I've been invaded...Troj_Agent.NJ, BookedSpace, Elitum.elite...and others! Argh Help!
I have run adaware and spybot before posting this.
after searching for ways to eliminate these beasties, I've inevitably run across several posts in your forum about Hijack This. So, I've downloaded it and will do my darndest to figure this out with your help.
I'm getting pop ups at an incredible rate. It has even frozen my computer on cable access. As fast as I close them, more pop up. Oddly enough, 99% of them are for removing spyware! ...when they ARE the spyware! ...sigh... help please.
Here is my log:
Logfile of HijackThis v1.99.1
Scan saved at 1:13:28 PM, on 5/16/2005
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\ibmpmsvc.exe
C:\WINNT\system32\Ati2evxx.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\System32\svchost.exe
C:\WINNT\system32\spoolsv.exe
C:\WINNT\system32\hidserv.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\OfficeScan NT\ntrtscan.exe
C:\OfficeScan NT\OfcPfwSvc.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\System32\snmp.exe
C:\OfficeScan NT\tmlisten.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\TEMP\PB6950.EXE
C:\WINNT\system32\Ati2evxx.exe
C:\WINNT\Explorer.EXE
C:\WINNT\system32\tp4mon.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\WINNT\AGRSMMSG.exe
C:\OfficeScan NT\pccntmon.exe
C:\PROGRA~1\ThinkPad\UTILIT~1\TP98TRAY.EXE
C:\WINNT\system32\Sktempdm.exe
C:\WINNT\system32\sk2moprp.exe
C:\WINNT\system\mrath.exe
C:\WINNT\system32\ctfmon.exe
C:\WINNT\system32\shd32spl.exe
C:\OfficeScan NT\Pop3Trap.exe
C:\Program Files\Linksys\Wireless-G Notebook Adapter\WPC54CFG.EXE
C:\PROGRA~1\MOZILL~1\FIREFOX.EXE
C:\WINNT\system32\winhlp32.exe
C:\WINNT\winhlp32.exe
C:\Program Files\ZipCentral\ZCentral.exe
C:\WINNT\system32\NOTEPAD.EXE
C:\OfficeScan NT\pccnt.exe
C:\WINNT\system32\taskmgr.exe
C:\DOCUME~1\BACHEL~1\LOCALS~1\Temp\_ZCTmp.Dir\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.educationcentral.org/
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {ED103D9F-3070-4580-AB1E-E5C179C1AE41} - (no file)
O4 - HKLM\..\Run: [TrackPointSrv] tp4mon.exe
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [OfficeScanNT Monitor] "C:\OfficeScan NT\pccntmon.exe" -HideWindow
O4 - HKLM\..\Run: [Detect Kbd Daemon] SK2000DM.EXE
O4 - HKLM\..\Run: [TPTRAY] C:\PROGRA~1\ThinkPad\UTILIT~1\TP98TRAY.EXE
O4 - HKLM\..\Run: [PS1] C:\WINNT\system32\ps1.exe
O4 - HKLM\..\Run: [cfgmgr52] RunDLL32.EXE C:\WINNT\cfgmgr52.dll,DllRun
O4 - HKLM\..\Run: [checkrun] C:\winnt\system32\elitecai32.exe
O4 - HKLM\..\Run: [t32R35O] sk2moprp.exe
O4 - HKLM\..\Run: [C:\WINNT\VCMnet11.exe] C:\WINNT\VCMnet11.exe
O4 - HKCU\..\Run: [ctfmon.exe] ctfmon.exe
O4 - HKCU\..\Run: [c0t5RRi9e] shd32spl.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: Wireless-G Notebook Adapter Utility.lnk = C:\Program Files\Linksys\Wireless-G Notebook Adapter\WPC54CFG.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O8 - Extra context menu item: Open Picture in &Microsoft PhotoDraw - res://C:\PROGRA~1\MICROS~2\Office\1033\phdintl.dll/phdContext.htm
O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0521.dll
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0521.dll
O15 - Trusted Zone: http://*.dcpsweb
O15 - Trusted Zone: http://dcpsweb.educationcentral.org
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akamai.net/7/1540/52/20021205/qtinstall.info.apple.com/drakken/us/win/QuickTimeInstaller.exe
O16 - DPF: {9059F30F-4EB1-4BD2-9FDC-36F43A218F4A} (Microsoft RDP Client Control (redist)) - http://t002dtrn/tsweb/msrdp.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = dcps.duval.us
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = dcps.duval.us
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = dcps.duval.us
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINNT\system32\Ati2evxx.exe
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - Service: IBM PM Service (IBMPMSVC) - Unknown owner - C:\WINNT\system32\ibmpmsvc.exe
O23 - Service: OfficeScanNT RealTime Scan (ntrtscan) - Trend Micro Inc. - C:\OfficeScan NT\ntrtscan.exe
O23 - Service: OfficeScanNT Personal Firewall (OfcPfwSvc) - Trend Micro Inc. - C:\OfficeScan NT\OfcPfwSvc.exe
O23 - Service: OfficeScanNT Listener (tmlisten) - Trend Micro Inc. - C:\OfficeScan NT\tmlisten.exe
Minda
after searching for ways to eliminate these beasties, I've inevitably run across several posts in your forum about Hijack This. So, I've downloaded it and will do my darndest to figure this out with your help.
I'm getting pop ups at an incredible rate. It has even frozen my computer on cable access. As fast as I close them, more pop up. Oddly enough, 99% of them are for removing spyware! ...when they ARE the spyware! ...sigh... help please.
Here is my log:
Logfile of HijackThis v1.99.1
Scan saved at 1:13:28 PM, on 5/16/2005
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\ibmpmsvc.exe
C:\WINNT\system32\Ati2evxx.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\System32\svchost.exe
C:\WINNT\system32\spoolsv.exe
C:\WINNT\system32\hidserv.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\OfficeScan NT\ntrtscan.exe
C:\OfficeScan NT\OfcPfwSvc.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\System32\snmp.exe
C:\OfficeScan NT\tmlisten.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\TEMP\PB6950.EXE
C:\WINNT\system32\Ati2evxx.exe
C:\WINNT\Explorer.EXE
C:\WINNT\system32\tp4mon.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\WINNT\AGRSMMSG.exe
C:\OfficeScan NT\pccntmon.exe
C:\PROGRA~1\ThinkPad\UTILIT~1\TP98TRAY.EXE
C:\WINNT\system32\Sktempdm.exe
C:\WINNT\system32\sk2moprp.exe
C:\WINNT\system\mrath.exe
C:\WINNT\system32\ctfmon.exe
C:\WINNT\system32\shd32spl.exe
C:\OfficeScan NT\Pop3Trap.exe
C:\Program Files\Linksys\Wireless-G Notebook Adapter\WPC54CFG.EXE
C:\PROGRA~1\MOZILL~1\FIREFOX.EXE
C:\WINNT\system32\winhlp32.exe
C:\WINNT\winhlp32.exe
C:\Program Files\ZipCentral\ZCentral.exe
C:\WINNT\system32\NOTEPAD.EXE
C:\OfficeScan NT\pccnt.exe
C:\WINNT\system32\taskmgr.exe
C:\DOCUME~1\BACHEL~1\LOCALS~1\Temp\_ZCTmp.Dir\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.educationcentral.org/
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {ED103D9F-3070-4580-AB1E-E5C179C1AE41} - (no file)
O4 - HKLM\..\Run: [TrackPointSrv] tp4mon.exe
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [OfficeScanNT Monitor] "C:\OfficeScan NT\pccntmon.exe" -HideWindow
O4 - HKLM\..\Run: [Detect Kbd Daemon] SK2000DM.EXE
O4 - HKLM\..\Run: [TPTRAY] C:\PROGRA~1\ThinkPad\UTILIT~1\TP98TRAY.EXE
O4 - HKLM\..\Run: [PS1] C:\WINNT\system32\ps1.exe
O4 - HKLM\..\Run: [cfgmgr52] RunDLL32.EXE C:\WINNT\cfgmgr52.dll,DllRun
O4 - HKLM\..\Run: [checkrun] C:\winnt\system32\elitecai32.exe
O4 - HKLM\..\Run: [t32R35O] sk2moprp.exe
O4 - HKLM\..\Run: [C:\WINNT\VCMnet11.exe] C:\WINNT\VCMnet11.exe
O4 - HKCU\..\Run: [ctfmon.exe] ctfmon.exe
O4 - HKCU\..\Run: [c0t5RRi9e] shd32spl.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: Wireless-G Notebook Adapter Utility.lnk = C:\Program Files\Linksys\Wireless-G Notebook Adapter\WPC54CFG.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O8 - Extra context menu item: Open Picture in &Microsoft PhotoDraw - res://C:\PROGRA~1\MICROS~2\Office\1033\phdintl.dll/phdContext.htm
O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0521.dll
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0521.dll
O15 - Trusted Zone: http://*.dcpsweb
O15 - Trusted Zone: http://dcpsweb.educationcentral.org
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akamai.net/7/1540/52/20021205/qtinstall.info.apple.com/drakken/us/win/QuickTimeInstaller.exe
O16 - DPF: {9059F30F-4EB1-4BD2-9FDC-36F43A218F4A} (Microsoft RDP Client Control (redist)) - http://t002dtrn/tsweb/msrdp.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = dcps.duval.us
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = dcps.duval.us
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = dcps.duval.us
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINNT\system32\Ati2evxx.exe
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - Service: IBM PM Service (IBMPMSVC) - Unknown owner - C:\WINNT\system32\ibmpmsvc.exe
O23 - Service: OfficeScanNT RealTime Scan (ntrtscan) - Trend Micro Inc. - C:\OfficeScan NT\ntrtscan.exe
O23 - Service: OfficeScanNT Personal Firewall (OfcPfwSvc) - Trend Micro Inc. - C:\OfficeScan NT\OfcPfwSvc.exe
O23 - Service: OfficeScanNT Listener (tmlisten) - Trend Micro Inc. - C:\OfficeScan NT\tmlisten.exe
Minda
0
This discussion has been closed.
Comments
EDIT...
They stopped for a little while, but not for good. They're back.
The popups are mostly from the following sites:
ads1.revenue.net
banners.searchingbooth.com
Place a checkmark next to these entries, close all browsers and windows, and have HijackThis fix them by clicking Fix Checked:
O2 - BHO: (no name) - {ED103D9F-3070-4580-AB1E-E5C179C1AE41} - (no file)
O4 - HKLM\..\Run: [PS1] C:\WINNT\system32\ps1.exe
O4 - HKLM\..\Run: [cfgmgr52] RunDLL32.EXE C:\WINNT\cfgmgr52.dll,DllRun
O4 - HKLM\..\Run: [checkrun] C:\winnt\system32\elitecai32.exe
O4 - HKLM\..\Run: [t32R35O] sk2moprp.exe
O4 - HKLM\..\Run: [C:\WINNT\VCMnet11.exe] C:\WINNT\VCMnet11.exe
O4 - HKCU\..\Run: [c0t5RRi9e] shd32spl.exe
Please download miekiemoes' LQfix batch here:
http://users.pandora.be/bluepatchy/LQfix.zip
Unzip it to the desktop but do NOT run it yet.
Reboot your computer into SAFE MODE
Once in Safe Mode, please run LQfix.bat.
Next delete these files:
C:\WINNT\cfgmgr52.dll
C:\WINNT\VCMnet11.exe
C:\WINNT\winhlp32.exe
C:\winnt\system32\elitecai32.exe
C:\WINNT\system32\sk2moprp.exe
C:\WINNT\system32\ps1.exe
C:\WINNT\system32\shd32spl.exe
C:\WINNT\system32\Sktempdm.exe
C:\WINNT\system\mrath.exe
C:\WINNT\system32\winhlp32.exe
When finished, restart your computer in normal mode.
Please run at least two of these online scans.
Make sure they are set to clean automatically:
Panda Virus Scan
Bit Defender
TrendMicro Housecall
There will be files that these scans will not remove. Please include that information in your next post.
Reboot and post a new hijackthis log and the info from your virus scans.
This Error message is now appearing when I start my computer:
Error loading C:\WINNT\cfgmgr52.dll
The specified module could not be found.
Here are the log files:
Panda
Activescan.txt
Incident Status Location
Spyware:Spyware/BetterInet No disinfected Windows Registry
Adware:Adware/BookedSpace No disinfected C:\WINNT\bsx32
Adware:Adware/Apropos No disinfected C:\Program Files\AutoUpdate
Adware:Adware/WinTools No disinfected C:\WINNT\system32\EDOW_AS2.EXE
Adware:Adware/Fizzle No disinfected C:\Program Files\FwBarTemp
Adware:Adware/EliteBar No disinfected Windows Registry
Adware:Adware/ExactSearch No disinfected C:\WINNT\system32\installer_MARKETING??.exe
Adware:Adware/StartPage.DD No disinfected C:\WINNT\Protector.exe
Adware:Adware/Apropos No disinfected C:\Documents and Settings\bachelorm\Local Settings\Temp\AutoUpdate0\auto_update_install.exe
Adware:Adware/Envolo No disinfected C:\Documents and Settings\bachelorm\Local Settings\Temp\AutoUpdate0\setup.inf
Spyware:Spyware/BargainBuddy No disinfected C:\Documents and Settings\bachelorm\Local Settings\Temp\installer_MARKETING18.exe
Adware:Adware/Pacimedia No disinfected C:\Documents and Settings\bachelorm\Local Settings\Temp\pcs_0002.exe
Adware:Adware/Pacimedia No disinfected C:\Documents and Settings\bachelorm\Local Settings\Temp\ptf_0002.exe
Adware:Adware/EliteBar No disinfected C:\Documents and Settings\bachelorm\Local Settings\Temp\uninstall.exe
Adware:Adware/VirtualBouncer No disinfected C:\Documents and Settings\bachelorm\Local Settings\Temp\wrapperouter.exe
Spyware:Spyware/Media-motor No disinfected C:\Documents and Settings\bachelorm\Local Settings\Temporary Internet Files\Content.IE5\4PA3GLQ3\diamond[1].cab[m67m.inf]
Spyware:Spyware/Media-motor No disinfected C:\Documents and Settings\bachelorm\Local Settings\Temporary Internet Files\Content.IE5\4PA3GLQ3\diamond[1].cab[m67m.ocx]
Virus:Trj/Downloader.COY Disinfected C:\Documents and Settings\bachelorm\Local Settings\Temporary Internet Files\Content.IE5\QVCB8TO1\aun_0035[1].exe
Adware:Adware/Apropos No disinfected C:\Program Files\AutoUpdate\AutoUpdate.xxx
Adware:Adware/Apropos No disinfected C:\Program Files\CxtPls\ProxyStub.dll
Adware:Adware/Fizzle No disinfected C:\Program Files\FwBarTemp\searchbar.exe
Adware:Adware/Pacimedia No disinfected C:\Program Files\Windows Media Player\wmplayer.exe
Adware:Adware/BookedSpace No disinfected C:\WINNT\ehnqdhwn.exe
Adware:Adware/EliteBar No disinfected C:\WINNT\protector.exe
Adware:Adware/Envolo No disinfected C:\WINNT\system32\auto_update_uninstall.exe
Adware:Adware/Apropos No disinfected C:\WINNT\system32\auto_update_uninstall.log
Adware:Adware/BookedSpace No disinfected C:\WINNT\system32\bs51-eginwl51-vb.exe
Adware:Adware/Apropos No disinfected C:\WINNT\system32\cxtpls_loader.exe
Virus:Trj/Downloader.BYZ Disinfected C:\WINNT\system32\dist001.exe
Adware:Adware/HuntBar No disinfected C:\WINNT\system32\EDow_AS2.exe
Virus:Trj/Downloader.BJG Disinfected C:\WINNT\system32\installer_MARKETING18.exe
Adware:Adware/Apropos No disinfected C:\WINNT\system32\msftpki.exe
Adware:Adware/Apropos No disinfected C:\WINNT\system32\ntmtus40.exe
BitDefender Log
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\ElitumEliteBar.zip=>sbRecovery.reg: password protected
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\ElitumEliteBar.zip=>sbRecovery.ini: password protected
C:\Documents and Settings\bachelorm\Local Settings\Temp\AutoUpdate0\auto_update_install.exe: infected with Adware.POP.dl
C:\Documents and Settings\bachelorm\Local Settings\Temp\AutoUpdate0\auto_update_install.exe: disinfection failed
C:\Documents and Settings\bachelorm\Local Settings\Temp\installer_MARKETING18.exe: infected with Trojan.Downloader.Adload.A
C:\Documents and Settings\bachelorm\Local Settings\Temp\installer_MARKETING18.exe: disinfection failed
C:\Documents and Settings\bachelorm\Local Settings\Temporary Internet Files\Content.IE5\4TYFK9MR\download[1].htm: infected with Exploit.Html.Codebase.Exec.Gen
C:\Documents and Settings\bachelorm\Local Settings\Temporary Internet Files\Content.IE5\4TYFK9MR\download[1].htm: disinfection failed
C:\Program Files\AutoUpdate\AutoUpdate.xxx: infected with Adware.POP.dl
C:\Program Files\AutoUpdate\AutoUpdate.xxx: disinfection failed
C:\Program Files\FwBarTemp\searchbar.exe: infected with Trojan.Downloader.VB.EU
C:\Program Files\FwBarTemp\searchbar.exe: disinfection failed
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>arrow1.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>arrow2.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>bck1.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>bck2.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>bt11.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>bt12.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>bt13.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>bt21.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>bt22.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>bt23.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>bt31.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>bt32.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>bt33.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>bt41.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>bt42.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>bt43.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>bt51.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>bt52.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>bt53.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>bt61.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>bt62.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>checkbox1.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>checkbox2.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>checkbox3.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>checkbox4.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>default.skn: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>defbtn1.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>defbtn2.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>defbtn3.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>glyph1.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>glyph2.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>glyph3.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>glyph4.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>glyph5.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>glyph6.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>glyph7.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>main.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>preview.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>sprite1.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>tab1.bmp: password protected
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Skins\Ad-Aware SE default.ask=>tab2.bmp: password protected
C:\Program Files\WeirdOnTheWeb\weirdontheweb.exe: suspect BehavesLike:Trojan.Downloader
C:\Program Files\WeirdOnTheWeb\weirdontheweb.exe: disinfection failed
C:\Program Files\Windows Media Player\wmplayer.exe: suspect BehavesLike:Trojan.Downloader
C:\Program Files\Windows Media Player\wmplayer.exe: disinfection failed
C:\WINNT\protector.exe: infected with BehavesLike:Win32.ExplorerHijack
C:\WINNT\protector.exe: disinfection failed
C:\WINNT\system\fkncxan.exe: suspect Trojan.Downloader.Small.Gen
C:\WINNT\system\fkncxan.exe: disinfection failed
C:\WINNT\system\mrath.xxx: suspect Trojan.Downloader.Small.Gen
C:\WINNT\system\mrath.xxx: disinfection failed
C:\WINNT\system\rfqunae.xxx: suspect Trojan.Downloader.Small.Gen
C:\WINNT\system\rfqunae.xxx: disinfection failed
Logfile of HijackThis v1.99.1
Scan saved at 7:03:45 AM, on 5/19/2005
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\ibmpmsvc.exe
C:\WINNT\system32\Ati2evxx.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\System32\svchost.exe
C:\WINNT\system32\spoolsv.exe
C:\WINNT\system32\hidserv.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\OfficeScan NT\ntrtscan.exe
C:\OfficeScan NT\OfcPfwSvc.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\System32\snmp.exe
C:\OfficeScan NT\tmlisten.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\TEMP\JIF75A.EXE
C:\WINNT\system32\Ati2evxx.exe
C:\WINNT\Explorer.EXE
C:\WINNT\system32\tp4mon.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\WINNT\AGRSMMSG.exe
C:\OfficeScan NT\pccntmon.exe
C:\PROGRA~1\ThinkPad\UTILIT~1\TP98TRAY.EXE
C:\Program Files\Java\jre1.5.0_01\bin\jusched.exe
C:\WINNT\system32\ctfmon.exe
C:\WINNT\system32\Sktempdm.exe
C:\Program Files\Linksys\Wireless-G Notebook Adapter\WPC54CFG.EXE
C:\WINNT\System32\svchost.exe
C:\OfficeScan NT\Pop3Trap.exe
C:\Program Files\hijackthis-1\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.educationcentral.org/
O2 - BHO: CExtension Object - {0019C3E2-DD48-4A6D-ABCD-8D32436323D9} - C:\WINNT\cfgmgr52.dll (file missing)
O2 - BHO: (no name) - {016235BE-59D4-4CEB-ADD5-E2378282A1D9} - C:\Program Files\CxtPls\cxtpls.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O4 - HKLM\..\Run: [TrackPointSrv] tp4mon.exe
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [OfficeScanNT Monitor] "C:\OfficeScan NT\pccntmon.exe" -HideWindow
O4 - HKLM\..\Run: [Detect Kbd Daemon] SK2000DM.EXE
O4 - HKLM\..\Run: [TPTRAY] C:\PROGRA~1\ThinkPad\UTILIT~1\TP98TRAY.EXE
O4 - HKLM\..\Run: [C:\WINNT\VCMnet11.exe] C:\WINNT\VCMnet11.exe
O4 - HKLM\..\Run: [AutoUpdater] "C:\Program Files\AutoUpdate\AutoUpdate.exe"
O4 - HKLM\..\Run: [cfgmgr52] RunDLL32.EXE C:\WINNT\cfgmgr52.dll,DllRun
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_01\bin\jusched.exe
O4 - HKCU\..\Run: [ctfmon.exe] ctfmon.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: Wireless-G Notebook Adapter Utility.lnk = C:\Program Files\Linksys\Wireless-G Notebook Adapter\WPC54CFG.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0521.dll
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0521.dll
O15 - Trusted Zone: http://*.dcpsweb
O15 - Trusted Zone: http://dcpsweb.educationcentral.org
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akamai.net/7/1540/52/20021205/qtinstall.info.apple.com/drakken/us/win/QuickTimeInstaller.exe
O16 - DPF: {80DD2229-B8E4-4C77-B72F-F22972D723EA} (AvxScanOnline Control) - http://www.bitdefender.com/scan/Msie/bitdefender.cab
O16 - DPF: {9059F30F-4EB1-4BD2-9FDC-36F43A218F4A} (Microsoft RDP Client Control (redist)) - http://t002dtrn/tsweb/msrdp.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.com/activescan/as5/asinst.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = dcps.duval.us
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = dcps.duval.us
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = dcps.duval.us
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINNT\system32\Ati2evxx.exe
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - Service: IBM PM Service (IBMPMSVC) - Unknown owner - C:\WINNT\system32\ibmpmsvc.exe
O23 - Service: OfficeScanNT RealTime Scan (ntrtscan) - Trend Micro Inc. - C:\OfficeScan NT\ntrtscan.exe
O23 - Service: OfficeScanNT Personal Firewall (OfcPfwSvc) - Trend Micro Inc. - C:\OfficeScan NT\OfcPfwSvc.exe
O23 - Service: OfficeScanNT Listener (tmlisten) - Trend Micro Inc. - C:\OfficeScan NT\tmlisten.exe
http://cleanup.stevengould.org/
Make sure that you can VIEW ALL HIDDEN FILES.
Place a checkmark next to these entries, close all browsers and windows, and have HijackThis fix them by clicking Fix Checked:
O2 - BHO: CExtension Object - {0019C3E2-DD48-4A6D-ABCD-8D32436323D9} - C:\WINNT\cfgmgr52.dll (file missing)
O2 - BHO: (no name) - {016235BE-59D4-4CEB-ADD5-E2378282A1D9} - C:\Program Files\CxtPls\cxtpls.dll
O4 - HKLM\..\Run: [C:\WINNT\VCMnet11.exe] C:\WINNT\VCMnet11.exe
O4 - HKLM\..\Run: [AutoUpdater] "C:\Program Files\AutoUpdate\AutoUpdate.exe"
O4 - HKLM\..\Run: [cfgmgr52] RunDLL32.EXE C:\WINNT\cfgmgr52.dll,DllRun
Reboot your computer into SAFE MODE
Then delete these files or directories (Do not be concerned if they do not exist):
C:\WINNT\VCMnet11.exe
C:\WINNT\cfgmgr52.dll
C:\Program Files\CxtPls
C:\Program Files\AutoUpdate
C:\WINNT\bsx32
C:\WINNT\system32\EDOW_AS2.EXE
C:\Program Files\FwBarTemp
C:\WINNT\system32\installer_MARKETING??.exe
C:\WINNT\ehnqdhwn.exe
C:\WINNT\protector.exe
C:\WINNT\system32\auto_update_uninstall.exe
C:\WINNT\system32\auto_update_uninstall.log
C:\WINNT\system32\bs51-eginwl51-vb.exe
C:\WINNT\system32\cxtpls_loader.exe
C:\WINNT\system32\EDow_AS2.exe
C:\WINNT\system32\msftpki.exe
C:\WINNT\system32\ntmtus40.exe
C:\WINNT\system\fkncxan.exe
While still in Safe mode, run CleanUp.
Reboot your computer to go back to normal mode and post a new log.
Here are the log files:
CleanUp log
CleanUp! started on 05/19/05 23:43:45.
C:\Documents and Settings\minda\Local Settings\Temporary Internet Files\Content.IE5\index.dat currently in use. Will be deleted when Windows is restarted.
C:\Documents and Settings\minda\Local Settings\Temporary Internet Files\Content.IE5\index.dat currently in use. Will be deleted when Windows is restarted.
C:\Documents and Settings\minda\Local Settings\History\History.IE5\index.dat currently in use. Will be deleted when Windows is restarted.
C:\Documents and Settings\minda\Local Settings\History\History.IE5\MSHist012005051920050520\index.dat currently in use. Will be deleted when Windows is restarted.
C:\Documents and Settings\minda\Local Settings\History\History.IE5\MSHist012005051920050520\index.dat currently in use. Will be deleted when Windows is restarted.
C:\Documents and Settings\minda\Local Settings\History\History.IE5\index.dat currently in use. Will be deleted when Windows is restarted.
C:\Documents and Settings\minda\Local Settings\History\History.IE5\MSHist012005051920050520\index.dat currently in use. Will be deleted when Windows is restarted.
'Typed URLs' (Internet Explorer) - removed from the registry.
Visited: minda@about:Home - deleted
Visited: [email]minda@file:///C:/Documents%20and%20Settings/minda/Desktop/Next%20delete%20these%20files.doc[/email] - deleted
C:\Documents and Settings\minda\Cookies\index.dat currently in use. Will be deleted when Windows is restarted.
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\1225FCC4d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\1E3417FFd01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\248F3A15d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\24E15CBFd01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\2691A838d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\33702541d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\3A7E410Ad01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\44376EABd01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\4F91D94Bd01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\5662CF28d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\7693B820d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\76D392C1d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\85808E05d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\8C30C4C9d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\9662CF28d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\98AE8D67d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\9FCB6F40d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\A93322F9d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\B3DD4CA8d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\B4A7CBDAd01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\B662CF28d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\B662CF31d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\BBB2CBDAd01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\BF7CC74Bd01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\C1EC91ECd01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\C7E04E9Ed01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\CDEE2C23d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\D43DCF00d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\DF54093Dd01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\E0522F49d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\E111928Dd01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\E8CAAAAAd01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\FE83C669d01 - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\_CACHE_001_ - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\_CACHE_002_ - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\_CACHE_003_ - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\Cache\_CACHE_MAP_ - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\history.dat - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\cookies.txt.old - deleted
C:\Documents and Settings\minda\Recent\Next delete these files.doc.lnk - deleted
C:\DOCUME~1\minda\LOCALS~1\Temp\jusched.log - deleted
C:\DOCUME~1\minda\LOCALS~1\Temp\_ZCTmp.Dir\_ZC000.TMP - deleted
C:\DOCUME~1\minda\LOCALS~1\Temp\_ZCTmp.Dir\ - deleted
C:\Documents and Settings\minda\Cookies\index.dat currently in use. Will be deleted when Windows is restarted.
C:\Documents and Settings\minda\locals~1\tempor~1\Content.IE5\index.dat currently in use. Will be deleted when Windows is restarted.
C:\Documents and Settings\minda\Cookies\index.dat currently in use. Will be deleted when Windows is restarted.
C:\Documents and Settings\minda\Local Settings\History\History.IE5\index.dat currently in use. Will be deleted when Windows is restarted.
C:\Documents and Settings\minda\Local Settings\History\History.IE5\MSHist012005051920050520\index.dat currently in use. Will be deleted when Windows is restarted.
C:\Documents and Settings\minda\Local Settings\Temporary Internet Files\Content.IE5\index.dat currently in use. Will be deleted when Windows is restarted.
C:\Documents and Settings\bachelorm\Application Data\Mozilla\Firefox\Profiles\sb3r38nr.default\bookmarks.bak - deleted
C:\Documents and Settings\minda\Application Data\Microsoft\Office\Recent\index.dat - deleted
C:\Documents and Settings\minda\Application Data\Mozilla\Firefox\Profiles\di8y69jc.default\bookmarks.bak - deleted
C:\Documents and Settings\minda\Cookies\index.dat currently in use. Will be deleted when Windows is restarted.
C:\Documents and Settings\minda\Local Settings\History\History.IE5\index.dat currently in use. Will be deleted when Windows is restarted.
C:\Documents and Settings\minda\Local Settings\History\History.IE5\MSHist012005051920050520\index.dat currently in use. Will be deleted when Windows is restarted.
C:\Documents and Settings\minda\Local Settings\Temporary Internet Files\Content.IE5\index.dat currently in use. Will be deleted when Windows is restarted.
C:\WINNT\system32\NtmsData\NTMSDATA.BAK - deleted
Emptied Recycle Bin on drive C:
'Run MRU' list - removed from the registry.
'FilesNamedMRU' list - removed from the registry.
Telnet's MRU list - removed from the registry.
CleanUp! 4.0 recovered 7.1 MB of disk space from 61 files.
CleanUp! finished on 05/19/05 23:44:42.
Logfile of HijackThis v1.99.1
Scan saved at 11:51:36 PM, on 5/19/2005
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\ibmpmsvc.exe
C:\WINNT\system32\Ati2evxx.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\System32\svchost.exe
C:\WINNT\system32\spoolsv.exe
C:\WINNT\system32\hidserv.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\OfficeScan NT\ntrtscan.exe
C:\OfficeScan NT\OfcPfwSvc.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\System32\snmp.exe
C:\OfficeScan NT\tmlisten.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\TEMP\HBE072.EXE
C:\WINNT\system32\Ati2evxx.exe
C:\WINNT\Explorer.EXE
C:\WINNT\system32\tp4mon.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\WINNT\AGRSMMSG.exe
C:\OfficeScan NT\pccntmon.exe
C:\PROGRA~1\ThinkPad\UTILIT~1\TP98TRAY.EXE
C:\WINNT\system32\Sktempdm.exe
C:\Program Files\Java\jre1.5.0_01\bin\jusched.exe
C:\WINNT\system32\ctfmon.exe
C:\Program Files\Linksys\Wireless-G Notebook Adapter\WPC54CFG.EXE
C:\OfficeScan NT\Pop3Trap.exe
C:\Program Files\hijackthis-1\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.educationcentral.org/
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O4 - HKLM\..\Run: [TrackPointSrv] tp4mon.exe
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [OfficeScanNT Monitor] "C:\OfficeScan NT\pccntmon.exe" -HideWindow
O4 - HKLM\..\Run: [Detect Kbd Daemon] SK2000DM.EXE
O4 - HKLM\..\Run: [TPTRAY] C:\PROGRA~1\ThinkPad\UTILIT~1\TP98TRAY.EXE
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_01\bin\jusched.exe
O4 - HKCU\..\Run: [ctfmon.exe] ctfmon.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: Wireless-G Notebook Adapter Utility.lnk = C:\Program Files\Linksys\Wireless-G Notebook Adapter\WPC54CFG.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0521.dll
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0521.dll
O15 - Trusted Zone: http://*.dcpsweb
O15 - Trusted Zone: http://dcpsweb.educationcentral.org
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akamai.net/7/1540/52/20021205/qtinstall.info.apple.com/drakken/us/win/QuickTimeInstaller.exe
O16 - DPF: {80DD2229-B8E4-4C77-B72F-F22972D723EA} (AvxScanOnline Control) - http://www.bitdefender.com/scan/Msie/bitdefender.cab
O16 - DPF: {9059F30F-4EB1-4BD2-9FDC-36F43A218F4A} (Microsoft RDP Client Control (redist)) - http://t002dtrn/tsweb/msrdp.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.com/activescan/as5/asinst.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = dcps.duval.us
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = dcps.duval.us
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = dcps.duval.us
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINNT\system32\Ati2evxx.exe
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - Service: IBM PM Service (IBMPMSVC) - Unknown owner - C:\WINNT\system32\ibmpmsvc.exe
O23 - Service: OfficeScanNT RealTime Scan (ntrtscan) - Trend Micro Inc. - C:\OfficeScan NT\ntrtscan.exe
O23 - Service: OfficeScanNT Personal Firewall (OfcPfwSvc) - Trend Micro Inc. - C:\OfficeScan NT\OfcPfwSvc.exe
O23 - Service: OfficeScanNT Listener (tmlisten) - Trend Micro Inc. - C:\OfficeScan NT\tmlisten.exe
BookedSpace
Tracking Cookie
PeopleOnPage
Other than that I guess I'm good.
Thank you for your help!
Let me know if there's anything else I can do.
Minda
Minda
- Disable and Enable System Restore. - If you are using Windows ME or XP then you should disable and reenable system restore to make sure there are no infected files found in a restore point left over from what we have just cleaned.
- Make your Internet Explorer more secure - This can be done by following these simple instructions:
- From within Internet Explorer click on the Tools menu and then click on Options.
- Click once on the Security tab
- Click once on the Internet icon so it becomes highlighted.
- Click once on the Custom Level button.
- Change the Download signed ActiveX controls to Prompt
- Change the Download unsigned ActiveX controls to Disable
- Change the Initialize and script ActiveX controls not marked as safe to Disable
- Change the Installation of desktop items to Prompt
- Change the Launching programs and files in an IFRAME to Prompt
- Change the Navigate sub-frames across different domains to Prompt
- When all these settings have been made, click on the OK button.
- If it prompts you as to whether or not you want to save the settings, press the Yes button.
- Next press the Apply button and then the OK to exit the Internet Properties page.
- Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.
- Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.
- Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.
- Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.
- Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.
- Install Ad-Aware - Install and download Ad-Aware. ou should also scan your computer with program on a regular basis just as you would an antivirus software in conjunction with Spybot.
- Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.
- Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.You can find instructions on how to enable and reenable system restore here:
Managing Windows Millenium System Restore
or
Windows XP System Restore Guide
Renable system restore with instructions from tutorial above
See this link for a listing of some online & their stand-alone antivirus programs:
Virus, Spyware, and Malware Protection and Removal Resources
For a tutorial on Firewalls and a listing of some available ones see the link below:
Understanding and Using Firewalls
A tutorial on installing & using this product can be found here:
Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers
A tutorial on installing & using this product can be found here:
Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer
A tutorial on installing & using this product can be found here:
Using SpywareBlaster to protect your computer from Spyware and Malware