Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

Adware/NaviPromo, msclock32.dll


  • Please log in to reply

#1
petris54

petris54

    New Member

  • Member
  • Pip
  • 1 posts
Hi there,
I've had problems with my computer for a couple of months but I've been able to solve them by following advise from your great site (Thank you so much!). However this time I've tried most things and still can't get rid of the problem so it's time I seek help. Here it goes:

I start the computer and when Panda get's going there is a box saying it's disinfecting a Spyware (Adware/NaviPromo) and that I should restart the computer. When I do this the same box pops up again. The thing is that when I ignore the box and continue working nothing works, however, if I "disable" panda before the box pops up the first time the computer works perfectly fine! Oh and Explorer seems to be hit by this espescially but Navigator works fine. :tazz:

I'd be so greatful if you could help me!

Please see below for HijackThis log, Active scan log and Ewido Scan log:

Logfile of HijackThis v1.99.1
Scan saved at 10:01:58, on 2005-07-21
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\Ati2evxx.exe
C:\Program\ewido\security suite\ewidoctrl.exe
C:\Program\ewido\security suite\ewidoguard.exe
C:\Program\Panda Software\Panda Platinum Internet Security\passrv.exe
C:\Program\Panda Software\Panda Platinum Internet Security\Firewall\PavFires.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\AGRSMMSG.exe
C:\Program\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\WINDOWS\System32\LXSUPMON.EXE
C:\Program\iTunes\iTunesHelper.exe
C:\Program\QuickTime\qttask.exe
C:\Program\WildTangent\Apps\CDA\GameDrvr.exe
C:\Program\Winamp\winampa.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program\Netscape\Netscape\Netscp.exe
C:\Program\MSN Messenger\MsnMsgr.Exe
C:\Program\SmartTrust\SmartTrust Personal\Csp\SmartCertmover.exe
C:\Program\Delade filer\Panda Software\PavShld\pavprsrv.exe
C:\Program\Panda Software\Panda Platinum Internet Security\pavsrv51.exe
C:\Program\Hewlett-Packard\hp deskjet 450 printer\ToolBox\mpm.exe
C:\Program\Panda Software\Panda Platinum Internet Security\psimsvc.exe
C:\Program\Microsoft Office\Office\OSA.EXE
C:\Program\Panda Software\Panda Platinum Internet Security\AVENGINE.EXE
C:\WINDOWS\system32\Smartscaps.exe
C:\Program\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\System32\svchost.exe
C:\Program\Panda Software\Panda Platinum Internet Security\SRVLOAD.EXE
C:\Program\Outlook Express\msimn.exe
C:\Program\iPod\bin\iPodService.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wscntfy.exe
C:\DOCUME~1\PETRAS~1\LOKALA~1\Temp\Temporär katalog 3 för hijackthis_199.zip\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://g.msn.se/0SESVSE/SAOS02
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://runonce.msn.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.hp.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Länkar
R3 - URLSearchHook: (no name) - _{0428FFC7-1931-45b7-95CB-3CBB919777E1} - (no file)
R3 - URLSearchHook: (no name) - _{CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)
F2 - REG:system.ini: Shell=
N3 - Netscape 7: user_pref("browser.search.defaultengine", "engine://C%3A%5CProgram%5CNetscape%5CNetscape%5Csearchplugins%5CSBWeb_01.src"); (C:\Documents and Settings\Petra\Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\prefs.js)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
O2 - BHO: (no name) - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - (no file)
O2 - BHO: ST - {9394EDE7-C8B5-483E-8773-474BF36AF6E4} - C:\Program\MSN Apps\ST\01.03.0000.1005\en-xu\stmain.dll
O2 - BHO: MSNToolBandBHO - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program\MSN Apps\MSN Toolbar\01.02.4000.1001\sv\msntb.dll
O3 - Toolbar: (no name) - {0494D0D9-F8E0-41ad-92A3-14154ECE70AC} - (no file)
O3 - Toolbar: MSN - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program\MSN Apps\MSN Toolbar\01.02.4000.1001\sv\msntb.dll
O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [Cpqset] C:\Program\HPQ\Default Settings\cpqset.exe
O4 - HKLM\..\Run: [PreloadApp] c:\hp\drivers\printers\photosmart\hphprld.exe c:\hp\drivers\printers\photosmart\setup.exe -d
O4 - HKLM\..\Run: [srmclean] C:\Cpqs\Scom\srmclean.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [LXSUPMON] C:\WINDOWS\System32\LXSUPMON.EXE RUN
O4 - HKLM\..\Run: [SCANINICIO] "C:\Program\Panda Software\Panda Platinum Internet Security\Inicio.exe"
O4 - HKLM\..\Run: [APVXDWIN] "C:\Program\Panda Software\Panda Platinum Internet Security\APVXDWIN.EXE" /s
O4 - HKLM\..\Run: [iTunesHelper] C:\Program\iTunes\iTunesHelper.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [WildTangent CDA] "C:\Program\WildTangent\Apps\CDA\GameDrvr.exe" /startup "C:\Program\WildTangent\Apps\CDA\cdaEngine0500.dll"
O4 - HKLM\..\Run: [WinampAgent] C:\Program\Winamp\winampa.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Mozilla Quick Launch] "C:\Program\Netscape\Netscape\Netscp.exe" -turbo
O4 - HKCU\..\Run: [key] C:\WINDOWS\System32\sys_xp.exe
O4 - HKCU\..\Run: [win_upd2.exe] C:\WINDOWS\System32\WINdirect.exe
O4 - HKCU\..\Run: [\Pribi.exe] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Pribi\Pribi.exe
O4 - HKCU\..\Run: [WindowsRegKey update] svchostc.exe
O4 - HKCU\..\Run: [Microsoft Update] sys32cfg.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program\MSN Messenger\MsnMsgr.Exe" /background
O4 - Global Startup: Certificate Mover.lnk = ?
O4 - Global Startup: GStartup.lnk = C:\Program\Delade filer\GMT\GMT.exe
O4 - Global Startup: Microsoft Find Fast.lnk = C:\Program\Microsoft Office\Office\FINDFAST.EXE
O4 - Global Startup: myPrintMileage.lnk = C:\Program\Hewlett-Packard\hp deskjet 450 printer\ToolBox\mpm.exe
O4 - Global Startup: Office Startup.lnk = C:\Program\Microsoft Office\Office\OSA.EXE
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program\AIM\aim.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program\Messenger\msmsgs.exe (file missing)
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program\Messenger\msmsgs.exe (file missing)
O14 - IERESET.INF: START_PAGE_URL=http://www.hp.com
O16 - DPF: {1604DF98-D1A5-44FE-844A-98D6FD0518D0} - http://akamai.downlo...ESS_1060_XP.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....467&clcid=0x409
O16 - DPF: {1CD49DC9-FD88-41FA-B892-47E037267D45} - http://akamai.downlo...ESS_1059_XP.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoft.../as5/asinst.cab
O16 - DPF: {FA83E942-B796-46DE-9155-1632ECC5473B} - http://akamai.downlo...ESS_1061_XP.cab
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program\ewido\security suite\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program\ewido\security suite\ewidoguard.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program\iPod\bin\iPodService.exe
O23 - Service: Panda Antispam Service (PASSRV) - Unknown owner - C:\Program\Panda Software\Panda Platinum Internet Security\passrv.exe
O23 - Service: Panda Firewall Service (PAVFIRES) - Panda Software - C:\Program\Panda Software\Panda Platinum Internet Security\Firewall\PavFires.exe
O23 - Service: Panda Process Protection Service (PavPrSrv) - Panda Software - C:\Program\Delade filer\Panda Software\PavShld\pavprsrv.exe
O23 - Service: Panda anti-virus service (PAVSRV) - Panda Software - C:\Program\Panda Software\Panda Platinum Internet Security\pavsrv51.exe
O23 - Service: Panda Imanager Service (PSIMSVC) - Panda Software Internacional - C:\Program\Panda Software\Panda Platinum Internet Security\psimsvc.exe
O23 - Service: SmartTrust Smart Card Server (Smartscaps) - SmartTrust - C:\WINDOWS\system32\Smartscaps.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program\Analog Devices\SoundMAX\SMAgent.exe

ACTIVE SCAN Log


Incident Status Location

Adware:adware/adlogix No disinfected C:\WINDOWS\SYSTEM32\adupdmanager.xml
Adware:adware/keenvalue No disinfected C:\DOCUMENTS AND SETTINGS\PETRA\LOKALA INSTLLNINGAR\TEMP\UpdatedUpdaterInstall.exe
Spyware:spyware/bridge No disinfected C:\WINDOWS\DOWNLOADED PROGRAM FILES\bridge.inf
Spyware:spyware/harnig No disinfected C:\WINDOWS\DOWNLOADED PROGRAM FILES\load.exe
Adware:adware/mediatickets No disinfected C:\staff.html
Adware:adware/gator No disinfected C:\DOCUMENTS AND SETTINGS\ALL USERS\START-MENY\PROGRAM\AUTOSTART\GStartup.lnk
Spyware:spyware/altnet No disinfected C:\PROGRAM FILES\Altnet
Adware:adware/twain-tech No disinfected C:\DOCUMENTS AND SETTINGS\PETRA\LOKALA INSTLLNINGAR\TEMP\THI1DA0.tmp
Adware:adware/myway No disinfected C:\PROGRAM\MyWay
Spyware:spyware/new.net No disinfected C:\PROGRAM\NewDotNet
Adware:adware/navipromo No disinfected HKEY_CURRENT_USER\SOFTWARE\MC
Adware:adware/savenow No disinfected HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\MAGNET
Spyware:spyware/istbar No disinfected HKEY_LOCAL_MACHINE\SOFTWARE\Y036
Adware:adware/looksmart No disinfected HKEY_CLASSES_ROOT\TypeLib\{EDD3B3E9-3FFD-4836-A6DE-D4A9C473A971}
Adware:adware/wupd No disinfected HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9C691A33-7DDA-4C2F-BE4C-C176083F35CF}
Adware:Adware/SaveNow No disinfected C:\Documents and Settings\Petra\Lokala inställningar\Temp\AAWTMP\C78883\1E6F08\Save.exe
Adware:Adware/SaveNow No disinfected C:\Documents and Settings\Petra\Lokala inställningar\Temp\AAWTMP\C78883\1E6F08\SaveUninst.exe
Adware:Adware/SaveNow No disinfected C:\Documents and Settings\Petra\Lokala inställningar\Temp\WUSave.cab[Save.exe]
Adware:Adware/SaveNow No disinfected C:\Documents and Settings\Petra\Lokala inställningar\Temp\WUSave.cab[SaveUninst.exe]
Virus:W32/Mytob.HG.worm Disinfected C:\Documents and Settings\Petra\Skrivbord\email-info.zip[email-info.htm .exe]


---------------------------------------------------------
ewido security suite - Scan report
---------------------------------------------------------

+ Created on: 15:21:08, 2005-07-19
+ Report-Checksum: 724FEA23

+ Scan result:

HKLM\SOFTWARE\Classes\CLSID\{014DA6C9-189F-421a-88CD-07CFE51CFF10} -> Spyware.MySearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{0494D0D1-F8E0-41ad-92A3-14154ECE70AC} -> Spyware.MyWay : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{0494D0D9-F8E0-41ad-92A3-14154ECE70AC} -> Spyware.MyWay : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{3646C2BD-3554-49CA-8125-44DEEFB881DE} -> Spyware.Altnet : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{3f4d4f88-0198-4921-b630-957f3eb814e0} -> Spyware.Altnet : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{BFC9677B-8006-4336-9D49-2C797AEFCB9E} -> Dialer.Generic : Cleaned with backup
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0494D0D1-F8E0-41ad-92A3-14154ECE70AC} -> Spyware.MyWay : Cleaned with backup
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5FA6752A-C4A0-4222-88C2-928AE5AB4966} -> Spyware.Adlogix : Cleaned with backup
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{79C03BC5-6C55-4B5B-921F-C02B6F1ABD7B} -> Spyware.FastFind : Cleaned with backup
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9C691A33-7DDA-4C2F-BE4C-C176083F35CF} -> Spyware.WinFavorites : Cleaned with backup
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Instant Access -> Dialer.Generic : Cleaned with backup
HKU\S-1-5-21-576150678-1010859736-3519100435-1006\Software\EGDHTML -> Dialer.Generic : Cleaned with backup
HKU\S-1-5-21-576150678-1010859736-3519100435-1006\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{0494D0D1-F8E0-41AD-92A3-14154ECE70AC} -> Spyware.MyWay : Cleaned with backup
HKU\S-1-5-21-576150678-1010859736-3519100435-1006\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{0494D0D9-F8E0-41AD-92A3-14154ECE70AC} -> Spyware.MyWay : Cleaned with backup
HKU\S-1-5-21-576150678-1010859736-3519100435-1006\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{5FA6752A-C4A0-4222-88C2-928AE5AB4966} -> Spyware.Adlogix : Cleaned with backup
HKU\S-1-5-21-576150678-1010859736-3519100435-1006\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{79C03BC5-6C55-4B5B-921F-C02B6F1ABD7B} -> Spyware.FastFind : Cleaned with backup
HKU\S-1-5-21-576150678-1010859736-3519100435-1006\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{9C691A33-7DDA-4C2F-BE4C-C176083F35CF} -> Spyware.WinFavorites : Cleaned with backup
:mozilla.6:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.7:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.8:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.9:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.14:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.15:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.16:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.17:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.18:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.20:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.21:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.22:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.23:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.24:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.25:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.26:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.27:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.28:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.29:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.30:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.31:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.32:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.33:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Doubleclick : Cleaned with backup
:mozilla.37:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Ru4 : Cleaned with backup
:mozilla.38:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Ru4 : Cleaned with backup
:mozilla.39:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Ru4 : Cleaned with backup
:mozilla.40:C:\Documents and Settings\Petra \Application Data\Mozilla\Profiles\default\6z6b8t0t.slt\cookies.txt -> Spyware.Cookie.Atdmt : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @2o7[2].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @adopt.specificclick[2].txt -> Spyware.Cookie.Specificclick : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @ads.pointroll[2].txt -> Spyware.Cookie.Pointroll : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @adtech[1].txt -> Spyware.Cookie.Adtech : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @advertising[1].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @adviva[1].txt -> Spyware.Cookie.Adviva : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @as1.falkag[2].txt -> Spyware.Cookie.Falkag : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @atdmt[2].txt -> Spyware.Cookie.Atdmt : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @banner.casinoking[2].txt -> Spyware.Cookie.Casinoking : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @banner.casinolasvegas[2].txt -> Spyware.Cookie.Casinolasvegas : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @banner.goldenpalace[2].txt -> Spyware.Cookie.Goldenpalace : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @banner.newyorkcasino[2].txt -> Spyware.Cookie.Newyorkcasino : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @bfast[1].txt -> Spyware.Cookie.Bfast : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @bluestreak[1].txt -> Spyware.Cookie.Bluestreak : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @bs.serving-sys[1].txt -> Spyware.Cookie.Serving-sys : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @casinoking[2].txt -> Spyware.Cookie.Casinoking : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @casinolasvegas[1].txt -> Spyware.Cookie.Casinolasvegas : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @casinopays[1].txt -> Spyware.Cookie.Casinopays : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @casinotropez[2].txt -> Spyware.Cookie.Casinotropez : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @citi.bridgetrack[1].txt -> Spyware.Cookie.Bridgetrack : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @crbanner.casinopays[2].txt -> Spyware.Cookie.Casinopays : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @doubleclick[2].txt -> Spyware.Cookie.Doubleclick : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @edge.ru4[2].txt -> Spyware.Cookie.Ru4 : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @ehg-newscientist.hitbox[2].txt -> Spyware.Cookie.Hitbox : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @fastclick[2].txt -> Spyware.Cookie.Fastclick : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @goldenpalace[2].txt -> Spyware.Cookie.Goldenpalace : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @grandonline[2].txt -> Spyware.Cookie.Grandonline : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @hitbox[1].txt -> Spyware.Cookie.Hitbox : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @mediaplex[1].txt -> Spyware.Cookie.Mediaplex : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @newyorkcasino[1].txt -> Spyware.Cookie.Newyorkcasino : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @overture[2].txt -> Spyware.Cookie.Overture : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @perf.overture[1].txt -> Spyware.Cookie.Overture : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @servedby.advertising[2].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @serving-sys[2].txt -> Spyware.Cookie.Serving-sys : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @tradedoubler[2].txt -> Spyware.Cookie.Tradedoubler : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @trafficmp[1].txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @tribalfusion[1].txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @www.casinotropez[1].txt -> Spyware.Cookie.Casinotropez : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @www.goldenpalace[1].txt -> Spyware.Cookie.Goldenpalace : Cleaned with backup
C:\Documents and Settings\Petra \Cookies\petra @www.grandonline[1].txt -> Spyware.Cookie.Grandonline : Cleaned with backup
C:\Documents and Settings\Petra \Lokala inställningar\Temp\AAWTMP\C78883\1E6F08\Save.exe -> Adware.SaveNow : Cleaned with backup
C:\Documents and Settings\Petra \Lokala inställningar\Temp\AAWTMP\C78883\1E6F08\SaveUninst.exe -> Adware.SaveNow : Cleaned with backup
C:\Documents and Settings\Petra \Lokala inställningar\Temp\WUSave.cab/Save.exe -> Adware.SaveNow : Cleaned with backup
C:\Documents and Settings\Petra \Lokala inställningar\Temp\WUSave.cab/SaveUninst.exe -> Adware.SaveNow : Cleaned with backup
C:\Program\MyWay\myBar\2.bin\MYWAYPLUGINPROXY.CLASS -> Spyware.MyWay : Cleaned with backup
C:\WINDOWS\Downloaded Program Files\load.exe -> TrojanDownloader.Apher : Cleaned with backup
C:\WINDOWS\system32\TFTP3748 -> Backdoor.Rbot : Cleaned with backup
C:\WINDOWS\system32\TFTP4704 -> Backdoor.Rbot : Cleaned with backup
C:\WINDOWS\system32\TFTP532 -> Backdoor.Rbot : Cleaned with backup
C:\WINDOWS\system32\__delete_on_reboot__msclock32.dll -> Dialer.Generic : Cleaned with backup
C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\wtvh.dll -> Spyware.WildTangent : Cleaned with backup
C:\WINDOWS\wt\wtvh.dll -> Spyware.WildTangent : Cleaned with backup
C:\WINDOWS\zaebalinah.exe -> TrojanDownloader.Apher : Cleaned with backup


::Report End
  • 0

Advertisements


#2
Metallica

Metallica

    Spyware Veteran

  • GeekU Moderator
  • 33,101 posts
First please move HijackThis to a permanent folder for itself as explained here:
http://home.planet.n...xplanation.html
This will allow the program to make backups.

Check the following items in HijackThis.
Close all windows except HijackThis and click Fix checked:

R3 - URLSearchHook: (no name) - _{0428FFC7-1931-45b7-95CB-3CBB919777E1} - (no file)
R3 - URLSearchHook: (no name) - _{CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)

O2 - BHO: (no name) - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - (no file)

O3 - Toolbar: (no name) - {0494D0D9-F8E0-41ad-92A3-14154ECE70AC} - (no file)

O4 - HKLM\..\Run: [WildTangent CDA] "C:\Program\WildTangent\Apps\CDA\GameDrvr.exe" /startup "C:\Program\WildTangent\Apps\CDA\cdaEngine0500.dll"

O4 - HKCU\..\Run: [key] C:\WINDOWS\System32\sys_xp.exe
O4 - HKCU\..\Run: [win_upd2.exe] C:\WINDOWS\System32\WINdirect.exe
O4 - HKCU\..\Run: [\Pribi.exe] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Pribi\Pribi.exe
O4 - HKCU\..\Run: [WindowsRegKey update] svchostc.exe
O4 - HKCU\..\Run: [Microsoft Update] sys32cfg.exe

O4 - Global Startup: GStartup.lnk = C:\Program\Delade filer\GMT\GMT.exe

O16 - DPF: {1604DF98-D1A5-44FE-844A-98D6FD0518D0} - http://akamai.downlo...ESS_1060_XP.cab

O16 - DPF: {1CD49DC9-FD88-41FA-B892-47E037267D45} - http://akamai.downlo...ESS_1059_XP.cab

O16 - DPF: {FA83E942-B796-46DE-9155-1632ECC5473B} - http://akamai.downlo...ESS_1061_XP.cab

Reboot into safe mode and delete:
C:\Program\Delade filer\GMT <= entire folder

Boot back to normal and post a new HijackThis log.

Regards,
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP