User User name Password  
   
Thursday 28.11.2024 / 11:22
Search AfterDawn Forums:        In English   Suomeksi   På svenska
afterdawn.com > forums > software, operating systems and more > windows - virus and spyware problems > hijack this log please help
Show topics
 
Forums
Forums
hijack this log please help
  Jump to:
 
Posted Message
russ7
Newbie
_
18. June 2006 @ 05:00 _ Link to this message    Send private message to this user   
Logfile of HijackThis v1.99.1
Scan saved at 8:34:10 PM, on 6/18/2006
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\dcomcfg.exe
C:\WINDOWS\System32\atmclk.exe
C:\Program Files\Analog Devices\SoundMAX\SMTray.exe
C:\Program Files\ASUS\Probe\AsusProb.exe
C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe
C:\Program Files\Muiltmedia keyboard utility\1.3\KbdAp32A.exe
C:\WINDOWS\DTVWALKERIR.exe
C:\Program Files\WinZip\WZQKPICK.EXE
C:\WINDOWS\System32\WgaTray.exe
C:\WINDOWS\TEMP\h91746.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Panda Software\Panda Platinum 2006 Internet Security\PAVJOBS.EXE
C:\Program Files\Panda Software\Panda Platinum 2006 Internet Security\PAVJOBS.EXE
C:\Program Files\Panda Software\Panda Platinum 2006 Internet Security\PAVJOBS.EXE
C:\Program Files\Panda Software\Panda Platinum 2006 Internet Security\PAVJOBS.EXE
C:\Program Files\Panda Software\Panda Platinum 2006 Internet Security\PAVJOBS.EXE
C:\Program Files\Panda Software\Panda Platinum 2006 Internet Security\PAVJOBS.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\System32\wuauclt.exe
C:\hjt\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
O2 - BHO: (no name) - {f79fd28e-36ee-4989-aa61-9dd8e30a82fa} - C:\WINDOWS\System32\hp100.tmp
O4 - HKLM\..\Run: [SiSUSBRG] C:\WINDOWS\SiSUSBrg.exe
O4 - HKLM\..\Run: [Smapp] C:\Program Files\Analog Devices\SoundMAX\SMTray.exe
O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [ASUS Probe] C:\Program Files\ASUS\Probe\AsusProb.exe
O4 - HKLM\..\Run: [FLMK08KB] C:\Program Files\Muiltmedia keyboard utility\1.3\MMKEYBD.EXE
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [Pop3trap.exe] C:\Program Files\Trend Micro\PC-cillin 2002\Pop3trap.exe
O4 - HKLM\..\Run: [PCCClient.exe] C:\Program Files\Trend Micro\PC-cillin 2002\PCCClient.exe
O4 - HKLM\..\Run: [pccguide.exe] C:\Program Files\Trend Micro\PC-cillin 2002\pccguide.exe
O4 - HKLM\..\Run: [DTVWALKERIR] C:\WINDOWS\DTVWALKERIR.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: WinZip Quick Pick.lnk = C:\Program Files\WinZip\WZQKPICK.EXE
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O14 - IERESET.INF: SearchAssistant=
O14 - IERESET.INF: CustomizeSearch=
O14 - IERESET.INF: SEARCH_PAGE_URL=
O14 - IERESET.INF: START_PAGE_URL=
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {25365FF3-2746-4230-9DA7-163CCA318309} - http://inst.c-wss.com/117p/html/gtdownlr.cab
O16 - DPF: {71DA2A4E-ACB3-4065-9E41-8BC42EABE427} - http://scripts.dlv4.com/binaries/IA/svcia32_EN_XP.cab
O16 - DPF: {85D1F3B2-2A21-11D7-97B9-0010DC2A6243} (SecureLogin class) - http://secure2.comned.com/signuptemplates/securelogin-devel.cab
O16 - DPF: {97B79133-88F0-45F0-8D57-0F2EF27D9C66} - http://85.255.114.166/1/rdgAU2404.exe
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O20 - Winlogon Notify: winpsa32 - C:\WINDOWS\SYSTEM32\winpsa32.dll
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
Advertisement
_
__
Senior Member
_
18. June 2006 @ 05:11 _ Link to this message    Send private message to this user   
Hi russ7

Have you removed Panda, Norton and Trend micro your computer?

Please download ewido anti malware it is a free version of the program -> http://www.ewido.net/en/download/

1. Install ewido security suite
2. When installing, under "Additional Options" uncheck..
* Install background guard
* Install scan via context menu
3. Launch ewido, there should be an icon on your desktop, double-click it.
4. The program will now open to the main screen.
5. When you run ewido for the first time, you may get a warning "Database could not be found!". Click OK. We will fix this in a moment.
6. You will need to update ewido to the latest definition files.
* On the left hand side of the main screen click update.
* Then click on Start Update.
7. The update will start and a progress bar will show the updates being installed.
(the status bar at the bottom will display ("Update successful")

If you are having problems with the updater, you can use this link to manually update ewido.
ewido manual updates -> http://www.ewido.net/en/download/updates/

Once the updates are installed do the following:


Download Killbox to your desktop -> http://www.downloads.subratam.org/KillBox.zip
Unzip it to your desktop.

Run Killbox.exe
-> Choose Delete on Reboot
-> Click All Files option.

Copy the following lines to your clipboard (choose text with your mouse, press CTRL+C or copy)

C:\WINDOWS\SYSTEM32\winpsa32.dll
C:\WINDOWS\TEMP\h91746.exe

Then go back to Killbox
-> go to File
-> choose Paste from Clipboard
-> Click the red-white Delete File option.
-> Click Yes to Delete on Reboot question
-> Click OK to any PendingFileRenameOperations requests (and tell me if you get any of these!)
-> Restart your computer if Killbox won't do it.

(If you get this error when running Killbox: "Component 'MsComCtl.ocx' or one of its dependencies not correctly registered: a file is missing or invalid.", download Missingfilessetup.exe form here to your desktop and run the file, then try running killbox -> http://www.eudaemonia.me.uk/downloads/Files/missingfilesetup.exe)


When comp is running after removin, Scan hijack this and check

O16 - DPF: {97B79133-88F0-45F0-8D57-0F2EF27D9C66} - http://85.255.114.166/1/rdgAU2404.exe
O20 - Winlogon Notify: winpsa32 - C:\WINDOWS\SYSTEM32\winpsa32.dll

Close all programs exept HijackThis and click Fix Checked


Reboot your computer in SafeMode by doing the following:

1. Restart your computer
2. After hearing your computer beep once during startup, but before the Windows icon appears, press F8.
3. Instead of Windows loading as normal, a menu should appear
4. Select the first option, to run Windows in Safe Mode.

Launch ewido:

* Click on scanner
* Click on Complete System Scan and the scan will begin.
* You will be prompted to clean the first infection.
* Select "Perform action on all infections", then proceed.
* Once the scan has completed, there will be a button located on the bottom of the screen named Save report
* Click Save report.
* Save the report .txt file to your desktop or a location where you can find it easily.

Close ewido security suite.

Reboot back to normal mode

Download SmitfraudFix.zip to your desktop -> http://siri.urz.free.fr/Fix/SmitfraudFix.zip

Unzip it (folder named SmitFraudFix) to your desktop:

Open the folder SmitfraudFix and doubleclick smitfraudfix.cmd
Choose option #1 - Search by typing 1 and pressing "Enter"; a textfile opens and lists the infected files (if those exist)

Post the contents of this textfile to here.

(Some antiviruses recognises process.exe as a malware. It is not malware, it is a program that stops processes)

Send a fresh HjT log, smitfraudfixes rapport and ewido report.


Jaa- ei tuollaasia spämmäreitä ookkaa -> tapiiri

http://www.virustorjunta.net/index.php
russ7
Newbie
_
18. June 2006 @ 06:31 _ Link to this message    Send private message to this user   
yes i have removed panda, norton and trend because i thought stuff was clashing with each other
received one- pending file rename opertaions registery data has beeen removed by external process
windows wouldnt start in safe mode and smitfraudfix wouldnt run cause it said it was an unsupported version required windows 2000/xp, but ive got xp?
here are logs for HijackThis and ewido

Logfile of HijackThis v1.99.1
Scan saved at 10:22:45 PM, on 6/18/2006
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\SYSTEM32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Analog Devices\SoundMAX\SMTray.exe
C:\Program Files\ASUS\Probe\AsusProb.exe
C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe
C:\WINDOWS\DTVWALKERIR.exe
C:\Program Files\Muiltmedia keyboard utility\1.3\KbdAp32A.exe
C:\Program Files\WinZip\WZQKPICK.EXE
C:\Program Files\ewido anti-malware\ewidoctrl.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\System32\WgaTray.exe
C:\WINDOWS\System32\wuauclt.exe
C:\hjt\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
O4 - HKLM\..\Run: [SiSUSBRG] C:\WINDOWS\SiSUSBrg.exe
O4 - HKLM\..\Run: [Smapp] C:\Program Files\Analog Devices\SoundMAX\SMTray.exe
O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [ASUS Probe] C:\Program Files\ASUS\Probe\AsusProb.exe
O4 - HKLM\..\Run: [FLMK08KB] C:\Program Files\Muiltmedia keyboard utility\1.3\MMKEYBD.EXE
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [Pop3trap.exe] C:\Program Files\Trend Micro\PC-cillin 2002\Pop3trap.exe
O4 - HKLM\..\Run: [PCCClient.exe] C:\Program Files\Trend Micro\PC-cillin 2002\PCCClient.exe
O4 - HKLM\..\Run: [pccguide.exe] C:\Program Files\Trend Micro\PC-cillin 2002\pccguide.exe
O4 - HKLM\..\Run: [DTVWALKERIR] C:\WINDOWS\DTVWALKERIR.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: WinZIP Quick Pick.lnk = C:\Program Files\WinZip\WZQKPICK.EXE
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O14 - IERESET.INF: SearchAssistant=
O14 - IERESET.INF: CustomizeSearch=
O14 - IERESET.INF: SEARCH_PAGE_URL=
O14 - IERESET.INF: START_PAGE_URL=
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {25365FF3-2746-4230-9DA7-163CCA318309} - http://inst.c-wss.com/117p/html/gtdownlr.cab
O16 - DPF: {71DA2A4E-ACB3-4065-9E41-8BC42EABE427} - http://scripts.dlv4.com/binaries/IA/svcia32_EN_XP.cab
O16 - DPF: {85D1F3B2-2A21-11D7-97B9-0010DC2A6243} (SecureLogin class) - http://secure2.comned.com/signuptemplates/securelogin-devel.cab
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido anti-malware\ewidoctrl.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe


---------------------------------------------------------
ewido anti-malware - Scan report
---------------------------------------------------------

+ Created on: 10:19:25 PM, 6/18/2006
+ Report-Checksum: 23AFB5DB

+ Scan result:

HKLM\SOFTWARE\Classes\CLSID\{f79fd28e-36ee-4989-aa61-9dd8e30a82fa} -> Trojan.Small : Cleaned with backup
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objecta\{f79fd28e-36ee-4989-aa61-9dd8e30a82fa} -> Trojan.Small : Cleaned with backup
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{f79fd28e-36ee-4989-aa61-9dd8e30a82fa} -> Trojan.Small : Cleaned with backup
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\explorer\run\\kernel32.dll -> Trojan.Small : Cleaned with backup
HKU\S-1-5-21-776561741-790525478-839522115-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{f79fd28e-36ee-4989-aa61-9dd8e30a82fa} -> Trojan.Small : Cleaned with backup
C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\Cache\50114B41d01 -> Trojan.Agent.vg : Cleaned with backup
:mozilla.15:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookies.txt -> TrackingCookie.Com : Cleaned with backup
:mozilla.21:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookies.txt -> TrackingCookie.Doubleclick : Cleaned with backup
:mozilla.22:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookies.txt -> TrackingCookie.Onestat : Cleaned with backup
:mozilla.23:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookies.txt -> TrackingCookie.Onestat : Cleaned with backup
:mozilla.24:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookies.txt -> TrackingCookie.Atdmt : Cleaned with backup
:mozilla.29:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookies.txt -> TrackingCookie.Fastclick : Cleaned with backup
:mozilla.30:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookies.txt -> TrackingCookie.Fastclick : Cleaned with backup
:mozilla.31:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookies.txt -> TrackingCookie.Fastclick : Cleaned with backup
:mozilla.32:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookies.txt -> TrackingCookie.Fastclick : Cleaned with backup
:mozilla.33:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookies.txt -> TrackingCookie.Fastclick : Cleaned with backup
:mozilla.34:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookies.txt -> TrackingCookie.Casalemedia : Cleaned with backup
:mozilla.35:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookies.txt -> TrackingCookie.Casalemedia : Cleaned with backup
:mozilla.36:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookies.txt -> TrackingCookie.Casalemedia : Cleaned with backup
:mozilla.46:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookies.txt -> TrackingCookie.Mediaplex : Cleaned with backup
:mozilla.51:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookies.txt -> TrackingCookie.Overture : Cleaned with backup
:mozilla.52:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookies.txt -> TrackingCookie.Overture : Cleaned with backup
:mozilla.9:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookiesnew.txt -> TrackingCookie.Fastclick : Cleaned with backup
:mozilla.10:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookiesnew.txt -> TrackingCookie.Fastclick : Cleaned with backup
:mozilla.11:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookiesnew.txt -> TrackingCookie.Fastclick : Cleaned with backup
:mozilla.12:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookiesnew.txt -> TrackingCookie.Fastclick : Cleaned with backup
:mozilla.15:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookiesnew.txt -> TrackingCookie.Com : Cleaned with backup
:mozilla.16:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookiesnew.txt -> TrackingCookie.Doubleclick : Cleaned with backup
:mozilla.21:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookiesnew.txt -> TrackingCookie.Mediaplex : Cleaned with backup
:mozilla.22:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookiesnew.txt -> TrackingCookie.Atdmt : Cleaned with backup
:mozilla.27:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookiesnew.txt -> TrackingCookie.Overture : Cleaned with backup
:mozilla.28:C:\Documents and Settings\putawhiizzz\Application Data\Mozilla\Firefox\Profiles\4nd1f78a.default\cookiesnew.txt -> TrackingCookie.Overture : Cleaned with backup
C:\Documents and Settings\putawhiizzz\Local Settings\Temporary Internet Files\Content.IE5\RBT73P4S\rdgAU2404[1].exe -> Downloader.Small.cxq : Cleaned with backup
C:\Documents and Settings\putawhiizzz\Local Settings\Temporary Internet Files\Content.IE5\RBT73P4S\srvhea[1].exe -> Trojan.Dialer.oy : Cleaned with backup
C:\Documents and Settings\putawhiizzz\Local Settings\Temporary Internet Files\Content.IE5\RBT73P4S\srvzsb[1].exe -> Trojan.Dialer.oy : Cleaned with backup
C:\Documents and Settings\putawhiizzz\Local Settings\Temporary Internet Files\Content.IE5\X4OZXT8H\srvjyy[1].exe -> Trojan.Dialer.oy : Cleaned with backup
C:\Documents and Settings\putawhiizzz\Start Menu\Programs\WhenU -> Adware.SaveNow : Cleaned with backup
C:\Documents and Settings\putawhiizzz\Start Menu\Programs\WhenU\Uninstall.lnk -> Adware.SaveNow : Cleaned with backup
C:\good stuff\Applications\Chess Partner 5.1\cp51026_crack.exe -> Backdoor.Theef.111 : Cleaned with backup
C:\hjt\backups\backup-20060603-180402-540.dll -> Downloader.Zlob.qw : Cleaned with backup
C:\hjt\backups\backup-20060606-165814-341.dll -> Downloader.Zlob.qw : Cleaned with backup
C:\hjt\backups\backup-20060606-191002-920.dll -> Downloader.Zlob.qw : Cleaned with backup
C:\hjt\backups\backup-20060618-191101-765.dll -> Downloader.Zlob.qw : Cleaned with backup
C:\hjt\backups\backup-20060618-191122-713.dll -> Downloader.Zlob.qw : Cleaned with backup
C:\Program Files\Common Files\Real\WeatherBug\MiniBugTransporter.dll -> Adware.Minibug : Cleaned with backup
C:\RECYCLER\NPROTECT\00013315.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00013467.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00013616.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00013758.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00013899.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00014056.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00014212.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00014364.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00014508.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00014653.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00014807.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00014952.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00015094.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00015451.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00015654.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00015979.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00016131.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00016276.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00016424.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00016569.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00016781.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00016814.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00016836.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00016871.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00016880.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00016889.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00016897.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00016907.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00016914.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00016922.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00016930.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00016936.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00016952.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00017120.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00017266.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00017414.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00017575.EXE -> Downloader.Small.czw : Cleaned with backup
C:\RECYCLER\NPROTECT\00018103.EXE -> Downloader.Small.czw : Cleaned with backup
C:\WINDOWS\Downloaded Program Files\CONFLICT.14\rdgAU2404.exe -> Downloader.Small.cxq : Cleaned with backup
C:\WINDOWS\system32\1024 -> Trojan.Small : Cleaned with backup
C:\WINDOWS\system32\atmclk.exe -> Trojan.Small : Cleaned with backup
C:\WINDOWS\system32\gtdownlr_118.ocx -> Adware.Gdown : Cleaned with backup
C:\WINDOWS\system32\hp100.tmp -> Downloader.Zlob.qw : Cleaned with backup
C:\WINDOWS\Temp\win633.tmp.exe -> Trojan.Dialer.oy : Cleaned with backup
C:\WINDOWS\Temp\win63D.tmp.exe -> Trojan.Dialer.oy : Cleaned with backup
C:\WINDOWS\Temp\win7.tmp.exe -> Trojan.Dialer.oy : Cleaned with backup


::Report End
Senior Member
_
18. June 2006 @ 06:39 _ Link to this message    Send private message to this user   
Okei, much better :)

Please download, unzip and run smitRem.exe ©noahdfear
http://noahdfear.geekstogo.com/click%20counter/click.php?id=1

Copy its log here


Jaa- ei tuollaasia spämmäreitä ookkaa -> tapiiri

http://www.virustorjunta.net/index.php
russ7
Newbie
_
18. June 2006 @ 06:55 _ Link to this message    Send private message to this user   
how do i get the log?
Senior Member
_
18. June 2006 @ 07:03 _ Link to this message    Send private message to this user   
After unzipping it make a folder. Open the folder and run runthis.bat

Then follw instructions :)

Jaa- ei tuollaasia spämmäreitä ookkaa -> tapiiri

http://www.virustorjunta.net/index.php
russ7
Newbie
_
18. June 2006 @ 07:11 _ Link to this message    Send private message to this user   
done that but got no log
Senior Member
_
18. June 2006 @ 07:13 _ Link to this message    Send private message to this user   
Okei lets do this first:

Download FIXPATH2.ZIP. http://internet.cybermesa.com/~bstewart/files/fixpath2.zip
Extract the files to a folder in C:\, like C:\FIXPATH2.

RUNNING THE PROGRAM:

* Open a command prompt window by going to start > run and copy and type: cmd
In the command prompt, type: cd C:\

So you should get C:\>

Then type: cd FIXPATH2

So you should get: C:\>fixpath2

Then type: FIXPATH.EXE
* It will display some preliminary information, and ask if it should continue and check for errors. Click Yes.
* If it successfully updates the Path value in the registry, you will need to
reboot for the change to take effect. !! This is really important !!


After reboot, try to run smithfraudfix again as I explained before.
Post the log in your next reply together with a new hijackthislog.



Jaa- ei tuollaasia spämmäreitä ookkaa -> tapiiri

http://www.virustorjunta.net/index.php
russ7
Newbie
_
18. June 2006 @ 07:26 _ Link to this message    Send private message to this user   
smitfraudfix still dont work it says
16 bit ms dos subsystem
c\windows\system32\cmd.exe
c\progra~1\sysmantec\s32evnt1.dll
an installable virtual device failed dll intialization choos close to terminate application
Senior Member
_
18. June 2006 @ 07:34 _ Link to this message    Send private message to this user   
Copy follow lines to notepad


echo off
sc stop SNDSrvc
sc delete SNDSrvc


Save it to name service.bat filetype "all files" to the desktop

double click it and if appaers any question answer yes.

Boot comp.

Delete folder
C:\Program Files\Common Files\ >> Symantec Shared\

Try again to run smitfraudfix.

Jaa- ei tuollaasia spämmäreitä ookkaa -> tapiiri

http://www.virustorjunta.net/index.php
russ7
Newbie
_
18. June 2006 @ 07:46 _ Link to this message    Send private message to this user   
nope still nothing
Advertisement
_
__
 
_
Senior Member
_
18. June 2006 @ 08:03 _ Link to this message    Send private message to this user   
Click Start > run > type in the box "msconfig" and click ok

go to BOOT.INI page and mark the line "/SAFEBOOT click use and close.

then reboot as window asks

Delete those folder too :

c\Program Files\ >> sysmantec\ or if that is typing error then delete:
c\Program Files\ >> symantec\

Try run smitfraudfix then .




Jaa- ei tuollaasia spämmäreitä ookkaa -> tapiiri

http://www.virustorjunta.net/index.php
afterdawn.com > forums > software, operating systems and more > windows - virus and spyware problems > hijack this log please help
 

Digital video: AfterDawn.com | AfterDawn Forums
Music: MP3Lizard.com
Gaming: Blasteroids.com | Blasteroids Forums | Compare game prices
Software: Software downloads
Blogs: User profile pages
RSS feeds: AfterDawn.com News | Software updates | AfterDawn Forums
International: AfterDawn in Finnish | AfterDawn in Swedish | AfterDawn in Norwegian | download.fi
Navigate: Search | Site map
About us: About AfterDawn Ltd | Advertise on our sites | Rules, Restrictions, Legal disclaimer & Privacy policy
Contact us: Send feedback | Contact our media sales team
 
  © 1999-2024 by AfterDawn Ltd.

  IDG TechNetwork