1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Popup on Startup

Discussion in 'Malware and Virus Removal Archive' started by ZDogg, 2005/01/07.

Thread Status:
Not open for further replies.
  1. 2005/01/07
    ZDogg

    ZDogg Inactive Thread Starter

    Joined:
    2005/01/06
    Messages:
    6
    Likes Received:
    0
    Lonny here is my log. I got rid of the most annoying popups by doing what Newt reccomended but I still have one on startup with a bunch of weird characters. Please advise on next step. Thanks.

    Logfile of HijackThis v1.99.0
    Scan saved at 7:41:44 AM, on 1/7/2005
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\atiptaxx.exe
    C:\Program Files\Winamp\Winampa.exe
    C:\Program Files\ATI Multimedia\RemCtrl\ATIX10.exe
    C:\Program Files\Microsoft Hardware\Mouse\point32.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    C:\WINDOWS\System32\rundll32.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\MSN Messenger\MsnMsgr.Exe
    C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpobnz08.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpotdd01.exe
    C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpoevm08.exe
    C:\Program Files\Hewlett-Packard\Digital Imaging\Bin\hpoSTS08.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\HJT\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.ca/
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O4 - HKLM\..\Run: [AtiPTA] atiptaxx.exe
    O4 - HKLM\..\Run: [WinampAgent] "C:\Program Files\Winamp\Winampa.exe "
    O4 - HKLM\..\Run: [Regx10EXE] C:\Program Files\ATI Multimedia\RemCtrl\ATIX10.exe
    O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [POINTER] point32.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
    O4 - HKLM\..\Run: [AVG7_EMC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    O4 - HKLM\..\Run: [iTunesHelper] C:\Program Files\iTunes\iTunesHelper.exe
    O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
    O4 - HKCU\..\Run: [Skype] "C:\Program Files\Skype\Phone\Skype.exe" /nosplash /minimized
    O4 - Global Startup: hp psc 2000 Series.lnk = C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpobnz08.exe
    O4 - Global Startup: hpoddt01.exe.lnk = ?
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
    O4 - Global Startup: Microsoft.hta
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.1_03\bin\npjpi141_03.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.1_03\bin\npjpi141_03.dll
    O9 - Extra button: ATI TV - {44226DFF-747E-4edc-B30C-78752E50CD0C} - C:\Program Files\ATI Multimedia\TV\EXPLBAR.DLL
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O17 - HKLM\System\CCS\Services\Tcpip\..\{25993395-BFD1-46B4-A331-81A8969B4D93}: NameServer = 69.50.166.94,69.31.80.244
    O17 - HKLM\System\CCS\Services\Tcpip\..\{D38FAA33-D3C0-4370-9935-1914B03B2754}: NameServer = 69.50.166.94,69.31.80.244
    O17 - HKLM\System\CS1\Services\Tcpip\..\{25993395-BFD1-46B4-A331-81A8969B4D93}: NameServer = 69.50.166.94,69.31.80.244
    O17 - HKLM\System\CS2\Services\Tcpip\..\{25993395-BFD1-46B4-A331-81A8969B4D93}: NameServer = 69.50.166.94,69.31.80.244
    O23 - Service: AVG7 Alert Manager Server - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    O23 - Service: AVG7 Update Service - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: X10 Device Network Service - Unknown - C:\PROGRA~1\ATIMUL~1\RemCtrl\x10nets.exe (file missing)
     
  2. 2005/01/07
    Newt

    Newt Inactive

    Joined:
    2002/01/07
    Messages:
    10,974
    Likes Received:
    2
    Hi ZDogg and welcome. I split your post off into a new thread. Easier to keep track of which problem is whose that way.
     
    Newt,
    #2

  3. to hide this advert.

  4. 2005/01/08
    ZDogg

    ZDogg Inactive Thread Starter

    Joined:
    2005/01/06
    Messages:
    6
    Likes Received:
    0
    Can anyone help me?? I had the trojan horse virus and did the first step outlined by Newt in thread. Then it looks like I need the file from the link posted by Lonny but that no longer works. :confused: I got rid of the more annoying sex poker pop up but there is still one on startup that has a bunch of weird characters.
     
  5. 2005/01/08
    noahdfear

    noahdfear Inactive

    Joined:
    2003/04/06
    Messages:
    12,178
    Likes Received:
    15
    Your log looks clean to me. Which startup entry are you concerned with?

    The file you refer to is for removing a trusted zone infection, that it doesn't appear your machine is infected with.
     
  6. 2005/01/08
    ZDogg

    ZDogg Inactive Thread Starter

    Joined:
    2005/01/06
    Messages:
    6
    Likes Received:
    0
    Seems like the other process got rid of the Trojan Horse. I still did have a Java/ByteVerify virus but got rid of that. Thanks for the help anyway. :)
     
  7. 2005/01/08
    Lonny Jones

    Lonny Jones Inactive Alumni

    Joined:
    2002/12/16
    Messages:
    2,252
    Likes Received:
    0
    Hi ZDogg

    It looks like you found and ran the tool already beocuse there are usualy a few process's involved.


    Start Hijackthis and place a check next to these items,
    Close all browser windows and shut down all other programs that show in the taskbar. (even Folders)

    O4 - Global Startup: Microsoft.hta
    O17 - HKLM\System\CCS\Services\Tcpip\..\{25993395-BFD1-46B4-A331-81A8969B4D93}: NameServer = 69.50.166.94,69.31.80.244
    O17 - HKLM\System\CCS\Services\Tcpip\..\{D38FAA33-D3C0-4370-9935-1914B03B2754}: NameServer = 69.50.166.94,69.31.80.244
    O17 - HKLM\System\CS1\Services\Tcpip\..\{25993395-BFD1-46B4-A331-81A8969B4D93}: NameServer = 69.50.166.94,69.31.80.244
    O17 - HKLM\System\CS2\Services\Tcpip\..\{25993395-BFD1-46B4-A331-81A8969B4D93}: NameServer = 69.50.166.94,69.31.80.244
    =========================
    Hit fix checked and close Hijackthis.

    If those 017's return
    Please go into NETWORK CONNECTIONS in control panel. Then right click on your default connection there and choose properties.

    Then click on NETWORKING tab. Then click on INTERNET PROTOCOL. IN the window that comes up, click on the obtain DNS SERVER ADDRESS automatically radio button.


    Post a new log
     
Thread Status:
Not open for further replies.

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.