1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Trojanspm/lx need help removing

Discussion in 'Virus & Other Malware Removal' started by phlashko, Jun 30, 2007.

Thread Status:
Not open for further replies.
Advertisement
  1. phlashko

    phlashko Thread Starter

    Joined:
    Jun 30, 2007
    Messages:
    9
    I believe I have been infected with the TrojanSPM/LX trojan, and i need help removing this trojan and any other trojans that may be on this computer. I will post a Hijack this log underneath my message.

    Logfile of Trend Micro HijackThis v2.0.0 (BETA)
    Scan saved at 4:28:35 PM, on 6/30/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\LEXBCES.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    C:\WINDOWS\System32\nvsvc32.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\MsPMSPSv.exe
    C:\WINDOWS\system32\bvgkhmyi.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe
    C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\RxMon.exe
    C:\WINDOWS\avp.exe
    C:\Documents and Settings\All Users\Application Data\zmbwhsnk.exe
    C:\WINDOWS\mgrs.exe
    C:\WINDOWS\system32\lexpps.exe
    C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\Playlist.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\DOCUME~1\Jeramy\LOCALS~1\Temp\hostlook.exe
    C:\WINDOWS\avp.exe
    C:\DOCUME~1\Jeramy\LOCALS~1\Temp\agent32.exe
    C:\WINDOWS\avp.exe
    C:\WINDOWS\avp.exe
    C:\DOCUME~1\Jeramy\LOCALS~1\Temp\32sys.exe
    C:\WINDOWS\avp.exe
    C:\DOCUME~1\Jeramy\LOCALS~1\Temp\monlook.exe
    C:\Program Files\Lavasoft\Ad-Aware 2007\Ad-Aware2007.exe
    C:\Documents and Settings\Jeramy\Desktop\HiJackThis_v2.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Internet Explorer\iexplore.exe

    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {1F6581D5-AA53-4b73-A6F9-41420C6B61F1} - C:\WINDOWS\system32\uujqnraa.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O2 - BHO: (no name) - {A6807262-1D7A-44AB-947B-23B71E97915C} - C:\WINDOWS\system32\ljjklkh.dll
    O2 - BHO: (no name) - {E3DA93F2-C6F8-48BA-90FD-92151DA961B0} - C:\WINDOWS\system32\vturr.dll
    O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe"
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [RoxioEngineUtility] "C:\Program Files\Common Files\Roxio Shared\System\EngUtil.exe"
    O4 - HKLM\..\Run: [RoxioDragToDisc] "C:\Program Files\Roxio\Easy CD Creator 6\DragToDisc\DrgToDsc.exe"
    O4 - HKLM\..\Run: [RoxioAudioCentral] "C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\RxMon.exe"
    O4 - HKLM\..\Run: [avp] C:\WINDOWS\avp.exe
    O4 - HKLM\..\Run: [CTDrive] rundll32.exe C:\WINDOWS\system32\drvgem.dll,startup
    O4 - HKLM\..\Run: [zmbwhsnk.exe] C:\Documents and Settings\All Users\Application Data\zmbwhsnk.exe
    O4 - HKLM\..\Run: [smgr] mgrs.exe
    O4 - HKLM\..\Run: [SC2] C:\WINDOWS\system32\scchk32.exe
    O4 - HKLM\..\Run: [icq.com] rundll32.exe "C:\WINDOWS\system32\plofmumx.dll",forkonce
    O4 - HKLM\..\Policies\Explorer\Run: [svchost.exe] C:\WINDOWS\svchost.exe
    O4 - HKUS\S-1-5-18\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'Default user')
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1178821378328
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1178821372953
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://games.pogo.com/online2/pogo/bejeweled2/popcaploader_v6.cab
    O20 - Winlogon Notify: ljjklkh - C:\WINDOWS\SYSTEM32\ljjklkh.dll
    O20 - Winlogon Notify: vturr - C:\WINDOWS\system32\vturr.dll
    O20 - Winlogon Notify: winmbj32 - C:\WINDOWS\SYSTEM32\winmbj32.dll
    O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\System32\browseui.dll
    O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\System32\browseui.dll
    O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    O23 - Service: DomainService - - C:\WINDOWS\system32\bvgkhmyi.exe
    O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe

    --
    End of file - 5149 bytes
     
  2. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Do all of this before posting the logs and one hijack log at the ned



    If you have vundofix, remove it and get the current version

    Please download http://www.atribune.org/ccount/click.php?id=4 to C:\
    Double-click VundoFix.exe to run it.
    click the Scan for Vundo button.
    Once it's done scanning, click the Remove Vundo button.
    You will receive a prompt asking if you want to remove the files, click YES.
    Once you click yes, your desktop will go blank as it starts removing Vundo.
    When completed, it will prompt that it will shutdown your computer, click OK.
    Turn your computer back on.
    Please post the contents of C:\vundofix.txt
    Note: It is possible that VundoFix encountered a file it could not remove. In this case, VundoFix will run on reboot, simply follow the above instructions starting from "Click the Scan for Vundo button" when VundoFix appears at reboot.

    Please let Vundo finish its thing, sometimes it can take multiple passes
    ====================
    NOTE: If you have downloaded ComboFix previously please delete that version and download it again!

    Download this file :

    http://www.techsupportforum.com/sectools/sUBs/ComboFix.exe
    or
    http://download.bleepingcomputer.com/sUBs/Beta/ComboFix.exe

    Double click combofix.exe & follow the prompts.
    When finished, it shall produce a log for you. Post that log and a HiJack log in your next reply

    Note:
    Do not mouseclick combofix's window while its running. That may cause it to stall

    =====================
    Download Superantispyware (SAS)

    http://www.superantispyware.com/superantispywarefreevspro.html

    Install it and double-click the icon on your desktop to run it.
    · It will ask if you want to update the program definitions, click Yes.
    · Under Configuration and Preferences, click the Preferences button.
    · Click the Scanning Control tab.
    · Under Scanner Options make sure the following are checked:
    o Close browsers before scanning
    o Scan for tracking cookies
    o Terminate memory threats before quarantining.
    o Please leave the others unchecked.
    o Click the Close button to leave the control center screen.
    · On the main screen, under Scan for Harmful Software click Scan your computer.
    · On the left check C:\Fixed Drive.
    · On the right, under Complete Scan, choose Perform Complete Scan.
    · Click Next to start the scan. Please be patient while it scans your computer.
    · After the scan is complete a summary box will appear. Click OK.
    · Make sure everything in the white box has a check next to it, then click Next.
    · It will quarantine what it found and if it asks if you want to reboot, click Yes.
    · To retrieve the removal information for me please do the following:
    o After reboot, double-click the SUPERAntispyware icon on your desktop.
    o Click Preferences. Click the Statistics/Logs tab.
    o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    o It will open in your default text editor (such as Notepad/Wordpad).
    o Please highlight everything in the notepad, then right-click and choose copy.
    · Click close and close again to exit the program.
    · Please paste that information here for me with a new HijackThis log.
     
  3. phlashko

    phlashko Thread Starter

    Joined:
    Jun 30, 2007
    Messages:
    9
    Here is the super antispyware report

    --------------------------------------------------------------------------------------------------------
    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 06/30/2007 at 05:43 PM

    Application Version : 3.9.1008

    Core Rules Database Version : 3263
    Trace Rules Database Version: 1274

    Scan type : Quick Scan
    Total Scan Time : 00:07:17

    Memory items scanned : 337
    Memory threats detected : 3
    Registry items scanned : 559
    Registry threats detected : 18
    File items scanned : 7524
    File threats detected : 221

    Trojan.WinFixer
    C:\WINDOWS\SYSTEM32\GEBCY.DLL
    C:\WINDOWS\SYSTEM32\GEBCY.DLL
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{82770948-82C3-4273-B2CC-563B6FDA2EF7}
    HKCR\CLSID\{82770948-82C3-4273-B2CC-563B6FDA2EF7}
    HKCR\CLSID\{82770948-82C3-4273-B2CC-563B6FDA2EF7}\InprocServer32
    HKCR\CLSID\{82770948-82C3-4273-B2CC-563B6FDA2EF7}\InprocServer32#ThreadingModel
    Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\gebcy

    Trojan.Downloader-Gen/HitItQuitIt
    C:\WINDOWS\SYSTEM32\XXYYXUR.DLL
    C:\WINDOWS\SYSTEM32\XXYYXUR.DLL
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{930D35D2-094D-41B9-8E89-D1B76F2C6E97}
    HKCR\CLSID\{930D35D2-094D-41B9-8E89-D1B76F2C6E97}
    HKCR\CLSID\{930D35D2-094D-41B9-8E89-D1B76F2C6E97}\InprocServer32
    HKCR\CLSID\{930D35D2-094D-41B9-8E89-D1B76F2C6E97}\InprocServer32#ThreadingModel
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks#{930D35D2-094D-41B9-8E89-D1B76F2C6E97}
    Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\xxyyxur

    Adware.eZula
    C:\WINDOWS\SYSTEM32\BVGKHMYI.EXE
    C:\WINDOWS\SYSTEM32\BVGKHMYI.EXE
    HKLM\System\ControlSet001\Services\DomainService
    HKLM\System\ControlSet003\Services\DomainService
    HKLM\System\CurrentControlSet\Services\DomainService
    C:\VUNDOFIX BACKUPS\BVGKHMYI.EXE.BAD
    C:\WINDOWS\Prefetch\BVGKHMYI.EXE-30A30CD5.pf

    Adware.Vundo Variant
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E3DA93F2-C6F8-48BA-90FD-92151DA961B0}
    HKCR\CLSID\{E3DA93F2-C6F8-48BA-90FD-92151DA961B0}
    HKCR\CLSID\{E3DA93F2-C6F8-48BA-90FD-92151DA961B0}\InprocServer32
    HKCR\CLSID\{E3DA93F2-C6F8-48BA-90FD-92151DA961B0}\InprocServer32#ThreadingModel
    C:\WINDOWS\SYSTEM32\VTURR.DLL

    Adware.Tracking Cookie
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][3].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected]rket[2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][6].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][4].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][3].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][3].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][3].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][3].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][4].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Jeramy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][10].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][2].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][3].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][4].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][5].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][6].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][7].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][8].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][9].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][2].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][2].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][2].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][2].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][2].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][2].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][3].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][2].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][2].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][2].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][2].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][2].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][2].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][3].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][2].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][2].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][2].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][2].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][2].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][1].txt
    C:\Documents and Settings\Chris\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][3].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][5].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][6].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][3].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][3].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][3].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][1].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][2].txt
    C:\Documents and Settings\Virginia\Cookies\[email protected][3].txt

    Trojan.Downloader-NoName
    C:\DOCUMENTS AND SETTINGS\CHRIS\LOCAL SETTINGS\TEMP\HOST16.EXE
    C:\DOCUMENTS AND SETTINGS\CHRIS\LOCAL SETTINGS\TEMP\LOOK16.EXE
    C:\DOCUMENTS AND SETTINGS\CHRIS\LOCAL SETTINGS\TEMP\LOOKSERVER.EXE
    C:\DOCUMENTS AND SETTINGS\CHRIS\LOCAL SETTINGS\TEMP\SERVERSYS.EXE
    C:\DOCUMENTS AND SETTINGS\CHRIS\LOCAL SETTINGS\TEMP\SYSSV.EXE
    C:\DOCUMENTS AND SETTINGS\JERAMY\LOCAL SETTINGS\TEMP\32SYS.EXE
    C:\DOCUMENTS AND SETTINGS\JERAMY\LOCAL SETTINGS\TEMP\AGENT32.EXE
    C:\DOCUMENTS AND SETTINGS\JERAMY\LOCAL SETTINGS\TEMP\HOSTLOOK.EXE
    C:\DOCUMENTS AND SETTINGS\JERAMY\LOCAL SETTINGS\TEMP\MONLOOK.EXE
    C:\DOCUMENTS AND SETTINGS\VIRGINIA\LOCAL SETTINGS\TEMP\HOSTSV.EXE
    C:\DOCUMENTS AND SETTINGS\VIRGINIA\LOCAL SETTINGS\TEMP\SVMON.EXE
    C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\DRIVER.EXE.VIR
    C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\WINSYS64.EXE.VIR

    Trojan.Downloader-SVCHost/Fake
    C:\DOCUMENTS AND SETTINGS\CHRIS\LOCAL SETTINGS\TEMP\WIN55.TMP.EXE
    C:\QOOBOX\QUARANTINE\C\WINDOWS\SVCHOST.EXE.VIR
    C:\WINDOWS\TEMP\WIN293.TMP.EXE
    C:\WINDOWS\Prefetch\WIN293.TMP.EXE-25F1A135.pf

    Malware.Ultimate Defender
    C:\NKWNCVKG1.EXE
    C:\NKWNCVKG2.EXE
    C:\NKWNCVKG3.EXE

    Adware.ClickSpring/Yazzle
    C:\QOOBOX\QUARANTINE\C\PROGRAM FILES\COMMON FILES\YAZZLE1162OINADMIN.EXE.VIR

    Adware.ClickSpring
    C:\QOOBOX\QUARANTINE\C\PROGRAM FILES\MANTEC~1\SMSS.EXE.VIR

    Trojan.Downloader-Gen/AVP
    C:\QOOBOX\QUARANTINE\C\WINDOWS\AVP.EXE.VIR
    C:\WINDOWS\TEMP\WIN22A.TMP.EXE
    C:\WINDOWS\Prefetch\WIN22A.TMP.EXE-34C2B927.pf

    Trojan.Downloader-MGRS
    C:\WINDOWS\MGRS.EXE
    C:\WINDOWS\Prefetch\MGRS.EXE-34C3510A.pf

    Worm.SYSMON32
    C:\WINDOWS\SYSTEM32\SYSMON32.EXE
    C:\WINDOWS\Prefetch\SYSMON32.EXE-192CA1EA.pf

    Trojan.Downloader-DRVSAM
    C:\WINDOWS\TEMP\MST291.TMP
    --------------------------------------------------------------------------------------------------------



    Here is the combofix log
    --------------------------------------------------------------------------------------------------------
    Code:
    2007-05-01 08:35      146432    --a------    C:\Qoobox\Quarantine\C\Program Files\Common Files\Yazzle1162OinAdmin.exe.vir
    2007-05-10 11:17      104    --a------    C:\Qoobox\Quarantine\C\DOCUME~1\Jeramy\Desktop\Internet.lnk.vir
    2007-06-29 16:49      20992    --a------    C:\Qoobox\Quarantine\C\WINDOWS\avp.exe.vir
    2007-06-29 16:49      20992    --a------    C:\Qoobox\Quarantine\C\WINDOWS\system32\winmbj32.dll.vir
    2007-06-29 16:49      72704    --a------    C:\Qoobox\Quarantine\C\Program Files\MANTEC~1\smss.exe.vir
    2007-06-30 16:19      28160    --a------    C:\Qoobox\Quarantine\C\WINDOWS\system32\driver.exe.vir
    2007-06-30 16:19      28160    --a------    C:\Qoobox\Quarantine\C\WINDOWS\system32\winsys64.exe.vir
    2007-06-30 17:20      71168    --a------    C:\Qoobox\Quarantine\C\WINDOWS\svchost.exe.vir
    2007-06-30 17:21      40960    --a------    C:\Qoobox\Quarantine\C\WINDOWS\retadpu1000272.exe.vir
    
    
    Folder PATH listing
    Volume serial number is 0456-DAE8
    C:\QOOBOX
    \---Quarantine
        +---C
        |   +---DOCUME~1
        |   |   \---Jeramy
        |   |       \---Desktop
        |   |               Internet.lnk.vir
        |   |               
        |   +---Program Files
        |   |   +---Common Files
        |   |   |       Yazzle1162OinAdmin.exe.vir
        |   |   |       
        |   |   \---MANTEC~1
        |   |           smss.exe.vir
        |   |           
        |   \---WINDOWS
        |       |   avp.exe.vir
        |       |   retadpu1000272.exe.vir
        |       |   svchost.exe.vir
        |       |   
        |       \---system32
        |               driver.exe.vir
        |               winmbj32.dll.vir
        |               winsys64.exe.vir
        |               
        \---Registry_backups
    
    --------------------------------------------------------------------------------------------------------




    here is my Hijack this log
    --------------------------------------------------------------------------------------------------------
    Logfile of Trend Micro HijackThis v2.0.0 (BETA)
    Scan saved at 5:57:25 PM, on 6/30/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\LEXBCES.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\LEXPPS.EXE
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    C:\WINDOWS\System32\nvsvc32.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\MsPMSPSv.exe
    C:\Documents and Settings\All Users\Application Data\zmbwhsnk.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\internet explorer\iexplore.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Documents and Settings\Jeramy\Desktop\HiJackThis_v2.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = google.com
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O2 - BHO: (no name) - {A6807262-1D7A-44AB-947B-23B71E97915C} - C:\WINDOWS\system32\ljjklkh.dll (file missing)
    O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe"
    O4 - HKLM\..\Run: [RoxioEngineUtility] "C:\Program Files\Common Files\Roxio Shared\System\EngUtil.exe"
    O4 - HKLM\..\Run: [RoxioDragToDisc] "C:\Program Files\Roxio\Easy CD Creator 6\DragToDisc\DrgToDsc.exe"
    O4 - HKLM\..\Run: [RoxioAudioCentral] "C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\RxMon.exe"
    O4 - HKLM\..\Run: [zmbwhsnk.exe] C:\Documents and Settings\All Users\Application Data\zmbwhsnk.exe
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - HKUS\S-1-5-18\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'Default user')
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1178821378328
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1178821372953
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://games.pogo.com/online2/pogo/bejeweled2/popcaploader_v6.cab
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\System32\browseui.dll
    O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\System32\browseui.dll
    O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe

    --
    End of file - 4131 bytes

    --------------------------------------------------------------------------------------------------------
     
  4. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Where is the Vundo log and that is not the log I asked for from Combo


    You may want to print this or save it to notepad as we will go to safe mode.

    Fix these with HiJackThis – mark them, close IE, click fix checked

    O2 - BHO: (no name) - {A6807262-1D7A-44AB-947B-23B71E97915C} - C:\WINDOWS\system32\ljjklkh.dll (file missing)

    O4 - HKLM\..\Run: [zmbwhsnk.exe] C:\Documents and Settings\All Users\Application Data\zmbwhsnk.exe

    DownLoad Killbox from one of these links

    http://www.downloads.subratam.org/KillBox.zip or
    http://www.thespykiller.co.uk/files/killbox.exe

    Restart your computer into safe mode now. (Tapping F8 at the first black screen) Perform the following steps in safe mode:

    Double-click on Killbox.exe to run it. Now put a tick by Standard File Kill. In the "Full Path of File to Delete" box, copy and paste each of the following lines one at a time then click on the button that has the red circle with the X in the middle after you enter each file. It will ask for confimation to delete the file. Click Yes. Continue with that same procedure until you have copied and pasted all of these in the "Paste Full Path of File to Delete" box.

    C:\Documents and Settings\All Users\Application Data\zmbwhsnk.exe


    Note: It is possible that Killbox will tell you that one or more files do not exist. If that happens, just continue on with all the files. Be sure you don't miss any.

    START – RUN – type in %temp% - OK - Edit – Select all – File – Delete

    Delete everything in the C:\Windows\Temp folder or C:\WINNT\temp

    Not all temp files will delete and that is normal
    Empty the recycle bin
    Boot and post a new hijack log from normal NOT safe mode

    Please give feedback on what worked/didn’t work and the current status of your system
     
  5. phlashko

    phlashko Thread Starter

    Joined:
    Jun 30, 2007
    Messages:
    9
    ok done and here is the new log

    Logfile of Trend Micro HijackThis v2.0.0 (BETA)
    Scan saved at 6:19:09 PM, on 6/30/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\LEXBCES.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\LEXPPS.EXE
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    C:\WINDOWS\System32\nvsvc32.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\MsPMSPSv.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Documents and Settings\Jeramy\Desktop\HiJackThis_v2.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = google.com
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe"
    O4 - HKLM\..\Run: [RoxioEngineUtility] "C:\Program Files\Common Files\Roxio Shared\System\EngUtil.exe"
    O4 - HKLM\..\Run: [RoxioDragToDisc] "C:\Program Files\Roxio\Easy CD Creator 6\DragToDisc\DrgToDsc.exe"
    O4 - HKLM\..\Run: [RoxioAudioCentral] "C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\RxMon.exe"
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - HKUS\S-1-5-18\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'Default user')
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1178821378328
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1178821372953
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://games.pogo.com/online2/pogo/bejeweled2/popcaploader_v6.cab
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
     
  6. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Seems you decide to ignore my comments about missing logs

    You have no active AntiVirus!

    Get the free AVG AntiVirus 7.5 install it, check for updates and run a full scan

    AVG 7.5 - http://free.grisoft.com/freeweb.php/doc/2/
     
  7. phlashko

    phlashko Thread Starter

    Joined:
    Jun 30, 2007
    Messages:
    9
    I do have avg actually, and I am trying to post logs that i can find. the only log i can find with combo is the quarantine log
     
  8. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    There is nothing that shows you have AVG or at least it is not active

    Combo would generate a log as I posted but .............


    Post a new log that shows you have AVG AV
     
  9. phlashko

    phlashko Thread Starter

    Joined:
    Jun 30, 2007
    Messages:
    9
    I will redownload it and reinstall it. and the log did not show up when i did combo twice
     
  10. phlashko

    phlashko Thread Starter

    Joined:
    Jun 30, 2007
    Messages:
    9
    ok did a scan and it says it healed files win58.temp.exe


    here is my new hjt log

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\LEXBCES.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\LEXPPS.EXE
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    C:\WINDOWS\System32\nvsvc32.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\MsPMSPSv.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Adobe\Reader 8.0\Reader\AcroRd32.exe
    C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
    C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
    C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
    C:\Program Files\Grisoft\AVG7\avgcc.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Documents and Settings\Jeramy\Desktop\HiJackThis_v2.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = google.com
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe"
    O4 - HKLM\..\Run: [RoxioEngineUtility] "C:\Program Files\Common Files\Roxio Shared\System\EngUtil.exe"
    O4 - HKLM\..\Run: [RoxioDragToDisc] "C:\Program Files\Roxio\Easy CD Creator 6\DragToDisc\DrgToDsc.exe"
    O4 - HKLM\..\Run: [RoxioAudioCentral] "C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\RxMon.exe"
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'Default user')
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1178821378328
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1178821372953
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://games.pogo.com/online2/pogo/bejeweled2/popcaploader_v6.cab
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
    O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
    O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe

    --
    End of file - 4373 bytes
     
  11. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
  12. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/590395

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice