Tech Support banner

Status
Not open for further replies.
1 - 19 of 19 Posts

·
Registered
Joined
·
13 Posts
Discussion Starter #1 (Edited)
Hello everyone.

For the past couple of days ive been struggling with malware thats affected firefox since i made it my default browser. Since the popups progs I use and the checked option of no popups the browser will at any minute shrink to a smaller size and show an ad. ive used a ton of spyware killers but with no avail. I'll post my HJT and hope someone can help me get rid of it.

Logfile of HijackThis v1.99.1
Scan saved at 11:42:52 PM, on 10/25/2005
Platform: Windows XP SP2, v.2149 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2149)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Winamp\Winampa.exe
C:\Program Files\Adobe\Acrobat 7.0\Distillr\Acrotray.exe
C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Lavasoft\Ad-Aware SE Professional\Ad-Watch.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Documents and Settings\Rosean\Desktop\Unused Desktop Shortcuts\StatBar.exe
C:\Program Files\Panicware\Pop-Up Stopper Professional\PopUpStopperProfessional.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\WINDOWS\system32\fxssvc.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Azureus\Azureus.exe
C:\Program Files\Java\jre1.5.0_02\bin\javaw.exe
C:\WINDOWS\System32\svchost.exe
C:\Documents and Settings\Rosean\Desktop\HijackThis.exe
C:\Program Files\Real\RealPlayer\RealPlay.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\Messenger\msmsgs.exe

O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [WinampAgent] "C:\Program Files\Winamp\Winampa.exe"
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [BootSkin Startup Jobs] "C:\PROGRA~1\Stardock\WINCUS~1\BootSkin\BootSkin.exe" /StartupJobs
O4 - HKLM\..\Run: [Acrobat Assistant 7.0] "C:\Program Files\Adobe\Acrobat 7.0\Distillr\Acrotray.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
O4 - HKLM\..\Run: [AWMON] "C:\Program Files\Lavasoft\Ad-Aware SE Professional\Ad-Watch.exe"
O4 - HKLM\..\Run: [SSBkgdUpdate] C:\Program Files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe -Embedding -boot
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKCU\..\Run: [StatBar] C:\Documents and Settings\Rosean\Desktop\Unused Desktop Shortcuts\StatBar.exe
O4 - HKCU\..\Run: [PopUpStopperProfessional] "C:\Program Files\Panicware\Pop-Up Stopper Professional\PopUpStopperProfessional.exe"
O4 - HKCU\..\Run: [tunebite.exe] C:\Program Files\tunebite\tunebite.exe
O4 - Global Startup: Adobe Acrobat Speed Launcher.lnk = ?
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O8 - Extra context menu item: Convert link target to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert link target to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert selected links to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert selected links to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Convert selection to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert selection to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~4\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O20 - Winlogon Notify: Dynamic Directory - C:\WINDOWS\system32\hrjq0515e.dll
O20 - Winlogon Notify: RunServicesOnce - C:\WINDOWS\system32\m828lifu1828.dll
O23 - Service: Adobe LM Service - Unknown owner - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe
O23 - Service: Norton AntiVirus Auto-Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: Norton AntiVirus Firewall Monitor Service (NPFMntor) - Symantec Corporation - C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
 

·
TSF Security Team, Emeritus
Joined
·
26,363 Posts
Download, install & launch - Webroot SpySweeper (Trial) (8.3 MB)

When SpySweeper starts, please accept any prompts to update definitions. Exit the program after you have updated.

Reboot your computer into Safe Mode.
Restart your computer and continually tapping the F8 key until a menu appears.
Use your up arrow key to highlight Safe Mode then hit enter.

Launch SpySweeper & configure it as followed:
  • From the left pane, click Options
  • Select the Sweep Options tab & ensure the following are ticked:
    • Sweep Memory
    • Sweep Registry
    • Sweep Cookies
    • Sweep All Users accounts
    • Do Not Sweep System Restore Folder
    • Enable Direct Disk Sweeping
    • Sweep For Rootkits
  • After that's done, select Sweep from the left pane & click on the Start button
  • Allow Spysweeper to reboot your machine to remove the infected files.
After rebooting, launch SpySweeper & select Results from the left pane
Click the 'Session Log' tab & choose Save to File to create a log.

Post that in your next reply along with a new HJT log.

## IMPORTANT

# disconnect your computer from the internet before you begin scanning.
# close all unnecessary programs before starting
# do not use your computer as you scan.
 

·
Registered
Joined
·
13 Posts
Discussion Starter #3
Thx 4 the help,
Looks like Spy sweeper was the key in gettin rid of it. The browser window hasnt changed since. But taking no chances here's the Results HJT 1st.

Logfile of HijackThis v1.99.1
Scan saved at 9:56:14 AM, on 10/26/2005
Platform: Windows XP SP2, v.2149 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2149)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\WINDOWS\system32\fxssvc.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Winamp\Winampa.exe
C:\Program Files\Adobe\Acrobat 7.0\Distillr\Acrotray.exe
C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Lavasoft\Ad-Aware SE Professional\Ad-Watch.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\Documents and Settings\Rosean\Desktop\Unused Desktop Shortcuts\StatBar.exe
C:\Program Files\Panicware\Pop-Up Stopper Professional\PopUpStopperProfessional.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Documents and Settings\Rosean\Desktop\HijackThis.exe

O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [WinampAgent] "C:\Program Files\Winamp\Winampa.exe"
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [BootSkin Startup Jobs] "C:\PROGRA~1\Stardock\WINCUS~1\BootSkin\BootSkin.exe" /StartupJobs
O4 - HKLM\..\Run: [Acrobat Assistant 7.0] "C:\Program Files\Adobe\Acrobat 7.0\Distillr\Acrotray.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
O4 - HKLM\..\Run: [AWMON] "C:\Program Files\Lavasoft\Ad-Aware SE Professional\Ad-Watch.exe"
O4 - HKLM\..\Run: [SSBkgdUpdate] C:\Program Files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe -Embedding -boot
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe" /startintray
O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
O4 - HKCU\..\Run: [StatBar] C:\Documents and Settings\Rosean\Desktop\Unused Desktop Shortcuts\StatBar.exe
O4 - HKCU\..\Run: [PopUpStopperProfessional] "C:\Program Files\Panicware\Pop-Up Stopper Professional\PopUpStopperProfessional.exe"
O4 - HKCU\..\Run: [tunebite.exe] C:\Program Files\tunebite\tunebite.exe
O4 - Global Startup: Adobe Acrobat Speed Launcher.lnk = ?
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O8 - Extra context menu item: Convert link target to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert link target to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert selected links to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert selected links to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Convert selection to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert selection to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~4\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O20 - Winlogon Notify: Reliability - C:\WINDOWS\system32\lcrhelp.dll
O23 - Service: Adobe LM Service - Unknown owner - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe
O23 - Service: Norton AntiVirus Auto-Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: Norton AntiVirus Firewall Monitor Service (NPFMntor) - Symantec Corporation - C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Webroot Spy Sweeper Engine (svcWRSSSDK) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
 

·
Registered
Joined
·
13 Posts
Discussion Starter #4
This is the Spy Sweeper Results:

********
9:29 AM: | Start of Session, Wednesday, October 26, 2005 |
9:29 AM: Spy Sweeper started
9:29 AM: Sweep initiated using definitions version 561
9:30 AM: Starting Memory Sweep
9:30 AM: Found Adware: icannnews
9:30 AM: Detected running threat: C:\WINDOWS\system32\d80mlid1180.dll (ID = 83)
9:30 AM: Detected running threat: C:\WINDOWS\system32\oocache.dll (ID = 83)
9:31 AM: Memory Sweep Complete, Elapsed Time: 00:01:01
9:31 AM: Starting Registry Sweep
9:31 AM: Found Adware: quicklink search toolbar
9:31 AM: HKCR\qlink.qlfilter\ (3 subtraces) (ID = 890588)
9:31 AM: HKCR\qlink.qlfilter.1\ (3 subtraces) (ID = 890592)
9:31 AM: HKCR\qlink.qlhelper\ (3 subtraces) (ID = 890596)
9:31 AM: HKCR\qlink.qlhelper.1\ (3 subtraces) (ID = 890600)
9:31 AM: HKCR\clsid\{aa3c0ffe-758e-4c41-b1b9-2d711915a938}\ (8 subtraces) (ID = 890604)
9:31 AM: HKCR\clsid\{e225ab73-4d7e-45f7-9425-47d2f7c7a8ab}\ (10 subtraces) (ID = 890613)
9:31 AM: HKCR\typelib\{090712ed-1622-4227-94d3-f573a9c2577f}\ (9 subtraces) (ID = 890624)
9:31 AM: HKLM\software\classes\qlink.qlfilter\ (3 subtraces) (ID = 890661)
9:31 AM: HKLM\software\classes\qlink.qlfilter.1\ (3 subtraces) (ID = 890665)
9:31 AM: HKLM\software\classes\qlink.qlhelper\ (3 subtraces) (ID = 890669)
9:31 AM: HKLM\software\classes\qlink.qlhelper.1\ (3 subtraces) (ID = 890673)
9:31 AM: HKLM\software\classes\clsid\{aa3c0ffe-758e-4c41-b1b9-2d711915a938}\ (8 subtraces) (ID = 890677)
9:31 AM: HKLM\software\classes\clsid\{e225ab73-4d7e-45f7-9425-47d2f7c7a8ab}\ (10 subtraces) (ID = 890686)
9:31 AM: Found Adware: instant access
9:31 AM: HKLM\software\classes\clsid\{e225ab73-4d7e-45f7-9425-47d2f7c7a8ab}\progid\ (1 subtraces) (ID = 890691)
9:31 AM: HKLM\software\classes\typelib\{090712ed-1622-4227-94d3-f573a9c2577f}\ (9 subtraces) (ID = 890697)
9:31 AM: HKLM\software\microsoft\windows\currentversion\uninstall\quicklinks\ (2 subtraces) (ID = 909558)
9:31 AM: HKLM\software\microsoft\windows\currentversion\explorer\browser qlhelper objects\{aa3c0ffe-758e-4c41-b1b9-2d711915a938}\ (ID = 909564)
9:31 AM: Found Adware: targetsaver
9:31 AM: HKU\WRSS_Profile_S-1-5-21-448539723-1677128483-725345543-1006\software\tsl2\ (1 subtraces) (ID = 143616)
9:31 AM: Registry Sweep Complete, Elapsed Time:00:00:12
9:31 AM: Starting Cookie Sweep
9:31 AM: Cookie Sweep Complete, Elapsed Time: 00:00:00
9:31 AM: Starting File Sweep
9:32 AM: c:\program files\quicklinks (2 subtraces) (ID = -2147468660)
9:33 AM: Found Trojan Horse: trojan-downloader-nextern
9:33 AM: drin.exe (ID = 168231)
9:33 AM: qlutility.exe (ID = 168232)
9:33 AM: uninst.exe (ID = 73428)
9:33 AM: Found Adware: look2me
9:33 AM: icont.exe (ID = 65722)
9:35 AM: qllib.dll (ID = 168233)
9:37 AM: Found Adware: cydoor peer-to-peer dependency
9:37 AM: cd_clint.dll (ID = 57300)
9:37 AM: Found Adware: limeshop
9:37 AM: limeshop.html (ID = 65526)
9:43 AM: installer.exe (ID = 168558)
9:48 AM: File Sweep Complete, Elapsed Time: 00:16:58
9:48 AM: Full Sweep has completed. Elapsed time 00:18:22
9:48 AM: Traces Found: 113
9:49 AM: Removal process initiated
9:50 AM: Quarantining All Traces: look2me
9:50 AM: Quarantining All Traces: icannnews
9:50 AM: icannnews is in use. It will be removed on reboot.
9:50 AM: C:\WINDOWS\system32\d80mlid1180.dll is in use. It will be removed on reboot.
9:50 AM: C:\WINDOWS\system32\oocache.dll is in use. It will be removed on reboot.
9:50 AM: Quarantining All Traces: instant access
9:50 AM: Quarantining All Traces: limeshop
9:50 AM: Quarantining All Traces: quicklink search toolbar
9:50 AM: Quarantining All Traces: targetsaver
9:50 AM: Quarantining All Traces: trojan-downloader-nextern
9:50 AM: Removal process completed. Elapsed time 00:01:03
********
9:25 AM: | Start of Session, Wednesday, October 26, 2005 |
9:25 AM: Spy Sweeper started
9:25 AM: Sweep initiated using definitions version 561
9:25 AM: Starting Memory Sweep
9:26 AM: Found Adware: icannnews
9:26 AM: Detected running threat: C:\WINDOWS\system32\d80mlid1180.dll (ID = 83)
********
8:50 AM: | Start of Session, Wednesday, October 26, 2005 |
8:50 AM: Spy Sweeper started
8:50 AM: Sweep initiated using definitions version 561
8:50 AM: Starting Memory Sweep
8:50 AM: Found Adware: icannnews
8:50 AM: Detected running threat: C:\WINDOWS\system32\d80mlid1180.dll (ID = 83)
8:51 AM: Detected running threat: C:\WINDOWS\system32\mjcoree.dll (ID = 83)
8:51 AM: Memory Sweep Complete, Elapsed Time: 00:01:08
8:51 AM: Starting Registry Sweep
8:51 AM: Found Adware: quicklink search toolbar
8:51 AM: HKCR\qlink.qlfilter\ (3 subtraces) (ID = 890588)
8:51 AM: HKCR\qlink.qlfilter.1\ (3 subtraces) (ID = 890592)
8:51 AM: HKCR\qlink.qlhelper\ (3 subtraces) (ID = 890596)
8:51 AM: HKCR\qlink.qlhelper.1\ (3 subtraces) (ID = 890600)
8:51 AM: HKCR\clsid\{aa3c0ffe-758e-4c41-b1b9-2d711915a938}\ (8 subtraces) (ID = 890604)
8:51 AM: HKCR\clsid\{e225ab73-4d7e-45f7-9425-47d2f7c7a8ab}\ (10 subtraces) (ID = 890613)
8:51 AM: HKCR\typelib\{090712ed-1622-4227-94d3-f573a9c2577f}\ (9 subtraces) (ID = 890624)
8:51 AM: HKLM\software\classes\qlink.qlfilter\ (3 subtraces) (ID = 890661)
8:51 AM: HKLM\software\classes\qlink.qlfilter.1\ (3 subtraces) (ID = 890665)
8:51 AM: HKLM\software\classes\qlink.qlhelper\ (3 subtraces) (ID = 890669)
8:51 AM: HKLM\software\classes\qlink.qlhelper.1\ (3 subtraces) (ID = 890673)
8:51 AM: HKLM\software\classes\clsid\{aa3c0ffe-758e-4c41-b1b9-2d711915a938}\ (8 subtraces) (ID = 890677)
8:51 AM: HKLM\software\classes\clsid\{e225ab73-4d7e-45f7-9425-47d2f7c7a8ab}\ (10 subtraces) (ID = 890686)
8:51 AM: Found Adware: instant access
8:51 AM: HKLM\software\classes\clsid\{e225ab73-4d7e-45f7-9425-47d2f7c7a8ab}\progid\ (1 subtraces) (ID = 890691)
8:51 AM: HKLM\software\classes\typelib\{090712ed-1622-4227-94d3-f573a9c2577f}\ (9 subtraces) (ID = 890697)
8:51 AM: HKLM\software\microsoft\windows\currentversion\uninstall\quicklinks\ (2 subtraces) (ID = 909558)
8:51 AM: HKLM\software\microsoft\windows\currentversion\explorer\browser qlhelper objects\{aa3c0ffe-758e-4c41-b1b9-2d711915a938}\ (ID = 909564)
8:51 AM: Found Adware: targetsaver
8:51 AM: HKU\WRSS_Profile_S-1-5-21-448539723-1677128483-725345543-1006\software\tsl2\ (1 subtraces) (ID = 143616)
8:51 AM: Registry Sweep Complete, Elapsed Time:00:00:11
8:51 AM: Starting Cookie Sweep
8:51 AM: Cookie Sweep Complete, Elapsed Time: 00:00:00
8:51 AM: Starting File Sweep
8:53 AM: c:\program files\quicklinks (2 subtraces) (ID = -2147468660)
8:55 AM: Found Trojan Horse: trojan-downloader-nextern
8:55 AM: drin.exe (ID = 168231)
8:56 AM: qlutility.exe (ID = 168232)
8:56 AM: uninst.exe (ID = 73428)
8:56 AM: Found Adware: look2me
8:56 AM: icont.exe (ID = 65722)
8:58 AM: qllib.dll (ID = 168233)
9:01 AM: Found Adware: cydoor peer-to-peer dependency
9:01 AM: cd_clint.dll (ID = 57300)
9:02 AM: Found Adware: limeshop
9:02 AM: limeshop.html (ID = 65526)
9:11 AM: installer.exe (ID = 168558)
9:19 AM: Found System Monitor: potentially rootkit-masked files
9:19 AM: 06-red_hot_lover_tone-4_my_peeps_ft._the_notorious_b.i.g._m.o.p.organized_konfusion_buckwild_version-ftd.mp3 (ID = 0)
9:19 AM: File Sweep Complete, Elapsed Time: 00:28:00
9:19 AM: Full Sweep has completed. Elapsed time 00:29:28
9:19 AM: Traces Found: 114
9:25 AM: | End of Session, Wednesday, October 26, 2005 |
********
8:48 AM: | Start of Session, Wednesday, October 26, 2005 |
8:48 AM: Spy Sweeper started
 

·
TSF Security Team, Emeritus
Joined
·
26,363 Posts
This type of infection usually has a few of his buddies hanging around. Let's not take any chances..

Please do the following:

Download & immediately run - L2MFix.exe
Click "Install" to extract the contents to a newly created folder.

Close all other opened programs before running this tool

From within the newly created folder, locate & run L2mfix.bat
Select option #2 - Run Fix - by typing 2

Press any key to reboot your computer.
After the reboot, your Desktop and icons will appear, then disappear (this is normal). L2mfix will continue to scan your computer and when it's finished, you will be presented with a log. Save the contents of that log as I shall require you to post it in your next reply after completing the fix.

DO NOT RUN ANY OTHER FILES IN THE L2MFIX FOLDER UNLESS INSTRUCTED

If you receive an error - \system32\Autoexec.nt is not suitable for running MS-Dos applications, you will need to visit this website to download additional files.


* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *


Download and install CleanUp!

Open Cleanup! by double-clicking the icon on your desktop (or from the Start > All Programs menu).
Set the program up as follows:
Click "Options..."
Move the arrow down to "Custom CleanUp!"
Put a check next to the following (Make sure nothing else is checked!):
  • Empty Recycle Bins
  • Delete Cookies
  • Delete Prefetch files
  • Cleanup! All Users
Click OK
Press the CleanUp! button to start the program.

It may ask you to reboot at the end, click NO.


* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *


Then, perform an online scan with Internet Explorer with Panda ActiveScan
** click on "Free use ActiveScan" located on the top right hand corner
  1. Click Scan your PC & a 'pop up' window shall appear. *ensure that your pop up blocker doesn't block it
  2. Click Scan Now
  3. Enter your e-mail address & click Scan Now ...begins downloading 8 MB Panda's ActiveX controls
Begin the scan by selecting My Computer
  • If it finds any malware, it will offer you a report.
  • Click on see report. Then click Save report

Copy the results of the ActiveScan and paste them here along with a new HiJackThis log and the l2Mfix log
 

·
Registered
Joined
·
13 Posts
Discussion Starter #6
I appreciate the help so far. Ok here are my results so far with HJT 1st.

Logfile of HijackThis v1.99.1
Scan saved at 6:09:56 PM, on 10/26/2005
Platform: Windows XP SP2, v.2149 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2149)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Winamp\Winampa.exe
C:\Program Files\Adobe\Acrobat 7.0\Distillr\Acrotray.exe
C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Lavasoft\Ad-Aware SE Professional\Ad-Watch.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\Documents and Settings\Rosean\Desktop\Unused Desktop Shortcuts\StatBar.exe
C:\Program Files\Panicware\Pop-Up Stopper Professional\PopUpStopperProfessional.exe
C:\WINDOWS\system32\fxssvc.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Rosean\Desktop\HijackThis.exe

O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [WinampAgent] "C:\Program Files\Winamp\Winampa.exe"
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [BootSkin Startup Jobs] "C:\PROGRA~1\Stardock\WINCUS~1\BootSkin\BootSkin.exe" /StartupJobs
O4 - HKLM\..\Run: [Acrobat Assistant 7.0] "C:\Program Files\Adobe\Acrobat 7.0\Distillr\Acrotray.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
O4 - HKLM\..\Run: [AWMON] "C:\Program Files\Lavasoft\Ad-Aware SE Professional\Ad-Watch.exe"
O4 - HKLM\..\Run: [SSBkgdUpdate] C:\Program Files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe -Embedding -boot
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe" /startintray
O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
O4 - HKCU\..\Run: [StatBar] C:\Documents and Settings\Rosean\Desktop\Unused Desktop Shortcuts\StatBar.exe
O4 - HKCU\..\Run: [PopUpStopperProfessional] "C:\Program Files\Panicware\Pop-Up Stopper Professional\PopUpStopperProfessional.exe"
O4 - HKCU\..\Run: [tunebite.exe] C:\Program Files\tunebite\tunebite.exe
O4 - Global Startup: Adobe Acrobat Speed Launcher.lnk = ?
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O8 - Extra context menu item: Convert link target to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert link target to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert selected links to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert selected links to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Convert selection to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert selection to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~4\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O20 - Winlogon Notify: SharedDlls - C:\WINDOWS\system32\lcrhelp.dll
O23 - Service: Adobe LM Service - Unknown owner - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe
O23 - Service: Norton AntiVirus Auto-Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: Norton AntiVirus Firewall Monitor Service (NPFMntor) - Symantec Corporation - C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Webroot Spy Sweeper Engine (svcWRSSSDK) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
 

·
Registered
Joined
·
13 Posts
Discussion Starter #7
Heres the 2nd

L2MFIX find log 1.04a
These are the registry keys present
**********************************************************************************
Winlogon/notify:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Dynamic Directory]
"Asynchronous"=dword:00000000
"DllName"="C:\\WINDOWS\\system32\\hrjq0515e.dll"
"Impersonate"=dword:00000000
"Logon"="WinLogon"
"Logoff"="WinLogoff"
"Shutdown"="WinShutdown"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\RunServicesOnce]
"Asynchronous"=dword:00000000
"DllName"="C:\\WINDOWS\\system32\\m828lifu1828.dll"
"Impersonate"=dword:00000000
"Logon"="WinLogon"
"Logoff"="WinLogoff"
"Shutdown"="WinShutdown"


RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright (c) 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!

Access Control List for Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify:
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-NI) ALLOW Read BUILTIN\Users
(ID-IO) ALLOW Read BUILTIN\Users
(ID-NI) ALLOW Read BUILTIN\Power Users
(ID-IO) ALLOW Read BUILTIN\Power Users
(ID-NI) ALLOW Full access BUILTIN\Administrators
(ID-IO) ALLOW Full access BUILTIN\Administrators
(ID-NI) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access CREATOR OWNER


**********************************************************************************
useragent:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
"{B00CAD48-25F8-E350-F5C3-DDBB0A92C955}"=""

**********************************************************************************
Shell Extension key:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]
"{00022613-0000-0000-C000-000000000046}"="Multimedia File Property Sheet"
"{176d6597-26d3-11d1-b350-080036a75b03}"="ICM Scanner Management"
"{1F2E5C40-9550-11CE-99D2-00AA006E086C}"="NTFS Security Page"
"{3EA48300-8CF6-101B-84FB-666CCB9BCD32}"="OLE Docfile Property Page"
"{40dd6e20-7c17-11ce-a804-00aa003ca9f6}"="Shell extensions for sharing"
"{41E300E0-78B6-11ce-849B-444553540000}"="PlusPack CPL Extension"
"{42071712-76d4-11d1-8b24-00a0c9068ff3}"="Display Adapter CPL Extension"
"{42071713-76d4-11d1-8b24-00a0c9068ff3}"="Display Monitor CPL Extension"
"{42071714-76d4-11d1-8b24-00a0c9068ff3}"="Display Panning CPL Extension"
"{4E40F770-369C-11d0-8922-00A024AB2DBB}"="DS Security Page"
"{513D916F-2A8E-4F51-AEAB-0CBC76FB1AF8}"="Compatibility Page"
"{56117100-C0CD-101B-81E2-00AA004AE837}"="Shell Scrap DataHandler"
"{59099400-57FF-11CE-BD94-0020AF85B590}"="Disk Copy Extension"
"{59be4990-f85c-11ce-aff7-00aa003ca9f6}"="Shell extensions for Microsoft Windows Network objects"
"{5DB2625A-54DF-11D0-B6C4-0800091AA605}"="ICM Monitor Management"
"{675F097E-4C4D-11D0-B6C1-0800091AA605}"="ICM Printer Management"
"{764BF0E1-F219-11ce-972D-00AA00A14F56}"="Shell extensions for file compression"
"{77597368-7b15-11d0-a0c2-080036af3f03}"="Web Printer Shell Extension"
"{7988B573-EC89-11cf-9C00-00AA00A14F56}"="Disk Quota UI"
"{853FE2B1-B769-11d0-9C4E-00C04FB6C6FA}"="Encryption Context Menu"
"{85BBD920-42A0-1069-A2E4-08002B30309D}"="Briefcase"
"{88895560-9AA2-1069-930E-00AA0030EBC8}"="HyperTerminal Icon Ext"
"{BD84B380-8CA2-1069-AB1D-08000948F534}"="Fonts"
"{DBCE2480-C732-101B-BE72-BA78E9AD5B27}"="ICC Profile"
"{F37C5810-4D3F-11d0-B4BF-00AA00BBB723}"="Printers Security Page"
"{f81e9010-6ea4-11ce-a7ff-00aa003ca9f6}"="Shell extensions for sharing"
"{f92e8c40-3d33-11d2-b1aa-080036a75b03}"="Display TroubleShoot CPL Extension"
"{7444C717-39BF-11D1-8CD9-00C04FC29D45}"="Crypto PKO Extension"
"{7444C719-39BF-11D1-8CD9-00C04FC29D45}"="Crypto Sign Extension"
"{7007ACC7-3202-11D1-AAD2-00805FC1270E}"="Network Connections"
"{992CFFA0-F557-101A-88EC-00DD010CCC48}"="Network Connections"
"{E211B736-43FD-11D1-9EFB-0000F8757FCD}"="Scanners & Cameras"
"{FB0C9C8A-6C50-11D1-9F1D-0000F8757FCD}"="Scanners & Cameras"
"{905667aa-acd6-11d2-8080-00805f6596d2}"="Scanners & Cameras"
"{3F953603-1008-4f6e-A73A-04AAC7A992F1}"="Scanners & Cameras"
"{83bbcbf3-b28a-4919-a5aa-73027445d672}"="Scanners & Cameras"
"{F0152790-D56E-4445-850E-4F3117DB740C}"="Remote Sessions CPL Extension"
"{60254CA5-953B-11CF-8C96-00AA00B8708C}"="Shell extensions for Windows Script Host"
"{2206CDB2-19C1-11D1-89E0-00C04FD7A829}"="Microsoft Data Link"
"{DD2110F0-9EEF-11cf-8D8E-00AA0060F5BF}"="Tasks Folder Icon Handler"
"{797F1E90-9EDD-11cf-8D8E-00AA0060F5BF}"="Tasks Folder Shell Extension"
"{D6277990-4C6A-11CF-8D87-00AA0060F5BF}"="Scheduled Tasks"
"{2559a1f7-21d7-11d4-bdaf-00c04f60b9f0}"="Set Program Access and Defaults"
"{5F327514-6C5E-4d60-8F16-D07FA08A78ED}"="Auto Update Property Sheet Extension"
"{0DF44EAA-FF21-4412-828E-260A8728E7F1}"="Taskbar and Start Menu"
"{2559a1f0-21d7-11d4-bdaf-00c04f60b9f0}"="Search"
"{2559a1f1-21d7-11d4-bdaf-00c04f60b9f0}"="Help and Support"
"{2559a1f2-21d7-11d4-bdaf-00c04f60b9f0}"="Help and Support"
"{2559a1f3-21d7-11d4-bdaf-00c04f60b9f0}"="Run..."
"{2559a1f4-21d7-11d4-bdaf-00c04f60b9f0}"="Internet"
"{2559a1f5-21d7-11d4-bdaf-00c04f60b9f0}"="E-mail"
"{D20EA4E1-3957-11d2-A40B-0C5020524152}"="Fonts"
"{D20EA4E1-3957-11d2-A40B-0C5020524153}"="Administrative Tools"
"{596AB062-B4D2-4215-9F74-E9109B0A8153}"="Previous Versions Property Page"
"{9DB7A13C-F208-4981-8353-73CC61AE2783}"="Previous Versions"
"{875CB1A1-0F29-45de-A1AE-CFB4950D0B78}"="Audio Media Properties Handler"
"{40C3D757-D6E4-4b49-BB41-0E5BBEA28817}"="Video Media Properties Handler"
"{E4B29F9D-D390-480b-92FD-7DDB47101D71}"="Wav Properties Handler"
"{87D62D94-71B3-4b9a-9489-5FE6850DC73E}"="Avi Properties Handler"
"{A6FD9E45-6E44-43f9-8644-08598F5A74D9}"="Midi Properties Handler"
"{c5a40261-cd64-4ccf-84cb-c394da41d590}"="Video Thumbnail Extractor"
"{5E6AB780-7743-11CF-A12B-00AA004AE837}"="Microsoft Internet Toolbar"
"{22BF0C20-6DA7-11D0-B373-00A0C9034938}"="Download Status"
"{91EA3F8B-C99B-11d0-9815-00C04FD91972}"="Augmented Shell Folder"
"{6413BA2C-B461-11d1-A18A-080036B11A03}"="Augmented Shell Folder 2"
"{F61FFEC1-754F-11d0-80CA-00AA005B4383}"="BandProxy"
"{7BA4C742-9E81-11CF-99D3-00AA004AE837}"="Microsoft BrowserBand"
"{30D02401-6A81-11d0-8274-00C04FD5AE38}"="Search Band"
"{169A0691-8DF9-11d1-A1C4-00C04FD75D13}"="In-pane search"
"{07798131-AF23-11d1-9111-00A0C98BA67D}"="Web Search"
"{AF4F6510-F982-11d0-8595-00AA004CD6D8}"="Registry Tree Options Utility"
"{01E04581-4EEE-11d0-BFE9-00AA005B4383}"="&Address"
"{A08C11D2-A228-11d0-825B-00AA005B4383}"="Address EditBox"
"{00BB2763-6A77-11D0-A535-00C04FD7D062}"="Microsoft AutoComplete"
"{7376D660-C583-11d0-A3A5-00C04FD706EC}"="TridentImageExtractor"
"{6756A641-DE71-11d0-831B-00AA005B4383}"="MRU AutoComplete List"
"{6935DB93-21E8-4ccc-BEB9-9FE3C77A297A}"="Custom MRU AutoCompleted List"
"{7e653215-fa25-46bd-a339-34a2790f3cb7}"="Accessible"
"{acf35015-526e-4230-9596-becbe19f0ac9}"="Track Popup Bar"
"{00BB2764-6A77-11D0-A535-00C04FD7D062}"="Microsoft History AutoComplete List"
"{03C036F1-A186-11D0-824A-00AA005B4383}"="Microsoft Shell Folder AutoComplete List"
"{00BB2765-6A77-11D0-A535-00C04FD7D062}"="Microsoft Multiple AutoComplete List Container"
"{ECD4FC4E-521C-11D0-B792-00A0C90312E1}"="Shell Band Site Menu"
"{3CCF8A41-5C85-11d0-9796-00AA00B90ADF}"="Shell DeskBarApp"
"{ECD4FC4C-521C-11D0-B792-00A0C90312E1}"="Shell DeskBar"
"{ECD4FC4D-521C-11D0-B792-00A0C90312E1}"="Shell Rebar BandSite"
"{DD313E04-FEFF-11d1-8ECD-0000F87A470C}"="User Assist"
"{EF8AD2D1-AE36-11D1-B2D2-006097DF8C11}"="Global Folder Settings"
"{EFA24E61-B078-11d0-89E4-00C04FC9E26E}"="Favorites Band"
"{0A89A860-D7B1-11CE-8350-444553540000}"="Shell Automation Inproc Service"
"{E7E4BC40-E76A-11CE-A9BB-00AA004AE837}"="Shell DocObject Viewer"
"{A5E46E3A-8849-11D1-9D8C-00C04FC99D61}"="Microsoft Browser Architecture"
"{FBF23B40-E3F0-101B-8488-00AA003E56F8}"="InternetShortcut"
"{3C374A40-BAE4-11CF-BF7D-00AA006946EE}"="Microsoft Url History Service"
"{FF393560-C2A7-11CF-BFF4-444553540000}"="History"
"{7BD29E00-76C1-11CF-9DD0-00A0C9034933}"="Temporary Internet Files"
"{7BD29E01-76C1-11CF-9DD0-00A0C9034933}"="Temporary Internet Files"
"{CFBFAE00-17A6-11D0-99CB-00C04FD64497}"="Microsoft Url Search Hook"
"{A2B0DD40-CC59-11d0-A3A5-00C04FD706EC}"="IE4 Suite Splash Screen"
"{67EA19A0-CCEF-11d0-8024-00C04FD75D13}"="CDF Extension Copy Hook"
"{131A6951-7F78-11D0-A979-00C04FD705A2}"="ISFBand OC"
"{9461b922-3c5a-11d2-bf8b-00c04fb93661}"="Search Assistant OC"
"{3DC7A020-0ACD-11CF-A9BB-00AA004AE837}"="The Internet"
"{871C5380-42A0-1069-A2EA-08002B30309D}"="Internet Name Space"
"{EFA24E64-B078-11d0-89E4-00C04FC9E26E}"="Explorer Band"
"{9E56BE60-C50F-11CF-9A2C-00A0C90A90CE}"="Sendmail service"
"{9E56BE61-C50F-11CF-9A2C-00A0C90A90CE}"="Sendmail service"
"{88C6C381-2E85-11D0-94DE-444553540000}"="ActiveX Cache Folder"
"{E6FB5E20-DE35-11CF-9C87-00AA005127ED}"="WebCheck"
"{ABBE31D0-6DAE-11D0-BECA-00C04FD940BE}"="Subscription Mgr"
"{F5175861-2688-11d0-9C5E-00AA00A45957}"="Subscription Folder"
"{08165EA0-E946-11CF-9C87-00AA005127ED}"="WebCheckWebCrawler"
"{E3A8BDE6-ABCE-11d0-BC4B-00C04FD929DB}"="WebCheckChannelAgent"
"{E8BB6DC0-6B4E-11d0-92DB-00A0C90C2BD7}"="TrayAgent"
"{7D559C10-9FE9-11d0-93F7-00AA0059CE02}"="Code Download Agent"
"{E6CC6978-6B6E-11D0-BECA-00C04FD940BE}"="ConnectionAgent"
"{D8BD2030-6FC9-11D0-864F-00AA006809D9}"="PostAgent"
"{7FC0B86E-5FA7-11d1-BC7C-00C04FD929DB}"="WebCheck SyncMgr Handler"
"{352EC2B7-8B9A-11D1-B8AE-006008059382}"="Shell Application Manager"
"{0B124F8F-91F0-11D1-B8B5-006008059382}"="Installed Apps Enumerator"
"{CFCCC7A0-A282-11D1-9082-006008059382}"="Darwin App Publisher"
"{e84fda7c-1d6a-45f6-b725-cb260c236066}"="Shell Image Verbs"
"{66e4e4fb-f385-4dd0-8d74-a2efd1bc6178}"="Shell Image Data Factory"
"{00E7B358-F65B-4dcf-83DF-CD026B94BFD4}"="Autoplay for SlideShow"
"{3F30C968-480A-4C6C-862D-EFC0897BB84B}"="GDI+ file thumbnail extractor"
"{9DBD2C50-62AD-11d0-B806-00C04FD706EC}"="Summary Info Thumbnail handler (DOCFILES)"
"{EAB841A0-9550-11cf-8C16-00805F1408F3}"="HTML Thumbnail Extractor"
"{eb9b1153-3b57-4e68-959a-a3266bc3d7fe}"="Shell Image Property Handler"
"{CC6EEFFB-43F6-46c5-9619-51D571967F7D}"="Web Publishing Wizard"
"{add36aa8-751a-4579-a266-d66f5202ccbb}"="Print Ordering via the Web"
"{6b33163c-76a5-4b6c-bf21-45de9cd503a1}"="Shell Publishing Wizard Object"
"{58f1f272-9240-4f51-b6d4-fd63d1618591}"="Get a Passport Wizard"
"{7A9D77BD-5403-11d2-8785-2E0420524153}"="User Accounts"
"{BD472F60-27FA-11cf-B8B4-444553540000}"="Compressed (zipped) Folder Right Drag Handler"
"{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}"="Compressed (zipped) Folder SendTo Target"
"{f39a0dc0-9cc8-11d0-a599-00c04fd64433}"="Channel File"
"{f3aa0dc0-9cc8-11d0-a599-00c04fd64434}"="Channel Shortcut"
"{f3ba0dc0-9cc8-11d0-a599-00c04fd64435}"="Channel Handler Object"
"{f3da0dc0-9cc8-11d0-a599-00c04fd64437}"="Channel Menu"
"{f3ea0dc0-9cc8-11d0-a599-00c04fd64438}"="Channel Properties"
"{692F0339-CBAA-47e6-B5B5-3B84DB604E87}"="Extensions Manager Folder"
"{63da6ec0-2e98-11cf-8d82-444553540000}"="FTP Folders Webview"
"{883373C3-BF89-11D1-BE35-080036B11A03}"="Microsoft DocProp Shell Ext"
"{A9CF0EAE-901A-4739-A481-E35B73E47F6D}"="Microsoft DocProp Inplace Edit Box Control"
"{8EE97210-FD1F-4B19-91DA-67914005F020}"="Microsoft DocProp Inplace ML Edit Box Control"
"{0EEA25CC-4362-4A12-850B-86EE61B0D3EB}"="Microsoft DocProp Inplace Droplist Combo Control"
"{6A205B57-2567-4A2C-B881-F787FAB579A3}"="Microsoft DocProp Inplace Calendar Control"
"{28F8A4AC-BBB3-4D9B-B177-82BFC914FA33}"="Microsoft DocProp Inplace Time Control"
"{8A23E65E-31C2-11d0-891C-00A024AB2DBB}"="Directory Query UI"
"{9E51E0D0-6E0F-11d2-9601-00C04FA31A86}"="Shell properties for a DS object"
"{163FDC20-2ABC-11d0-88F0-00A024AB2DBB}"="Directory Object Find"
"{F020E586-5264-11d1-A532-0000F8757D7E}"="Directory Start/Search Find"
"{0D45D530-764B-11d0-A1CA-00AA00C16E65}"="Directory Property UI"
"{62AE1F9A-126A-11D0-A14B-0800361B1103}"="Directory Context Menu Verbs"
"{ECF03A33-103D-11d2-854D-006008059367}"="MyDocs Copy Hook"
"{ECF03A32-103D-11d2-854D-006008059367}"="MyDocs Drop Target"
"{4a7ded0a-ad25-11d0-98a8-0800361b1103}"="MyDocs Properties"
"{750fdf0e-2a26-11d1-a3ea-080036587f03}"="Offline Files Menu"
"{10CFC467-4392-11d2-8DB4-00C04FA31A66}"="Offline Files Folder Options"
"{AFDB1F70-2A4C-11d2-9039-00C04F8EEB3E}"="Offline Files Folder"
"{143A62C8-C33B-11D1-84FE-00C04FA34A14}"="Microsoft Agent Character Property Sheet Handler"
"{ECCDF543-45CC-11CE-B9BF-0080C87CDBA6}"="DfsShell"
"{60fd46de-f830-4894-a628-6fa81bc0190d}"="%DESC_PublishDropTarget%"
"{7A80E4A8-8005-11D2-BCF8-00C04F72C717}"="MMC Icon Handler"
"{0CD7A5C0-9F37-11CE-AE65-08002B2E1262}"=".CAB file viewer"
"{32714800-2E5F-11d0-8B85-00AA0044F941}"="For &People..."
"{8DD448E6-C188-4aed-AF92-44956194EB1F}"="Windows Media Player Play as Playlist Context Menu Handler"
"{CE3FB1D1-02AE-4a5f-A6E9-D9F1B4073E6C}"="Windows Media Player Burn Audio CD Context Menu Handler"
"{F1B9284F-E9DC-4e68-9D7E-42362A59F0FD}"="Windows Media Player Add to Playlist Context Menu Handler"
"{B41DB860-8EE4-11D2-9906-E49FADC173CA}"="WinRAR shell extension"
"{D25B2CAB-8A9A-4517-A9B2-CB5F68A5A802}"="Adobe.Acrobat.ContextMenu"
"{BDEADF00-C265-11D0-BCED-00A0C90AB50F}"="Web Folders"
"{00020D75-0000-0000-C000-000000000046}"="Microsoft Office Outlook Desktop Icon Handler"
"{0006F045-0000-0000-C000-000000000046}"="Microsoft Office Outlook Custom Icon Handler"
"{42042206-2D85-11D3-8CFF-005004838597}"="Microsoft Office HTML Icon Handler"
"{B9E1D2CB-CCFF-4AA6-9579-D7A4754030EF}"="iTunes"
"{FED7043D-346A-414D-ACD7-550D052499A7}"="dBpowerAMP Music Converter 1"
"{2C49B5D0-ACE7-4D17-9DF0-A254A6C5A0C5}"="dBpowerAMP Music Converter"
"{32020A01-506E-484D-A2A8-BE3CF17601C3}"="AlcoholShellEx"
"{F0CB00CD-5A07-4D91-97F5-A8C92CDA93E4}"="Shell Extensions for RealOne Player"
"{22061966-0307-0804-1705-200203000001}"="FontExpertShellExt Class"
"{330417E8-EF62-4047-82BE-D8305CEFF572}"="AMEncShlExt extension"
"{780BCB64-0CAF-473c-A9FC-E08C03D75515}"="Matroska Shell Extension, Properties Page CLSID"
"{78DC191E-EFC1-4532-9A71-224577A86A7D}"="Matroska Shell Extension, Thumbnail Handler CLSID"
"{794D04CA-70AC-4020-80EB-FFD59DEF8027}"="Matroska Shell Extension, Tooltip Provider CLSID"
"{789111D8-68A3-46a3-9663-145A3FF4C9C9}"="Matroska Shell Extension, ContextMenu CLSID"
"{781395AF-A127-469f-A06F-59B482AF4F3F}"="Matroska Shell Extension, Column Provider CLSID"
"{B8323370-FF27-11D2-97B6-204C4F4F5020}"="SmartFTP Shell Extension DLL"
"{11C1D741-A95B-11d2-8A80-0080ADB32FF4}"="FTP Surfer Shell Extension"
"{521E585B-EF76-45C7-80F0-D5588828B578}"=""
"{2A419EEB-ABC9-4703-B72A-32D76C3D5153}"=""

**********************************************************************************
HKEY ROOT CLASSIDS:
Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{521E585B-EF76-45C7-80F0-D5588828B578}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{521E585B-EF76-45C7-80F0-D5588828B578}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\CLSID\{521E585B-EF76-45C7-80F0-D5588828B578}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{521E585B-EF76-45C7-80F0-D5588828B578}\InprocServer32]
@="C:\\WINDOWS\\system32\\misystem.dll"
"ThreadingModel"="Apartment"

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{2A419EEB-ABC9-4703-B72A-32D76C3D5153}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{2A419EEB-ABC9-4703-B72A-32D76C3D5153}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\CLSID\{2A419EEB-ABC9-4703-B72A-32D76C3D5153}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{2A419EEB-ABC9-4703-B72A-32D76C3D5153}\InprocServer32]
@="C:\\WINDOWS\\system32\\mjhtmler.dll"
"ThreadingModel"="Apartment"

**********************************************************************************
Files Found are not all bad files:

C:\WINDOWS\SYSTEM32\
fx_wmv9.dll Mon Oct 24 2005 11:31:24p ..S.R 234,441 228.95 K
hrjq05~1.dll Tue Oct 25 2005 5:31:02p ..... 56 0.05 K
k6620g~1.dll Tue Oct 25 2005 11:30:08p ..S.R 234,481 228.98 K
kldhe.dll Mon Oct 24 2005 11:12:16p ..S.R 235,832 230.30 K
kzduzb.dll Tue Oct 25 2005 8:55:04a ..S.R 233,513 228.04 K
m828li~1.dll Tue Oct 25 2005 5:32:04p ..S.R 234,481 228.98 K
misystem.dll Tue Oct 25 2005 11:31:22p ..S.R 234,481 228.98 K
mjhtmler.dll Tue Oct 25 2005 9:42:12a ..S.R 233,513 228.04 K
mkc70.dll Mon Oct 24 2005 11:33:00p ..S.R 235,832 230.30 K
mzcbase.dll Tue Oct 25 2005 9:22:22a ..S.R 235,449 229.93 K
px.dll Mon Aug 29 2005 9:52:28p ..... 495,616 484.00 K
pxdrv.dll Mon Aug 29 2005 9:52:28p ..... 368,640 360.00 K
pxmas.dll Mon Aug 29 2005 9:52:28p ..... 155,648 152.00 K
pxwave.dll Mon Aug 29 2005 9:52:28p ..... 307,200 300.00 K
pxwma.dll Mon Aug 29 2005 9:52:28p ..... 86,016 84.00 K
qllib.dll Mon Oct 10 2005 5:33:56p A.... 200,704 196.00 K
ropwsx.dll Mon Oct 24 2005 11:34:56p ..S.R 237,285 231.72 K
s32evnt1.dll Thu Jul 28 2005 2:52:18p A.... 91,856 89.70 K
tyaffic.dll Tue Oct 25 2005 11:08:08p ..S.R 234,481 228.98 K
vxblock.dll Mon Aug 29 2005 9:52:28p ..... 28,672 28.00 K
wfspdmoe.dll Mon Oct 24 2005 11:36:30p ..S.R 235,832 230.30 K

21 items found: 21 files (12 H/S), 0 directories.
Total of file sizes: 4,554,029 bytes 4.34 M
Locate .tmp files:

No matches found.
**********************************************************************************
Directory Listing of system files:
Volume in drive C has no label.
Volume Serial Number is B86B-4A0A

Directory of C:\WINDOWS\System32

10/25/2005 11:31 PM 234,481 misystem.dll
10/25/2005 11:30 PM 234,481 k6620gjoe6oc0.dll
10/25/2005 11:08 PM 234,481 tyaffic.dll
10/25/2005 05:32 PM 234,481 m828lifu1828.dll
10/25/2005 09:42 AM 233,513 mjhtmler.dll
10/25/2005 09:22 AM 235,449 mzcbase.dll
10/25/2005 08:55 AM 233,513 kzduzb.dll
10/24/2005 11:36 PM 235,832 wfspdmoe.dll
10/24/2005 11:34 PM 237,285 ropwsx.dll
10/24/2005 11:32 PM 235,832 mkc70.dll
10/24/2005 11:31 PM 234,441 fx_wmv9.dll
10/24/2005 11:12 PM 235,832 kldhe.dll
10/23/2005 09:53 PM <DIR> dllcache
09/18/2005 12:33 PM 10,856 KGyGaAvL.sys
09/18/2005 12:33 PM 56 AF4A0F0C99.sys
02/27/2005 12:37 PM <DIR> Microsoft
14 File(s) 2,830,533 bytes
2 Dir(s) 12,923,752,448 bytes free
 

·
Registered
Joined
·
13 Posts
Discussion Starter #8
lastly my results from Panda:

Detected Disinfected
Virus 0 0
Spyware 0 0
Hacking Tools 0 0
Dialers 0 0
Security Risks 0 0
Suspicious files 0 0
 

·
TSF Security Team, Emeritus
Joined
·
26,363 Posts
You were supposed to run L2Mfix's option #2. The log you posted came from running Option #1.
You got re-infected again. :sayno:
We'll have to re-do our earlier steps.

Reboot your computer into Safe Mode.
Restart your computer and continually tapping the F8 key until a menu appears.
Use your up arrow key to highlight Safe Mode then hit enter.

Launch SpySweeper & configure it as followed:
  • From the left pane, click Options
  • Select the Sweep Options tab & ensure the following are ticked:
    • Sweep Memory
    • Sweep Registry
    • Sweep Cookies
    • Sweep All Users accounts
    • Do Not Sweep System Restore Folder
    • Enable Direct Disk Sweeping
    • Sweep For Rootkits
  • After that's done, select Sweep from the left pane & click on the Start button
  • Allow Spysweeper to reboot your machine to remove the infected files.
After rebooting, launch SpySweeper & select Results from the left pane
Click the 'Session Log' tab & choose Save to File to create a log.

Post that in your next reply along with a new HJT log.

## IMPORTANT

# disconnect your computer from the internet before you begin scanning.
# close all unnecessary programs before starting
# do not use your computer as you scan.
 

·
Registered
Joined
·
13 Posts
Discussion Starter #11
Logfile of HijackThis v1.99.1
Scan saved at 11:27:21 AM, on 10/27/2005
Platform: Windows XP SP2, v.2149 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2149)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\Program Files\Winamp\Winampa.exe
C:\Program Files\Adobe\Acrobat 7.0\Distillr\Acrotray.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Lavasoft\Ad-Aware SE Professional\Ad-Watch.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\Documents and Settings\Rosean\Desktop\Unused Desktop Shortcuts\StatBar.exe
C:\Program Files\Panicware\Pop-Up Stopper Professional\PopUpStopperProfessional.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\WINDOWS\system32\fxssvc.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Documents and Settings\Rosean\Desktop\HijackThis.exe
C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE

O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [WinampAgent] "C:\Program Files\Winamp\Winampa.exe"
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [BootSkin Startup Jobs] "C:\PROGRA~1\Stardock\WINCUS~1\BootSkin\BootSkin.exe" /StartupJobs
O4 - HKLM\..\Run: [Acrobat Assistant 7.0] "C:\Program Files\Adobe\Acrobat 7.0\Distillr\Acrotray.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
O4 - HKLM\..\Run: [AWMON] "C:\Program Files\Lavasoft\Ad-Aware SE Professional\Ad-Watch.exe"
O4 - HKLM\..\Run: [SSBkgdUpdate] C:\Program Files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe -Embedding -boot
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe" /startintray
O4 - HKCU\..\Run: [StatBar] C:\Documents and Settings\Rosean\Desktop\Unused Desktop Shortcuts\StatBar.exe
O4 - HKCU\..\Run: [PopUpStopperProfessional] "C:\Program Files\Panicware\Pop-Up Stopper Professional\PopUpStopperProfessional.exe"
O4 - HKCU\..\Run: [tunebite.exe] C:\Program Files\tunebite\tunebite.exe
O4 - Global Startup: Adobe Acrobat Speed Launcher.lnk = ?
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O8 - Extra context menu item: Convert link target to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert link target to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert selected links to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert selected links to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Convert selection to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert selection to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~4\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O23 - Service: Adobe LM Service - Unknown owner - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe
O23 - Service: Norton AntiVirus Auto-Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: Norton AntiVirus Firewall Monitor Service (NPFMntor) - Symantec Corporation - C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Webroot Spy Sweeper Engine (svcWRSSSDK) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
 

·
Registered
Joined
·
13 Posts
Discussion Starter #12
Spy Sweeper log


********
10:28 AM: | Start of Session, Thursday, October 27, 2005 |
10:28 AM: Spy Sweeper started
10:28 AM: Sweep initiated using definitions version 561
10:28 AM: Starting Memory Sweep
10:28 AM: Found Adware: icannnews
10:28 AM: Detected running threat: C:\WINDOWS\system32\l4j80e1ueh.dll (ID = 83)
10:29 AM: Detected running threat: C:\WINDOWS\system32\kfdusx.dll (ID = 83)
10:29 AM: Memory Sweep Complete, Elapsed Time: 00:01:01
10:29 AM: Starting Registry Sweep
10:29 AM: Registry Sweep Complete, Elapsed Time:00:00:11
10:29 AM: Starting Cookie Sweep
10:29 AM: Cookie Sweep Complete, Elapsed Time: 00:00:00
10:29 AM: Starting File Sweep
10:40 AM: Found Adware: cydoor peer-to-peer dependency
10:40 AM: cd_clint.dll (ID = 57300)
11:04 AM: Found System Monitor: potentially rootkit-masked files
11:04 AM: 06-red_hot_lover_tone-4_my_peeps_ft._the_notorious_b.i.g._m.o.p.organized_konfusion_buckwild_version-ftd.mp3 (ID = 0)
11:04 AM: File Sweep Complete, Elapsed Time: 00:34:37
11:04 AM: Full Sweep has completed. Elapsed time 00:35:57
11:04 AM: Traces Found: 4
11:05 AM: Removal process initiated
11:05 AM: Quarantining All Traces: cydoor peer-to-peer dependency
11:05 AM: Quarantining All Traces: icannnews
11:05 AM: icannnews is in use. It will be removed on reboot.
11:05 AM: C:\WINDOWS\system32\l4j80e1ueh.dll is in use. It will be removed on reboot.
11:05 AM: C:\WINDOWS\system32\kfdusx.dll is in use. It will be removed on reboot.
11:05 AM: Preparing to restart your computer. Please wait...
11:05 AM: Removal process completed. Elapsed time 00:00:56
********
9:29 AM: | Start of Session, Wednesday, October 26, 2005 |
9:29 AM: Spy Sweeper started
9:29 AM: Sweep initiated using definitions version 561
9:30 AM: Starting Memory Sweep
9:30 AM: Found Adware: icannnews
9:30 AM: Detected running threat: C:\WINDOWS\system32\d80mlid1180.dll (ID = 83)
9:30 AM: Detected running threat: C:\WINDOWS\system32\oocache.dll (ID = 83)
9:31 AM: Memory Sweep Complete, Elapsed Time: 00:01:01
9:31 AM: Starting Registry Sweep
9:31 AM: Found Adware: quicklink search toolbar
9:31 AM: HKCR\qlink.qlfilter\ (3 subtraces) (ID = 890588)
9:31 AM: HKCR\qlink.qlfilter.1\ (3 subtraces) (ID = 890592)
9:31 AM: HKCR\qlink.qlhelper\ (3 subtraces) (ID = 890596)
9:31 AM: HKCR\qlink.qlhelper.1\ (3 subtraces) (ID = 890600)
9:31 AM: HKCR\clsid\{aa3c0ffe-758e-4c41-b1b9-2d711915a938}\ (8 subtraces) (ID = 890604)
9:31 AM: HKCR\clsid\{e225ab73-4d7e-45f7-9425-47d2f7c7a8ab}\ (10 subtraces) (ID = 890613)
9:31 AM: HKCR\typelib\{090712ed-1622-4227-94d3-f573a9c2577f}\ (9 subtraces) (ID = 890624)
9:31 AM: HKLM\software\classes\qlink.qlfilter\ (3 subtraces) (ID = 890661)
9:31 AM: HKLM\software\classes\qlink.qlfilter.1\ (3 subtraces) (ID = 890665)
9:31 AM: HKLM\software\classes\qlink.qlhelper\ (3 subtraces) (ID = 890669)
9:31 AM: HKLM\software\classes\qlink.qlhelper.1\ (3 subtraces) (ID = 890673)
9:31 AM: HKLM\software\classes\clsid\{aa3c0ffe-758e-4c41-b1b9-2d711915a938}\ (8 subtraces) (ID = 890677)
9:31 AM: HKLM\software\classes\clsid\{e225ab73-4d7e-45f7-9425-47d2f7c7a8ab}\ (10 subtraces) (ID = 890686)
9:31 AM: Found Adware: instant access
9:31 AM: HKLM\software\classes\clsid\{e225ab73-4d7e-45f7-9425-47d2f7c7a8ab}\progid\ (1 subtraces) (ID = 890691)
9:31 AM: HKLM\software\classes\typelib\{090712ed-1622-4227-94d3-f573a9c2577f}\ (9 subtraces) (ID = 890697)
9:31 AM: HKLM\software\microsoft\windows\currentversion\uninstall\quicklinks\ (2 subtraces) (ID = 909558)
9:31 AM: HKLM\software\microsoft\windows\currentversion\explorer\browser qlhelper objects\{aa3c0ffe-758e-4c41-b1b9-2d711915a938}\ (ID = 909564)
9:31 AM: Found Adware: targetsaver
9:31 AM: HKU\WRSS_Profile_S-1-5-21-448539723-1677128483-725345543-1006\software\tsl2\ (1 subtraces) (ID = 143616)
9:31 AM: Registry Sweep Complete, Elapsed Time:00:00:12
9:31 AM: Starting Cookie Sweep
9:31 AM: Cookie Sweep Complete, Elapsed Time: 00:00:00
9:31 AM: Starting File Sweep
9:32 AM: c:\program files\quicklinks (2 subtraces) (ID = -2147468660)
9:33 AM: Found Trojan Horse: trojan-downloader-nextern
9:33 AM: drin.exe (ID = 168231)
9:33 AM: qlutility.exe (ID = 168232)
9:33 AM: uninst.exe (ID = 73428)
9:33 AM: Found Adware: look2me
9:33 AM: icont.exe (ID = 65722)
9:35 AM: qllib.dll (ID = 168233)
9:37 AM: Found Adware: cydoor peer-to-peer dependency
9:37 AM: cd_clint.dll (ID = 57300)
9:37 AM: Found Adware: limeshop
9:37 AM: limeshop.html (ID = 65526)
9:43 AM: installer.exe (ID = 168558)
9:48 AM: File Sweep Complete, Elapsed Time: 00:16:58
9:48 AM: Full Sweep has completed. Elapsed time 00:18:22
9:48 AM: Traces Found: 113
9:49 AM: Removal process initiated
9:50 AM: Quarantining All Traces: look2me
9:50 AM: Quarantining All Traces: icannnews
9:50 AM: icannnews is in use. It will be removed on reboot.
9:50 AM: C:\WINDOWS\system32\d80mlid1180.dll is in use. It will be removed on reboot.
9:50 AM: C:\WINDOWS\system32\oocache.dll is in use. It will be removed on reboot.
9:50 AM: Quarantining All Traces: instant access
9:50 AM: Quarantining All Traces: limeshop
9:50 AM: Quarantining All Traces: quicklink search toolbar
9:50 AM: Quarantining All Traces: targetsaver
9:50 AM: Quarantining All Traces: trojan-downloader-nextern
9:50 AM: Removal process completed. Elapsed time 00:01:03
********
9:25 AM: | Start of Session, Wednesday, October 26, 2005 |
9:25 AM: Spy Sweeper started
9:25 AM: Sweep initiated using definitions version 561
9:25 AM: Starting Memory Sweep
9:26 AM: Found Adware: icannnews
9:26 AM: Detected running threat: C:\WINDOWS\system32\d80mlid1180.dll (ID = 83)
********
8:50 AM: | Start of Session, Wednesday, October 26, 2005 |
8:50 AM: Spy Sweeper started
8:50 AM: Sweep initiated using definitions version 561
8:50 AM: Starting Memory Sweep
8:50 AM: Found Adware: icannnews
8:50 AM: Detected running threat: C:\WINDOWS\system32\d80mlid1180.dll (ID = 83)
8:51 AM: Detected running threat: C:\WINDOWS\system32\mjcoree.dll (ID = 83)
8:51 AM: Memory Sweep Complete, Elapsed Time: 00:01:08
8:51 AM: Starting Registry Sweep
8:51 AM: Found Adware: quicklink search toolbar
8:51 AM: HKCR\qlink.qlfilter\ (3 subtraces) (ID = 890588)
8:51 AM: HKCR\qlink.qlfilter.1\ (3 subtraces) (ID = 890592)
8:51 AM: HKCR\qlink.qlhelper\ (3 subtraces) (ID = 890596)
8:51 AM: HKCR\qlink.qlhelper.1\ (3 subtraces) (ID = 890600)
8:51 AM: HKCR\clsid\{aa3c0ffe-758e-4c41-b1b9-2d711915a938}\ (8 subtraces) (ID = 890604)
8:51 AM: HKCR\clsid\{e225ab73-4d7e-45f7-9425-47d2f7c7a8ab}\ (10 subtraces) (ID = 890613)
8:51 AM: HKCR\typelib\{090712ed-1622-4227-94d3-f573a9c2577f}\ (9 subtraces) (ID = 890624)
8:51 AM: HKLM\software\classes\qlink.qlfilter\ (3 subtraces) (ID = 890661)
8:51 AM: HKLM\software\classes\qlink.qlfilter.1\ (3 subtraces) (ID = 890665)
8:51 AM: HKLM\software\classes\qlink.qlhelper\ (3 subtraces) (ID = 890669)
8:51 AM: HKLM\software\classes\qlink.qlhelper.1\ (3 subtraces) (ID = 890673)
8:51 AM: HKLM\software\classes\clsid\{aa3c0ffe-758e-4c41-b1b9-2d711915a938}\ (8 subtraces) (ID = 890677)
8:51 AM: HKLM\software\classes\clsid\{e225ab73-4d7e-45f7-9425-47d2f7c7a8ab}\ (10 subtraces) (ID = 890686)
8:51 AM: Found Adware: instant access
8:51 AM: HKLM\software\classes\clsid\{e225ab73-4d7e-45f7-9425-47d2f7c7a8ab}\progid\ (1 subtraces) (ID = 890691)
8:51 AM: HKLM\software\classes\typelib\{090712ed-1622-4227-94d3-f573a9c2577f}\ (9 subtraces) (ID = 890697)
8:51 AM: HKLM\software\microsoft\windows\currentversion\uninstall\quicklinks\ (2 subtraces) (ID = 909558)
8:51 AM: HKLM\software\microsoft\windows\currentversion\explorer\browser qlhelper objects\{aa3c0ffe-758e-4c41-b1b9-2d711915a938}\ (ID = 909564)
8:51 AM: Found Adware: targetsaver
8:51 AM: HKU\WRSS_Profile_S-1-5-21-448539723-1677128483-725345543-1006\software\tsl2\ (1 subtraces) (ID = 143616)
8:51 AM: Registry Sweep Complete, Elapsed Time:00:00:11
8:51 AM: Starting Cookie Sweep
8:51 AM: Cookie Sweep Complete, Elapsed Time: 00:00:00
8:51 AM: Starting File Sweep
8:53 AM: c:\program files\quicklinks (2 subtraces) (ID = -2147468660)
8:55 AM: Found Trojan Horse: trojan-downloader-nextern
8:55 AM: drin.exe (ID = 168231)
8:56 AM: qlutility.exe (ID = 168232)
8:56 AM: uninst.exe (ID = 73428)
8:56 AM: Found Adware: look2me
8:56 AM: icont.exe (ID = 65722)
8:58 AM: qllib.dll (ID = 168233)
9:01 AM: Found Adware: cydoor peer-to-peer dependency
9:01 AM: cd_clint.dll (ID = 57300)
9:02 AM: Found Adware: limeshop
9:02 AM: limeshop.html (ID = 65526)
9:11 AM: installer.exe (ID = 168558)
9:19 AM: Found System Monitor: potentially rootkit-masked files
9:19 AM: 06-red_hot_lover_tone-4_my_peeps_ft._the_notorious_b.i.g._m.o.p.organized_konfusion_buckwild_version-ftd.mp3 (ID = 0)
9:19 AM: File Sweep Complete, Elapsed Time: 00:28:00
9:19 AM: Full Sweep has completed. Elapsed time 00:29:28
9:19 AM: Traces Found: 114
9:25 AM: | End of Session, Wednesday, October 26, 2005 |
********
8:48 AM: | Start of Session, Wednesday, October 26, 2005 |
8:48 AM: Spy Sweeper started
 

·
TSF Security Team, Emeritus
Joined
·
26,363 Posts
Let's proceed with stage 2

Close all open programs
Double click L2mfix.bat
Select option #2 - Run Fix - by typing 2
Press any key to reboot your computer.
After a reboot, your desktop and icons will appear, then disappear (this is normal). L2mfix will continue to scan your computer and when it's finished, you will be presented with a log. Copy the contents of that log and paste it here, along with a new HJT log.

DO NOT RUN ANY OTHER FILES IN THE L2MFIX FOLDER UNLESS INSTRUCTED


* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *


Open Cleanup! by double-clicking the icon on your desktop (or from the Start > All Programs menu).
Set the program up as follows:
Click "Options..."
Move the arrow down to "Custom CleanUp!"
Put a check next to the following (Make sure nothing else is checked!):
  • Empty Recycle Bins
  • Delete Cookies
  • Delete Prefetch files
  • Cleanup! All Users
Click OK
Press the CleanUp! button to start the program.

It may ask you to reboot at the end, click NO.


* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *


Perform an online scan with Internet Explorer with Kaspersky WebScanner

Next Click on Launch Kaspersky Anti-Virus Web Scanner

You will be prompted to install an ActiveX component from Kaspersky, Click Yes.
  • The program will launch and then begin downloading the latest definition files:
  • Once the files have been downloaded click on NEXT
  • Now click on Scan Settings
    • In the scan settings make that the following are selected:
      • Scan using the following Anti-Virus database:
        • Standard
      • Scan Options:
        • Scan Archives
        • Scan Mail Bases
  • Click OK
  • Now under select a target to scan:Select My Computer
  • This will program will start and scan your system.
  • The scan will take a while so be patient and let it run.
  • Once the scan is complete it will display if your system has been infected.
    • Now click on the Save as Text button:
  • Save the file to your desktop.

* Turn off the real time scanner of any existing antivirus program while performing the online scan


Copy the results of the Online Scan and paste them here along with a new HiJackThis log and the l2Mfix log
 

·
Registered
Joined
·
13 Posts
Discussion Starter #14
iight here's the logs HTJ 1st:

Logfile of HijackThis v1.99.1
Scan saved at 10:11:09 PM, on 10/27/2005
Platform: Windows XP SP2, v.2149 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2149)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Winamp\Winampa.exe
C:\Program Files\Adobe\Acrobat 7.0\Distillr\Acrotray.exe
C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Lavasoft\Ad-Aware SE Professional\Ad-Watch.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\Documents and Settings\Rosean\Desktop\Unused Desktop Shortcuts\StatBar.exe
C:\Program Files\Panicware\Pop-Up Stopper Professional\PopUpStopperProfessional.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\WINDOWS\system32\fxssvc.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Yahoo!\Messenger\YPager.exe
C:\Program Files\Azureus\Azureus.exe
C:\Program Files\Java\jre1.5.0_02\bin\javaw.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Documents and Settings\Rosean\Desktop\HijackThis.exe

O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [WinampAgent] "C:\Program Files\Winamp\Winampa.exe"
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [BootSkin Startup Jobs] "C:\PROGRA~1\Stardock\WINCUS~1\BootSkin\BootSkin.exe" /StartupJobs
O4 - HKLM\..\Run: [Acrobat Assistant 7.0] "C:\Program Files\Adobe\Acrobat 7.0\Distillr\Acrotray.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
O4 - HKLM\..\Run: [AWMON] "C:\Program Files\Lavasoft\Ad-Aware SE Professional\Ad-Watch.exe"
O4 - HKLM\..\Run: [SSBkgdUpdate] C:\Program Files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe -Embedding -boot
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe" /startintray
O4 - HKCU\..\Run: [StatBar] C:\Documents and Settings\Rosean\Desktop\Unused Desktop Shortcuts\StatBar.exe
O4 - HKCU\..\Run: [PopUpStopperProfessional] "C:\Program Files\Panicware\Pop-Up Stopper Professional\PopUpStopperProfessional.exe"
O4 - HKCU\..\Run: [tunebite.exe] C:\Program Files\tunebite\tunebite.exe
O4 - Global Startup: Adobe Acrobat Speed Launcher.lnk = ?
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O8 - Extra context menu item: Convert link target to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert link target to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert selected links to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert selected links to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Convert selection to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert selection to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert to Adobe PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert to existing PDF - res://C:\Program Files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~4\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/downloads/kws/kavwebscan_unicode.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O23 - Service: Adobe LM Service - Unknown owner - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe
O23 - Service: Norton AntiVirus Auto-Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: Norton AntiVirus Firewall Monitor Service (NPFMntor) - Symantec Corporation - C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Webroot Spy Sweeper Engine (svcWRSSSDK) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
 

·
Registered
Joined
·
13 Posts
Discussion Starter #15
Heres the l2mfix log

Setting Directory
C:\
C:\
System Rebooted!

Running From:
C:\

killing explorer and rundll32.exe

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright(C) 2002-2003 [email protected]
Killing PID 828 'explorer.exe'

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright(C) 2002-2003 [email protected]
Killing PID 844 'rundll32.exe'

Scanning First Pass. Please Wait!

First Pass Completed

Second Pass Scanning

Second pass Completed!
Backing Up: C:\WINDOWS\system32\curtmgr.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\d4j00e1meh.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\fx_wmv9.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\hp4023hmg.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\hrp2057oe.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\kldhe.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\kzduzb.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mjcoree.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mjhtmler.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mkc70.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mzcbase.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\p8r40i9qe8.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\ropwsx.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\uaer32.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\wfspdmoe.dll
1 file(s) copied.
deleting: C:\WINDOWS\system32\curtmgr.dll
Successfully Deleted: C:\WINDOWS\system32\curtmgr.dll
deleting: C:\WINDOWS\system32\d4j00e1meh.dll
Successfully Deleted: C:\WINDOWS\system32\d4j00e1meh.dll
deleting: C:\WINDOWS\system32\fx_wmv9.dll
Successfully Deleted: C:\WINDOWS\system32\fx_wmv9.dll
deleting: C:\WINDOWS\system32\hp4023hmg.dll
Successfully Deleted: C:\WINDOWS\system32\hp4023hmg.dll
deleting: C:\WINDOWS\system32\hrp2057oe.dll
Successfully Deleted: C:\WINDOWS\system32\hrp2057oe.dll
deleting: C:\WINDOWS\system32\kldhe.dll
Successfully Deleted: C:\WINDOWS\system32\kldhe.dll
deleting: C:\WINDOWS\system32\kzduzb.dll
Successfully Deleted: C:\WINDOWS\system32\kzduzb.dll
deleting: C:\WINDOWS\system32\mjcoree.dll
Successfully Deleted: C:\WINDOWS\system32\mjcoree.dll
deleting: C:\WINDOWS\system32\mjhtmler.dll
Successfully Deleted: C:\WINDOWS\system32\mjhtmler.dll
deleting: C:\WINDOWS\system32\mkc70.dll
Successfully Deleted: C:\WINDOWS\system32\mkc70.dll
deleting: C:\WINDOWS\system32\mzcbase.dll
Successfully Deleted: C:\WINDOWS\system32\mzcbase.dll
deleting: C:\WINDOWS\system32\p8r40i9qe8.dll
Successfully Deleted: C:\WINDOWS\system32\p8r40i9qe8.dll
deleting: C:\WINDOWS\system32\ropwsx.dll
Successfully Deleted: C:\WINDOWS\system32\ropwsx.dll
deleting: C:\WINDOWS\system32\uaer32.dll
Successfully Deleted: C:\WINDOWS\system32\uaer32.dll
deleting: C:\WINDOWS\system32\wfspdmoe.dll
Successfully Deleted: C:\WINDOWS\system32\wfspdmoe.dll


Zipping up files for submission:
adding: curtmgr.dll (188 bytes security) (deflated 5%)
adding: d4j00e1meh.dll (188 bytes security) (deflated 5%)
adding: fx_wmv9.dll (188 bytes security) (deflated 4%)
adding: hp4023hmg.dll (188 bytes security) (deflated 6%)
adding: hrp2057oe.dll (188 bytes security) (deflated 5%)
adding: kldhe.dll (188 bytes security) (deflated 5%)
adding: kzduzb.dll (188 bytes security) (deflated 4%)
adding: mjcoree.dll (188 bytes security) (deflated 5%)
adding: mjhtmler.dll (188 bytes security) (deflated 4%)
adding: mkc70.dll (188 bytes security) (deflated 5%)
adding: mzcbase.dll (188 bytes security) (deflated 5%)
adding: p8r40i9qe8.dll (188 bytes security) (deflated 5%)
adding: ropwsx.dll (188 bytes security) (deflated 6%)
adding: uaer32.dll (188 bytes security) (deflated 5%)
adding: wfspdmoe.dll (188 bytes security) (deflated 5%)
adding: clear.reg (188 bytes security) (deflated 51%)
adding: avi_log.txt (188 bytes security) (deflated 93%)
adding: BurnerLog.txt (188 bytes security) (deflated 45%)
adding: dvdlog.txt (212 bytes security) (deflated 62%)
adding: graph.txt (188 bytes security) (deflated 70%)
adding: lo2.txt (188 bytes security) (deflated 82%)
adding: test.txt (188 bytes security) (deflated 76%)
adding: test2.txt (188 bytes security) (deflated 32%)
adding: test3.txt (188 bytes security) (deflated 32%)
adding: test5.txt (188 bytes security) (deflated 32%)
adding: xfind.txt (188 bytes security) (deflated 70%)
adding: XingDebug.txt (188 bytes security) (deflated 68%)
adding: ZinioInstall.txt (188 bytes security) (deflated 87%)

Restoring Registry Permissions:


RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright (c) 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!


Revoking access for predefined group "Administrators"
Inherited ACE can not be revoked here!
Inherited ACE can not be revoked here!


Registry permissions set too:

RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright (c) 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!

Access Control List for Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify:
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-NI) ALLOW Read BUILTIN\Users
(ID-IO) ALLOW Read BUILTIN\Users
(ID-NI) ALLOW Read BUILTIN\Power Users
(ID-IO) ALLOW Read BUILTIN\Power Users
(ID-NI) ALLOW Full access BUILTIN\Administrators
(ID-IO) ALLOW Full access BUILTIN\Administrators
(ID-NI) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access CREATOR OWNER


Restoring Sedebugprivilege:

Granting SeDebugPrivilege to Administrators ... successful

Restoring Windows Update Certificates.:

deleting local copy: curtmgr.dll
deleting local copy: d4j00e1meh.dll
deleting local copy: fx_wmv9.dll
deleting local copy: hp4023hmg.dll
deleting local copy: hrp2057oe.dll
deleting local copy: kldhe.dll
deleting local copy: kzduzb.dll
deleting local copy: mjcoree.dll
deleting local copy: mjhtmler.dll
deleting local copy: mkc70.dll
deleting local copy: mzcbase.dll
deleting local copy: p8r40i9qe8.dll
deleting local copy: ropwsx.dll
deleting local copy: uaer32.dll
deleting local copy: wfspdmoe.dll

The following Is the Current Export of the Winlogon notify key:
****************************************************************************
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt32chain]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,33,00,32,00,2e,00,64,00,6c,00,\
6c,00,00,00
"Logoff"="ChainWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cryptnet]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,6e,00,65,00,74,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Logoff"="CryptnetWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cscdll]
"DLLName"="cscdll.dll"
"Logon"="WinlogonLogonEvent"
"Logoff"="WinlogonLogoffEvent"
"ScreenSaver"="WinlogonScreenSaverEvent"
"Startup"="WinlogonStartupEvent"
"Shutdown"="WinlogonShutdownEvent"
"StartShell"="WinlogonStartShellEvent"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ScCertProp]
"DLLName"="wlnotify.dll"
"Logon"="SCardStartCertProp"
"Logoff"="SCardStopCertProp"
"Lock"="SCardSuspendCertProp"
"Unlock"="SCardResumeCertProp"
"Enabled"=dword:00000001
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Schedule]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"StartShell"="SchedStartShell"
"Logoff"="SchedEventLogOff"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\sclgntfy]
"Logoff"="WLEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001
"DllName"=hex(2):73,00,63,00,6c,00,67,00,6e,00,74,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SensLogn]
"DLLName"="WlNotify.dll"
"Lock"="SensLockEvent"
"Logon"="SensLogonEvent"
"Logoff"="SensLogoffEvent"
"Safe"=dword:00000001
"MaxWait"=dword:00000258
"StartScreenSaver"="SensStartScreenSaverEvent"
"StopScreenSaver"="SensStopScreenSaverEvent"
"Startup"="SensStartupEvent"
"Shutdown"="SensShutdownEvent"
"StartShell"="SensStartShellEvent"
"PostShell"="SensPostShellEvent"
"Disconnect"="SensDisconnectEvent"
"Reconnect"="SensReconnectEvent"
"Unlock"="SensUnlockEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\termsrv]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"Logoff"="TSEventLogoff"
"Logon"="TSEventLogon"
"PostShell"="TSEventPostShell"
"Shutdown"="TSEventShutdown"
"StartShell"="TSEventStartShell"
"Startup"="TSEventStartup"
"MaxWait"=dword:00000258
"Reconnect"="TSEventReconnect"
"Disconnect"="TSEventDisconnect"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlballoon]
"DLLName"="wlnotify.dll"
"Logon"="RegisterTicketExpiredNotificationEvent"
"Logoff"="UnregisterTicketExpiredNotificationEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wzcnotif]
"DLLName"="wzcdlg.dll"
"Logon"="WZCEventLogon"
"Logoff"="WZCEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000000


The following are the files found:
****************************************************************************
C:\WINDOWS\system32\curtmgr.dll
C:\WINDOWS\system32\d4j00e1meh.dll
C:\WINDOWS\system32\fx_wmv9.dll
C:\WINDOWS\system32\hp4023hmg.dll
C:\WINDOWS\system32\hrp2057oe.dll
C:\WINDOWS\system32\kldhe.dll
C:\WINDOWS\system32\kzduzb.dll
C:\WINDOWS\system32\mjcoree.dll
C:\WINDOWS\system32\mjhtmler.dll
C:\WINDOWS\system32\mkc70.dll
C:\WINDOWS\system32\mzcbase.dll
C:\WINDOWS\system32\p8r40i9qe8.dll
C:\WINDOWS\system32\ropwsx.dll
C:\WINDOWS\system32\uaer32.dll
C:\WINDOWS\system32\wfspdmoe.dll

Registry Entries that were Deleted:
Please verify that the listing looks ok.
If there was something deleted wrongly there are backups in the backreg folder.
****************************************************************************
REGEDIT4

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]
"{521E585B-EF76-45C7-80F0-D5588828B578}"=-
"{2A419EEB-ABC9-4703-B72A-32D76C3D5153}"=-
"{FDEDECBD-5AD2-4965-819F-E9C2ABF64D3D}"=-
"{6D9BAEC0-BE2A-4029-A5CD-6495C7F8F7D9}"=-
[-HKEY_CLASSES_ROOT\CLSID\{521E585B-EF76-45C7-80F0-D5588828B578}]
[-HKEY_CLASSES_ROOT\CLSID\{2A419EEB-ABC9-4703-B72A-32D76C3D5153}]
[-HKEY_CLASSES_ROOT\CLSID\{FDEDECBD-5AD2-4965-819F-E9C2ABF64D3D}]
[-HKEY_CLASSES_ROOT\CLSID\{6D9BAEC0-BE2A-4029-A5CD-6495C7F8F7D9}]
REGEDIT4

[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
"SV1"=""
****************************************************************************
Desktop.ini Contents:
****************************************************************************
****************************************************************************

 

·
Registered
Joined
·
13 Posts
Discussion Starter #16
and here's the online scan results:

-------------------------------------------------------------------------------
KASPERSKY ON-LINE SCANNER REPORT
Thursday, October 27, 2005 15:59:54
Operating System: Microsoft Windows XP Professional, Service Pack 2, v.2149 (Build 2600)
Kaspersky On-line Scanner version: 5.0.67.0
Kaspersky Anti-Virus database last update: 27/10/2005
Kaspersky Anti-Virus database records: 147166
-------------------------------------------------------------------------------

Scan Settings:
Scan using the following antivirus database: standard
Scan Archives: true
Scan Mail Bases: true

Scan Target - My Computer:
A:\
C:\
D:\
E:\

Scan Statistics:
Total number of scanned objects: 216846
Number of viruses found: 26
Number of infected objects: 98
Number of suspicious objects: 2
Duration of the scan process: 9855 sec

Infected Object Name - Virus Name
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\BlazeFindBridge7.zip/a.exe Suspicious: Password-protected-EXE
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\BlazeFindBridge7.zip Suspicious: Password-protected-EXE
C:\Documents and Settings\Rosean\Desktop\torrents\Advanced Email Extractor v2.76 Pro.rar/Advanced Email Extractor v2.76 Pro/Internet Explorer Security.exe/stream Infected: Trojan-Downloader.NSIS.Agent.a
C:\Documents and Settings\Rosean\Desktop\torrents\Advanced Email Extractor v2.76 Pro.rar/Advanced Email Extractor v2.76 Pro/Internet Explorer Security.exe Infected: Trojan-Downloader.NSIS.Agent.a
C:\Documents and Settings\Rosean\Desktop\torrents\Advanced Email Extractor v2.76 Pro.rar Infected: Trojan-Downloader.NSIS.Agent.a
C:\Documents and Settings\Rosean\My Documents\burn\bramd15a.exe/run.exe Infected: Trojan-Downloader.Win32.IstBar.is
C:\Documents and Settings\Rosean\My Documents\burn\bramd15a.exe Infected: Trojan-Downloader.Win32.IstBar.is
C:\Program Files\Norton AntiVirus\Quarantine\095D0CFC.zip/GetAccess.class Infected: Trojan.Java.ClassLoader.c
C:\Program Files\Norton AntiVirus\Quarantine\095D0CFC.zip/InsecureClassLoader.class Infected: Exploit.Java.Bytverify
C:\Program Files\Norton AntiVirus\Quarantine\095D0CFC.zip/Dummy.class Infected: Trojan.Java.ClassLoader.Dummy.a
C:\Program Files\Norton AntiVirus\Quarantine\095D0CFC.zip/Installer.class Infected: Trojan-Downloader.Java.OpenConnection.v
C:\Program Files\Norton AntiVirus\Quarantine\095D0CFC.zip Infected: Trojan-Downloader.Java.OpenConnection.v
C:\Program Files\Norton AntiVirus\Quarantine\096136F8.zip/GetAccess.class Infected: Trojan.Java.ClassLoader.c
C:\Program Files\Norton AntiVirus\Quarantine\096136F8.zip/InsecureClassLoader.class Infected: Exploit.Java.Bytverify
C:\Program Files\Norton AntiVirus\Quarantine\096136F8.zip/Dummy.class Infected: Trojan.Java.ClassLoader.Dummy.a
C:\Program Files\Norton AntiVirus\Quarantine\096136F8.zip/Installer.class Infected: Trojan-Downloader.Java.OpenConnection.v
C:\Program Files\Norton AntiVirus\Quarantine\096136F8.zip Infected: Trojan-Downloader.Java.OpenConnection.v
C:\Program Files\Norton AntiVirus\Quarantine\0CEA6F01.tmp Infected: Trojan-Downloader.Win32.Small.gl
C:\Program Files\Norton AntiVirus\Quarantine\0ECD02E0.dll Infected: Trojan-Clicker.Win32.Delf.r
C:\Program Files\Norton AntiVirus\Quarantine\0ED700D5.exe Infected: Trojan-Downloader.Win32.INService.i
C:\Program Files\Norton AntiVirus\Quarantine\0EDA2AD1.tmp Infected: Trojan-Downloader.Win32.INService.i
C:\Program Files\Norton AntiVirus\Quarantine\0EDE54CE.tmp Infected: Trojan-Downloader.Win32.IstBar.gen
C:\Program Files\Norton AntiVirus\Quarantine\0EE17ECA.tmp Infected: Trojan-Spy.Win32.Briss.j
C:\Program Files\Norton AntiVirus\Quarantine\0EE428C7.exe Infected: Trojan-Downloader.Win32.IstBar.gen
C:\Program Files\Norton AntiVirus\Quarantine\0EE428C7.tmp Infected: Trojan-Downloader.Win32.IstBar.gen
C:\Program Files\Norton AntiVirus\Quarantine\0EE752C3.exe Infected: Trojan-Downloader.Win32.IstBar.gen
C:\Program Files\Norton AntiVirus\Quarantine\0EE752C3.tmp Infected: Trojan-Downloader.Win32.IstBar.gen
C:\Program Files\Norton AntiVirus\Quarantine\227F4386.tmp Infected: Trojan-Downloader.Java.OpenStream.w
C:\Program Files\Norton AntiVirus\Quarantine\372E3248.zip/GetAccess.class Infected: Trojan.Java.ClassLoader.c
C:\Program Files\Norton AntiVirus\Quarantine\372E3248.zip/InsecureClassLoader.class Infected: Exploit.Java.Bytverify
C:\Program Files\Norton AntiVirus\Quarantine\372E3248.zip/Dummy.class Infected: Trojan.Java.ClassLoader.Dummy.a
C:\Program Files\Norton AntiVirus\Quarantine\372E3248.zip/Installer.class Infected: Trojan-Downloader.Java.OpenConnection.v
C:\Program Files\Norton AntiVirus\Quarantine\372E3248.zip Infected: Trojan-Downloader.Java.OpenConnection.v
C:\Program Files\Norton AntiVirus\Quarantine\38C507E1.zip/GetAccess.class Infected: Trojan.Java.ClassLoader.c
C:\Program Files\Norton AntiVirus\Quarantine\38C507E1.zip/InsecureClassLoader.class Infected: Exploit.Java.Bytverify
C:\Program Files\Norton AntiVirus\Quarantine\38C507E1.zip/Dummy.class Infected: Trojan.Java.ClassLoader.Dummy.a
C:\Program Files\Norton AntiVirus\Quarantine\38C507E1.zip/Installer.class Infected: Trojan-Downloader.Java.OpenConnection.v
C:\Program Files\Norton AntiVirus\Quarantine\38C507E1.zip Infected: Trojan-Downloader.Java.OpenConnection.v
C:\Program Files\Norton AntiVirus\Quarantine\463F22B8.tmp Infected: Trojan-Downloader.Java.OpenStream.t
C:\Program Files\Norton AntiVirus\Quarantine\47221101.tmp Infected: Trojan-Downloader.Win32.IstBar.er
C:\Program Files\Norton AntiVirus\Quarantine\50C40665.tmp Infected: Trojan-Downloader.Java.OpenStream.w
C:\Program Files\Norton AntiVirus\Quarantine\52B24D00.tmp Infected: Trojan-Spy.Win32.Briss.j
C:\Program Files\Norton AntiVirus\Quarantine\72763A7B.exe Infected: Trojan-Downloader.Win32.IstBar.ij
C:\Program Files\Norton AntiVirus\Quarantine\72DF1CBF.exe Infected: Trojan-Downloader.Win32.IstBar.ll
C:\Program Files\Norton AntiVirus\Quarantine\72E246BB.exe Infected: Trojan-Downloader.Win32.IstBar.gen
C:\Program Files\Norton AntiVirus\Quarantine\72E670B8.exe Infected: Trojan-Downloader.Win32.IstBar.ll
C:\Program Files\Norton AntiVirus\Quarantine\72EF6EAD.dll Infected: Trojan-Downloader.Win32.IstBar.ms
C:\scvho.exe Infected: Backdoor.Win32.Rbot.gen
C:\scvhost.exe Infected: Backdoor.Win32.Rbot.gen
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP1\A0002377.exe Infected: Backdoor.Win32.Rbot.gen
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP1\A0008932.exe/stream/data0004 Infected: Trojan.Win32.StartPage.rr
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP1\A0008932.exe/stream Infected: Trojan.Win32.StartPage.rr
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP1\A0008932.exe Infected: Trojan.Win32.StartPage.rr
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP10\A0026637.exe Infected: Virus.Win32.Hidrag.a
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP11\A0026760.exe Infected: Virus.Win32.Hidrag.a
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP12\A0026884.exe Infected: Virus.Win32.Hidrag.a
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP14\A0027079.exe Infected: Virus.Win32.Hidrag.a
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP15\A0027119.exe Infected: Virus.Win32.Hidrag.a
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP15\A0027161.exe Infected: Virus.Win32.Hidrag.a
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP16\A0027196.exe Infected: Virus.Win32.Hidrag.a
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP16\A0027334.exe Infected: Trojan-Downloader.Win32.INService.i
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP16\A0027376.exe Infected: Virus.Win32.Hidrag.a
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP17\A0027524.exe Infected: Virus.Win32.Hidrag.a
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP17\A0027558.exe Infected: Virus.Win32.Hidrag.a
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP2\A0016493.exe/stream/data0004 Infected: Trojan.Win32.StartPage.rr
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP2\A0016493.exe/stream Infected: Trojan.Win32.StartPage.rr
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP2\A0016493.exe Infected: Trojan.Win32.StartPage.rr
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP3\A0018190.exe Infected: Virus.Win32.Hidrag.a
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP4\A0024372.exe/stream/data0004 Infected: Trojan.Win32.StartPage.rr
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP4\A0024372.exe/stream Infected: Trojan.Win32.StartPage.rr
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP4\A0024372.exe Infected: Trojan.Win32.StartPage.rr
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP4\A0025439.exe Infected: Virus.Win32.Hidrag.a
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP8\A0025988.exe Infected: Virus.Win32.Hidrag.a
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP8\A0026010.exe Infected: Trojan-Downloader.Win32.INService.gen
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP8\A0026012.exe Infected: Trojan-Downloader.Win32.INService.gen
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP8\A0026033.exe Infected: Virus.Win32.Hidrag.a
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP9\A0026097.exe Infected: Virus.Win32.Hidrag.a
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP9\A0026110.exe Infected: Virus.Win32.Hidrag.a
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP9\A0026134.exe Infected: Virus.Win32.Hidrag.a
C:\System Volume Information\_restore{24B7A76F-48F8-44BE-BB41-C5DC42D7B880}\RP9\A0026596.exe Infected: Virus.Win32.Hidrag.a
C:\System Volume Information\_restore{555EA794-D7C7-4E12-9EDB-2B3D72BF7334}\RP98\A0074678.exe Infected: Backdoor.Win32.Rbot.gen
C:\System Volume Information\_restore{555EA794-D7C7-4E12-9EDB-2B3D72BF7334}\RP98\A0074745.exe Infected: Backdoor.Win32.Rbot.gen
C:\System Volume Information\_restore{555EA794-D7C7-4E12-9EDB-2B3D72BF7334}\RP98\A0074751.exe Infected: Backdoor.Win32.Rbot.gen
C:\System Volume Information\_restore{555EA794-D7C7-4E12-9EDB-2B3D72BF7334}\RP99\A0074782.exe Infected: Backdoor.Win32.Rbot.gen
C:\System Volume Information\_restore{555EA794-D7C7-4E12-9EDB-2B3D72BF7334}\RP99\A0074783.exe Infected: Backdoor.Win32.Rbot.gen
C:\System Volume Information\_restore{764FD084-0D25-4E93-B442-D605F1956CD7}\RP131\A0024071.exe Infected: Trojan-Downloader.Win32.IstBar.is
C:\System Volume Information\_restore{764FD084-0D25-4E93-B442-D605F1956CD7}\RP134\A0024247.exe/run.exe Infected: Trojan-Downloader.Win32.IstBar.is
C:\System Volume Information\_restore{764FD084-0D25-4E93-B442-D605F1956CD7}\RP134\A0024247.exe Infected: Trojan-Downloader.Win32.IstBar.is
C:\System Volume Information\_restore{764FD084-0D25-4E93-B442-D605F1956CD7}\RP155\A0029779.exe/run.exe Infected: Trojan-Downloader.Win32.Adload.j
C:\System Volume Information\_restore{764FD084-0D25-4E93-B442-D605F1956CD7}\RP155\A0029779.exe Infected: Trojan-Downloader.Win32.Adload.j
C:\System Volume Information\_restore{764FD084-0D25-4E93-B442-D605F1956CD7}\RP155\A0029781.exe Infected: Trojan-Downloader.Win32.Adload.j
C:\System Volume Information\_restore{764FD084-0D25-4E93-B442-D605F1956CD7}\RP155\A0029824.exe Infected: Trojan-Downloader.Win32.TSUpdate.j
C:\System Volume Information\_restore{764FD084-0D25-4E93-B442-D605F1956CD7}\RP156\A0030272.exe/WISE0007.BIN Infected: Trojan-Downloader.Win32.TSUpdate.j
C:\System Volume Information\_restore{764FD084-0D25-4E93-B442-D605F1956CD7}\RP156\A0030272.exe Infected: Trojan-Downloader.Win32.TSUpdate.j
C:\System Volume Information\_restore{764FD084-0D25-4E93-B442-D605F1956CD7}\RP156\A0030273.exe Infected: Trojan-Downloader.Win32.VB.ri
C:\System Volume Information\_restore{764FD084-0D25-4E93-B442-D605F1956CD7}\RP158\A0032608.exe Infected: Trojan-Downloader.Win32.Small.bke
C:\System Volume Information\_restore{764FD084-0D25-4E93-B442-D605F1956CD7}\RP92\A0020619.exe Infected: Trojan-Downloader.Win32.IstBar.is
C:\System Volume Information\_restore{764FD084-0D25-4E93-B442-D605F1956CD7}\RP92\A0020622.exe/run.exe Infected: Trojan-Downloader.Win32.IstBar.is
C:\System Volume Information\_restore{764FD084-0D25-4E93-B442-D605F1956CD7}\RP92\A0020622.exe Infected: Trojan-Downloader.Win32.IstBar.is
C:\test.exe Infected: Backdoor.Win32.Rbot.gen

Scan process completed.
 

·
TSF Security Team, Emeritus
Joined
·
26,363 Posts
Please use Symantec's guide to remove the Quarantine files.

If you have not done so already, please enable the viewing of Hidden files
From Windows Explorer, go to Tools>Folder Options> View tab.
  • Tick - Show hidden files and folder
  • Untick - Hide file extensions for known types
  • Untick - Hide protected operating system files
Click Yes to confirm & then click OK

Locate and delete the following files/folders: (let me know if you fail to find/delete any)
  • C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\BlazeFindBridge7.zip
    C:\Documents and Settings\Rosean\Desktop\torrents\Advanced Email Extractor v2.76 Pro.rar
    C:\Documents and Settings\Rosean\My Documents\burn\bramd15a.exe
    C:\scvho.exe
    C:\scvhost.exe
    C:\test.exe

Run CleanUp & do another Kaspersky scan
Let me know if still have other issues with your computer
 

·
TSF Security Team, Emeritus
Joined
·
26,363 Posts
Now that your system is clean, please follow these simple steps in order to keep your computer clean and secure:


  1. CLEAR & RESET SYSTEM RESTORE'S CACHE
    Go to Start >> Run - type control sysdm.cpl,,4 & press Enter
    • Tick on the checkbox - Turn off System Restore on all drives
    • Click Apply
    Turn it back 'On' by unticking the same checkbox & click OK


  2. DISABLE THE VIEWING OF SYSTEM FILES
    From Windows Explorer, go to Tools>Folder Options> View tab.
    • Untick - Show hidden files and folder
    • Tick - Hide file extensions for known types
    • Tick - Hide protected operating system files
    Click Yes to confirm & then click OK


  3. SECURING INTERNET EXPLORER
    From within Internet Explorer click on the Tools menu and then click on Internet Options.
    • Select the Security tab
      • Click once on the Internet icon so it becomes highlighted.
      • Select Custom Level .
        • Change 'Download signed ActiveX controls' to Prompt
        • Change 'Download unsigned ActiveX controls' to Disable
        • Change 'Initialize and script ActiveX controls not marked as safe' to Disable
        • Change 'Installation of desktop items' to Prompt
        • Change 'Launching programs and files in an IFRAME' to Prompt
        • Change 'Navigate sub-frames across different domains' to Prompt
        • When all these changes have been made, click on the OK button.
      • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    • Select OK to exit the Internet Properties page.


  4. ANTIVIRUS SOFTWARE
    It is very important that you have anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

    It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.


  5. FIREWALL
    Without a firewall your computer is succeptible to being hacked and taken over. Simply using a Firewall in its default configuration can lower your risk greatly. A tutorial on Firewalls and a listing of some available ones can be found here.


  6. Microsoft Windows Update
    Visit windowsupdate.com regularly. This will ensure your computer always has the latest security updates. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.


  7. SPYBOT - SEARCH & DESTROY
    Download and install Spybot - Search & Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with the program on a regular basis just as you would an antivirus software. A tutorial on installing & using this product can be found here


  8. AD-AWARE
    Download and install Ad-Aware. You should use this program to scan your computer on a regular basis just as you would an antivirus software in conjunction with Spybot. A tutorial on installing & using this product can be found here


  9. SPYWAREBLASTER
    SpywareBlaster prevents the installation of malicious ActiveX, adware, browser hijackers, dialers, and other potentially unwanted software. Blocks spyware/tracking cookies & restricts the actions of potentially unwanted sites.

    Unlike other programs, SpywareBlaster does not have to remain running in the background. A tutorial on installing & using this product can be found here


  10. IE-SPYAD
    IE/Spyad places more than 4000 dubious websites and domains in the IE Restricted list. This severely impair attempts to infect your system. It basically prevents any downloads (Cookies etc) from the sites listed, although you will still be able to connect to the sites. A tutorial on installing this product can be found here


  11. MVPS HOST FILE
    The MVPS Hosts file replaces your current HOSTS file with one that will restrict known ad sites form serving you unsolicited advertisements. Basically, this prevents your coputer from connecting to those sites by redirecting them to 127.0.0.1 which is the IP of your local computer. It can be downloaded here - MVPS Hosts file

Update all these programs regularly. Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.

Follow this list and your potential for being infected again will reduce dramatically. Here are some additional utilities that will further enhance your safety.
  • Trillian or Miranda-IM - These are Malware free Instant Messenger programs which allow you to connect to multiple IM services in one program! (AOL, Yahoo, ICQ, IRC, MSN)

  • Weather Watcher - Free taskbar weather program that is free, malware free, and resource light.

  • Firefox - Use this alternate browser. Whilst Internet Explorer is not a bad browser, almost every exploit crafted is targeted to take advantage of an IE weakness.

  • Sun's Java - It's much more secure than Microsoft's Java Virtual Machine.

  • Google Toolbar - Get the free google toolbar to help stop pop up windows.

  • CleanUP! - Cleans temporary files from IE and Windows, empties the recycle bin and more. Great tool to help speed up your computer and knock out those nasties that like to reside in the temp folders.

  • ERUNT - A useful freeware utility for users of Windows 2000/XP. It's made up of two parts - ERUNT & NTREGOPT.

    ERUNT will create daily complete backups of your computer's Registry. Whilst System Restore does the same thing, a corrupt registry file may prevent Windows from booting & this effectively renders disables System Restore. With ERUNT, you're able to restore the damaged Registry.

    NTREGOPT works by recreating each registry hive "from scratch", thus removing any slack space that may be left from previously modified or deleted keys. In other words, it compacts the Registry to a small size which allows Windows to load & perform faster.

  • Winpatrol - Download and install the free version of Winpatrol.
    A tutorial for this product is located here:
    Using Winpatrol to protect your computer from malicious software

To find out more information about how you got infected in the first place and some great guidelines to follow to prevent future infections you can read this article by Tony Klein

After doing all these, your system will be optimised against future threats.

It's okay to delete the Hijack This folder in a couple weeks if everything is working okay.
Have a safe & happy computing day.


Please respond to this thread one more time so we can mark this thread as resolved.
 
1 - 19 of 19 Posts
Status
Not open for further replies.
Top