Welcome guest. Before posting on our computer help forum, you must register. Click here it's easy and free.

Author Topic: just wondering if someone can take a look at my hijack this log  (Read 52538 times)

0 Members and 1 Guest are viewing this topic.

brett74

    Topic Starter


    Apprentice

    Thanked: 2
    I'm just curious about something that caLogfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:33:34 AM, on 9/28/2008
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16705)
    Boot mode: Normal

    Running processes:
    C:\windows\System32\smss.exe
    C:\windows\system32\winlogon.exe
    C:\windows\system32\services.exe
    C:\windows\system32\lsass.exe
    C:\windows\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\windows\System32\svchost.exe
    C:\windows\Explorer.EXE
    C:\windows\system32\spoolsv.exe
    C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    C:\Program Files\COMODO\Firewall\cmdagent.exe
    C:\WINDOWS\system32\CTsvcCDA.EXE
    C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    C:\windows\system32\nvsvc32.exe
    C:\WINDOWS\system32\PnkBstrA.exe
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
    C:\Program Files\COMODO\Firewall\cfp.exe
    C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
    C:\PROGRA~1\AVG\AVG8\avgtray.exe
    C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe
    C:\windows\system32\ctfmon.exe
    C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
    C:\PROGRA~1\AVG\AVG8\avgrsx.exe
    C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
    C:\Program Files\HP\Digital Imaging\Product Assistant\bin\hprblog.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Windows Internet Explorer provided by Yahoo!
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll
    O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files\Microsoft Office\Office12\GrooveShellExtensions.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
    O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.1.1119.1736\swg.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
    O4 - HKLM\..\Run: [NvCplDaemon] "RUNDLL32.EXE" C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] "nwiz.exe" /install
    O4 - HKLM\..\Run: [NvMediaCenter] "RUNDLL32.EXE" C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
    O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
    O4 - HKLM\..\Run: [GrooveMonitor] "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe"
    O4 - HKLM\..\Run: [COMODO Firewall Pro] "C:\Program Files\COMODO\Firewall\cfp.exe" -h
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
    O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
    O4 - HKCU\..\Run: [Creative Detector] "C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe" /R
    O4 - HKCU\..\Run: [ctfmon.exe] C:\windows\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
    O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
    O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\windows\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\windows\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {0D41B8C5-2599-4893-8183-00195EC8D5F9} (asusTek_sysctrl Class) - http://support.asus.com/common/asusTek_sys_ctrl.cab
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: {459E93B6-150E-45D5-8D4B-45C66FC035FE} (get_atlcom Class) - http://apps.corel.com/nos_dl_manager_dev/plugin/IEGetPlugin.ocx
    O16 - DPF: {4EFA317A-8569-4788-B175-5BAF9731A549} (Microsoft Virtual Server VMRC Advanced Control) - http://www.windowsvistatestdrive.com/ActiveX/VMRCActiveXClient1.cab
    O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx2.hotmail.com/mail/w2/resources/MSNPUpld.cab
    O16 - DPF: {54823A9D-6BAE-11D5-B519-0050BA2413EB} (ChkDVDCtl Class) - http://www.cyberlink.com/winxp/CheckDVD.cab
    O16 - DPF: {A90A5822-F108-45AD-8482-9BC8B12DD539} (Crucial cpcScan) - http://www.crucial.com/controls/cpcScanner.cab
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
    O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
    O20 - AppInit_DLLs: C:\windows\system32\guard32.dll,avgrsstx.dll
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL
    O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    O23 - Service: COMODO Firewall Pro Helper Service (cmdAgent) - Unknown owner - C:\Program Files\COMODO\Firewall\cmdagent.exe
    O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.EXE
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\windows\system32\nvsvc32.exe
    O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe

    --
    End of file - 7967 bytes
    me up on my hijack this log thanks

    kpac

    • Web moderator


    • Hacker

    • kpac®
    • Thanked: 184
      • Yes
      • Yes
      • Yes
    • Certifications: List
    • Computer: Specs
    • Experience: Expert
    • OS: Windows 7
    Re: just wondering if someone can take a look at my hijack this log
    « Reply #1 on: September 28, 2008, 09:41:37 AM »
    Have you read this: http://www.computerhope.com/forum/index.php/topic,46313.0.html ?

    The malware specialists will more than likely need the other logs.

    evilfantasy

    • Malware Removal Specialist
    • Moderator


    • Genius
    • Calm like a bomb
    • Thanked: 493
    • Experience: Experienced
    • OS: Windows 11
    Re: just wondering if someone can take a look at my hijack this log
    « Reply #2 on: September 28, 2008, 03:44:35 PM »
    Nothing out of the ordinary but as Kpac suggested the other scans will be a better solution. HJT only shows some forms of malware.

    brett74

      Topic Starter


      Apprentice

      Thanked: 2
      Re: just wondering if someone can take a look at my hijack this log
      « Reply #3 on: September 29, 2008, 03:27:09 PM »
      SUPERAntiSpyware Scan Log
      http://www.superantispyware.com

      Generated 09/28/2008 at 11:30 AM

      Application Version : 4.21.1004

      Core Rules Database Version : 3581
      Trace Rules Database Version: 1569

      Scan type       : Complete Scan
      Total Scan Time : 00:52:03

      Memory items scanned      : 353
      Memory threats detected   : 0
      Registry items scanned    : 6532
      Registry threats detected : 0
      File items scanned        : 20346
      File threats detected     : 118

      Adware.Tracking Cookie
         C:\Documents and Settings\brett1\Cookies\brett1@kontera[2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@adinterax[2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@imrworldwide[2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@realmedia[2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@2o7[1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@revenue[2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@fastclick[1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@collective-media[2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@atdmt[2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@tacoda[1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@advertising[2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@b5media[1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@toplist[1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][4].txt
         C:\Documents and Settings\brett1\Cookies\brett1@adrevolver[2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@apmebf[2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@serving-sys[1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@mediaplex[1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@4stats[2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@statcounter[2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@adbrite[2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@adlegend[2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@burstnet[1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@fortunecity[2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@revsci[1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@apartmentfinder[2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@bluestreak[1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@eyewonder[2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@media6degrees[2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@yieldmanager[1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@zedo[1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@tribalfusion[1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@casalemedia[2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@yadro[2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@trafficmp[2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@valueclick[1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@myroitracking[1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@bravenet[2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@roiservice[1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@specificclick[2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@insightexpressai[2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@overture[2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@wojmedia[1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][3].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@lost-media[1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@247realmedia[2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@hitbox[1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@interclick[1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@doubleclick[1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@questionmarket[1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][3].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\brett1@qnsr[1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@specificmedia[1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@tripod[2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\brett1@petfinder[2].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt
         C:\Documents and Settings\brett1\Cookies\[email protected][1].txt

      CBMatt

      • Mod & Malware Specialist


      • Prodigy

      • Sad and lonely...and loving every minute of it.
      • Thanked: 167
        • Yes
      • Experience: Experienced
      • OS: Windows 7
      Re: just wondering if someone can take a look at my hijack this log
      « Reply #4 on: October 01, 2008, 04:37:57 AM »
      Looks pretty normal to me.  What exactly are you curious about?
      Quote
      An undefined problem has an infinite number of solutions.
      —Robert A. Humphrey

      brett74

        Topic Starter


        Apprentice

        Thanked: 2
        Re: just wondering if someone can take a look at my hijack this log
        « Reply #5 on: October 01, 2008, 03:25:08 PM »
        okay thanks I was just wondering about the worm radar.com

        evilfantasy

        • Malware Removal Specialist
        • Moderator


        • Genius
        • Calm like a bomb
        • Thanked: 493
        • Experience: Experienced
        • OS: Windows 11
        Re: just wondering if someone can take a look at my hijack this log
        « Reply #6 on: October 01, 2008, 03:36:46 PM »
        WormRadar.com - Exploit Prevention Labs - Real-time Online Protection: the Missing Piece in Web Security

        In other words it's part of AVG's Link Scanner.