help help help
pokapoka69.exe
Started by
atw_1972
, Sep 21 2005 02:18 PM
#1
Posted 21 September 2005 - 02:18 PM
help help help
#2
Posted 21 September 2005 - 02:42 PM
i have done my home works so please help me
this is ewido log and after that is hijackthis log
ewido log :
_________________________________________________
ewido security suite online scanner
http://www.ewido.net
__________________________________________________
Name: Spyware.Cookie.Clickhype
Path: C:\Documents and Settings\Rwahdan\Cookies\[email protected][1].txt
Risk: Medium
Name: Spyware.Cookie.Pointroll
Path: C:\Documents and Settings\Rwahdan\Cookies\[email protected][2].txt
Risk: Medium
Name: Spyware.Cookie.Com
Path: C:\Documents and Settings\Rwahdan\Cookies\atw@com[2].txt
Risk: Medium
Name: Spyware.Cookie.Clickzs
Path: C:\Documents and Settings\Rwahdan\Cookies\[email protected][2].txt
Risk: Medium
Name: Spyware.Cookie.Masterstats
Path: C:\Documents and Settings\Rwahdan\Cookies\[email protected][1].txt
Risk: Medium
Name: Spyware.Cookie.Mediaplex
Path: C:\Documents and Settings\Rwahdan\Cookies\atw@mediaplex[1].txt
Risk: Medium
Name: Spyware.Cookie.Clickzs
Path: C:\Documents and Settings\Rwahdan\Cookies\[email protected][2].txt
Risk: Medium
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\ADM.ADM
Risk: High
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\ADM.ADM\CLSID
Risk: High
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\ADM.ADM\CurVer
Risk: High
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\AppID\adm.EXE
Risk: High
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\AppID\Altnet Signing Module.EXE
Risk: High
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\AppID\{8B0FEF15-54DC-49F5-8377-8172DE975F75}
Risk: High
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\AppID\{99A8E2B2-3405-4C0D-9110-131C14CAAF62}
Risk: High
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\SigningModule.SigningModule
Risk: High
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\SigningModule.SigningModule\CLSID
Risk: High
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\SigningModule.SigningModule\CurVer
Risk: High
Name: Spyware.Syslibie
Path: HKU\S-1-5-21-1606980848-839522115-682003330-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{F195A1A9-4033-4E5B-B85C-848C3E31A83A}
Risk: High
Name: Spyware.EliteBar
Path: [660] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [704] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [1580] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [1616] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [1644] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [1656] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [1776] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [1928] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [1012] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2004] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [1772] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2052] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2060] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2068] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2080] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2104] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2168] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2260] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2284] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2352] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2388] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2408] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2888] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2856] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [980] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [3292] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: TrojanDropper.Agent.qz
Path: C:\Documents and Settings\All Users\Application Data\SecTaskMan\pokapoka61.exe.q_4040_q
Risk: High
Name: Spyware.Cookie.Sexcounter
Path: C:\Documents and Settings\Rwahdan\Local Settings\Temp\XoftSpyBackup\3
Risk: Medium
Name: Spyware.Lop
Path: C:\Program Files\C2Media\Setup.exe
Risk: High
Name: Spyware.Cookie.Sexcounter
Path: C:\Program Files\XoftSpy\Quarantine\XoftSpyBackup.zip/3
Risk: Medium
Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0042297.dll
Risk: High
Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0042306.dll
Risk: High
Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0042325.dll
Risk: High
Name: TrojanDropper.Agent.qz
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0042334.exe
Risk: High
Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0042335.dll
Risk: High
Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0043350.dll
Risk: High
Name: TrojanDropper.Agent.qz
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0044348.exe
Risk: High
Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0044351.dll
Risk: High
Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0044353.dll
Risk: High
Name: TrojanDropper.Agent.qz
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0044390.exe
Risk: High
Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0044393.dll
Risk: High
Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0044395.dll
Risk: High
Name: TrojanDropper.Agent.qz
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP179\A0044416.exe
Risk: High
Name: Spyware.EliteBar
Path: C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: C:\WINDOWS\etb\xud2f.dll
Risk: High
Name: TrojanDropper.Agent.qz
Path: C:\WINDOWS\system32\ntdll.exe
Risk: High
Name: Spyware.Altnet
Path: C:\WINDOWS\Temp\Altnet\adm4.dll
Risk: High
Name: Spyware.Altnet
Path: C:\WINDOWS\Temp\Altnet\dmfiles.cab/AltnetUninstall.exe
Risk: High
Name: Spyware.Altnet
Path: C:\WINDOWS\Temp\Altnet\dmfiles.cab/asmend.exe
Risk: High
Name: Spyware.Altnet
Path: C:\WINDOWS\Temp\Altnet\pmexe.cab/Points Manager.exe
Risk: High
Name: Spyware.Altnet
Path: C:\WINDOWS\Temp\Altnet\pmfiles.cab/setup.cab/PMuninstall.bde
Risk: High
Name: Adware.BrilliantDigital
Path: C:\WINDOWS\Temp\Altnet\pmfiles.cab/sysdetect.dll
Risk: Medium
Name: Dialer.Generic
Path: C:\WINDOWS\UnitedArabEmirates.exe
Risk: High
hijackthis log :
Logfile of HijackThis v1.99.1
Scan saved at 12:38:10 AM, on 9/22/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
C:\Program Files\Network Associates\VirusScan\Mcshield.exe
C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
C:\PROGRA~1\NETWOR~1\COMMON~1\naPrdMgr.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\WINDOWS\System32\alg.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe
C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe
C:\Program Files\MessengerPlus! 3\MsgPlus.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\HP\hpcoretech\hpcmpmgr.exe
C:\Program Files\D-Tools\daemon.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\HP\Digital Imaging\bin\hpqgalry.exe
C:\Program Files\eMule\emule.exe
C:\WINDOWS\explorer.exe
C:\Documents and Settings\Rwahdan\Desktop\HijackThis.exe
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = localhost:4001
O4 - HKLM\..\Run: [XoftSpy] C:\Program Files\XoftSpy\XoftSpy.exe -s
O4 - HKLM\..\Run: [bluestart] C:\\rraut.exe
O4 - HKLM\..\Run: [InstaFinderK] C:\Program Files\INSTAFINK\InstaFinderK_inst.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
O4 - HKLM\..\Run: [McAfeeUpdaterUI] "C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" /StartedFromRunKey
O4 - HKLM\..\Run: [Network Associates Error Reporting Service] "C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe"
O4 - HKLM\..\Run: [MessengerPlus3] "C:\Program Files\MessengerPlus! 3\MsgPlus.exe"
O4 - HKLM\..\Run: [HP Software Update] "C:\Program Files\HP\HP Software Update\HPWuSchd2.exe"
O4 - HKLM\..\Run: [HP Component Manager] "C:\Program Files\HP\hpcoretech\hpcmpmgr.exe"
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [DAEMON Tools-1033] "C:\Program Files\D-Tools\daemon.exe" -lang 1033
O4 - HKLM\..\Run: [Error Nuker] f:\Program Files\Error Nuker\bin\ErrorNuker.exe autostart
O4 - HKLM\..\Run: [Windows Spooler] C:\WINDOWS\system32\spoolsv32.exe
O4 - HKLM\..\Run: [Windows DLL Host] C:\WINDOWS\system32\dllhost32.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
O4 - HKCU\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NVMCTRAY.DLL,NvTaskbarInit
O4 - HKCU\..\Run: [SpyKiller] C:\Program Files\SpyKiller\spykiller.exe /startup
O4 - HKCU\..\Run: [BestPopUpKiller] C:\Program Files\BestPopUpKiller\BestPopupKiller.exe /startup
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: HP Image Zone Fast Start.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: Backward &Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cac&hed Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Download All by FlashGet - C:\Program Files\FlashGet\jc_all.htm
O8 - Extra context menu item: Download Images by Super Picture Finder Grabber - C:\Program Files\Super Picture Finder Grabber\pf_link.htm
O8 - Extra context menu item: Download using FlashGet - C:\Program Files\FlashGet\jc_link.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O8 - Extra context menu item: Si&milar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe
O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {15589FA1-C456-11CE-BF01-000000000000} - http://www.errornuke...erInstaller.exe
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage) - http://go.microsoft....467&clcid=0x409
O16 - DPF: {193C772A-87BE-4B19-A7BB-445B226FE9A1} (ewidoOnlineScan Control) - http://download.ewid...oOnlineScan.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.micros...b?1121875602500
O16 - DPF: {6924091F-CD97-41E1-B1D4-D9079409D413} (IMCv1 Control) - http://70.84.73.148:1995/talk.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn...pDownloader.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://download.game...aploader_v6.cab
O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
O23 - Service: McAfee Framework Service (McAfeeFramework) - Network Associates, Inc. - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
O23 - Service: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\Mcshield.exe
O23 - Service: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
please help me ASAP
tks
this is ewido log and after that is hijackthis log
ewido log :
_________________________________________________
ewido security suite online scanner
http://www.ewido.net
__________________________________________________
Name: Spyware.Cookie.Clickhype
Path: C:\Documents and Settings\Rwahdan\Cookies\[email protected][1].txt
Risk: Medium
Name: Spyware.Cookie.Pointroll
Path: C:\Documents and Settings\Rwahdan\Cookies\[email protected][2].txt
Risk: Medium
Name: Spyware.Cookie.Com
Path: C:\Documents and Settings\Rwahdan\Cookies\atw@com[2].txt
Risk: Medium
Name: Spyware.Cookie.Clickzs
Path: C:\Documents and Settings\Rwahdan\Cookies\[email protected][2].txt
Risk: Medium
Name: Spyware.Cookie.Masterstats
Path: C:\Documents and Settings\Rwahdan\Cookies\[email protected][1].txt
Risk: Medium
Name: Spyware.Cookie.Mediaplex
Path: C:\Documents and Settings\Rwahdan\Cookies\atw@mediaplex[1].txt
Risk: Medium
Name: Spyware.Cookie.Clickzs
Path: C:\Documents and Settings\Rwahdan\Cookies\[email protected][2].txt
Risk: Medium
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\ADM.ADM
Risk: High
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\ADM.ADM\CLSID
Risk: High
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\ADM.ADM\CurVer
Risk: High
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\AppID\adm.EXE
Risk: High
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\AppID\Altnet Signing Module.EXE
Risk: High
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\AppID\{8B0FEF15-54DC-49F5-8377-8172DE975F75}
Risk: High
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\AppID\{99A8E2B2-3405-4C0D-9110-131C14CAAF62}
Risk: High
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\SigningModule.SigningModule
Risk: High
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\SigningModule.SigningModule\CLSID
Risk: High
Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\SigningModule.SigningModule\CurVer
Risk: High
Name: Spyware.Syslibie
Path: HKU\S-1-5-21-1606980848-839522115-682003330-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{F195A1A9-4033-4E5B-B85C-848C3E31A83A}
Risk: High
Name: Spyware.EliteBar
Path: [660] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [704] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [1580] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [1616] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [1644] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [1656] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [1776] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [1928] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [1012] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2004] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [1772] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2052] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2060] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2068] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2080] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2104] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2168] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2260] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2284] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2352] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2388] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2408] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2888] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [2856] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [980] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: [3292] C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: TrojanDropper.Agent.qz
Path: C:\Documents and Settings\All Users\Application Data\SecTaskMan\pokapoka61.exe.q_4040_q
Risk: High
Name: Spyware.Cookie.Sexcounter
Path: C:\Documents and Settings\Rwahdan\Local Settings\Temp\XoftSpyBackup\3
Risk: Medium
Name: Spyware.Lop
Path: C:\Program Files\C2Media\Setup.exe
Risk: High
Name: Spyware.Cookie.Sexcounter
Path: C:\Program Files\XoftSpy\Quarantine\XoftSpyBackup.zip/3
Risk: Medium
Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0042297.dll
Risk: High
Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0042306.dll
Risk: High
Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0042325.dll
Risk: High
Name: TrojanDropper.Agent.qz
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0042334.exe
Risk: High
Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0042335.dll
Risk: High
Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0043350.dll
Risk: High
Name: TrojanDropper.Agent.qz
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0044348.exe
Risk: High
Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0044351.dll
Risk: High
Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0044353.dll
Risk: High
Name: TrojanDropper.Agent.qz
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0044390.exe
Risk: High
Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0044393.dll
Risk: High
Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0044395.dll
Risk: High
Name: TrojanDropper.Agent.qz
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP179\A0044416.exe
Risk: High
Name: Spyware.EliteBar
Path: C:\WINDOWS\etb\nt_hide61.dll
Risk: High
Name: Spyware.EliteBar
Path: C:\WINDOWS\etb\xud2f.dll
Risk: High
Name: TrojanDropper.Agent.qz
Path: C:\WINDOWS\system32\ntdll.exe
Risk: High
Name: Spyware.Altnet
Path: C:\WINDOWS\Temp\Altnet\adm4.dll
Risk: High
Name: Spyware.Altnet
Path: C:\WINDOWS\Temp\Altnet\dmfiles.cab/AltnetUninstall.exe
Risk: High
Name: Spyware.Altnet
Path: C:\WINDOWS\Temp\Altnet\dmfiles.cab/asmend.exe
Risk: High
Name: Spyware.Altnet
Path: C:\WINDOWS\Temp\Altnet\pmexe.cab/Points Manager.exe
Risk: High
Name: Spyware.Altnet
Path: C:\WINDOWS\Temp\Altnet\pmfiles.cab/setup.cab/PMuninstall.bde
Risk: High
Name: Adware.BrilliantDigital
Path: C:\WINDOWS\Temp\Altnet\pmfiles.cab/sysdetect.dll
Risk: Medium
Name: Dialer.Generic
Path: C:\WINDOWS\UnitedArabEmirates.exe
Risk: High
hijackthis log :
Logfile of HijackThis v1.99.1
Scan saved at 12:38:10 AM, on 9/22/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
C:\Program Files\Network Associates\VirusScan\Mcshield.exe
C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
C:\PROGRA~1\NETWOR~1\COMMON~1\naPrdMgr.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\WINDOWS\System32\alg.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe
C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe
C:\Program Files\MessengerPlus! 3\MsgPlus.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\HP\hpcoretech\hpcmpmgr.exe
C:\Program Files\D-Tools\daemon.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\HP\Digital Imaging\bin\hpqgalry.exe
C:\Program Files\eMule\emule.exe
C:\WINDOWS\explorer.exe
C:\Documents and Settings\Rwahdan\Desktop\HijackThis.exe
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = localhost:4001
O4 - HKLM\..\Run: [XoftSpy] C:\Program Files\XoftSpy\XoftSpy.exe -s
O4 - HKLM\..\Run: [bluestart] C:\\rraut.exe
O4 - HKLM\..\Run: [InstaFinderK] C:\Program Files\INSTAFINK\InstaFinderK_inst.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
O4 - HKLM\..\Run: [McAfeeUpdaterUI] "C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" /StartedFromRunKey
O4 - HKLM\..\Run: [Network Associates Error Reporting Service] "C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe"
O4 - HKLM\..\Run: [MessengerPlus3] "C:\Program Files\MessengerPlus! 3\MsgPlus.exe"
O4 - HKLM\..\Run: [HP Software Update] "C:\Program Files\HP\HP Software Update\HPWuSchd2.exe"
O4 - HKLM\..\Run: [HP Component Manager] "C:\Program Files\HP\hpcoretech\hpcmpmgr.exe"
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [DAEMON Tools-1033] "C:\Program Files\D-Tools\daemon.exe" -lang 1033
O4 - HKLM\..\Run: [Error Nuker] f:\Program Files\Error Nuker\bin\ErrorNuker.exe autostart
O4 - HKLM\..\Run: [Windows Spooler] C:\WINDOWS\system32\spoolsv32.exe
O4 - HKLM\..\Run: [Windows DLL Host] C:\WINDOWS\system32\dllhost32.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
O4 - HKCU\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NVMCTRAY.DLL,NvTaskbarInit
O4 - HKCU\..\Run: [SpyKiller] C:\Program Files\SpyKiller\spykiller.exe /startup
O4 - HKCU\..\Run: [BestPopUpKiller] C:\Program Files\BestPopUpKiller\BestPopupKiller.exe /startup
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: HP Image Zone Fast Start.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: Backward &Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cac&hed Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Download All by FlashGet - C:\Program Files\FlashGet\jc_all.htm
O8 - Extra context menu item: Download Images by Super Picture Finder Grabber - C:\Program Files\Super Picture Finder Grabber\pf_link.htm
O8 - Extra context menu item: Download using FlashGet - C:\Program Files\FlashGet\jc_link.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O8 - Extra context menu item: Si&milar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe
O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {15589FA1-C456-11CE-BF01-000000000000} - http://www.errornuke...erInstaller.exe
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage) - http://go.microsoft....467&clcid=0x409
O16 - DPF: {193C772A-87BE-4B19-A7BB-445B226FE9A1} (ewidoOnlineScan Control) - http://download.ewid...oOnlineScan.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.micros...b?1121875602500
O16 - DPF: {6924091F-CD97-41E1-B1D4-D9079409D413} (IMCv1 Control) - http://70.84.73.148:1995/talk.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn...pDownloader.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://download.game...aploader_v6.cab
O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
O23 - Service: McAfee Framework Service (McAfeeFramework) - Network Associates, Inc. - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
O23 - Service: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\Mcshield.exe
O23 - Service: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
please help me ASAP
tks
#3
Posted 24 September 2005 - 05:19 PM
Welcome atw_1972 to Geeks to Go!
Let's take this one step at the time.
Download LQfix.exe and place it on your desktop.
Doubleclick LQfix.exe and click install.
This will create a new folder called LQfix on your desktop.
Open the folder and doubleclick ClickThis.bat
Follow the prompts on the screen.
Your system will reboot afterwards.
Please be patient after reboot, because there is a script running in the background.
Post back with a fresh HijackThis log so we can move on to the next step.
EDIT:
As there has been no reply from the original poster for more than two weeks this topic is now closed.
If you are the original poster and still need assistance, please send me a PM.
Let's take this one step at the time.
Download LQfix.exe and place it on your desktop.
Doubleclick LQfix.exe and click install.
This will create a new folder called LQfix on your desktop.
Open the folder and doubleclick ClickThis.bat
Follow the prompts on the screen.
Your system will reboot afterwards.
Please be patient after reboot, because there is a script running in the background.
Post back with a fresh HijackThis log so we can move on to the next step.
EDIT:
As there has been no reply from the original poster for more than two weeks this topic is now closed.
If you are the original poster and still need assistance, please send me a PM.
Edited by g2i2r4, 15 October 2005 - 04:12 PM.
Similar Topics
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users