1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Solved: [email protected] - Hijackthis Log

Discussion in 'Virus & Other Malware Removal' started by Nasty_Missy, Aug 13, 2007.

Thread Status:
Not open for further replies.
Advertisement
  1. Nasty_Missy

    Nasty_Missy Thread Starter

    Joined:
    Aug 13, 2007
    Messages:
    2
    I know this has been done a million times, but i got this [email protected] thingy on my computer last night, ive looked at a few different websites on how to fix it, it got all too technical for me so im hoping someone here can dumb it right down!! lol
    Also I may have SpyWorm.Win32, not sure if thats the first trojan pullin my leg or not...
    I got my hijackthis log here as well, hope it helps

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 9:01:20 AM, on 14/08/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16473)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    C:\WINDOWS\system32\HPZipm12.exe
    C:\WINDOWS\system32\svchost.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\D-Link\AirPlus XtremeG\AirPlusCFG.exe
    C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
    C:\Program Files\D-Link\AirPlus G\AirGCFG.exe
    C:\Program Files\Trend Micro\Internet Security 2007\pccguide.exe
    C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
    C:\WINDOWS\SOUNDMAN.EXE
    C:\Program Files\Roxio\Easy CD Creator 6\DragToDisc\DrgToDsc.exe
    C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\RxMon.exe
    C:\Program Files\Java\jre1.6.0_01\bin\jusched.exe
    C:\Program Files\QuickTime\QTTask.exe
    C:\Program Files\Trend Micro\Internet Security 2007\TMAS_OE\TMAS_OEMon.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\Playlist.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\PcScnSrv.exe
    C:\Program Files\United Electrical Software Pty Ltd\Guardian Anti-Theft\Guardian.App.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Documents and Settings\Jessica Bean\Local Settings\Application Data\Trend Micro\HCMS\tsafe\en-US\tgui.exe
    C:\Documents and Settings\Jessica Bean\Local Settings\Application Data\Trend Micro\HCMS\tsafe\en-US\tgsvc.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
    C:\Program Files\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
    O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
    O4 - HKLM\..\Run: [D-Link AirPlus XtremeG] C:\Program Files\D-Link\AirPlus XtremeG\AirPlusCFG.exe
    O4 - HKLM\..\Run: [ANIWZCS2Service] C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [D-Link AirPlus G] C:\Program Files\D-Link\AirPlus G\AirGCFG.exe
    O4 - HKLM\..\Run: [NvMediaCenter] RunDLL32.exe NvMCTray.dll,NvTaskbarInit
    O4 - HKLM\..\Run: [pccguide.exe] "C:\Program Files\Trend Micro\Internet Security 2007\pccguide.exe"
    O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
    O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe -startup
    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [RoxioEngineUtility] "C:\Program Files\Common Files\Roxio Shared\System\EngUtil.exe"
    O4 - HKLM\..\Run: [RoxioDragToDisc] "C:\Program Files\Roxio\Easy CD Creator 6\DragToDisc\DrgToDsc.exe"
    O4 - HKLM\..\Run: [RoxioAudioCentral] "C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\RxMon.exe"
    O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_01\bin\jusched.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKCU\..\Run: [OE] "C:\Program Files\Trend Micro\Internet Security 2007\TMAS_OE\TMAS_OEMon.exe"
    O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    O4 - Global Startup: Guardian.lnk = C:\Program Files\United Electrical Software Pty Ltd\Guardian Anti-Theft\Guardian.Loader.exe
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O16 - DPF: {0742B9EF-8C83-41CA-BFBA-830A59E23533} (Microsoft Data Collection Control) - https://support.microsoft.com/OAS/ActiveX/MSDcode.cab
    O16 - DPF: {1EF9F042-C2EB-4293-8213-474CAEEF531D} (TmHcmsX Control) - http://www.trendsecure.com/framework/control/en-US/activex/TmHcmsX.CAB
    O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://nastyplaygirlmissy.spaces.live.com//PhotoUpload/MsnPUpld.cab
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1169370027406
    O16 - DPF: {F04A8AE2-A59D-11D2-8792-00C04F8EF29D} (Hotmail Attachments Control) - http://by109fd.bay109.hotmail.msn.com/activex/HMAtchmt.ocx
    O22 - SharedTaskScheduler: clinker - {a4029063-4fe3-422c-ac72-12905c09642a} - C:\WINDOWS\system32\xtsyynm.dll
    O23 - Service: ANIWZCSd Service (ANIWZCSdService) - Alpha Networks Inc. - C:\Program Files\ANI\ANIWZCS2 Service\ANIWZCSdS.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: Trend Micro Central Control Component (PcCtlCom) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    O23 - Service: Trend Micro Protection Against Spyware (PcScnSrv) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\PcScnSrv.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: ServiceLayer - Nokia. - C:\Program Files\PC Connectivity Solution\ServiceLayer.exe
    O23 - Service: Trend Micro Real-time Service (Tmntsrv) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe

    --
    End of file - 7788 bytes
     
  2. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    You should print out these instructions, or copy them to a NotePad file for reading while in Safe Mode, because you will not be able to connect to the Internet to read from this site.

    Please download SmitfraudFix (by S!Ri)
    Extract the content (a folder named SmitfraudFix) to your Desktop.

    Next, please reboot your computer in Safe Mode by doing the following :
    • Restart your computer
    • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
    • Instead of Windows loading as normal, a menu with options should appear;
    • Select the first option, to run Windows in Safe Mode, then press "Enter".
    • Choose your usual account.
    Once in Safe Mode, open the SmitfraudFix folder again and double-click smitfraudfix.cmd
    Select option #2 - Clean by typing 2 and press "Enter" to delete infected files.

    You will be prompted: "Registry cleaning - Do you want to clean the registry?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.

    The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".

    The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart it into Normal Windows.

    A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply along with a new hijack log.

    The report can also be found at the root of the system drive, usually at C:\rapport.txt

    Warning: running option #2 on a non infected computer will remove your Desktop background.


    ==============================
    Download Superantispyware (SAS) free home version

    http://www.superantispyware.com/superantispywarefreevspro.html

    Install it and double-click the icon on your desktop to run it.
    · It will ask if you want to update the program definitions, click Yes.
    · Under Configuration and Preferences, click the Preferences button.
    · Click the Scanning Control tab.
    · Under Scanner Options make sure the following are checked:
    o Close browsers before scanning
    o Scan for tracking cookies
    o Terminate memory threats before quarantining.
    o Please leave the others unchecked.
    o Click the Close button to leave the control center screen.
    · On the main screen, under Scan for Harmful Software click Scan your computer.
    · On the left check C:\Fixed Drive.
    · On the right, under Complete Scan, choose Perform Complete Scan.
    · Click Next to start the scan. Please be patient while it scans your computer.
    · After the scan is complete a summary box will appear. Click OK.
    · Make sure everything in the white box has a check next to it, then click Next.
    · It will quarantine what it found and if it asks if you want to reboot, click Yes.
    · To retrieve the removal information for me please do the following:
    o After reboot, double-click the SUPERAntispyware icon on your desktop.
    o Click Preferences. Click the Statistics/Logs tab.
    o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    o It will open in your default text editor (such as Notepad/Wordpad).
    o Please highlight everything in the notepad, then right-click and choose copy.
    · Click close and close again to exit the program.
    · Please paste that information here for me regardless of what it finds with a new HijackThis log.

    This will take some time!!!!!!!!
     
  3. Nasty_Missy

    Nasty_Missy Thread Starter

    Joined:
    Aug 13, 2007
    Messages:
    2
    Ok, I finally did everything
    First I'll put the log from Smit
    Then the one from Superantispy
    Then the hijackthis that i did last

    SmitFraudFix v2.211

    Scan done at 13:44:04.82, Tue 14/08/2007
    Run from C:\Documents and Settings\All Users\Documents\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    The filesystem type is NTFS
    Fix run in safe mode

    »»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
    "{a4029063-4fe3-422c-ac72-12905c09642a}"="clinker"

    [HKEY_CLASSES_ROOT\CLSID\{a4029063-4fe3-422c-ac72-12905c09642a}\InProcServer32]
    @="C:\WINDOWS\system32\xtsyynm.dll"

    [HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{a4029063-4fe3-422c-ac72-12905c09642a}\InProcServer32]
    @="C:\WINDOWS\system32\xtsyynm.dll"


    »»»»»»»»»»»»»»»»»»»»»»»» Killing process


    »»»»»»»»»»»»»»»»»»»»»»»» hosts


    127.0.0.1 localhost

    »»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

    GenericRenosFix by S!Ri

    C:\WINDOWS\system32\xtsyynm.dll -> Hoax.Win32.Renos.gen.o
    C:\WINDOWS\system32\xtsyynm.dll -> Deleted


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files

    C:\Program Files\Video ActiveX Access\ Deleted
    C:\Program Files\VirusProtectPro 3.6\ Deleted

    »»»»»»»»»»»»»»»»»»»»»»»» DNS

    HKLM\SYSTEM\CCS\Services\Tcpip\..\{96738FB9-B266-4590-AA9A-FE3FA07A4448}: DhcpNameServer=10.0.0.138
    HKLM\SYSTEM\CS1\Services\Tcpip\..\{96738FB9-B266-4590-AA9A-FE3FA07A4448}: DhcpNameServer=10.0.0.138
    HKLM\SYSTEM\CS2\Services\Tcpip\..\{96738FB9-B266-4590-AA9A-FE3FA07A4448}: DhcpNameServer=10.0.0.138
    HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=10.0.0.138
    HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=10.0.0.138
    HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=10.0.0.138


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


    »»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "System"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

    Registry Cleaning done.

    »»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll


    »»»»»»»»»»»»»»»»»»»»»»»» End

    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 08/14/2007 at 03:34 PM

    Application Version : 3.9.1008

    Core Rules Database Version : 3285
    Trace Rules Database Version: 1296

    Scan type : Complete Scan
    Total Scan Time : 01:12:49

    Memory items scanned : 449
    Memory threats detected : 0
    Registry items scanned : 5617
    Registry threats detected : 5
    File items scanned : 74327
    File threats detected : 149

    Trojan.Media-Codec/V3
    HKLM\Software\Classes\CLSID\{5DDE5591-A8AB-4897-93EF-1E4E943F85A7}
    HKCR\CLSID\{5DDE5591-A8AB-4897-93EF-1E4E943F85A7}
    HKCR\CLSID\{5DDE5591-A8AB-4897-93EF-1E4E943F85A7}#xxx
    HKCR\CLSID\{5DDE5591-A8AB-4897-93EF-1E4E943F85A7}\InprocServer32
    HKCR\CLSID\{5DDE5591-A8AB-4897-93EF-1E4E943F85A7}\InprocServer32#ThreadingModel
    C:\PROGRAM FILES\VIDEO ACTIVEX ACCESS\IESPLG.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{5BF33501-7033-4C09-B154-0EBC9C350D38}\RP150\A0027013.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{5BF33501-7033-4C09-B154-0EBC9C350D38}\RP150\A0027014.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{5BF33501-7033-4C09-B154-0EBC9C350D38}\RP150\A0027015.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{5BF33501-7033-4C09-B154-0EBC9C350D38}\RP150\A0027036.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{5BF33501-7033-4C09-B154-0EBC9C350D38}\RP150\A0027037.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{5BF33501-7033-4C09-B154-0EBC9C350D38}\RP150\A0027038.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{5BF33501-7033-4C09-B154-0EBC9C350D38}\RP150\A0027052.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{5BF33501-7033-4C09-B154-0EBC9C350D38}\RP150\A0027068.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{5BF33501-7033-4C09-B154-0EBC9C350D38}\RP150\A0027069.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{5BF33501-7033-4C09-B154-0EBC9C350D38}\RP151\A0027091.DLL

    Adware.Tracking Cookie
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][3].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\jessica [email protected]
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\jessica [email protected]
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][9].txt
    C:\Documents and Settings\Jessica Bean\Cookies\jessica [email protected]
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][5].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][10].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][3].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\jessica [email protected]
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected]jkoenazmfp.stats.esomniture[2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][6].txt
    C:\Documents and Settings\Jessica Bean\Cookies\jessica [email protected]
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][11].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][4].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][7].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][8].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\jessica [email protected]
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\jessica [email protected]
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\jessica [email protected]
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\jessica [email protected]
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jessica Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][3].txt
    C:\Documents and Settings\Emily Bean\Cookies\[email protected][4].txt
    C:\Documents and Settings\Tamaryn Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Tamaryn Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Tamaryn Bean\Cookies\[email protected][2].txt
    C:\Documents and Settings\Tamaryn Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Tamaryn Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Tamaryn Bean\Cookies\[email protected][1].txt
    C:\Documents and Settings\Tamaryn Bean\Cookies\[email protected][1].txt

    Malware.VirusProtectPro
    C:\DOCUMENTS AND SETTINGS\JESSICA BEAN\LOCAL SETTINGS\TEMP\BR25.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{5BF33501-7033-4C09-B154-0EBC9C350D38}\RP150\A0027021.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{5BF33501-7033-4C09-B154-0EBC9C350D38}\RP151\A0027292.EXE

    Trojan.Unknown Origin
    C:\DOCUMENTS AND SETTINGS\JESSICA BEAN\LOCAL SETTINGS\TEMP\LAF1.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{5BF33501-7033-4C09-B154-0EBC9C350D38}\RP150\A0027059.ICO
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{5BF33501-7033-4C09-B154-0EBC9C350D38}\RP151\A0027291.ICO

    Trojan.Smitfraud Variant
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{5BF33501-7033-4C09-B154-0EBC9C350D38}\RP151\A0027288.DLL

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 3:44:09 PM, on 14/08/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16473)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    C:\WINDOWS\system32\HPZipm12.exe
    C:\WINDOWS\system32\svchost.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe
    C:\PROGRA~1\TRENDM~1\INTERN~1\PcScnSrv.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\D-Link\AirPlus XtremeG\AirPlusCFG.exe
    C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
    C:\Program Files\D-Link\AirPlus G\AirGCFG.exe
    C:\Program Files\Trend Micro\Internet Security 2007\pccguide.exe
    C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
    C:\WINDOWS\SOUNDMAN.EXE
    C:\Program Files\Roxio\Easy CD Creator 6\DragToDisc\DrgToDsc.exe
    C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\RxMon.exe
    C:\Program Files\Java\jre1.6.0_01\bin\jusched.exe
    C:\Program Files\QuickTime\QTTask.exe
    C:\Program Files\Trend Micro\Internet Security 2007\TMAS_OE\TMAS_OEMon.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\Playlist.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\SUPERAntiSpyware.exe
    C:\Program Files\United Electrical Software Pty Ltd\Guardian Anti-Theft\Guardian.App.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\HijackThis.exe

    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
    O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
    O4 - HKLM\..\Run: [D-Link AirPlus XtremeG] C:\Program Files\D-Link\AirPlus XtremeG\AirPlusCFG.exe
    O4 - HKLM\..\Run: [ANIWZCS2Service] C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [D-Link AirPlus G] C:\Program Files\D-Link\AirPlus G\AirGCFG.exe
    O4 - HKLM\..\Run: [NvMediaCenter] RunDLL32.exe NvMCTray.dll,NvTaskbarInit
    O4 - HKLM\..\Run: [pccguide.exe] "C:\Program Files\Trend Micro\Internet Security 2007\pccguide.exe"
    O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
    O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe -startup
    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [RoxioEngineUtility] "C:\Program Files\Common Files\Roxio Shared\System\EngUtil.exe"
    O4 - HKLM\..\Run: [RoxioDragToDisc] "C:\Program Files\Roxio\Easy CD Creator 6\DragToDisc\DrgToDsc.exe"
    O4 - HKLM\..\Run: [RoxioAudioCentral] "C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\RxMon.exe"
    O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_01\bin\jusched.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKCU\..\Run: [OE] "C:\Program Files\Trend Micro\Internet Security 2007\TMAS_OE\TMAS_OEMon.exe"
    O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\SUPERAntiSpyware.exe
    O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    O4 - Global Startup: Guardian.lnk = C:\Program Files\United Electrical Software Pty Ltd\Guardian Anti-Theft\Guardian.Loader.exe
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O16 - DPF: {0742B9EF-8C83-41CA-BFBA-830A59E23533} (Microsoft Data Collection Control) - https://support.microsoft.com/OAS/ActiveX/MSDcode.cab
    O16 - DPF: {1EF9F042-C2EB-4293-8213-474CAEEF531D} (TmHcmsX Control) - http://www.trendsecure.com/framework/control/en-US/activex/TmHcmsX.CAB
    O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://nastyplaygirlmissy.spaces.live.com//PhotoUpload/MsnPUpld.cab
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1169370027406
    O16 - DPF: {F04A8AE2-A59D-11D2-8792-00C04F8EF29D} (Hotmail Attachments Control) - http://by109fd.bay109.hotmail.msn.com/activex/HMAtchmt.ocx
    O20 - Winlogon Notify: !SASWinLogon - C:\SASWINLO.dll
    O23 - Service: ANIWZCSd Service (ANIWZCSdService) - Alpha Networks Inc. - C:\Program Files\ANI\ANIWZCS2 Service\ANIWZCSdS.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: Trend Micro Central Control Component (PcCtlCom) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe
    O23 - Service: Trend Micro Protection Against Spyware (PcScnSrv) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\PcScnSrv.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: ServiceLayer - Nokia. - C:\Program Files\PC Connectivity Solution\ServiceLayer.exe
    O23 - Service: Trend Micro Real-time Service (Tmntsrv) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe
    O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
    O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe

    --
    End of file - 7268 bytes
     
  4. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/609401

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice