1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Solved: Malware/system security

Discussion in 'Virus & Other Malware Removal' started by redder01_ca, Nov 5, 2007.

Thread Status:
Not open for further replies.
Advertisement
  1. redder01_ca

    redder01_ca Thread Starter

    Joined:
    Nov 5, 2007
    Messages:
    11
    I have a couple of icons on my bottom right, they flash off and on with security Alert:[email protected] and other links like that, to click on the balloon to d/l up-to-date spyware. I have ran my telus security program, spybot search and destroy and ad-aware. I am unable to get rid of these and they won't allow my browser to open properly either.:( These pop ups keep adding antivirgear and programs like that security toolbar 7.1. If anyone knows how I can rid them please help:eek:
     
  2. Cheeseball81

    Cheeseball81 Retired Moderator

    Joined:
    Mar 3, 2004
    Messages:
    84,315
    * Click here to download HJTsetup.exe.
    Save HJTsetup.exe to your desktop.

    Double click on the HJTsetup.exe icon on your desktop.
    By default it will install to C:\Program Files\Hijack This.
    Continue to click Next in the setup dialogue boxes until you get to the Select Addition Tasks dialogue.
    Put a check by Create a desktop icon then click Next again.
    Continue to follow the rest of the prompts from there.
    At the final dialogue box click Finish and it will launch Hijack This.
    Click on the Do a system scan and save a log file button. It will scan and then ask you to save the log.
    Click Save to save the log file and then the log will open in notepad.
    Click on "Edit > Select All" then click on "Edit > Copy" to copy the entire contents of the log.
    Come back here to this thread and Paste the log in your next reply.
    DO NOT have Hijack This fix anything yet. Most of what it finds will be harmless or even required.
     
  3. redder01_ca

    redder01_ca Thread Starter

    Joined:
    Nov 5, 2007
    Messages:
    11
    Finally ! was torment getting the HJT downloaded.
    Will install and run AVG Antivirus and AVG Antispyware and SuperAntispyware.

    HJT log :

    Logfile of HijackThis v1.99.1
    Scan saved at 9:52:20 PM, on 11/7/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
    C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
    C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Adobe\Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
    C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
    C:\Program Files\Common Files\Command Software\dvpapi.exe
    C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe
    C:\Program Files\TELUS\TELUS Security service\Freedom.exe
    C:\Program Files\TELUS\eProtect Advisor\TEPA.exe
    C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd2.exe
    C:\PROGRA~1\Intel\Wireless\Bin\Dot1XCfg.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\DonF\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://msn.ca/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://shoptoshiba.ca/welcome
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O3 - Toolbar: Security Toolbar - {11A69AE4-FBED-4832-A2BF-45AF82825583} - C:\WINDOWS\system32\tqxdqohu.dll
    O4 - HKLM\..\Run: [IntelWireless] "C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe" /tf Intel PROSet/Wireless
    O4 - HKLM\..\Run: [TELUS Security service] "C:\Program Files\TELUS\TELUS Security service\Freedom.exe"
    O4 - HKLM\..\Run: [TEPA.exe] "C:\Program Files\TELUS\eProtect Advisor\TEPA.exe" /AUTORUN
    O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd2.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O8 - Extra context menu item: &Search - ?p=ZJ
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab31267.cab
    O16 - DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} (StagingUI Object) - http://zone.msn.com/binFrameWork/v10/StagingUI.cab55579.cab
    O16 - DPF: {1A781DED-C22D-4153-3213-A3211E29DF13} (GameDesire Card Games) - http://67.15.101.3/g_bin/eng/cards_2_0_0_73.cab
    O16 - DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} (MSN Games – Buddy Invite) - http://zone.msn.com/BinFrameWork/v10/ZBuddy.cab55579.cab
    O16 - DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} (ZonePAChat Object) - http://zone.msn.com/binframework/v10/ZPAChat.cab55579.cab
    O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - http://go.divx.com/plugin/DivXBrowserPlugin.cab
    O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
    O16 - DPF: {95B5D20C-BD31-4489-8ABF-F8C8BE748463} (ZPA_HRTZ Object) - http://zone.msn.com/bingame/zpagames/zpa_hrtz.cab58570.cab
    O16 - DPF: {97E71027-0BA2-44F2-97DB-F84D808ED0B6} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab55762.cab
    O16 - DPF: {AB86CE53-AC9F-449F-9399-D8ABCA09EC09} (Get_ActiveX Control) - https://h17000.www1.hp.com/ewfrf-JAVA/Secure/HPGetDownloadManager.ocx
    O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://cdn2.zone.msn.com/binFramework/v10/ZIntro.cab56649.cab
    O16 - DPF: {D54160C3-DB7B-4534-9B65-190EE4A9C7F7} (SproutLauncherCtrl Class) - http://zone.msn.com/bingame/feed/default/SproutLauncher.cab
    O16 - DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} (MSN Games – Game Communicator) - http://zone.msn.com/binframework/v10/StProxy.cab55579.cab
    O16 - DPF: {DC75FEF6-165D-4D25-A518-C8C4BDA7BAA6} (CPlayFirstDinerDashControl Object) - http://zone.msn.com/bingame/dash/default/DinerDash.1.0.0.98.cab
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://zone.msn.com/bingame/popcaploader_v10.cab
    O18 - Protocol: livecall - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
    O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    O23 - Service: Adobe Active File Monitor V5 (AdobeActiveFileMonitor5.0) - Unknown owner - C:\Program Files\Adobe\Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
    O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
    O23 - Service: DvpApi (dvpapi) - Command Software Systems, Inc. - C:\Program Files\Common Files\Command Software\dvpapi.exe
    O23 - Service: Intel(R) PROSet/Wireless Event Log (EvtEng) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
    O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: Intel(R) PROSet/Wireless Registry Service (RegSrvc) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
    O23 - Service: Intel(R) PROSet/Wireless Service (S24EventMonitor) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
    O23 - Service: TOSHIBA Application Service (TAPPSRV) - TOSHIBA Corp. - C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe

    End of HJT log.

    Thanks
     
  4. Cheeseball81

    Cheeseball81 Retired Moderator

    Joined:
    Mar 3, 2004
    Messages:
    84,315
    Please download SmitfraudFix (by S!Ri)
    Extract the content (a folder named SmitfraudFix) to your Desktop.

    Open the SmitfraudFix folder and double-click smitfraudfix.cmd
    Select option #1 - Search by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present).
    Please copy/paste the content of that report into your next reply.

    Note : process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
    http://www.beyondlogic.org/consulting/proc...processutil.htm
     
  5. redder01_ca

    redder01_ca Thread Starter

    Joined:
    Nov 5, 2007
    Messages:
    11
    I have run SuperAnti Spyware but I will not click "next" on it until you give me the word Cheeseball


    Smitfraud fix option 1 :

    SmitFraudFix v2.250

    Scan done at 19:35:01.73, Thu 11/08/2007
    Run from C:\DonF\SmitfraudFix\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    The filesystem type is NTFS
    Fix run in normal mode

    »»»»»»»»»»»»»»»»»»»»»»»» Process

    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
    C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
    C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Adobe\Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
    C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
    C:\Program Files\Common Files\Command Software\dvpapi.exe
    C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe
    C:\Program Files\TELUS\TELUS Security service\Freedom.exe
    C:\Program Files\TELUS\eProtect Advisor\TEPA.exe
    C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd2.exe
    C:\PROGRA~1\Intel\Wireless\Bin\Dot1XCfg.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\WINDOWS\system32\cmd.exe

    »»»»»»»»»»»»»»»»»»»»»»»» hosts


    »»»»»»»»»»»»»»»»»»»»»»»» C:\


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32

    C:\WINDOWS\system32\ugbtna.dll FOUND !

    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32\LogFiles


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Danielle


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Danielle\Application Data


    »»»»»»»»»»»»»»»»»»»»»»»» Start Menu


    »»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\Danielle\FAVORI~1


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files


    »»»»»»»»»»»»»»»»»»»»»»»» Corrupted keys


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop Components

    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
    "Source"="About:Home"
    "SubscribedURL"="About:Home"
    "FriendlyName"="My Current Home Page"


    »»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
    "{75a65a53-15c9-4a0c-bb40-a7ca8b24f544}"="boardwalk"

    [HKEY_CLASSES_ROOT\CLSID\{75a65a53-15c9-4a0c-bb40-a7ca8b24f544}\InProcServer32]
    @="C:\WINDOWS\system32\ugbtna.dll"

    [HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{75a65a53-15c9-4a0c-bb40-a7ca8b24f544}\InProcServer32]
    @="C:\WINDOWS\system32\ugbtna.dll"



    »»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
    "AppInit_DLLs"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "System"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Rustock



    »»»»»»»»»»»»»»»»»»»»»»»» DNS

    Description: Intel(R) PRO/Wireless 3945BG Network Connection - Packet Scheduler Miniport
    DNS Server Search Order: 192.168.1.254

    HKLM\SYSTEM\CCS\Services\Tcpip\..\{A1ACD364-6A5C-4C9F-A517-B9E853D0969A}: DhcpNameServer=192.168.1.254
    HKLM\SYSTEM\CS1\Services\Tcpip\..\{A1ACD364-6A5C-4C9F-A517-B9E853D0969A}: DhcpNameServer=192.168.1.254
    HKLM\SYSTEM\CS3\Services\Tcpip\..\{A1ACD364-6A5C-4C9F-A517-B9E853D0969A}: DhcpNameServer=192.168.1.254
    HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254
    HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254
    HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254


    »»»»»»»»»»»»»»»»»»»»»»»» Scanning for wininet.dll infection


    »»»»»»»»»»»»»»»»»»»»»»»» End
     
  6. Cheeseball81

    Cheeseball81 Retired Moderator

    Joined:
    Mar 3, 2004
    Messages:
    84,315
    You should print out these instructions, or copy them to a NotePad file for reading while in Safe Mode, because you will not be able to connect to the Internet to read from this site.

    Next, please reboot your computer in Safe Mode by doing the following :
    • Restart your computer
    • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
    • Instead of Windows loading as normal, a menu with options should appear;
    • Select the first option, to run Windows in Safe Mode, then press "Enter".
    • Choose your usual account.
    Once in Safe Mode, open the SmitfraudFix folder again and double-click smitfraudfix.cmd
    Select option #2 - Clean by typing 2 and press "Enter" to delete infected files.

    You will be prompted: "Registry cleaning - Do you want to clean the registry?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.

    The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".

    The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart it into Normal Windows.

    A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply.

    The report can also be found at the root of the system drive, usually at C:\rapport.txt

    Warning: running option #2 on a non infected computer will remove your Desktop background.
     
  7. redder01_ca

    redder01_ca Thread Starter

    Joined:
    Nov 5, 2007
    Messages:
    11
    Hi Cheeseball81, I will do this as soon as I ask you these questions.

    Do you want a new HJT log as well after I've rebooted?

    Also, SuperAntispyware has found a lot of things but I haven't clicked next on it to fix them.
    Do you want me to click 'next' to fix what SuperAntispyware has found or just click cancel and proceed with your instructions above?
     
  8. Cheeseball81

    Cheeseball81 Retired Moderator

    Joined:
    Mar 3, 2004
    Messages:
    84,315
    Yes fix them and yes post a new Hijack This log.
     
  9. redder01_ca

    redder01_ca Thread Starter

    Joined:
    Nov 5, 2007
    Messages:
    11
    Here is rapport:
    SmitFraudFix v2.250

    Scan done at 20:35:44.46, Fri 11/09/2007
    Run from C:\DonF\SmitfraudFix\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    The filesystem type is NTFS
    Fix run in safe mode

    »»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    »»»»»»»»»»»»»»»»»»»»»»»» Killing process


    »»»»»»»»»»»»»»»»»»»»»»»» hosts


    127.0.0.1 localhost

    »»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix

    S!Ri's WS2Fix: LSP not Found.


    »»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

    GenericRenosFix by S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files


    »»»»»»»»»»»»»»»»»»»»»»»» DNS

    HKLM\SYSTEM\CCS\Services\Tcpip\..\{A1ACD364-6A5C-4C9F-A517-B9E853D0969A}: DhcpNameServer=192.168.1.254
    HKLM\SYSTEM\CS1\Services\Tcpip\..\{A1ACD364-6A5C-4C9F-A517-B9E853D0969A}: DhcpNameServer=192.168.1.254
    HKLM\SYSTEM\CS3\Services\Tcpip\..\{A1ACD364-6A5C-4C9F-A517-B9E853D0969A}: DhcpNameServer=192.168.1.254
    HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254
    HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254
    HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


    »»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "System"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

    Registry Cleaning done.

    »»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll


    »»»»»»»»»»»»»»»»»»»»»»»» End

    Hijackthis:

    Logfile of HijackThis v1.99.1
    Scan saved at 8:45:59 PM, on 11/9/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
    C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
    C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Adobe\Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
    C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe
    C:\Program Files\TELUS\TELUS Security service\Freedom.exe
    C:\Program Files\TELUS\eProtect Advisor\TEPA.exe
    C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd2.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\WINDOWS\system32\nnufjhlc.exe
    C:\Program Files\Common Files\Command Software\dvpapi.exe
    C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe
    C:\PROGRA~1\Intel\Wireless\Bin\Dot1XCfg.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\WINDOWS\system32\NOTEPAD.EXE
    C:\WINDOWS\system32\rundll32.exe
    C:\DonF\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://msn.ca/
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://shoptoshiba.ca/welcome
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O4 - HKLM\..\Run: [IntelWireless] "C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe" /tf Intel PROSet/Wireless
    O4 - HKLM\..\Run: [TELUS Security service] "C:\Program Files\TELUS\TELUS Security service\Freedom.exe"
    O4 - HKLM\..\Run: [TEPA.exe] "C:\Program Files\TELUS\eProtect Advisor\TEPA.exe" /AUTORUN
    O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd2.exe
    O4 - HKLM\..\Run: [d8dc06b9] rundll32.exe "C:\WINDOWS\system32\llqytwjx.dll",b
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O8 - Extra context menu item: &Search - ?p=ZJ
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab31267.cab
    O16 - DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} (StagingUI Object) - http://zone.msn.com/binFrameWork/v10/StagingUI.cab55579.cab
    O16 - DPF: {1A781DED-C22D-4153-3213-A3211E29DF13} (GameDesire Card Games) - http://67.15.101.3/g_bin/eng/cards_2_0_0_73.cab
    O16 - DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} (MSN Games – Buddy Invite) - http://zone.msn.com/BinFrameWork/v10/ZBuddy.cab55579.cab
    O16 - DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} (ZonePAChat Object) - http://zone.msn.com/binframework/v10/ZPAChat.cab55579.cab
    O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - http://go.divx.com/plugin/DivXBrowserPlugin.cab
    O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
    O16 - DPF: {95B5D20C-BD31-4489-8ABF-F8C8BE748463} (ZPA_HRTZ Object) - http://zone.msn.com/bingame/zpagames/zpa_hrtz.cab58570.cab
    O16 - DPF: {97E71027-0BA2-44F2-97DB-F84D808ED0B6} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab55762.cab
    O16 - DPF: {AB86CE53-AC9F-449F-9399-D8ABCA09EC09} (Get_ActiveX Control) - https://h17000.www1.hp.com/ewfrf-JAVA/Secure/HPGetDownloadManager.ocx
    O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://cdn2.zone.msn.com/binFramework/v10/ZIntro.cab56649.cab
    O16 - DPF: {D54160C3-DB7B-4534-9B65-190EE4A9C7F7} (SproutLauncherCtrl Class) - http://zone.msn.com/bingame/feed/default/SproutLauncher.cab
    O16 - DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} (MSN Games – Game Communicator) - http://zone.msn.com/binframework/v10/StProxy.cab55579.cab
    O16 - DPF: {DC75FEF6-165D-4D25-A518-C8C4BDA7BAA6} (CPlayFirstDinerDashControl Object) - http://zone.msn.com/bingame/dash/default/DinerDash.1.0.0.98.cab
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://zone.msn.com/bingame/popcaploader_v10.cab
    O18 - Protocol: livecall - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
    O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    O23 - Service: Adobe Active File Monitor V5 (AdobeActiveFileMonitor5.0) - Unknown owner - C:\Program Files\Adobe\Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
    O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
    O23 - Service: DomainService - - C:\WINDOWS\system32\nnufjhlc.exe
    O23 - Service: DvpApi (dvpapi) - Command Software Systems, Inc. - C:\Program Files\Common Files\Command Software\dvpapi.exe
    O23 - Service: Intel(R) PROSet/Wireless Event Log (EvtEng) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
    O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: Intel(R) PROSet/Wireless Registry Service (RegSrvc) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
    O23 - Service: Intel(R) PROSet/Wireless Service (S24EventMonitor) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
    O23 - Service: TOSHIBA Application Service (TAPPSRV) - TOSHIBA Corp. - C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe

    End of hijack this

    SUPERAntiSpyware log:

    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 11/08/2007 at 00:02 AM

    Application Version : 3.9.1008

    Core Rules Database Version : 3340
    Trace Rules Database Version: 1341

    Scan type : Complete Scan
    Total Scan Time : 01:20:01

    Memory items scanned : 453
    Memory threats detected : 4
    Registry items scanned : 4633
    Registry threats detected : 33
    File items scanned : 79363
    File threats detected : 121

    Trojan.Downloader-Gen/Hammer
    C:\WINDOWS\SYSTEM32\TQXDQOHU.DLL
    C:\WINDOWS\SYSTEM32\TQXDQOHU.DLL
    Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\tqxdqohu
    C:\WINDOWS\SYSTEM32\TNLMGBGE.DLL

    Adware.Vundo Variant
    C:\WINDOWS\SYSTEM32\PMNNN.DLL
    C:\WINDOWS\SYSTEM32\PMNNN.DLL
    HKLM\Software\Classes\CLSID\{A95B2816-1D7E-4561-A202-68C0DE02353A}
    HKCR\CLSID\{A95B2816-1D7E-4561-A202-68C0DE02353A}
    HKCR\CLSID\{A95B2816-1D7E-4561-A202-68C0DE02353A}\InprocServer32
    HKCR\CLSID\{A95B2816-1D7E-4561-A202-68C0DE02353A}\InprocServer32#ThreadingModel
    HKLM\Software\Classes\CLSID\{FA30EF4D-1511-4A6F-9981-D753AB2E2E97}
    HKCR\CLSID\{FA30EF4D-1511-4A6F-9981-D753AB2E2E97}
    HKCR\CLSID\{FA30EF4D-1511-4A6F-9981-D753AB2E2E97}\InprocServer32
    HKCR\CLSID\{FA30EF4D-1511-4A6F-9981-D753AB2E2E97}\InprocServer32#ThreadingModel
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A95B2816-1D7E-4561-A202-68C0DE02353A}
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FA30EF4D-1511-4A6F-9981-D753AB2E2E97}
    HKCR\CLSID\{A95B2816-1D7E-4561-A202-68C0DE02353A}

    Trojan.Smitfraud Variant
    C:\WINDOWS\SYSTEM32\UGBTNA.DLL
    C:\WINDOWS\SYSTEM32\UGBTNA.DLL
    HKLM\Software\Classes\CLSID\{75a65a53-15c9-4a0c-bb40-a7ca8b24f544}
    HKCR\CLSID\{75A65A53-15C9-4A0C-BB40-A7CA8B24F544}
    HKCR\CLSID\{75A65A53-15C9-4A0C-BB40-A7CA8B24F544}\InProcServer32
    HKCR\CLSID\{75A65A53-15C9-4A0C-BB40-A7CA8B24F544}\InProcServer32#ThreadingModel
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler#{75a65a53-15c9-4a0c-bb40-a7ca8b24f544}

    Trojan.Downloader-NewJuan/VM
    C:\WINDOWS\SYSTEM32\TVXJRAAX.DLL
    C:\WINDOWS\SYSTEM32\TVXJRAAX.DLL

    Unclassified.Unknown Origin
    HKLM\Software\Classes\CLSID\{11A69AE4-FBED-4832-A2BF-45AF82825583}
    HKCR\CLSID\{11A69AE4-FBED-4832-A2BF-45AF82825583}
    HKCR\CLSID\{11A69AE4-FBED-4832-A2BF-45AF82825583}
    HKCR\CLSID\{11A69AE4-FBED-4832-A2BF-45AF82825583}\InprocServer32
    HKCR\CLSID\{11A69AE4-FBED-4832-A2BF-45AF82825583}\InprocServer32#ThreadingModel
    HKLM\Software\Microsoft\Internet Explorer\Toolbar#{11A69AE4-FBED-4832-A2BF-45AF82825583}
    HKU\S-1-5-21-3649204349-1555032196-2234870146-1006\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser#{11A69AE4-FBED-4832-A2BF-45AF82825583}

    Adware.Vundo-Variant
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3fe61e92-68a4-4140-b8cb-82ff42982037}
    HKCR\CLSID\{3FE61E92-68A4-4140-B8CB-82FF42982037}
    HKCR\CLSID\{3FE61E92-68A4-4140-B8CB-82FF42982037}\InprocServer32
    HKCR\CLSID\{3FE61E92-68A4-4140-B8CB-82FF42982037}\InprocServer32#ThreadingModel
    C:\WINDOWS\SYSTEM32\FFBFWVSE.DLL
    C:\WINDOWS\SYSTEM32\LJLOADGO.DLL
    C:\WINDOWS\SYSTEM32\RIUYLSMV.DLL

    Adware.Tracking Cookie
    C:\Documents and Settings\Danielle\Cookies\[email protected][1].txt
    C:\Documents and Settings\Danielle\Cookies\[email protected][2].txt
    C:\Documents and Settings\Danielle\Cookies\[email protected][1].txt
    C:\Documents and Settings\Danielle\Cookies\[email protected][1].txt
    C:\Documents and Settings\Danielle\Cookies\[email protected][1].txt
    C:\Documents and Settings\Danielle\Cookies\[email protected][1].txt
    C:\Documents and Settings\Danielle\Cookies\[email protected][1].txt
    C:\Documents and Settings\Danielle\Cookies\[email protected][2].txt
    C:\Documents and Settings\Danielle\Cookies\[email protected][1].txt
    C:\Documents and Settings\Danielle\Cookies\[email protected][1].txt
    C:\Documents and Settings\Danielle\Cookies\[email protected][2].txt
    C:\Documents and Settings\Danielle\Cookies\[email protected][2].txt
    C:\Documents and Settings\Danielle\Cookies\[email protected][1].txt
    C:\Documents and Settings\Danielle\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mom\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mom\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mom\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mom\Cookies\[email protected][2].txt
    C:\Documents and Settings\Travis\Cookies\[email protected][1].txt
    C:\Documents and Settings\Travis\Cookies\[email protected][2].txt
    C:\Documents and Settings\Travis\Cookies\[email protected][2].txt

    Registry Cleaner Trial
    HKCR\Install.Install
    HKCR\Install.Install\CLSID
    HKCR\Install.Install\CurVer
    HKCR\Install.Install.1
    HKCR\Install.Install.1\CLSID

    Trojan.Unknown Origin
    C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\LOCAL SETTINGS\TEMP\ICO1.TMP
    C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\LOCAL SETTINGS\TEMP\ICO2.TMP
    C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\LOCAL SETTINGS\TEMP\ICO3.TMP
    C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\LOCAL SETTINGS\TEMP\ICO4.TMP
    C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\LOCAL SETTINGS\TEMP\ICO5.TMP
    C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\LOCAL SETTINGS\TEMP\ICO5D.TMP
    C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\LOCAL SETTINGS\TEMP\ICO5E.TMP
    C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\LOCAL SETTINGS\TEMP\ICO5F.TMP
    C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\LOCAL SETTINGS\TEMP\ICO60.TMP
    C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\LOCAL SETTINGS\TEMP\ICO61.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO1.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO10.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO25.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO26.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO27.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO28.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO29.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO3.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO3D.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO3E.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO3F.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO4.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO40.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO41.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO5.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO56.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO57.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO58.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO59.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO5A.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO6.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO6D.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO6E.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO6F.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO7.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO70.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO71.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO8.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO88.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO89.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO8A.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO8B.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO8C.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICO9.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICOA.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICOB.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICOB0.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICOB1.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICOB2.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICOB3.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICOB4.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICOC.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICOC7.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICOC8.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICOC9.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICOCA.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICOCB.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICOD.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICOE.TMP
    C:\DOCUMENTS AND SETTINGS\DANIELLE\LOCAL SETTINGS\TEMP\ICOF.TMP
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\ICO1.TMP
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\ICO2.TMP
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\ICO3.TMP
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\ICO3C.TMP
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\ICO3D.TMP
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\ICO3E.TMP
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\ICO3F.TMP
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\ICO4.TMP
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\ICO40.TMP
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\ICO5.TMP
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\ICOE7D.TMP
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\ICOE7E.TMP
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\ICOE7F.TMP
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\ICOE80.TMP
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\ICOE81.TMP
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{EA10BEA4-2D2C-494D-9EF3-5EC8A5B65143}\RP141\A0037801.ICO
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{EA10BEA4-2D2C-494D-9EF3-5EC8A5B65143}\RP141\A0037802.ICO

    Browser Hijacker.Favorites
    C:\DOCUMENTS AND SETTINGS\MOM\FAVORITES\ONLINE SECURITY TEST.URL

    Malware.LocusSoftware Inc/BestSellerAntivirus
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\DLWIXOQL.EXE
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\MOFUGCLQ.EXE
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\QRJATYDI.EXE
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\RHVQSUWB.EXE
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\URCLQECD.EXE
    C:\DOCUMENTS AND SETTINGS\MOM\LOCAL SETTINGS\TEMP\VNTMRYKT.EXE

    Malware.AntiVirGear
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{EA10BEA4-2D2C-494D-9EF3-5EC8A5B65143}\RP138\A0037613.EXE

    Trojan.Downloader-Gen/DDC
    C:\WINDOWS\SYSTEM32\CDHSMFCO.EXE
    C:\WINDOWS\Prefetch\CDHSMFCO.EXE-01E3741F.pf

    Trojan.Downloader-Gen/Suspicious
    C:\WINDOWS\SYSTEM32\SYSDL132.EXE
    C:\WINDOWS\Prefetch\SYSDL132.EXE-0AB7F11A.pf

    Trojan.Downloader-Gen/Multi
    C:\WINDOWS\SYSTEM32\~.EXE
    C:\WINDOWS\Prefetch\~.EXE-3B3A448A.pf

    Trace.Known Threat Sources
    C:\Documents and Settings\Danielle\Local Settings\Temporary Internet Files\Content.IE5\GHIJKLMN\rd-fakeout2-720x300[1].gif
     
  10. redder01_ca

    redder01_ca Thread Starter

    Joined:
    Nov 5, 2007
    Messages:
    11
    It's already running better thanks.
     
  11. Cheeseball81

    Cheeseball81 Retired Moderator

    Joined:
    Mar 3, 2004
    Messages:
    84,315
    Download ComboFix from Here or Here to your Desktop.

    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
    --------------------------------------------------------------------
    1. Close any open browsers.

    2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
      Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
    • ...
    --------------------------------------------------------------------

    Double click on combofix.exe & follow the prompts.
    • When finished, it will produce a report for you.
    • Please post the "C:\ComboFix.txt" along with a new HijackThis log for further review.

    **Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**
     
  12. redder01_ca

    redder01_ca Thread Starter

    Joined:
    Nov 5, 2007
    Messages:
    11
    Combofix log:
    ComboFix 07-11-08.1 - Danielle 2007-11-13 20:56:33.1 - NTFSx86
    Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.641 [GMT -7:00]
    Running from: C:\Documents and Settings\Danielle\Desktop\ComboFix.exe
    * Created a new restore point
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\Documents and Settings\Administrator\Desktop\Live Safety Center.lnk
    C:\Documents and Settings\Administrator\Desktop\Online Security Guide.lnk
    C:\Documents and Settings\Administrator\Favorites\Online Security Guide.lnk
    C:\Documents and Settings\All Users\Start Menu\Live Safety Center.lnk
    C:\Documents and Settings\All Users\Start Menu\Online Security Guide.lnk
    C:\Documents and Settings\Danielle\Desktop\Live Safety Center.lnk
    C:\Documents and Settings\Danielle\Desktop\Online Security Guide.lnk
    C:\Documents and Settings\Danielle\Favorites\Online Security Guide.lnk
    C:\Program Files\Instant Messenger Names
    C:\Program Files\Instant Messenger Names\IM-svr.exe
    C:\WINDOWS\cookies.ini
    C:\WINDOWS\system32\_000006_.tmp.dll
    C:\WINDOWS\system32\_000009_.tmp.dll
    C:\WINDOWS\system32\hyvqbjxy.dllbox
    C:\WINDOWS\system32\sysdl132.exe
    C:\WINDOWS\system32\tqxdqohu.dllbox

    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

    .
    -------\LEGACY_DOMAINSERVICE


    ((((((((((((((((((((((((( Files Created from 2007-10-14 to 2007-11-14 )))))))))))))))))))))))))))))))
    .

    2007-11-13 20:55 51,200 --a------ C:\WINDOWS\NirCmd.exe
    2007-11-11 23:53 <DIR> d-------- C:\Program Files\Mystery Case Files - Huntsville
    2007-11-11 19:54 290,031 ---hs---- C:\WINDOWS\system32\acbeg.ini2
    2007-11-11 18:39 <DIR> d-------- C:\Program Files\Mystery Case Files - Madame Fate
    2007-11-11 18:18 145,984 --a------ C:\WINDOWS\system32\fwqqgcbq.dll
    2007-11-11 18:18 88,128 --a------ C:\WINDOWS\system32\saopnguv.dll
    2007-11-11 18:15 284,391 ---hs---- C:\WINDOWS\system32\acbeg.bak2
    2007-11-09 21:53 <DIR> d-------- C:\Program Files\Windows Defender
    2007-11-09 20:45 6,465 ---hs---- C:\WINDOWS\system32\acbeg.bak1
    2007-11-08 19:35 1,094 --a------ C:\WINDOWS\system32\tmp.reg
    2007-11-08 19:34 289,144 --a------ C:\WINDOWS\system32\VCCLSID.exe
    2007-11-08 19:34 288,417 --a------ C:\WINDOWS\system32\SrchSTS.exe
    2007-11-08 19:34 53,248 --a------ C:\WINDOWS\system32\Process.exe
    2007-11-08 19:34 51,200 --a------ C:\WINDOWS\system32\dumphive.exe
    2007-11-08 19:34 25,600 --a------ C:\WINDOWS\system32\WS2Fix.exe
    2007-11-07 22:26 <DIR> d-------- C:\Program Files\SUPERAntiSpyware
    2007-11-07 22:26 <DIR> d-------- C:\Documents and Settings\Danielle\Application Data\SUPERAntiSpyware.com
    2007-11-07 22:26 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
    2007-11-07 20:59 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\toshiba
    2007-11-07 20:59 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Intel
    2007-11-07 20:46 86,080 --a------ C:\WINDOWS\system32\mqybsqvw.dll
    2007-11-06 20:16 87,104 --a------ C:\WINDOWS\system32\tuaieirc.dll
    2007-11-04 20:11 299,622 ---hs---- C:\WINDOWS\system32\nnnmp.bak2
    2007-11-02 16:10 6,465 ---hs---- C:\WINDOWS\system32\nnnmp.bak1
    2007-11-02 16:04 <DIR> d--h----- C:\Program Files\ApplePie
    2007-10-31 21:54 <DIR> d-------- C:\Program Files\Lavasoft
    2007-10-31 21:54 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
    2007-10-31 21:54 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Lavasoft
    2007-10-31 21:44 626,688 --a------ C:\WINDOWS\system32\msvcr80.dll
    2007-10-31 21:39 <DIR> d-------- C:\Documents and Settings\Danielle\Application Data\AdwareAlert
    2007-10-30 15:46 <DIR> d-------- C:\Program Files\The Adventure Company
    2007-10-30 15:31 <DIR> d-------- C:\Program Files\Scholastic
    2007-10-27 15:10 <DIR> d-------- C:\Program Files\The Learning Company
    2007-10-27 15:10 274,432 --a------ C:\WINDOWS\TLCUninstall.exe
    2007-10-26 20:35 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\GameHouse
    2007-10-26 20:02 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\PopCap
    2007-10-26 19:41 <DIR> d-------- C:\Documents and Settings\Travis\Application Data\HP

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2007-11-14 03:39 --------- d-----w C:\Program Files\Common Files\Command Software
    2007-11-12 17:33 --------- d---a-w C:\Documents and Settings\All Users\Application Data\TEMP
    2007-11-06 21:23 --------- d-----w C:\Program Files\Common Files\PestPatrol
    2007-11-01 05:24 --------- d--h--w C:\Program Files\InstallShield Installation Information
    2007-11-01 05:24 --------- d-----w C:\Program Files\TOSHIBA
    2007-11-01 04:22 --------- d--h--r C:\Documents and Settings\Danielle\Application Data\yahoo!
    2007-11-01 04:22 --------- d-----w C:\Documents and Settings\All Users\Application Data\Yahoo!
    2007-11-01 03:31 --------- d-----w C:\Program Files\MP3 Rocket
    2007-10-22 22:33 --------- d-----w C:\Program Files\MSN Games
    2007-10-16 13:54 --------- d-----w C:\Documents and Settings\All Users\Application Data\QuickTime
    2007-10-14 21:45 --------- d-----w C:\Documents and Settings\All Users\Application Data\PlayFirst
    2007-09-30 22:08 --------- d-----w C:\Program Files\Valusoft
    2007-09-19 03:23 --------- d-----w C:\Program Files\Mystery of Shark Island
    2007-09-18 15:25 11,376 ----a-w C:\WINDOWS\system32\drivers\secdrv.sys
    2007-09-18 14:42 --------- d-----w C:\Program Files\Maxis
    2007-09-17 02:09 --------- d-----w C:\Program Files\Forgotten Riddles - The Mayan Princess
    2007-09-17 02:09 --------- d-----w C:\Documents and Settings\All Users\Application Data\BigFishGamesCache
    2007-09-17 02:01 --------- d-----w C:\Program Files\bfgclient
    2007-09-16 06:02 --------- d-----w C:\Program Files\Disney Interactive
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{183807B8-BC07-48A2-8DAD-ABC96FA6C7A8}]
    C:\WINDOWS\system32\nnnmmnk.dll

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{4AE2A9A0-DC33-4C27-B521-5B6C68C1C53D}]
    2007-11-02 16:04 95232 --a------ C:\Program Files\ApplePie\ie-improver.dll

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "IntelWireless"="C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe" [2005-11-28 10:41]
    "TELUS Security service"="C:\Program Files\TELUS\TELUS Security service\Freedom.exe" [2005-05-19 15:56]
    "TEPA.exe"="C:\Program Files\TELUS\eProtect Advisor\TEPA.exe" [2007-03-20 16:48]
    "HP Software Update"="C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd2.exe" [2006-02-19 01:41]
    "Windows Defender"="C:\Program Files\Windows Defender\MSASCui.exe" [2006-11-03 19:20]
    "d8dc06b9"="C:\WINDOWS\system32\saopnguv.dll" [2007-11-11 18:18]

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-04 05:00]
    "SUPERAntiSpyware"="C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2007-06-21 14:06]

    C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\
    IEHOME.LNK.disabled [2002-01-21 19:49:20]

    C:\Documents and Settings\Mom\Start Menu\Programs\Startup\
    MP3 Rocket (Minimized).lnk - C:\Program Files\MP3 Rocket\MP3Rocket.exe [2007-07-27 09:30:12]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
    "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= C:\Program Files\SUPERAntiSpyware\SASSEH.DLL [2006-12-20 13:55 77824]
    "{183807B8-BC07-48A2-8DAD-ABC96FA6C7A8}"= C:\WINDOWS\system32\nnnmmnk.dll [ ]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
    C:\Program Files\SUPERAntiSpyware\SASWINLO.dll 2007-04-19 13:41 294912 C:\Program Files\SUPERAntiSpyware\SASWINLO.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\hyvqbjxy]
    hyvqbjxy.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\nnnmmnk]
    nnnmmnk.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
    backup=C:\WINDOWS\pss\HP Digital Imaging Monitor.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Photo Downloader]
    "C:\Program Files\Adobe\Photoshop Elements 5.0\apdproxy.exe"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AGRSMMSG]
    AGRSMMSG.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Alcmtr]
    ALCMTR.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AntiVirGear 3.8]
    "C:\Program Files\AntiVirGear 3.8\AntiVirGear 3.8.exe" /h

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
    C:\WINDOWS\system32\ctfmon.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DLA]
    C:\WINDOWS\System32\DLA\DLACTRLW.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IntelZeroConfig]
    "C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LtMoh]
    C:\Program Files\ltmoh\Ltmoh.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
    "C:\Program Files\Messenger\msmsgs.exe" /background

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\My Web Search Bar]
    rundll32 C:\PROGRA~1\MYWEBS~1\bar\1.bin\MWSBAR.DLL,S

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MyWebSearch Email Plugin]
    C:\PROGRA~1\MYWEBS~1\bar\1.bin\mwsoemon.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NDSTray.exe]
    NDSTray.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RTHDCPL]
    RTHDCPL.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SmoothView]
    C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SynTPEnh]
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TDispVol]
    TDispVol.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TFncKy]
    TFncKy.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\THotkey]
    C:\Program Files\Toshiba\Toshiba Applet\thotkey.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TOSCDSPD]
    C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TPSMain]
    TPSMain.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Yahoo! Pager]
    "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run-]
    "AdwareAlert"=C:\Program Files\AdwareAlert\AdwareAlert.exe -boot
    "ctfmon.exe"=C:\WINDOWS\system32\ctfmon.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
    "CFSServ.exe"=CFSServ.exe -NoClient
    "HP Component Manager"="C:\Program Files\HP\hpcoretech\hpcmpmgr.exe"
    "HPDJ Taskbar Utility"=C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb09.exe
    "HPHmon05"=C:\WINDOWS\system32\hphmon05.exe
    "HPHUPD05"=C:\Program Files\Hewlett-Packard\{45B6180B-DCAB-4093-8EE8-6164457517F0}\hphupd05.exe
    "igfxhkcmd"=C:\WINDOWS\system32\hkcmd.exe
    "igfxpers"=C:\WINDOWS\system32\igfxpers.exe
    "igfxtray"=C:\WINDOWS\system32\igfxtray.exe
    "QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" -atboottime
    "d8dc06b9"=rundll32.exe "C:\WINDOWS\system32\mqybsqvw.dll",b
    "SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_01\bin\jusched.exe"
    "Tvs"=C:\Program Files\Toshiba\Tvs\TvsTray.exe

    S3 tosrfec;Bluetooth ACPI from TOSHIBA;C:\WINDOWS\system32\DRIVERS\tosrfec.sys

    .
    **************************************************************************

    catchme 0.3.1250 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2007-11-13 21:00:41
    Windows 5.1.2600 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    Completion time: 2007-11-13 21:02:13 - machine was rebooted
    .
    --- E O F ---
    End of Combofix log.........................................

    HJT log:

    Logfile of HijackThis v1.99.1
    Scan saved at 9:11:29 PM, on 11/13/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
    C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
    C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Adobe\Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
    C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
    C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe
    C:\Program Files\TELUS\TELUS Security service\Freedom.exe
    C:\Program Files\TELUS\eProtect Advisor\TEPA.exe
    C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd2.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\Common Files\Command Software\dvpapi.exe
    C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe
    C:\PROGRA~1\Intel\Wireless\Bin\Dot1XCfg.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\internet explorer\iexplore.exe
    C:\DonF\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://msn.ca/
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://shoptoshiba.ca/welcome
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O2 - BHO: (no name) - {183807B8-BC07-48A2-8DAD-ABC96FA6C7A8} - C:\WINDOWS\system32\nnnmmnk.dll (file missing)
    O2 - BHO: Pop-Up Blocker BHO - {3C060EA2-E6A9-4E49-A530-D4657B8C449A} - C:\Program Files\TELUS\TELUS Security service\pkR.dll
    O2 - BHO: SysApp - {4AE2A9A0-DC33-4C27-B521-5B6C68C1C53D} - C:\Program Files\ApplePie\ie-improver.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: Form Filler BHO - {56071E0D-C61B-11D3-B41C-00E02927A304} - C:\Program Files\TELUS\TELUS Security service\FreeBHOR.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
    O4 - HKLM\..\Run: [IntelWireless] "C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe" /tf Intel PROSet/Wireless
    O4 - HKLM\..\Run: [TELUS Security service] "C:\Program Files\TELUS\TELUS Security service\Freedom.exe"
    O4 - HKLM\..\Run: [TEPA.exe] "C:\Program Files\TELUS\eProtect Advisor\TEPA.exe" /AUTORUN
    O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd2.exe
    O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
    O4 - HKLM\..\Run: [d8dc06b9] rundll32.exe "C:\WINDOWS\system32\saopnguv.dll",b
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O8 - Extra context menu item: &Search - ?p=ZJ
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab31267.cab
    O16 - DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} (StagingUI Object) - http://zone.msn.com/binFrameWork/v10/StagingUI.cab55579.cab
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: {1A781DED-C22D-4153-3213-A3211E29DF13} (GameDesire Card Games) - http://67.15.101.3/g_bin/eng/cards_2_0_0_73.cab
    O16 - DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} (MSN Games &#8211; Buddy Invite) - http://zone.msn.com/BinFrameWork/v10/ZBuddy.cab55579.cab
    O16 - DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} (ZonePAChat Object) - http://zone.msn.com/binframework/v10/ZPAChat.cab55579.cab
    O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - http://go.divx.com/plugin/DivXBrowserPlugin.cab
    O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
    O16 - DPF: {95B5D20C-BD31-4489-8ABF-F8C8BE748463} (ZPA_HRTZ Object) - http://zone.msn.com/bingame/zpagames/zpa_hrtz.cab58570.cab
    O16 - DPF: {97E71027-0BA2-44F2-97DB-F84D808ED0B6} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab55762.cab
    O16 - DPF: {AB86CE53-AC9F-449F-9399-D8ABCA09EC09} (Get_ActiveX Control) - https://h17000.www1.hp.com/ewfrf-JAVA/Secure/HPGetDownloadManager.ocx
    O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://cdn2.zone.msn.com/binFramework/v10/ZIntro.cab56649.cab
    O16 - DPF: {D54160C3-DB7B-4534-9B65-190EE4A9C7F7} (SproutLauncherCtrl Class) - http://zone.msn.com/bingame/feed/default/SproutLauncher.cab
    O16 - DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} (MSN Games &#8211; Game Communicator) - http://zone.msn.com/binframework/v10/StProxy.cab55579.cab
    O16 - DPF: {DC75FEF6-165D-4D25-A518-C8C4BDA7BAA6} (CPlayFirstDinerDashControl Object) - http://zone.msn.com/bingame/dash/default/DinerDash.1.0.0.98.cab
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://zone.msn.com/bingame/popcaploader_v10.cab
    O18 - Protocol: livecall - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O20 - Winlogon Notify: hyvqbjxy - hyvqbjxy.dll (file missing)
    O20 - Winlogon Notify: nnnmmnk - nnnmmnk.dll (file missing)
    O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\
    O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    O23 - Service: Adobe Active File Monitor V5 (AdobeActiveFileMonitor5.0) - Unknown owner - C:\Program Files\Adobe\Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
    O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
    O23 - Service: DvpApi (dvpapi) - Command Software Systems, Inc. - C:\Program Files\Common Files\Command Software\dvpapi.exe
    O23 - Service: Intel(R) PROSet/Wireless Event Log (EvtEng) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
    O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: Intel(R) PROSet/Wireless Registry Service (RegSrvc) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
    O23 - Service: Intel(R) PROSet/Wireless Service (S24EventMonitor) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
    O23 - Service: TOSHIBA Application Service (TAPPSRV) - TOSHIBA Corp. - C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe

    End of HJT LOG.
     
  13. Cheeseball81

    Cheeseball81 Retired Moderator

    Joined:
    Mar 3, 2004
    Messages:
    84,315
    1. Please download The Avenger by Swandog46 to your Desktop.
    • Click on Avenger.zip to open the file
    • Extract avenger.exe to your desktop

    2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+C):


    Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


    3. Now, start The Avenger program by clicking on its icon on your desktop.
    • Under "Script file to execute" choose "Input Script Manually".
    • Now click on the Magnifying Glass icon which will open a new window titled "View/edit script"
    • Paste the text copied to clipboard into this window by pressing (Ctrl+V).
    • Click Done
    • Now click on the Green Light to begin execution of the script
    • Answer "Yes" twice when prompted.
    4. The Avenger will automatically do the following:
    • It will Restart your computer. ( In cases where the code to execute contains "Drivers to Unload", The Avenger will actually restart your system twice.)
    • On reboot, it will briefly open a black command window on your desktop, this is normal.
    • After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
    • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
    5. Please copy/paste the content of c:\avenger.txt into your reply.

    Rescan with Hijack This, close all browser windows except Hijack This, put a checkmark beside these entries and click fix checked.

    O2 - BHO: (no name) - {183807B8-BC07-48A2-8DAD-ABC96FA6C7A8} - C:\WINDOWS\system32\nnnmmnk.dll (file missing)

    O2 - BHO: SysApp - {4AE2A9A0-DC33-4C27-B521-5B6C68C1C53D} - C:\Program Files\ApplePie\ie-improver.dll

    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)

    O4 - HKLM\..\Run: [d8dc06b9] rundll32.exe "C:\WINDOWS\system32\saopnguv.dll",b

    O20 - Winlogon Notify: hyvqbjxy - hyvqbjxy.dll (file missing)

    O20 - Winlogon Notify: nnnmmnk - nnnmmnk.dll (file missing)


    Reboot and post another Hijack This log please.
     
  14. redder01_ca

    redder01_ca Thread Starter

    Joined:
    Nov 5, 2007
    Messages:
    11
    Avenger only restarted the computer once.
    Here is the Log:
    Logfile of The Avenger version 1, by Swandog46
    Running from registry key:
    \Registry\Machine\System\CurrentControlSet\Services\lnypskjw

    *******************

    Script file located at: \??\C:\owdcapnk.txt
    Script file opened successfully.

    Script file read successfully

    Backups directory opened successfully at C:\Avenger

    *******************

    Beginning to process script file:

    File C:\WINDOWS\system32\saopnguv.dll deleted successfully.
    File C:\WINDOWS\system32\acbeg.ini2 deleted successfully.
    File C:\WINDOWS\system32\fwqqgcbq.dll deleted successfully.


    File C:\WINDOWS\system32\saopnguv.dll not found!
    Deletion of file C:\WINDOWS\system32\saopnguv.dll failed!

    Could not process line:
    C:\WINDOWS\system32\saopnguv.dll
    Status: 0xc0000034

    File C:\WINDOWS\system32\acbeg.bak2 deleted successfully.
    File C:\WINDOWS\system32\acbeg.bak1 deleted successfully.
    File C:\WINDOWS\system32\mqybsqvw.dll deleted successfully.
    File C:\WINDOWS\system32\tuaieirc.dll deleted successfully.
    File C:\WINDOWS\system32\nnnmp.bak2 deleted successfully.
    File C:\WINDOWS\system32\nnnmp.bak1 deleted successfully.
    Folder C:\Program Files\ApplePie deleted successfully.

    Completed script processing.

    *******************

    Finished! Terminate.

    HJT log:

    Logfile of HijackThis v1.99.1
    Scan saved at 6:53:41 PM, on 11/14/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
    C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
    C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Adobe\Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
    C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
    C:\Program Files\Common Files\Command Software\dvpapi.exe
    C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe
    C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe
    C:\Program Files\TELUS\TELUS Security service\Freedom.exe
    C:\Program Files\TELUS\eProtect Advisor\TEPA.exe
    C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd2.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\PROGRA~1\Intel\Wireless\Bin\Dot1XCfg.exe
    C:\DonF\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://msn.ca/
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://shoptoshiba.ca/welcome
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O2 - BHO: Pop-Up Blocker BHO - {3C060EA2-E6A9-4E49-A530-D4657B8C449A} - C:\Program Files\TELUS\TELUS Security service\pkR.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: Form Filler BHO - {56071E0D-C61B-11D3-B41C-00E02927A304} - C:\Program Files\TELUS\TELUS Security service\FreeBHOR.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O4 - HKLM\..\Run: [IntelWireless] "C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe" /tf Intel PROSet/Wireless
    O4 - HKLM\..\Run: [TELUS Security service] "C:\Program Files\TELUS\TELUS Security service\Freedom.exe"
    O4 - HKLM\..\Run: [TEPA.exe] "C:\Program Files\TELUS\eProtect Advisor\TEPA.exe" /AUTORUN
    O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd2.exe
    O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O8 - Extra context menu item: &Search - ?p=ZJ
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab31267.cab
    O16 - DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} (StagingUI Object) - http://zone.msn.com/binFrameWork/v10/StagingUI.cab55579.cab
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: {1A781DED-C22D-4153-3213-A3211E29DF13} (GameDesire Card Games) - http://67.15.101.3/g_bin/eng/cards_2_0_0_73.cab
    O16 - DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} (MSN Games &#8211; Buddy Invite) - http://zone.msn.com/BinFrameWork/v10/ZBuddy.cab55579.cab
    O16 - DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} (ZonePAChat Object) - http://zone.msn.com/binframework/v10/ZPAChat.cab55579.cab
    O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - http://go.divx.com/plugin/DivXBrowserPlugin.cab
    O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
    O16 - DPF: {95B5D20C-BD31-4489-8ABF-F8C8BE748463} (ZPA_HRTZ Object) - http://zone.msn.com/bingame/zpagames/zpa_hrtz.cab58570.cab
    O16 - DPF: {97E71027-0BA2-44F2-97DB-F84D808ED0B6} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab55762.cab
    O16 - DPF: {AB86CE53-AC9F-449F-9399-D8ABCA09EC09} (Get_ActiveX Control) - https://h17000.www1.hp.com/ewfrf-JAVA/Secure/HPGetDownloadManager.ocx
    O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://cdn2.zone.msn.com/binFramework/v10/ZIntro.cab56649.cab
    O16 - DPF: {D54160C3-DB7B-4534-9B65-190EE4A9C7F7} (SproutLauncherCtrl Class) - http://zone.msn.com/bingame/feed/default/SproutLauncher.cab
    O16 - DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} (MSN Games &#8211; Game Communicator) - http://zone.msn.com/binframework/v10/StProxy.cab55579.cab
    O16 - DPF: {DC75FEF6-165D-4D25-A518-C8C4BDA7BAA6} (CPlayFirstDinerDashControl Object) - http://zone.msn.com/bingame/dash/default/DinerDash.1.0.0.98.cab
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://zone.msn.com/bingame/popcaploader_v10.cab
    O18 - Protocol: livecall - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\
    O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    O23 - Service: Adobe Active File Monitor V5 (AdobeActiveFileMonitor5.0) - Unknown owner - C:\Program Files\Adobe\Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
    O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
    O23 - Service: DvpApi (dvpapi) - Command Software Systems, Inc. - C:\Program Files\Common Files\Command Software\dvpapi.exe
    O23 - Service: Intel(R) PROSet/Wireless Event Log (EvtEng) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
    O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: Intel(R) PROSet/Wireless Registry Service (RegSrvc) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
    O23 - Service: Intel(R) PROSet/Wireless Service (S24EventMonitor) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
    O23 - Service: TOSHIBA Application Service (TAPPSRV) - TOSHIBA Corp. - C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe
     
  15. Cheeseball81

    Cheeseball81 Retired Moderator

    Joined:
    Mar 3, 2004
    Messages:
    84,315
    Looks much better. How are things now?
     
  16. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/648339

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice