[Solved]Trojan Startpage-DU

Discussion in 'adware, spyware & hijack cleaning' started by maxedracer, Jun 27, 2004.

Thread Status:
Not open for further replies.
  1. Marianna

    Marianna Spyware Fighter

    Joined:
    Apr 23, 2002
    Posts:
    1,215
    Location:
    B.C. Canada
    Re: Trojan Startpage-DU

    I'm running out of ideas :(

    run hjt again ...... yeah I know it's getting "boring" - maybe we can SEE now "something\anything" ??
     
  2. maxedracer

    maxedracer Registered Member

    Joined:
    Jun 27, 2004
    Posts:
    46
    Re: Trojan Startpage-DU

    did u get that message about cleaner 4.1 detecting that js.cassandra trojan im not exactly sure what it does as all the virus sites havent got it in their definitions
     
  3. Marianna

    Marianna Spyware Fighter

    Joined:
    Apr 23, 2002
    Posts:
    1,215
    Location:
    B.C. Canada
  4. maxedracer

    maxedracer Registered Member

    Joined:
    Jun 27, 2004
    Posts:
    46
    Re: Trojan Startpage-DU

    take a look at this screen and the highlighted fields this is in my internet temp folder its that damn site that keeps coming up as my auto search msn
     

    Attached Files:

  5. Marianna

    Marianna Spyware Fighter

    Joined:
    Apr 23, 2002
    Posts:
    1,215
    Location:
    B.C. Canada
    Re: Trojan Startpage-DU

    YIKES :mad:

    Is your scan done?? And did you find the culprit in "quarantine" ??
     
  6. maxedracer

    maxedracer Registered Member

    Joined:
    Jun 27, 2004
    Posts:
    46
    Re: Trojan Startpage-DU

    there are lots of other files with that url and stuff lower down, how do i clean the temp folder? is there a special way ?
     
  7. maxedracer

    maxedracer Registered Member

    Joined:
    Jun 27, 2004
    Posts:
    46
    Re: Trojan Startpage-DU

    yea it was in quarantine and i deleted it i went to info and it said it was a trojan but also that it was a worm. my mem usage is still rocket high :( what should i do now ?
     
  8. maxedracer

    maxedracer Registered Member

    Joined:
    Jun 27, 2004
    Posts:
    46

    Attached Files:

  9. maxedracer

    maxedracer Registered Member

    Joined:
    Jun 27, 2004
    Posts:
    46
    Re: Trojan Startpage-DU

    both lines under i have just found out also re-direct to the hijacker site
     
  10. maxedracer

    maxedracer Registered Member

    Joined:
    Jun 27, 2004
    Posts:
    46
    Re: Trojan Startpage-DU

    hmm just checked in my regedit and checked the startpage and stuff it has changed to the url in that DLL. file
     
  11. Marianna

    Marianna Spyware Fighter

    Joined:
    Apr 23, 2002
    Posts:
    1,215
    Location:
    B.C. Canada
    Re: Trojan Startpage-DU

    Try this:


    Download and install APM from: http://www.diamondcs.com.au/index.php?page=apm

    Close all windows except HijackThis and fix the lines above.

    In the upper window select explorer.exe
    In the lower window find and rightclick the BHO from the HijackThis log
    Select Unload DLL and click OK on the prompts that follow.

    Reboot and scan with AdAware to remove the txt and html protocol association.
     
  12. Marianna

    Marianna Spyware Fighter

    Joined:
    Apr 23, 2002
    Posts:
    1,215
    Location:
    B.C. Canada
    Re: Trojan Startpage-DU

    Could you pls. run HijackThis once again and post a FRESH log. Thanks. Hang in there :)
     
  13. maxedracer

    maxedracer Registered Member

    Joined:
    Jun 27, 2004
    Posts:
    46
    Re: Trojan Startpage-DU

    here is new log

    Logfile of HijackThis v1.98.0
    Scan saved at 23:21:15, on 01/07/2004
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\AVPersonal\AVGNT.EXE
    C:\PROGRA~1\mcafee.com\vso\mcvsshld.exe
    C:\PROGRA~1\mcafee.com\agent\mcagent.exe
    C:\Program Files\The Cleaner\tca.exe
    c:\progra~1\mcafee.com\vso\mcvsescn.exe
    C:\Program Files\The Cleaner\tcm.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\WINDOWS\System32\ctfmon.exe
    C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
    C:\Program Files\AVPersonal\AVGUARD.EXE
    C:\Program Files\AVPersonal\AVWUPSRV.EXE
    c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
    C:\WINDOWS\System32\nvsvc32.exe
    c:\PROGRA~1\mcafee.com\vso\mcshield.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Hijackthis\HijackThis.exe

    F0 - system.ini: Shell=
    F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O3 - Toolbar: McAfee VirusScan - {BA52B914-B692-46c4-B683-905236F6F655} - c:\progra~1\mcafee.com\vso\mcvsshl.dll
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [AVGCtrl] C:\Program Files\AVPersonal\AVGNT.EXE /min
    O4 - HKLM\..\Run: [VSOCheckTask] "c:\PROGRA~1\mcafee.com\vso\mcmnhdlr.exe" /checktask
    O4 - HKLM\..\Run: [VirusScan Online] "c:\PROGRA~1\mcafee.com\vso\mcvsshld.exe"
    O4 - HKLM\..\Run: [MCAgentExe] c:\PROGRA~1\mcafee.com\agent\mcagent.exe
    O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\mcafee.com\agent\mcupdate.exe
    O4 - HKLM\..\Run: [THGuard] "C:\Program Files\TrojanHunter 3.9\THGuard.exe"
    O4 - HKLM\..\Run: [tcactive] C:\Program Files\The Cleaner\tca.exe
    O4 - HKLM\..\Run: [tcmonitor] C:\Program Files\The Cleaner\tcm.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
    O4 - HKCU\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe" /0
    O4 - Startup: BHODemon.lnk = C:\Program Files\BHODemon\BHODemon.exe
    O8 - Extra context menu item: &Download with &DAP - C:\PROGRA~1\DAP\dapextie.htm
    O8 - Extra context menu item: Download &all with DAP - C:\PROGRA~1\DAP\dapextie2.htm
    O9 - Extra button: ICQ Pro - {6224f700-cba3-4071-b251-47cb894244cd} - C:\PROGRA~1\ICQ\ICQ.exe
    O9 - Extra 'Tools' menuitem: ICQ - {6224f700-cba3-4071-b251-47cb894244cd} - C:\PROGRA~1\ICQ\ICQ.exe
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcafee.com/molbin/shared/mcinsctl/en-us/4,0,0,83/mcinsctl.cab
    O16 - DPF: {80DD2229-B8E4-4C77-B72F-F22972D723EA} (AvxScanOnline Control) - http://www.bitdefender.com/scan/Msie/bitdefender.cab
    O16 - DPF: {8E28B3A9-FE83-45D1-B657-D5426B81A121} (CustomerCtrl Class) - https://cs7b.instantservice.com/jars/customerxsigned42.cab
    O16 - DPF: {B3872502-F9FD-4E96-93FF-0D37298F0689} (SOESysInfo Control) - http://everquest2.station.sony.com/beta_reg/soesysinfo.cab
    O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} (DwnldGroupMgr Class) - http://download.mcafee.com/molbin/shared/mcgdmgr/en-us/1,0,0,20/mcgdmgr.cab
    O16 - DPF: {E7DBFB6C-113A-47CF-B278-F5C6AF4DE1BD} - http://www.smgradio.com/core/player/abasetup144.cab
    O16 - DPF: {E855A2D4-987E-4F3B-A51C-64D10A7E2479} (EPSImageControl Class) - http://tools.ebayimg.com/eps/activex/EPSControl_v1-0-3-0.cab
    O16 - DPF: {F54C1137-5E34-4B95-95A5-BA56D4D8D743} (Secure Delivery) - http://www.gamespot.com/KDX/kdx.cab
     
  14. maxedracer

    maxedracer Registered Member

    Joined:
    Jun 27, 2004
    Posts:
    46
    Re: Trojan Startpage-DU

    when u say download APM and fix the lines above, what lines ?
     
  15. Marianna

    Marianna Spyware Fighter

    Joined:
    Apr 23, 2002
    Posts:
    1,215
    Location:
    B.C. Canada
    Re: Trojan Startpage-DU

    don't do anything with APM for now.
     
  16. maxedracer

    maxedracer Registered Member

    Joined:
    Jun 27, 2004
    Posts:
    46
    Re: Trojan Startpage-DU

    okie dokie
     
  17. maxedracer

    maxedracer Registered Member

    Joined:
    Jun 27, 2004
    Posts:
    46
    Re: Trojan Startpage-DU

    :( Just this second a mcafee warning came up saying, C:\WINDOWS\SYSTEM32\mjbfdp.dll was infected by the StartPage-DU trojan and has been deleted. I keep gettin infected by it somehow just as i think its gone and all of the adware programs i have download dont detect anythin, nor the virus programs

    It always affects the files in system 32
     
  18. Marianna

    Marianna Spyware Fighter

    Joined:
    Apr 23, 2002
    Posts:
    1,215
    Location:
    B.C. Canada
    Re: Trojan Startpage-DU

    Have to wait for Subratam - he lives in a different time zone.

    Is your McAfee up-to-date?? Maybe a "stupid" question - but I have to ask :)
     
  19. maxedracer

    maxedracer Registered Member

    Joined:
    Jun 27, 2004
    Posts:
    46
    Re: Trojan Startpage-DU

    yup it is
     
  20. maxedracer

    maxedracer Registered Member

    Joined:
    Jun 27, 2004
    Posts:
    46
    Re: Trojan Startpage-DU

    everything i downoaded is, about 6 different adware programs 3 trojan hunters 3 different virus programs anti browser hijacker guard programs 2 reg cleaner programs and a virus scan in dos using a mcafee tool and nothin has worked
     
  21. Pieter_Arntz

    Pieter_Arntz Spyware Veteran

    Joined:
    Apr 27, 2002
    Posts:
    13,491
    Location:
    Netherlands
    Re: Trojan Startpage-DU

    Download and install:
    "FINDnFIX.exe" from:
    here
    or here

    Run the "!LOG!.bat" file, wait for the final output (log.txt)
    post the results....Along with fresh hijackthis log!

    Regards,

    Pieter
     
  22. maxedracer

    maxedracer Registered Member

    Joined:
    Jun 27, 2004
    Posts:
    46
    Re: Trojan Startpage-DU

    Here is the !LOG! txt file
    »»»»»»»»»»»»»»»»»»*** freeatlast100.100free.com ***»»»»»»»»»»»»»»»»

    Microsoft Windows XP [Version 5.1.2600]
    »»»IE build and last SP(s)
    6.0.2800.1106 SP1-Q837009-Q832894-Q831167
    The type of the file system is NTFS.
    C: is not dirty.

    02/07/2004
    12:51am up 0 days, 0:03

    »»»»»»»»»»»»»»»»»»***LOG!***»»»»»»»»»»»»»»»»

    Scanning for file(s)...
    »»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»
    »»»»» (*1*) »»»»» .........
    »»Locked or 'Suspect' file(s) found...

    C:\WINDOWS\System32\KBDPPJL.DLL +++ File read error
    \\?\C:\WINDOWS\System32\KBDPPJL.DLL +++ File read error

    »»»»» (*2*) »»»»»........
    **File C:\FINDnFIX\LIST.TXT
    KBDPPJL.DLL Can't Open!

    »»»»» (*3*) »»»»»........

    C:\WINDOWS\SYSTEM32\
    kbdppjl.dll Tue 22 Jun 2004 1:53:18 A...R 57,344 56.00 K

    1 item found: 1 file, 0 directories.
    Total of file sizes: 57,344 bytes 56.00 K

    unknown/hidden files...

    No matches found.

    »»»»» (*4*) »»»»».........
    Sniffing..........
    Power SNiF 1.34 - The Ultimate File Snifferdog. Created Mar 16 1992, 21:09:15.

    Sniffed -> C:\WINDOWS\SYSTEM32\KBDPPJL.DLL
    »»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»

    »»Size of Windows key:
    (*Default-450 *No AppInit-398 *fake(infected)-448,504,512...)

    Size of HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Windows: 448

    »»Dumping Values........
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs SZ
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\DeviceNotSelectedTimeout SZ 15
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\GDIProcessHandleQuota DWORD 00002710
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\Spooler SZ yes
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\swapdisk SZ
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\TransmissionRetryTimeout SZ 90
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\USERProcessHandleQuota DWORD 00002710

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
    AppInit_DLLs = (*** MISSING TRAILING NULL CHARACTER ***)
    DeviceNotSelectedTimeout = 15
    GDIProcessHandleQuota = REG_DWORD 0x00002710
    Spooler = yes
    swapdisk =
    TransmissionRetryTimeout = 90
    USERProcessHandleQuota = REG_DWORD 0x00002710

    »»Security settings for 'Windows' key:


    RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
    Copyright (c) 1999-2001 Frank Heyne Software (http://www.heysoft.de)
    This program is Freeware, use it on your own risk!

    Access Control List for Registry key hklm\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows:
    (NI) ALLOW Read BUILTIN\Users
    (IO) ALLOW Read BUILTIN\Users
    (NI) ALLOW Read BUILTIN\Power Users
    (IO) ALLOW Read BUILTIN\Power Users
    (NI) ALLOW Full access BUILTIN\Administrators
    (IO) ALLOW Full access BUILTIN\Administrators
    (NI) ALLOW Full access NT AUTHORITY\SYSTEM
    (IO) ALLOW Full access NT AUTHORITY\SYSTEM
    (NI) ALLOW Full access BUILTIN\Administrators
    (IO) ALLOW Full access CREATOR OWNER

    Effective permissions for Registry key hklm\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows:
    Read BUILTIN\Users
    Read BUILTIN\Power Users
    Full access BUILTIN\Administrators
    Full access NT AUTHORITY\SYSTEM


    »»Member of...: (Admin logon required!)
    User is a member of group TERMINATOR\None.
    User is a member of group \Everyone.
    User is a member of group BUILTIN\Administrators.
    User is a member of group BUILTIN\Users.
    User is a member of group \LOCAL.
    User is a member of group NT AUTHORITY\INTERACTIVE.
    User is a member of group NT AUTHORITY\Authenticated Users.

    »» Service search:(different variant) '"Network Security Service","__NS_Service_3"...

    [SC] GetServiceKeyName FAILED 1060:

    The specified service does not exist as an installed service.

    [SC] GetServiceDisplayName FAILED 1060:

    The specified service does not exist as an installed service.


    »»Notepad check....

    C:\WINDOWS\
    notepad.exe Tue 22 Jun 2004 1:52:50 A.... 66,048 64.50 K

    1 item found: 1 file, 0 directories.
    Total of file sizes: 66,048 bytes 64.50 K

    C:\WINDOWS\SYSTEM32\
    notepad.exe Tue 22 Jun 2004 1:52:50 A.... 66,048 64.50 K

    1 item found: 1 file, 0 directories.
    Total of file sizes: 66,048 bytes 64.50 K

    C:\WINDOWS\SYSTEM32\DLLCACHE\
    notepad.exe Tue 22 Jun 2004 1:52:50 A.... 66,048 64.50 K

    1 item found: 1 file, 0 directories.
    Total of file sizes: 66,048 bytes 64.50 K
    --a-- W32i APP ENU 5.1.2600.0 shp 66,048 06-22-2004 notepad.exe
    Language 0x0409 (English (United States))
    CharSet 0x04b0 Unicode
    OleSelfRegister Disabled
    CompanyName Microsoft Corporation
    FileDescription Notepad
    InternalName Notepad
    OriginalFilenam NOTEPAD.EXE
    ProductName Microsoft® Windows® Operating System
    ProductVersion 5.1.2600.0
    FileVersion 5.1.2600.0 (xpclient.010817-114:cool:
    LegalCopyright © Microsoft Corporation. All rights reserved.

    VS_FIXEDFILEINFO:
    Signature: feef04bd
    Struc Ver: 00010000
    FileVer: 00050001:0a280000 (5.1:2600.0)
    ProdVer: 00050001:0a280000 (5.1:2600.0)
    FlagMask: 0000003f
    Flags: 00000000
    OS: 00040004 NT Win32
    FileType: 00000001 App
    SubType: 00000000
    FileDate: 00000000:00000000

    »»Dir 'junkxxx' was created with the following permissions...
    (FAT32=NA)
    Directory "C:\junkxxx"
    Permissions:
    Type Flags Inh. Mask Gen. Std. File Group or User
    ======= ======== ==== ======== ==== ==== ==== ================
    Allow 00000003 tco- 001F01FF ---- DSPO rw+x BUILTIN\Administrators
    Allow 00000003 tco- 001F01FF ---- DSPO rw+x NT AUTHORITY\SYSTEM
    Allow 00000000 t--- 001F01FF ---- DSPO rw+x TERMINATOR\Jez
    Allow 0000000B -co- 10000000 ---A ---- ---- \CREATOR OWNER
    Allow 00000003 tco- 001200A9 ---- -S-- r--x BUILTIN\Users
    Allow 00000002 tc-- 00000004 ---- ---- --+- BUILTIN\Users
    Allow 00000002 tc-- 00000002 ---- ---- -w-- BUILTIN\Users

    Owner: TERMINATOR\Jez

    Primary Group: TERMINATOR\None



    »»»»»»Backups created...»»»»»»
    12:53am up 0 days, 0:05
    02/07/2004

    A C:\FINDnFIX\winBack.hiv
    --a-- - - - - - 8,192 07-02-2004 winback.hiv
    A C:\FINDnFIX\keys1\winkey.reg
    --a-- - - - - - 287 07-02-2004 winkey.reg

    »»Performing 16bit string scan....
    00001150: ?
    00001190: he A vk @ f AppInit_
    000011D0:DLLs G C : \ W I N D O W S \ S y s t e m 3 2 \ k b d p p j
    00001210:l . d l l T P vk X UDeviceNotSelecte
    00001250:dTimeout 1 5 9 0 N vk ' z
    00001290:GDIProcessHandleQuota" vk Spooler2 y e
    000012D0:s _ ( x vk 5swapdisk
    00001310: vk h . TransmissionRetryTimeout ( x
    00001350: ` vk ' USERProcessHandleQuota
    00001390:p /1/2004,20:24:24 WARNING: AVGuard detected a problem in the
    000013D0:file C:\DOCUMENTS AND SETTINGS\JEZ\LOCAL SETTINGS\TEMPORARY I
    00001410:NTERNET FILES\CONTENT.IE5\NUGRBH01\UPRAVLJANJE_STORITEV%20_V_IT[
    00001450:1].PPT ATTENTION: This OLE document is possibly damaged!
    00001490: 7/1/2004,20:24:24 WARNING: AVGuard detected a problem in the fi
    000014D0:le C:\DOCUMENTS AND SETTINGS\JEZ\LOCAL SETTINGS\TEMPORARY INT
    00001510:ERNET FILES\CONTENT.IE5\NUGRBH01\UPRAVLJANJE_STORITEV%20_V_IT[2]
    00001550:.

    ---------- WIN.TXT
    fùAppInit_DLLsÖæG¸ÿÿÿC
    REGEDIT4

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
    "AppInit_DLLs"=""
    "DeviceNotSelectedTimeout"="15"
    "GDIProcessHandleQuota"=dword:00002710
    "Spooler"="yes"
    "swapdisk"=""
    "TransmissionRetryTimeout"="90"
    "USERProcessHandleQuota"=dword:00002710

    9:23:04
    Star
    Windows
    skVDx
    AppInit
    UDeviceNotSelectedTimeout
    zGDIProcessHandleQuota"
    Spooler2
    5swapdisk
    TransmissionRetryTimeout
    USERProcessHandleQuota
    /1/2004,20:24:24 WARNING: AVGuard detected a problem in the file
    DOCUMENTS AND SETTINGS
    LOCAL SETTINGS
    TEMPORARY INTERNET FILES
    CONTENT.IE5
    NUGRBH01
    UPRAVLJANJE
    STORITEV%20
    ATTENTION: This OLE document is possibly damaged!
    7/1/2004,20:24:24 WARNING: AVGuard detected a problem in the file
    DOCUMENTS AND SETTINGS
    LOCAL SETTINGS
    TEMPORARY INTERNET FILES
    CONTENT.IE5
    NUGRBH01
    UPRAVLJANJE
    STORITEV%20
    ATTENTION: This OLE document is possibly damaged!
    7/1/2004,20:57:36
    Stop Filter Device.
    7/1/2004,20:57:37 AVGuard service has been stopped!
    7/1/2004,20:58:58
    The AVGuard Service is starting.
    7/1/2004,20:58:59
    Keyfile contains a valid license. The AVGuard service will run as a fully functional version!
    7/1/2004,20:59:04
    LOGON
    Connection request by remote computer. Establishing secure communication chann7/1/2004,20:59:04
    LOGON
    Connection to computer localhost established successfully. Session ID = 0xaaaa09ce.
    7/1/2004,20:59:10
    Start Filter Device.
    7/1/2004,20:59:10 AntiVirService Version: 6.26.00.02 AVE Version 6.26.0.3 VDF Version: 6.26.0.6
    7/1/2004,20:59:10 AVGuard has been started successfully!
    7/2/2004,1:46:28
    Stop Filter Device.
    7/2/2004,1:46:31 AVGuard service has been stopped!
    7/2/2004,12:48:36
    The AVGuard Service is starting.
    7/2/2004,12:48:38
    Keyfile contains a valid license. The AVGuard service will run as a fully functional version!
    7/2/2004,12:48:39
    LOGON
    Connection request by remote computer. Establishing secure communication chann7/2/2004,12:48:39
    LOGON
    Connection to computer localhost established successfully. Session ID = 0xaaaa39fc.
    7/2/2004,12:48:47
    Start Filter Device.
    7/2/2004,12:48:47 AntiVirService Version: 6.26.00.02 AVE Version 6.26.0.3 VDF Version: 6.26.0.6
    7/2/2004,12:48:47 AVGuard has been started successfully!

    **File C:\FINDnFIX\WIN.TXT
            he AØÿÿÿvk @ Ø   fùAppInit_DLLsÖæG¸ÿÿÿC : \ W I N D O W S \ S y s t e m 3 2 \ k b d p p j l . d l l T P  ° Ðÿÿÿvk  X   ÀUDeviceNotSelectedTimeoutðÿÿÿ1 5  ð ðÿÿÿ9 0  àN Ðÿÿÿvk  €'   zGDIProcessHandleQuota"þàÿÿÿvk  È   °ºSpooler2ðÿÿÿy e s
    

    Here is the hijackthis log

    Logfile of HijackThis v1.98.0
    Scan saved at 12:57:55, on 02/07/2004
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\AVPersonal\AVGNT.EXE
    C:\PROGRA~1\mcafee.com\vso\mcvsshld.exe
    c:\progra~1\mcafee.com\vso\mcvsescn.exe
    c:\program files\mcafee.com\agent\mcagent.exe
    C:\Program Files\The Cleaner\tca.exe
    C:\Program Files\The Cleaner\tcm.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\WINDOWS\System32\ctfmon.exe
    C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
    C:\Program Files\AVPersonal\AVGUARD.EXE
    C:\Program Files\AVPersonal\AVWUPSRV.EXE
    c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
    C:\WINDOWS\System32\nvsvc32.exe
    c:\PROGRA~1\mcafee.com\vso\mcshield.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\Program Files\Hijackthis\HijackThis.exe

    F0 - system.ini: Shell=
    F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O3 - Toolbar: McAfee VirusScan - {BA52B914-B692-46c4-B683-905236F6F655} - c:\progra~1\mcafee.com\vso\mcvsshl.dll
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [AVGCtrl] C:\Program Files\AVPersonal\AVGNT.EXE /min
    O4 - HKLM\..\Run: [VSOCheckTask] "c:\PROGRA~1\mcafee.com\vso\mcmnhdlr.exe" /checktask
    O4 - HKLM\..\Run: [VirusScan Online] "c:\PROGRA~1\mcafee.com\vso\mcvsshld.exe"
    O4 - HKLM\..\Run: [MCAgentExe] c:\PROGRA~1\mcafee.com\agent\mcagent.exe
    O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\mcafee.com\agent\mcupdate.exe
    O4 - HKLM\..\Run: [THGuard] "C:\Program Files\TrojanHunter 3.9\THGuard.exe"
    O4 - HKLM\..\Run: [tcactive] C:\Program Files\The Cleaner\tca.exe
    O4 - HKLM\..\Run: [tcmonitor] C:\Program Files\The Cleaner\tcm.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
    O4 - HKCU\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe" /0
    O4 - Startup: BHODemon.lnk = C:\Program Files\BHODemon\BHODemon.exe
    O8 - Extra context menu item: &Download with &DAP - C:\PROGRA~1\DAP\dapextie.htm
    O8 - Extra context menu item: Download &all with DAP - C:\PROGRA~1\DAP\dapextie2.htm
    O9 - Extra button: ICQ Pro - {6224f700-cba3-4071-b251-47cb894244cd} - C:\PROGRA~1\ICQ\ICQ.exe
    O9 - Extra 'Tools' menuitem: ICQ - {6224f700-cba3-4071-b251-47cb894244cd} - C:\PROGRA~1\ICQ\ICQ.exe
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcafee.com/molbin/shared/mcinsctl/en-us/4,0,0,83/mcinsctl.cab
    O16 - DPF: {80DD2229-B8E4-4C77-B72F-F22972D723EA} (AvxScanOnline Control) - http://www.bitdefender.com/scan/Msie/bitdefender.cab
    O16 - DPF: {8E28B3A9-FE83-45D1-B657-D5426B81A121} (CustomerCtrl Class) - https://cs7b.instantservice.com/jars/customerxsigned42.cab
    O16 - DPF: {B3872502-F9FD-4E96-93FF-0D37298F0689} (SOESysInfo Control) - http://everquest2.station.sony.com/beta_reg/soesysinfo.cab
    O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} (DwnldGroupMgr Class) - http://download.mcafee.com/molbin/shared/mcgdmgr/en-us/1,0,0,20/mcgdmgr.cab
    O16 - DPF: {E7DBFB6C-113A-47CF-B278-F5C6AF4DE1BD} - http://www.smgradio.com/core/player/abasetup144.cab
    O16 - DPF: {E855A2D4-987E-4F3B-A51C-64D10A7E2479} (EPSImageControl Class) - http://tools.ebayimg.com/eps/activex/EPSControl_v1-0-3-0.cab
    O16 - DPF: {F54C1137-5E34-4B95-95A5-BA56D4D8D743} (Secure Delivery) - http://www.gamespot.com/KDX/kdx.cab
     
  23. Pieter_Arntz

    Pieter_Arntz Spyware Veteran

    Joined:
    Apr 27, 2002
    Posts:
    13,491
    Location:
    Netherlands
    Re: Trojan Startpage-DU

    That is a definite ID.

    Be sure to Follow the next set of steps carefully, in
    the exact order specified:


    -Open the FINDnFIX\Keys1 Subfolder!
    - Locate the "MOVEit.bat" file, Right-Click
    on it,select->edit:
    The file will open as text file.
    -Copy and paste the entire hilited line in the following quote box
    (all one line) into the 'MOVEit' file, replacing it's contents:
    Code:
    move %WinDir%\System32\KBDPPJL.DLL %SystemDrive%\junkxxx\KBDPPJL.DLL 
    Be sure to Replace the text in the file with the command above!


    -Save the file and close.

    *Get ready to restart your computer:
    -In the same folder, DoubleClick on the "FIX.bat" file.
    You will be prompted by popup -Alert to restart in 15 seconds.
    -Allow it to restart the computer!

    -On restart, Navigate to:
    C:\FINDnFIX\ main folder:
    -DoubleClick on the "RESTORE.bat" file.

    It'll run and produce new log. (log1.txt) post it here!
    ===================================
    *Note:
    Some *crippled version(s) of XP would not let you edit .bat files!

    In case of any errors while editing the 'MOVEit' or no
    edit options, etc
    Don't follow the steps above but
    Use the alternate steps in the following quote box:
    If the first set of steps (MOVEit/edit/paste/save, etc)
    was successful, there is no need to follow the alternate steps above!


    Regards,

    Pieter
     
  24. maxedracer

    maxedracer Registered Member

    Joined:
    Jun 27, 2004
    Posts:
    46
    Re: Trojan Startpage-DU

    k here is the log file


    »»»»»»»»»»»»»»»»»»*** freeatlast100.100free.com ***»»»»»»»»»»»»»»»»

    02/07/2004
    2:30pm up 0 days, 0:01

    Microsoft Windows XP [Version 5.1.2600]
    »»»IE build and last SP(s)
    6.0.2800.1106 SP1-Q837009-Q832894-Q831167
    The type of the file system is NTFS.
    C: is not dirty.

    »»»»»»»»»»»»»»»»»»***LOG1!***»»»»»»»»»»»»»»»»
    Scanning for file(s) in System32...

    »»»»»»» (1) »»»»»»»

    »»»»»»» (2) »»»»»»»
    **File C:\FINDnFIX\LIST.TXT

    »»»»»»» (3) »»»»»»»

    No matches found.

    No matches found.

    »»»»»»» (4) »»»»»»»
    Power SNiF 1.34 - The Ultimate File Snifferdog. Created Mar 16 1992, 21:09:15.


    »»»*»»» Scanning for moved file... »»»*»»»
    * result\\?\C:\junkxxx\KBDPPJL.222


    C:\JUNKXXX\
    kbdppjl.222 Tue 22 Jun 2004 1:53:18 A.... 57,344 56.00 K

    1 item found: 1 file, 0 directories.
    Total of file sizes: 57,344 bytes 56.00 K

    Power SNiF 1.34 - The Ultimate File Snifferdog. Created Mar 16 1992, 21:09:15.

    Sniffed -> C:\JUNKXXX\KBDPPJL.222

    **File C:\JUNKXXX\KBDPPJL.222
    0000DEBE: 67 44 65 76 69 63 65 00 . 00 53 74 72 65 61 6D 69 gDevice. .Streami
    0000DED3: 63 65 53 65 74 75 70 00 . 32 00 00 00 00 00 E0 01 ceSetup. 2.....à.

    A----- KBDPPJL .222 0000E000 01:53.18 22/06/2004

    move %WinDir%\System32\KBDPPJL.DLL %SystemDrive%\junkxxx\KBDPPJL.DLL




    --a-- W32i - - - - 57,344 06-22-2004 kbdppjl.222
    A C:\junkxxx\KBDPPJL.222
    File: <C:\junkxxx\KBDPPJL.222>

    CRC-32 : D5C9FB2E

    MD5 : C185B36F 9969D3A6 D2122BA7 CBC02249




    »»Permissions:
    C:\junkxxx\KBDPPJL.222 Everyone:(special access:)

    SYNCHRONIZE
    FILE_EXECUTE

    NT AUTHORITY\SYSTEM:F
    BUILTIN\Administrators:F

    Directory "C:\junkxxx\."
    Permissions:
    Type Flags Inh. Mask Gen. Std. File Group or User
    ======= ======== ==== ======== ==== ==== ==== ================
    Allow 00000003 tco- 001F01FF ---- DSPO rw+x BUILTIN\Administrators
    Allow 00000003 tco- 001F01FF ---- DSPO rw+x NT AUTHORITY\SYSTEM
    Allow 00000000 t--- 001F01FF ---- DSPO rw+x TERMINATOR\Jez
    Allow 0000000B -co- 10000000 ---A ---- ---- \CREATOR OWNER
    Allow 00000003 tco- 001200A9 ---- -S-- r--x BUILTIN\Users
    Allow 00000002 tc-- 00000004 ---- ---- --+- BUILTIN\Users
    Allow 00000002 tc-- 00000002 ---- ---- -w-- BUILTIN\Users

    Owner: TERMINATOR\Jez

    Primary Group: TERMINATOR\None

    Directory "C:\junkxxx\.."
    Permissions:
    Type Flags Inh. Mask Gen. Std. File Group or User
    ======= ======== ==== ======== ==== ==== ==== ================
    Allow 00000003 tco- 001F01FF ---- DSPO rw+x BUILTIN\Administrators
    Allow 00000003 tco- 001F01FF ---- DSPO rw+x NT AUTHORITY\SYSTEM
    Allow 0000000B -co- 10000000 ---A ---- ---- \CREATOR OWNER
    Allow 00000003 tco- 001200A9 ---- -S-- r--x BUILTIN\Users
    Allow 00000002 tc-- 00000004 ---- ---- --+- BUILTIN\Users
    Allow 0000000A -c-- 00000002 ---- ---- -w-- BUILTIN\Users
    Allow 00000000 t--- 001200A9 ---- -S-- r--x \Everyone

    Owner: BUILTIN\Administrators

    Primary Group: NT AUTHORITY\SYSTEM

    File "C:\junkxxx\KBDPPJL.222"
    Permissions:
    Type Flags Inh. Mask Gen. Std. File Group or User
    ======= ======== ==== ======== ==== ==== ==== ================
    Allow 00000000 t--- 00100020 ---- ---- ---x \Everyone
    Allow 00000000 t--- 001F01FF ---- DSPO rw+x NT AUTHORITY\SYSTEM
    Allow 00000000 t--- 001F01FF ---- DSPO rw+x BUILTIN\Administrators

    Owner: TERMINATOR\Jez

    Primary Group: TERMINATOR\None


    »»Size of Windows key:
    (*Default-450 *No AppInit-398 *fake(infected)-448,504,512...)

    Size of HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Windows: 450

    »»Dumping Values:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\DeviceNotSelectedTimeout SZ 15
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\GDIProcessHandleQuota DWORD 00002710
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\Spooler SZ yes
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\swapdisk SZ
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\TransmissionRetryTimeout SZ 90
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\USERProcessHandleQuota DWORD 00002710
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs SZ

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
    DeviceNotSelectedTimeout = 15
    GDIProcessHandleQuota = REG_DWORD 0x00002710
    Spooler = yes
    swapdisk =
    TransmissionRetryTimeout = 90
    USERProcessHandleQuota = REG_DWORD 0x00002710
    AppInit_DLLs =

    »»Security settings for 'Windows' key:


    RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
    Copyright (c) 1999-2001 Frank Heyne Software (http://www.heysoft.de)
    This program is Freeware, use it on your own risk!

    Access Control List for Registry key hklm\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows:
    (ID-NI) ALLOW Read BUILTIN\Users
    (ID-IO) ALLOW Read BUILTIN\Users
    (ID-NI) ALLOW QWCEN-DS-- BUILTIN\Power Users
    (ID-IO) ALLOW QWCEN-DS-- BUILTIN\Power Users
    (ID-NI) ALLOW Full access BUILTIN\Administrators
    (ID-IO) ALLOW Full access BUILTIN\Administrators
    (ID-NI) ALLOW Full access NT AUTHORITY\SYSTEM
    (ID-IO) ALLOW Full access NT AUTHORITY\SYSTEM
    (ID-NI) ALLOW Full access TERMINATOR\Jez
    (ID-IO) ALLOW Full access CREATOR OWNER

    Effective permissions for Registry key hklm\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows:
    Read BUILTIN\Users
    QWCEN-DS-- BUILTIN\Power Users
    Full access BUILTIN\Administrators
    Full access NT AUTHORITY\SYSTEM
    Full access TERMINATOR\Jez



    »»Notepad check....

    C:\WINDOWS\
    notepad.exe Tue 22 Jun 2004 1:52:50 A.... 66,048 64.50 K

    1 item found: 1 file, 0 directories.
    Total of file sizes: 66,048 bytes 64.50 K

    C:\WINDOWS\SYSTEM32\
    notepad.exe Tue 22 Jun 2004 1:52:50 A.... 66,048 64.50 K

    1 item found: 1 file, 0 directories.
    Total of file sizes: 66,048 bytes 64.50 K

    C:\WINDOWS\SYSTEM32\DLLCACHE\
    notepad.exe Tue 22 Jun 2004 1:52:50 A.... 66,048 64.50 K

    1 item found: 1 file, 0 directories.
    Total of file sizes: 66,048 bytes 64.50 K
    --a-- W32i APP ENU 5.1.2600.0 shp 66,048 06-22-2004 notepad.exe
    Language 0x0409 (English (United States))
    CharSet 0x04b0 Unicode
    OleSelfRegister Disabled
    CompanyName Microsoft Corporation
    FileDescription Notepad
    InternalName Notepad
    OriginalFilenam NOTEPAD.EXE
    ProductName Microsoft® Windows® Operating System
    ProductVersion 5.1.2600.0
    FileVersion 5.1.2600.0 (xpclient.010817-114:cool:
    LegalCopyright © Microsoft Corporation. All rights reserved.

    VS_FIXEDFILEINFO:
    Signature: feef04bd
    Struc Ver: 00010000
    FileVer: 00050001:0a280000 (5.1:2600.0)
    ProdVer: 00050001:0a280000 (5.1:2600.0)
    FlagMask: 0000003f
    Flags: 00000000
    OS: 00040004 NT Win32
    FileType: 00000001 App
    SubType: 00000000
    FileDate: 00000000:00000000

    00001150: $ ? Wf b U[ ;+
    00001190: Wf b U[ ;+ Wf b U[ ;+
    000011D0: een vk UDeviceNotSelectedTimeout 1 5
    00001210: vk ' zGDIProcessHandleQuota"
    00001250: 9 0 { x`{ vk Spooler2 y e s _
    00001290: vk { swapdisk ` vk
    000012D0: P utTransmissionRetryTimeout vk ' S
    00001310:USERProcessHandleQuotab ` H vk
    00001350: f AppInit_DLLs G a6. 6/25/2004,14:04:54 [INF
    00001390:O] Start Filter Device. 6/25/2004,14:04:54 AntiVirService Vers
    000013D0:ion: 6.26.00.02 AVE Version 6.26.0.3 VDF Version: 6.26.0.6 6/
    00001410:25/2004,14:04:54 AVGuard has been started successfully! 6/25/20
    00001450:04,19:36:25 WARNING: The Trojan horse TR/StartPage.IX! C:\DOC
    00001490:UMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERN
    000014D0:ET FILES\CONTENT.IE5\ULQ6D6JV\M[1].BIN 6/25/2004,21:55:36 WARNI
    00001510:NG: The Trojan horse TR/StartPage.IX! C:\DOCUMENTS AND SETTIN
    00001550:G

    ---------- WIN.TXT
    fùAppInit_DLLsÖæG¸ÿÿÿC

    ---------- NEWWIN.TXT
    fùAppInit_DLLsÖæG
    **File C:\FINDnFIX\NEWWIN.TXT
         !  €  !      #  À  #  ?          ?       $ ?    WfâbÊU[å;+ë      WfâbÊU[å;+ë   WfâbÊU[å;+ een Ðÿÿÿvk     ÀUDeviceNotSelectedTimeoutðÿÿÿ1 5  ð  Ø Ðÿÿÿvk  €'   zGDIProcessHandleQuota"þðÿÿÿ9 0 { x`{ àÿÿÿvk  €   °ºSpooler2ðÿÿÿy e s
    Ñ_åàÿÿÿvk  €   { swapdisk Ø  `  È Ðÿÿÿvk  P   utTransmissionRetryTimeoutÐÿÿÿvk  €'   S USERProcessHandleQuotab àÿÿÿØ  `  È ø H Øÿÿÿvk  €   fùAppInit_DLLsÖæG a6.
    **File C:\FINDnFIX\NEWWIN.TXT
    00001360: 01 00 00 00 01 00 66 F9 . 5F 44 4C 4C 73 D6 8D E6 ......fù _DLLsÖæ
    **File C:\FINDnFIX\NEWWIN.TXT
    Ñ_åàÿÿÿvk  €  { swapdisk Ø  `  È Ðÿÿÿvk  P   utTransmissionRetryTimeoutÐÿÿÿvk  €'   S USERProcessHandleQuotab àÿÿÿØ  `  È ø H Øÿÿÿvk  €   fùAppInit_DLLsÖæG a6.
     
  25. Pieter_Arntz

    Pieter_Arntz Spyware Veteran

    Joined:
    Apr 27, 2002
    Posts:
    13,491
    Location:
    Netherlands
    Re: Trojan Startpage-DU

    Looking good there. :cool:

    Last steps for the clean-up:

    -Open the FINDnFIX\Files2< Subfolder:
    Run the -> "ZIPZAP.bat" file.
    It will quickly clean the rest and
    will make a copy of the bad file(s) in the same
    folder (junkxxx.zip) and open your email client with instructions:
    close that. I think FAL has enough samples.

    When done, restart your computer and
    Delete the entire 'FINDnFIX' file+folder(s)
    From C:\, and be sure the C:\junkxxx folder
    was deleted (as part of the cleanup process)

    As for the remains, run any and all removal tools once again
    In particular: CWShredder and fully updated Ad-Aware!

    Feel free to post follow up hijackthis log when you are done.

    Regards,

    Pieter
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.