Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

ePharmacist - Trojan virus [RESOLVED]


  • This topic is locked This topic is locked

#1
epharmacist

epharmacist

    Member

  • Member
  • PipPip
  • 52 posts
Logfile of HijackThis v1.99.1
Scan saved at 12:48:47 PM, on 7/15/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\msole32.exe
C:\WINDOWS\system32\shnlog.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\QuickTime\qttask.exe
C:\PROGRA~1\Sony\SONICS~1\SsAAD.exe
C:\PROGRA~1\AIM95\aim.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\hookdump.exe
C:\Corel\Graphics8\Programs\MFIndexer.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\Program Files\ewido\security suite\ewidoguard.exe
C:\WINDOWS\system32\intmon.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\System32\NMSSvc.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Common Files\Sony Shared\AVLib\SSScsiSV.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Documents and Settings\Candy\Desktop\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://www.oneclicks...earch.php?qq=%1
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.oneclicks...es.com/bar.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.oneclicks...earch.php?qq=%1
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://www.oneclicks...earch.php?qq=%1
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = http://www.oneclicks...earch.php?qq=%1
R1 - HKLM\Software\Microsoft\Internet Explorer\Search,Default_Search_URL = http://www.searchv.com/1/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Search,Default_Page_URL = http://www.searchv.com/1/
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://www.oneclicks...earch.php?qq=%1
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = http://www.oneclicksearches.com/
O1 - Hosts: 64.91.255.87 www.dcsresearch.com
O2 - BHO: VMHomepage Class - {FFFFFFFF-FFFF-FFFF-FFFF-FFFFFFFFFFFA} - C:\WINDOWS\system32\hpBF58.tmp
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [iTunesHelper] C:\Program Files\iTunes\iTunesHelper.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SsAAD.exe] C:\PROGRA~1\Sony\SONICS~1\SsAAD.exe
O4 - HKLM\..\Run: [RegSvr32] C:\WINDOWS\system32\msmsgs.exe
O4 - HKLM\..\Run: [intel32.exe] C:\WINDOWS\system32\intel32.exe
O4 - HKLM\..\Run: [PSGuard spyware remover] C:\Program Files\PSGuard\PSGuard.exe
O4 - HKCU\..\Run: [AIM] C:\PROGRA~1\AIM95\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [LDM] \Program\BackWeb-8876480.exe
O4 - HKCU\..\Run: [E6TaskPanel] "C:\Program Files\EarthLink TotalAccess\TaskPanl.exe" -winstart
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Intel system tool] C:\WINDOWS\system32\hookdump.exe
O4 - Global Startup: Corel MEDIA FOLDERS INDEXER 8.LNK = C:\Corel\Graphics8\Programs\MFIndexer.exe
O4 - Global Startup: Logitech Desktop Messenger.lnk.disabled
O4 - Global Startup: Microsoft Office.lnk.disabled
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0819.dll
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0819.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\PROGRA~1\AIM95\aim.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akama...meInstaller.exe
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: {FE0BD779-44EE-4A4B-AA2E-743C63F2E5E6} (IWinAmpActiveX Class) - http://pdl.stream.ao.../ampx_en_dl.cab
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
O20 - Winlogon Notify: PCANotify - C:\WINDOWS\SYSTEM32\PCANotify.dll
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido\security suite\ewidoguard.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: MSCSPTISRV - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\MSCSPTISRV.exe
O23 - Service: Intel® NMS (NMSSvc) - Intel Corporation - C:\WINDOWS\System32\NMSSvc.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: PACSPTISVR - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exe
O23 - Service: Pml Driver HPH11 - HP - C:\WINDOWS\System32\HPHipm11.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: SonicStage SCSI Service (SSScsiSV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SSScsiSV.exe
O23 - Service: System Startup Service (SvcProc) - Unknown owner - C:\WINDOWS\svcproc.exe (file missing)
  • 0

Advertisements


#2
Trevuren

Trevuren

    Old Dog

  • Retired Staff
  • 18,699 posts
Hi epharmacist and welcome to the Geeks to Go Forums.

My name is Trevuren and I will be helping you with your log.

1. If you haven't logged in go to Geeks to Go and do so. Then proceed to item a.

If you already have logged in, go directly to item a.

a. Click on My Controls at the top right hand corner of the window.
b. In the left hand column, click "View Topics"
c. If you click on the title of your post, you will be taken there

2. Also, while at the My Controls page, check the box to the right of your post and then scroll down.
.Where it says "unsubscribe" click the pull-down menu and select "immediate email notification"

3. Please DELETE your current HJT program from its present location.

4. Download and run the following HijackThis autoinstall program from Here HJT needs to be in its own folder so that the program itself isn't deleted by accident. Having the backups could be VITAL to restoring your system if something went wrong in the FIX process!

A. Close ALL windows except HJT

B. SCAN with HJT and SAVE LOG. (a notepad window will open with the log in it when you click Save Log) (Ctrl-A to'select all', Ctrl-C to 'copy')

C. POST the log in this thread using 'Add Reply' (Ctrl-V to 'paste')


DO NOT MAKE ANY CHANGES OR CLICK "FIX CHECKED" UNTIL WE CHECK THE LOG, AS MOST OF THE FILES ARE LEGIT AND VITAL TO THE FUNCTION OF YOUR COMPUTER


Regards,

Trevuren

  • 0

#3
epharmacist

epharmacist

    Member

  • Topic Starter
  • Member
  • PipPip
  • 52 posts
Help me Trev, you're my only hope....or else I wing it and start deleted stuff...

You ROCK, buddy!

Logfile of HijackThis v1.99.1
Scan saved at 2:30:55 PM, on 7/15/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\msole32.exe
C:\WINDOWS\system32\shnlog.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\QuickTime\qttask.exe
C:\PROGRA~1\Sony\SONICS~1\SsAAD.exe
C:\PROGRA~1\AIM95\aim.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\hookdump.exe
C:\Corel\Graphics8\Programs\MFIndexer.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\WINDOWS\system32\intmon.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\System32\NMSSvc.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Common Files\Sony Shared\AVLib\SSScsiSV.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\winlogon.exe
C:\Program Files\ewido\security suite\ewidoguard.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Hijackthis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://www.oneclicks...earch.php?qq=%1
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.oneclicks...es.com/bar.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.oneclicks...earch.php?qq=%1
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://www.oneclicks...earch.php?qq=%1
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = http://www.oneclicks...earch.php?qq=%1
R1 - HKLM\Software\Microsoft\Internet Explorer\Search,Default_Search_URL = http://www.searchv.com/1/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Search,Default_Page_URL = http://www.searchv.com/1/
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://www.oneclicks...earch.php?qq=%1
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = http://www.oneclicksearches.com/
O1 - Hosts: 64.91.255.87 www.dcsresearch.com
O2 - BHO: VMHomepage Class - {FFFFFFFF-FFFF-FFFF-FFFF-FFFFFFFFFFFA} - C:\WINDOWS\system32\hpBF58.tmp
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [iTunesHelper] C:\Program Files\iTunes\iTunesHelper.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SsAAD.exe] C:\PROGRA~1\Sony\SONICS~1\SsAAD.exe
O4 - HKLM\..\Run: [RegSvr32] C:\WINDOWS\system32\msmsgs.exe
O4 - HKLM\..\Run: [intel32.exe] C:\WINDOWS\system32\intel32.exe
O4 - HKLM\..\Run: [PSGuard spyware remover] C:\Program Files\PSGuard\PSGuard.exe
O4 - HKCU\..\Run: [AIM] C:\PROGRA~1\AIM95\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [LDM] \Program\BackWeb-8876480.exe
O4 - HKCU\..\Run: [E6TaskPanel] "C:\Program Files\EarthLink TotalAccess\TaskPanl.exe" -winstart
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Intel system tool] C:\WINDOWS\system32\hookdump.exe
O4 - Global Startup: Corel MEDIA FOLDERS INDEXER 8.LNK = C:\Corel\Graphics8\Programs\MFIndexer.exe
O4 - Global Startup: Logitech Desktop Messenger.lnk.disabled
O4 - Global Startup: Microsoft Office.lnk.disabled
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0819.dll
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0819.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\PROGRA~1\AIM95\aim.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akama...meInstaller.exe
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: {FE0BD779-44EE-4A4B-AA2E-743C63F2E5E6} (IWinAmpActiveX Class) - http://pdl.stream.ao.../ampx_en_dl.cab
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
O20 - Winlogon Notify: PCANotify - C:\WINDOWS\SYSTEM32\PCANotify.dll
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido\security suite\ewidoguard.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: MSCSPTISRV - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\MSCSPTISRV.exe
O23 - Service: Intel® NMS (NMSSvc) - Intel Corporation - C:\WINDOWS\System32\NMSSvc.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: PACSPTISVR - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exe
O23 - Service: Pml Driver HPH11 - HP - C:\WINDOWS\System32\HPHipm11.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: SonicStage SCSI Service (SSScsiSV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SSScsiSV.exe
O23 - Service: System Startup Service (SvcProc) - Unknown owner - C:\WINDOWS\svcproc.exe (file missing)
  • 0

#4
Trevuren

Trevuren

    Old Dog

  • Retired Staff
  • 18,699 posts
1. You have a CoolWebSearch infection.

Download CWShredder here to its own folder.

Update CWShredder

* Open CWShredder and click I AGREE
* Click Check For Update
* Close CWShredder


2. Boot into Safe Mode:
Restart your computer and as soon as it starts booting up again continuously tap F8. A menu should come up where you will be given the option to enter Safe Mode.

3. Now run CWShredder. Click I Agree, then Fix and then Next, let it fix everything it asks about.

4. Reboot your computer into normal windows.

5. Finally, run HijackThis, click SCAN, produce a LOG and POST it in this thread for review.

Regards,

Trevuren

  • 0

#5
epharmacist

epharmacist

    Member

  • Topic Starter
  • Member
  • PipPip
  • 52 posts
Trev,

"Not present" was the consensus for all the the searches. 0 infections. CWShredder is not the answer. I also ran it earlier without any luck.

What next? Holla back...
  • 0

#6
Trevuren

Trevuren

    Old Dog

  • Retired Staff
  • 18,699 posts
Download smitRem.zip and save the file to your desktop.
Right click on the file and extract it to it's own folder on the desktop.

Place a shortcut to Panda ActiveScan on your desktop.

Please download the trial version of Ewido Security Suite here:
http://www.ewido.net/en/download/

Please read Ewido Setup Instructions
Install it, and update the definitions to the newest files. Do NOT run a scan yet.

If you have not already installed Ad-Aware SE 1.06, follow these download and setup instructions, otherwise, check for updates:
Ad-Aware SE Setup
Don't run it yet!

Next, please reboot your computer in SafeMode by doing the following:
  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, press F8.
  • Instead of Windows loading as normal, a menu should appear
  • Select the first option, to run Windows in Safe Mode.
Now scan with HJT and place a checkmark next to each of the following items:

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://www.oneclicks...earch.php?qq=%1
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.oneclicks...es.com/bar.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.oneclicks...earch.php?qq=%1
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://www.oneclicks...earch.php?qq=%1
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = http://www.oneclicks...earch.php?qq=%1
R1 - HKLM\Software\Microsoft\Internet Explorer\Search,Default_Search_URL = http://www.searchv.com/1/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Search,Default_Page_URL = http://www.searchv.com/1/
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://www.oneclicks...earch.php?qq=%1
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = http://www.oneclicksearches.com/
O1 - Hosts: 64.91.255.87 www.dcsresearch.com
O2 - BHO: VMHomepage Class - {FFFFFFFF-FFFF-FFFF-FFFF-FFFFFFFFFFFA} - C:\WINDOWS\system32\hpBF58.tmp
O4 - HKLM\..\Run: [RegSvr32] C:\WINDOWS\system32\msmsgs.exe
O4 - HKLM\..\Run: [intel32.exe] C:\WINDOWS\system32\intel32.exe
O4 - HKLM\..\Run: [PSGuard spyware remover] C:\Program Files\PSGuard\PSGuard.exe
O4 - HKCU\..\Run: [Intel system tool] C:\WINDOWS\system32\hookdump.exe
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akama...meInstaller.exe
O16 - DPF: {FE0BD779-44EE-4A4B-AA2E-743C63F2E5E6} (IWinAmpActiveX Class) - http://pdl.stream.ao.../ampx_en_dl.cab
O23 - Service: System Startup Service (SvcProc) - Unknown owner - C:\WINDOWS\svcproc.exe (file missing)



Using Windows Explorer, please locate and DELETE the following files/folders (with all their content), if they are still present:

C:\WINDOWS\svcproc.exe

Open the smitRem folder, then double click the RunThis.bat file to start the tool. Follow the prompts on screen.
Wait for the tool to complete and disk cleanup to finish.

The tool will create a log named smitfiles.txt in the root of your drive, eg; Local Disk C: or partition where your operating system is installed. Please post that log along with all others requested in your next reply.

*Open Ad-aware and do a full scan. Remove all it finds.


*Run Ewido:
  • Click on scanner
  • Click on Complete System Scan and the scan will begin.
  • NOTE: During some scans with ewido it is finding cases of false positives.
  • You will need to step through the process of cleaning files one-by-one.
  • If ewido detects a file you KNOW to be legitimate, select none as the action.
  • DO NOT select "Perform action on all infections"
  • If you are unsure of any entry found select none for now.
  • When the scan is finished, click the Save report button at the bottom of the screen.
  • Save the report to your desktop
Close Ewido

Next go to Control Panel click Display > Desktop > Customize Desktop > Web > Uncheck "Security Info" if present.

Reboot back into Windows and click the Panda ActiveScan shortcut, then do a full system scan. Make sure the autoclean box is checked!
Save the scan log and post it along with a new HijackThis Log, the contents of the smitfiles.txt log and the Ewido Log by using Add Reply.
Let us know if any problems persist

Regards,

Trevuren

  • 0

#7
epharmacist

epharmacist

    Member

  • Topic Starter
  • Member
  • PipPip
  • 52 posts
Still working on it...

FYI - The onesearch homepage is jacking my ability to download PandaActiveScan. Every time I try to link Panda, it launches onesearch homepage.

Errrrr...
  • 0

#8
epharmacist

epharmacist

    Member

  • Topic Starter
  • Member
  • PipPip
  • 52 posts
Found SVCPROC.EXE-1C37B2EB.pf in C:/WINDOWS/Prefetch

deleted file

Still working on it...
  • 0

#9
epharmacist

epharmacist

    Member

  • Topic Starter
  • Member
  • PipPip
  • 52 posts
Okay, I'm back with the results....

PANDA ActiveScan


Incident Status Location

Adware:adware/delfinmedia No disinfected C:\PROGRAM FILES\COMMON FILES\remove_tools.html
Adware:adware/iedriver No disinfected C:\WINDOWS\SYSTEM32\sub.dll
Spyware:spyware/bargainbuddy No disinfected C:\WINDOWS\launcher.exe
Adware:adware/psguard No disinfected HKEY_CLASSES_ROOT\CLSID\{357A87ED-3E5D-437D-B334-DEB7EB4982A3}
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\file\1.0\SecurityClassLoader.class-2c965182-793ebc78.class
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\file\1.0\SecurityClassLoader.class-e9044dc-4b4303e5.class
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\a.jar-6bb41746-490b35ee.zip[a.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\a.jar-6bb41746-490b35ee.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\a.jar-6bb41746-490b35ee.zip[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\ar.jar-421208e8-7a30019a.zip[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\ar.jar-421208e8-7a30019a.zip[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\ar.jar-421208e8-7a30019a.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\ar.jar-421208e8-7a30019a.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\ar3.jar-6198e311-48190391.zip[Gummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\ar3.jar-6198e311-48190391.zip[Counter.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\ar3.jar-6198e311-48190391.zip[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\arc.zip-1946ff78-484e2797.zip[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\arc.zip-1946ff78-484e2797.zip[Counter.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\arc.zip-1946ff78-484e2797.zip[Gummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\arc.zip-1946ff78-484e2797.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\arc.zip-1946ff78-484e2797.zip[Worker.class]
Virus:Trojan Horse Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\arc.zip-1946ff78-484e2797.zip[web.exe]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\arch10213.jar-71d8e3fb-4c3c6f77.zip[RunString.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\arch10213.jar-71d8e3fb-4c3c6f77.zip[Parser.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\arch10213.jar-71d8e3fb-4c3c6f77.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\arch10213.jar-71d8e3fb-4c3c6f77.zip[Colors.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\archive.jar-20d8188b-6e90905d.zip[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\archive.jar-20d8188b-6e90905d.zip[VB.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\archive.jar-20d8188b-6e90905d.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\archive.jar-20d8188b-6e90905d.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\archive.jar-2a293579-684d76c2.zip[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\archive.jar-2a293579-684d76c2.zip[VB.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\archive.jar-2a293579-684d76c2.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\archive.jar-2a293579-684d76c2.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\archive.jar-7df7788-1cf42357.zip[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\archive.jar-7df7788-1cf42357.zip[VB.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\archive.jar-7df7788-1cf42357.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\archive.jar-7df7788-1cf42357.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-10ffa0b5-6dd947c4.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-10ffa0b5-6dd947c4.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-10ffa0b5-6dd947c4.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-10ffa0b5-6dd947c4.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-10ffa0b5-7dced75e.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-10ffa0b5-7dced75e.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-10ffa0b5-7dced75e.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-10ffa0b5-7dced75e.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-11faa9ed-2fa574e4.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-11faa9ed-2fa574e4.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-11faa9ed-2fa574e4.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-11faa9ed-2fa574e4.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-11faa9ed-31214118.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-11faa9ed-31214118.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-11faa9ed-31214118.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-11faa9ed-31214118.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-11faa9ed-566bad5c.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-11faa9ed-566bad5c.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-11faa9ed-566bad5c.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-11faa9ed-566bad5c.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-19959b30-1b71c9d2.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-19959b30-1b71c9d2.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-19959b30-1b71c9d2.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-19959b30-1b71c9d2.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-1e6596a3-26de39a5.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-1e6596a3-26de39a5.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-1e6596a3-26de39a5.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-1e6596a3-26de39a5.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-1f5b6b54-1ae951f7.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-1f5b6b54-1ae951f7.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-1f5b6b54-1ae951f7.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-1f5b6b54-1ae951f7.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-1f8050ce-74dbbbb9.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-1f8050ce-74dbbbb9.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-1f8050ce-74dbbbb9.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-1f8050ce-74dbbbb9.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-20689eb7-1859df99.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-20689eb7-1859df99.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-20689eb7-1859df99.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-20689eb7-1859df99.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-25c13e55-29184251.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-25c13e55-29184251.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-25c13e55-29184251.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-25c13e55-29184251.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-2dd0698-42358332.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-2dd0698-42358332.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-2dd0698-42358332.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-2dd0698-42358332.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-381cf4ac-7004080d.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-381cf4ac-7004080d.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-381cf4ac-7004080d.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-381cf4ac-7004080d.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-3985cec3-66de8822.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-3985cec3-66de8822.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-3985cec3-66de8822.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-3985cec3-66de8822.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-3fe32157-17a10aff.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-3fe32157-17a10aff.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-3fe32157-17a10aff.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-3fe32157-17a10aff.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-6a0f8d6d-3b4c3020.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-6a0f8d6d-3b4c3020.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-6a0f8d6d-3b4c3020.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-6a0f8d6d-3b4c3020.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-6eb5383c-6bc2f918.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-6eb5383c-6bc2f918.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-6eb5383c-6bc2f918.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-6eb5383c-6bc2f918.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-77bfce81-624622cb.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-77bfce81-624622cb.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-77bfce81-624622cb.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-77bfce81-624622cb.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-7d9192de-7e09ef0c.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-7d9192de-7e09ef0c.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-7d9192de-7e09ef0c.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-7d9192de-7e09ef0c.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-7eb4d059-74fea31f.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-7eb4d059-74fea31f.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-7eb4d059-74fea31f.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-7eb4d059-74fea31f.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-d350ec1-59d794b0.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-d350ec1-59d794b0.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-d350ec1-59d794b0.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-d350ec1-59d794b0.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-d35111a-4c209197.zip[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-d35111a-4c209197.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-d35111a-4c209197.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\classload.jar-d35111a-4c209197.zip[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-13dd95a5-2ec71fff.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-13dd95a5-2ec71fff.zip[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-13dd95a5-2ec71fff.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-13dd95a5-2ec71fff.zip[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-5980bc51-29b9ddee.zip[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-5980bc51-29b9ddee.zip[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-5980bc51-29b9ddee.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-5980bc51-29b9ddee.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-5980c178-3b969f4a.zip[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-5980c178-3b969f4a.zip[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-5980c178-3b969f4a.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-5980c178-3b969f4a.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-5da14268-6422901a.zip[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-5da14268-6422901a.zip[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-5da14268-6422901a.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-5da14268-6422901a.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-6a9ceb90-1cdd34f4.zip[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-6a9ceb90-1cdd34f4.zip[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-6a9ceb90-1cdd34f4.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count.jar-6a9ceb90-1cdd34f4.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\count1.jar-5e1a96b1-5ca4d7be.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\counter.jar-7271642a-7d9629d0.zip[counter.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\counter.jar-7271642a-7d9629d0.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\counter.jar-7271642a-7d9629d0.zip[VerifierBug.class]
Virus:Trojan Horse Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\counter.jar-7271642a-7d9629d0.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\demo.jar-30f1f1ac-39f724ee.zip[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\demo.jar-30f1f1ac-39f724ee.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\demo.jar-30f1f1ac-39f724ee.zip[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\demo.jar-30f1f1ac-39f724ee.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\demo.jar-65faee52-39d7a75f.zip[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\demo.jar-65faee52-39d7a75f.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\demo.jar-65faee52-39d7a75f.zip[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\demo.jar-65faee52-39d7a75f.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\loaderadv438.jar-1bf36541-23771654.zip[Counter.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\loaderadv438.jar-1bf36541-23771654.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\loaderadv438.jar-1bf36541-23771654.zip[Matrix.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\loaderadv438.jar-1bf36541-23771654.zip[Parser.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\loaderadv677.jar-7a458b9e-797d2e66.zip[Matrix.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\loaderadv677.jar-7a458b9e-797d2e66.zip[Counter.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\loaderadv677.jar-7a458b9e-797d2e66.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\loaderadv677.jar-7a458b9e-797d2e66.zip[Parser.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\loaderadv89.jar-190666b1-41088162.zip[Counter.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\loaderadv89.jar-190666b1-41088162.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\loaderadv89.jar-190666b1-41088162.zip[Matrix.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\loaderadv89.jar-190666b1-41088162.zip[Parser.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\playup_ren_test.jar-5adf3ef1-6e30a978.zip[Bubble.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\playup_ren_test.jar-5adf3ef1-6e30a978.zip[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\playup_ren_test.jar-5adf3ef1-6e30a978.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\playup_ren_test.jar-5adf3ef1-6e30a978.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\plugin.jar-29bfee88-5eeeca3b.zip[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\plugin.jar-29bfee88-5eeeca3b.zip[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\Matthew Bryant\.jpi_cache\jar\1.0\plugin.jar-29bfee88-5eeeca3b.zip[Dummy.class]
Spyware:Spyware/New.net No disinfected C:\My Downloads\newnet.exe
Possible Virus. No disinfected C:\Program Files\2Wire\sy_apps\dllupdate.exe
Adware:Adware/DelFinMedia No disinfected C:\Program Files\Common Files\remove_tools.html
Possible Virus. No disinfected C:\Program Files\TDS3\dcsres.exe
hijackthislog

Logfile of HijackThis v1.99.1
Scan saved at 9:16:15 AM, on 7/19/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Common Files\Sony Shared\AVLib\SSScsiSV.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wscntfy.exe
C:\Prog
  • 0

#10
epharmacist

epharmacist

    Member

  • Topic Starter
  • Member
  • PipPip
  • 52 posts
It cutoff my reply...here are the other logs...

hijackthis

Logfile of HijackThis v1.99.1
Scan saved at 9:16:15 AM, on 7/19/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Common Files\Sony Shared\AVLib\SSScsiSV.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\QuickTime\qttask.exe
C:\PROGRA~1\Sony\SONICS~1\SsAAD.exe
C:\PROGRA~1\AIM95\aim.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Corel\Graphics8\Programs\MFIndexer.exe
C:\Program Files\ewido\security suite\ewidoguard.exe
C:\Program Files\Hijackthis\HijackThis.exe

O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [iTunesHelper] C:\Program Files\iTunes\iTunesHelper.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SsAAD.exe] C:\PROGRA~1\Sony\SONICS~1\SsAAD.exe
O4 - HKCU\..\Run: [AIM] C:\PROGRA~1\AIM95\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [LDM] \Program\BackWeb-8876480.exe
O4 - HKCU\..\Run: [E6TaskPanel] "C:\Program Files\EarthLink TotalAccess\TaskPanl.exe" -winstart
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Global Startup: Corel MEDIA FOLDERS INDEXER 8.LNK = C:\Corel\Graphics8\Programs\MFIndexer.exe
O4 - Global Startup: Logitech Desktop Messenger.lnk.disabled
O4 - Global Startup: Microsoft Office.lnk.disabled
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0819.dll
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0819.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\PROGRA~1\AIM95\aim.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoft.../as5/asinst.cab
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
O20 - Winlogon Notify: PCANotify - C:\WINDOWS\SYSTEM32\PCANotify.dll
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido\security suite\ewidoguard.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: MSCSPTISRV - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\MSCSPTISRV.exe
O23 - Service: Intel® NMS (NMSSvc) - Intel Corporation - C:\WINDOWS\System32\NMSSvc.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: PACSPTISVR - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exe
O23 - Service: Pml Driver HPH11 - HP - C:\WINDOWS\System32\HPHipm11.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: SonicStage SCSI Service (SSScsiSV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SSScsiSV.exe
O23 - Service: System Startup Service (SvcProc) - Unknown owner - C:\WINDOWS\svcproc.exe (file missing)

Smitfiles


Pre-run Files Present


~~~ Program Files ~~~

AntiVirusGold


~~~ Shortcuts ~~~



~~~ Favorites ~~~



~~~ system32 folder ~~~

oleadm.dll
wp.bmp
hookdump.exe
ole32vbs.exe
msole32.exe
hp***.tmp
shnlog.exe
intmon.exe
hhk.dll
logfiles


~~~ Windows directory ~~~

screen.html
sites.ini


~~~ Drive root ~~~

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Post-run Files Present


~~~ Program Files ~~~



~~~ Shortcuts ~~~



~~~ Favorites ~~~



~~~ system32 folder ~~~

oleadm.dll


~~~ Windows directory ~~~



~~~ Drive root ~~~



~~~ Wininet.dll ~~~

wininet.dll INFECTED!! Starting replacement procedure.

~~~ Replaced wininet.dll from KB890923\SP2QFE ~~~



~~~ Upon reboot ~~~

wininet.old present!
oleadm.dll present!


~~~ Upon completion ~~~

wininet.old not present!
oleadm.dll not present!


---------------------------------------------------------
ewido security suite - Scan report
---------------------------------------------------------

+ Created on: 6:28:51 PM, 7/15/2005
+ Report-Checksum: 1C02604B

+ Scan result:

C:\Program Files\Hijackthis\backups\backup-20050715-162702-990.dll -> Trojan.Puper.m : Cleaned with backup


::Report End

:tazz: I hope we got 'em....let me know...
  • 0

Advertisements


#11
Trevuren

Trevuren

    Old Dog

  • Retired Staff
  • 18,699 posts
1. Locate and DELETE the following files:

C:\PROGRAM FILES\COMMON FILES\remove_tools.html
C:\WINDOWS\SYSTEM32\sub.dll
C:\WINDOWS\launcher.exe
C:\My Downloads\newnet.exe
C:\Program Files\2Wire<===Folder and all its content.


2.We want to stop, disable and delete an added service (023)

A. To stop a service and set to 'disabled'
  • Go to Start > Run and type in Services.msc then click OK
  • Click the Extended tab.
  • Scroll down until you find the service.
    ===>Service: System Startup Service (SvcProc)
  • Click once on the service to highlight it.
  • Click Stop
  • Right-Click on the service.
  • Click on 'Properties'
  • Select the 'General' tab
  • Click the Arrow-down tab on the right-hand side on the 'Start-up Type' box
  • From the drop-down menu, click on 'Disabled'
  • Click the 'Apply' tab, then click 'OK'
The service is now stopped and disabled.


B. We will now delete the service:

1. Open HJT
2. Click on Config>>Misc Tools>>Delete an NT Service
3. Type SvcProc in the space provided and click OK
4. The program will ask you to REBOOT --- Accept
5. REBOOT into SAFE MODE
6. Using Windows Explorer, locate and DELETE the following file (if it still is present):
C:\WINDOWS\svcproc.exe
7. REBOOT back into Normal Mode
8. Finally, run HijackThis, click SCAN, produce a LOG and POST it in this thread for review.

Regards,

Trevuren

  • 0

#12
epharmacist

epharmacist

    Member

  • Topic Starter
  • Member
  • PipPip
  • 52 posts
Trev,

Before I delete the 2WIRE folder, you ought to know that this is my modem.

I have a 2WIRE modem from YAHOO DSL....without it, I'm afraid I may not be able to go online.

What do you think???

~epharm...
  • 0

#13
Trevuren

Trevuren

    Old Dog

  • Retired Staff
  • 18,699 posts
I think we had better add it to our database. PLEASE do not touch anything
that pertains to your modem. :tazz:


Trevuren
  • 0

#14
epharmacist

epharmacist

    Member

  • Topic Starter
  • Member
  • PipPip
  • 52 posts
Should I still delete the other files you recommended?
  • 0

#15
Trevuren

Trevuren

    Old Dog

  • Retired Staff
  • 18,699 posts
Yes


Trevuren
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP