Solved: Help! Security Toolbar 7.1 Wont Go Away!

Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

mmotes

Thread Starter
Joined
Jun 30, 2007
Messages
3
My computer keeps saying I have back door trojans and many cases of spyware as well as security toolbar 7.1 Can anybody help me please?
 
Joined
Sep 7, 2004
Messages
49,014
You should print out these instructions, or copy them to a NotePad file for reading while in Safe Mode, because you will not be able to connect to the Internet to read from this site.

Please download SmitfraudFix (by S!Ri)
Extract the content (a folder named SmitfraudFix) to your Desktop.

Next, please reboot your computer in Safe Mode by doing the following :
  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
  • Instead of Windows loading as normal, a menu with options should appear;
  • Select the first option, to run Windows in Safe Mode, then press "Enter".
  • Choose your usual account.
Once in Safe Mode, open the SmitfraudFix folder again and double-click smitfraudfix.cmd
Select option #2 - Clean by typing 2 and press "Enter" to delete infected files.

You will be prompted: "Registry cleaning - Do you want to clean the registry?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.

The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".

The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart it into Normal Windows.

A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply along with a new hijack log.

The report can also be found at the root of the system drive, usually at C:\rapport.txt

Warning: running option #2 on a non infected computer will remove your Desktop background.
===============

Click here to download HJTsetup.exe:

http://www.thespykiller.co.uk/index.php?action=tpmod;dl=item5

Scroll down to the download section where the download button is

Save HJTsetup.exe to your desktop.

Double click on the HJTsetup.exe icon on your desktop.
By default it will install to C:\Program Files\Hijack This.
Continue to click Next in the setup dialogue boxes until you get to the Select Addition Tasks dialogue.
Put a check by Create a desktop icon then click Next again.
Continue to follow the rest of the prompts from there.
At the final dialogue box click Finish and it will launch Hijack This.
Click on the Do a system scan and save a log file button. It will scan and then ask you to save the log.
Click Save to save the log file and then the log will open in notepad.
Click on "Edit > Select All" then click on "Edit > Copy" to copy the entire contents of the log.
Come back here to this thread and Paste the log in your next reply.
DO NOT have Hijack This fix anything yet. Most of what it finds will be harmless or even required.
 

mmotes

Thread Starter
Joined
Jun 30, 2007
Messages
3
Here is rapport.txt:

SmitFraudFix v2.197

Scan done at 21:09:25.09, Sun 07/01/2007
Run from C:\Documents and Settings\Melissa\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in safe mode

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
"{94524218-9af3-4643-9687-cbc2880e54da}"="fagging"

[HKEY_CLASSES_ROOT\CLSID\{94524218-9af3-4643-9687-cbc2880e54da}\InProcServer32]
@="C:\WINDOWS\system32\nuqjici.dll"

[HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{94524218-9af3-4643-9687-cbc2880e54da}\InProcServer32]
@="C:\WINDOWS\system32\nuqjici.dll"


»»»»»»»»»»»»»»»»»»»»»»»» Killing process


»»»»»»»»»»»»»»»»»»»»»»»» hosts


127.0.0.1 localhost

»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

GenericRenosFix by S!Ri

C:\WINDOWS\system32\nuqjici.dll -> Hoax.Win32.Renos.gen.o
C:\WINDOWS\system32\nuqjici.dll -> Deleted


»»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files

C:\DOCUME~1\ALLUSE~1\STARTM~1\Online Security Guide.url Deleted
C:\DOCUME~1\ALLUSE~1\STARTM~1\Security Troubleshooting.url Deleted
C:\DOCUME~1\ALLUSE~1\Desktop\Online Security Guide.url Deleted
C:\DOCUME~1\ALLUSE~1\Desktop\Security Troubleshooting.url Deleted
C:\DOCUME~1\Melissa\FAVORI~1\Online Security Test.url Deleted
C:\Program Files\Image ActiveX Access\ Deleted

»»»»»»»»»»»»»»»»»»»»»»»» DNS

HKLM\SYSTEM\CCS\Services\Tcpip\..\{2216CDA1-5615-4436-AE37-30FCF796409C}: DhcpNameServer=192.168.254.254
HKLM\SYSTEM\CS1\Services\Tcpip\..\{2216CDA1-5615-4436-AE37-30FCF796409C}: DhcpNameServer=192.168.254.254
HKLM\SYSTEM\CS2\Services\Tcpip\..\{2216CDA1-5615-4436-AE37-30FCF796409C}: DhcpNameServer=192.168.254.254
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.254.254
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.254.254
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.254.254


»»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""


»»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

Registry Cleaning done.

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


»»»»»»»»»»»»»»»»»»»»»»»» End

Here is the HiJack This Log:

Logfile of Trend Micro HijackThis v2.0.0 (BETA)
Scan saved at 9:18:22 PM, on 7/1/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\S3tray2.exe
C:\WINDOWS\Dit.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\PROGRA~1\ALLTEL~1\SMARTB~1\MotiveSB.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\AIM6\aim6.exe
C:\Program Files\Adobe\Acrobat 5.0\Distillr\AcroTray.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
C:\Program Files\Microsoft Office\Office\OSA.EXE
C:\Program Files\AIM6\aolsoftware.exe
C:\WINDOWS\system32\slserv.exe
C:\WINDOWS\DitExp.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\internet explorer\iexplore.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Documents and Settings\Melissa\Desktop\HiJackThis_v2.exe

O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Acrobat\ActiveX\AcroIEHelper.ocx
O2 - BHO: (no name) - {184746EC-9E9D-4C7D-B9E7-9039EBD801A9} - C:\Program Files\Image ActiveX Access\iesplg.dll (file missing)
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [S3TRAY2] S3tray2.exe
O4 - HKLM\..\Run: [Dit] Dit.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\ALLTEL~1\SMARTB~1\MotiveSB.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Aim6] "C:\Program Files\AIM6\aim6.exe" /d locale=en-US ee://aol/imApp
O4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 5.0\Distillr\AcroTray.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Office Startup.lnk = C:\Program Files\Microsoft Office\Office\OSA.EXE
O4 - Global Startup: Windstream Broadband Check-up Center.lnk = C:\Program Files\ALLTEL DSL Check-up Center\bin\matcli.exe
O9 - Extra button: Web Anti-Virus statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\scieplugin.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O15 - Trusted Zone: http://care.alltel.com
O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} (QuickTime Object) - http://a1540.g.akamai.net/7/1540/52/20070501/qtinstall.info.apple.com/qtactivex/qtplugin.cab
O16 - DPF: {321FB770-1FBE-4BFE-BDC1-6F622D4FA499} - https://activation.alltel.com/wizlet/WINDSTREAM/static/controls/WebflowActiveXInstaller_2-0-0.cab
O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://photos.walmart.com/WalmartActivia.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{74E50CC8-DD18-4244-9083-25B3C1636DCF}: NameServer = 166.102.165.11 166.102.165.13
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: Kaspersky Anti-Virus 6.0 (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
O23 - Service: SmartLinkService (SLService) - - C:\WINDOWS\SYSTEM32\slserv.exe

--
End of file - 4808 bytes

Thanks............you guys are AWESOME!:)
 
Joined
Sep 7, 2004
Messages
49,014
Download Superantispyware (SAS) free home version

http://www.superantispyware.com/superantispywarefreevspro.html

Install it and double-click the icon on your desktop to run it.
· It will ask if you want to update the program definitions, click Yes.
· Under Configuration and Preferences, click the Preferences button.
· Click the Scanning Control tab.
· Under Scanner Options make sure the following are checked:
o Close browsers before scanning
o Scan for tracking cookies
o Terminate memory threats before quarantining.
o Please leave the others unchecked.
o Click the Close button to leave the control center screen.
· On the main screen, under Scan for Harmful Software click Scan your computer.
· On the left check C:\Fixed Drive.
· On the right, under Complete Scan, choose Perform Complete Scan.
· Click Next to start the scan. Please be patient while it scans your computer.
· After the scan is complete a summary box will appear. Click OK.
· Make sure everything in the white box has a check next to it, then click Next.
· It will quarantine what it found and if it asks if you want to reboot, click Yes.
· To retrieve the removal information for me please do the following:
o After reboot, double-click the SUPERAntispyware icon on your desktop.
o Click Preferences. Click the Statistics/Logs tab.
o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
o It will open in your default text editor (such as Notepad/Wordpad).
o Please highlight everything in the notepad, then right-click and choose copy.
· Click close and close again to exit the program.
· Please paste that information here for me with a new HijackThis log.

This will take some time!!!!!!!!
 

mmotes

Thread Starter
Joined
Jun 30, 2007
Messages
3
Ok here are the results........thanks so much for your help!!!!!




SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/02/2007 at 05:12 PM

Application Version : 3.9.1008

Core Rules Database Version : 3263
Trace Rules Database Version: 1274

Scan type : Complete Scan
Total Scan Time : 00:50:46

Memory items scanned : 367
Memory threats detected : 0
Registry items scanned : 3744
Registry threats detected : 16
File items scanned : 49927
File threats detected : 235

Trojan.Media-Codec/V3
HKLM\Software\Classes\CLSID\{184746EC-9E9D-4C7D-B9E7-9039EBD801A9}
HKCR\CLSID\{184746EC-9E9D-4C7D-B9E7-9039EBD801A9}
HKCR\CLSID\{184746EC-9E9D-4C7D-B9E7-9039EBD801A9}#xxx
HKCR\CLSID\{184746EC-9E9D-4C7D-B9E7-9039EBD801A9}\InprocServer32
HKCR\CLSID\{184746EC-9E9D-4C7D-B9E7-9039EBD801A9}\InprocServer32#ThreadingModel
C:\PROGRAM FILES\IMAGE ACTIVEX ACCESS\IESPLG.DLL
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{184746EC-9E9D-4C7D-B9E7-9039EBD801A9}
HKCR\imageactivexobject.Ñhl
HKCR\imageactivexobject.Ñhl\CLSID
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Image ActiveX Access Object
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Image ActiveX Access Object#ProductionEnvironment
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Image ActiveX Access Object#DisplayName
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Image ActiveX Access Object#UninstallString
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Image ActiveX Access Object#DisplayIcon
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Image ActiveX Access Object#DisplayVersion
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Image ActiveX Access Object#URLInfoAbout
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Image ActiveX Access Object#Publisher

Adware.Tracking Cookie
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][10].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][6].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][5].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][4].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][4].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][7].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][11].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][4].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][3].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][2].txt
C:\Documents and Settings\Melissa\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected].falkag[2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][3].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][4].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][5].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][6].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][2].txt
C:\Documents and Settings\Stephen\Cookies\[email protected][1].txt

Trojan.Smitfraud Variant-Gen
C:\SYSTEM VOLUME INFORMATION\_RESTORE{5B3645F0-3F9A-4871-8464-1DD2CB7F5D37}\RP218\A0038270.DLL

Trojan.Unknown Origin
C:\SYSTEM VOLUME INFORMATION\_RESTORE{5B3645F0-3F9A-4871-8464-1DD2CB7F5D37}\RP218\A0038275.ICO
C:\SYSTEM VOLUME INFORMATION\_RESTORE{5B3645F0-3F9A-4871-8464-1DD2CB7F5D37}\RP218\A0038276.ICO

Logfile of Trend Micro HijackThis v2.0.0 (BETA)
Scan saved at 5:22:29 PM, on 7/2/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
C:\WINDOWS\system32\slserv.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\S3tray2.exe
C:\WINDOWS\Dit.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\PROGRA~1\ALLTEL~1\SMARTB~1\MotiveSB.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\DitExp.exe
C:\Program Files\AIM6\aim6.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Adobe\Acrobat 5.0\Distillr\AcroTray.exe
C:\Program Files\Microsoft Office\Office\OSA.EXE
C:\Program Files\AIM6\aolsoftware.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\internet explorer\iexplore.exe
C:\WINDOWS\System32\svchost.exe
C:\Documents and Settings\Melissa\Desktop\HiJackThis_v2.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://msn.com/
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Acrobat\ActiveX\AcroIEHelper.ocx
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [S3TRAY2] S3tray2.exe
O4 - HKLM\..\Run: [Dit] Dit.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\ALLTEL~1\SMARTB~1\MotiveSB.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Aim6] "C:\Program Files\AIM6\aim6.exe" /d locale=en-US ee://aol/imApp
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 5.0\Distillr\AcroTray.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Office Startup.lnk = C:\Program Files\Microsoft Office\Office\OSA.EXE
O4 - Global Startup: Windstream Broadband Check-up Center.lnk = C:\Program Files\ALLTEL DSL Check-up Center\bin\matcli.exe
O9 - Extra button: Web Anti-Virus statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\scieplugin.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O15 - Trusted Zone: http://care.alltel.com
O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} (QuickTime Object) - http://a1540.g.akamai.net/7/1540/52/20070501/qtinstall.info.apple.com/qtactivex/qtplugin.cab
O16 - DPF: {321FB770-1FBE-4BFE-BDC1-6F622D4FA499} - https://activation.alltel.com/wizlet/WINDSTREAM/static/controls/WebflowActiveXInstaller_2-0-0.cab
O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://photos.walmart.com/WalmartActivia.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{74E50CC8-DD18-4244-9083-25B3C1636DCF}: NameServer = 166.102.165.11 166.102.165.13
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: Kaspersky Anti-Virus 6.0 (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
O23 - Service: SmartLinkService (SLService) - - C:\WINDOWS\SYSTEM32\slserv.exe

--
End of file - 4997 bytes
 
Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 807,865 other people just like you!

Latest posts

Staff online

Top