s_n_g_r_._e_x_e_ -> Trojan.Small : Cleaned with backup (quarantined).
    C:\Program Files\Media-Codec\isaddon.dll -> Trojan.Small : Cleaned with backup (quarantined).
    C:\Program Files\Media-Codec\pmmon.exe -> Trojan.Small : Cleaned with backup (quarantined).
    C:\Program Files\Media-Codec\pmuninst.exe -> Trojan.Small : Cleaned with backup (quarantined).


    ::Report end


    SmitFraudFix v2.76

    Scan done at 16:01:06.51, Fri 07/28/2006
    Run from C:\Documents and Settings\Charles Pearson\Desktop\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    Fix ran in normal mode

    »»»»»»»»»»»»»»»»»»»»»»»» C:\


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS

    C:\WINDOWS\.protected FOUND !

    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32

    C:\WINDOWS\system32\yephk.dll FOUND !

    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Charles Pearson\Application Data


    »»»»»»»»»»»»»»»»»»»»»»»» Start Menu

    C:\DOCUME~1\CHARLE~1\STARTM~1\Programs\Startup\.protected FOUND !
    C:\DOCUME~1\ALLUSE~1\STARTM~1\Programs\Startup\.protected FOUND !

    »»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\CHARLE~1\FAVORI~1


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files

    C:\Program Files\Media-Codec\ FOUND !

    »»»»»»»»»»»»»»»»»»»»»»»» Corrupted keys


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop Components

    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
    "Source"="http://us.js1.yimg.com/us.yimg.com/lib/pim/r/medici/6_16_2/mail/mailcommonlib.js"
    "SubscribedURL"="http://us.js1.yimg.com/us.yimg.com/lib/pim/r/medici/6_16_2/mail/mailcommonlib.js"
    "FriendlyName"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
    "coursings"="{f8d02387-789a-4c0f-a1d8-8a93f33ee4df}"


    »»»»»»»»»»»»»»»»»»»»»»»» Scanning wininet.dll infection


    »»»»»»»»»»»»»»»»»»»»»»»» End






    wido log. Thanks!
     
  4. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    You should print out these instructions, or copy them to a NotePad file for reading while in Safe Mode, because you will not be able to connect to the Internet to read from this site.

    Next, please reboot your computer in Safe Mode by doing the following :
    • Restart your computer
    • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
    • Instead of Windows loading as normal, a menu with options should appear;
    • Select the first option, to run Windows in Safe Mode, then press "Enter".
    • Choose your usual account.
    Once in Safe Mode, open the SmitfraudFix folder again and double-click smitfraudfix.cmd
    Select option #2 - Clean by typing 2 and press "Enter" to delete infected files.

    You will be prompted: "Registry cleaning - Do you want to clean the registry?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.

    The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".

    The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart it into Normal Windows.

    A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply along with a new hijack log.

    The report can also be found at the root of the system drive, usually at C:\rapport.txt

    Warning: running option #2 on a non infected computer will remove your Desktop background.
     
  5. b52sacman

    b52sacman Thread Starter

    Joined:
    Sep 24, 2004
    Messages:
    90
    Thanks for your help it seems you have really taken care of the problems(y) (y)

    Last logs attached per your instructions.

    Logfile of HijackThis v1.99.1
    Scan saved at 5:46:05 PM, on 7/29/2006
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\progra~1\yahoo!\YCentral\YahooCentral.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\ewido anti-spyware 4.0\ewido.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Program Files\ewido anti-spyware 4.0\guard.exe
    C:\Program Files\Norton AntiVirus\navapsvc.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\HijackThis\HijackThis.exe

    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn2\yt.dll (file missing)
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn2\yt.dll (file missing)
    O4 - HKLM\..\Run: [ccApp] C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    O4 - HKLM\..\Run: [ccRegVfy] C:\Program Files\Common Files\Symantec Shared\ccRegVfy.exe
    O4 - HKLM\..\Run: [YCentral] c:\progra~1\yahoo!\YCentral\YahooCentral.exe
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [LXCFCATS] rundll32 C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\LXCFtime.dll,[email protected]
    O4 - HKLM\..\Run: [!ewido] "C:\Program Files\ewido anti-spyware 4.0\ewido.exe" /minimized
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html
    O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html
    O16 - DPF: {F04A8AE2-A59D-11D2-8792-00C04F8EF29D} (Hotmail Attachments Control) - http://by101fd.bay101.hotmail.msn.com/activex/HMAtchmt.ocx
    O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    O23 - Service: Symantec Password Validation Service (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
    O23 - Service: ewido anti-spyware 4.0 guard - Anti-Malware Development a.s. - C:\Program Files\ewido anti-spyware 4.0\guard.exe
    O23 - Service: lxcf_device - - C:\WINDOWS\system32\lxcfcoms.exe
    O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
    O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
    O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
    O23 - Service: VET Message Service (VETMSGNT) - Computer Associates International, Inc. - C:\Program Files\Yahoo!\Antivirus\VetMsg.exe


    SmitFraudFix v2.76

    Scan done at 17:34:08.29, Sat 07/29/2006
    Run from C:\Documents and Settings\Charles Pearson\Desktop\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    Fix ran in safe mode

    »»»»»»»»»»»»»»»»»»»»»»»» Before SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
    "coursings"="{f8d02387-789a-4c0f-a1d8-8a93f33ee4df}"


    »»»»»»»»»»»»»»»»»»»»»»»» Killing process


    »»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

    GenericRenosFix by S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files

    C:\WINDOWS\.protected Deleted
    C:\WINDOWS\system32\yephk.dll Deleted
    C:\DOCUME~1\CHARLE~1\STARTM~1\Programs\Startup\.protected Deleted
    C:\DOCUME~1\ALLUSE~1\STARTM~1\Programs\Startup\.protected Deleted
    C:\Program Files\Media-Codec\ Deleted

    »»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


    »»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

    Registry Cleaning done.

    »»»»»»»»»»»»»»»»»»»»»»»» After SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll


    »»»»»»»»»»»»»»»»»»»»»»»» End
     
  6. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
  7. b52sacman

    b52sacman Thread Starter

    Joined:
    Sep 24, 2004
    Messages:
    90
    Solved. A donation will be made
     
  8. b52sacman

    b52sacman Thread Starter

    Joined:
    Sep 24, 2004
    Messages:
    90
    I want to thank everyine who assisted me with this string. I have beev very ill and unable to respond, b52sacman:)
     
  9. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/487261

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice