Welcome to MalwareRemoval.com,
What if we told you that you could get malware removal help from experts, and that it was 100% free? MalwareRemoval.com provides free support for people with infected computers. Our help, and the tools we use are always 100% free. No hidden catch. We simply enjoy helping others. You enjoy a clean, safe computer.

Malware Removal Instructions

hijack this log

MalwareRemoval.com provides free support for people with infected computers. Using plain language that anyone can understand, our community of volunteer experts will walk you through each step.

hijack this log

Unread postby anglgrl127 » June 29th, 2005, 4:29 pm

Hi,

Below please find my hijack this log. From my norton scan, it looks like I have edmond.exe, but the clean and quarantine failed. Please help me if you can. Thank you.



Logfile of HijackThis v1.99.1
Scan saved at 4:31:05 PM, on 6/30/2005
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\LEXBCES.EXE
C:\WINNT\system32\spoolsv.exe
C:\WINNT\system32\LEXPPS.EXE
C:\Program Files\NavNT\defwatch.exe
C:\WINNT\System32\svchost.exe
C:\Program Files\NavNT\rtvscan.exe
C:\WINNT\System32\ofps.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\System32\svchost.exe
C:\WINNT\system32\MsgSys.EXE
C:\WINNT\system32\rundll32.exe
C:\WINNT\Explorer.EXE
C:\Program Files\NavNT\vptray.exe
C:\program files\tvs\tvs_b.exe
C:\Program Files\adtn\weua.exe
C:\WINNT\system32\t?skmgr.exe
C:\Program Files\NavNT\vpc32.exe
C:\WINNT\system32\rmmvun.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\jjackson\Desktop\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL = http://searchmiracle.com/sp.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://searchmiracle.com/sp.php
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [vptray] C:\Program Files\NavNT\vptray.exe
O4 - HKLM\..\Run: [KavSvc] C:\WINNT\system32\rmmvun.exe reg_run
O4 - HKLM\..\Run: [MSConfig] C:\WINNT\system32\MSCONFIG.exe /auto
O4 - HKCU\..\Run: [Cpub] C:\Program Files\adtn\weua.exe
O4 - HKCU\..\Run: [Yqqjuc] C:\WINNT\system32\t?skmgr.exe
O4 - HKCU\..\RunOnce: [Web Offer] C:\WINNT\system32\ezPopStub.exe /UninstPOP2 C:\Program Files\Web Offer
O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://C:\Program Files\Google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
O16 - DPF: {7149E79C-DC19-4C5E-A53C-A54DDF75EEE9} - http://cabs.media-motor.net/cabs/joysaver.cab
O16 - DPF: {E0CE16CB-741C-4B24-8D04-A817856E07F4} - http://cabs.media-motor.net/cabs/joysaver.cab
O18 - Filter: text/html - {950238FB-C706-4791-8674-4D429F85897E} - (no file)
O20 - Winlogon Notify: Extensions - C:\WINNT\system32\k8440ihqe84e0.dll
O20 - Winlogon Notify: NavLogon - C:\WINNT\System32\NavLogon.dll
O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\NavNT\defwatch.exe
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINNT\system32\LEXBCES.EXE
O23 - Service: Norton AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\Program Files\NavNT\rtvscan.exe
O23 - Service: OmniForm Printer - Unknown owner - C:\WINNT\System32\ofps.exe
anglgrl127
Active Member
 
Posts: 7
Joined: June 29th, 2005, 4:21 pm
Advertisement
Register to Remove

Unread postby markkhunt » June 30th, 2005, 10:26 am

Hi, anglgrl127. Welcome to the Malware Removal forums.

I am looking at your log now and will post back some instructions for you as soon as I have had time to research it. Thank you for your patience.
User avatar
markkhunt
Admin/Teacher Emeritus
 
Posts: 7911
Joined: April 15th, 2005, 8:58 pm
Location: Newburgh, IN

Unread postby markkhunt » June 30th, 2005, 10:59 am

Hi, anglgrl127. I see different types of malware in your log, so let's start with the more serious infection first. You have the latest version of VX2. Download L2mfix from one of these two locations:

http://www.atribune.org/downloads/l2mfix.exe
http://www.downloads.subratam.org/l2mfix.exe

Save the file to your desktop and double click l2mfix.exe. Click the Install button to extract the files and follow the prompts, then open the newly added l2mfix folder on your desktop. Double click l2mfix.bat and select option #1 for Run Find Log by typing 1 and then pressing enter. If you receive a warning about a script/batch file trying to run, please choose to allow it. This will scan your computer and it may appear nothing is happening, then, after a minute or 2, notepad will open with a log. Copy the contents of that log and paste it into this thread.

IMPORTANT: Do NOT run option #2 OR any other files in the l2mfix folder until you are asked to do so!
User avatar
markkhunt
Admin/Teacher Emeritus
 
Posts: 7911
Joined: April 15th, 2005, 8:58 pm
Location: Newburgh, IN

Unread postby anglgrl127 » July 1st, 2005, 9:21 am

Hi Markkhunt. Thank you so much for your help so far. Here is my log:


L2MFIX find log 1.03
These are the registry keys present
**********************************************************************************
Winlogon/notify:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt32chain]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,33,00,32,00,2e,00,64,00,6c,00,\
6c,00,00,00
"Logoff"="ChainWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cryptnet]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,6e,00,65,00,74,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Logoff"="CryptnetWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cscdll]
"DLLName"="cscdll.dll"
"Logon"="WinlogonLogonEvent"
"Logoff"="WinlogonLogoffEvent"
"ScreenSaver"="WinlogonScreenSaverEvent"
"Startup"="WinlogonStartupEvent"
"Shutdown"="WinlogonShutdownEvent"
"StartShell"="WinlogonStartShellEvent"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\MS-DOS Emulation]
"Asynchronous"=dword:00000000
"DllName"="C:\\WINNT\\system32\\j46m0ej1eho.dll"
"Impersonate"=dword:00000000
"Logon"="WinLogon"
"Logoff"="WinLogoff"
"Shutdown"="WinShutdown"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\NavLogon]
"DllName"="C:\\WINNT\\System32\\NavLogon.dll"
"Logoff"="NavLogoffEvent"
"StartShell"="NavStartShellEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\sclgntfy]
"Logoff"="WLEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001
"DllName"=hex(2):73,00,63,00,6c,00,67,00,6e,00,74,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SensLogn]
"DLLName"="WlNotify.dll"
"Lock"="SensLockEvent"
"Logon"="SensLogonEvent"
"Logoff"="SensLogoffEvent"
"Safe"=dword:00000001
"MaxWait"=dword:00000258
"StartScreenSaver"="SensStartScreenSaverEvent"
"StopScreenSaver"="SensStopScreenSaverEvent"
"Startup"="SensStartupEvent"
"Shutdown"="SensShutdownEvent"
"StartShell"="SensStartShellEvent"
"Unlock"="SensUnlockEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wzcnotif]
"DLLName"="wzcdlg.dll"
"Logon"="WZCEventLogon"
"Logoff"="WZCEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000000

**********************************************************************************
useragent:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
"{B015C257-6541-1C92-3FFB-A51DF316579B}"=""

**********************************************************************************
Shell Extension key:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]
"{00022613-0000-0000-C000-000000000046}"="Multimedia File Property Sheet"
"{176d6597-26d3-11d1-b350-080036a75b03}"="ICM Scanner Management"
"{1F2E5C40-9550-11CE-99D2-00AA006E086C}"="NTFS Security Page"
"{3EA48300-8CF6-101B-84FB-666CCB9BCD32}"="OLE Docfile Property Page"
"{40dd6e20-7c17-11ce-a804-00aa003ca9f6}"="Shell extensions for sharing"
"{41E300E0-78B6-11ce-849B-444553540000}"="PlusPack CPL Extension"
"{42071712-76d4-11d1-8b24-00a0c9068ff3}"="Display Adapter CPL Extension"
"{42071713-76d4-11d1-8b24-00a0c9068ff3}"="Display Monitor CPL Extension"
"{42071714-76d4-11d1-8b24-00a0c9068ff3}"="Display Panning CPL Extension"
"{4E40F770-369C-11d0-8922-00A024AB2DBB}"="DS Security Page"
"{56117100-C0CD-101B-81E2-00AA004AE837}"="Shell Scrap DataHandler"
"{59099400-57FF-11CE-BD94-0020AF85B590}"="Disk Copy Extension"
"{59be4990-f85c-11ce-aff7-00aa003ca9f6}"="Shell extensions for Microsoft Windows Network objects"
"{5DB2625A-54DF-11D0-B6C4-0800091AA605}"="ICM Monitor Management"
"{675F097E-4C4D-11D0-B6C1-0800091AA605}"="ICM Printer Management"
"{764BF0E1-F219-11ce-972D-00AA00A14F56}"="Shell extensions for file compression"
"{77597368-7b15-11d0-a0c2-080036af3f03}"="Web Printer Shell Extension"
"{7988B573-EC89-11cf-9C00-00AA00A14F56}"="Disk Quota UI"
"{853FE2B1-B769-11d0-9C4E-00C04FB6C6FA}"="Encryption Context Menu"
"{85BBD920-42A0-1069-A2E4-08002B30309D}"="Briefcase"
"{88895560-9AA2-1069-930E-00AA0030EBC8}"="HyperTerminal Icon Ext"
"{BD84B380-8CA2-1069-AB1D-08000948F534}"="Fonts"
"{DBCE2480-C732-101B-BE72-BA78E9AD5B27}"="ICC Profile"
"{F37C5810-4D3F-11d0-B4BF-00AA00BBB723}"="Printers Security Page"
"{f81e9010-6ea4-11ce-a7ff-00aa003ca9f6}"="Shell extensions for sharing"
"{f92e8c40-3d33-11d2-b1aa-080036a75b03}"="Display TroubleShoot CPL Extension"
"{60254CA5-953B-11CF-8C96-00AA00B8708C}"="Shell extensions for Windows Script Host"
"{7444C717-39BF-11D1-8CD9-00C04FC29D45}"="Crypto PKO Extension"
"{7444C719-39BF-11D1-8CD9-00C04FC29D45}"="Crypto Sign Extension"
"{7007ACC7-3202-11D1-AAD2-00805FC1270E}"="Network and Dial-up Connections"
"{DD2110F0-9EEF-11cf-8D8E-00AA0060F5BF}"="Tasks Folder Icon Handler"
"{797F1E90-9EDD-11cf-8D8E-00AA0060F5BF}"="Tasks Folder Shell Extension"
"{D6277990-4C6A-11CF-8D87-00AA0060F5BF}"="Scheduled Tasks"
"{1A9BA3A0-143A-11CF-8350-444553540000}"="Shell Favorite Folder"
"{20D04FE0-3AEA-1069-A2D8-08002B30309D}"="My Computer"
"{86747AC0-42A0-1069-A2E6-08002B30309D}"="Briefcase Folder"
"{0AFACED1-E828-11D1-9187-B532F1E9575D}"="Folder Shortcut"
"{12518493-00B2-11d2-9FA5-9E3420524153}"="Mounted Volume"
"{21B22460-3AEA-1069-A2DC-08002B30309D}"="File Property Page Extension"
"{B091E540-83E3-11CF-A713-0020AFD79762}"="File Types Page"
"{FBF23B41-E3F0-101B-8488-00AA003E56F8}"="MIME File Types Hook"
"{C2FBB630-2971-11d1-A18C-00C04FD75D13}"="Microsoft CopyTo Service"
"{C2FBB631-2971-11d1-A18C-00C04FD75D13}"="Microsoft MoveTo Service"
"{13709620-C279-11CE-A49E-444553540000}"="Shell Automation Service"
"{62112AA1-EBE4-11cf-A5FB-0020AFE7292D}"="Shell Automation Folder View"
"{4622AD11-FF23-11d0-8D34-00A0C90F2719}"="Start Menu"
"{7BA4C740-9E81-11CF-99D3-00AA004AE837}"="Microsoft SendTo Service"
"{D969A300-E7FF-11d0-A93B-00A0C90F2719}"="Microsoft New Object Service"
"{09799AFB-AD67-11d1-ABCD-00C04FC30936}"="Open With Context Menu Handler"
"{3FC0B520-68A9-11D0-8D77-00C04FD70822}"="Display Control Panel HTML Extensions"
"{75048700-EF1F-11D0-9888-006097DEACF9}"="ActiveDesktop"
"{6D5313C0-8C62-11D1-B2CD-006097DF8C11}"="Folder Options Property Page Extension"
"{57651662-CE3E-11D0-8D77-00C04FC99D61}"="CmdFileIcon"
"{4657278A-411B-11d2-839A-00C04FD918D0}"="Shell Drag and Drop helper"
"{A470F8CF-A1E8-4f65-8335-227475AA5C46}"="Add encryption item to context menus in explorer"
"{5E6AB780-7743-11CF-A12B-00AA004AE837}"="Microsoft Internet Toolbar"
"{22BF0C20-6DA7-11D0-B373-00A0C9034938}"="Download Status"
"{568804CA-CBD7-11d0-9816-00C04FD91972}"="Menu Shell Folder"
"{5b4dae26-b807-11d0-9815-00c04fd91972}"="Menu Band"
"{8278F931-2A3E-11d2-838F-00C04FD918D0}"="Tracking Shell Menu"
"{E13EF4E4-D2F2-11d0-9816-00C04FD91972}"="Menu Site"
"{ECD4FC4F-521C-11D0-B792-00A0C90312E1}"="Menu Desk Bar"
"{91EA3F8B-C99B-11d0-9815-00C04FD91972}"="Augmented Shell Folder"
"{6413BA2C-B461-11d1-A18A-080036B11A03}"="Augmented Shell Folder 2"
"{F61FFEC1-754F-11d0-80CA-00AA005B4383}"="BandProxy"
"{D82BE2B0-5764-11D0-A96E-00C04FD705A2}"="IShellFolderBand"
"{7BA4C742-9E81-11CF-99D3-00AA004AE837}"="Microsoft BrowserBand"
"{30D02401-6A81-11d0-8274-00C04FD5AE38}"="Search Band"
"{169A0691-8DF9-11d1-A1C4-00C04FD75D13}"="In-pane search"
"{07798131-AF23-11d1-9111-00A0C98BA67D}"="Web Search"
"{0E5CBF21-D15F-11d0-8301-00AA005B4383}"="&Links"
"{AF4F6510-F982-11d0-8595-00AA004CD6D8}"="Registry Tree Options Utility"
"{01E04581-4EEE-11d0-BFE9-00AA005B4383}"="&Address"
"{A08C11D2-A228-11d0-825B-00AA005B4383}"="Address EditBox"
"{00BB2763-6A77-11D0-A535-00C04FD7D062}"="Microsoft AutoComplete"
"{7487cd30-f71a-11d0-9ea7-00805f714772}"="Thumbnail Image"
"{7376D660-C583-11d0-A3A5-00C04FD706EC}"="TridentImageExtractor"
"{6756A641-DE71-11d0-831B-00AA005B4383}"="MRU AutoComplete List"
"{00BB2764-6A77-11D0-A535-00C04FD7D062}"="Microsoft History AutoComplete List"
"{03C036F1-A186-11D0-824A-00AA005B4383}"="Microsoft Shell Folder AutoComplete List"
"{00BB2765-6A77-11D0-A535-00C04FD7D062}"="Microsoft Multiple AutoComplete List Container"
"{ECD4FC4E-521C-11D0-B792-00A0C90312E1}"="Shell Band Site Menu"
"{3CCF8A41-5C85-11d0-9796-00AA00B90ADF}"="Shell DeskBarApp"
"{ECD4FC4C-521C-11D0-B792-00A0C90312E1}"="Shell DeskBar"
"{ECD4FC4D-521C-11D0-B792-00A0C90312E1}"="Shell Rebar BandSite"
"{DD313E04-FEFF-11d1-8ECD-0000F87A470C}"="User Assist"
"{EF8AD2D1-AE36-11D1-B2D2-006097DF8C11}"="Global Folder Settings"
"{EFA24E61-B078-11d0-89E4-00C04FC9E26E}"="Favorites Band"
"{0A89A860-D7B1-11CE-8350-444553540000}"="Shell Automation Inproc Service"
"{E7E4BC40-E76A-11CE-A9BB-00AA004AE837}"="Shell DocObject Viewer"
"{FBF23B40-E3F0-101B-8488-00AA003E56F8}"="InternetShortcut"
"{3C374A40-BAE4-11CF-BF7D-00AA006946EE}"="Microsoft Url History Service"
"{FF393560-C2A7-11CF-BFF4-444553540000}"="History"
"{7BD29E00-76C1-11CF-9DD0-00A0C9034933}"="Temporary Internet Files"
"{CFBFAE00-17A6-11D0-99CB-00C04FD64497}"="Microsoft Url Search Hook"
"{A2B0DD40-CC59-11d0-A3A5-00C04FD706EC}"="IE4 Suite Splash Screen"
"{67EA19A0-CCEF-11d0-8024-00C04FD75D13}"="CDF Extension Copy Hook"
"{131A6951-7F78-11D0-A979-00C04FD705A2}"="ISFBand OC"
"{9461b922-3c5a-11d2-bf8b-00c04fb93661}"="Search Assistant OC"
"{3DC7A020-0ACD-11CF-A9BB-00AA004AE837}"="The Internet"
"{871C5380-42A0-1069-A2EA-08002B30309D}"="Internet Name Space"
"{9E56BE60-C50F-11CF-9A2C-00A0C90A90CE}"="Sendmail service"
"{9E56BE61-C50F-11CF-9A2C-00A0C90A90CE}"="Sendmail service"
"{88C6C381-2E85-11D0-94DE-444553540000}"="ActiveX Cache Folder"
"{E6FB5E20-DE35-11CF-9C87-00AA005127ED}"="WebCheck"
"{ABBE31D0-6DAE-11D0-BECA-00C04FD940BE}"="Subscription Mgr"
"{F5175861-2688-11d0-9C5E-00AA00A45957}"="Subscription Folder"
"{08165EA0-E946-11CF-9C87-00AA005127ED}"="WebCheckWebCrawler"
"{E3A8BDE6-ABCE-11d0-BC4B-00C04FD929DB}"="WebCheckChannelAgent"
"{E8BB6DC0-6B4E-11d0-92DB-00A0C90C2BD7}"="TrayAgent"
"{7D559C10-9FE9-11d0-93F7-00AA0059CE02}"="Code Download Agent"
"{E6CC6978-6B6E-11D0-BECA-00C04FD940BE}"="ConnectionAgent"
"{D8BD2030-6FC9-11D0-864F-00AA006809D9}"="PostAgent"
"{7FC0B86E-5FA7-11d1-BC7C-00C04FD929DB}"="WebCheck SyncMgr Handler"
"{8BEBB290-52D0-11D0-B7F4-00C04FD706EC}"="Thumbnails"
"{EAB841A0-9550-11CF-8C16-00805F1408F3}"="HTML Thumbnail Extractor"
"{1AEB1360-5AFC-11D0-B806-00C04FD706EC}"="Office Graphics Filters Thumbnail Extractor"
"{9DBD2C50-62AD-11D0-B806-00C04FD706EC}"="Summary Info Thumbnail handler (DOCFILES)"
"{500202A0-731E-11D0-B829-00C04FD706EC}"="LNK file thumbnail interface delegator"
"{352EC2B7-8B9A-11D1-B8AE-006008059382}"="Shell Application Manager"
"{0B124F8C-91F0-11D1-B8B5-006008059382}"="Installed Apps Enumerator"
"{CFCCC7A0-A282-11D1-9082-006008059382}"="Darwin App Publisher"
"{fe1290f0-cfbd-11cf-a330-00aa00c16e65}"="Directory Namespace"
"{9E51E0D0-6E0F-11d2-9601-00C04FA31A86}"="Shell properties for a DS object"
"{8A23E65E-31C2-11d0-891C-00A024AB2DBB}"="Directory Query UI"
"{163FDC20-2ABC-11d0-88F0-00A024AB2DBB}"="Directory Object Find"
"{F020E586-5264-11d1-A532-0000F8757D7E}"="Directory Start/Search Find"
"{0D45D530-764B-11d0-A1CA-00AA00C16E65}"="Directory Property UI"
"{62AE1F9A-126A-11D0-A14B-0800361B1103}"="Directory Context Menu Verbs"
"{450D8FBA-AD25-11D0-98A8-0800361B1103}"="MyDocs Folder"
"{ECF03A33-103D-11d2-854D-006008059367}"="MyDocs Copy Hook"
"{ECF03A32-103D-11d2-854D-006008059367}"="MyDocs Drop Target"
"{4a7ded0a-ad25-11d0-98a8-0800361b1103}"="MyDocs Properties"
"{750fdf0e-2a26-11d1-a3ea-080036587f03}"="Offline Files Menu"
"{10CFC467-4392-11d2-8DB4-00C04FA31A66}"="Offline Files Folder Options"
"{AFDB1F70-2A4C-11d2-9039-00C04F8EEB3E}"="Offline Files Folder"
"{7A80E4A8-8005-11D2-BCF8-00C04F72C717}"="MMC Icon Handler"
"{0CD7A5C0-9F37-11CE-AE65-08002B2E1262}"=".CAB file viewer"
"{BB7DF450-F119-11CD-8465-00AA00425D90}"="Microsoft Access Custom Icon Handler"
"{59850401-6664-101B-B21C-00AA004BA90B}"="Microsoft Office Binder Unbind"
"{0006F045-0000-0000-C000-000000000046}"="Microsoft Outlook Custom Icon Handler"
"{E0D79300-84BE-11CE-9641-444553540000}"="WinZip"
"{E0D79301-84BE-11CE-9641-444553540000}"="WinZip"
"{E0D79302-84BE-11CE-9641-444553540000}"="WinZip"
"{BDA77241-42F6-11d0-85E2-00AA001FE28C}"="LDVP Shell Extensions"
"{32683183-48a0-441b-a342-7c2a440a9478}"="Media Band"
"{6935DB93-21E8-4ccc-BEB9-9FE3C77A297A}"="Custom MRU AutoCompleted List"
"{7e653215-fa25-46bd-a339-34a2790f3cb7}"="Accessible"
"{acf35015-526e-4230-9596-becbe19f0ac9}"="Track Popup Bar"
"{E0E11A09-5CB8-4B6C-8332-E00720A168F2}"="Address Bar Parser"
"{A5E46E3A-8849-11D1-9D8C-00C04FC99D61}"="Microsoft Browser Architecture"
"{7BD29E01-76C1-11CF-9DD0-00A0C9034933}"="Temporary Internet Files"
"{EFA24E64-B078-11d0-89E4-00C04FC9E26E}"="Explorer Band"
"{f39a0dc0-9cc8-11d0-a599-00c04fd64433}"="Channel File"
"{f3aa0dc0-9cc8-11d0-a599-00c04fd64434}"="Channel Shortcut"
"{f3ba0dc0-9cc8-11d0-a599-00c04fd64435}"="Channel Handler Object"
"{f3da0dc0-9cc8-11d0-a599-00c04fd64437}"="Channel Menu"
"{f3ea0dc0-9cc8-11d0-a599-00c04fd64438}"="Channel Properties"
"{32714800-2E5F-11d0-8B85-00AA0044F941}"="For &People..."
"{051C6D2B-CB14-4B15-B624-08D55B82A02E}"=""
"{1D2680C9-0E2A-469d-B787-065558BC7D43}"="Fusion Cache"

**********************************************************************************
HKEY ROOT CLASSIDS:
Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{051C6D2B-CB14-4B15-B624-08D55B82A02E}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{051C6D2B-CB14-4B15-B624-08D55B82A02E}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\CLSID\{051C6D2B-CB14-4B15-B624-08D55B82A02E}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{051C6D2B-CB14-4B15-B624-08D55B82A02E}\InprocServer32]
@="C:\\WINNT\\system32\\wbidx.dll"
"ThreadingModel"="Apartment"

**********************************************************************************
Files Found are not all bad files:

C:\WINNT\SYSTEM32\
aesmib.dll Sat Jun 25 2005 3:11:40p ..S.R 234,272 228.78 K
cpppo.dll Thu Jun 30 2005 3:49:52p A.... 17,920 17.50 K
dfloader.dll Sat Jun 18 2005 3:49:24p ..S.R 234,784 229.28 K
dfwsockx.dll Sat Jun 18 2005 12:08:18p ..S.R 234,784 229.28 K
dn2m01~1.dll Tue Jun 28 2005 6:06:20p ..S.R 234,272 228.78 K
dn6801~1.dll Sat Apr 9 2005 10:37:46a ..S.R 234,285 228.79 K
dpsrslvr.dll Sat Jun 18 2005 3:49:30p ..S.R 234,784 229.28 K
en24l1~1.dll Sun Jun 5 2005 11:11:54a ..S.R 235,851 230.32 K
enj0l1~1.dll Sat May 28 2005 5:22:38p ..S.R 234,430 228.93 K
enn6l1~1.dll Tue Jun 21 2005 5:34:18p ..S.R 234,784 229.28 K
f4l02e~1.dll Thu Apr 28 2005 8:47:04a ..S.R 232,936 227.48 K
f82m0i~1.dll Tue Apr 12 2005 2:07:34p ..S.R 234,285 228.79 K
fcamebuf.dll Sat Jun 25 2005 4:21:24p ..S.R 234,272 228.78 K
fpp203~1.dll Sat Jun 25 2005 9:24:32a ..S.R 234,882 229.38 K
gp40l3~1.dll Fri Apr 8 2005 4:53:02p ..S.R 234,285 228.79 K
gp4ml3~1.dll Tue Jun 28 2005 9:18:20a ..S.R 235,415 229.89 K
gpl6l3~1.dll Sat Jul 2 2005 9:21:10a ..S.R 236,069 230.54 K
h22o0c~1.dll Tue Apr 12 2005 5:13:54p ..S.R 234,285 228.79 K
h84mli~1.dll Fri Jun 24 2005 12:46:24p ..S.R 234,882 229.38 K
hi2o0c~1.dll Sat Jun 25 2005 11:31:22a ..S.R 234,882 229.38 K
hr6005~1.dll Tue May 10 2005 9:36:50a ..S.R 232,936 227.48 K
i4nm0e~1.dll Thu Jun 30 2005 3:48:20p ..S.R 234,426 228.93 K
j46m0e~1.dll Fri Jul 1 2005 1:07:58p ..S.R 234,436 228.94 K
jt0o07~1.dll Sat May 7 2005 12:39:38p ..S.R 232,936 227.48 K
jt8407~1.dll Wed Apr 20 2005 8:38:52a ..S.R 232,756 227.30 K
jtl007~1.dll Fri Apr 8 2005 11:36:06a ..S.R 234,285 228.79 K
k408le~1.dll Wed May 11 2005 3:32:38p ..S.R 232,936 227.48 K
k880li~1.dll Wed Jun 15 2005 2:55:24p ..S.R 234,541 229.04 K
kddusx.dll Sat Jun 25 2005 4:22:22p ..S.R 234,272 228.78 K
kt48l7~1.dll Fri May 27 2005 6:11:14p ..S.R 234,272 228.78 K
ktdcan.dll Sat Jun 18 2005 12:09:30p ..S.R 234,784 229.28 K
ktnql7~1.dll Fri Apr 8 2005 2:09:56p ..S.R 234,285 228.79 K
kwddv.dll Sat Jun 25 2005 5:46:18p ..S.R 234,272 228.78 K
l26olc~1.dll Wed Apr 27 2005 12:13:44p ..S.R 232,936 227.48 K
m6rm0g~1.dll Thu May 26 2005 6:37:50p ..S.R 234,560 229.06 K
mdxml3a.dll Sat Jun 25 2005 3:07:08p ..S.R 234,272 228.78 K
meorcl32.dll Sat Jun 18 2005 1:17:28p ..S.R 234,784 229.28 K
mgacm.dll Sat Jun 18 2005 6:26:26p ..S.R 234,784 229.28 K
mkdbg.dll Sat Jun 18 2005 6:26:34p ..S.R 234,784 229.28 K
mv2ql9~1.dll Sat Apr 9 2005 9:19:18a ..S.R 234,285 228.79 K
mv4ql9~1.dll Thu Jun 16 2005 10:04:56a ..S.R 234,430 228.93 K
mwisip.dll Sat Jun 18 2005 1:17:20p ..S.R 234,784 229.28 K
n8l80i~1.dll Thu May 5 2005 9:37:56a ..S.R 232,936 227.48 K
ngtplwiz.dll Sat Jun 18 2005 2:40:06p ..S.R 234,784 229.28 K
nqtid.dll Sat Jun 18 2005 2:40:10p ..S.R 234,784 229.28 K
o048la~1.dll Wed Apr 6 2005 10:43:34a ..S.R 233,811 228.33 K
p8n80i~1.dll Wed Jun 8 2005 8:40:48p ..S.R 236,195 230.66 K
pah.dll Sat Jun 18 2005 5:15:36p ..S.R 234,784 229.28 K
parfos.dll Sat Jun 18 2005 12:05:26p ..S.R 234,541 229.04 K
pcflbmsg.dll Thu Jun 30 2005 2:52:50p ..S.R 234,995 229.48 K
phhzogi.dll Thu Jun 30 2005 3:49:50p A.... 23,040 22.50 K
puh.dll Sat Jun 18 2005 5:15:42p ..S.R 234,784 229.28 K
r8p80i~1.dll Thu Apr 28 2005 4:18:52p ..S.R 232,936 227.48 K
rbpilib.dll Thu Jun 30 2005 2:27:28p ..S.R 234,995 229.48 K
supdate.dll Thu Jun 30 2005 3:23:58p A.... 18,432 18.00 K
wahext.dll Sat Jun 18 2005 7:33:04p ..S.R 234,784 229.28 K
wbidx.dll Sat Jul 2 2005 9:21:12a ..S.R 234,436 228.94 K

57 items found: 57 files (54 H/S), 0 directories.
Total of file sizes: 12,717,352 bytes 12.13 M
Locate .tmp files:

No matches found.
**********************************************************************************
Directory Listing of system files:
Volume in drive C has no label.
Volume Serial Number is 9812-74A8

Directory of C:\WINNT\System32

07/02/2005 09:21a 234,436 wbidx.dll
07/02/2005 09:21a 236,069 gpl6l33s1.dll
07/01/2005 01:07p 234,436 j46m0ej1eho.dll
06/30/2005 03:48p 234,426 i4nm0e51eh.dll
06/30/2005 02:52p 234,995 pcflbmsg.dll
06/30/2005 02:27p 234,995 rBpilib.dll
06/29/2005 11:30a 401,408 t?skmgr.exe
06/28/2005 06:06p 234,272 dn2m01f1e.dll
06/28/2005 09:18a 235,415 gp4ml3h11.dll
06/25/2005 05:46p 234,272 kwddv.dll
06/25/2005 04:22p 234,272 kddusx.dll
06/25/2005 04:21p 234,272 fcamebuf.dll
06/25/2005 03:11p 234,272 aesmib.dll
06/25/2005 03:07p 234,272 mdxml3a.dll
06/25/2005 11:31a 234,882 hI2o0cf3ef2.dll
06/25/2005 09:24a 234,882 fpp2037oe.dll
06/24/2005 12:46p 234,882 h84mlih1184.dll
06/21/2005 05:34p 234,784 enn6l15s1.dll
06/18/2005 07:33p 234,784 wahext.dll
06/18/2005 06:26p 234,784 MKDBG.DLL
06/18/2005 06:26p 234,784 mgacm.dll
06/18/2005 05:15p 234,784 puh.dll
06/18/2005 05:15p 234,784 pah.dll
06/18/2005 03:49p 234,784 dpsrslvr.dll
06/18/2005 03:49p 234,784 dfloader.dll
06/18/2005 02:40p 234,784 nqtid.dll
06/18/2005 02:40p 234,784 ngtplwiz.dll
06/18/2005 01:17p 234,784 meorcl32.dll
06/18/2005 01:17p 234,784 mwisip.dll
06/18/2005 12:09p 234,784 ktdcan.dll
06/18/2005 12:08p 234,784 dfwsockx.dll
06/18/2005 12:05p 234,541 parfos.dll
06/16/2005 10:04a 234,430 mv4ql9h51.dll
06/15/2005 02:55p 234,541 k880lilm18qa.dll
06/08/2005 08:40p 236,195 p8n80i5ue8.dll
06/05/2005 11:11a 235,851 en24l1fq1.dll
05/28/2005 05:22p 234,430 enj0l11m1.dll
05/27/2005 06:11p 234,272 kt48l7hu1.dll
05/26/2005 06:37p 234,560 m6rm0g91e6.dll
05/11/2005 03:32p 232,936 k408ledu1h08.dll
05/10/2005 09:36a 232,936 hr6005jme.dll
05/07/2005 12:39p 232,936 jt0o07d3e.dll
05/05/2005 09:37a 232,936 n8l80i3ue8.dll
04/28/2005 04:18p 232,936 r8p80i7ue8.dll
04/28/2005 08:47a 232,936 f4l02e3mgh.dll
04/27/2005 12:13p 232,936 l26olcj31fo.dll
04/20/2005 08:38a 232,756 jt8407lqe.dll
04/12/2005 05:13p 234,285 h22o0cf3ef2.dll
04/12/2005 02:07p 234,285 f82m0if1e82.dll
04/09/2005 10:37a 234,285 dn6801jue.dll
04/09/2005 09:19a 234,285 mv2ql9f51.dll
04/08/2005 04:53p 234,285 gp40l3hm1.dll
04/08/2005 02:09p 234,285 ktnql7551.dll
04/08/2005 11:36a 234,285 jtl0073me.dll
04/06/2005 10:43a 233,811 o048lahu1d48.dll
04/02/2005 01:28p 233,831 e0200afmed2a0.dll
04/02/2005 01:13p 235,847 f6l02g3mg6.dll
04/02/2005 11:35a 233,074 dnl6013se.dll
04/01/2005 10:44a 234,240 ktrsl7971.dll
03/29/2005 10:58a 233,316 lv8u09l9e.dll
02/14/2005 02:26p <DIR> dllcache
60 File(s) 14,229,676 bytes
1 Dir(s) 16,689,408,512 bytes free
anglgrl127
Active Member
 
Posts: 7
Joined: June 29th, 2005, 4:21 pm

Unread postby markkhunt » July 1st, 2005, 12:13 pm

Hi, anglgrl127. You're very welcome. I'm glad to help.

Close any programs you have open since this step requires a reboot.

From the l2mfix folder on your desktop, double click l2mfix.bat and select option #2 for Run Fix by typing 2 and then pressing enter, then press any key to reboot your computer. After a reboot, your desktop and icons will appear, then disappear (this is normal). L2mfix will continue to scan your computer and when it's finished, notepad will open with a log. Copy the contents of that log and paste it back into this thread, along with a new hijackthis log.

IMPORTANT: Do NOT run any other files in the l2mfix folder unless you are asked to do so!
User avatar
markkhunt
Admin/Teacher Emeritus
 
Posts: 7911
Joined: April 15th, 2005, 8:58 pm
Location: Newburgh, IN

Unread postby anglgrl127 » July 5th, 2005, 10:07 am

Here is my L2mfix log:

L2Mfix 1.03

Running From:
C:\Documents and Settings\jjackson\Desktop\Virus Spyware fixes\l2mfix



RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright (c) 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!

Access Control List for Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify:
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-NI) ALLOW Read BUILTIN\Users
(ID-IO) ALLOW Read BUILTIN\Users
(ID-NI) ALLOW Read BUILTIN\Power Users
(ID-IO) ALLOW Read BUILTIN\Power Users
(ID-NI) ALLOW Full access BUILTIN\Administrators
(ID-IO) ALLOW Full access BUILTIN\Administrators
(ID-NI) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access CREATOR OWNER



Setting registry permissions:


RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright (c) 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!


Denying C(CI) access for predefined group "Administrators"
- adding new ACCESS DENY entry


Registry Permissions set too:

RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright (c) 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!

Access Control List for Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify:
(CI) DENY --C------- BUILTIN\Administrators
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-NI) ALLOW Read BUILTIN\Users
(ID-IO) ALLOW Read BUILTIN\Users
(ID-NI) ALLOW Read BUILTIN\Power Users
(ID-IO) ALLOW Read BUILTIN\Power Users
(ID-NI) ALLOW Full access BUILTIN\Administrators
(ID-IO) ALLOW Full access BUILTIN\Administrators
(ID-NI) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access CREATOR OWNER



Setting up for Reboot


Starting Reboot!

C:\Documents and Settings\jjackson\Desktop\Virus Spyware fixes\l2mfix
System Rebooted!

Running From:
C:\Documents and Settings\jjackson\Desktop\Virus Spyware fixes\l2mfix

killing explorer and rundll32.exe

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright(C) 2002-2003 Craig.Peacock@beyondlogic.org
Killing PID 1380 'explorer.exe'
Killing PID 1380 'explorer.exe'
Error 0x5 : Access is denied.


Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright(C) 2002-2003 Craig.Peacock@beyondlogic.org
Killing PID 1372 'rundll32.exe'

Scanning First Pass. Please Wait!

First Pass Completed

Second Pass Scanning

Second pass Completed!
Backing Up: C:\WINNT\system32\aesmib.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\dfloader.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\dfwsockx.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\dn2m01f1e.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\dn6801jue.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\dnl6013se.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\dpsrslvr.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\e0200afmed2a0.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\en24l1fq1.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\enj0l11m1.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\enn6l15s1.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\f4l02e3mgh.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\f6l02g3mg6.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\f82m0if1e82.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\fcamebuf.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\fpp2037oe.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\gp08l3du1.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\gp40l3hm1.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\gp4ml3h11.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\h22o0cf3ef2.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\h84mlih1184.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\hI2o0cf3ef2.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\hr6005jme.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\i4nm0e51eh.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\jt0o07d3e.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\jt8407lqe.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\jtl0073me.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\jxproxy.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\k408ledu1h08.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\k880lilm18qa.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\kddusx.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\kt48l7hu1.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\ktdcan.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\ktnql7551.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\ktrsl7971.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\kwddv.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\l26olcj31fo.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\lv8u09l9e.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\m6rm0g91e6.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\mdxml3a.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\meorcl32.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\mgacm.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\MKDBG.DLL
1 file(s) copied.
Backing Up: C:\WINNT\system32\mv2ql9f51.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\mv4ql9h51.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\mwisip.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\n8l80i3ue8.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\ngtplwiz.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\nqtid.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\NXPROVAU.DLL
1 file(s) copied.
Backing Up: C:\WINNT\system32\o048lahu1d48.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\p8n80i5ue8.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\pah.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\parfos.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\pcflbmsg.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\puh.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\r8p80i7ue8.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\rBpilib.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\wahext.dll
1 file(s) copied.
Backing Up: C:\WINNT\system32\guard.tmp
1 file(s) copied.
deleting: C:\WINNT\system32\aesmib.dll
Successfully Deleted: C:\WINNT\system32\aesmib.dll
deleting: C:\WINNT\system32\dfloader.dll
Successfully Deleted: C:\WINNT\system32\dfloader.dll
deleting: C:\WINNT\system32\dfwsockx.dll
Successfully Deleted: C:\WINNT\system32\dfwsockx.dll
deleting: C:\WINNT\system32\dn2m01f1e.dll
Successfully Deleted: C:\WINNT\system32\dn2m01f1e.dll
deleting: C:\WINNT\system32\dn6801jue.dll
Successfully Deleted: C:\WINNT\system32\dn6801jue.dll
deleting: C:\WINNT\system32\dnl6013se.dll
Successfully Deleted: C:\WINNT\system32\dnl6013se.dll
deleting: C:\WINNT\system32\dpsrslvr.dll
Successfully Deleted: C:\WINNT\system32\dpsrslvr.dll
deleting: C:\WINNT\system32\e0200afmed2a0.dll
Successfully Deleted: C:\WINNT\system32\e0200afmed2a0.dll
deleting: C:\WINNT\system32\en24l1fq1.dll
Successfully Deleted: C:\WINNT\system32\en24l1fq1.dll
deleting: C:\WINNT\system32\enj0l11m1.dll
Successfully Deleted: C:\WINNT\system32\enj0l11m1.dll
deleting: C:\WINNT\system32\enn6l15s1.dll
Successfully Deleted: C:\WINNT\system32\enn6l15s1.dll
deleting: C:\WINNT\system32\f4l02e3mgh.dll
Successfully Deleted: C:\WINNT\system32\f4l02e3mgh.dll
deleting: C:\WINNT\system32\f6l02g3mg6.dll
Successfully Deleted: C:\WINNT\system32\f6l02g3mg6.dll
deleting: C:\WINNT\system32\f82m0if1e82.dll
Successfully Deleted: C:\WINNT\system32\f82m0if1e82.dll
deleting: C:\WINNT\system32\fcamebuf.dll
Successfully Deleted: C:\WINNT\system32\fcamebuf.dll
deleting: C:\WINNT\system32\fpp2037oe.dll
Successfully Deleted: C:\WINNT\system32\fpp2037oe.dll
deleting: C:\WINNT\system32\gp08l3du1.dll
Successfully Deleted: C:\WINNT\system32\gp08l3du1.dll
deleting: C:\WINNT\system32\gp40l3hm1.dll
Successfully Deleted: C:\WINNT\system32\gp40l3hm1.dll
deleting: C:\WINNT\system32\gp4ml3h11.dll
Successfully Deleted: C:\WINNT\system32\gp4ml3h11.dll
deleting: C:\WINNT\system32\h22o0cf3ef2.dll
Successfully Deleted: C:\WINNT\system32\h22o0cf3ef2.dll
deleting: C:\WINNT\system32\h84mlih1184.dll
Successfully Deleted: C:\WINNT\system32\h84mlih1184.dll
deleting: C:\WINNT\system32\hI2o0cf3ef2.dll
Successfully Deleted: C:\WINNT\system32\hI2o0cf3ef2.dll
deleting: C:\WINNT\system32\hr6005jme.dll
Successfully Deleted: C:\WINNT\system32\hr6005jme.dll
deleting: C:\WINNT\system32\i4nm0e51eh.dll
Successfully Deleted: C:\WINNT\system32\i4nm0e51eh.dll
deleting: C:\WINNT\system32\jt0o07d3e.dll
Successfully Deleted: C:\WINNT\system32\jt0o07d3e.dll
deleting: C:\WINNT\system32\jt8407lqe.dll
Successfully Deleted: C:\WINNT\system32\jt8407lqe.dll
deleting: C:\WINNT\system32\jtl0073me.dll
Successfully Deleted: C:\WINNT\system32\jtl0073me.dll
deleting: C:\WINNT\system32\jxproxy.dll
Successfully Deleted: C:\WINNT\system32\jxproxy.dll
deleting: C:\WINNT\system32\k408ledu1h08.dll
Successfully Deleted: C:\WINNT\system32\k408ledu1h08.dll
deleting: C:\WINNT\system32\k880lilm18qa.dll
Successfully Deleted: C:\WINNT\system32\k880lilm18qa.dll
deleting: C:\WINNT\system32\kddusx.dll
Successfully Deleted: C:\WINNT\system32\kddusx.dll
deleting: C:\WINNT\system32\kt48l7hu1.dll
Successfully Deleted: C:\WINNT\system32\kt48l7hu1.dll
deleting: C:\WINNT\system32\ktdcan.dll
Successfully Deleted: C:\WINNT\system32\ktdcan.dll
deleting: C:\WINNT\system32\ktnql7551.dll
Successfully Deleted: C:\WINNT\system32\ktnql7551.dll
deleting: C:\WINNT\system32\ktrsl7971.dll
Successfully Deleted: C:\WINNT\system32\ktrsl7971.dll
deleting: C:\WINNT\system32\kwddv.dll
Successfully Deleted: C:\WINNT\system32\kwddv.dll
deleting: C:\WINNT\system32\l26olcj31fo.dll
Successfully Deleted: C:\WINNT\system32\l26olcj31fo.dll
deleting: C:\WINNT\system32\lv8u09l9e.dll
Successfully Deleted: C:\WINNT\system32\lv8u09l9e.dll
deleting: C:\WINNT\system32\m6rm0g91e6.dll
Successfully Deleted: C:\WINNT\system32\m6rm0g91e6.dll
deleting: C:\WINNT\system32\mdxml3a.dll
Successfully Deleted: C:\WINNT\system32\mdxml3a.dll
deleting: C:\WINNT\system32\meorcl32.dll
Successfully Deleted: C:\WINNT\system32\meorcl32.dll
deleting: C:\WINNT\system32\mgacm.dll
Successfully Deleted: C:\WINNT\system32\mgacm.dll
deleting: C:\WINNT\system32\MKDBG.DLL
Successfully Deleted: C:\WINNT\system32\MKDBG.DLL
deleting: C:\WINNT\system32\mv2ql9f51.dll
Successfully Deleted: C:\WINNT\system32\mv2ql9f51.dll
deleting: C:\WINNT\system32\mv4ql9h51.dll
Successfully Deleted: C:\WINNT\system32\mv4ql9h51.dll
deleting: C:\WINNT\system32\mwisip.dll
Successfully Deleted: C:\WINNT\system32\mwisip.dll
deleting: C:\WINNT\system32\n8l80i3ue8.dll
Successfully Deleted: C:\WINNT\system32\n8l80i3ue8.dll
deleting: C:\WINNT\system32\ngtplwiz.dll
Successfully Deleted: C:\WINNT\system32\ngtplwiz.dll
deleting: C:\WINNT\system32\nqtid.dll
Successfully Deleted: C:\WINNT\system32\nqtid.dll
deleting: C:\WINNT\system32\NXPROVAU.DLL
Successfully Deleted: C:\WINNT\system32\NXPROVAU.DLL
deleting: C:\WINNT\system32\o048lahu1d48.dll
Successfully Deleted: C:\WINNT\system32\o048lahu1d48.dll
deleting: C:\WINNT\system32\p8n80i5ue8.dll
Successfully Deleted: C:\WINNT\system32\p8n80i5ue8.dll
deleting: C:\WINNT\system32\pah.dll
Successfully Deleted: C:\WINNT\system32\pah.dll
deleting: C:\WINNT\system32\parfos.dll
Successfully Deleted: C:\WINNT\system32\parfos.dll
deleting: C:\WINNT\system32\pcflbmsg.dll
Successfully Deleted: C:\WINNT\system32\pcflbmsg.dll
deleting: C:\WINNT\system32\puh.dll
Successfully Deleted: C:\WINNT\system32\puh.dll
deleting: C:\WINNT\system32\r8p80i7ue8.dll
Successfully Deleted: C:\WINNT\system32\r8p80i7ue8.dll
deleting: C:\WINNT\system32\rBpilib.dll
Successfully Deleted: C:\WINNT\system32\rBpilib.dll
deleting: C:\WINNT\system32\wahext.dll
Successfully Deleted: C:\WINNT\system32\wahext.dll
deleting: C:\WINNT\system32\guard.tmp
Successfully Deleted: C:\WINNT\system32\guard.tmp


Zipping up files for submission:
adding: aesmib.dll (152 bytes security) (deflated 4%)
adding: dfloader.dll (152 bytes security) (deflated 4%)
adding: dfwsockx.dll (152 bytes security) (deflated 4%)
adding: dn2m01f1e.dll (152 bytes security) (deflated 4%)
adding: dn6801jue.dll (152 bytes security) (deflated 5%)
adding: dnl6013se.dll (152 bytes security) (deflated 4%)
adding: dpsrslvr.dll (152 bytes security) (deflated 4%)
adding: e0200afmed2a0.dll (152 bytes security) (deflated 5%)
adding: en24l1fq1.dll (152 bytes security) (deflated 5%)
adding: enj0l11m1.dll (152 bytes security) (deflated 4%)
adding: enn6l15s1.dll (152 bytes security) (deflated 4%)
adding: f4l02e3mgh.dll (152 bytes security) (deflated 4%)
adding: f6l02g3mg6.dll (152 bytes security) (deflated 6%)
adding: f82m0if1e82.dll (152 bytes security) (deflated 5%)
adding: fcamebuf.dll (152 bytes security) (deflated 4%)
adding: fpp2037oe.dll (152 bytes security) (deflated 4%)
adding: gp08l3du1.dll (152 bytes security) (deflated 4%)
adding: gp40l3hm1.dll (152 bytes security) (deflated 5%)
adding: gp4ml3h11.dll (152 bytes security) (deflated 5%)
adding: h22o0cf3ef2.dll (152 bytes security) (deflated 5%)
adding: h84mlih1184.dll (152 bytes security) (deflated 4%)
adding: hI2o0cf3ef2.dll (152 bytes security) (deflated 4%)
adding: hr6005jme.dll (152 bytes security) (deflated 4%)
adding: i4nm0e51eh.dll (152 bytes security) (deflated 4%)
adding: jt0o07d3e.dll (152 bytes security) (deflated 4%)
adding: jt8407lqe.dll (152 bytes security) (deflated 4%)
adding: jtl0073me.dll (152 bytes security) (deflated 5%)
adding: jxproxy.dll (152 bytes security) (deflated 5%)
adding: k408ledu1h08.dll (152 bytes security) (deflated 4%)
adding: k880lilm18qa.dll (152 bytes security) (deflated 5%)
adding: kddusx.dll (152 bytes security) (deflated 4%)
adding: kt48l7hu1.dll (152 bytes security) (deflated 4%)
adding: ktdcan.dll (152 bytes security) (deflated 4%)
adding: ktnql7551.dll (152 bytes security) (deflated 5%)
adding: ktrsl7971.dll (152 bytes security) (deflated 5%)
adding: kwddv.dll (152 bytes security) (deflated 4%)
adding: l26olcj31fo.dll (152 bytes security) (deflated 4%)
adding: lv8u09l9e.dll (152 bytes security) (deflated 4%)
adding: m6rm0g91e6.dll (152 bytes security) (deflated 5%)
adding: mdxml3a.dll (152 bytes security) (deflated 4%)
adding: meorcl32.dll (152 bytes security) (deflated 4%)
adding: mgacm.dll (152 bytes security) (deflated 4%)
adding: MKDBG.DLL (152 bytes security) (deflated 4%)
adding: mv2ql9f51.dll (152 bytes security) (deflated 5%)
adding: mv4ql9h51.dll (152 bytes security) (deflated 4%)
adding: mwisip.dll (152 bytes security) (deflated 4%)
adding: n8l80i3ue8.dll (152 bytes security) (deflated 4%)
adding: ngtplwiz.dll (152 bytes security) (deflated 4%)
adding: nqtid.dll (152 bytes security) (deflated 4%)
adding: NXPROVAU.DLL (152 bytes security) (deflated 5%)
adding: o048lahu1d48.dll (152 bytes security) (deflated 5%)
adding: p8n80i5ue8.dll (152 bytes security) (deflated 5%)
adding: pah.dll (152 bytes security) (deflated 4%)
adding: parfos.dll (152 bytes security) (deflated 5%)
adding: pcflbmsg.dll (152 bytes security) (deflated 5%)
adding: puh.dll (152 bytes security) (deflated 4%)
adding: r8p80i7ue8.dll (152 bytes security) (deflated 4%)
adding: rBpilib.dll (152 bytes security) (deflated 5%)
adding: wahext.dll (152 bytes security) (deflated 4%)
adding: guard.tmp (152 bytes security) (deflated 5%)
adding: clear.reg (152 bytes security) (deflated 37%)
adding: echo.reg (152 bytes security) (deflated 12%)
adding: direct.txt (152 bytes security) (stored 0%)
adding: lo2.txt (152 bytes security) (deflated 87%)
adding: readme.txt (152 bytes security) (deflated 49%)
adding: report.txt (152 bytes security) (deflated 68%)
adding: test.txt (152 bytes security) (deflated 82%)
adding: test2.txt (152 bytes security) (deflated 16%)
adding: test3.txt (152 bytes security) (deflated 16%)
adding: test5.txt (152 bytes security) (deflated 16%)
adding: xfind.txt (152 bytes security) (deflated 76%)
adding: backregs/051C6D2B-CB14-4B15-B624-08D55B82A02E.reg (152 bytes security) (deflated 70%)
adding: backregs/3BEEBDEF-C623-4FD9-B8A8-990B8043FCD6.reg (152 bytes security) (deflated 70%)
adding: backregs/shell.reg (152 bytes security) (deflated 75%)

Restoring Registry Permissions:


RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright (c) 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!


Revoking access for predefined group "Administrators"
Inherited ACE can not be revoked here!
Inherited ACE can not be revoked here!


Registry permissions set too:

RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright (c) 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!

Access Control List for Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify:
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-NI) ALLOW Read BUILTIN\Users
(ID-IO) ALLOW Read BUILTIN\Users
(ID-NI) ALLOW Read BUILTIN\Power Users
(ID-IO) ALLOW Read BUILTIN\Power Users
(ID-NI) ALLOW Full access BUILTIN\Administrators
(ID-IO) ALLOW Full access BUILTIN\Administrators
(ID-NI) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access CREATOR OWNER


Restoring Sedebugprivilege:

Granting SeDebugPrivilege to Administrators ... successful

deleting local copy: aesmib.dll
deleting local copy: dfloader.dll
deleting local copy: dfwsockx.dll
deleting local copy: dn2m01f1e.dll
deleting local copy: dn6801jue.dll
deleting local copy: dnl6013se.dll
deleting local copy: dpsrslvr.dll
deleting local copy: e0200afmed2a0.dll
deleting local copy: en24l1fq1.dll
deleting local copy: enj0l11m1.dll
deleting local copy: enn6l15s1.dll
deleting local copy: f4l02e3mgh.dll
deleting local copy: f6l02g3mg6.dll
deleting local copy: f82m0if1e82.dll
deleting local copy: fcamebuf.dll
deleting local copy: fpp2037oe.dll
deleting local copy: gp08l3du1.dll
deleting local copy: gp40l3hm1.dll
deleting local copy: gp4ml3h11.dll
deleting local copy: h22o0cf3ef2.dll
deleting local copy: h84mlih1184.dll
deleting local copy: hI2o0cf3ef2.dll
deleting local copy: hr6005jme.dll
deleting local copy: i4nm0e51eh.dll
deleting local copy: jt0o07d3e.dll
deleting local copy: jt8407lqe.dll
deleting local copy: jtl0073me.dll
deleting local copy: jxproxy.dll
deleting local copy: k408ledu1h08.dll
deleting local copy: k880lilm18qa.dll
deleting local copy: kddusx.dll
deleting local copy: kt48l7hu1.dll
deleting local copy: ktdcan.dll
deleting local copy: ktnql7551.dll
deleting local copy: ktrsl7971.dll
deleting local copy: kwddv.dll
deleting local copy: l26olcj31fo.dll
deleting local copy: lv8u09l9e.dll
deleting local copy: m6rm0g91e6.dll
deleting local copy: mdxml3a.dll
deleting local copy: meorcl32.dll
deleting local copy: mgacm.dll
deleting local copy: MKDBG.DLL
deleting local copy: mv2ql9f51.dll
deleting local copy: mv4ql9h51.dll
deleting local copy: mwisip.dll
deleting local copy: n8l80i3ue8.dll
deleting local copy: ngtplwiz.dll
deleting local copy: nqtid.dll
deleting local copy: NXPROVAU.DLL
deleting local copy: o048lahu1d48.dll
deleting local copy: p8n80i5ue8.dll
deleting local copy: pah.dll
deleting local copy: parfos.dll
deleting local copy: pcflbmsg.dll
deleting local copy: puh.dll
deleting local copy: r8p80i7ue8.dll
deleting local copy: rBpilib.dll
deleting local copy: wahext.dll
deleting local copy: guard.tmp

The following Is the Current Export of the Winlogon notify key:
****************************************************************************
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt32chain]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,33,00,32,00,2e,00,64,00,6c,00,\
6c,00,00,00
"Logoff"="ChainWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cryptnet]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,6e,00,65,00,74,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Logoff"="CryptnetWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cscdll]
"DLLName"="cscdll.dll"
"Logon"="WinlogonLogonEvent"
"Logoff"="WinlogonLogoffEvent"
"ScreenSaver"="WinlogonScreenSaverEvent"
"Startup"="WinlogonStartupEvent"
"Shutdown"="WinlogonShutdownEvent"
"StartShell"="WinlogonStartShellEvent"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\NavLogon]
"DllName"="C:\\WINNT\\System32\\NavLogon.dll"
"Logoff"="NavLogoffEvent"
"StartShell"="NavStartShellEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\sclgntfy]
"Logoff"="WLEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001
"DllName"=hex(2):73,00,63,00,6c,00,67,00,6e,00,74,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SensLogn]
"DLLName"="WlNotify.dll"
"Lock"="SensLockEvent"
"Logon"="SensLogonEvent"
"Logoff"="SensLogoffEvent"
"Safe"=dword:00000001
"MaxWait"=dword:00000258
"StartScreenSaver"="SensStartScreenSaverEvent"
"StopScreenSaver"="SensStopScreenSaverEvent"
"Startup"="SensStartupEvent"
"Shutdown"="SensShutdownEvent"
"StartShell"="SensStartShellEvent"
"Unlock"="SensUnlockEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wzcnotif]
"DLLName"="wzcdlg.dll"
"Logon"="WZCEventLogon"
"Logoff"="WZCEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000000


The following are the files found:
****************************************************************************
C:\WINNT\system32\aesmib.dll
C:\WINNT\system32\dfloader.dll
C:\WINNT\system32\dfwsockx.dll
C:\WINNT\system32\dn2m01f1e.dll
C:\WINNT\system32\dn6801jue.dll
C:\WINNT\system32\dnl6013se.dll
C:\WINNT\system32\dpsrslvr.dll
C:\WINNT\system32\e0200afmed2a0.dll
C:\WINNT\system32\en24l1fq1.dll
C:\WINNT\system32\enj0l11m1.dll
C:\WINNT\system32\enn6l15s1.dll
C:\WINNT\system32\f4l02e3mgh.dll
C:\WINNT\system32\f6l02g3mg6.dll
C:\WINNT\system32\f82m0if1e82.dll
C:\WINNT\system32\fcamebuf.dll
C:\WINNT\system32\fpp2037oe.dll
C:\WINNT\system32\gp08l3du1.dll
C:\WINNT\system32\gp40l3hm1.dll
C:\WINNT\system32\gp4ml3h11.dll
C:\WINNT\system32\h22o0cf3ef2.dll
C:\WINNT\system32\h84mlih1184.dll
C:\WINNT\system32\hI2o0cf3ef2.dll
C:\WINNT\system32\hr6005jme.dll
C:\WINNT\system32\i4nm0e51eh.dll
C:\WINNT\system32\jt0o07d3e.dll
C:\WINNT\system32\jt8407lqe.dll
C:\WINNT\system32\jtl0073me.dll
C:\WINNT\system32\jxproxy.dll
C:\WINNT\system32\k408ledu1h08.dll
C:\WINNT\system32\k880lilm18qa.dll
C:\WINNT\system32\kddusx.dll
C:\WINNT\system32\kt48l7hu1.dll
C:\WINNT\system32\ktdcan.dll
C:\WINNT\system32\ktnql7551.dll
C:\WINNT\system32\ktrsl7971.dll
C:\WINNT\system32\kwddv.dll
C:\WINNT\system32\l26olcj31fo.dll
C:\WINNT\system32\lv8u09l9e.dll
C:\WINNT\system32\m6rm0g91e6.dll
C:\WINNT\system32\mdxml3a.dll
C:\WINNT\system32\meorcl32.dll
C:\WINNT\system32\mgacm.dll
C:\WINNT\system32\MKDBG.DLL
C:\WINNT\system32\mv2ql9f51.dll
C:\WINNT\system32\mv4ql9h51.dll
C:\WINNT\system32\mwisip.dll
C:\WINNT\system32\n8l80i3ue8.dll
C:\WINNT\system32\ngtplwiz.dll
C:\WINNT\system32\nqtid.dll
C:\WINNT\system32\NXPROVAU.DLL
C:\WINNT\system32\o048lahu1d48.dll
C:\WINNT\system32\p8n80i5ue8.dll
C:\WINNT\system32\pah.dll
C:\WINNT\system32\parfos.dll
C:\WINNT\system32\pcflbmsg.dll
C:\WINNT\system32\puh.dll
C:\WINNT\system32\r8p80i7ue8.dll
C:\WINNT\system32\rBpilib.dll
C:\WINNT\system32\wahext.dll
C:\WINNT\system32\guard.tmp

Registry Entries that were Deleted:
Please verify that the listing looks ok.
If there was something deleted wrongly there are backups in the backreg folder.
****************************************************************************
REGEDIT4

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]
"{051C6D2B-CB14-4B15-B624-08D55B82A02E}"=-
"{3BEEBDEF-C623-4FD9-B8A8-990B8043FCD6}"=-
[-HKEY_CLASSES_ROOT\CLSID\{051C6D2B-CB14-4B15-B624-08D55B82A02E}]
[-HKEY_CLASSES_ROOT\CLSID\{3BEEBDEF-C623-4FD9-B8A8-990B8043FCD6}]
REGEDIT4

[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
****************************************************************************
Desktop.ini Contents:
****************************************************************************
****************************************************************************

Here is my new hijackthis log:

Logfile of HijackThis v1.99.1
Scan saved at 10:06:05 AM, on 7/6/2005
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\LEXBCES.EXE
C:\WINNT\system32\spoolsv.exe
C:\WINNT\system32\LEXPPS.EXE
C:\Program Files\NavNT\defwatch.exe
C:\WINNT\System32\svchost.exe
C:\Program Files\NavNT\rtvscan.exe
C:\WINNT\System32\ofps.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\System32\svchost.exe
C:\WINNT\system32\MsgSys.EXE
C:\Program Files\NavNT\vptray.exe
C:\WINNT\system32\rmmvun.exe
C:\Program Files\adtn\weua.exe
C:\WINNT\explorer.exe
C:\WINNT\system32\NOTEPAD.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\ejohnson\Desktop\Virus Spyware fixes\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL = http://searchmiracle.com/sp.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://searchmiracle.com/sp.php
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [vptray] C:\Program Files\NavNT\vptray.exe
O4 - HKLM\..\Run: [KavSvc] C:\WINNT\system32\rmmvun.exe reg_run
O4 - HKCU\..\Run: [Cpub] C:\Program Files\adtn\weua.exe
O4 - HKCU\..\Run: [Yqqjuc] C:\WINNT\system32\t?skmgr.exe
O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://C:\Program Files\Google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
O16 - DPF: {7149E79C-DC19-4C5E-A53C-A54DDF75EEE9} - http://cabs.media-motor.net/cabs/joysaver.cab
O16 - DPF: {E0CE16CB-741C-4B24-8D04-A817856E07F4} - http://cabs.media-motor.net/cabs/joysaver.cab
O18 - Filter: text/html - {950238FB-C706-4791-8674-4D429F85897E} - (no file)
O20 - Winlogon Notify: NavLogon - C:\WINNT\System32\NavLogon.dll
O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\NavNT\defwatch.exe
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINNT\system32\LEXBCES.EXE
O23 - Service: Norton AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\Program Files\NavNT\rtvscan.exe
O23 - Service: OmniForm Printer - Unknown owner - C:\WINNT\System32\ofps.exe



Thank you!

anglgrl127
anglgrl127
Active Member
 
Posts: 7
Joined: June 29th, 2005, 4:21 pm

Unread postby markkhunt » July 5th, 2005, 2:29 pm

Hi, anglgrl127. Welcome back! Your log is coming along nicely.

Launch Notepad, and copy/paste the text inside the Quote box immediately below into a new text file. Save the file as FindFile.bat on your Desktop. Make sure Save as type: is set to All Files.

dir C:\WINDOWS\System32\t?skmgr.exe /a h > files.txt
notepad files.txt


Please double-click the FindFile.bat file you just created to run it. If you receive a warning about a batch/script file trying to run, please allow it. When the file has finished running, files.txt will be created on your Desktop. You’ll need to copy the contents of this file into your next post to me.

Now, please download Find-Qoologic and unzip (extract) it into its own folder called C:\Qoologic. Go to the Qoologic folder and double-click Find-Qoologic2.bat to run it. If you receive a warning about a batch/script file trying to run, please allow it. This will create file.txt in the Qoologic folder.

Please post the contents of file.txt from the Qoologic folder , along with the other file (files.txt) from your Desktop that you completed earlier.
User avatar
markkhunt
Admin/Teacher Emeritus
 
Posts: 7911
Joined: April 15th, 2005, 8:58 pm
Location: Newburgh, IN

Unread postby anglgrl127 » July 6th, 2005, 12:16 pm

Okay, so I ran FindFile, but got a blank notepad because the command window said it couldn't find the path. I looked more closely, and saw it was trying to find C:\Windows, but my computer has C:\Winnt, so I changed that in the command you gave me and what follows is the notepad file from that command:


Volume in drive C has no label.
Volume Serial Number is 9812-74A8

Directory of C:\WINNT\System32

06/19/2003 03:05p 87,312 TASKMGR.EXE
06/29/2005 11:30a 401,408 t?skmgr.exe
2 File(s) 488,720 bytes

Directory of C:\Documents and Settings\jjackson\Desktop




Here is a copy of the log from Qoologic:



PLEASE NOTE THAT ALL FILES FOUND BY THIS METHOD ARE NOT BAD FILES, There WILL be LEGIT FILES LISTED PLEASE BE CAREFUL WHILE FIXING. IF YOU ARE UNSURE OF WHAT IT IS LEAVE THEM ALONE.
some examples are MRT.EXE NTDLL.DLL.
»»»»»»»»»»»»»»»»»»»»»»»» Files found »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

* KavSvc C:\WINNT\System32\RMMVUN.EXE
* KavSvc C:\WINNT\System32\CPPPO.DLL
* KavSvc C:\WINNT\System32\PHHZOGI.DLL
* KavSvc C:\WINNT\System32\SUPDATE.DLL
* aspack C:\WINNT\System32\CRRBDON.EXE
* aspack C:\WINNT\System32\REDIT.CPL
* UPX! C:\WINNT\System32\INTFAT32.EXE
* UPX! C:\WINNT\System32\RMMVUN.EXE
* UPX! C:\WINNT\System32\FMOD.DLL
* UPX! C:\WINNT\System32\PHHZOGI.DLL
* UPX! C:\WINNT\System32\SUPDATE.DLL
* UPX! C:\WINNT\ICONT.EXE
* UPX! C:\WINNT\KVPFJH~1.EXE
* UPX! C:\WINNT\SSKB5.EXE
* UPX! C:\WINNT\SYSTB.EXE
* UPX! C:\WINNT\WUPDSNFF.EXE
»»»»»»»»»»»»»»»»»»»»»»»» startup files»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

* exe C:\docume~1\alluse~1\startm~1\programs\startup\DPPN.EXE

»»»»»»»»»»»»»»»»»»»»»»»» Checking Global Startup »»»»»»»»»»»»»»»»»»»»»»

(fstarts by IMM - test ver. 0.001) NOT using address check -- 0x77f85ba9

Global Startup:
C:\Documents and Settings\All Users\Start Menu\Programs\Startup
.
..
dppn.exe

User Startup:
C:\Documents and Settings\jjackson\Start Menu\Programs\Startup
.
..

»»»»»»»»»»»»»»»»»»»»»»»» Registry Entries Found »»»»»»»»»»»»»»»»»»»»»»»




Thank you!
anglgrl127
Active Member
 
Posts: 7
Joined: June 29th, 2005, 4:21 pm

Unread postby markkhunt » July 6th, 2005, 8:09 pm

Hi, anglgrl127. Thank you for changing the Windows to WINNT. :oops: That was the right thing to do. Good eye!

I will be having you restart your computer into Safe Mode, which will prevent you from having access to the internet. Please copy and paste these instructions into a Notepad file because you will be copying a portion of them later in the fix.

Please download Killbox, and unzip it to your desktop. Do NOT run it yet. We will need to use it in Safe Mode.

One of the files on the Qoologic log you posted doesn’t give me a complete file name, and I need to have more information before I can determine if it is bad and should be removed. Would you please use Windows Explorer and look in your C:\WINNT\ folder for an executable (.exe) file that begins with the letters KVPFJH. When you find the file, please right-click the file name, and then click Properties. On the Version tab (if present) please report back to me the information given when you click Company, File Version, etc, along with the complete file name. If you find more than one file that begins with those letters, please give me the information on all the files found.

Now, restart your computer into Safe Mode (continually tap the F8 key while your system is starting, select Safe Mode from the menu). For additional help in booting into Safe Mode, see the following site: http://www.pchell.com/support/safemode.shtml

Once in Safe Mode, Please run Killbox and click the Delete on Reboot option. Leave Killbox open and open the Notepad file you created that contains these instructions. Copy the list of files below to the Windows clipboard. (Highlight the list of files and either click Edit => Copy, or click (Ctrl-C)

C:\WINNT\System32\RMMVUN.EXE
C:\WINNT\System32\CPPPO.DLL
C:\WINNT\System32\PHHZOGI.DLL
C:\WINNT\System32\SUPDATE.DLL
C:\WINNT\System32\CRRBDON.EXE
C:\WINNT\System32\REDIT.CPL
C:\WINNT\System32\INTFAT32.EXE
C:\WINNT\ICONT.EXE
C:\WINNT\SSKB5.EXE
C:\WINNT\SYSTB.EXE
C:\WINNT\WUPDSNFF.EXE
C:\Documents and Settings\All Users\Start Menu\Programs\Startup\DPPN.EXE


Now, return to Killbox. On the menu bar, click File => Paste from Clipboard, and then click the red and white Delete File button. Click Yes to the first prompt and click Yes to the second prompt. If your computer does not restart automatically, please restart your computer and allow it to boot normally, not into Safe Mode.

After your computer has restarted, please double-click Find-Qoologic2.bat to run it again and post the new log, along with the information on the mystery file.
User avatar
markkhunt
Admin/Teacher Emeritus
 
Posts: 7911
Joined: April 15th, 2005, 8:58 pm
Location: Newburgh, IN

Unread postby anglgrl127 » July 7th, 2005, 9:44 am

Information on the Mystery File

kvpfjhhii

File type: application
Under Version tab
File Version: 1.0.2.4
Description: Buddy
Copyright: (C) Direct Revenue. All Rights Reserved
Comments: Browser Window for Direct Revenue
Company Name: Direct Revenue
Internal Name: buddy.exe
Product Name: Buddy window

hmmm, to my inexperienced eye, that doesn't look like a legitimate file...



New Qoologic Log:

PLEASE NOTE THAT ALL FILES FOUND BY THIS METHOD ARE NOT BAD FILES, There WILL be LEGIT FILES LISTED PLEASE BE CAREFUL WHILE FIXING. IF YOU ARE UNSURE OF WHAT IT IS LEAVE THEM ALONE.
some examples are MRT.EXE NTDLL.DLL.
»»»»»»»»»»»»»»»»»»»»»»»» Files found »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

* UPX! C:\WINNT\System32\FMOD.DLL
* UPX! C:\WINNT\KVPFJH~1.EXE
»»»»»»»»»»»»»»»»»»»»»»»» startup files»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»


»»»»»»»»»»»»»»»»»»»»»»»» Checking Global Startup »»»»»»»»»»»»»»»»»»»»»»

(fstarts by IMM - test ver. 0.001) NOT using address check -- 0x77f85ba9

Global Startup:
C:\Documents and Settings\All Users\Start Menu\Programs\Startup
.
..

User Startup:
C:\Documents and Settings\jjackson\Start Menu\Programs\Startup
.
..

»»»»»»»»»»»»»»»»»»»»»»»» Registry Entries Found »»»»»»»»»»»»»»»»»»»»»»»
anglgrl127
Active Member
 
Posts: 7
Joined: June 29th, 2005, 4:21 pm

Unread postby markkhunt » July 7th, 2005, 7:34 pm

anglglr127, your inexperienced eye is very sharp. :thumbleft: That isn’t a legitimate file, and it has to go. I suspected it was a bad one, but I had to be sure first.

I will be having you restart your computer into Safe Mode, which will prevent you from having access to the Internet. Please copy and paste these instructions into a Notepad file because you will be copying a portion of them later in the fix.

Please download Intermute's CWShredder. Save it to your desktop, run it, and then click Check For Update. After obtaining any updates, please close CWShredder. We will use it in Safe Mode.

Please run HijackThis, click Do a system scan only, and check the box next to each of these items to have them fixed. If something isn’t there, that’s ok. Please continue with the next item.

R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL = http://searchmiracle.com/sp.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://searchmiracle.com/sp.php
O4 - HKLM\..\Run: [KavSvc] C:\WINNT\system32\rmmvun.exe reg_run
O4 - HKCU\..\Run: [Cpub] C:\Program Files\adtn\weua.exe
O16 - DPF: {7149E79C-DC19-4C5E-A53C-A54DDF75EEE9} - http://cabs.media-motor.net/cabs/joysaver.cab
O16 - DPF: {E0CE16CB-741C-4B24-8D04-A817856E07F4} - http://cabs.media-motor.net/cabs/joysaver.cab
O18 - Filter: text/html - {950238FB-C706-4791-8674-4D429F85897E} - (no file)


Please close all open windows, including this one, and click Fix Checked.

Now, restart your computer into Safe Mode (continually tap the F8 key while your system is starting, select Safe Mode from the menu). For additional help in booting into Safe Mode, see the following site: http://www.pchell.com/support/safemode.shtml

Once in Safe Mode, Please run Killbox and click the Delete on Reboot option. Leave Killbox open and open the Notepad file you created that contains these instructions. Copy the list below to the Windows clipboard. (Highlight the list and either click Edit => Copy, or click (Ctrl-C)

C:\WINNT\System32\KVPFJHHII.EXE
C:\Program Files\adtn


Now, return to Killbox. On the menu bar, click File => Paste from Clipboard, and then click the red and white Delete File button. Click Yes to the first prompt and click No to the second prompt. Close Killbox.

Using Windows Explorer, you need to locate and delete a file in your C:\WINNT\System32\ folder. When you have the file listing for your C:\WINNT\System32\ folder, please click the file name column header to sort the list of files alphabetically. The file you need to delete is t?skmgr.exe. The second character in the file name will more than likely be a “strangeâ€
Last edited by markkhunt on July 9th, 2005, 9:11 am, edited 1 time in total.
User avatar
markkhunt
Admin/Teacher Emeritus
 
Posts: 7911
Joined: April 15th, 2005, 8:58 pm
Location: Newburgh, IN

Unread postby anglgrl127 » July 8th, 2005, 9:45 am

Hello,

I found and removed the 7 items from HijackThis.

When I went into WINNT/system 32, I did not find the t?skmgr.exe. I did find the real one. But I sorted by name, then date, and then size, and still did not find the fake t?skmgr.exe. Is it possible that it could have been removed in an earlier step?

I ran CWShredder and it told me that no infection was found.

Here is the new Qoologic log:


PLEASE NOTE THAT ALL FILES FOUND BY THIS METHOD ARE NOT BAD FILES, There WILL be LEGIT FILES LISTED PLEASE BE CAREFUL WHILE FIXING. IF YOU ARE UNSURE OF WHAT IT IS LEAVE THEM ALONE.
some examples are MRT.EXE NTDLL.DLL.
»»»»»»»»»»»»»»»»»»»»»»»» Files found »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

* UPX! C:\WINNT\System32\FMOD.DLL
* UPX! C:\WINNT\KVPFJH~1.EXE
»»»»»»»»»»»»»»»»»»»»»»»» startup files»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»


»»»»»»»»»»»»»»»»»»»»»»»» Checking Global Startup »»»»»»»»»»»»»»»»»»»»»»

(fstarts by IMM - test ver. 0.001) NOT using address check -- 0x77f85ba9

Global Startup:
C:\Documents and Settings\All Users\Start Menu\Programs\Startup
.
..

User Startup:
C:\Documents and Settings\jjackson\Start Menu\Programs\Startup
.
..

»»»»»»»»»»»»»»»»»»»»»»»» Registry Entries Found »»»»»»»»»»»»»»»»»»»»»»»



Here is the new HijackThis Log:

Logfile of HijackThis v1.99.1
Scan saved at 9:42:35 AM, on 7/9/2005
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\LEXBCES.EXE
C:\WINNT\system32\spoolsv.exe
C:\WINNT\system32\LEXPPS.EXE
C:\Program Files\NavNT\defwatch.exe
C:\WINNT\System32\svchost.exe
C:\Program Files\NavNT\rtvscan.exe
C:\WINNT\System32\ofps.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\System32\svchost.exe
C:\WINNT\system32\MsgSys.EXE
C:\WINNT\Explorer.EXE
C:\Program Files\NavNT\vptray.exe
C:\WINNT\system32\t?skmgr.exe
C:\WINNT\system32\cmd.exe
C:\WINNT\system32\ntvdm.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINNT\system32\wuauclt.exe
C:\Documents and Settings\jjackson\Desktop\Virus Spyware fixes\HijackThis.exe

O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [vptray] C:\Program Files\NavNT\vptray.exe
O4 - HKCU\..\Run: [Yqqjuc] C:\WINNT\system32\t?skmgr.exe
O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://C:\Program Files\Google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
O20 - Winlogon Notify: NavLogon - C:\WINNT\System32\NavLogon.dll
O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\NavNT\defwatch.exe
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINNT\system32\LEXBCES.EXE
O23 - Service: Norton AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\Program Files\NavNT\rtvscan.exe
O23 - Service: OmniForm Printer - Unknown owner - C:\WINNT\System32\ofps.exe



I notice I still have the t?skmgr.exe showing up in my hijackThis log. Could this possibly be the correct one, or is HijackThis showing a bad one? I really looked for it and I could not find a fake one. I also searched for the file, and only came across 2 copies of the real one, 1 in WINNT\system32 and the other in WINNT\servicepackfiles\i386.

Thank you!!
anglgrl127
Active Member
 
Posts: 7
Joined: June 29th, 2005, 4:21 pm

Unread postby markkhunt » July 9th, 2005, 9:10 am

Hi, anglgrl127. I’m sorry I couldn’t get back with you yesterday. My cable was out last night, so I had no access to the Internet.

No, the t?skmgr.exe file you see in the list of running processes is definitely the bad one. Let’s see if it’s running as a hidden file. Click My Computer. On the menu bar select Tools => Folder Options, and then select the View tab. Under the Hidden files and folders heading, please make sure Show hidden files and folders is checked and Hide protected operating system files (recommended) is unchecked. Click Yes to confirm, and then click OK.

Now, restart your computer into Safe Mode (continually tap the F8 key while your system is starting, select Safe Mode from the menu). For additional help in booting into Safe Mode, see the following site: http://www.pchell.com/support/safemode.shtml

Once in Safe Mode, run HijackThis, click Do a system scan only, and check the box next to this item to have it fixed.

O4 - HKCU\..\Run: [Yqqjuc] C:\WINNT\system32\t?skmgr.exe

Close all open windows and click Fix Checked.

Using Windows Explorer, you need to locate and delete a file in your C:\WINNT\System32\ folder. When you have the file listing for your C:\WINNT\System32\ folder, please click the file name column header to sort the list of files alphabetically. The file you need to delete is t?skmgr.exe. The second character in the file name will more than likely be a “strangeâ€
User avatar
markkhunt
Admin/Teacher Emeritus
 
Posts: 7911
Joined: April 15th, 2005, 8:58 pm
Location: Newburgh, IN

Unread postby anglgrl127 » July 11th, 2005, 11:20 am

Hi,

Thank you for your help. After the previous post, I had already turned on hidden files when I had not found the fake taskmgr.exe. However, I had not known about the protected system files option. It is certainly very sneaky that the fake taskmgr only shows up when you check that option, but the real one shows up even without that option checked. I was able to find and delete the fake taskmgr without a problem, even though it was also called taskmgr.exe.



Qoologic log:

PLEASE NOTE THAT ALL FILES FOUND BY THIS METHOD ARE NOT BAD FILES, There WILL be LEGIT FILES LISTED PLEASE BE CAREFUL WHILE FIXING. IF YOU ARE UNSURE OF WHAT IT IS LEAVE THEM ALONE.
some examples are MRT.EXE NTDLL.DLL.
»»»»»»»»»»»»»»»»»»»»»»»» Files found »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

* UPX! C:\WINNT\System32\FMOD.DLL
»»»»»»»»»»»»»»»»»»»»»»»» startup files»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»


»»»»»»»»»»»»»»»»»»»»»»»» Checking Global Startup »»»»»»»»»»»»»»»»»»»»»»

(fstarts by IMM - test ver. 0.001) NOT using address check -- 0x77f85ba9

Global Startup:
C:\Documents and Settings\All Users\Start Menu\Programs\Startup
.
..

User Startup:
C:\Documents and Settings\jjackson\Start Menu\Programs\Startup
.
..

»»»»»»»»»»»»»»»»»»»»»»»» Registry Entries Found »»»»»»»»»»»»»»»»»»»»»»»


HijackThis log:

Logfile of HijackThis v1.99.1
Scan saved at 11:19:21 AM, on 7/12/2005
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\LEXBCES.EXE
C:\WINNT\system32\spoolsv.exe
C:\WINNT\system32\LEXPPS.EXE
C:\Program Files\NavNT\defwatch.exe
C:\WINNT\System32\svchost.exe
C:\Program Files\NavNT\rtvscan.exe
C:\WINNT\System32\ofps.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\System32\svchost.exe
C:\WINNT\system32\MsgSys.EXE
C:\WINNT\Explorer.EXE
C:\Program Files\NavNT\vptray.exe
C:\WINNT\system32\wuauclt.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\jjackson\Desktop\Virus Spyware fixes\HijackThis.exe

O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [vptray] C:\Program Files\NavNT\vptray.exe
O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://C:\Program Files\Google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
O20 - Winlogon Notify: NavLogon - C:\WINNT\System32\NavLogon.dll
O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\NavNT\defwatch.exe
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINNT\system32\LEXBCES.EXE
O23 - Service: Norton AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\Program Files\NavNT\rtvscan.exe
O23 - Service: OmniForm Printer - Unknown owner - C:\WINNT\System32\ofps.exe

The log seems to be looking good. Looking at the logs, it looks like the cleanest one by far. Dare I say that it looks like my computer might be clean??? :shock:

Thank you for all your help so far!!!
anglgrl127
Active Member
 
Posts: 7
Joined: June 29th, 2005, 4:21 pm

Unread postby markkhunt » July 11th, 2005, 3:12 pm

Hi, anglgrl127. You’re very welcome. I’m glad I can help. I see you’ve decided to join the battle against malware and become a trainee. That’s great! You’ll find that malware is VERY sneaky, so we have to be even sneakier. :D

Both the Qoologic and the HijackThis logs are clean! How is the computer running? Are you getting any more alerts from Norton?

Let’s clean out your temporary folders. Please click Start => Run and type cleanmgr in the command box. Select your C: and click OK to scan your system. When the scan has completed, please make sure that Temporary Internet Files, Recycle Bin, and Temporary Files are the only items selected. Click OK, and then click Yes to confirm. If you have more than one user account on the computer, you will need to run cleanmgr from each account to delete all the temporary files.

Viruses, Adware, and Spyware are running rampant, but taking a few simple precautions can prevent many of them. Below I have included a number of recommendations for protecting your computer from future malware infections. Please take these recommendations seriously. These few simple steps can stave off the vast majority of spyware problems.

I highly recommend you regularly visit the Windows Update site and install all High Priority updates as soon as possible. I cannot stress enough how important this is.

1) In order to protect yourself against spyware, you should consider installing and running the following free programs:

Ad-Aware SE
A tutorial on using Ad-Aware to remove spyware from your computer may be found here.

Spybot-Search & Destroy
A tutorial on using Spybot to remove spyware from your computer may be found here. Please also remember to enable Spybot's "Immunize" and "TeaTimer" features.

SpywareBlaster
A tutorial on using SpywareBlaster to prevent spyware from ever installing on your computer may be found here.

SpywareGuard
A tutorial on using SpywareGuard for realtime protection against spyware and hijackers may be found here.

Make sure to keep these programs up-to-date and to run them regularly, as this can prevent a great deal of spyware hassle.

2) Please consider using an alternate browser. Mozilla's Firefox browser is fantastic; it is much more secure than Internet Explorer, immune to almost all known browser hijackers, and also has the best built-in popup blocker (as an added benefit!) that I have ever seen. If you are interested, Firefox may be downloaded from here: http://www.mozilla.org/products/firefox/

3) When you use Internet Explorer, add another level of protection to your browser by blocking certain sites that are known to contain malware. IE-SPYAD puts over 5000 sites in your restricted zone so you'll be protected when you visit innocent-looking sites that aren't actually innocent at all. ID-SPYAD may be found here.

4) You are already running an antivirus program. Excellent! Please be sure to run it regularly and to keep it up-to-date

5) Finally, if you are not already, please consider maintaining a firewall. Some good free firewalls are ZoneAlarm, Kerio, and Sygate. A tutorial on understanding and using firewalls may be found here.

Please also read Tony Klein's excellent article: How I got Infected in the First Place
User avatar
markkhunt
Admin/Teacher Emeritus
 
Posts: 7911
Joined: April 15th, 2005, 8:58 pm
Location: Newburgh, IN
Advertisement
Register to Remove

Next

  • Similar Topics
    Replies
    Views
    Last post

Return to Infected? Virus, malware, adware, ransomware, oh my!



Who is online

Users browsing this forum: No registered users and 44 guests

Contact us:

Advertisements do not imply our endorsement of that product or service. Register to remove all ads. The forum is run by volunteers who donate their time and expertise. We make every attempt to ensure that the help and advice posted is accurate and will not cause harm to your computer. However, we do not guarantee that they are accurate and they are to be used at your own risk. All trademarks are the property of their respective owners.

Member site: UNITE Against Malware