1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Solved: Help! Security Toolbar 7.1 Wont Go Away!

Discussion in 'Virus & Other Malware Removal' started by mmotes, Jun 30, 2007.

Thread Status:
Not open for further replies.
Advertisement
  1. mmotes

    mmotes Thread Starter

    Joined:
    Jun 30, 2007
    Messages:
    3
    My computer keeps saying I have back door trojans and many cases of spyware as well as security toolbar 7.1 Can anybody help me please?
     
  2. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    You should print out these instructions, or copy them to a NotePad file for reading while in Safe Mode, because you will not be able to connect to the Internet to read from this site.

    Please download SmitfraudFix (by S!Ri)
    Extract the content (a folder named SmitfraudFix) to your Desktop.

    Next, please reboot your computer in Safe Mode by doing the following :
    • Restart your computer
    • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
    • Instead of Windows loading as normal, a menu with options should appear;
    • Select the first option, to run Windows in Safe Mode, then press "Enter".
    • Choose your usual account.
    Once in Safe Mode, open the SmitfraudFix folder again and double-click smitfraudfix.cmd
    Select option #2 - Clean by typing 2 and press "Enter" to delete infected files.

    You will be prompted: "Registry cleaning - Do you want to clean the registry?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.

    The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".

    The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart it into Normal Windows.

    A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply along with a new hijack log.

    The report can also be found at the root of the system drive, usually at C:\rapport.txt

    Warning: running option #2 on a non infected computer will remove your Desktop background.
    ===============

    Click here to download HJTsetup.exe:

    http://www.thespykiller.co.uk/index.php?action=tpmod;dl=item5

    Scroll down to the download section where the download button is

    Save HJTsetup.exe to your desktop.

    Double click on the HJTsetup.exe icon on your desktop.
    By default it will install to C:\Program Files\Hijack This.
    Continue to click Next in the setup dialogue boxes until you get to the Select Addition Tasks dialogue.
    Put a check by Create a desktop icon then click Next again.
    Continue to follow the rest of the prompts from there.
    At the final dialogue box click Finish and it will launch Hijack This.
    Click on the Do a system scan and save a log file button. It will scan and then ask you to save the log.
    Click Save to save the log file and then the log will open in notepad.
    Click on "Edit > Select All" then click on "Edit > Copy" to copy the entire contents of the log.
    Come back here to this thread and Paste the log in your next reply.
    DO NOT have Hijack This fix anything yet. Most of what it finds will be harmless or even required.
     
  3. mmotes

    mmotes Thread Starter

    Joined:
    Jun 30, 2007
    Messages:
    3
    Here is rapport.txt:

    SmitFraudFix v2.197

    Scan done at 21:09:25.09, Sun 07/01/2007
    Run from C:\Documents and Settings\Melissa\Desktop\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    The filesystem type is NTFS
    Fix run in safe mode

    »»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
    "{94524218-9af3-4643-9687-cbc2880e54da}"="fagging"

    [HKEY_CLASSES_ROOT\CLSID\{94524218-9af3-4643-9687-cbc2880e54da}\InProcServer32]
    @="C:\WINDOWS\system32\nuqjici.dll"

    [HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{94524218-9af3-4643-9687-cbc2880e54da}\InProcServer32]
    @="C:\WINDOWS\system32\nuqjici.dll"


    »»»»»»»»»»»»»»»»»»»»»»»» Killing process


    »»»»»»»»»»»»»»»»»»»»»»»» hosts


    127.0.0.1 localhost

    »»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

    GenericRenosFix by S!Ri

    C:\WINDOWS\system32\nuqjici.dll -> Hoax.Win32.Renos.gen.o
    C:\WINDOWS\system32\nuqjici.dll -> Deleted


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files

    C:\DOCUME~1\ALLUSE~1\STARTM~1\Online Security Guide.url Deleted
    C:\DOCUME~1\ALLUSE~1\STARTM~1\Security Troubleshooting.url Deleted
    C:\DOCUME~1\ALLUSE~1\Desktop\Online Security Guide.url Deleted
    C:\DOCUME~1\ALLUSE~1\Desktop\Security Troubleshooting.url Deleted
    C:\DOCUME~1\Melissa\FAVORI~1\Online Security Test.url Deleted
    C:\Program Files\Image ActiveX Access\ Deleted

    »»»»»»»»»»»»»»»»»»»»»»»» DNS

    HKLM\SYSTEM\CCS\Services\Tcpip\..\{2216CDA1-5615-4436-AE37-30FCF796409C}: DhcpNameServer=192.168.254.254
    HKLM\SYSTEM\CS1\Services\Tcpip\..\{2216CDA1-5615-4436-AE37-30FCF796409C}: DhcpNameServer=192.168.254.254
    HKLM\SYSTEM\CS2\Services\Tcpip\..\{2216CDA1-5615-4436-AE37-30FCF796409C}: DhcpNameServer=192.168.254.254
    HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.254.254
    HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.254.254
    HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.254.254


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


    »»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "System"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

    Registry Cleaning done.

    »»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll


    »»»»»»»»»»»»»»»»»»»»»»»» End

    Here is the HiJack This Log:

    Logfile of Trend Micro HijackThis v2.0.0 (BETA)
    Scan saved at 9:18:22 PM, on 7/1/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\S3tray2.exe
    C:\WINDOWS\Dit.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\PROGRA~1\ALLTEL~1\SMARTB~1\MotiveSB.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Program Files\AIM6\aim6.exe
    C:\Program Files\Adobe\Acrobat 5.0\Distillr\AcroTray.exe
    C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
    C:\Program Files\Microsoft Office\Office\OSA.EXE
    C:\Program Files\AIM6\aolsoftware.exe
    C:\WINDOWS\system32\slserv.exe
    C:\WINDOWS\DitExp.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\internet explorer\iexplore.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Documents and Settings\Melissa\Desktop\HiJackThis_v2.exe

    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Acrobat\ActiveX\AcroIEHelper.ocx
    O2 - BHO: (no name) - {184746EC-9E9D-4C7D-B9E7-9039EBD801A9} - C:\Program Files\Image ActiveX Access\iesplg.dll (file missing)
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
    O4 - HKLM\..\Run: [S3TRAY2] S3tray2.exe
    O4 - HKLM\..\Run: [Dit] Dit.exe
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\ALLTEL~1\SMARTB~1\MotiveSB.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [Aim6] "C:\Program Files\AIM6\aim6.exe" /d locale=en-US ee://aol/imApp
    O4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 5.0\Distillr\AcroTray.exe
    O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Office Startup.lnk = C:\Program Files\Microsoft Office\Office\OSA.EXE
    O4 - Global Startup: Windstream Broadband Check-up Center.lnk = C:\Program Files\ALLTEL DSL Check-up Center\bin\matcli.exe
    O9 - Extra button: Web Anti-Virus statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\scieplugin.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O15 - Trusted Zone: http://care.alltel.com
    O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} (QuickTime Object) - http://a1540.g.akamai.net/7/1540/52/20070501/qtinstall.info.apple.com/qtactivex/qtplugin.cab
    O16 - DPF: {321FB770-1FBE-4BFE-BDC1-6F622D4FA499} - https://activation.alltel.com/wizlet/WINDSTREAM/static/controls/WebflowActiveXInstaller_2-0-0.cab
    O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://photos.walmart.com/WalmartActivia.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{74E50CC8-DD18-4244-9083-25B3C1636DCF}: NameServer = 166.102.165.11 166.102.165.13
    O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
    O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
    O23 - Service: Kaspersky Anti-Virus 6.0 (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
    O23 - Service: SmartLinkService (SLService) - - C:\WINDOWS\SYSTEM32\slserv.exe

    --
    End of file - 4808 bytes

    Thanks............you guys are AWESOME!:)
     
  4. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Download Superantispyware (SAS) free home version

    http://www.superantispyware.com/superantispywarefreevspro.html

    Install it and double-click the icon on your desktop to run it.
    · It will ask if you want to update the program definitions, click Yes.
    · Under Configuration and Preferences, click the Preferences button.
    · Click the Scanning Control tab.
    · Under Scanner Options make sure the following are checked:
    o Close browsers before scanning
    o Scan for tracking cookies
    o Terminate memory threats before quarantining.
    o Please leave the others unchecked.
    o Click the Close button to leave the control center screen.
    · On the main screen, under Scan for Harmful Software click Scan your computer.
    · On the left check C:\Fixed Drive.
    · On the right, under Complete Scan, choose Perform Complete Scan.
    · Click Next to start the scan. Please be patient while it scans your computer.
    · After the scan is complete a summary box will appear. Click OK.
    · Make sure everything in the white box has a check next to it, then click Next.
    · It will quarantine what it found and if it asks if you want to reboot, click Yes.
    · To retrieve the removal information for me please do the following:
    o After reboot, double-click the SUPERAntispyware icon on your desktop.
    o Click Preferences. Click the Statistics/Logs tab.
    o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    o It will open in your default text editor (such as Notepad/Wordpad).
    o Please highlight everything in the notepad, then right-click and choose copy.
    · Click close and close again to exit the program.
    · Please paste that information here for me with a new HijackThis log.

    This will take some time!!!!!!!!
     
  5. mmotes

    mmotes Thread Starter

    Joined:
    Jun 30, 2007
    Messages:
    3
    Ok here are the results........thanks so much for your help!!!!!




    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 07/02/2007 at 05:12 PM

    Application Version : 3.9.1008

    Core Rules Database Version : 3263
    Trace Rules Database Version: 1274

    Scan type : Complete Scan
    Total Scan Time : 00:50:46

    Memory items scanned : 367
    Memory threats detected : 0
    Registry items scanned : 3744
    Registry threats detected : 16
    File items scanned : 49927
    File threats detected : 235

    Trojan.Media-Codec/V3
    HKLM\Software\Classes\CLSID\{184746EC-9E9D-4C7D-B9E7-9039EBD801A9}
    HKCR\CLSID\{184746EC-9E9D-4C7D-B9E7-9039EBD801A9}
    HKCR\CLSID\{184746EC-9E9D-4C7D-B9E7-9039EBD801A9}#xxx
    HKCR\CLSID\{184746EC-9E9D-4C7D-B9E7-9039EBD801A9}\InprocServer32
    HKCR\CLSID\{184746EC-9E9D-4C7D-B9E7-9039EBD801A9}\InprocServer32#ThreadingModel
    C:\PROGRAM FILES\IMAGE ACTIVEX ACCESS\IESPLG.DLL
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{184746EC-9E9D-4C7D-B9E7-9039EBD801A9}
    HKCR\imageactivexobject.Ñhl
    HKCR\imageactivexobject.Ñhl\CLSID
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Image ActiveX Access Object
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Image ActiveX Access Object#ProductionEnvironment
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Image ActiveX Access Object#DisplayName
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Image ActiveX Access Object#UninstallString
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Image ActiveX Access Object#DisplayIcon
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Image ActiveX Access Object#DisplayVersion
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Image ActiveX Access Object#URLInfoAbout
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Image ActiveX Access Object#Publisher

    Adware.Tracking Cookie
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][10].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][6].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][5].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][4].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][4].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][7].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected]rson[1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][11].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][4].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected]ortal.112.2o7[2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
    C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][3].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][4].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][5].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][6].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt

    Trojan.Smitfraud Variant-Gen
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{5B3645F0-3F9A-4871-8464-1DD2CB7F5D37}\RP218\A0038270.DLL

    Trojan.Unknown Origin
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{5B3645F0-3F9A-4871-8464-1DD2CB7F5D37}\RP218\A0038275.ICO
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{5B3645F0-3F9A-4871-8464-1DD2CB7F5D37}\RP218\A0038276.ICO

    Logfile of Trend Micro HijackThis v2.0.0 (BETA)
    Scan saved at 5:22:29 PM, on 7/2/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
    C:\WINDOWS\system32\slserv.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\S3tray2.exe
    C:\WINDOWS\Dit.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\PROGRA~1\ALLTEL~1\SMARTB~1\MotiveSB.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\WINDOWS\DitExp.exe
    C:\Program Files\AIM6\aim6.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\Adobe\Acrobat 5.0\Distillr\AcroTray.exe
    C:\Program Files\Microsoft Office\Office\OSA.EXE
    C:\Program Files\AIM6\aolsoftware.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\internet explorer\iexplore.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Documents and Settings\Melissa\Desktop\HiJackThis_v2.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://msn.com/
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Acrobat\ActiveX\AcroIEHelper.ocx
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
    O4 - HKLM\..\Run: [S3TRAY2] S3tray2.exe
    O4 - HKLM\..\Run: [Dit] Dit.exe
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\ALLTEL~1\SMARTB~1\MotiveSB.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [Aim6] "C:\Program Files\AIM6\aim6.exe" /d locale=en-US ee://aol/imApp
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 5.0\Distillr\AcroTray.exe
    O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Office Startup.lnk = C:\Program Files\Microsoft Office\Office\OSA.EXE
    O4 - Global Startup: Windstream Broadband Check-up Center.lnk = C:\Program Files\ALLTEL DSL Check-up Center\bin\matcli.exe
    O9 - Extra button: Web Anti-Virus statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\scieplugin.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O15 - Trusted Zone: http://care.alltel.com
    O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} (QuickTime Object) - http://a1540.g.akamai.net/7/1540/52/20070501/qtinstall.info.apple.com/qtactivex/qtplugin.cab
    O16 - DPF: {321FB770-1FBE-4BFE-BDC1-6F622D4FA499} - https://activation.alltel.com/wizlet/WINDSTREAM/static/controls/WebflowActiveXInstaller_2-0-0.cab
    O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://photos.walmart.com/WalmartActivia.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{74E50CC8-DD18-4244-9083-25B3C1636DCF}: NameServer = 166.102.165.11 166.102.165.13
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
    O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
    O23 - Service: Kaspersky Anti-Virus 6.0 (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
    O23 - Service: SmartLinkService (SLService) - - C:\WINDOWS\SYSTEM32\slserv.exe

    --
    End of file - 4997 bytes
     
  6. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
  7. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/590432

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice