📨 Have you signed up to the Forum's new Email Digest yet? Get a selection of trending threads sent straight to your inbox daily, weekly or monthly!

Internet explorer shutting down

Options
124»

Comments

  • Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 06:37:20, on 29/09/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16876)
    Boot mode: Normal
    Running processes:
    C:\windows\System32\smss.exe
    C:\windows\system32\winlogon.exe
    C:\windows\system32\services.exe
    C:\windows\system32\lsass.exe
    C:\windows\system32\svchost.exe
    C:\windows\System32\svchost.exe
    C:\windows\system32\spoolsv.exe
    C:\Program Files\Avira\AntiVir Desktop\sched.exe
    C:\Program Files\Avira\AntiVir Desktop\avguard.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
    C:\Program Files\SPAMfighter\sfus.exe
    c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
    C:\windows\system32\svchost.exe
    C:\windows\Explorer.EXE
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\SPAMfighter\SFAgent.exe
    C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
    C:\Program Files\Common Files\InstallShield\UpdateService\ISUSPM.exe
    C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
    C:\Program Files\Java\jre6\bin\jusched.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\windows\system32\ctfmon.exe
    C:\Program Files\Outlook Express\msimn.exe
    C:\Program Files\internet explorer\iexplore.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = webcache.virginmedia.com:8080
    O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [SPAMfighter Agent] "C:\Program Files\SPAMfighter\SFAgent.exe" update delay 60
    O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [ISUSPM] "C:\Program Files\Common Files\InstallShield\UpdateService\ISUSPM.exe" -scheduler
    O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
    O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
    O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir Desktop\avgnt.exe" /min
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
    O4 - HKCU\..\Run: [Ncr] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [Google Update] "C:\Documents and Settings\dad\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" /c
    O4 - HKCU\..\Run: [ctfmon.exe] C:\windows\system32\ctfmon.exe
    O4 - HKCU\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\FlashUtil10b.exe
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\S-1-5-18\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    O9 - Extra button: ieSpell - {0E17D5B7-9F5D-4fee-9DF6-CA6EE38B68A8} - C:\Program Files\ieSpell\iespell.dll
    O9 - Extra 'Tools' menuitem: ieSpell - {0E17D5B7-9F5D-4fee-9DF6-CA6EE38B68A8} - C:\Program Files\ieSpell\iespell.dll
    O9 - Extra button: (no name) - {1606D6F9-9D3B-4aea-A025-ED5B2FD488E7} - C:\Program Files\ieSpell\iespell.dll
    O9 - Extra 'Tools' menuitem: ieSpell Options - {1606D6F9-9D3B-4aea-A025-ED5B2FD488E7} - C:\Program Files\ieSpell\iespell.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\windows\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\windows\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1217773248234
    O16 - DPF: {B1E2B96C-12FE-45E2-BEF1-44A219113CDD} (SABScanProcesses Class) - http://www.superadblocker.com/activex/sabspx.cab
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
    O23 - Service: Avira AntiVir Scheduler (AntiVirSchedulerService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\sched.exe
    O23 - Service: Avira AntiVir Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\avguard.exe
    O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: PrismXL - New Boundary Technologies, Inc. - C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
    O23 - Service: SPAMfighter Update Service - SPAMfighter ApS - C:\Program Files\SPAMfighter\sfus.exe
    O23 - Service: Universal Root Certificates Updates (ucrtupd) - Unknown owner - C:\windows\system32\ucrtupd.exe (file missing)
    --
    End of file - 6518 bytes
  • aliEnRIK
    aliEnRIK Posts: 17,741 Forumite
    Part of the Furniture Combo Breaker
    Did Dr Web find anything?

    FIX this in hijack ~
    O23 - Service: Universal Root Certificates Updates (ucrtupd) - Unknown owner - C:\windows\system32\ucrtupd.exe (file missing)

    Then run a KASPERSKY ONLINE SCAN (click to scan 'MY COMPUTER')
    http://www.kaspersky.com/kos/eng/partner/default/pages/default/check.html?n=1245225406761
    Please post the complete log it creates (This only SCANS it DOESNT delete anything, so we'd need to see anything it finds) by selecting to save the 'report' to the desktop in 'txt' format
    The scan will likely take anywhere from 5 to 12 hours to complete!
    :idea:
  • Dr web found 4 which were showing and several others which were put in quarantine but no idea where that is.
  • GunJack
    GunJack Posts: 11,838 Forumite
    Part of the Furniture 10,000 Posts Name Dropper Photogenic
    Not familiar with Dr Web, but there should be a link to it's quarantine area within the program interface somewhere

    ...but it's looking much better now ;)
    ......Gettin' There, Wherever There is......

    I have a dodgy "i" key, so ignore spelling errors due to "i" issues, ...I blame Apple :D
  • a11waysindebt
    a11waysindebt Posts: 922 Forumite
    edited 29 September 2009 at 2:29PM
    Kapersky froze halfway through I did however manage to notice files that were infected in a restore backup file I have on my pc. I've tried to delete this file but am unable to. Any ideas how to do it.

    Here they are as they are being picked up. Justt incase it freezes again.

    Trojan-Spy.HTML.Fraud.gen x 7

    Trojan-Spy.HTML.Paylap.m x 1
  • Ok. Froze once again at 68%. Computer hasn't stoppped once :T

    Should I just leave it as it is now or look for more nasties.:o

    Thanks.
  • aliEnRIK
    aliEnRIK Posts: 17,741 Forumite
    Part of the Furniture Combo Breaker
    Clearly your still infected so I personally think it would be a bit foolish to not pursue the nasties (Especially as theyre trojans)

    Download SUPERANTISPYWARE (Make sure you click 'DOWNLOAD LATEST VERSION')
    http://www.filehippo.com/download_superantispyware/
    UPDATE and PERFORM COMPLETE SCAN
    (Then goto console and LOGS and post the log it created then untick it from STARTING UP WITH WINDOWS)
    :idea:
  • SUPERAntiSpyware Scan Log
    http://www.superantispyware.com
    Generated 09/30/2009 at 05:41 AM
    Application Version : 4.29.1002
    Core Rules Database Version : 4135
    Trace Rules Database Version: 2068
    Scan type : Complete Scan
    Total Scan Time : 01:08:22
    Memory items scanned : 399
    Memory threats detected : 0
    Registry items scanned : 5834
    Registry threats detected : 0
    File items scanned : 35172
    File threats detected : 81
    Adware.Tracking Cookie
    C:\Documents and Settings\dad\Cookies\dad@adviva[2].txt
    C:\Documents and Settings\dad\Cookies\dad@media6degrees[3].txt
    C:\Documents and Settings\dad\Cookies\dad@server.iad.liveperson[5].txt
    C:\Documents and Settings\dad\Cookies\dad@questionmarket[3].txt
    C:\Documents and Settings\dad\Cookies\dad@advertising[2].txt
    C:\Documents and Settings\dad\Cookies\dad@mediaplex[2].txt
    C:\Documents and Settings\dad\Cookies\dad@rambler[2].txt
    C:\Documents and Settings\dad\Cookies\dad@revsci[1].txt
    C:\Documents and Settings\dad\Cookies\dad@doubleclick[1].txt
    C:\Documents and Settings\dad\Cookies\dad@content.yieldmanager[1].txt
    C:\Documents and Settings\dad\Cookies\dad@tacoda[1].txt
    C:\Documents and Settings\dad\Cookies\dad@kaspersky.122.2o7[1].txt
    C:\Documents and Settings\dad\Cookies\dad@chitika[1].txt
    C:\Documents and Settings\dad\Cookies\dad@ads.telegraph.co[1].txt
    C:\Documents and Settings\dad\Cookies\dad@kontera[2].txt
    C:\Documents and Settings\dad\Cookies\dad@media.adrevolver[2].txt
    C:\Documents and Settings\dad\Cookies\dad@tradedoubler[2].txt
    C:\Documents and Settings\dad\Cookies\dad@server.iad.liveperson[6].txt
    C:\Documents and Settings\dad\Cookies\dad@imrworldwide[3].txt
    C:\Documents and Settings\dad\Cookies\dad@dmtracker[1].txt
    C:\Documents and Settings\dad\Cookies\dad@specificclick[1].txt
    C:\Documents and Settings\dad\Cookies\dad@paypal.112.2o7[1].txt
    C:\Documents and Settings\dad\Cookies\dad@collective-media[2].txt
    C:\Documents and Settings\dad\Cookies\dad@serving-sys[3].txt
    C:\Documents and Settings\dad\Cookies\dad@ad.yieldmanager[2].txt
    C:\Documents and Settings\dad\Cookies\dad@fastclick[3].txt
    C:\Documents and Settings\dad\Cookies\dad@www.googleadservices[2].txt
    C:\Documents and Settings\dad\Cookies\dad@at.atwola[2].txt
    C:\Documents and Settings\dad\Cookies\dad@apmebf[1].txt
    C:\Documents and Settings\dad\Cookies\dad@atdmt[2].txt
    C:\Documents and Settings\dad\Cookies\dad@content.yieldmanager[5].txt
    C:\Documents and Settings\dad\Cookies\dad@bs.serving-sys[3].txt
    C:\Documents and Settings\dad\Cookies\dad@tribalfusion[2].txt
    C:\Documents and Settings\dad\Cookies\dad@www.3dstats[1].txt
    C:\Documents and Settings\dad\Cookies\dad@www.googleadservices[1].txt
    C:\Documents and Settings\dad\Cookies\dad@ad.yieldmanager[1].txt
    C:\Documents and Settings\dad\Cookies\dad@server.iad.liveperson[4].txt
    C:\Documents and Settings\dad\Cookies\dad@ads.pointroll[2].txt
    C:\Documents and Settings\dad\Cookies\dad@ads.ookla[2].txt
    C:\Documents and Settings\dad\Cookies\dad@ads.techguy[1].txt
    C:\Documents and Settings\dad\Cookies\dad@adviva[1].txt
    C:\Documents and Settings\dad\Cookies\dad@apmebf[2].txt
    C:\Documents and Settings\dad\Cookies\dad@atdmt[1].txt
    C:\Documents and Settings\dad\Cookies\dad@bs.serving-sys[1].txt
    C:\Documents and Settings\dad\Cookies\dad@burstnet[2].txt
    C:\Documents and Settings\dad\Cookies\dad@content.yieldmanager[3].txt
    C:\Documents and Settings\dad\Cookies\dad@casalemedia[1].txt
    C:\Documents and Settings\dad\Cookies\dad@cdn5.specificclick[1].txt
    C:\Documents and Settings\dad\Cookies\dad@chitika[2].txt
    C:\Documents and Settings\dad\Cookies\dad@collective-media[1].txt
    C:\Documents and Settings\dad\Cookies\dad@content.yieldmanager[2].txt
    C:\Documents and Settings\dad\Cookies\dad@doubleclick[2].txt
    C:\Documents and Settings\dad\Cookies\dad@e-2dj6wfmyshazgho.stats.esomniture[2].txt
    C:\Documents and Settings\dad\Cookies\dad@fastclick[2].txt
    C:\Documents and Settings\dad\Cookies\dad@imrworldwide[2].txt
    C:\Documents and Settings\dad\Cookies\dad@mediaplex[1].txt
    C:\Documents and Settings\dad\Cookies\dad@media.adrevolver[1].txt
    C:\Documents and Settings\dad\Cookies\dad@media6degrees[1].txt
    C:\Documents and Settings\dad\Cookies\dad@microsoftwindows.112.2o7[1].txt
    C:\Documents and Settings\dad\Cookies\dad@questionmarket[2].txt
    C:\Documents and Settings\dad\Cookies\dad@server.iad.liveperson[1].txt
    C:\Documents and Settings\dad\Cookies\dad@server.iad.liveperson[2].txt
    C:\Documents and Settings\dad\Cookies\dad@serving-sys[1].txt
    C:\Documents and Settings\dad\Cookies\dad@specificclick[2].txt
    C:\Documents and Settings\dad\Cookies\dad@statcounter[2].txt
    C:\Documents and Settings\dad\Cookies\dad@statse.webtrendslive[1].txt
    C:\Documents and Settings\dad\Cookies\dad@tradedoubler[1].txt
    C:\Documents and Settings\dad\Cookies\dad@tribalfusion[1].txt
    C:\Documents and Settings\dad\Cookies\dad@www.burstnet[1].txt
    C:\Documents and Settings\Guest\Cookies\guest@tribalfusion[1].txt
    C:\Documents and Settings\Guest\Cookies\guest@ad.yieldmanager[2].txt
    C:\Documents and Settings\Guest\Cookies\guest@virginmedia[2].txt
    C:\Documents and Settings\Guest\Cookies\guest@doubleclick[1].txt
    C:\Documents and Settings\Guest\Cookies\guest@search.virginmedia[1].txt
    C:\Documents and Settings\Guest\Cookies\guest@apmebf[1].txt
    C:\Documents and Settings\Guest\Cookies\guest@atdmt[1].txt
    C:\Documents and Settings\Guest\Cookies\guest@at.atwola[2].txt
    C:\Documents and Settings\Guest\Cookies\guest@advertising[1].txt
    C:\Documents and Settings\Guest\Cookies\guest@www.virginmedia[2].txt
    C:\Documents and Settings\Guest\Cookies\guest@mediaplex[1].txt
    C:\Documents and Settings\Guest\Cookies\guest@tacoda[1].txt
  • aliEnRIK
    aliEnRIK Posts: 17,741 Forumite
    Part of the Furniture Combo Breaker
    Ok, with that being clear (Cookies arnt a threat), im guessing that kaspersky was picking up files that have been put into quarantine (Im guessing as ive no actual filepaths to look at)
    Lets see how you get on from here
    :idea:
This discussion has been closed.
Meet your Ambassadors

🚀 Getting Started

Hi new member!

Our Getting Started Guide will help you get the most out of the Forum

Categories

  • All Categories
  • 351.1K Banking & Borrowing
  • 253.1K Reduce Debt & Boost Income
  • 453.6K Spending & Discounts
  • 244.1K Work, Benefits & Business
  • 599K Mortgages, Homes & Bills
  • 177K Life & Family
  • 257.4K Travel & Transport
  • 1.5M Hobbies & Leisure
  • 16.1K Discuss & Feedback
  • 37.6K Read-Only Boards

Is this how you want to be seen?

We see you are using a default avatar. It takes only a few seconds to pick a picture.