Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Yet another Winfixer [RESOLVED]


  • This topic is locked This topic is locked

#1
buttsy

buttsy

    Member

  • Member
  • PipPip
  • 10 posts
Hey there,

I did everything it said to do on your "Do this before posting HiJack This Log" As well as a full scan with Pest Patrol Corporate and Norton System Works 2004.

Hope you can help, cause this is really getting irritating...

HJT Log

Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\ACS.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\WINDOWS\system32\CTsvcCDA.EXE
C:\WINDOWS\system32\DVDRAMSV.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\Program Files\Norton SystemWorks\Norton Antivirus\navapsvc.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\PROGRA~1\NORTON~1\NORTON~2\NPROTECT.EXE
C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
C:\WINDOWS\System32\ZoomingHook.exe
C:\Program Files\Norton SystemWorks\Norton Antivirus\SAVScan.exe
C:\WINDOWS\System32\TCtrlIOHook.exe
C:\PROGRA~1\NORTON~1\NORTON~2\SPEEDD~1\NOPDB.EXE
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
C:\WINDOWS\system32\TPSMain.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
C:\Program Files\ltmoh\Ltmoh.exe
C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\Atheros\ACU.exe
C:\WINDOWS\system32\TPSBattM.exe
C:\WINDOWS\system32\LVCOMSX.EXE
C:\Program Files\Logitech\Video\LogiTray.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\PESTPA~1\PPMemCheck.exe
C:\PROGRA~1\PESTPA~1\CookiePatrol.exe
C:\Program Files\Winamp\winampa.exe
C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Logitech\Video\FxSvr2.exe
C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\system32\RAMASST.exe
C:\WINDOWS\system32\ntvdm.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Winamp\winamp.exe
C:\Documents and Settings\Brad Butts\Desktop\hjthis\HijackThis.exe
C:\Program Files\Messenger\msmsgs.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.ca/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
O2 - BHO: MSEvents Object - {827DC836-DD9F-4A68-A602-5812EB50A834} - C:\WINDOWS\Cursors\dbjava.dll
O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton SystemWorks\Norton Antivirus\NavShExt.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton SystemWorks\Norton Antivirus\NavShExt.dll
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [CeEKEY] C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
O4 - HKLM\..\Run: [TPNF] C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
O4 - HKLM\..\Run: [ZoomingHook] c:\WINDOWS\System32\ZoomingHook.exe
O4 - HKLM\..\Run: [TCtryIOHook] c:\WINDOWS\System32\TCtrlIOHook.exe
O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
O4 - HKLM\..\Run: [PadTouch] C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
O4 - HKLM\..\Run: [TPSMain] TPSMain.exe
O4 - HKLM\..\Run: [SmoothView] C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
O4 - HKLM\..\Run: [TFncKy] C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
O4 - HKLM\..\Run: [LtMoh] C:\\Program Files\\ltmoh\\Ltmoh.exe
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [ACU] "C:\Program Files\Atheros\ACU.exe" -nogui
O4 - HKLM\..\Run: [LVCOMSX] C:\WINDOWS\system32\LVCOMSX.EXE
O4 - HKLM\..\Run: [LogitechVideoRepair] C:\Program Files\Logitech\Video\ISStart.exe
O4 - HKLM\..\Run: [LogitechVideoTray] C:\Program Files\Logitech\Video\LogiTray.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
O4 - HKLM\..\Run: [PPMemCheck] C:\PROGRA~1\PESTPA~1\PPMemCheck.exe
O4 - HKLM\..\Run: [CookiePatrol] C:\PROGRA~1\PESTPA~1\CookiePatrol.exe
O4 - HKLM\..\Run: [WinampAgent] C:\Program Files\Winamp\winampa.exe
O4 - HKLM\..\Run: [THGuard] "C:\Program Files\TrojanHunter 4.2\THGuard.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
O4 - HKCU\..\Run: [TOSCDSPD] C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [LogitechSoftwareUpdate] "C:\Program Files\Logitech\Video\ManifestEngine.exe" boot
O4 - HKCU\..\Run: [LDM] \Program\BackWeb-8876480.exe
O4 - HKCU\..\Run: [Creative Detector] C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe /R
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Logitech Desktop Messenger.lnk = C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LDMConf.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: RAMASST.lnk = C:\WINDOWS\system32\RAMASST.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=39204
O16 - DPF: {4B9F2C37-C0CF-42BC-BB2D-DCFA8B25CABF} (PopCapLoaderCtrl Class) - http://zone.msn.com/...pcaploader1.cab
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://spaces.msn.co...ad/MsnPUpld.cab
O16 - DPF: {56393399-041A-4650-94C7-13DFCB1F4665} (PSFormX Control) - http://www.my-etrust...er/pestscan.cab
O16 - DPF: {85D1F3B2-2A21-11D7-97B9-0010DC2A6243} (SecureLogin class) - http://secure2.comne...login-devel.cab
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zon...nt.cab31267.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn...pDownloader.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/...ro.cab34246.cab
O16 - DPF: {D54160C3-DB7B-4534-9B65-190EE4A9C7F7} (SproutLauncherCtrl Class) - http://zone.msn.com/...outLauncher.cab
O16 - DPF: {D77EF652-9A6B-40C8-A4B9-1C0697C6CF41} (TikGames Online Control) - http://zone.msn.com/.../default/gf.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://zone.msn.com/...aploader_v6.cab
O16 - DPF: {E5D419D6-A846-4514-9FAD-97E826C84822} (HeartbeatCtl Class) - http://fdl.msn.com/z...s/heartbeat.cab
O16 - DPF: {F58E1CEF-A068-4C15-BA5E-587CAF3EE8C6} (MSN Chat Control 4.5) - http://chat.msn.com/...s/msnchat45.cab
O16 - DPF: {F6BF0D00-0B2A-4A75-BF7B-F385591623AF} (Solitaire Showdown Class) - http://messenger.zon...wn.cab31267.cab
O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
O20 - Winlogon Notify: dbjava - C:\WINDOWS\Cursors\dbjava.dll
O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\system32\ACS.exe
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.EXE
O23 - Service: DVD-RAM_Service - Matsushita Electric Industrial Co., Ltd. - C:\WINDOWS\system32\DVDRAMSV.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido\security suite\ewidoguard.exe
O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton Antivirus\navapsvc.exe
O23 - Service: Norton Unerase Protection (NProtectService) - Symantec Corporation - C:\PROGRA~1\NORTON~1\NORTON~2\NPROTECT.EXE
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton Antivirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Speed Disk service - Symantec Corporation - C:\PROGRA~1\NORTON~1\NORTON~2\SPEEDD~1\NOPDB.EXE
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe


And the Ewido Secruity Suite Log

C:\Program Files\PestPatrol\Quarantine\20050405210129.zip/Documents and Settings/Brad Butts/Cookies/brad butts@2o7[2].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050405210129.zip/Documents and Settings/Brad Butts/Cookies/brad butts@advertising[2].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050405210129.zip/Documents and Settings/Brad Butts/Cookies/brad butts@atdmt[2].txt -> Spyware.Cookie.Atdmt : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050405210129.zip/Documents and Settings/Brad Butts/Cookies/brad butts@com[2].txt -> Spyware.Cookie.Com : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050405210129.zip/Documents and Settings/Brad Butts/Cookies/brad butts@doubleclick[1].txt -> Spyware.Cookie.Doubleclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050405210129.zip/Documents and Settings/Brad Butts/Cookies/brad butts@ehg-space.hitbox[2].txt -> Spyware.Cookie.Hitbox : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050405210129.zip/Documents and Settings/Brad Butts/Cookies/brad butts@fastclick[2].txt -> Spyware.Cookie.Fastclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050405210129.zip/Documents and Settings/Brad Butts/Cookies/brad butts@hitbox[2].txt -> Spyware.Cookie.Hitbox : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050405210129.zip/Documents and Settings/Brad Butts/Cookies/brad butts@mediaplex[1].txt -> Spyware.Cookie.Mediaplex : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050405210129.zip/Documents and Settings/Brad Butts/Cookies/brad butts@servedby.advertising[2].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050405210129.zip/Documents and Settings/Brad Butts/Cookies/brad butts@targetnet[2].txt -> Spyware.Cookie.Targetnet : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050405210129.zip/Documents and Settings/Brad Butts/Cookies/brad butts@trafficmp[2].txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050405210129.zip/Documents and Settings/Brad Butts/Cookies/brad butts@tribalfusion[1].txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050405210129.zip/Documents and Settings/Brad Butts/Cookies/brad butts@valueclick[2].txt -> Spyware.Cookie.Valueclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050405210129.zip/Documents and Settings/Brad Butts/Cookies/brad butts@z1.adserver[1].txt -> Spyware.Cookie.Adserver : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@247realmedia[1].txt -> Spyware.Cookie.247realmedia : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@2o7[2].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@advertising[1].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@as-us.falkag[2].txt -> Spyware.Cookie.Falkag : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@atdmt[2].txt -> Spyware.Cookie.Atdmt : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@bfast[2].txt -> Spyware.Cookie.Bfast : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@burstnet[2].txt -> Spyware.Cookie.Burstnet : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@casalemedia[1].txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@com[2].txt -> Spyware.Cookie.Com : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@counter.hitslink[2].txt -> Spyware.Cookie.Hitslink : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@doubleclick[2].txt -> Spyware.Cookie.Doubleclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@ehg.hitbox[2].txt -> Spyware.Cookie.Hitbox : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@fastclick[1].txt -> Spyware.Cookie.Fastclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@fastclick[3].txt -> Spyware.Cookie.Fastclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@hitbox[1].txt -> Spyware.Cookie.Hitbox : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@mediaplex[1].txt -> Spyware.Cookie.Mediaplex : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@servedby.advertising[1].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@statcounter[1].txt -> Spyware.Cookie.Statcounter : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@trafficmp[2].txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@tribalfusion[1].txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@valueclick[1].txt -> Spyware.Cookie.Valueclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050417230143.zip/Documents and Settings/Brad Butts/Cookies/brad butts@z1.adserver[1].txt -> Spyware.Cookie.Adserver : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050418033122.zip/Documents and Settings/Brad Butts/Cookies/brad butts@2o7[2].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050418033122.zip/Documents and Settings/Brad Butts/Cookies/brad butts@advertising[1].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050418033122.zip/Documents and Settings/Brad Butts/Cookies/brad butts@atdmt[2].txt -> Spyware.Cookie.Atdmt : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050418033122.zip/Documents and Settings/Brad Butts/Cookies/brad butts@doubleclick[1].txt -> Spyware.Cookie.Doubleclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050418033122.zip/Documents and Settings/Brad Butts/Cookies/brad butts@mediaplex[1].txt -> Spyware.Cookie.Mediaplex : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050418033122.zip/Documents and Settings/Brad Butts/Cookies/brad butts@questionmarket[1].txt -> Spyware.Cookie.Questionmarket : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050418033122.zip/Documents and Settings/Brad Butts/Cookies/brad butts@servedby.advertising[1].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050418033122.zip/Documents and Settings/Brad Butts/Cookies/brad butts@tribalfusion[1].txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050418033122.zip/Documents and Settings/Brad Butts/Cookies/brad butts@z1.adserver[1].txt -> Spyware.Cookie.Adserver : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050420130156.zip/Documents and Settings/Brad Butts/Cookies/brad butts@2o7[2].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050420130156.zip/Documents and Settings/Brad Butts/Cookies/brad butts@advertising[1].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050420130156.zip/Documents and Settings/Brad Butts/Cookies/brad butts@atdmt[2].txt -> Spyware.Cookie.Atdmt : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050420130156.zip/Documents and Settings/Brad Butts/Cookies/brad butts@bfast[1].txt -> Spyware.Cookie.Bfast : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050420130156.zip/Documents and Settings/Brad Butts/Cookies/brad butts@bluestreak[1].txt -> Spyware.Cookie.Bluestreak : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050420130156.zip/Documents and Settings/Brad Butts/Cookies/brad butts@burstnet[2].txt -> Spyware.Cookie.Burstnet : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050420130156.zip/Documents and Settings/Brad Butts/Cookies/brad butts@casalemedia[1].txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050420130156.zip/Documents and Settings/Brad Butts/Cookies/brad butts@com[2].txt -> Spyware.Cookie.Com : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050420130156.zip/Documents and Settings/Brad Butts/Cookies/brad butts@doubleclick[2].txt -> Spyware.Cookie.Doubleclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050420130156.zip/Documents and Settings/Brad Butts/Cookies/brad butts@fastclick[2].txt -> Spyware.Cookie.Fastclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050420130156.zip/Documents and Settings/Brad Butts/Cookies/brad butts@mediaplex[1].txt -> Spyware.Cookie.Mediaplex : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050420130156.zip/Documents and Settings/Brad Butts/Cookies/brad butts@questionmarket[1].txt -> Spyware.Cookie.Questionmarket : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050420130156.zip/Documents and Settings/Brad Butts/Cookies/brad butts@servedby.advertising[2].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050420130156.zip/Documents and Settings/Brad Butts/Cookies/brad butts@statcounter[1].txt -> Spyware.Cookie.Statcounter : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050420130156.zip/Documents and Settings/Brad Butts/Cookies/brad butts@trafficmp[1].txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050420130156.zip/Documents and Settings/Brad Butts/Cookies/brad butts@tribalfusion[2].txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050420130156.zip/Documents and Settings/Brad Butts/Cookies/brad butts@valueclick[1].txt -> Spyware.Cookie.Valueclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050420130156.zip/Documents and Settings/Brad Butts/Cookies/brad butts@z1.adserver[1].txt -> Spyware.Cookie.Adserver : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@2o7[2].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@advertising[1].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@as-us.falkag[1].txt -> Spyware.Cookie.Falkag : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@atdmt[2].txt -> Spyware.Cookie.Atdmt : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@burstnet[1].txt -> Spyware.Cookie.Burstnet : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@casalemedia[1].txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@centrport[1].txt -> Spyware.Cookie.Centrport : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@com[2].txt -> Spyware.Cookie.Com : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@doubleclick[2].txt -> Spyware.Cookie.Doubleclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@ehg-mybc.hitbox[2].txt -> Spyware.Cookie.Hitbox : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@hitbox[2].txt -> Spyware.Cookie.Hitbox : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@fastclick[2].txt -> Spyware.Cookie.Fastclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@mediaplex[1].txt -> Spyware.Cookie.Mediaplex : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@questionmarket[1].txt -> Spyware.Cookie.Questionmarket : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@servedby.advertising[1].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@statcounter[2].txt -> Spyware.Cookie.Statcounter : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@targetnet[1].txt -> Spyware.Cookie.Targetnet : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@trafficmp[1].txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@tribalfusion[2].txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@valueclick[2].txt -> Spyware.Cookie.Valueclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050504175923.zip/Documents and Settings/Brad Butts/Cookies/brad butts@z1.adserver[1].txt -> Spyware.Cookie.Adserver : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050615175618.zip/Documents and Settings/Brad Butts/Cookies/brad butts@2o7[1].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050615175618.zip/Documents and Settings/Brad Butts/Cookies/brad butts@advertising[1].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050615175618.zip/Documents and Settings/Brad Butts/Cookies/brad butts@atdmt[2].txt -> Spyware.Cookie.Atdmt : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050615175618.zip/Documents and Settings/Brad Butts/Cookies/brad butts@burstnet[2].txt -> Spyware.Cookie.Burstnet : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050615175618.zip/Documents and Settings/Brad Butts/Cookies/brad butts@doubleclick[2].txt -> Spyware.Cookie.Doubleclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050615175618.zip/Documents and Settings/Brad Butts/Cookies/brad butts@ehg-mybc.hitbox[1].txt -> Spyware.Cookie.Hitbox : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050615175618.zip/Documents and Settings/Brad Butts/Cookies/brad butts@hitbox[2].txt -> Spyware.Cookie.Hitbox : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050615175618.zip/Documents and Settings/Brad Butts/Cookies/brad butts@fastclick[2].txt -> Spyware.Cookie.Fastclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050615175618.zip/Documents and Settings/Brad Butts/Cookies/brad butts@mediaplex[1].txt -> Spyware.Cookie.Mediaplex : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050615175618.zip/Documents and Settings/Brad Butts/Cookies/brad butts@questionmarket[1].txt -> Spyware.Cookie.Questionmarket : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050615175618.zip/Documents and Settings/Brad Butts/Cookies/brad butts@servedby.advertising[1].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050615175618.zip/Documents and Settings/Brad Butts/Cookies/brad butts@statse.webtrendslive[2].txt -> Spyware.Cookie.Webtrendslive : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050615175618.zip/Documents and Settings/Brad Butts/Cookies/brad butts@trafficmp[1].txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050615175618.zip/Documents and Settings/Brad Butts/Cookies/brad butts@tribalfusion[1].txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050615175618.zip/Documents and Settings/Brad Butts/Cookies/brad butts@valueclick[2].txt -> Spyware.Cookie.Valueclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050615175618.zip/Documents and Settings/Brad Butts/Cookies/brad butts@valueclick[3].txt -> Spyware.Cookie.Valueclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@2o7[2].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@adtech[2].txt -> Spyware.Cookie.Adtech : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@advertising[2].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@atdmt[2].txt -> Spyware.Cookie.Atdmt : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@bfast[1].txt -> Spyware.Cookie.Bfast : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@bluestreak[2].txt -> Spyware.Cookie.Bluestreak : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@burstnet[1].txt -> Spyware.Cookie.Burstnet : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@casalemedia[1].txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@doubleclick[1].txt -> Spyware.Cookie.Doubleclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@edge.ru4[1].txt -> Spyware.Cookie.Ru4 : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@ehg-bestbuy.hitbox[2].txt -> Spyware.Cookie.Hitbox : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@ehg-dig.hitbox[1].txt -> Spyware.Cookie.Hitbox : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@ehg-mybc.hitbox[1].txt -> Spyware.Cookie.Hitbox : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@hitbox[2].txt -> Spyware.Cookie.Hitbox : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@ehg-space.hitbox[1].txt -> Spyware.Cookie.Hitbox : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@fastclick[2].txt -> Spyware.Cookie.Fastclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@mediaplex[1].txt -> Spyware.Cookie.Mediaplex : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@pro-market[2].txt -> Spyware.Cookie.Pro-market : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@questionmarket[1].txt -> Spyware.Cookie.Questionmarket : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@servedby.advertising[2].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@spylog[1].txt -> Spyware.Cookie.Spylog : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@statcounter[1].txt -> Spyware.Cookie.Statcounter : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@statse.webtrendslive[1].txt -> Spyware.Cookie.Webtrendslive : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@valueclick[2].txt -> Spyware.Cookie.Valueclick : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@weborama[1].txt -> Spyware.Cookie.Weborama : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050625174857.zip/Documents and Settings/Brad Butts/Cookies/brad butts@z1.adserver[2].txt -> Spyware.Cookie.Adserver : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050831182744.zip/Documents and Settings/Brad Butts/Cookies/brad butts@atdmt[1].txt -> Spyware.Cookie.Atdmt : Cleaned with backup
C:\Program Files\PestPatrol\Quarantine\20050902222505.zip/WINDOWS/Downloaded Program Files/popcaploader.dll -> Not-A-Virus.PornWare.PopCap.b : Cleaned with backup
C:\WINDOWS\Cursors\dbjava.dll -> Spyware.Virtumonde : Cleaned with backup
C:\WINDOWS\system32\gebca.dll -> TrojanDownloader.ConHook.k : Cleaned with backup
  • 0

Advertisements


#2
Metallica

Metallica

    Spyware Veteran

  • GeekU Moderator
  • 31,672 posts
Please print these instructions out for use in Safe Mode.

Please download VundoFix.exe to your desktop.
  • Double-click VundoFix.exe to extract the files
  • This will create a VundoFix folder on your desktop.
  • After the files are extracted, please reboot your computer into Safe Mode. You can do this by restarting your computer and continually tapping the F8 key until a menu appears. Use your up arrow key to highlight Safe Mode then hit enter.
  • Once in safe mode open the VundoFix folder and doubleclick on KillVundo.bat
  • You will first be presented with a warning.
    It should look like this

    VundoFix V2.13 by Atri
    By using VundoFix you agree that you are doing so at your own risk
    Press enter to continue....

  • At this point press enter one time.
  • Next you will see:

    Type in the filepath as instructed by the forum staff
    Then Press Enter, Then F6, Then Enter Again to continue with the fix.

  • At this point please type the following file path (make sure to enter it exactly as below!):
    • C:\WINDOWS\Cursors\dbjava.dll
  • Press Enter, then press the F6 key, then press Enter one more time to continue with the fix.
  • Next you will see:

    Please type in the second filepath as instructed by the forum staff
    Then Press Enter, Then F6, Then Enter Again to continue with the fix.

  • At this point please type the following file path (make sure to enter it exactly as below!):C:\WINDOWS\Cursors\avajbd.*
    This will be the vundo filename spelt backwards. for example if the vundo dll was vundo.dll you would have the user enter odnuv.*
  • Press Enter, then press the F6 key, then press Enter one more time to continue with the fix.
  • The fix will run then HijackThis will open.
  • In HiJackThis, please place a check next to the following items and click FIX CHECKED:
    O2 - BHO: MSEvents Object - {827DC836-DD9F-4A68-A602-5812EB50A834} - C:\WINDOWS\Cursors\dbjava.dll

    O4 - HKCU\..\Run: [LDM] \Program\BackWeb-8876480.exe

    O4 - Global Startup: Logitech Desktop Messenger.lnk = C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LDMConf.exe

    O20 - Winlogon Notify: dbjava - C:\WINDOWS\Cursors\dbjava.dll
  • After you have fixed these items, close Hijackthis and Press any key to Force a reboot of your computer.
  • Pressing any key will cause a "Blue Screen of Death" this is normal, do not worry!
  • Once your machine reboots please continue with the instructions below.
Download and install CleanUp!

Open Cleanup! by double-clicking the icon on your desktop (or from the Start > All Programs menu).
Set the program up as follows:
Click "Options..."
Move the arrow down to "Custom CleanUp!"
Put a check next to the following (Make sure nothing else is checked!):
  • Empty Recycle Bins
  • Delete Cookies
  • Delete Prefetch files
  • Cleanup! All Users
Click OK
Press the CleanUp! button to start the program.

It may ask you to reboot at the end, click NO.

Then, please run this online virus scan: ActiveScan

Copy the results of the ActiveScan and paste them here along with a new HiJackThis log and the vundofix.txt file from the vundofix folder into this topic.

Regards,
  • 0

#3
buttsy

buttsy

    Member

  • Topic Starter
  • Member
  • PipPip
  • 10 posts
Activescan results:

Detected Disinfected
Virus 0 0
Spyware 0 0
Hacking Tools 0 0
Dialers 0 0
Security Risks 0 0
Suspicious files 0 0


Logfile of HijackThis v1.99.1
Scan saved at 7:55:02 AM, on 10/8/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\ACS.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\WINDOWS\system32\CTsvcCDA.EXE
C:\WINDOWS\system32\DVDRAMSV.exe
C:\Program Files\Norton SystemWorks\Norton Antivirus\navapsvc.exe
C:\PROGRA~1\NORTON~1\NORTON~2\NPROTECT.EXE
C:\WINDOWS\Explorer.EXE
C:\Program Files\Norton SystemWorks\Norton Antivirus\SAVScan.exe
C:\PROGRA~1\NORTON~1\NORTON~2\SPEEDD~1\NOPDB.EXE
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
C:\WINDOWS\System32\ZoomingHook.exe
C:\WINDOWS\System32\TCtrlIOHook.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
C:\WINDOWS\system32\TPSMain.exe
C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
C:\Program Files\ltmoh\Ltmoh.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\Atheros\ACU.exe
C:\WINDOWS\system32\LVCOMSX.EXE
C:\Program Files\Logitech\Video\LogiTray.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\PESTPA~1\PPMemCheck.exe
C:\PROGRA~1\PESTPA~1\CookiePatrol.exe
C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Program Files\Logitech\Video\FxSvr2.exe
C:\WINDOWS\system32\RAMASST.exe
C:\WINDOWS\system32\TPSBattM.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Messenger\msmsgs.exe
C:\Documents and Settings\Brad Butts\Desktop\hjthis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.ca/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton SystemWorks\Norton Antivirus\NavShExt.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton SystemWorks\Norton Antivirus\NavShExt.dll
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [CeEKEY] C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
O4 - HKLM\..\Run: [TPNF] C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
O4 - HKLM\..\Run: [ZoomingHook] c:\WINDOWS\System32\ZoomingHook.exe
O4 - HKLM\..\Run: [TCtryIOHook] c:\WINDOWS\System32\TCtrlIOHook.exe
O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
O4 - HKLM\..\Run: [PadTouch] C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
O4 - HKLM\..\Run: [TPSMain] TPSMain.exe
O4 - HKLM\..\Run: [SmoothView] C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
O4 - HKLM\..\Run: [TFncKy] C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
O4 - HKLM\..\Run: [LtMoh] C:\\Program Files\\ltmoh\\Ltmoh.exe
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [ACU] "C:\Program Files\Atheros\ACU.exe" -nogui
O4 - HKLM\..\Run: [LVCOMSX] C:\WINDOWS\system32\LVCOMSX.EXE
O4 - HKLM\..\Run: [LogitechVideoRepair] C:\Program Files\Logitech\Video\ISStart.exe
O4 - HKLM\..\Run: [LogitechVideoTray] C:\Program Files\Logitech\Video\LogiTray.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
O4 - HKLM\..\Run: [PPMemCheck] C:\PROGRA~1\PESTPA~1\PPMemCheck.exe
O4 - HKLM\..\Run: [CookiePatrol] C:\PROGRA~1\PESTPA~1\CookiePatrol.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
O4 - HKCU\..\Run: [TOSCDSPD] C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [LogitechSoftwareUpdate] "C:\Program Files\Logitech\Video\ManifestEngine.exe" boot
O4 - HKCU\..\Run: [Creative Detector] C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe /R
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: RAMASST.lnk = C:\WINDOWS\system32\RAMASST.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=39204
O16 - DPF: {4B9F2C37-C0CF-42BC-BB2D-DCFA8B25CABF} (PopCapLoaderCtrl Class) - http://zone.msn.com/...pcaploader1.cab
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://spaces.msn.co...ad/MsnPUpld.cab
O16 - DPF: {56393399-041A-4650-94C7-13DFCB1F4665} (PSFormX Control) - http://www.my-etrust...er/pestscan.cab
O16 - DPF: {85D1F3B2-2A21-11D7-97B9-0010DC2A6243} (SecureLogin class) - http://secure2.comne...login-devel.cab
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zon...nt.cab31267.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoft...free/asinst.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn...pDownloader.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/...ro.cab34246.cab
O16 - DPF: {D54160C3-DB7B-4534-9B65-190EE4A9C7F7} (SproutLauncherCtrl Class) - http://zone.msn.com/...outLauncher.cab
O16 - DPF: {D77EF652-9A6B-40C8-A4B9-1C0697C6CF41} (TikGames Online Control) - http://zone.msn.com/.../default/gf.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://zone.msn.com/...aploader_v6.cab
O16 - DPF: {E5D419D6-A846-4514-9FAD-97E826C84822} (HeartbeatCtl Class) - http://fdl.msn.com/z...s/heartbeat.cab
O16 - DPF: {F58E1CEF-A068-4C15-BA5E-587CAF3EE8C6} (MSN Chat Control 4.5) - http://chat.msn.com/...s/msnchat45.cab
O16 - DPF: {F6BF0D00-0B2A-4A75-BF7B-F385591623AF} (Solitaire Showdown Class) - http://messenger.zon...wn.cab31267.cab
O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\system32\ACS.exe
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.EXE
O23 - Service: DVD-RAM_Service - Matsushita Electric Industrial Co., Ltd. - C:\WINDOWS\system32\DVDRAMSV.exe
O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton Antivirus\navapsvc.exe
O23 - Service: Norton Unerase Protection (NProtectService) - Symantec Corporation - C:\PROGRA~1\NORTON~1\NORTON~2\NPROTECT.EXE
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton Antivirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Speed Disk service - Symantec Corporation - C:\PROGRA~1\NORTON~1\NORTON~2\SPEEDD~1\NOPDB.EXE
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe


Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 Craig.Peacock@beyondlogic.org
Suspending PID 136 'smss.exe'
Threads [140][144][148]

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 Craig.Peacock@beyondlogic.org
Killing PID 792 'explorer.exe'
Killing PID 792 'explorer.exe'

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 Craig.Peacock@beyondlogic.org
Error, Cannot find a process with an image name of rundll32.exe

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 Craig.Peacock@beyondlogic.org
Killing PID 212 'winlogon.exe'
Killing PID 212 'winlogon.exe'
File Deleted sucessfully.
Files Deleted sucessfully.
  • 0

#4
Metallica

Metallica

    Spyware Veteran

  • GeekU Moderator
  • 31,672 posts
Wow. :)

Strike. :tazz:

Is your computer behaving allright now?

Please do have a look at my site about removing and preventing spyware.

Regards,
  • 0

#5
buttsy

buttsy

    Member

  • Topic Starter
  • Member
  • PipPip
  • 10 posts
Well, it appears to be working just fine... Thanks for the help, that nearly drove me round the bend...

Cheers,
BB
  • 0

#6
Metallica

Metallica

    Spyware Veteran

  • GeekU Moderator
  • 31,672 posts
Since this issue appears to be resolved ... this Topic has been closed. Glad we could help. :tazz:

If you're the topic starter, and need this topic reopened, please contact a staff member with the address of the thread.

Everyone else please begin a New Topic.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP