We'd like to remind Forumites to please avoid political debate on the Forum... Read More »
📨 Have you signed up to the Forum's new Email Digest yet? Get a selection of trending threads sent straight to your inbox daily, weekly or monthly!
Internet explorer shutting down
Options
Comments
-
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 06:37:20, on 29/09/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16876)
Boot mode: Normal
Running processes:
C:\windows\System32\smss.exe
C:\windows\system32\winlogon.exe
C:\windows\system32\services.exe
C:\windows\system32\lsass.exe
C:\windows\system32\svchost.exe
C:\windows\System32\svchost.exe
C:\windows\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir Desktop\sched.exe
C:\Program Files\Avira\AntiVir Desktop\avguard.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\Program Files\SPAMfighter\sfus.exe
c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
C:\windows\system32\svchost.exe
C:\windows\Explorer.EXE
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\SPAMfighter\SFAgent.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\Program Files\Common Files\InstallShield\UpdateService\ISUSPM.exe
C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Messenger\msmsgs.exe
C:\windows\system32\ctfmon.exe
C:\Program Files\Outlook Express\msimn.exe
C:\Program Files\internet explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = webcache.virginmedia.com:8080
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [SPAMfighter Agent] "C:\Program Files\SPAMfighter\SFAgent.exe" update delay 60
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [ISUSPM] "C:\Program Files\Common Files\InstallShield\UpdateService\ISUSPM.exe" -scheduler
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir Desktop\avgnt.exe" /min
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKCU\..\Run: [Ncr] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Google Update] "C:\Documents and Settings\dad\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" /c
O4 - HKCU\..\Run: [ctfmon.exe] C:\windows\system32\ctfmon.exe
O4 - HKCU\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\FlashUtil10b.exe
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O9 - Extra button: ieSpell - {0E17D5B7-9F5D-4fee-9DF6-CA6EE38B68A8} - C:\Program Files\ieSpell\iespell.dll
O9 - Extra 'Tools' menuitem: ieSpell - {0E17D5B7-9F5D-4fee-9DF6-CA6EE38B68A8} - C:\Program Files\ieSpell\iespell.dll
O9 - Extra button: (no name) - {1606D6F9-9D3B-4aea-A025-ED5B2FD488E7} - C:\Program Files\ieSpell\iespell.dll
O9 - Extra 'Tools' menuitem: ieSpell Options - {1606D6F9-9D3B-4aea-A025-ED5B2FD488E7} - C:\Program Files\ieSpell\iespell.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\windows\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\windows\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1217773248234
O16 - DPF: {B1E2B96C-12FE-45E2-BEF1-44A219113CDD} (SABScanProcesses Class) - http://www.superadblocker.com/activex/sabspx.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O23 - Service: Avira AntiVir Scheduler (AntiVirSchedulerService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\sched.exe
O23 - Service: Avira AntiVir Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\avguard.exe
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: PrismXL - New Boundary Technologies, Inc. - C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
O23 - Service: SPAMfighter Update Service - SPAMfighter ApS - C:\Program Files\SPAMfighter\sfus.exe
O23 - Service: Universal Root Certificates Updates (ucrtupd) - Unknown owner - C:\windows\system32\ucrtupd.exe (file missing)
--
End of file - 6518 bytes0 -
Did Dr Web find anything?
FIX this in hijack ~
O23 - Service: Universal Root Certificates Updates (ucrtupd) - Unknown owner - C:\windows\system32\ucrtupd.exe (file missing)
Then run a KASPERSKY ONLINE SCAN (click to scan 'MY COMPUTER')
http://www.kaspersky.com/kos/eng/partner/default/pages/default/check.html?n=1245225406761
Please post the complete log it creates (This only SCANS it DOESNT delete anything, so we'd need to see anything it finds) by selecting to save the 'report' to the desktop in 'txt' format
The scan will likely take anywhere from 5 to 12 hours to complete!:idea:0 -
Dr web found 4 which were showing and several others which were put in quarantine but no idea where that is.0
-
Not familiar with Dr Web, but there should be a link to it's quarantine area within the program interface somewhere
...but it's looking much better now......Gettin' There, Wherever There is......
I have a dodgy "i" key, so ignore spelling errors due to "i" issues, ...I blame Apple0 -
Kapersky froze halfway through I did however manage to notice files that were infected in a restore backup file I have on my pc. I've tried to delete this file but am unable to. Any ideas how to do it.
Here they are as they are being picked up. Justt incase it freezes again.
Trojan-Spy.HTML.Fraud.gen x 7
Trojan-Spy.HTML.Paylap.m x 10 -
Ok. Froze once again at 68%. Computer hasn't stoppped once :T
Should I just leave it as it is now or look for more nasties.:o
Thanks.0 -
Clearly your still infected so I personally think it would be a bit foolish to not pursue the nasties (Especially as theyre trojans)
Download SUPERANTISPYWARE (Make sure you click 'DOWNLOAD LATEST VERSION')
http://www.filehippo.com/download_superantispyware/
UPDATE and PERFORM COMPLETE SCAN
(Then goto console and LOGS and post the log it created then untick it from STARTING UP WITH WINDOWS):idea:0 -
SUPERAntiSpyware Scan Log
http://www.superantispyware.com
Generated 09/30/2009 at 05:41 AM
Application Version : 4.29.1002
Core Rules Database Version : 4135
Trace Rules Database Version: 2068
Scan type : Complete Scan
Total Scan Time : 01:08:22
Memory items scanned : 399
Memory threats detected : 0
Registry items scanned : 5834
Registry threats detected : 0
File items scanned : 35172
File threats detected : 81
Adware.Tracking Cookie
C:\Documents and Settings\dad\Cookies\dad@adviva[2].txt
C:\Documents and Settings\dad\Cookies\dad@media6degrees[3].txt
C:\Documents and Settings\dad\Cookies\dad@server.iad.liveperson[5].txt
C:\Documents and Settings\dad\Cookies\dad@questionmarket[3].txt
C:\Documents and Settings\dad\Cookies\dad@advertising[2].txt
C:\Documents and Settings\dad\Cookies\dad@mediaplex[2].txt
C:\Documents and Settings\dad\Cookies\dad@rambler[2].txt
C:\Documents and Settings\dad\Cookies\dad@revsci[1].txt
C:\Documents and Settings\dad\Cookies\dad@doubleclick[1].txt
C:\Documents and Settings\dad\Cookies\dad@content.yieldmanager[1].txt
C:\Documents and Settings\dad\Cookies\dad@tacoda[1].txt
C:\Documents and Settings\dad\Cookies\dad@kaspersky.122.2o7[1].txt
C:\Documents and Settings\dad\Cookies\dad@chitika[1].txt
C:\Documents and Settings\dad\Cookies\dad@ads.telegraph.co[1].txt
C:\Documents and Settings\dad\Cookies\dad@kontera[2].txt
C:\Documents and Settings\dad\Cookies\dad@media.adrevolver[2].txt
C:\Documents and Settings\dad\Cookies\dad@tradedoubler[2].txt
C:\Documents and Settings\dad\Cookies\dad@server.iad.liveperson[6].txt
C:\Documents and Settings\dad\Cookies\dad@imrworldwide[3].txt
C:\Documents and Settings\dad\Cookies\dad@dmtracker[1].txt
C:\Documents and Settings\dad\Cookies\dad@specificclick[1].txt
C:\Documents and Settings\dad\Cookies\dad@paypal.112.2o7[1].txt
C:\Documents and Settings\dad\Cookies\dad@collective-media[2].txt
C:\Documents and Settings\dad\Cookies\dad@serving-sys[3].txt
C:\Documents and Settings\dad\Cookies\dad@ad.yieldmanager[2].txt
C:\Documents and Settings\dad\Cookies\dad@fastclick[3].txt
C:\Documents and Settings\dad\Cookies\dad@www.googleadservices[2].txt
C:\Documents and Settings\dad\Cookies\dad@at.atwola[2].txt
C:\Documents and Settings\dad\Cookies\dad@apmebf[1].txt
C:\Documents and Settings\dad\Cookies\dad@atdmt[2].txt
C:\Documents and Settings\dad\Cookies\dad@content.yieldmanager[5].txt
C:\Documents and Settings\dad\Cookies\dad@bs.serving-sys[3].txt
C:\Documents and Settings\dad\Cookies\dad@tribalfusion[2].txt
C:\Documents and Settings\dad\Cookies\dad@www.3dstats[1].txt
C:\Documents and Settings\dad\Cookies\dad@www.googleadservices[1].txt
C:\Documents and Settings\dad\Cookies\dad@ad.yieldmanager[1].txt
C:\Documents and Settings\dad\Cookies\dad@server.iad.liveperson[4].txt
C:\Documents and Settings\dad\Cookies\dad@ads.pointroll[2].txt
C:\Documents and Settings\dad\Cookies\dad@ads.ookla[2].txt
C:\Documents and Settings\dad\Cookies\dad@ads.techguy[1].txt
C:\Documents and Settings\dad\Cookies\dad@adviva[1].txt
C:\Documents and Settings\dad\Cookies\dad@apmebf[2].txt
C:\Documents and Settings\dad\Cookies\dad@atdmt[1].txt
C:\Documents and Settings\dad\Cookies\dad@bs.serving-sys[1].txt
C:\Documents and Settings\dad\Cookies\dad@burstnet[2].txt
C:\Documents and Settings\dad\Cookies\dad@content.yieldmanager[3].txt
C:\Documents and Settings\dad\Cookies\dad@casalemedia[1].txt
C:\Documents and Settings\dad\Cookies\dad@cdn5.specificclick[1].txt
C:\Documents and Settings\dad\Cookies\dad@chitika[2].txt
C:\Documents and Settings\dad\Cookies\dad@collective-media[1].txt
C:\Documents and Settings\dad\Cookies\dad@content.yieldmanager[2].txt
C:\Documents and Settings\dad\Cookies\dad@doubleclick[2].txt
C:\Documents and Settings\dad\Cookies\dad@e-2dj6wfmyshazgho.stats.esomniture[2].txt
C:\Documents and Settings\dad\Cookies\dad@fastclick[2].txt
C:\Documents and Settings\dad\Cookies\dad@imrworldwide[2].txt
C:\Documents and Settings\dad\Cookies\dad@mediaplex[1].txt
C:\Documents and Settings\dad\Cookies\dad@media.adrevolver[1].txt
C:\Documents and Settings\dad\Cookies\dad@media6degrees[1].txt
C:\Documents and Settings\dad\Cookies\dad@microsoftwindows.112.2o7[1].txt
C:\Documents and Settings\dad\Cookies\dad@questionmarket[2].txt
C:\Documents and Settings\dad\Cookies\dad@server.iad.liveperson[1].txt
C:\Documents and Settings\dad\Cookies\dad@server.iad.liveperson[2].txt
C:\Documents and Settings\dad\Cookies\dad@serving-sys[1].txt
C:\Documents and Settings\dad\Cookies\dad@specificclick[2].txt
C:\Documents and Settings\dad\Cookies\dad@statcounter[2].txt
C:\Documents and Settings\dad\Cookies\dad@statse.webtrendslive[1].txt
C:\Documents and Settings\dad\Cookies\dad@tradedoubler[1].txt
C:\Documents and Settings\dad\Cookies\dad@tribalfusion[1].txt
C:\Documents and Settings\dad\Cookies\dad@www.burstnet[1].txt
C:\Documents and Settings\Guest\Cookies\guest@tribalfusion[1].txt
C:\Documents and Settings\Guest\Cookies\guest@ad.yieldmanager[2].txt
C:\Documents and Settings\Guest\Cookies\guest@virginmedia[2].txt
C:\Documents and Settings\Guest\Cookies\guest@doubleclick[1].txt
C:\Documents and Settings\Guest\Cookies\guest@search.virginmedia[1].txt
C:\Documents and Settings\Guest\Cookies\guest@apmebf[1].txt
C:\Documents and Settings\Guest\Cookies\guest@atdmt[1].txt
C:\Documents and Settings\Guest\Cookies\guest@at.atwola[2].txt
C:\Documents and Settings\Guest\Cookies\guest@advertising[1].txt
C:\Documents and Settings\Guest\Cookies\guest@www.virginmedia[2].txt
C:\Documents and Settings\Guest\Cookies\guest@mediaplex[1].txt
C:\Documents and Settings\Guest\Cookies\guest@tacoda[1].txt0 -
Ok, with that being clear (Cookies arnt a threat), im guessing that kaspersky was picking up files that have been put into quarantine (Im guessing as ive no actual filepaths to look at)
Lets see how you get on from here:idea:0
This discussion has been closed.
Confirm your email address to Create Threads and Reply

Categories
- All Categories
- 351.1K Banking & Borrowing
- 253.1K Reduce Debt & Boost Income
- 453.6K Spending & Discounts
- 244.1K Work, Benefits & Business
- 599K Mortgages, Homes & Bills
- 177K Life & Family
- 257.4K Travel & Transport
- 1.5M Hobbies & Leisure
- 16.1K Discuss & Feedback
- 37.6K Read-Only Boards