1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

i think something is wrong.. [Random toolbars appearing]

Discussion in 'Malware and Virus Removal Archive' started by auffreto, 2005/03/20.

Thread Status:
Not open for further replies.
  1. 2005/03/20
    auffreto

    auffreto Inactive Thread Starter

    Joined:
    2005/03/20
    Messages:
    2
    Likes Received:
    0
    hi,

    recently i have started to obtain various random toolbars and other such programmes which i have now removed using add/remove. However i have still been getting ie windows opening with what was www.oldgames.se and what is now http://540.filost.com/randomsites/banner.aspx. I am also getting sent viruses rather regularly. Norton is sorting them out okay, but its quite annoying.
    here is the norton log of the recent ones if that is useful..

    Category: Virus alerts
    Date,Feature,Virus Name,Action Taken,Item Type,Target,Suspicious Action,User Name,Computer Name,Details
    20/03/2005 17:26:35,Auto-Protect,Download.Trojan,Automatically deleted,File,N/A,N/A,SYSTEM,U0338753,Source: C:\WINDOWS\system32\.pif
    20/03/2005 17:09:26,Auto-Protect,Download.Trojan,Automatically deleted,File,N/A,N/A,SYSTEM,U0338753,Source: C:\WINDOWS\system32\.pif
    20/03/2005 16:24:00,Auto-Protect,W32.Spybot.Worm,Automatically deleted,File,N/A,N/A,SYSTEM,U0338753,Source: C:\WINDOWS\system32\winmes.exe
    20/03/2005 16:17:30,Auto-Protect,W32.Spybot.Worm,Automatically deleted,File,N/A,N/A,SYSTEM,U0338753,Source: C:\WINDOWS\system32\msua.exe
    20/03/2005 16:13:16,Auto-Protect,W32.HLLW.Gaobot,Automatically deleted,File,N/A,N/A,SYSTEM,U0338753,Source: C:\WINDOWS\system32\msmsgv.exe
    20/03/2005 16:09:50,Auto-Protect,W32.Spybot.Worm,Automatically deleted,File,N/A,N/A,SYSTEM,U0338753,Source: C:\WINDOWS\system32\winmes.exe
    19/03/2005 19:29:07,Auto-Protect,W32.Spybot.Worm,Automatically deleted,File,N/A,N/A,SYSTEM,U0338753,Source: C:\WINDOWS\system32\msfwe1.exe
    19/03/2005 19:19:34,Auto-Protect,W32.Spybot.Worm,Automatically deleted,File,N/A,N/A,SYSTEM,U0338753,Source: C:\WINDOWS\system32\nvscv32.exe
    07/03/2005 20:44:38,Virus scanner,Trojan.StartPage,Automatically deleted,File,N/A,N/A,Ali Auffret,U0338753, "Source: C:\WINDOWS\LastGood\notepad.exe,Description: The file C:\WINDOWS\LastGood\notepad.exe is infected with the Trojan.StartPage virus. "
    07/03/2005 20:44:38,Virus scanner,Download.Trojan,Automatically deleted,File,N/A,N/A,Ali Auffret,U0338753, "Source: C:\WINDOWS\system32\MatAdown.dll,Description: The file C:\WINDOWS\system32\MatAdown.dll is infected with the Download.Trojan virus. "

    So i got a bit paranoid and looked around the internet, found this site, so i got the hijacker thing, and here is the scan log for that..

    Logfile of HijackThis v1.99.1
    Scan saved at 17:14:52, on 20/03/2005
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    C:\WINDOWS\System32\userinit32.exe
    C:\WINDOWS\Explorer.EXE
    C:\PROGRA~1\NORTON~1\NORTON~2\GHOSTS~2.EXE
    C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
    C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
    C:\WINDOWS\System32\nvsvc32.exe
    C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
    C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe
    C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe
    C:\WINDOWS\System32\00THotkey.exe
    C:\WINDOWS\System32\TPWRTRAY.EXE
    C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE
    C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
    C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE
    C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
    C:\WINDOWS\System32\TFNF5.exe
    C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
    C:\Program Files\Apoint2K\Apoint.exe
    C:\Program Files\TOSHIBA\DualPointUtility\TEDTray.exe
    C:\WINDOWS\System32\spool\drivers\w32x86\3\hpztsb05.exe
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\WINDOWS\System32\update.exe
    C:\WINDOWS\System32\run.exe
    C:\Program Files\SAGEM\SAGEM F@st 800-840\dslmon.exe
    C:\Program Files\Apoint2K\Apntex.exe
    C:\Program Files\Common Files\Symantec Shared\Nmain.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\WINDOWS\System32\msnsched.exe
    C:\WINDOWS\system32\rundll32.exe
    C:\Documents and Settings\Ali Auffret\Local Settings\Temp\Temporary Directory 1 for hijackthis.zip\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.uea.ac.uk/intranet/
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    F2 - REG:system.ini: UserInit=userinit.exe,userinit32.exe
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
    O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton SystemWorks\Norton AntiVirus\NavShExt.dll
    O2 - BHO: SU Toolbar Helper - {D44BBB61-E17F-4AE6-A502-8D7E0B29E616} - C:\WINDOWS\DOWNLO~1\STUMBL~1.DLL
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton SystemWorks\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Stumble&Upon - {22D003CE-6952-46C5-80B9-D19B479620AB} - C:\WINDOWS\DOWNLO~1\STUMBL~1.DLL
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet
    O4 - HKLM\..\Run: [00THotkey] C:\WINDOWS\System32\00THotkey.exe
    O4 - HKLM\..\Run: [000StTHK] 000StTHK.exe
    O4 - HKLM\..\Run: [Tpwrtray] TPWRTRAY.EXE
    O4 - HKLM\..\Run: [TMESRV.EXE] C:\Program Files\TOSHIBA\TME3\TMESRV31.EXE /Logon
    O4 - HKLM\..\Run: [TMERzCtl.EXE] C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE /Service
    O4 - HKLM\..\Run: [TMEEJME.EXE] C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
    O4 - HKLM\..\Run: [TMESBS.EXE] C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE /Client
    O4 - HKLM\..\Run: [TFncKy] C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe /Type 25
    O4 - HKLM\..\Run: [TFNF5] TFNF5.exe
    O4 - HKLM\..\Run: [TosHKCW.exe] "C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe "
    O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
    O4 - HKLM\..\Run: [DpUtil] C:\Program Files\TOSHIBA\DualPointUtility\TEDTray.exe
    O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\System32\spool\drivers\w32x86\3\hpztsb05.exe
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe "
    O4 - HKLM\..\Run: [ccRegVfy] "C:\Program Files\Common Files\Symantec Shared\ccRegVfy.exe "
    O4 - HKLM\..\Run: [egRCk] C:\WINDOWS\xvtxbg.exe
    O4 - HKLM\..\Run: [msupdate] update.exe
    O4 - HKLM\..\Run: [runs] run.exe
    O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe
    O4 - HKLM\..\Run: [msnsched] msnsched.exe
    O4 - HKLM\..\RunServices: [msupdate] update.exe
    O4 - HKLM\..\RunServices: [runs] run.exe
    O4 - HKLM\..\RunServices: [msnsched] msnsched.exe
    O4 - HKCU\..\Run: [runs] run.exe
    O4 - Global Startup: DSLMON.lnk = C:\Program Files\SAGEM\SAGEM F@st 800-840\dslmon.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html
    O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar2.dll/cmbacklinks.html
    O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar2.dll/cmsimilar.html
    O8 - Extra context menu item: StumbleUpon: &Blog This - res://C:\WINDOWS\DOWNLO~1\STUMBL~1.DLL/blogimage
    O8 - Extra context menu item: Translate into English - res://c:\program files\google\GoogleToolbar2.dll/cmtrans.html
    O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
    O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE (file missing)
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE (file missing)
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O15 - Trusted Zone: http://ny.contentmatch.net (HKLM)
    O15 - Trusted Zone: http://awbeta.net-nucleus.com (HKLM)
    O16 - DPF: {24311111-1111-1121-1111-111191113457} - file://c:\eied_s7.cab
    O16 - DPF: {33331111-1111-1111-1111-611111193457} - file://c:\ex.cab
    O16 - DPF: {33331111-1111-1111-1111-611111193458} - file://c:\ex.cab
    O16 - DPF: {43331111-1111-1111-1111-611111195622} - file://c:\ex.cab
    O16 - DPF: {62475759-9E84-458E-A1AB-5D2C442ADFDE} - http://a1540.g.akamai.net/7/1540/52....apple.com/saba/us/win/QuickTimeInstaller.exe
    O16 - DPF: {95844941-7934-4693-92D9-8202EA7B20ED} - http://www.stumbleupon.com/stumble.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{2A41ED07-8656-4D93-8323-DD2916DCB589}: NameServer = 80.225.250.178 80.225.250.186
    O21 - SSODL: SystemCheck2 - {54645654-2225-4455-44A1-9F4543D34545} - C:\WINDOWS\System32\vbsys2.dll
    O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    O23 - Service: Symantec Password Validation Service (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
    O23 - Service: GhostStartService - Symantec Corporation - C:\PROGRA~1\NORTON~1\NORTON~2\GHOSTS~2.EXE
    O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
    O23 - Service: Norton Unerase Protection (NProtectService) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
    O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
    O23 - Service: PACSPTISVR - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\Pacsptisvr.exe
    O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
    O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    O23 - Service: Speed Disk service - Symantec Corporation - C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
    O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\Sptisrv.exe
    O23 - Service: Tmesbs32 (Tmesbs) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe" /Service (file missing)
    O23 - Service: Tmesrv3 (Tmesrv) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe" /Service (file missing)
    O23 - Service: ZESOFT - Unknown owner - C:\WINDOWS\zeta.exe

    in the last matter of minutes, i have just been spammed like a goat. and outlook went beserk. i dont know if the messages actaully went in, becuase symantec scanner thing wasnt having it i dont think, but it was quite frightening. i had to disconnect to finish this letter. my guess is that something to do with signing up to this website had something to do with it. so i may be in some serious trouble with the university computer system. i wouldnt have minded if it was hotmail, but i couldnt do use that one to sign up.

    very bad. please help.
     
  2. 2005/03/20
    Close_Hauled

    Close_Hauled Inactive

    Joined:
    2005/03/03
    Messages:
    91
    Likes Received:
    0
    If you are not getting any help today...

    I think it's slow today because it's Palm Sunday. You might want to post this at Wilders Security Forum. They have a adware, spyware & hijack cleaning forum that is outstanding. Just don't post your HijackThis log there. Refer to your thread here. They have a policy againts posting logs.
     

  3. to hide this advert.

  4. 2005/03/20
    noahdfear

    noahdfear Inactive

    Joined:
    2003/04/06
    Messages:
    12,178
    Likes Received:
    15
    Welcome to WindowsBBS auffreto:) No need to post elsewhere. ;)

    You first need to put HijackThis.exe in a folder of it's own. Create a new folder named HJT and either move HijackThis.exe to that folder, or redownload it from here and save it to that folder.

    You should print this out and/or save it to text where you can access it in safe mode.

    Scan again with HijackThis and place a check next to the following entries. Close ALL other windows and click fix.

    O3 - Toolbar: Stumble&Upon - {22D003CE-6952-46C5-80B9-D19B479620AB} - C:\WINDOWS\DOWNLO~1\STUMBL~1.DLL
    O4 - HKLM\..\Run: [egRCk] C:\WINDOWS\xvtxbg.exe
    O4 - HKLM\..\Run: [msupdate] update.exe
    O4 - HKLM\..\Run: [runs] run.exe
    O4 - HKLM\..\Run: [msnsched] msnsched.exe
    O4 - HKLM\..\RunServices: [msupdate] update.exe
    O4 - HKLM\..\RunServices: [runs] run.exe
    O4 - HKLM\..\RunServices: [msnsched] msnsched.exe
    O4 - HKCU\..\Run: [runs] run.exe
    O15 - Trusted Zone: http://ny.contentmatch.net (HKLM)
    O15 - Trusted Zone: http://awbeta.net-nucleus.com (HKLM)
    O16 - DPF: {24311111-1111-1121-1111-111191113457} - file://c:\eied_s7.cab
    O16 - DPF: {33331111-1111-1111-1111-611111193457} - file://c:\ex.cab
    O16 - DPF: {33331111-1111-1111-1111-611111193458} - file://c:\ex.cab
    O16 - DPF: {43331111-1111-1111-1111-611111195622} - file://c:\ex.cab
    O16 - DPF: {62475759-9E84-458E-A1AB-5D2C442ADFDE} - http://a1540.g.akamai.net/7/1540/52...meInstaller.exe
    O16 - DPF: {95844941-7934-4693-92D9-8202EA7B20ED} - http://www.stumbleupon.com/stumble.cab
    O21 - SSODL: SystemCheck2 - {54645654-2225-4455-44A1-9F4543D34545} - C:\WINDOWS\System32\vbsys2.dll
    O23 - Service: ZESOFT - Unknown owner - C:\WINDOWS\zeta.exe

    Right click My Computer and choose properties. On system restore tab, check the box to turn off. OK out.

    Go to start>run and type msconfig, hit enter. On the boot.ini tab, check the box next to /safeboot and OK. Yes to restart. This will restart your computer in safe mode. Logon to your user account.

    Now in safe mode, you will need to show hidden files and folders, as well as system files and extensions for known file types.

    Click start then run and type (or copy/paste) sc delete ZESOFT, then hit enter.

    Open C:\WINDOWS and delete the files zeta.exe and xvtxbg.exe.
    Open C:\WINDOWS\system32 and delete the files MatAdown.dll, update.exe, run.exe, vbsys2.dll and msnsched.exe.
    Open C:\Temp if present, select all and delete.
    Open C:\Windows\Temp, select all and delete.
    Open C:\Windows\Prefetch, select all and delete.
    Open C:\Documents and Settings\username\Local Settings\temp, select all and delete. Do this for all usernames.
    Open the control panel, then internet options and delete the temporary internet files, checking the box for offline content. Close Internet Options.
    Open My Computer, right click Local disk C: and choose properties, then disk cleanup. Check all boxes except compress old files and click OK.
    Uncheck the /safeboot box in msconfig and ok to reboot.

    Upon reboot you will be greeted with a message window from the System Configuration Utility. Check the box not to use and don't show, then click OK.

    Scan your PC with RAV. If any files are infected, click the report button then copy and paste it here.

    Run another HijackThis scan and post the log.
     
  5. 2005/03/20
    PeteC

    PeteC SuperGeek Staff

    Joined:
    2002/05/10
    Messages:
    28,896
    Likes Received:
    389
    auffreto - Welcome to the Board :)

    It is helpful to have a Meaningful Title to your thread - a very brief summary of the problem - to draw the attention of others. As you are new here I have edited your thread title.
     
  6. 2005/03/21
    auffreto

    auffreto Inactive Thread Starter

    Joined:
    2005/03/20
    Messages:
    2
    Likes Received:
    0
    hello again. thanks for your help so far, sorry about the lack of useful subject headings and so on.


    i followed your instructions, apart from i could not find matadown.dll in system32 and therefore could not delete it. Also in username/temp i could not delete CmdLineExt02.dll as it gave the write protected/in use box and it wasnt showing on task manager so i could not close it. i wouldnt know how to un write protect it if that was the problem.

    The strange pop ups seem to have gone when i open ie, but the spamming thing is happening with increased frequency, which made the RAV scan quite unpleasant. it turns out i was spamming other people about cheap drugs for get up and go. Or not, as Symantec wouldnt let me.

    RAV found something which NOrton did not pick up. here is the report

    Statistics

    Scanned files: 32577
    Scanned directories: 2728
    Scanned archives: 6476
    Size of the scanned files: 2412990521
    Packed files: 1863
    Known viruses found: 2
    Virus bodies: 2
    Suspicious files: 0

    Disinfected files: 0
    Deleted files: 0
    Renamed files: 0
    Copied files: 0
    I/O errors: 0
    Warnings: 0
    Corrupted files: 0
    New files: 122813
    Mail files: 520




    Found viruses
    File: C:\WINDOWS\autoclk.exe
    Virus: Trojan:Win32/KillReg.D Status: Infected

    File: C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\IL8L8PYD\WinTS[1].cab->WToolsS.exe
    Virus: TrojanDownloader:Win32/Wintool.B Status: Infected



    And here is the Hijack this logfile




    Logfile of HijackThis v1.99.1
    Scan saved at 11:41:00, on 21/03/2005
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    C:\WINDOWS\System32\userinit32.exe
    C:\WINDOWS\Explorer.EXE
    C:\PROGRA~1\NORTON~1\NORTON~2\GHOSTS~2.EXE
    C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
    C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
    C:\WINDOWS\System32\nvsvc32.exe
    C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
    C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe
    C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe
    C:\WINDOWS\System32\00THotkey.exe
    C:\WINDOWS\System32\TPWRTRAY.EXE
    C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE
    C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
    C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE
    C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
    C:\WINDOWS\System32\TFNF5.exe
    C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
    C:\Program Files\Apoint2K\Apoint.exe
    C:\Program Files\TOSHIBA\DualPointUtility\TEDTray.exe
    C:\WINDOWS\System32\spool\drivers\w32x86\3\hpztsb05.exe
    C:\dfgdfgd.exe
    C:\Program Files\SAGEM\SAGEM F@st 800-840\dslmon.exe
    C:\Program Files\Apoint2K\Apntex.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    c:\mcsiwsx32.exe
    c:\mcsjwsx32.exe
    c:\mwset32.exe
    c:\mwset32.exe
    c:\mwset32.exe
    c:\mwset32.exe
    C:\WINDOWS\System32\run.exe
    c:\mwset32.exe
    c:\mwset32.exe
    c:\mwset32.exe
    c:\mcsjwsx32.exe
    c:\mcsiwsx32.exe
    c:\mwset32.exe
    c:\mwset32.exe
    c:\mwset32.exe
    C:\WINDOWS\System32\dumprep.exe
    C:\WINDOWS\System32\dumprep.exe
    C:\WINDOWS\System32\dwwin.exe
    C:\WINDOWS\System32\dwwin.exe
    C:\WINDOWS\system32\notepad.exe
    C:\Documents and Settings\Ali Auffret\My Documents\hijackthis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.uea.ac.uk/intranet/
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    F2 - REG:system.ini: UserInit=userinit.exe,userinit32.exe
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton SystemWorks\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet
    O4 - HKLM\..\Run: [00THotkey] C:\WINDOWS\System32\00THotkey.exe
    O4 - HKLM\..\Run: [000StTHK] 000StTHK.exe
    O4 - HKLM\..\Run: [Tpwrtray] TPWRTRAY.EXE
    O4 - HKLM\..\Run: [TMESRV.EXE] C:\Program Files\TOSHIBA\TME3\TMESRV31.EXE /Logon
    O4 - HKLM\..\Run: [TMERzCtl.EXE] C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE /Service
    O4 - HKLM\..\Run: [TMEEJME.EXE] C:\Program Files\TOSHIBA\TME3\TMEEJME.EXE
    O4 - HKLM\..\Run: [TMESBS.EXE] C:\Program Files\TOSHIBA\TME3\TMESBS32.EXE /Client
    O4 - HKLM\..\Run: [TFncKy] C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe /Type 25
    O4 - HKLM\..\Run: [TFNF5] TFNF5.exe
    O4 - HKLM\..\Run: [TosHKCW.exe] "C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe "
    O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
    O4 - HKLM\..\Run: [DpUtil] C:\Program Files\TOSHIBA\DualPointUtility\TEDTray.exe
    O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\System32\spool\drivers\w32x86\3\hpztsb05.exe
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe "
    O4 - HKLM\..\Run: [ccRegVfy] "C:\Program Files\Common Files\Symantec Shared\ccRegVfy.exe "
    O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe
    O4 - HKLM\..\Run: [Services] C:\dfgdfgd.exe
    O4 - HKLM\..\Run: [MS Windows Process Class] MSPRCSS32.exe
    O4 - HKLM\..\Run: [runs] run.exe
    O4 - HKLM\..\RunServices: [MS Windows Process Class] MSPRCSS32.exe
    O4 - HKLM\..\RunServices: [runs] run.exe
    O4 - Global Startup: DSLMON.lnk = C:\Program Files\SAGEM\SAGEM F@st 800-840\dslmon.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html
    O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar2.dll/cmbacklinks.html
    O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar2.dll/cmsimilar.html
    O8 - Extra context menu item: StumbleUpon: &Blog This - res://C:\WINDOWS\DOWNLO~1\STUMBL~1.DLL/blogimage
    O8 - Extra context menu item: Translate into English - res://c:\program files\google\GoogleToolbar2.dll/cmtrans.html
    O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
    O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE (file missing)
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE (file missing)
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O16 - DPF: {A3009861-330C-4E10-822B-39D16EC8829D} (CRAVOnline Object) - http://www.ravantivirus.com/scan/ravonline.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{2A41ED07-8656-4D93-8323-DD2916DCB589}: NameServer = 80.225.250.178 80.225.250.186
    O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    O23 - Service: Symantec Password Validation Service (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
    O23 - Service: GhostStartService - Symantec Corporation - C:\PROGRA~1\NORTON~1\NORTON~2\GHOSTS~2.EXE
    O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
    O23 - Service: Norton Unerase Protection (NProtectService) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
    O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
    O23 - Service: PACSPTISVR - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\Pacsptisvr.exe
    O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
    O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    O23 - Service: Speed Disk service - Symantec Corporation - C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
    O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\Sptisrv.exe
    O23 - Service: Tmesbs32 (Tmesbs) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesbs32.exe" /Service (file missing)
    O23 - Service: Tmesrv3 (Tmesrv) - Unknown owner - C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe" /Service (file missing)


    So there it is, hopefully you can decipher some of it. Just to let you know i have saved all my important stuff to a zipdisk, so if you think an acceptable option is to reset stuff, then dont worry about mentioning it..

    You are too kind.

    Auffreto
     
  7. 2005/03/21
    noahdfear

    noahdfear Inactive

    Joined:
    2003/04/06
    Messages:
    12,178
    Likes Received:
    15
    Open C:\Windows\Prefetch, select all and delete.

    Download Pocket Killbox from here: http://www.downloads.subratam.org/KillBox.zip

    Unzip the files to a folder, then open and double-click on Killbox.exe to run it. In the "Paste Full Path of File to Delete" box, copy and paste the following:

    C:\WINDOWS\autoclk.exe

    Check the box to delete on reboot and click the red X to the right. Click OK, then NO to the reboot now prompt. Copy the next filepath and paste it in the box, and repeat the above steps. When all of the below filepaths are done, allow it to reboot.

    C:\WINDOWS\System32\MSPRCSS32.exe
    C:\WINDOWS\System32\run.exe
    C:\WINDOWS\system32\userinit32.exe
    c:\mcsiwsx32.exe
    c:\mcsjwsx32.exe
    c:\mwset32.exe
    C:\dfgdfgd.exe


    After reboot, scan again with HijackThis, close all other windows and fix the following if present.

    F2 - REG:system.ini: UserInit=userinit.exe,userinit32.exe
    O4 - HKLM\..\Run: [Services] C:\dfgdfgd.exe
    O4 - HKLM\..\Run: [MS Windows Process Class] MSPRCSS32.exe
    O4 - HKLM\..\Run: [runs] run.exe
    O4 - HKLM\..\RunServices: [MS Windows Process Class] MSPRCSS32.exe
    O4 - HKLM\..\RunServices: [runs] run.exe

    Open C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5, select all and delete.

    Empty the recycle bin.

    Reboot and run another HJT scan, then post the log.

    Please download the attached zip file and save to your desktop. If it saves as attachment.php, right click after download and rename it to PetchB.zip
    Extract the folder inside to your desktop, open and double click log.bat to run. It will create a log.zip file that I would like for you to attach to an email to me here for review. Put WindowsBBS PetchB in the subject line. One of the infected files on your computer can make critical registry modifications, and I'd like to check those out for you.

    If you are comfortable with regedit, check out the following. If you're not, run the HKU.bat file in the PetchB folder and attach the HKU.zip file to the email also.

    Each user has a registry area named HKEY_USERS\[code number indicating user]\. For each user locate the entry:
    HKU\[code number]\Software\Microsoft\Windows\
    CurrentVersion\Run\
    Remove any reference to MSPRCSS32.exe
     
Thread Status:
Not open for further replies.

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.