Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

computer illiterate! [CLOSED]


  • This topic is locked This topic is locked

#1
conradkath

conradkath

    New Member

  • Member
  • Pip
  • 1 posts
I have Sbc yahoo online protection. The anti virus software indicated that I have 21 infected files. But they were not cleaned, deleted or quatentined. I do not have a clue what to do. I followed all your guidlines and nothing was determined on your scans. so here is the Hijack this log and below it the anti-virus log. I am totally computer illiterate so you will have to really help me on this one. The people at SBC do not have a clue....They are reading from a manual!

Thanks!!

Logfile of HijackThis v1.99.1
Scan saved at 9:22:45 AM, on 6/24/05
Platform: Windows 98 SE (Win9x 4.10.2222A)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\PROGRAM FILES\YAHOO!\ANTIVIRUS\ISAFE.EXE
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\SYSTEM\SYSTRAY.EXE
C:\WINDOWS\TASKMON.EXE
C:\WINDOWS\SYSTEM32\DRIVERS\KODAKCCS.EXE
C:\WINDOWS\SYSTEM\STIMON.EXE
C:\PROGRAM FILES\COMMON FILES\REAL\UPDATE_OB\REALSCHED.EXE
C:\WINDOWS\SYSTEM\QTTASK.EXE
C:\PROGRAM FILES\YAHOO!\ANTIVIRUS\VETMSG.EXE
C:\PROGRAM FILES\YAHOO!\ANTIVIRUS\CAVTRAY.EXE
C:\PROGRAM FILES\YAHOO!\ANTIVIRUS\CAVRID.EXE
C:\WINDOWS\SYSTEM\LEXBCES.EXE
C:\PROGRAM FILES\YAHOO!\YOP\YOP.EXE
C:\PROGRAM FILES\SBC YAHOO!\CONNECTION MANAGER\IP INSIGHT\IPMON32.EXE
C:\PROGRAM FILES\2WIRE\2PORTALMON.EXE
C:\WINDOWS\SYSTEM\RPCSS.EXE
C:\PROGRAM FILES\MEDIASCAPE\ONE-TOUCH MULTIMEDIA KEYBOARD\KEYBDMGR.EXE
C:\PROGRAM FILES\MEDIASCAPE\ONE-TOUCH MULTIMEDIA KEYBOARD\MMKEYBD.EXE
C:\PROGRAM FILES\YAHOO!\BROWSER\YBRWICON.EXE
C:\WINDOWS\RunDLL.exe
C:\PROGRA~1\MEDIAS~1\ONSCRE~1\OSD.EXE
C:\PROGRAM FILES\POPUPWALL\POPUPWALL.EXE
C:\WINDOWS\SYSTEM\WMIEXE.EXE
C:\WINDOWS\SYSTEM\LEXPPS.EXE
C:\PROGRAM FILES\KODAK\KODAK EASYSHARE SOFTWARE\BIN\EASYSHARE.EXE
C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\MEDIA MANAGER\AIRSVCU.EXE
C:\PROGRAM FILES\YAHOO!\MESSENGER\YMSGR_TRAY.EXE
C:\PROGRAM FILES\YAHOO!\BROWSER\YCOMMON.EXE
C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
C:\WINDOWS\TEMPORARY INTERNET FILES\CONTENT.IE5\4HI7GLUV\HIJACKTHIS[1].EXE

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapp.../search/ie.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://red.clientapp...//www.yahoo.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://yahoo.sbc.com/dsl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://yahoo.sbc.com/dsl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://red.clientapp...//www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapp.../search/ie.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://red.clientapp...//www.yahoo.com
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://yahoo.sbc.com/dsl
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://red.clientapp...//www.yahoo.com
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
F1 - win.ini: load=c:\progra~1\hpoffi~1\register\remind.exe
O1 - Hosts: 64.91.255.87 www.dcsresearch.com
O2 - BHO: Yahoo! Companion BHO - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\PROGRAM FILES\YAHOO!\COMPANION\INSTALLS\CPN1\YCOMP5_6_0_0.DLL
O2 - BHO: WinStat - {EE02B99B-1D55-48bc-B8DB-649A42CE45F6} - C:\WINDOWS\SYSTEM\WINSTAT12.DLL
O3 - Toolbar: Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRAM FILES\YAHOO!\COMPANION\INSTALLS\CPN1\YCOMP5_6_0_0.DLL
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
O4 - HKLM\..\Run: [AtiCwd32] Aticwd32.exe
O4 - HKLM\..\Run: [ScanRegistry] C:\WINDOWS\scanregw.exe /autorun
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [TaskMonitor] C:\WINDOWS\taskmon.exe
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [YPC] C:\PROGRA~1\YAHOO!\PARENT~1\ypc.exe
O4 - HKLM\..\Run: [KodakCCS] C:\WINDOWS\System32\Drivers\KodakCCS.exe
O4 - HKLM\..\Run: [StillImageMonitor] C:\WINDOWS\SYSTEM\STIMON.EXE
O4 - HKLM\..\Run: [mdac_runonce] C:\WINDOWS\SYSTEM\runonce.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [QuickTime Task] "C:\WINDOWS\SYSTEM\QTTASK.EXE" -atboottime
O4 - HKLM\..\Run: [LexStart] lexstart.exe
O4 - HKLM\..\Run: [VetAlert] C:\PROGRA~1\YAHOO!\ANTIVI~1\VETMSG.EXE
O4 - HKLM\..\Run: [CaAvTray] "C:\Program Files\Yahoo!\Antivirus\CAVTray.exe"
O4 - HKLM\..\Run: [CAVRID] "C:\Program Files\Yahoo!\Antivirus\CAVRID.exe"
O4 - HKLM\..\Run: [YOP] C:\PROGRA~1\YAHOO!\YOP\yop.exe /autostart
O4 - HKLM\..\Run: [IPInSightMonitor 01] "C:\PROGRAM FILES\SBC YAHOO!\CONNECTION MANAGER\IP INSIGHT\IPMon32.exe"
O4 - HKLM\..\Run: [2wSysTray] C:\PROGRAM FILES\2WIRE\2PORTALMON.EXE
O4 - HKLM\..\Run: [BillMinder] C:\QUICKENW\BILLMIND.EXE
O4 - HKLM\..\Run: [Keyboard Manager] C:\Program Files\Mediascape\One-touch Multimedia Keyboard\KeybdMgr.exe
O4 - HKLM\..\Run: [YBrowser] C:\Program Files\Yahoo!\browser\ybrwicon.exe
O4 - HKLM\..\RunServices: [SchedulingAgent] mstask.exe
O4 - HKLM\..\RunServices: [CAISafe] C:\Program Files\Yahoo!\Antivirus\ISafe.exe
O4 - HKCU\..\Run: [Taskbar Display Controls] RunDLL deskcp16.dll,QUICKRES_RUNDLLENTRY
O4 - HKCU\..\Run: [Yahoo! Pager] C:\PROGRAM FILES\YAHOO!\MESSENGER\ypager.exe -quiet
O4 - HKCU\..\Run: [SpyWareWall] C:\PROGRA~1\SPYWAR~1\SpyWareWall.exe
O4 - Startup: popupwall.lnk = C:\Program Files\PopUpWall\PopUpWall.exe
O4 - Startup: HP OfficeJet Series 600 StartUp.lnk = C:\Program Files\HP OfficeJet Series 600\bin\HPOstart.exe
O4 - Startup: Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
O4 - Startup: Media Manager Indexer.lnk = C:\Program Files\Common Files\Microsoft Shared\Media Manager\AIRSVCU.EXE
O4 - Startup: Introducing Media Manager.lnk = C:\Program Files\Common Files\Microsoft Shared\Media Manager\SPLASHA.EXE
O4 - Startup: Reminder-hpc40601.lnk = C:\HP\Support\sc\hpinfo.exe
O8 - Extra context menu item: Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
O8 - Extra context menu item: Yahoo! Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
O15 - Trusted Zone: http://www.neededware.com
O16 - DPF: {D18F962A-3722-4B59-B08D-28BB9EB2281E} (PhotosCtrl Class) - http://photos.yahoo....plorer1_9us.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: NDWCab - http://www.neededware.com/ndw3.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\common\yinsthelper.dll
O16 - DPF: {231B1C6E-F934-42A2-92B6-C2FEFEC24276} (yucsetreg Class) - C:\Program Files\Yahoo!\common\yucconfig.dll

anti-virus log.....

Started scanning at 6/20/05 10:31:57 AM. Engine Ver: 11.7.0. Sig Ver:9215. Sig Date: 6/20/05.
C:\WINDOWS\WIN386.SWP - scan failed.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/DrTemp/mm_reco.exe> - Win32.BettInet trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/DrTemp/thnall1b.exe> - Win32.BettInet trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/DrTemp/wupdsnff.exe> - Win32.BettInet trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/suicidetb.exe> - Win32.SillyDl.EW trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI1370.TMP/btgrab.cab> - Win32.SillyDl.CS!CAB trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <BTGrab.dll> - Win32.BettInet trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <polall1b.exe> - Win32.SillyDl.CS trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI1370.TMP/BTGrab.dll> - Win32.BettInet trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI1370.TMP/polall1b.exe> - Win32.SillyDl.CS trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI30DC.TMP/wupdt.exe> - Win32.Imiserv.I trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI6198.TMP/farmmext.cab> - Win32.SillyDl.DG!CAB trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <farmmext.exe> - Win32.SillyDl.DG trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI6198.TMP/farmmext.exe> - Win32.SillyDl.DG trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI6309.TMP/farmmext.cab> - Win32.SillyDl.DG!CAB trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <farmmext.exe> - Win32.SillyDl.DG trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI6309.TMP/farmmext.exe> - Win32.SillyDl.DG trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI72B.TMP/zserv.cab> - Win32.BettInet!CAB trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <ZServ.dll> - Win32.BettInet trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI72B.TMP/ZServ.dll> - Win32.BettInet trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/Program Files/Yahoo!/YPSR/Quarantine/ppqF052.TMP> - Win32.Imiserv.I trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/Program Files/Yahoo!/YPSR/Quarantine/ppq42E0.TMP> - Win32.Imiserv.C trojan.
C:\WINDOWS\SYSTEM\epx30105.exe - Win32.Lastad.G trojan. Deleted.
Finished scanning at 6/20/05 11:31:09 AM.

Started scanning at 6/20/05 1:01:33 PM. Engine Ver: 11.7.0. Sig Ver:9215. Sig Date: 6/20/05.
Finished scanning at 6/20/05 1:04:23 PM.

Started scanning at 6/20/05 1:00:26 PM. Engine Ver: 11.7.0. Sig Ver:9215. Sig Date: 6/20/05.
C:\WINDOWS\WIN386.SWP - scan failed.
Finished scanning at 6/20/05 1:06:18 PM.

Started scanning at 6/24/05 7:45:24 AM. Engine Ver: 11.9.1. Sig Ver:9225. Sig Date: 6/24/05.
Finished scanning at 6/24/05 7:48:04 AM.

Started scanning at 6/24/05 8:32:14 AM. Engine Ver: 11.9.1. Sig Ver:9225. Sig Date: 6/24/05.
C:\WINDOWS\WIN386.SWP - scan failed.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/DrTemp/mm_reco.exe> - Win32.BettInet trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/DrTemp/thnall1b.exe> - Win32.BettInet trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/DrTemp/wupdsnff.exe> - Win32.BettInet trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/suicidetb.exe> - Win32.SillyDl.EW trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI1370.TMP/btgrab.cab> - Win32.SillyDl.CS!CAB trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <BTGrab.dll> - Win32.BettInet trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <polall1b.exe> - Win32.SillyDl.CS trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI1370.TMP/BTGrab.dll> - Win32.BettInet trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI1370.TMP/polall1b.exe> - Win32.SillyDl.CS trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI30DC.TMP/wupdt.exe> - Win32.Imiserv.I trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI6198.TMP/farmmext.cab> - Win32.SillyDl.DG!CAB trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <farmmext.exe> - Win32.SillyDl.DG trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI6198.TMP/farmmext.exe> - Win32.SillyDl.DG trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI6309.TMP/farmmext.cab> - Win32.SillyDl.DG!CAB trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <farmmext.exe> - Win32.SillyDl.DG trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI6309.TMP/farmmext.exe> - Win32.SillyDl.DG trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI72B.TMP/zserv.cab> - Win32.BettInet!CAB trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <ZServ.dll> - Win32.BettInet trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/WINDOWS/TEMP/THI72B.TMP/ZServ.dll> - Win32.BettInet trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/Program Files/Yahoo!/YPSR/Quarantine/ppqF052.TMP> - Win32.Imiserv.I trojan.
C:\WINDOWS\Application Data\Business Logic\UWC\Backup\J38389.7070079861.WCU <C:/Program Files/Yahoo!/YPSR/Quarantine/ppq42E0.TMP> - Win32.Imiserv.C trojan.
Finished scanning at 6/24/05 8:40:08 AM.
  • 0

Advertisements


#2
Kristy

Kristy

    Visiting Consultant

  • Member
  • PipPipPipPip
  • 1,099 posts
Hello and welcome to Geeks To Go.

Lets start out with some general scans and see if we cant clean things up a little.

+++++ Step 1 +++++

Please download ewido security suite it is a trial version of the program.
  • Install ewido security suite
  • When installing, under "Additional Options" uncheck "Install background guard" and "Install scan via context menu".
  • Launch ewido, there should be an icon on your desktop double-click it.
  • The program will now go to the main screen
You will need to update ewido to the latest definition files.
  • On the left hand side of the main screen click update
  • Then click on Start Update
The update will start and a progress bar will show the updates being installed.
If you are having problems with the updater, you can use this link to manually update ewido.
ewido manual updates

Once the updates are installed do the following:
  • Click on scanner
  • Click on Complete System Scan and the scan will begin.
  • While the scan is in progress you will be prompted to clean files, click OK
  • When it asks if you want to clean the first file, put a check in the lower left corner of the box that says "Perform action on all infections" then choose clean and click OK.
  • Once the scan has completed, there will be a button located on the bottom of the screen named Save report
  • Click Save report.
  • Save the report .txt file to your desktop.
Now close ewido security suite.

+++++ Step 2 +++++

Please run an on-line virus scan at Kaspersky OnLine Scan or if that doesnt work, you can use TrendMicro or BitDefender. (Please post the results of the scan(s) in your next reply)

+++++ Step 3 +++++

Update HiJackThis
  • Open HiJackThis
  • Click Open the Misc Tools Section
  • Click Check for update online
+++++ Step 4 +++++

After that, I will need to see two different logs from HiJackThis. The first is the normal log like you posted here. To get the other one, follow these directions.

Open HijackThis, click Config, click Misc Tools
Click "Open Uninstall Manager"
Click "Save List" (generates uninstall_list.txt)
Click Save, copy and paste the results in your next post.

Post back with those logs and we can continue from there.

If you have recieved help elsewhere or no longer need our assistance, please let us know.

~Kristy
  • 0

#3
Kristy

Kristy

    Visiting Consultant

  • Member
  • PipPipPipPip
  • 1,099 posts
Due to lack of feedback, this topic has been closed.

If you need this topic reopened, please contact a staff member. This applies only to the original topic starter. Everyone else please begin a New Topic.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP