Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

pokapoka69.exe


  • This topic is locked This topic is locked

#1
atw_1972

atw_1972

    New Member

  • Member
  • Pip
  • 2 posts
according to my computer I've tried to delete this file, pokapoka69.exe does not exist on my computer. However, it still manages to appear in task manager as a running process, no matter how many times I try and fix it, everytime it scans. There's also a .dll file that refuses to be deleted (nrevtmgr.dll). Everytime I try to my desktop disappears, and it won't delete at startup. And there are all those annoying pop ups.


help help help

:) :) :tazz: :)
  • 0

Advertisements


#2
atw_1972

atw_1972

    New Member

  • Topic Starter
  • Member
  • Pip
  • 2 posts
i have done my home works so please help me

this is ewido log and after that is hijackthis log

ewido log :

_________________________________________________
ewido security suite online scanner
http://www.ewido.net
__________________________________________________


Name: Spyware.Cookie.Clickhype
Path: C:\Documents and Settings\Rwahdan\Cookies\atw@ad1.clickhype[1].txt
Risk: Medium

Name: Spyware.Cookie.Pointroll
Path: C:\Documents and Settings\Rwahdan\Cookies\atw@ads.pointroll[2].txt
Risk: Medium

Name: Spyware.Cookie.Com
Path: C:\Documents and Settings\Rwahdan\Cookies\atw@com[2].txt
Risk: Medium

Name: Spyware.Cookie.Clickzs
Path: C:\Documents and Settings\Rwahdan\Cookies\atw@cz7.clickzs[2].txt
Risk: Medium

Name: Spyware.Cookie.Masterstats
Path: C:\Documents and Settings\Rwahdan\Cookies\atw@image.masterstats[1].txt
Risk: Medium

Name: Spyware.Cookie.Mediaplex
Path: C:\Documents and Settings\Rwahdan\Cookies\atw@mediaplex[1].txt
Risk: Medium

Name: Spyware.Cookie.Clickzs
Path: C:\Documents and Settings\Rwahdan\Cookies\atw@vip.clickzs[2].txt
Risk: Medium

Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\ADM.ADM
Risk: High

Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\ADM.ADM\CLSID
Risk: High

Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\ADM.ADM\CurVer
Risk: High

Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\AppID\adm.EXE
Risk: High

Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\AppID\Altnet Signing Module.EXE
Risk: High

Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\AppID\{8B0FEF15-54DC-49F5-8377-8172DE975F75}
Risk: High

Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\AppID\{99A8E2B2-3405-4C0D-9110-131C14CAAF62}
Risk: High

Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\SigningModule.SigningModule
Risk: High

Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\SigningModule.SigningModule\CLSID
Risk: High

Name: Spyware.Altnet
Path: HKLM\SOFTWARE\Classes\SigningModule.SigningModule\CurVer
Risk: High

Name: Spyware.Syslibie
Path: HKU\S-1-5-21-1606980848-839522115-682003330-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{F195A1A9-4033-4E5B-B85C-848C3E31A83A}
Risk: High

Name: Spyware.EliteBar
Path: [660] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [704] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [1580] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [1616] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [1644] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [1656] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [1776] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [1928] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [1012] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [2004] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [1772] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [2052] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [2060] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [2068] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [2080] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [2104] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [2168] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [2260] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [2284] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [2352] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [2388] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [2408] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [2888] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [2856] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [980] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: [3292] C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: TrojanDropper.Agent.qz
Path: C:\Documents and Settings\All Users\Application Data\SecTaskMan\pokapoka61.exe.q_4040_q
Risk: High

Name: Spyware.Cookie.Sexcounter
Path: C:\Documents and Settings\Rwahdan\Local Settings\Temp\XoftSpyBackup\3
Risk: Medium

Name: Spyware.Lop
Path: C:\Program Files\C2Media\Setup.exe
Risk: High

Name: Spyware.Cookie.Sexcounter
Path: C:\Program Files\XoftSpy\Quarantine\XoftSpyBackup.zip/3
Risk: Medium

Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0042297.dll
Risk: High

Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0042306.dll
Risk: High

Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0042325.dll
Risk: High

Name: TrojanDropper.Agent.qz
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0042334.exe
Risk: High

Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0042335.dll
Risk: High

Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0043350.dll
Risk: High

Name: TrojanDropper.Agent.qz
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0044348.exe
Risk: High

Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0044351.dll
Risk: High

Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0044353.dll
Risk: High

Name: TrojanDropper.Agent.qz
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0044390.exe
Risk: High

Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0044393.dll
Risk: High

Name: Spyware.EliteBar
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP178\A0044395.dll
Risk: High

Name: TrojanDropper.Agent.qz
Path: C:\System Volume Information\_restore{BEA53F4D-CC42-4733-BB51-5991F43092BC}\RP179\A0044416.exe
Risk: High

Name: Spyware.EliteBar
Path: C:\WINDOWS\etb\nt_hide61.dll
Risk: High

Name: Spyware.EliteBar
Path: C:\WINDOWS\etb\xud2f.dll
Risk: High

Name: TrojanDropper.Agent.qz
Path: C:\WINDOWS\system32\ntdll.exe
Risk: High

Name: Spyware.Altnet
Path: C:\WINDOWS\Temp\Altnet\adm4.dll
Risk: High

Name: Spyware.Altnet
Path: C:\WINDOWS\Temp\Altnet\dmfiles.cab/AltnetUninstall.exe
Risk: High

Name: Spyware.Altnet
Path: C:\WINDOWS\Temp\Altnet\dmfiles.cab/asmend.exe
Risk: High

Name: Spyware.Altnet
Path: C:\WINDOWS\Temp\Altnet\pmexe.cab/Points Manager.exe
Risk: High

Name: Spyware.Altnet
Path: C:\WINDOWS\Temp\Altnet\pmfiles.cab/setup.cab/PMuninstall.bde
Risk: High

Name: Adware.BrilliantDigital
Path: C:\WINDOWS\Temp\Altnet\pmfiles.cab/sysdetect.dll
Risk: Medium

Name: Dialer.Generic
Path: C:\WINDOWS\UnitedArabEmirates.exe
Risk: High

hijackthis log :

Logfile of HijackThis v1.99.1
Scan saved at 12:38:10 AM, on 9/22/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
C:\Program Files\Network Associates\VirusScan\Mcshield.exe
C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
C:\PROGRA~1\NETWOR~1\COMMON~1\naPrdMgr.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\WINDOWS\System32\alg.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe
C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe
C:\Program Files\MessengerPlus! 3\MsgPlus.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\HP\hpcoretech\hpcmpmgr.exe
C:\Program Files\D-Tools\daemon.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\HP\Digital Imaging\bin\hpqgalry.exe
C:\Program Files\eMule\emule.exe
C:\WINDOWS\explorer.exe
C:\Documents and Settings\Rwahdan\Desktop\HijackThis.exe

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = localhost:4001
O4 - HKLM\..\Run: [XoftSpy] C:\Program Files\XoftSpy\XoftSpy.exe -s
O4 - HKLM\..\Run: [bluestart] C:\\rraut.exe
O4 - HKLM\..\Run: [InstaFinderK] C:\Program Files\INSTAFINK\InstaFinderK_inst.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
O4 - HKLM\..\Run: [McAfeeUpdaterUI] "C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" /StartedFromRunKey
O4 - HKLM\..\Run: [Network Associates Error Reporting Service] "C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe"
O4 - HKLM\..\Run: [MessengerPlus3] "C:\Program Files\MessengerPlus! 3\MsgPlus.exe"
O4 - HKLM\..\Run: [HP Software Update] "C:\Program Files\HP\HP Software Update\HPWuSchd2.exe"
O4 - HKLM\..\Run: [HP Component Manager] "C:\Program Files\HP\hpcoretech\hpcmpmgr.exe"
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [DAEMON Tools-1033] "C:\Program Files\D-Tools\daemon.exe" -lang 1033
O4 - HKLM\..\Run: [Error Nuker] f:\Program Files\Error Nuker\bin\ErrorNuker.exe autostart
O4 - HKLM\..\Run: [Windows Spooler] C:\WINDOWS\system32\spoolsv32.exe
O4 - HKLM\..\Run: [Windows DLL Host] C:\WINDOWS\system32\dllhost32.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
O4 - HKCU\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NVMCTRAY.DLL,NvTaskbarInit
O4 - HKCU\..\Run: [SpyKiller] C:\Program Files\SpyKiller\spykiller.exe /startup
O4 - HKCU\..\Run: [BestPopUpKiller] C:\Program Files\BestPopUpKiller\BestPopupKiller.exe /startup
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: HP Image Zone Fast Start.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: Backward &Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cac&hed Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Download All by FlashGet - C:\Program Files\FlashGet\jc_all.htm
O8 - Extra context menu item: Download Images by Super Picture Finder Grabber - C:\Program Files\Super Picture Finder Grabber\pf_link.htm
O8 - Extra context menu item: Download using FlashGet - C:\Program Files\FlashGet\jc_link.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O8 - Extra context menu item: Si&milar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe
O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {15589FA1-C456-11CE-BF01-000000000000} - http://www.errornuke...erInstaller.exe
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage) - http://go.microsoft....467&clcid=0x409
O16 - DPF: {193C772A-87BE-4B19-A7BB-445B226FE9A1} (ewidoOnlineScan Control) - http://download.ewid...oOnlineScan.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.micros...b?1121875602500
O16 - DPF: {6924091F-CD97-41E1-B1D4-D9079409D413} (IMCv1 Control) - http://70.84.73.148:1995/talk.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn...pDownloader.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://download.game...aploader_v6.cab
O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
O23 - Service: McAfee Framework Service (McAfeeFramework) - Network Associates, Inc. - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
O23 - Service: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\Mcshield.exe
O23 - Service: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe



please help me ASAP

tks
  • 0

#3
g2i2r4

g2i2r4

    retired HiJack Helper

  • Retired Staff
  • 5,080 posts
Welcome atw_1972 to Geeks to Go!

Let's take this one step at the time.

Download LQfix.exe and place it on your desktop.
Doubleclick LQfix.exe and click install.
This will create a new folder called LQfix on your desktop.
Open the folder and doubleclick ClickThis.bat
Follow the prompts on the screen.
Your system will reboot afterwards.
Please be patient after reboot, because there is a script running in the background.

Post back with a fresh HijackThis log so we can move on to the next step.


EDIT:
As there has been no reply from the original poster for more than two weeks this topic is now closed.

If you are the original poster and still need assistance, please send me a PM.

Edited by g2i2r4, 15 October 2005 - 04:12 PM.

  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP