1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Solved: Hijack This Log. Please help!

Discussion in 'Virus & Other Malware Removal' started by ManoCooper, Feb 16, 2007.

Thread Status:
Not open for further replies.
Advertisement
  1. ManoCooper

    ManoCooper Thread Starter

    Joined:
    Jul 9, 2003
    Messages:
    41
    I am working on a neighbors computer and am having issues with pop ups every time it boots up.
    I updated the AVG definitions and scanned the machine and removed a boat load of virus's. I then scanned with Adaware with the latest definitions and Spy bot.

    All that seems to be left is Command service. Spy bot seems to be the only thing that will find this but it cannot remove it.

    I ran HJT on the machine and am including the log.

    Logfile of HijackThis v1.99.1
    Scan saved at 7:51:04 PM, on 2/16/2007
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Hijackthis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.copper.net/
    R3 - Default URLSearchHook is missing
    F2 - REG:system.ini: UserInit=C:\WINDOWS\System32\userinit.exe,C:\WINDOWS\system32\1.tmp
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
    O4 - HKLM\..\RunServices: [Compaq32 Service Drivers] msconfig32.exe
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O20 - Winlogon Notify: Syncmgr - C:\WINDOWS\system32\guard.tmp (file missing)
    O20 - Winlogon Notify: ThemeManager - C:\WINDOWS\system32\hr6o05j3e.dll (file missing)
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Network Windows Service (MSWindows) - Unknown owner - C:\WINDOWS\System32\urdvxc.exe" /service (file missing)
    O23 - Service: Windows Network Security Management Service (nsms) - Unknown owner - C:\WINDOWS\system32\1.tmp (file missing)
    O23 - Service: Pml Driver HPH11 - HP - C:\WINDOWS\System32\HPHipm11.exe
    O23 - Service: Microsoft sdk core (sdk) - Unknown owner - C:\WINDOWS\lsass.exe (file missing)
    O23 - Service: Windows Genuine Advantage Registration Service (wgareg) - Unknown owner - C:\WINDOWS\System32\wgareg.exe (file missing)

    Thanks in advance for any help
     
  2. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Download http://downloads.andymanchesta.com/RemovalTools/SDFix.exe and save it to your Desktop.

    Double click SDFix.exe and it will extract the files to %systemdrive%
    (Drive that contains the Windows Directory, typically C:\SDFix)

    Please then reboot your computer in Safe Mode by doing the following :
    · Restart your computer
    · After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
    · Instead of Windows loading as normal, the Advanced Options Menu should appear;
    · Select the first option, to run Windows in Safe Mode, then press Enter.
    · Choose your usual account.
    · Open the extracted SDFix folder and double click RunThis.bat to start the script.
    · Type Y to begin the cleanup process.
    · It will remove any Trojan Services and Registry Entries that it finds then prompt you to press any key to Reboot.
    · Press any Key and it will restart the PC.
    · When the PC restarts the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
    · Once the desktop icons load the SDFix report will open on screen and also save into the SDFix folder as Report.txt
    (Report.txt will also be copied to Clipboard ready for posting back on the forum).
    · Finally paste the contents of the Report.txt back on the forum with a new HijackThis log
    =======================

    Download Superantispyware (SAS)

    http://www.superantispyware.com/superantispywarefreevspro.html

    Install it and double-click the icon on your desktop to run it.
    · It will ask if you want to update the program definitions, click Yes.
    · Under Configuration and Preferences, click the Preferences button.
    · Click the Scanning Control tab.
    · Under Scanner Options make sure the following are checked:
    o Close browsers before scanning
    o Scan for tracking cookies
    o Terminate memory threats before quarantining.
    o Please leave the others unchecked.
    o Click the Close button to leave the control center screen.
    · On the main screen, under Scan for Harmful Software click Scan your computer.
    · On the left check C:\Fixed Drive.
    · On the right, under Complete Scan, choose Perform Complete Scan.
    · Click Next to start the scan. Please be patient while it scans your computer.
    · After the scan is complete a summary box will appear. Click OK.
    · Make sure everything in the white box has a check next to it, then click Next.
    · It will quarantine what it found and if it asks if you want to reboot, click Yes.
    · To retrieve the removal information for me please do the following:
    o After reboot, double-click the SUPERAntispyware icon on your desktop.
    o Click Preferences. Click the Statistics/Logs tab.
    o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    o It will open in your default text editor (such as Notepad/Wordpad).
    o Please highlight everything in the notepad, then right-click and choose copy.
    · Click close and close again to exit the program.
    · Please paste that information here for me with a new HijackThis log.
     
  3. ManoCooper

    ManoCooper Thread Starter

    Joined:
    Jul 9, 2003
    Messages:
    41
    Report:

    SDFix: Version 1.65

    Run by: Jim - Fri 02/16/2007 @ 20:18:21.14

    Microsoft Windows XP [Version 5.1.2600]

    Running From: C:\SDFix

    Safe Mode:
    Checking Services:

    Name:
    MSWindows
    nsms
    sdk
    wgareg

    Path:
    "C:\WINDOWS\System32\urdvxc.exe" /service
    C:\WINDOWS\system32\1.tmp
    "C:\WINDOWS\lsass.exe"
    C:\WINDOWS\System32\wgareg.exe

    MSWindows Deleted
    nsms Deleted
    sdk Deleted
    wgareg Deleted

    Restoring Windows Registry Entries
    Restoring Default Hosts File


    Rebooting...

    Normal Mode:
    Checking Files:

    Below files will be copied to Backups folder then removed:

    C:\WINDOWS\system32\.exe - Deleted
    C:\WINDOWS\system32\eraseme_24285.exe - Deleted
    C:\WINDOWS\system32\.exe - Deleted
    C:\WINDOWS\system32\i - Deleted
    C:\WINDOWS\system32\TFTP208 - Deleted
    C:\WINDOWS\system32\TFTP3564 - Deleted
    C:\WINDOWS\Uninst2.htm - Deleted
    C:\WINDOWS\Unist1.htm - Deleted



    ADS Check:

    C:\WINDOWS\system32
    No streams found.

    Final Check:



    Remaining Files:
    ---------------

    Backups Folder: - C:\SDFix\backups\backups.zip


    Checking For Files with Hidden Attributes :


    Finished
    HJT:

    Logfile of HijackThis v1.99.1
    Scan saved at 8:27:21 PM, on 2/16/2007
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Program Files\Hijackthis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.copper.net/
    R3 - Default URLSearchHook is missing
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O20 - Winlogon Notify: Syncmgr - C:\WINDOWS\system32\guard.tmp (file missing)
    O20 - Winlogon Notify: ThemeManager - C:\WINDOWS\system32\hr6o05j3e.dll (file missing)
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Pml Driver HPH11 - HP - C:\WINDOWS\System32\HPHipm11.exe

    Working on SAS now
     
  4. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Do this also

    http://www.atribune.org/ccount/click.php?id=7 to download Look2Me-Destroyer.exe and save it to your desktop.
    · Close all windows before continuing.
    · Double-click Look2Me-Destroyer.exe to run it.
    · check a box called "Run this program as a task"
    · click the Scan for L2M button, your desktop icons will disappear, this is normal.
    · Once it's done scanning, click the Remove L2M button.
    · You will receive a Done Scanning message, click OK.
    · When completed, you will receive this message: Done removing infected files! Look2Me-Destroyer will now shutdown your computer, click OK.
    · Your computer will then shutdown.
    · Turn your computer back on.
    · Please post the contents of C:\Look2Me-Destroyer.txt and a new HiJackThis log.
    If Look2Me-Destroyer does not reopen automatically, reboot and try again.

    If you receive a message from your firewall about this program accessing the internet please allow it.

    If you receive a runtime error '339' please download MSWINSCK.OCX from the link below and place it in your C:\Windows\System32 Directory.

    http://www.ascentive.com/support/new/images/lib/MSWINSCK.OCX
     
  5. ManoCooper

    ManoCooper Thread Starter

    Joined:
    Jul 9, 2003
    Messages:
    41
    Here is the Log. I am currently running [email protected] destroyer. I will post the HJT log when that is complete.

    SUPERAntiSpyware Scan Log
    Generated 02/16/2007 at 09:18 PM

    Application Version : 3.5.1016

    Core Rules Database Version : 3184
    Trace Rules Database Version: 1194

    Scan type : Complete Scan
    Total Scan Time : 00:43:58

    Memory items scanned : 295
    Memory threats detected : 0
    Registry items scanned : 4774
    Registry threats detected : 53
    File items scanned : 28172
    File threats detected : 117

    Trojan.ISA32
    HKLM\System\ControlSet001\Services\isa32
    C:\WINDOWS\SYSTEM32\DRIVERS\ISA32.SYS
    HKLM\System\ControlSet002\Services\isa32
    HKLM\System\CurrentControlSet\Services\isa32
    HKLM\SYSTEM\CurrentControlSet\Services\isa32#Type
    HKLM\SYSTEM\CurrentControlSet\Services\isa32#Start
    HKLM\SYSTEM\CurrentControlSet\Services\isa32#ErrorControl
    HKLM\SYSTEM\CurrentControlSet\Services\isa32#ImagePath
    HKLM\SYSTEM\CurrentControlSet\Services\isa32#DisplayName
    HKLM\SYSTEM\CurrentControlSet\Services\isa32#Group
    HKLM\SYSTEM\CurrentControlSet\Services\isa32\Security
    HKLM\SYSTEM\CurrentControlSet\Services\isa32\Security#Security
    HKLM\SYSTEM\CurrentControlSet\Services\isa32\Enum
    HKLM\SYSTEM\CurrentControlSet\Services\isa32\Enum#0
    HKLM\SYSTEM\CurrentControlSet\Services\isa32\Enum#Count
    HKLM\SYSTEM\CurrentControlSet\Services\isa32\Enum#NextInstance
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ISA32
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ISA32#NextInstance
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ISA32\0000
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ISA32\0000#Service
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ISA32\0000#Legacy
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ISA32\0000#ConfigFlags
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ISA32\0000#Class
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ISA32\0000#ClassGUID
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ISA32\0000#DeviceDesc
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ISA32\0000#Capabilities
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ISA32\0000#Driver
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ISA32\0000\LogConf
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ISA32\0000\Control
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ISA32\0000\Control#ActiveService

    Adware.Tracking Cookie
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jim\Cookies\[email protected][1].txt

    Trojan.NetMon/DNSChange
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR#NextInstance
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Service
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Legacy
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ConfigFlags
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Class
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ClassGUID
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#DeviceDesc

    Trojan.cmdService
    HKLM\SYSTEM\CurrentControlSet\Services\cmdService
    HKLM\SYSTEM\CurrentControlSet\Services\cmdService#Type
    HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Enum
    HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Enum#0
    HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Enum#Count
    HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Enum#NextInstance
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE#NextInstance
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Service
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Legacy
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ConfigFlags
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Class
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ClassGUID
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#DeviceDesc

    Trojan.DollarRevenue
    C:\WINDOWS\keyboard1.dat

    TargetSaver, Inc. Process
    C:\DOCUMENTS AND SETTINGS\JIM\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\C1UBS1A3\TSINSTALL_4_0_4_0_B4[1].EXE

    Adware.Unknown Origin
    C:\PROGRAM FILES\COMMON FILES\MIWU\MIWUD\CLASS-BARREL
    C:\PROGRAM FILES\COMMON FILES\MIWU\MIWUD\VOCABULARY
    C:\PROGRAM FILES\WINDOWS MEDIA PLAYER\HOCYSOSUQ.HTML
    C:\PROGRAM FILES\WINDOWSUPDATE\KYFEVYV.HTML

    Adware.SurfSideKick
    C:\RECYCLER\S-1-5-21-1454471165-1682526488-725345543-1003\DC127.TMP

    Trojan.YourEnhancement
    C:\WINDOWS\MS0579380-52972006.EXE

    Trojan.Defender1
    C:\WINDOWS\PREFETCH\DFNDRFF_13.EXE-0CE5AAB5.PF
    C:\WINDOWS\PREFETCH\DFNDRFF_14.EXE-2CE5E38B.PF

    Trojan.Unknown Origin
    C:\WINDOWS\SMLTIFNOZWX0B24\MA5QKIHCTQUXVZB.VBS
    C:\WINDOWS\SYSTEM32\JXM9E3A4.SYS

    Adware.NicTech Networks
    C:\WINDOWS\SYSTEM32\DN4001HME.DLL
    C:\WINDOWS\SYSTEM32\DNNM0151E.DLL
    C:\WINDOWS\SYSTEM32\ETPSRV.DLL
    C:\WINDOWS\SYSTEM32\ICSSUBA.DLL
    C:\WINDOWS\SYSTEM32\OEESVR32.DLL
    C:\WINDOWS\SYSTEM32\SCFOLDER.DLL
    C:\WINDOWS\SYSTEM32\SOMAPI.DLL
     
  6. ManoCooper

    ManoCooper Thread Starter

    Joined:
    Jul 9, 2003
    Messages:
    41
    I am done with L2M destroyer and ran another HJT log. I was never able o get L2M destroyer to come back up after several reboots as per the directions.

    L2M log:


    Look2Me-Destroyer V1.0.12

    Scanning for infected files.....
    Scan started at 2/16/2007 9:26:09 PM

    Infected! C:\WINDOWS\system32\hr6o05j3e.dll

    Attempting to delete infected files...

    Making registry repairs.

    Removing: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ThemeManager

    Removing: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved "{4432C364-BD04-453B-823D-CD39666D0B22}"
    HKCR\Clsid\{4432C364-BD04-453B-823D-CD39666D0B22}

    Removing: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved "{B339A179-4387-4177-8B85-D712FD7F6819}"
    HKCR\Clsid\{B339A179-4387-4177-8B85-D712FD7F6819}

    Removing: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved "{E8B481E5-4610-4068-B271-133E076F5E82}"
    HKCR\Clsid\{E8B481E5-4610-4068-B271-133E076F5E82}

    Removing: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved "{AA9F2896-69FE-4CA7-BC84-FF8A0BE7889C}"
    HKCR\Clsid\{AA9F2896-69FE-4CA7-BC84-FF8A0BE7889C}

    Removing: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved "{506B5432-70FD-4FB6-A9D6-07639183497B}"
    HKCR\Clsid\{506B5432-70FD-4FB6-A9D6-07639183497B}

    Removing: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved "{90564A4E-745D-4747-A034-BB98EA2495CC}"
    HKCR\Clsid\{90564A4E-745D-4747-A034-BB98EA2495CC}

    Removing: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved "{42BE4B94-9FA7-4B0C-8368-6D9964D66457}"
    HKCR\Clsid\{42BE4B94-9FA7-4B0C-8368-6D9964D66457}

    Removing: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved "{FE76983C-18C0-4BEE-84B6-98F7AA40069A}"
    HKCR\Clsid\{FE76983C-18C0-4BEE-84B6-98F7AA40069A}

    Removing: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved "{67211299-8DB3-45C2-86DE-90CFE26C6DB8}"
    HKCR\Clsid\{67211299-8DB3-45C2-86DE-90CFE26C6DB8}

    Restoring Windows certificates.

    Replaced hosts file with default windows hosts file


    Restoring SeDebugPrivilege for Administrators - Succeeded

    HJT:

    Logfile of HijackThis v1.99.1
    Scan saved at 9:32:48 PM, on 2/16/2007
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    C:\WINDOWS\Explorer.EXE
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\WINDOWS\System32\wuauclt.exe
    C:\Program Files\Hijackthis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.copper.net/
    R3 - Default URLSearchHook is missing
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Pml Driver HPH11 - HP - C:\WINDOWS\System32\HPHipm11.exe

    Thanks again.
     
  7. ManoCooper

    ManoCooper Thread Starter

    Joined:
    Jul 9, 2003
    Messages:
    41
    Thanks for all the help. Anything else I need to do?
     
  8. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    DownLoad EasyCleaner http://www.majorgeeks.com/download414.html

    Use the clear files and Unnecessary files buttons – I do not recommend
    using the Duplicates files button
    as many dupes are there on purpose.

    Not all files will delete – that is normal.

    In the unnecessary button I check the top 4 entries
    ===============

    Clean [​IMG]
    If you feel its is fixed mark it solved via Thread Tools above

    Turn off restore points, boot, turn them back on – here’s how

    http://service1.symantec.com/SUPPOR...2001111912274039?OpenDocument&src=sec_doc_nam
     
  9. ManoCooper

    ManoCooper Thread Starter

    Joined:
    Jul 9, 2003
    Messages:
    41
    Every thing is looking great!!!!(y) :D
     
  10. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/544694

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice