Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

NEED PSGaurd help! [RESOLVED]


  • This topic is locked This topic is locked

#1
micj

micj

    New Member

  • Member
  • Pip
  • 6 posts
I have been hijacked by PSgaurd. Please help. This is my Hijack this log:


Logfile of HijackThis v1.99.1
Scan saved at 11:41:10 AM, on 7/31/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
C:\Program Files\Network Associates\VirusScan\Mcshield.exe
C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\DSentry.exe
C:\Program Files\Dell\Media Experience\PCMService.exe
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S10IC1.EXE
C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe
C:\Program Files\DIGStream\digstream.exe
C:\PROGRA~1\SBCSEL~1\SMARTB~1\MotiveSB.exe
C:\Program Files\BroadJump\Client Foundation\CFD.exe
C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe
C:\WINDOWS\System32\intell32.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program Files\Dell Support\DSAgnt.exe
C:\Program Files\SBC Self Support Tool\bin\mpbtn.exe
C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Hijackthis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
R3 - Default URLSearchHook is missing
O3 - Toolbar: (no name) - {BA52B914-B692-46c4-B683-905236F6F655} - (no file)
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [DVDSentry] C:\WINDOWS\System32\DSentry.exe
O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Dell\Media Experience\PCMService.exe"
O4 - HKLM\..\Run: [EPSON Stylus C42 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S10IC1.EXE /P23 "EPSON Stylus C42 Series" /O6 "USB001" /M "Stylus C42"
O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
O4 - HKLM\..\Run: [McAfeeUpdaterUI] "C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" /StartedFromRunKey
O4 - HKLM\..\Run: [DIGStream] C:\Program Files\DIGStream\digstream.exe
O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\SBCSEL~1\SMARTB~1\MotiveSB.exe
O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
O4 - HKLM\..\Run: [Network Associates Error Reporting Service] "C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe"
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [intell32.exe] C:\WINDOWS\System32\intell32.exe
O4 - HKLM\..\Run: [PSGuard spyware remover] C:\Program Files\PSGuard\PSGuard.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [MoneyAgent] "C:\Program Files\Microsoft Money\System\mnyexpr.exe"
O4 - HKCU\..\Run: [Yahoo! Pager] 1
O4 - HKCU\..\Run: [DellSupport] "C:\Program Files\Dell Support\DSAgnt.exe" /startup
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Cisco Systems VPN Client.lnk = C:\Program Files\Cisco Systems\VPN Client\ipsecdialer.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: SBC Self Support Tool.lnk = C:\Program Files\SBC Self Support Tool\bin\matcli.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra button: Printer Setting - {86D34064-6369-4513-B82E-8B08F772C345} - C:\Program Files\IESetup\IEToolbar.exe
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\IEExtension.dll
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\IEExtension.dll
O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O12 - Plugin for .mpeg: C:\Program Files\Internet Explorer\PLUGINS\npqtplugin4.dll
O16 - DPF: {04E214E5-63AF-4236-83C6-A7ADCBF9BD02} (HouseCall Control) - http://housecall60.t...all/xscan60.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....467&clcid=0x409
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: {C7648BB8-7FF5-4192-886A-6C542051A522} (HideCursorCtl Class) - https://10.120.184.22/HideCursor.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://zone.msn.com/...aploader_v5.cab
O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
O23 - Service: McAfee Framework Service (McAfeeFramework) - Network Associates, Inc. - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
O23 - Service: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\Mcshield.exe
O23 - Service: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
O23 - Service: Intel NCS NetService (NetSvc) - Intel® Corporation - C:\Program Files\Intel\NCS\Sync\NetSvc.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
  • 0

Advertisements


#2
kool808

kool808

    Visiting Staff

  • Member
  • PipPipPipPip
  • 1,690 posts
Hello and welcome to Geeks to Go! :tazz: I'm kool808 and I will be helping you today.

I am working on your log. As soon as I made a good fix for this, I will post a reply. Thank you for your patience.
  • 0

#3
kool808

kool808

    Visiting Staff

  • Member
  • PipPipPipPip
  • 1,690 posts
Please SAVE THIS PAGE or secure a PRINT COPY of the instructions for reference.
++++++++++++++++++++++++++++++++++++++++++++

Download smitRem.exe and save the file to your desktop.
Double click on the file to extract it to it's own folder on the desktop.
Do NOT run it yet.

Place a shortcut to Panda ActiveScan on your desktop.

Please download the trial version of Ewido Security Suite 3.5 here:
http://www.ewido.net/en/download/

Please read Ewido Setup Instructions
Install it, and update the definitions to the newest files. Do NOT run a scan yet.

If you have not already installed Ad-Aware SE 1.06, follow these download and setup instructions, otherwise, check for updates:
Ad-Aware SE Setup
Do NOT run the scan yet!

Next, please reboot your computer in SafeMode by doing the following:
  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, press F8.
  • Instead of Windows loading as normal, a menu should appear
  • Select the first option, to run Windows in Safe Mode.
(How to boot in Safe Mode...)
===================================================

Open the smitRem folder, then double click the RunThis.bat file to start the tool. Follow the prompts on screen.
Wait for the tool to complete and disk cleanup to finish.

The tool will create a log named smitfiles.txt in the root of your drive, eg; Local Disk C: or partition where your operating system is installed. Please post that log along with all others requested in your next reply.


Open Ad-aware and do a full scan. Remove all it finds.


Run Ewido:
  • Click on scanner
  • Click Complete System Scan and the scan will begin.
  • During the scan it will prompt you to clean files, click OK
  • When it asks if you want to clean the first file, put a check in the lower left corner of the box that says "Perform action on all infections" then choose clean and click OK.
  • When the scan is finished, click the Save report button at the bottom of the screen.
  • Save the report to your desktop
Close Ewido

Next go to Control Panel click Display > Desktop > Customize Desktop > Website > Uncheck "Security Info" if present.

Reboot back into Windows and click the Panda ActiveScan shortcut, then do a full system scan. Make sure the autoclean box is checked!

Save the scan log and post it along with a new HijackThis Log, the contents of the smitfiles.txt log and the Ewido Log by using Add Reply.
Let us know if any problems persist.
  • 0

#4
micj

micj

    New Member

  • Topic Starter
  • Member
  • Pip
  • 6 posts
I have followed your directions. Herer are my log files.

Panda ActiveScan


Incident Status Location

Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-125d14a4-14d8e50c.RB0[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-125d14a4-14d8e50c.RB0[VB.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-125d14a4-14d8e50c.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-125d14a4-14d8e50c.RB0[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-125d14a4-14d8e50c.zip[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-125d14a4-14d8e50c.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-12b23737-36357aaa.RB0[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-12b23737-36357aaa.RB0[VB.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-12b23737-36357aaa.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-12b23737-36357aaa.RB0[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-12b23737-36357aaa.zip[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-12b23737-36357aaa.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-3584918f-13d486a8.RB0[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-3584918f-13d486a8.RB0[VB.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-3584918f-13d486a8.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-3584918f-13d486a8.RB0[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-3584918f-4f0932b4.RB0[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-3584918f-4f0932b4.RB0[VB.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-3584918f-4f0932b4.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-3584918f-4f0932b4.RB0[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-3c85a355-790ee56d.RB0[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-3c85a355-790ee56d.RB0[VB.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-3c85a355-790ee56d.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-3c85a355-790ee56d.RB0[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-4c45868f-69c5877e.RB0[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-4c45868f-69c5877e.RB0[VB.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-4c45868f-69c5877e.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-4c45868f-69c5877e.RB0[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-4c45868f-69c5877e.zip[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-4c45868f-69c5877e.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-6da4856a-14dbcf2d.RB0[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-6da4856a-14dbcf2d.RB0[VB.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-6da4856a-14dbcf2d.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-6da4856a-14dbcf2d.RB0[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-1910af14-71d2d979.RB0[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-1910af14-71d2d979.RB0[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-1910af14-71d2d979.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-1910af14-71d2d979.RB0[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-1f5b6b54-2028e305.RB0[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-1f5b6b54-2028e305.RB0[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-1f5b6b54-2028e305.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-1f5b6b54-2028e305.RB0[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-1f5b6b54-70ac1a0b.RB0[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-1f5b6b54-70ac1a0b.RB0[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-1f5b6b54-70ac1a0b.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-1f5b6b54-70ac1a0b.RB0[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-2fdafaa7-43f310c8.RB0[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-2fdafaa7-43f310c8.RB0[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-2fdafaa7-43f310c8.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-2fdafaa7-43f310c8.RB0[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-7691cc0e-70103e8e.RB0[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-7691cc0e-70103e8e.RB0[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-7691cc0e-70103e8e.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-7691cc0e-70103e8e.RB0[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76935f99-5c81ec12.RB0[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76935f99-5c81ec12.RB0[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76935f99-5c81ec12.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76935f99-5c81ec12.RB0[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76ba5970-2d996d6e.RB0[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76ba5970-2d996d6e.RB0[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76ba5970-2d996d6e.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76ba5970-2d996d6e.RB0[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76ba5970-41c3abaf.RB0[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76ba5970-41c3abaf.RB0[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76ba5970-41c3abaf.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76ba5970-41c3abaf.RB0[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76ba5970-5a6a46f8.RB0[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76ba5970-5a6a46f8.RB0[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76ba5970-5a6a46f8.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76ba5970-5a6a46f8.RB0[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-779c6021-6f402ed1.RB0[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-779c6021-6f402ed1.RB0[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-779c6021-6f402ed1.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-779c6021-6f402ed1.RB0[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\clsld.jar-34982b9e-1443c7d1.RB0[GetAccess.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\clsld.jar-34982b9e-1443c7d1.RB0[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\clsld.jar-34982b9e-1443c7d1.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\clsld.jar-34982b9e-1443c7d1.RB0[Installer.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-66caba6e-788a0972.RB0[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-66caba6e-788a0972.RB0[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-66caba6e-788a0972.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-66caba6e-788a0972.RB0[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-66caba6e-788a0972.zip[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-66caba6e-788a0972.zip[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-66caba6e-788a0972.zip[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-6f603a77-27d5924a.RB0[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-6f603a77-27d5924a.RB0[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-6f603a77-27d5924a.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-6f603a77-27d5924a.RB0[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-6f603a77-27d5924a.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-6f603a77-27d5924a.zip[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-b5abf0d-4cf39a91.RB0[BlackBox.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-b5abf0d-4cf39a91.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\counter.jar-7271642a-22f9f5c1.RB0[counter.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\counter.jar-7271642a-22f9f5c1.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\counter.jar-7271642a-22f9f5c1.RB0[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\counter.jar-7271642a-22f9f5c1.RB0[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\exe.jar-15a77d43-5a1ad021.RB0[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\exea.jar-429497e-4556a571.RB0[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\playup_ro.jar-36d594bc-6bcdb728.RB0[Bubble.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\playup_ro.jar-36d594bc-6bcdb728.RB0[VerifierBug.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\playup_ro.jar-36d594bc-6bcdb728.RB0[Dummy.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\playup_ro.jar-36d594bc-6bcdb728.RB0[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\playup_ro.jar-36d594bc-6bcdb728.zip[Bubble.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\playup_ro.jar-36d594bc-6bcdb728.zip[Beyond.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\proc.jar-5b86749e-126dca06.RB0[Jvb.class]
Virus:Exploit/ByteVerify Disinfected C:\Documents and Settings\mic\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\proc.jar-5b86749e-126dca06.RB0[MainApp.class]
Virus:Trj/Downloader.CZG Disinfected C:\WINDOWS\n_ivalut.dat
Virus:Trj/Multidropper.MM Disinfected C:\WINDOWS\SYSTEM32\in10b6.dll
HijackThis Log

Logfile of HijackThis v1.99.1
Scan saved at 8:12:53 PM, on 8/1/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\Program Files\ewido\security suite\ewidoguard.exe
C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
C:\WINDOWS\System32\DSentry.exe
C:\Program Files\Dell\Media Experience\PCMService.exe
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S10IC1.EXE
C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe
C:\Program Files\Network Associates\VirusScan\Mcshield.exe
C:\Program Files\DIGStream\digstream.exe
C:\PROGRA~1\SBCSEL~1\SMARTB~1\MotiveSB.exe
C:\Program Files\BroadJump\Client Foundation\CFD.exe
C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\ctfmon.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe
C:\Program Files\Dell Support\DSAgnt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\SBC Self Support Tool\bin\mpbtn.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Hijackthis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
R3 - Default URLSearchHook is missing
O3 - Toolbar: (no name) - {BA52B914-B692-46c4-B683-905236F6F655} - (no file)
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [DVDSentry] C:\WINDOWS\System32\DSentry.exe
O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Dell\Media Experience\PCMService.exe"
O4 - HKLM\..\Run: [EPSON Stylus C42 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S10IC1.EXE /P23 "EPSON Stylus C42 Series" /O6 "USB001" /M "Stylus C42"
O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
O4 - HKLM\..\Run: [McAfeeUpdaterUI] "C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" /StartedFromRunKey
O4 - HKLM\..\Run: [DIGStream] C:\Program Files\DIGStream\digstream.exe
O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\SBCSEL~1\SMARTB~1\MotiveSB.exe
O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
O4 - HKLM\..\Run: [Network Associates Error Reporting Service] "C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe"
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [MoneyAgent] "C:\Program Files\Microsoft Money\System\mnyexpr.exe"
O4 - HKCU\..\Run: [Yahoo! Pager] 1
O4 - HKCU\..\Run: [DellSupport] "C:\Program Files\Dell Support\DSAgnt.exe" /startup
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Cisco Systems VPN Client.lnk = C:\Program Files\Cisco Systems\VPN Client\ipsecdialer.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: SBC Self Support Tool.lnk = C:\Program Files\SBC Self Support Tool\bin\matcli.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra button: Printer Setting - {86D34064-6369-4513-B82E-8B08F772C345} - C:\Program Files\IESetup\IEToolbar.exe
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\IEExtension.dll
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\IEExtension.dll
O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O12 - Plugin for .mpeg: C:\Program Files\Internet Explorer\PLUGINS\npqtplugin4.dll
O16 - DPF: {04E214E5-63AF-4236-83C6-A7ADCBF9BD02} (HouseCall Control) - http://housecall60.t...all/xscan60.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....467&clcid=0x409
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoft.../as5/asinst.cab
O16 - DPF: {C7648BB8-7FF5-4192-886A-6C542051A522} (HideCursorCtl Class) - https://10.120.184.22/HideCursor.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://zone.msn.com/...aploader_v5.cab
O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido\security suite\ewidoguard.exe
O23 - Service: McAfee Framework Service (McAfeeFramework) - Network Associates, Inc. - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
O23 - Service: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\Mcshield.exe
O23 - Service: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
O23 - Service: Intel NCS NetService (NetSvc) - Intel® Corporation - C:\Program Files\Intel\NCS\Sync\NetSvc.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe

smitfiles.txt log


smitRem log file
version 2.2

by noahdfear

The current date is: Mon 08/01/2005
The current time is: 18:56:51.32

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

ShudderLTD key present! Running LTDFix!

ShudderLTD key was successfully removed! ;)


Pre-run Files Present


~~~ Program Files ~~~

PSGuard


~~~ Shortcuts ~~~

PSGuard spyware remover
PSGuard spyware remover.lnk
quick launch PSGuard spyware remover.lnk


~~~ Favorites ~~~



~~~ system32 folder ~~~

oleext.dll
intmonp.exe
msole32.exe
hp***.tmp
intmon.exe
hhk.dll
logfiles


~~~ Windows directory ~~~

sites.ini
popuper.exe


~~~ Drive root ~~~

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Post-run Files Present


~~~ Program Files ~~~



~~~ Shortcuts ~~~



~~~ Favorites ~~~



~~~ system32 folder ~~~

oleext.dll


~~~ Windows directory ~~~



~~~ Drive root ~~~



~~~ Wininet.dll ~~~

wininet.dll INFECTED!! :tazz: Starting replacement procedure.


~~~~ Looking for C:\WINDOWS\system32\dllcache\wininet.dll ~~~~


~~~~ C:\WINDOWS\system32\dllcache\wininet.dll Present! ~~~~


~~~~ Checking dllcache\wininet.dll for infection ~~~~


~~~~ dllcache\wininet.dll Clean! ~~~~

~~~ Replaced wininet.dll from dllcache ~~~


Ewido Log


---------------------------------------------------------
ewido security suite - Scan report
---------------------------------------------------------

+ Created on: 7:14:46 PM, 8/1/2005
+ Report-Checksum: E02E695C

+ Scan result:

HKLM\SOFTWARE\Classes\CLSID\{3A1550DD-FD7B-8D6E-989A-49A66DF1433F} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{6EDB124C-8B12-ABA8-CA16-CEBAC7061ADE} -> Spyware.CoolWebSearch : Cleaned with backup
C:\Documents and Settings\maureen\Cookies\maureen@2o7[2].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Documents and Settings\maureen\Cookies\maureen@ads.pointroll[1].txt -> Spyware.Cookie.Pointroll : Cleaned with backup
C:\Documents and Settings\maureen\Cookies\maureen@bs.serving-sys[1].txt -> Spyware.Cookie.Serving-sys : Cleaned with backup
C:\Documents and Settings\maureen\Cookies\maureen@burstnet[2].txt -> Spyware.Cookie.Burstnet : Cleaned with backup
C:\Documents and Settings\maureen\Cookies\maureen@casalemedia[2].txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
C:\Documents and Settings\maureen\Cookies\maureen@centrport[2].txt -> Spyware.Cookie.Centrport : Cleaned with backup
C:\Documents and Settings\maureen\Cookies\maureen@questionmarket[1].txt -> Spyware.Cookie.Questionmarket : Cleaned with backup
C:\Documents and Settings\maureen\Cookies\maureen@serving-sys[2].txt -> Spyware.Cookie.Serving-sys : Cleaned with backup
C:\Documents and Settings\maureen\Cookies\maureen@statcounter[2].txt -> Spyware.Cookie.Statcounter : Cleaned with backup
C:\Documents and Settings\mic\Cookies\mic@e-2dj6wjmispd5egq.stats.esomniture[2].txt -> Spyware.Cookie.Esomniture : Cleaned with backup
C:\Program Files\Internet Explorer\zeempgmv.exe -> TrojanDownloader.WinShow.r : Cleaned with backup
C:\WINDOWS\Downloaded Program Files\popcaploader.dll -> Not-A-Virus.RiskWare.Downloader.PopCap.a : Cleaned with backup
C:\WINDOWS\ModemLog_BCM V.92 56K Modem.txt:pqjksu -> Trojan.Agent.bi : Cleaned with backup
C:\WINDOWS\SYSTEM32:gcaa.dll -> TrojanDownloader.Small.azk : Cleaned with backup
C:\WINDOWS\SYSTEM32\iesc.dll -> TrojanDownloader.Agent.bc : Cleaned with backup
C:\WINDOWS\SYSTEM32\VT334ad.exe -> Spyware.F1Organizer : Cleaned with backup
C:\WINDOWS\wininit.ini:djglav -> Trojan.Agent.bi : Cleaned with backup
C:\WINDOWS\wininit.ini:wsmen -> TrojanDownloader.Agent.bc : Cleaned with backup


::Report End
  • 0

#5
kool808

kool808

    Visiting Staff

  • Member
  • PipPipPipPip
  • 1,690 posts
Looking very good, you did it well. Your log looks much better.

Clear Java Cache:

1. Click Start > Control Panel.

2. Double-click the Java icon (coffee cup) in the control panel. It will say "Java Plug-in" under the icon - please find the update button or tab in that Java control panel. Update your Java, and reboot.

After reboot, go back into the Control Panel and double-click the Java icon.

3. Under Temporary Internet Files, click the Delete Files button.

There are three options on this window to clear the cache - leave ALL 3 checked.
1. Downloaded Applets
2. Downloaded Applications
3. Other Files

4. Click OK on Delete Temporary Files window.
Note: This deletes ALL the Downloaded Applications and Applets from the CACHE.

5. Click OK to leave the Java Control Panel.

Reboot in SAFE MODE. (How to boot in Safe Mode...)

++++++++++++++++++++++++++++++++++++++++++
  • Uninstallation
    We need to uninstall the following programs:
  • Go to Control Panel > Add/Remove Programs
  • Please locate if they exist
    • Party Poker
  • Click Uninstall
  • Confirm with OK
++++++++++++++++++++++++++++++++++++++++++
Re-run the SmitRem tool again, follow the on-screen instructions then post the results it will produce.

++++++++++++++++++++++++++++++++++++++++++
Be sure to View Hidden and System Files.

Through Windows Explorer, delete the following folder(s) or files(s) if they exist (in bold):
  • C:\Program Files\PartyPoker <-- whole folder
Finally, Empty Recycle Bin

++++++++++++++++++++++++++++++++++++++++++
Please close all remaining windows, disconnect from the internet, open HijackThis then click SCAN. Please put a check on the following items listed below:

O4 - HKCU\..\Run: [Yahoo! Pager] 1

O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\IEExtension.dll
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\IEExtension.dll

O16 - DPF: {C7648BB8-7FF5-4192-886A-6C542051A522} (HideCursorCtl Class) - https://10.120.184.22/HideCursor.cab


Make sure to double check the items you have selected, then click Fix Checked.

++++++++++++++++++++++++++++++++++++++++++
Reboot back in NORMAL MODE.

To make sure it is perfectly clean let us have the final check.
  • Close all windows, open HijackThis then SCAN.
  • Post a NEW HijackThis Log.
  • Please tell me how your system is working now.

  • 0

#6
micj

micj

    New Member

  • Topic Starter
  • Member
  • Pip
  • 6 posts
I completed the items you described. My machine seems much better. Listed are my HijackThis and Smit logs

HijackThis

Logfile of HijackThis v1.99.1
Scan saved at 9:16:14 PM, on 8/2/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\Program Files\ewido\security suite\ewidoguard.exe
C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Network Associates\VirusScan\Mcshield.exe
C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
C:\WINDOWS\System32\DSentry.exe
C:\Program Files\Dell\Media Experience\PCMService.exe
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S10IC1.EXE
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe
C:\Program Files\DIGStream\digstream.exe
C:\PROGRA~1\SBCSEL~1\SMARTB~1\MotiveSB.exe
C:\Program Files\BroadJump\Client Foundation\CFD.exe
C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe
C:\Program Files\Microsoft AntiSpyware\gcasServ.exe
C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe
C:\Program Files\Dell Support\DSAgnt.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Program Files\SBC Self Support Tool\bin\mpbtn.exe
C:\Program Files\Hijackthis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
R3 - Default URLSearchHook is missing
O3 - Toolbar: (no name) - {BA52B914-B692-46c4-B683-905236F6F655} - (no file)
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [DVDSentry] C:\WINDOWS\System32\DSentry.exe
O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Dell\Media Experience\PCMService.exe"
O4 - HKLM\..\Run: [EPSON Stylus C42 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S10IC1.EXE /P23 "EPSON Stylus C42 Series" /O6 "USB001" /M "Stylus C42"
O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
O4 - HKLM\..\Run: [McAfeeUpdaterUI] "C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" /StartedFromRunKey
O4 - HKLM\..\Run: [DIGStream] C:\Program Files\DIGStream\digstream.exe
O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\SBCSEL~1\SMARTB~1\MotiveSB.exe
O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
O4 - HKLM\..\Run: [Network Associates Error Reporting Service] "C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [MoneyAgent] "C:\Program Files\Microsoft Money\System\mnyexpr.exe"
O4 - HKCU\..\Run: [DellSupport] "C:\Program Files\Dell Support\DSAgnt.exe" /startup
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Cisco Systems VPN Client.lnk = C:\Program Files\Cisco Systems\VPN Client\ipsecdialer.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: SBC Self Support Tool.lnk = C:\Program Files\SBC Self Support Tool\bin\matcli.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: Printer Setting - {86D34064-6369-4513-B82E-8B08F772C345} - C:\Program Files\IESetup\IEToolbar.exe
O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O12 - Plugin for .mpeg: C:\Program Files\Internet Explorer\PLUGINS\npqtplugin4.dll
O16 - DPF: {04E214E5-63AF-4236-83C6-A7ADCBF9BD02} (HouseCall Control) - http://housecall60.t...all/xscan60.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=39204
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoft.../as5/asinst.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://zone.msn.com/...aploader_v5.cab
O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido\security suite\ewidoguard.exe
O23 - Service: McAfee Framework Service (McAfeeFramework) - Network Associates, Inc. - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
O23 - Service: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\Mcshield.exe
O23 - Service: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
O23 - Service: Intel NCS NetService (NetSvc) - Intel® Corporation - C:\Program Files\Intel\NCS\Sync\NetSvc.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe


Smitrem


smitRem log file
version 2.2

by noahdfear

The current date is: Tue 08/02/2005
The current time is: 21:06:59.64

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Pre-run Files Present


~~~ Program Files ~~~



~~~ Shortcuts ~~~



~~~ Favorites ~~~



~~~ system32 folder ~~~



~~~ Windows directory ~~~



~~~ Drive root ~~~

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Post-run Files Present


~~~ Program Files ~~~



~~~ Shortcuts ~~~



~~~ Favorites ~~~



~~~ system32 folder ~~~



~~~ Windows directory ~~~



~~~ Drive root ~~~



~~~ Wininet.dll ~~~

CLEAN! :tazz:
  • 0

#7
kool808

kool808

    Visiting Staff

  • Member
  • PipPipPipPip
  • 1,690 posts
Looking pretty good, you are too cool! You did it very well!

:yes: :) :tazz: :( :woot: :tazz: :huh: :( :wub: :hug: :woot:


Congratulations! ;) your system is CLEAN!

WinXP Reset & All-Clean1

We have a couple of last steps to perform and then you're all set.

First, let's reset your hidden/system files and folders. System files are hidden for a reason and we don't want to have them openly available and susceptible to accidental deletion.* Click Start.
* Open My Computer.
* Select the Tools menu and click Folder Options.
* Select the View tab.
* Under the Hidden files and folders heading UNSELECT Show hidden files and folders.
* CHECK the Hide protected operating system files (recommended) option.
* Click Yes to confirm.
* Click OK.
Next, let's clean your restore points and set a new one:

Reset and Re-enable your System Restore to remove infected files that have been backed up by Windows. The files in System Restore are protected to prevent any programs from changing those files. This is the only way to clean these files: (You will lose all previous restore points which are likely to be infected)1. Turn off System Restore.On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
Check Turn off System Restore.
Click Apply, and then click OK.
2. Restart your computer.

3. Turn ON System Restore.On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
UN-Check Turn off System Restore.
Click Apply, and then click OK.
[/list]System Restore will now be active again.

Now that you are clean, to help protect your computer in the future I recommend that you get the following free programs:
  • SpywareBlaster to help prevent spyware from installing in the first place.
  • SpywareGuard to catch and block spyware before it can execute.
  • IESpy-Ad to block access to malicious websites so you cannot be redirected to them from an infected site or email.
You should also have a good firewall. Here are 3 free ones available for personal use:and a good antivirus (these are also free for personal use):It is critical to have both a firewall and anti virus to protect your system and to keep them updated.

To keep your operating system up to date visitmonthly. And to keep your system clean run these free malware scannersweekly, and be aware of what emails you open and websites you visit.

To learn more about how to protect yourself while on the internet read this article by Tony Klein: So how did I get infected in the first place?
  • 0

#8
micj

micj

    New Member

  • Topic Starter
  • Member
  • Pip
  • 6 posts
Thank You! System is all set now.
  • 0

#9
kool808

kool808

    Visiting Staff

  • Member
  • PipPipPipPip
  • 1,690 posts
Since this issue appears to be resolved ... this Topic has been closed. Glad we could help. :tazz:

If you're the topic starter, and need this topic reopened, please contact a staff member with the address of the thread.

Everyone else please begin a New Topic.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP