Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

System hanging and not responding


  • Please log in to reply

#1
ferdan

ferdan

    New Member

  • Member
  • Pip
  • 1 posts
Hey,

New to this and appreciate the help. Did the scans and now posting my HiJack list in hopes there is something someone notices that c/b the cause.

Thanks a lot!
AL
ps
(The RJ or RJF stuff i know and can get zapped)

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 3:01:40 PM, on 7/10/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Nhksrv.exe
C:\WINDOWS\System32\CTsvcCDA.EXE
C:\Program Files\Juniper Networks\Common Files\dsNcService.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\PROGRA~1\TRENDM~1\INTERN~3\PcCtlCom.exe
C:\WINDOWS\System32\svchost.exe
C:\PROGRA~1\TRENDM~1\INTERN~3\Tmntsrv.exe
C:\PROGRA~1\TRENDM~1\INTERN~3\tmproxy.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\WINDOWS\system32\devldr32.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Logitech\iTouch\iTouch.exe
C:\Program Files\Verizon\McciTrayApp.exe
C:\Program Files\Verizon\VSP\VerizonServicepoint.exe
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\Program Files\Trend Micro\Internet Security 2006\pccguide.exe
C:\Program Files\Adaptec\Easy CD Creator 5\DirectCD\DirectCD.exe
C:\WINDOWS\DELLMMKB.EXE
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Netropa\OSD.exe
C:\Program Files\SpywareGuard\sgmain.exe
C:\Program Files\TrueSwitchEsaya\TrueWizard.exe
C:\Program Files\SpywareGuard\sgbhp.exe
C:\Documents and Settings\ferdan\Desktop\HijackThis.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\Program Files\Internet Explorer\iexplore.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dellnet.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://finance.yahoo.com/
O2 - BHO: (no name) - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - (no file)
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Verizon Broadband Toolbar - {4E7BD74F-2B8D-469E-8CB0-AB60BB9AAE22} - C:\PROGRA~1\VOL_TO~1\VOL_TO~1.DLL
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - (no file)
O3 - Toolbar: Verizon Broadband Toolbar - {4E7BD74F-2B8D-469E-8CB0-AB60BB9AAE22} - C:\PROGRA~1\VOL_TO~1\VOL_TO~1.DLL
O4 - HKLM\..\Run: [zBrowser Launcher] C:\Program Files\Logitech\iTouch\iTouch.exe
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [Verizon_McciTrayApp] C:\Program Files\Verizon\McciTrayApp.exe
O4 - HKLM\..\Run: [VerizonServicepoint.exe] "C:\Program Files\Verizon\VSP\VerizonServicepoint.exe" /AUTORUN
O4 - HKLM\..\Run: [pccguide.exe] "C:\Program Files\Trend Micro\Internet Security 2006\pccguide.exe"
O4 - HKLM\..\Run: [NWTRAY] NWTRAY.EXE
O4 - HKLM\..\Run: [AdaptecDirectCD] C:\Program Files\Adaptec\Easy CD Creator 5\DirectCD\DirectCD.exe
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [DellTouch] C:\WINDOWS\DELLMMKB.EXE
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [Microsoft Works Update Detection] C:\Program Files\Microsoft Works\WkDetect.exe
O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
O4 - Startup: TrueAssistant.lnk = C:\Program Files\TrueSwitchEsaya\TrueWizard.exe
O9 - Extra button: RJ VPN Test - {D7721A38-ABCD-3586-DCAB-40E2A90F3736} - C:\Program Files\Common Files\vpn-ping.exe
O9 - Extra 'Tools' menuitem: VPN Test for Raymond James - {D7721A38-ABCD-3586-DCAB-40E2A90F3736} - C:\Program Files\Common Files\vpn-ping.exe
O9 - Extra button: RJ Remote - {D7721A38-ABCD-3586-DCAB-40E2A90F3737} - http://ballast.rjf.c...y/RJGateway.exe (file missing)
O9 - Extra 'Tools' menuitem: Raymond James Support - {D7721A38-ABCD-3586-DCAB-40E2A90F3737} - http://ballast.rjf.c...y/RJGateway.exe (file missing)
O9 - Extra button: Raymond James VPN - {D7721A38-ABCD-3586-DCAB-40E2A90F3738} - https://secureaccess.rjf.com (file missing)
O9 - Extra 'Tools' menuitem: Raymond James VPN - {D7721A38-ABCD-3586-DCAB-40E2A90F3738} - https://secureaccess.rjf.com (file missing)
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O15 - Trusted Zone: *.advisorinsight.com
O15 - Trusted Zone: rjf.bizcarta.com
O15 - Trusted Zone: *.bonddesk.com
O15 - Trusted Zone: *.extensity-hosting.com
O15 - Trusted Zone: *.forefield.com
O15 - Trusted Zone: *.informais.com
O15 - Trusted Zone: rjf.ossid.net
O15 - Trusted Zone: *.peopleclick.com
O15 - Trusted Zone: *.rjecm.com
O15 - Trusted Zone: http://*.rjf.com
O15 - Trusted Zone: *.reports.standardandpoors.com
O15 - Trusted Zone: *.successfactors.com
O15 - Trusted IP range: http://192.109.247.200
O15 - Trusted IP range: http://170.12.137.*
O15 - Trusted IP range: http://170.12.143.*
O16 - DPF: {01113300-3E00-11D2-8470-0060089874ED} - https://activatemyfi...IOS/tgctlcm.cab
O16 - DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} (Office Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=58813
O16 - DPF: {0F026C11-5A66-4C2B-87B5-88DDEBAE72A1} - https://gandy.rjf.co...ls/vsflex8L.cab
O16 - DPF: {2982C76C-549D-11D3-AC89-0008C79AC0AD} - http://gandy.rjf.com...ols/turbweb.CAB
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} -
O16 - DPF: {3C4C243E-89CE-11D4-AD0A-00508B0AE258} - http://gandy.rjf.com.../acxPayroll.CAB
O16 - DPF: {88F3DCEE-3BE9-45A5-A70F-5E42ED61ACDB} - http://gandy.rjf.com...ls/RJUpdWeb.CAB
O16 - DPF: {897DF421-6987-11D2-9411-00C04F8E641F} - https://gandy.rjf.co...ls/RJDocDue.CAB
O16 - DPF: {A1B8A30B-8AAA-4A3E-8869-1DA509E8A011} - http://thornbill.rjf...tiveXViewer.cab
O16 - DPF: {B151B524-F451-4036-9663-B3944FA710DF} (ExecuteAgent2p Class) - http://rjf.ossid.net/ENUclientPro.cab
O16 - DPF: {B35483EE-1C99-11D2-940F-00C04F8E641F} - https://gandy.rjf.co...ols/RJMoney.CAB
O16 - DPF: {B5EB6904-5988-45B5-BFA2-95AE5BEFC579} - http://gandy.rjf.com...JCustomMenu.CAB
O16 - DPF: {CB9E9514-0499-40CE-AEEB-3706B570A1A6} - https://fletcher.rjf.../ImgControl.CAB
O16 - DPF: {D98B9AEA-2B6D-11D2-9411-00C04F8E641F} - https://gandy.rjf.co...rols/RJRank.CAB
O16 - DPF: {E5F5D008-DD2C-4D32-977D-1A0ADF03058B} - https://secureaccess...perSetupSP1.cab
O16 - DPF: {FFFFFFFF-CACE-BABE-BABE-00AA0055595A} - http://www.trueswitc...TrueInstall.exe
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\System32\CTsvcCDA.EXE
O23 - Service: Juniper Network Connect Service (dsNcService) - Juniper Networks - C:\Program Files\Juniper Networks\Common Files\dsNcService.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Netropa NHK Server (Nhksrv) - Unknown owner - C:\WINDOWS\Nhksrv.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Trend Micro Central Control Component (PcCtlCom) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~3\PcCtlCom.exe
O23 - Service: Trend Micro Real-time Service (Tmntsrv) - Trend Micro Incorporated. - C:\PROGRA~1\TRENDM~1\INTERN~3\Tmntsrv.exe
O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~3\tmproxy.exe

--
End of file - 8749 bytes
  • 0

Advertisements







Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP