My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

View previous topic View next topic Go down

My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

Post by Gunsniper on 20th April 2009, 11:08 am

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 9:06:32 PM, on 20/04/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16791)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Belkin\Belkin Wireless Network Utility\WLService.exe
C:\Program Files\Belkin\Belkin Wireless Network Utility\WLanCfgG.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\PnkBstrA.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\SearchIndexer.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Logitech\GamePanel Software\LCD Manager\LCDMon.exe
C:\Program Files\Logitech\GamePanel Software\G-series Software\LGDCore.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Program Files\Electronic Arts\EADM\Core.exe
C:\Program Files\DNA\btdna.exe
C:\Program Files\Logitech\GamePanel Software\LCD Manager\Applets\LCDClock.exe
C:\Program Files\Logitech\GamePanel Software\LCD Manager\Applets\LCDCountdown.exe
C:\Program Files\Trend Micro\Internet Security\TMAS_OE\TMAS_OEMon.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\setup2.exe
C:\Program Files\Logitech\GamePanel Software\LCD Manager\Applets\LCDMedia.exe
C:\Program Files\Logitech\GamePanel Software\LCD Manager\Applets\LCDPop3.exe
C:\Program Files\Logitech\SetPoint II\SetpointII.exe
C:\Program Files\Xfire\xfire.exe
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
C:\Program Files\Windows Media Player\wmplayer.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Windows Live\Contacts\wlcomm.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe
C:\Program Files\Trend Micro\BM\TMBMSRV.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
C:\Program Files\Trend Micro\Internet Security\TmProxy.exe
C:\WINDOWS\system32\SearchProtocolHost.exe
C:\Documents and Settings\Ranga\Desktop\Hijack(GP)This.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = [You must be registered and logged in to see this link.]
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = [You must be registered and logged in to see this link.]
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: UrlHelper Class - {474597C5-AB09-49d6-A4D5-2E8D7341384E} - C:\Program Files\iMesh Applications\iMesh MediaBar\iMeshIEHelper.dll (file missing)
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SearchHelper.dll
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.1.1309.3572\swg.dll
O2 - BHO: (no name) - {D032570A-5F63-4812-A094-87D007C23012} - C:\PROGRA~1\PRIVAC~1\tools\sp\spbho.dll (file missing)
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: Windows Live Toolbar Helper - {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - C:\Program Files\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll
O3 - Toolbar: iMesh MediaBar - {B7D3E479-CC68-42B5-A338-938ECE35F419} - C:\Program Files\iMesh Applications\iMesh MediaBar\iMeshMediaBar.dll (file missing)
O3 - Toolbar: &Windows Live Toolbar - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [SkyTel] SkyTel.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [Launch LCDMon] "C:\Program Files\Logitech\GamePanel Software\LCD Manager\LCDMon.exe"
O4 - HKLM\..\Run: [Launch LGDCore] "C:\Program Files\Logitech\GamePanel Software\G-series Software\LGDCore.exe" /SHOWHIDE
O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\\NeroCheck.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [AppleSyncNotifier] C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [UfSeAgnt.exe] "C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe"
O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [WiniBlueSoft] C:\Program Files\WiniBlueSoft Software\WiniBlueSoft\WiniBlueSoft.exe -min
O4 - HKLM\..\RunOnce: [Malwarebytes' Anti-Malware] C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [EA Core] "C:\Program Files\Electronic Arts\EADM\Core.exe" -silent
O4 - HKCU\..\Run: [BitTorrent DNA] "C:\Program Files\DNA\btdna.exe"
O4 - HKCU\..\Run: [MS AntiSpyware 2009] "C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\msas2009.exe" /autorun
O4 - HKCU\..\Run: [OE] "C:\Program Files\Trend Micro\Internet Security\TMAS_OE\TMAS_OEMon.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [setup2.exe] C:\WINDOWS\system32\setup2.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Startup: Xfire.lnk = C:\Program Files\Xfire\xfire.exe
O4 - Global Startup: SetPointII.lnk = ?
O4 - Global Startup: Windows Search.lnk = C:\Program Files\Windows Desktop Search\WindowsSearch.exe
O8 - Extra context menu item: Add to Google Photos Screensa&ver - [You must be registered and logged in to see this link.]
O8 - Extra context menu item: Add to Windows &Live Favorites - [You must be registered and logged in to see this link.]
O8 - Extra context menu item: E&xport to Microsoft Excel - [You must be registered and logged in to see this link.]
O9 - Extra button: Blog This - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra 'Tools' menuitem: &Blog This in Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: CabBuilder - [You must be registered and logged in to see this link.]
O16 - DPF: {48DD0448-9209-4F81-9F6D-D83562940134} (MySpace Uploader Control) - [You must be registered and logged in to see this link.]
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - [You must be registered and logged in to see this link.]
O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - [You must be registered and logged in to see this link.]
O17 - HKLM\System\CCS\Services\Tcpip\..\{238B51C4-E5D1-4F99-BEE8-7DE693B251ED}: NameServer = 85.255.112.233,85.255.112.19
O17 - HKLM\System\CCS\Services\Tcpip\..\{287AB4EC-59F5-47FA-AFEE-276392778DD0}: NameServer = 85.255.112.233,85.255.112.19
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 85.255.112.233,85.255.112.19
O17 - HKLM\System\CS1\Services\Tcpip\..\{238B51C4-E5D1-4F99-BEE8-7DE693B251ED}: NameServer = 85.255.112.233,85.255.112.19
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 85.255.112.233,85.255.112.19
O17 - HKLM\System\CS2\Services\Tcpip\..\{238B51C4-E5D1-4F99-BEE8-7DE693B251ED}: NameServer = 85.255.112.233,85.255.112.19
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.112.233,85.255.112.19
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Belkin Wireless USB Network Adapter (Belkin Wireless USB Network Adapter Service) - Unknown owner - C:\Program Files\Belkin\Belkin Wireless Network Utility\WLService.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Google Desktop Manager 5.7.806.10245 (GoogleDesktopManager-061008-081103) - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe
O23 - Service: Trend Micro Central Control Component (SfCtlCom) - Trend Micro Inc. - C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
O23 - Service: Trend Micro Unauthorized Change Prevention Service (TMBMServer) - Trend Micro Inc. - C:\Program Files\Trend Micro\BM\TMBMSRV.exe
O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\Program Files\Trend Micro\Internet Security\TmProxy.exe

--
End of file - 12210 bytes

Gunsniper
Novice
Novice

Posts Posts : 13
Joined Joined : 2009-04-20
Gender Gender : Male
OS OS : windows xp
Points Points : 27897
# Likes # Likes : 0

View user profile

Back to top Go down

Re: My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

Post by Belahzur on 20th April 2009, 1:34 pm

Hello.

  • Open HijackThis
  • Choose "Do a system scan only"
  • Check the boxes in front of these lines:


    O2 - BHO: UrlHelper Class - {474597C5-AB09-49d6-A4D5-2E8D7341384E} - C:\Program Files\iMesh Applications\iMesh MediaBar\iMeshIEHelper.dll (file missing)
    O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
    O2 - BHO: (no name) - {D032570A-5F63-4812-A094-87D007C23012} - C:\PROGRA~1\PRIVAC~1\tools\sp\spbho.dll (file missing)
    O3 - Toolbar: iMesh MediaBar - {B7D3E479-CC68-42B5-A338-938ECE35F419} - C:\Program Files\iMesh Applications\iMesh MediaBar\iMeshMediaBar.dll (file missing)
    O4 - HKCU\..\Run: [BitTorrent DNA] "C:\Program Files\DNA\btdna.exe"
    O4 - HKCU\..\Run: [MS AntiSpyware 2009] "C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\msas2009.exe" /autorun
    O4 - HKCU\..\Run: [setup2.exe] C:\WINDOWS\system32\setup2.exe
    O17 - HKLM\System\CCS\Services\Tcpip\..\{287AB4EC-59F5-47FA-AFEE-276392778DD0}: NameServer = 85.255.112.233,85.255.112.19
    O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 85.255.112.233,85.255.112.19
    O17 - HKLM\System\CS1\Services\Tcpip\..\{238B51C4-E5D1-4F99-BEE8-7DE693B251ED}: NameServer = 85.255.112.233,85.255.112.19
    O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 85.255.112.233,85.255.112.19
    O17 - HKLM\System\CS2\Services\Tcpip\..\{238B51C4-E5D1-4F99-BEE8-7DE693B251ED}: NameServer = 85.255.112.233,85.255.112.19
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.112.233,85.255.112.19


  • Press "Fix Checked"
  • Close Hijack This.

1. Please download The Avenger by Swandog46 to your Desktop
Link: [You must be registered and logged in to see this link.] or [You must be registered and logged in to see this link.].

  • Click on Avenger.zip to open the file
  • Extract avenger.exe to your desktop

Note: This tool was posted created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.[/color][/b][/i]

2. Now, start The Avenger program by clicking on its icon on your desktop.

  • Leave the script box empty.
  • Leave the ticked box "Scan for rootkit" ticked.
  • Then tick "Disable any rootkits found"
  • Now click on the Execute to begin execution of the script.
  • Answer "Yes" twice when prompted.

    The Avenger will automatically do the following:

  • It will Restart your computer.
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
3. Please copy/paste the content of c:\avenger.txt into your reply.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34916
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : XP SP3 Media Centre
Points Points : 245079
# Likes # Likes : 1

View user profile

Back to top Go down

Re: My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

Post by Gunsniper on 20th April 2009, 9:11 pm

Logfile of The Avenger Version 2.0, (c) by Swandog46
[You must be registered and logged in to see this link.]

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.

Hidden driver "gxvxcserv.sys" found!
ImagePath: \systemroot\system32\drivers\gxvxcvnofighdkyhcuwgvqyaouhykasblbnfp.sys
Start Type: 1 (System)

Rootkit scan completed.


Completed script processing.

*******************

Finished! Terminate.

Gunsniper
Novice
Novice

Posts Posts : 13
Joined Joined : 2009-04-20
Gender Gender : Male
OS OS : windows xp
Points Points : 27897
# Likes # Likes : 0

View user profile

Back to top Go down

Re: My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

Post by Belahzur on 20th April 2009, 9:38 pm

2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+CCrying


Drivers to delete:
gxvxcserv.sys

Files to delete:
C:\WINDOWS\system32\drivers\gxvxcvnofighdkyhcuwgvqyaouhykasblbnfp.sys

Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


3. Now, start The Avenger program by clicking on its icon on your desktop.

  • Under "Input script here:", paste in the script from the quote box above.
  • Leave the ticked box "Scan for rootkit" ticked.
  • Then tick "Disable any rootkits found"
  • Now click on the Execute to begin execution of the script.
  • Answer "Yes" twice when prompted.

    The Avenger will automatically do the following:

  • It will Restart your computer.
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
4. Please copy/paste the content of c:\avenger.txt into your reply.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34916
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : XP SP3 Media Centre
Points Points : 245079
# Likes # Likes : 1

View user profile

Back to top Go down

Re: My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

Post by Gunsniper on 21st April 2009, 7:58 am

Logfile of The Avenger Version 2.0, (c) by Swandog46
[You must be registered and logged in to see this link.]

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.

Hidden driver "gxvxcserv.sys" found!
ImagePath: \systemroot\system32\drivers\gxvxcvnofighdkyhcuwgvqyaouhykasblbnfp.sys
Driver disabled successfully.

Rootkit scan completed.

Driver "gxvxcserv.sys" deleted successfully.
File "C:\WINDOWS\system32\drivers\gxvxcvnofighdkyhcuwgvqyaouhykasblbnfp.sys" deleted successfully.

Completed script processing.

*******************

Finished! Terminate.

Gunsniper
Novice
Novice

Posts Posts : 13
Joined Joined : 2009-04-20
Gender Gender : Male
OS OS : windows xp
Points Points : 27897
# Likes # Likes : 0

View user profile

Back to top Go down

Re: My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

Post by Belahzur on 21st April 2009, 1:08 pm

Please download and run this tool.

Download Malwarebytes' Anti-Malware from [You must be registered and logged in to see this link.]

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.


Post the contents of the MBAM Log.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34916
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : XP SP3 Media Centre
Points Points : 245079
# Likes # Likes : 1

View user profile

Back to top Go down

Re: My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

Post by Gunsniper on 21st April 2009, 9:23 pm

Malwarebytes' Anti-Malware 1.36
Database version: 1945
Windows 5.1.2600 Service Pack 3

22/04/2009 7:14:05 AM
mbam-log-2009-04-22 (07-14-05).txt

Scan type: Quick Scan
Objects scanned: 92375
Time elapsed: 16 minute(s), 11 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 15
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 10
Files Infected: 21

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\imeshmediabar.stockbar (Adware.SoftMate) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\imeshmediabar.stockbar.1 (Adware.SoftMate) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\spbho.tiebho (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\xml.xml (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\xml.xml.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{b7d3e479-cc68-42b5-a338-938ece35f419} (Adware.SoftMate) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{9233c3c0-1472-4091-a505-5580a23bb4ac} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{d032570a-5f63-4812-a094-87d007c23012} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b7d3e479-cc68-42b5-a338-938ece35f419} (Adware.SoftMate) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Cognac (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\CrucialSoft Ltd (Rogue.MSantispyware2009) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ms antispyware 2009 5.7 (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\MSFox (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\MediaHoldings (Adware.PlayMP3Z) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{b7d3e479-cc68-42b5-a338-938ece35f419} (Adware.SoftMate) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009 (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\BASE (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\DELETED (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\LOG (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\SAVED (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Application Data\Privacy center (Rogue.PrivacyCenter) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Application Data\Privacy center\dbases (Rogue.PrivacyCenter) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Application Data\Privacy center\keys (Rogue.PrivacyCenter) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Application Data\Privacy center\temp (Rogue.PrivacyCenter) -> Quarantined and deleted successfully.

Files Infected:
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20090124232123187.log (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20090124234016609.log (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20090124234418984.log (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20090124235125453.log (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Application Data\Privacy center\dbases\cg.dat (Rogue.PrivacyCenter) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Application Data\Privacy center\dbases\mw.dat (Rogue.PrivacyCenter) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Application Data\Privacy center\dbases\rd.dat (Rogue.PrivacyCenter) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Application Data\Privacy center\dbases\sc.dat (Rogue.PrivacyCenter) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Application Data\Privacy center\dbases\sm.dat (Rogue.PrivacyCenter) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Application Data\Privacy center\dbases\sp.dat (Rogue.PrivacyCenter) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Application Data\Privacy center\keys\cg.key (Rogue.PrivacyCenter) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Application Data\Privacy center\keys\rd.key (Rogue.PrivacyCenter) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Application Data\Privacy center\keys\sc.key (Rogue.PrivacyCenter) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Application Data\Privacy center\keys\sp.key (Rogue.PrivacyCenter) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Application Data\Privacy center\temp\settings.ini (Rogue.PrivacyCenter) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Application Data\Privacy center\temp\spfilter (Rogue.PrivacyCenter) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\0mh7pC66.exe.a_a (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Local Settings\Temp\~tmpb.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Local Settings\Temp\~tmpe.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Local Settings\Temp\_ad48.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ranga\Local Settings\Temp\pey26.tmp (Backdoor.ProRat) -> Quarantined and deleted successfully.

Gunsniper
Novice
Novice

Posts Posts : 13
Joined Joined : 2009-04-20
Gender Gender : Male
OS OS : windows xp
Points Points : 27897
# Likes # Likes : 0

View user profile

Back to top Go down

Re: My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

Post by Belahzur on 21st April 2009, 9:33 pm


  • Please download DDS by sUBs to your Desktop (Important!!) from one of these locations:
    [You must be registered and logged in to see this link.]
    [You must be registered and logged in to see this link.]
  • Double click DDS.scr to run
  • When complete, DDS.txt will open.
  • Save the report to your Desktop.
  • Copy and paste DDS.txt back here, I don't need to see attach.txt.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34916
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : XP SP3 Media Centre
Points Points : 245079
# Likes # Likes : 1

View user profile

Back to top Go down

Re: My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

Post by Gunsniper on 22nd April 2009, 8:22 am

DDS (Ver_09-03-16.01) - NTFSx86
Run by Ranga at 18:18:14.48 on Wed 22/04/2009
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_11
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.3070.2356 [GMT 10:00]

AV: Trend Micro Internet Security *On-access scanning enabled* (Updated)
FW: Trend Micro Personal Firewall *enabled*

============== Running Processes ===============

C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Belkin\Belkin Wireless Network Utility\WLService.exe
C:\Program Files\Belkin\Belkin Wireless Network Utility\WLanCfgG.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\PnkBstrA.exe
C:\WINDOWS\system32\PnkBstrB.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\SearchIndexer.exe
C:\Program Files\Trend Micro\BM\TMBMSRV.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Logitech\GamePanel Software\LCD Manager\LCDMon.exe
C:\Program Files\Logitech\GamePanel Software\G-series Software\LGDCore.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe
C:\Program Files\Electronic Arts\EADM\Core.exe
C:\Program Files\Trend Micro\Internet Security\TMAS_OE\TMAS_OEMon.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Logitech\SetPoint II\SetpointII.exe
C:\Program Files\Windows Desktop Search\WindowsSearch.exe
C:\Program Files\Xfire\xfire.exe
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
C:\Program Files\Logitech\GamePanel Software\LCD Manager\Applets\LCDClock.exe
C:\Program Files\Logitech\GamePanel Software\LCD Manager\Applets\LCDCountdown.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
C:\Program Files\Logitech\GamePanel Software\LCD Manager\Applets\LCDMedia.exe
C:\Program Files\Logitech\GamePanel Software\LCD Manager\Applets\LCDPop3.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Trend Micro\Internet Security\TmProxy.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Ranga\Desktop\dds.scr
C:\WINDOWS\system32\SearchProtocolHost.exe

============== Pseudo HJT Report ===============

uSearchMigratedDefaultURL = [You must be registered and logged in to see this link.]
uInternet Settings,ProxyOverride = *.local
BHO: Search Helper: {6ebf7485-159f-4bff-a14f-b9e3aac4465b} - c:\program files\microsoft\search enhancement pack\search helper\SearchHelper.dll
BHO: Java(tm) Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.1.1309.3572\swg.dll
BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: Windows Live Toolbar Helper: {e15a8dc0-8516-42a1-81ea-dc94ec1acf10} - c:\program files\windows live\toolbar\wltcore.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: Veoh Browser Plug-in: {d0943516-5076-4020-a3b5-aefaf26ab263} - c:\program files\veoh networks\veoh\plugins\reg\VeohToolbar.dll
TB: &Windows Live Toolbar: {21fa44ef-376d-4d53-9b0f-8a89d3229068} - c:\program files\windows live\toolbar\wltcore.dll
TB: {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - No File
uRun: []
uRun: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "c:\program files\common files\ahead\lib\NMBgMonitor.exe"
uRun: [EA Core] "c:\program files\electronic arts\eadm\Core.exe" -silent
uRun: [OE] "c:\program files\trend micro\internet security\tmas_oe\TMAS_OEMon.exe"
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [SkyTel] SkyTel.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [Launch LCDMon] "c:\program files\logitech\gamepanel software\lcd manager\LCDMon.exe"
mRun: [Launch LGDCore] "c:\program files\logitech\gamepanel software\g-series software\LGDCore.exe" /SHOWHIDE
mRun: [NWEReboot]
mRun: [Google Desktop Search] "c:\program files\google\google desktop search\GoogleDesktop.exe" /startup
mRun: [StartCCC] "c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe" MSRun
mRun: [NeroCheck] c:\windows\system32\\NeroCheck.exe
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [AppleSyncNotifier] c:\program files\common files\apple\mobile device support\bin\AppleSyncNotifier.exe
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [UfSeAgnt.exe] "c:\program files\trend micro\internet security\UfSeAgnt.exe"
mRun: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
mRun: [WiniBlueSoft] c:\program files\winibluesoft software\winibluesoft\WiniBlueSoft.exe -min
dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
StartupFolder: c:\docume~1\ranga\startm~1\programs\startup\xfire.lnk - c:\program files\xfire\xfire.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\setpoi~1.lnk - c:\program files\logitech\setpoint ii\SetpointII.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\window~1.lnk - c:\program files\windows desktop search\WindowsSearch.exe
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Add to Windows &Live Favorites - [You must be registered and logged in to see this link.]
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - {5F7B1267-94A9-47F5-98DB-E99415F33AEC} - c:\program files\windows live\writer\WriterBrowserExtension.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
DPF: CabBuilder - [You must be registered and logged in to see this link.]
DPF: {48DD0448-9209-4F81-9F6D-D83562940134} - [You must be registered and logged in to see this link.]
DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} - [You must be registered and logged in to see this link.]
DPF: {5D6F45B3-9043-443D-A792-115447494D24} - [You must be registered and logged in to see this link.]
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - [You must be registered and logged in to see this link.]
DPF: {CAFEEFAC-0016-0000-0004-ABCDEFFEDCBA} - [You must be registered and logged in to see this link.]
DPF: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - [You must be registered and logged in to see this link.]
DPF: {CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA} - [You must be registered and logged in to see this link.]
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - [You must be registered and logged in to see this link.]
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - [You must be registered and logged in to see this link.]
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Windows Desktop Search Namespace Manager: {56f9679e-7826-4c84-81f3-532071a8bcc5} - c:\program files\windows desktop search\MSNLNamespaceMgr.dll

Gunsniper
Novice
Novice

Posts Posts : 13
Joined Joined : 2009-04-20
Gender Gender : Male
OS OS : windows xp
Points Points : 27897
# Likes # Likes : 0

View user profile

Back to top Go down

Re: My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

Post by Gunsniper on 22nd April 2009, 8:23 am

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\ranga\applic~1\mozilla\firefox\profiles\m60nqp93.default\
FF - prefs.js: browser.search.defaulturl - [You must be registered and logged in to see this link.]
FF - prefs.js: browser.search.selectedEngine - Live Search
FF - prefs.js: browser.startup.homepage - [You must be registered and logged in to see this link.]
FF - prefs.js: keyword.URL - [You must be registered and logged in to see this link.]
FF - component: c:\program files\mozilla firefox\components\GoogleDesktopMozilla.dll
FF - plugin: c:\program files\google\google updater\2.4.1536.6592\npCIDetect13.dll
FF - plugin: c:\program files\haihaisoft universal player\codec\plugins\nppl3260.dll
FF - plugin: c:\program files\haihaisoft universal player\codec\plugins\npqtplugin.dll
FF - plugin: c:\program files\haihaisoft universal player\codec\plugins\nprpjplug.dll
FF - plugin: c:\program files\microsoft\office live\npOLW.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npbittorrent.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npGoogleGadgetPluginFirefoxWin.dll
FF - plugin: c:\program files\veoh networks\veoh\plugins\noreg\NPVeohVersion.dll
FF - plugin: c:\program files\windows live\photo gallery\NPWLPG.dll

============= SERVICES / DRIVERS ===============

R2 fssfltr;FssFltr;c:\windows\system32\drivers\fssfltr_tdi.sys [2009-3-14 55152]
R2 LBeepKE;LBeepKE;c:\windows\system32\drivers\LBeepKE.sys [2009-2-28 10384]
R2 SeaPort;SeaPort;c:\program files\microsoft\search enhancement pack\seaport\SeaPort.exe [2009-1-14 226656]
R2 tmevtmgr;tmevtmgr;c:\windows\system32\drivers\tmevtmgr.sys [2009-1-25 52240]
R2 tmpreflt;tmpreflt;c:\windows\system32\drivers\tmpreflt.sys [2008-2-16 36368]
R3 AtiHdmiService;ATI Function Driver for HDMI Service;c:\windows\system32\drivers\AtiHdmi.sys [2008-8-22 93696]
R3 tmcfw;Trend Micro Common Firewall Service;c:\windows\system32\drivers\TM_CFW.sys [2008-2-16 333328]
R3 TmPfw;Trend Micro Personal Firewall;c:\progra~1\trendm~1\intern~1\TmPfw.exe [2009-1-25 488768]
R3 tmproxy;Trend Micro Proxy Service;c:\program files\trend micro\internet security\TmProxy.exe [2009-1-25 648456]
S3 fsssvc;Windows Live Family Safety;c:\program files\windows live\family safety\fsssvc.exe [2009-2-6 533360]
S3 GoogleDesktopManager-061008-081103;Google Desktop Manager 5.7.806.10245;c:\program files\google\google desktop search\GoogleDesktop.exe [2008-8-15 29744]

=============== Created Last 30 ================

2009-04-21 23:10 --d----- c:\docume~1\ranga\applic~1\Malwarebytes
2009-04-21 17:57 401,408 -c------ c:\windows\system32\dllcache\rpcss.dll
2009-04-21 17:57 284,160 -c------ c:\windows\system32\dllcache\pdh.dll
2009-04-21 17:56 473,600 -c------ c:\windows\system32\dllcache\fastprox.dll
2009-04-21 17:56 227,840 -c------ c:\windows\system32\dllcache\wmiprvse.exe
2009-04-21 17:56 110,592 -c------ c:\windows\system32\dllcache\services.exe
2009-04-21 17:56 453,120 -c------ c:\windows\system32\dllcache\wmiprvsd.dll
2009-04-21 17:56 729,088 -c------ c:\windows\system32\dllcache\lsasrv.dll
2009-04-21 17:56 714,752 -c------ c:\windows\system32\dllcache\ntdll.dll
2009-04-21 17:56 617,472 -c------ c:\windows\system32\dllcache\advapi32.dll
2009-04-21 17:49 1,203,922 -c------ c:\windows\system32\dllcache\sysmain.sdb
2009-04-21 17:49 215,552 -c------ c:\windows\system32\dllcache\wordpad.exe
2009-04-21 17:49 2,560 -------- c:\windows\system32\xpsp4res.dll
2009-04-20 20:38 15,504 a------- c:\windows\system32\drivers\mbam.sys
2009-04-20 20:38 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-04-20 20:38 --d----- c:\program files\Malwarebytes' Anti-Malware
2009-04-20 20:38 --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-04-20 05:59 2,564 a------- c:\windows\system32\5969spyware27z59.cpl
2009-04-19 19:13 7,906 a------- c:\windows\system32\155259rm1z1.cpl
2009-04-18 07:18 7,113 a------- c:\windows\system32\7c1c5o9nloazer2927.ocx
2009-04-18 03:52 9,089 a------- c:\windows\system32\2z783hackto5l99a.dll
2009-04-16 23:26 5,405 a------- c:\windows\system32\6fe7thiez6915.exe
2009-04-15 18:06 11,832 a------- c:\windows\13337wzrm3e59.exe
2009-04-14 22:22 7,642 a------- c:\windows\7983h9ckzool615.exe
2009-04-14 12:19 41,808 a------- c:\windows\system32\xfcodec.dll
2009-04-14 07:17 13,824 a------- c:\windows\system32\gxvxclbykucbeuglqdclnlktrkornvwqarjmx.dll
2009-04-14 07:17 4 a------- c:\windows\system32\gxvxccounter
2009-04-12 14:41 14,319 a------- c:\windows\6282adzwa5e21999.exe
2009-04-11 13:20 14,623 a------- c:\windows\system32\20e5t9iez3196.exe
2009-04-11 08:28 14,310 a------- c:\windows\system32\5d63t9izf2453.ocx
2009-04-11 07:05 2,993 a------- c:\windows\94198h5cktool1z0.dll
2009-04-09 14:51 2,660 a------- c:\windows\system32\5981t5reatz7565.bin
2009-04-09 10:14 2,892 a------- c:\windows\system32\ze35down5o9der366.dll
2009-04-06 16:47 12,952 a------- c:\windows\system32\90z96spy27b5.bin
2009-04-06 07:26 --d----- c:\program files\Full Pack Codecs
2009-04-05 03:34 9,953 a------- c:\windows\system32\19609viru571z.cpl
2009-04-02 20:54 2,633 a------- c:\windows\7z75ha5kt9ol2f9.cpl
2009-04-02 09:24 3,072 a------- c:\windows\system32\28620s5azbot79d.ocx
2009-04-02 03:19 6,785 a------- c:\windows\system32\39815roj1z59.bin
2009-04-01 18:55 12,747 a------- c:\windows\24591tzoj7f.bin
2009-03-28 11:52 8,978 a------- c:\windows\6fbaspa5sez119.bin
2009-03-27 07:34 7,087 a------- c:\windows\system32\292085orm6z29.bin
2009-03-27 02:28 17,476 a------- c:\windows\59dfaddware56z5.cpl
2009-03-24 15:24 12,069 a------- c:\windows\system32\4d49d9wzloade52096.ocx

==================== Find3M ====================

2009-04-21 23:13 138,920 a------- c:\windows\system32\drivers\PnkBstrK.sys
2009-04-21 23:12 189,072 a------- c:\windows\system32\PnkBstrB.exe
2009-04-11 17:56 78,614 a------- c:\windows\War3Unin.dat
2009-03-23 00:48 14,242 a------- c:\windows\159z4spy59f.dll
2009-03-20 00:50 3,092 a------- c:\windows\3e9dt9ief3195z.exe
2009-03-19 10:24 8,337 a------- c:\windows\3259threaz31749.dll
2009-03-17 02:28 13,996 a------- c:\windows\27049spambz599.bin
2009-03-16 17:08 4,533 a------- c:\windows\system32\92512worz389.bin
2009-03-16 15:06 43,520 a------- c:\windows\system32\CmdLineExt03.dll
2009-03-14 12:07 15,263 a------- c:\windows\system32\2ae5spywar91z69.exe
2009-03-13 21:37 8,911 a------- c:\windows\system32\64bd5hrzat96826.exe
2009-03-07 17:08 21,840 a------t c:\windows\system32\SIntfNT.dll
2009-03-07 17:08 17,212 a------t c:\windows\system32\SIntf32.dll
2009-03-07 17:08 12,067 a------t c:\windows\system32\SIntf16.dll
2009-03-07 10:30 18,152 a------- c:\windows\system32\4595tz9ef2681.exe
2009-03-07 04:31 5,289 a------- c:\windows\system32\zb99threat25509.exe
2009-03-07 00:22 284,160 a------- c:\windows\system32\pdh.dll
2009-03-05 06:50 3,552 a------- c:\windows\system32\19755not-a-v5rusz91.bin
2009-03-04 22:13 410,984 a------- c:\windows\system32\deploytk.dll
2009-03-03 10:18 826,368 a------- c:\windows\system32\wininet.dll
2009-03-02 14:36 3,167 a------- c:\windows\system32\35e8b9ckdoor2875z.exe
2009-03-01 08:24 5,068 a------- c:\windows\z264s5yware21459.exe
2009-02-28 23:47 0 a---h--- c:\windows\system32\drivers\Msft_Kernel_LMouFilt_01005.Wdf
2009-02-28 23:47 0 a---h--- c:\windows\system32\drivers\Msft_Kernel_LHidFilt_01005.Wdf
2009-02-28 23:47 0 a---h--- c:\windows\system32\drivers\MsftWdf_Kernel_01005_Coinstaller_Critical.Wdf
2009-02-28 06:58 9,476 a------- c:\windows\459dad9wzre1090.bin
2009-02-28 02:47 2,589 a------- c:\windows\system32\f795iz2791.bin
2009-02-26 03:00 2,652 a------- c:\windows\system32\16795teal2741z.exe
2009-02-24 17:50 75,064 a------- c:\windows\system32\PnkBstrA.exe
2009-02-21 04:09 78,336 a------- c:\windows\system32\ieencode.dll
2009-02-20 19:04 10,321 a------- c:\windows\system32\18227spz59otb.exe
2009-02-14 04:23 7,312 a------- c:\windows\7711vir9s59az.exe
2009-02-13 20:41 8,051 a------- c:\windows\system32\4426sparze29589.dll
2009-02-09 22:10 729,088 a------- c:\windows\system32\lsasrv.dll
2009-02-09 22:10 714,752 a------- c:\windows\system32\ntdll.dll
2009-02-09 22:10 617,472 a------- c:\windows\system32\advapi32.dll
2009-02-09 22:10 401,408 a------- c:\windows\system32\rpcss.dll
2009-02-09 21:13 1,846,784 a------- c:\windows\system32\win32k.sys
2009-02-06 21:11 110,592 a------- c:\windows\system32\services.exe
2009-02-06 21:06 2,145,280 a------- c:\windows\system32\ntoskrnl.exe
2009-02-06 20:39 35,328 a------- c:\windows\system32\sc.exe
2009-02-06 20:32 2,023,936 a------- c:\windows\system32\ntkrnlpa.exe
2009-02-06 19:03 307,576 a------- c:\windows\WLXPGSS.SCR
2009-02-06 18:52 49,504 a------- c:\windows\system32\sirenacm.dll
2009-02-05 11:37 18,034 a------- c:\windows\6bc7sp5war9168z.bin
2009-02-04 05:59 56,832 a------- c:\windows\system32\secur32.dll
2009-02-03 19:27 5,652 a------- c:\windows\system32\7b4dszyw5re9979.exe
2009-02-03 05:14 7,034 a------- c:\windows\system32\1e769pyware515z.dll
2009-02-01 20:43 7,808 a------- c:\windows\system32\5ec8vir2z29.exe
2009-02-01 19:22 16,428 a------- c:\windows\system32\1zeebac9d5or904.bin
2009-01-26 03:53 22,328 a------- c:\docume~1\ranga\applic~1\PnkBstrK.sys
2009-01-26 03:52 669,184 a------- c:\windows\system32\pbsvc.exe
2009-01-25 06:46 16,365 a------- c:\windows\system32\204255orm492z.bin
2008-11-14 17:05 32,768 a--sh--- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008111420081115\index.dat

============= FINISH: 18:19:13.34 ===============






sorry had to post it in 2parts

Gunsniper
Novice
Novice

Posts Posts : 13
Joined Joined : 2009-04-20
Gender Gender : Male
OS OS : windows xp
Points Points : 27897
# Likes # Likes : 0

View user profile

Back to top Go down

Re: My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

Post by Belahzur on 22nd April 2009, 1:56 pm

Please download the [You must be registered and logged in to see this link.].

  • Save it to your desktop.
  • Please double-click OTMoveIt3.exe to run it.
  • Copy the bolded text below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose CopyCrying


    :files
    c:\windows\system32\5969spyware27z59.cpl
    c:\windows\system32\155259rm1z1.cpl
    c:\windows\system32\7c1c5o9nloazer2927.ocx
    c:\windows\system32\2z783hackto5l99a.dll
    c:\windows\system32\6fe7thiez6915.exe
    c:\windows\13337wzrm3e59.exe
    c:\windows\7983h9ckzool615.exe
    c:\windows\system32\gxvxclbykucbeuglqdclnlktrkornvwqarjmx.dll
    c:\windows\system32\gxvxccounter
    c:\windows\6282adzwa5e21999.exe
    c:\windows\system32\20e5t9iez3196.exe
    c:\windows\system32\5d63t9izf2453.ocx
    c:\windows\94198h5cktool1z0.dll
    c:\windows\system32\5981t5reatz7565.bin
    c:\windows\system32\ze35down5o9der366.dll
    c:\windows\system32\19609viru571z.cpl
    c:\windows\7z75ha5kt9ol2f9.cpl
    c:\windows\system32\28620s5azbot79d.ocx
    c:\windows\system32\39815roj1z59.bin
    c:\windows\24591tzoj7f.bin
    c:\windows\6fbaspa5sez119.bin
    c:\windows\system32\292085orm6z29.bin
    c:\windows\59dfaddware56z5.cpl
    c:\windows\system32\4d49d9wzloade52096.ocx
    c:\windows\system32\90z96spy27b5.bin
    c:\windows\159z4spy59f.dll
    c:\windows\3e9dt9ief3195z.exe
    c:\windows\3259threaz31749.dll
    c:\windows\27049spambz599.bin
    c:\windows\system32\92512worz389.bin
    c:\windows\system32\CmdLineExt03.dll
    c:\windows\system32\2ae5spywar91z69.exe
    c:\windows\system32\64bd5hrzat96826.exe
    c:\windows\system32\4595tz9ef2681.exe
    c:\windows\system32\zb99threat25509.exe
    c:\windows\system32\19755not-a-v5rusz91.bin
    c:\windows\system32\35e8b9ckdoor2875z.exe
    c:\windows\z264s5yware21459.exe
    c:\windows\459dad9wzre1090.bin
    c:\windows\system32\f795iz2791.bin
    c:\windows\system32\16795teal2741z.exe
    c:\windows\system32\18227spz59otb.exe
    c:\windows\7711vir9s59az.exe
    c:\windows\system32\4426sparze29589.dll
    c:\windows\6bc7sp5war9168z.bin
    c:\windows\system32\7b4dszyw5re9979.exe
    c:\windows\system32\1e769pyware515z.dll
    c:\windows\system32\5ec8vir2z29.exe
    c:\windows\system32\1zeebac9d5or904.bin
    c:\windows\system32\204255orm492z.bin


  • Return to OTMoveIt3, right click in the "Paste instructions for items to be Moved" window (under the light blue bar) and choose Paste.
  • Click the red Moveit! button.
  • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
  • Close OTMoveIt3
If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.

Please post the OTMoveIt log.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34916
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : XP SP3 Media Centre
Points Points : 245079
# Likes # Likes : 1

View user profile

Back to top Go down

Re: My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

Post by Gunsniper on 22nd April 2009, 11:53 pm

Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!

OTMoveIt3 by OldTimer - Version 1.0.11.0 log created on 04232009_095241

Gunsniper
Novice
Novice

Posts Posts : 13
Joined Joined : 2009-04-20
Gender Gender : Male
OS OS : windows xp
Points Points : 27897
# Likes # Likes : 0

View user profile

Back to top Go down

Re: My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

Post by Belahzur on 23rd April 2009, 12:07 am

You missed :files as the top line.
Make sure :files is there and re-run the script.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34916
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : XP SP3 Media Centre
Points Points : 245079
# Likes # Likes : 1

View user profile

Back to top Go down

Re: My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

Post by Gunsniper on 23rd April 2009, 1:28 am

When i try put in files aswell, nothing happens it starts to run then just close's........so i can not copy anything to re-post....

Gunsniper
Novice
Novice

Posts Posts : 13
Joined Joined : 2009-04-20
Gender Gender : Male
OS OS : windows xp
Points Points : 27897
# Likes # Likes : 0

View user profile

Back to top Go down

Re: My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

Post by Belahzur on 23rd April 2009, 8:32 am

Hello.
Lets try it using the avenger.

2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+CCrying


Files to delete:
c:\windows\system32\5969spyware27z59.cpl
c:\windows\system32\155259rm1z1.cpl
c:\windows\system32\7c1c5o9nloazer2927.ocx
c:\windows\system32\2z783hackto5l99a.dll
c:\windows\system32\6fe7thiez6915.exe
c:\windows\13337wzrm3e59.exe
c:\windows\7983h9ckzool615.exe
c:\windows\system32\gxvxclbykucbeuglqdclnlktrkornvwqarjmx.dll
c:\windows\system32\gxvxccounter
c:\windows\6282adzwa5e21999.exe
c:\windows\system32\20e5t9iez3196.exe
c:\windows\system32\5d63t9izf2453.ocx
c:\windows\94198h5cktool1z0.dll
c:\windows\system32\5981t5reatz7565.bin
c:\windows\system32\ze35down5o9der366.dll
c:\windows\system32\19609viru571z.cpl
c:\windows\7z75ha5kt9ol2f9.cpl
c:\windows\system32\28620s5azbot79d.ocx
c:\windows\system32\39815roj1z59.bin
c:\windows\24591tzoj7f.bin
c:\windows\6fbaspa5sez119.bin
c:\windows\system32\292085orm6z29.bin
c:\windows\59dfaddware56z5.cpl
c:\windows\system32\4d49d9wzloade52096.ocx
c:\windows\system32\90z96spy27b5.bin
c:\windows\159z4spy59f.dll
c:\windows\3e9dt9ief3195z.exe
c:\windows\3259threaz31749.dll
c:\windows\27049spambz599.bin
c:\windows\system32\92512worz389.bin
c:\windows\system32\CmdLineExt03.dll
c:\windows\system32\2ae5spywar91z69.exe
c:\windows\system32\64bd5hrzat96826.exe
c:\windows\system32\4595tz9ef2681.exe
c:\windows\system32\zb99threat25509.exe
c:\windows\system32\19755not-a-v5rusz91.bin
c:\windows\system32\35e8b9ckdoor2875z.exe
c:\windows\z264s5yware21459.exe
c:\windows\459dad9wzre1090.bin
c:\windows\system32\f795iz2791.bin
c:\windows\system32\16795teal2741z.exe
c:\windows\system32\18227spz59otb.exe
c:\windows\7711vir9s59az.exe
c:\windows\system32\4426sparze29589.dll
c:\windows\6bc7sp5war9168z.bin
c:\windows\system32\7b4dszyw5re9979.exe
c:\windows\system32\1e769pyware515z.dll
c:\windows\system32\5ec8vir2z29.exe
c:\windows\system32\1zeebac9d5or904.bin
c:\windows\system32\204255orm492z.bin

Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


3. Now, start The Avenger program by clicking on its icon on your desktop.

  • Under "Input script here:", paste in the script from the quote box above.
  • Leave the ticked box "Scan for rootkit" ticked.
  • Then tick "Disable any rootkits found"
  • Now click on the Execute to begin execution of the script.
  • Answer "Yes" twice when prompted.

    The Avenger will automatically do the following:

  • It will Restart your computer.
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
4. Please copy/paste the content of c:\avenger.txt into your reply.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34916
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : XP SP3 Media Centre
Points Points : 245079
# Likes # Likes : 1

View user profile

Back to top Go down

Re: My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

Post by Gunsniper on 23rd April 2009, 9:58 am

Logfile of The Avenger Version 2.0, (c) by Swandog46
[You must be registered and logged in to see this link.]

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!


Error: file "c:\windows\system32\5969spyware27z59.cpl" not found!
Deletion of file "c:\windows\system32\5969spyware27z59.cpl" failed!
Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist


Error: file "c:\windows\system32\155259rm1z1.cpl" not found!
Deletion of file "c:\windows\system32\155259rm1z1.cpl" failed!
Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist


Error: file "c:\windows\system32\7c1c5o9nloazer2927.ocx" not found!
Deletion of file "c:\windows\system32\7c1c5o9nloazer2927.ocx" failed!
Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist


Error: file "c:\windows\system32\2z783hackto5l99a.dll" not found!
Deletion of file "c:\windows\system32\2z783hackto5l99a.dll" failed!
Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist


Error: file "c:\windows\system32\6fe7thiez6915.exe" not found!
Deletion of file "c:\windows\system32\6fe7thiez6915.exe" failed!
Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist


Error: file "c:\windows\13337wzrm3e59.exe" not found!
Deletion of file "c:\windows\13337wzrm3e59.exe" failed!
Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist


Error: file "c:\windows\7983h9ckzool615.exe" not found!
Deletion of file "c:\windows\7983h9ckzool615.exe" failed!
Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist

File "c:\windows\system32\gxvxclbykucbeuglqdclnlktrkornvwqarjmx.dll" deleted successfully.
File "c:\windows\system32\gxvxccounter" deleted successfully.
File "c:\windows\6282adzwa5e21999.exe" deleted successfully.
File "c:\windows\system32\20e5t9iez3196.exe" deleted successfully.
File "c:\windows\system32\5d63t9izf2453.ocx" deleted successfully.
File "c:\windows\94198h5cktool1z0.dll" deleted successfully.
File "c:\windows\system32\5981t5reatz7565.bin" deleted successfully.
File "c:\windows\system32\ze35down5o9der366.dll" deleted successfully.
File "c:\windows\system32\19609viru571z.cpl" deleted successfully.
File "c:\windows\7z75ha5kt9ol2f9.cpl" deleted successfully.
File "c:\windows\system32\28620s5azbot79d.ocx" deleted successfully.
File "c:\windows\system32\39815roj1z59.bin" deleted successfully.
File "c:\windows\24591tzoj7f.bin" deleted successfully.
File "c:\windows\6fbaspa5sez119.bin" deleted successfully.
File "c:\windows\system32\292085orm6z29.bin" deleted successfully.
File "c:\windows\59dfaddware56z5.cpl" deleted successfully.
File "c:\windows\system32\4d49d9wzloade52096.ocx" deleted successfully.
File "c:\windows\system32\90z96spy27b5.bin" deleted successfully.
File "c:\windows\159z4spy59f.dll" deleted successfully.
File "c:\windows\3e9dt9ief3195z.exe" deleted successfully.
File "c:\windows\3259threaz31749.dll" deleted successfully.
File "c:\windows\27049spambz599.bin" deleted successfully.
File "c:\windows\system32\92512worz389.bin" deleted successfully.
File "c:\windows\system32\CmdLineExt03.dll" deleted successfully.
File "c:\windows\system32\2ae5spywar91z69.exe" deleted successfully.
File "c:\windows\system32\64bd5hrzat96826.exe" deleted successfully.
File "c:\windows\system32\4595tz9ef2681.exe" deleted successfully.
File "c:\windows\system32\zb99threat25509.exe" deleted successfully.
File "c:\windows\system32\19755not-a-v5rusz91.bin" deleted successfully.
File "c:\windows\system32\35e8b9ckdoor2875z.exe" deleted successfully.
File "c:\windows\z264s5yware21459.exe" deleted successfully.
File "c:\windows\459dad9wzre1090.bin" deleted successfully.
File "c:\windows\system32\f795iz2791.bin" deleted successfully.
File "c:\windows\system32\16795teal2741z.exe" deleted successfully.
File "c:\windows\system32\18227spz59otb.exe" deleted successfully.
File "c:\windows\7711vir9s59az.exe" deleted successfully.
File "c:\windows\system32\4426sparze29589.dll" deleted successfully.
File "c:\windows\6bc7sp5war9168z.bin" deleted successfully.
File "c:\windows\system32\7b4dszyw5re9979.exe" deleted successfully.
File "c:\windows\system32\1e769pyware515z.dll" deleted successfully.
File "c:\windows\system32\5ec8vir2z29.exe" deleted successfully.
File "c:\windows\system32\1zeebac9d5or904.bin" deleted successfully.
File "c:\windows\system32\204255orm492z.bin" deleted successfully.

Completed script processing.

*******************

Finished! Terminate.

Gunsniper
Novice
Novice

Posts Posts : 13
Joined Joined : 2009-04-20
Gender Gender : Male
OS OS : windows xp
Points Points : 27897
# Likes # Likes : 0

View user profile

Back to top Go down

Re: My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

Post by Belahzur on 23rd April 2009, 10:38 am

How is the machine running now?


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34916
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : XP SP3 Media Centre
Points Points : 245079
# Likes # Likes : 1

View user profile

Back to top Go down

Re: My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

Post by Gunsniper on 23rd April 2009, 10:42 am

Yeah good, no sign of the Winiblue soft, thank you very much for the help, really thanks alot i mean it was really starting to pee me off.

Gunsniper
Novice
Novice

Posts Posts : 13
Joined Joined : 2009-04-20
Gender Gender : Male
OS OS : windows xp
Points Points : 27897
# Likes # Likes : 0

View user profile

Back to top Go down

Re: My hijackthis.log PLEASE HELP I DONT KNOW WHAT IM DOING.....

Post by Belahzur on 23rd April 2009, 3:53 pm

We can remove OTMoveIt now.

  • Please double-click OTMoveIt3.exe to run it again.
  • Press the green CleanUp! button.
  • Press Yes cleanup process prompt, do the same for the reboot prompt.

We need to make a new restore point.

To turn off System Restore, follow these steps:
1. Click Start, right-click My Computer, and then click Properties.
2. Click the System Restore tab.
3. Click the Turn off System Restore check box (or the Turn off System Restore on all drives check box), and then click OK.
4. Click Yes when you receive the prompt to the turn off System Restore.

Now we need to make a new restore point.
To turn on System Restore, follow these steps:
1. Click Start, right-click My Computer, and then click Properties.
2. Click the System Restore tab.
3. Click the Turn off System Restore check box (To turn on System Restore), and then click OK.

Below I have included a number of recommendations for how to protect your computer in order to prevent future malware infections. Please take these recommendations seriously; these few simple steps can stave off the vast majority of spyware problems. As happy as we are to help you, for your sake we would rather not have repeat customers. Goofy

1) Please navigate to [You must be registered and logged in to see this link.] and download all the "critical updates" for Windows. This can patch many of the security holes through which attackers can gain access to your computer.

Please either enable Automatic Updates under Start -> Control Panel -> Automatic Updates , or get into the habit of checking for Windows updates regularly. I cannot stress enough how important this is.

2) In order to protect yourself against spyware, you should consider installing and running the following free programs:

[You must be registered and logged in to see this link.]
A tutorial on using Ad-Aware to remove spyware from your computer may be found [You must be registered and logged in to see this link.].

[You must be registered and logged in to see this link.]
A tutorial on using Spybot to remove spyware from your computer may be found [You must be registered and logged in to see this link.]. Please also remember to enable Spybot's "Immunize" and "TeaTimer" features.

[You must be registered and logged in to see this link.]
A tutorial on using SpywareBlaster to prevent spyware from ever installing on your computer may be found [You must be registered and logged in to see this link.].

[You must be registered and logged in to see this link.]
A tutorial on using SpywareGuard for realtime protection against spyware and hijackers may be found [You must be registered and logged in to see this link.].

Make sure to keep these programs up-to-date and to run them regularly, as this can prevent a great deal of spyware hassle.

3) Please consider using an alternate browser. Mozilla's Firefox browser is fantastic; it is much more secure than Internet Explorer, immune to almost all known browser hijackers, and also has the best built-in popup blocker (as an added benefit!) that I have ever seen. If you are interested, Firefox may be downloaded from here:
[You must be registered and logged in to see this link.]
I also recommand the following add-ons for Firefox, they will help keep you safe from malicious scripts or activeX exploits.
[You must be registered and logged in to see this link.]
[You must be registered and logged in to see this link.]
[You must be registered and logged in to see this link.]

4) Also make sure to run your antivirus software regularly, and to keep it up-to-date.

To help you keep your software updated, please considering using this free software program that will check for program updates.
[You must be registered and logged in to see this link.]

5) Finally, consider maintaining a firewall. Some good free firewalls are [You must be registered and logged in to see this link.], or
[You must be registered and logged in to see this link.]
A tutorial on understanding and using firewalls may be found [You must be registered and logged in to see this link.].

Please also read Tony Klein's excellent article: [You must be registered and logged in to see this link.]

If you would take a moment to fill out our feedback form, we would appreciate it.
The link can be found [You must be registered and logged in to see this link.].

Hopefully this should take care of your problems! Good luck. Big Grin


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34916
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : XP SP3 Media Centre
Points Points : 245079
# Likes # Likes : 1

View user profile

Back to top Go down

View previous topic View next topic Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum