Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

3901.

Solve : virusheat.com?

Answer»

Somehow I have acquired "virusheat.com" on my computer and I can't get rid of it. I don't know how I got it, but I want it gone!Print these instructions out.

1. Download SUPERAntiSpyware Free for Home Users:
http://www.superantispyware.com/

* Double-click SUPERAntiSpyware.exe and use the default settings for INSTALLATION.
* An icon will be created on your desktop. Double-click that icon to launch the program.
* If asked to update the program definitions, click "YES". If not, update the definitions before scanning by SELECTING "Check for Updates". (If you encounter any problems while downloading the updates, manually download and UNZIP them from here: http://www.superantispyware.com/definitions.html.)
* CLOSE SUPERAntiSpyware.

Restart computer in Safe Mode.
To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

* Open SUPERAntiSpyware.
* Under "Configuration and Preferences", click the Preferences button.
* Click the Scanning Control tab.
* Under Scanner Options make sure the following are checked (leave all others unchecked):
o Close browsers before scanning.
o Scan for tracking cookies.
o Terminate memory threats before quarantining.
* Click the "Close" button to leave the control center screen.
* Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
* On the left, make sure you check C:\Fixed Drive.
* On the right, under "Complete Scan", choose Perform Complete Scan.
* Click "Next" to start the scan. Please be patient while it scans your computer.
* After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
* Make sure everything has a checkmark next to it and click "Next".
* A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
* If asked if you want to reboot, click "Yes".
* To retrieve the removal information after reboot, launch SUPERAntispyware again.
o Click Preferences, then click the Statistics/Logs tab.
o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
o If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
o Please copy and paste the Scan Log results in your next reply.
* Click Close to exit the program.
Post SUPERAntiSpyware log.

RESTART COMPUTER!

2. Download Malwarebytes' Anti-Malware: http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform full scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

RESTART COMPUTER!

3. Download HijackThis:
http://www.snapfiles.com/get/hijackthis.html
Post HijackThis log.

3902.

Solve : IE hijacker and unsolicited web sites open?

Answer»

I gave a false status report, problem still exists, it worked one time then VUNDO got reloaded....this comes up in the Malwarebytes log everytime I run a scan, it's in my system 32. Random letters for DLL file names.

I'm pretty busy with work during the week so I won't be spending much time to mess with this.

I would use prevx or ca antivirus but the last time I did that it took me 3 days to get my machine to work out of safe mode...those programs also wiped out my drivers for wireless connection
Post one more HJT log, please.I have run Malwarebytes twice with my internet connection disabled. The 1st time, Vundo was in system32 and I deleted it. The second time, Vundo showed up in the registry and I deleted those. Something is still trying to gain access to the internet while I'm disabled.

Here is the HJThis log from my most recent scan....

Logfile of Trend Micro HijackThis v2.0.2
Scan SAVED at 7:44:12 PM, on 5/6/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Norton Internet Security\ISSVC.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Norton Internet Security\Norton AntiVirus\navapsvc.exe
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = file://c:/windows/homepage.html
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R3 - URLSearchHook: Yahoo! ¤u¨ã¦C - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn0\yt.dll
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn0\yt.dll
O2 - BHO: (no name) - {1B196662-ABC1-45D4-8060-2B55F3518060} - (no file)
O2 - BHO: (no name) - {1D0B1B2F-4D44-48DC-AE5A-F4BBBAE2A83F} - C:\WINDOWS\system32\khfCvWQi.dll
O2 - BHO: (no name) - {2A0A56E6-828D-4600-9CD7-BE418F28BFF4} - (no file)
O2 - BHO: {2b997875-eea8-35ca-5f54-4e5f24fd2244} - {4422df42-f5e4-45f5-ac53-8aee578799b2} - C:\WINDOWS\system32\kjeevxca.dll
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O3 - Toolbar: Norton Internet Security - {0B53EAC3-8D69-4b9e-9B19-A37C9A5676A7} - C:\Program Files\Common Files\Symantec Shared\AdBlocking\NISShExt.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton Internet Security\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: Yahoo! ¤u¨ã¦C - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn0\yt.dll
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O20 - Winlogon Notify: khfCvWQi - C:\WINDOWS\SYSTEM32\khfCvWQi.dll
O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Network Proxy (ccProxy) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: ISSvc (ISSVC) - Symantec Corporation - C:\Program Files\Norton Internet Security\ISSVC.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: Norton AntiVirus Auto-Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton Internet Security\Norton AntiVirus\navapsvc.exe
O23 - Service: PrismXL - New Boundary Technologies, Inc. - C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton Internet Security\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe

--
End of file - 7263 bytes
Surely enough, the log is not clean...I don't want to blame it on lousy Norton, but anyway...

1. Print this post out, since you won't have an access to it, at some point.

2. Close all windows, except for HijackThis.

3. Put a checkmark next to the following HijackThis entries (some entries will be checkmarked to disable unnecessary startups; in those cases (marked with *), no actual program will be removed):

- O2 - BHO: (no name) - {1B196662-ABC1-45D4-8060-2B55F3518060} - (no file)
- O2 - BHO: (no name) - {1D0B1B2F-4D44-48DC-AE5A-F4BBBAE2A83F} - C:\WINDOWS\system32\khfCvWQi.dll
- O2 - BHO: (no name) - {2A0A56E6-828D-4600-9CD7-BE418F28BFF4} - (no file)
- O2 - BHO: {2b997875-eea8-35ca-5f54-4e5f24fd2244} - {4422df42-f5e4-45f5-ac53-8aee578799b2} - C:\WINDOWS\system32\kjeevxca.dll
- *O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
- O20 - Winlogon Notify: khfCvWQi - C:\WINDOWS\SYSTEM32\khfCvWQi.dll

4. CLICK on Fix checked button.

5. Restart your computer in Safe Mode (keep tapping F8 key, when your computer starts, until menu appears)

6. Open Windows Explorer. Go Tools>Folder Options>View tab, put a checkmark next to Show hidden files, and folders.

7. Delete following files/folders (if present):

- khfCvWQi.dll, kjeevxca.dll files from C:\WINDOWS\SYSTEM32

8. Restart in Normal Mode.

9. Post new HijackThis log.

khfCvWQi.dll was not EASY to get rid of, I couldn't just delete it, I opened regedit and found it in 3 or 4 different folders and deleted it then went back to windows explorer and found it in system 32 and I was able to do a simple delete on it.

kjeevxca.dll was easy to delete

here is current HJThis Log.................


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 9:11:28 PM, on 5/7/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Norton Internet Security\ISSVC.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Norton Internet Security\Norton AntiVirus\navapsvc.exe
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\HijackThis\HijackThis.exe
C:\Program Files\Symantec\LiveUpdate\AUpdate.exe
C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = file://c:/windows/homepage.html
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R3 - URLSearchHook: Yahoo! ¤u¨ã¦C - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn0\yt.dll
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn0\yt.dll
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O3 - Toolbar: Norton Internet Security - {0B53EAC3-8D69-4b9e-9B19-A37C9A5676A7} - C:\Program Files\Common Files\Symantec Shared\AdBlocking\NISShExt.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton Internet Security\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: Yahoo! ¤u¨ã¦C - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn0\yt.dll
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O20 - Winlogon Notify: khfCvWQi - C:\WINDOWS\
O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Network Proxy (ccProxy) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: ISSvc (ISSVC) - Symantec Corporation - C:\Program Files\Norton Internet Security\ISSVC.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: Norton AntiVirus Auto-Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton Internet Security\Norton AntiVirus\navapsvc.exe
O23 - Service: PrismXL - New Boundary Technologies, Inc. - C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton Internet Security\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe

--
End of file - 6912 bytes
Browser (Internet Explorer) is still being misdirected when I clik search links on yahoo page...will do more tomorrow niteOpen Registry Editor.
Navigate to:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify
delete khfCvWQi - C:\WINDOWS\ key

Restart computer.
Post new HJT log.I deleted the file as you directed.....still have a problem, here is the log..........

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 7:39:40 PM, on 5/8/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Norton Internet Security\ISSVC.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Norton Internet Security\Norton AntiVirus\navapsvc.exe
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = file://c:/windows/homepage.html
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R3 - URLSearchHook: Yahoo! ¤u¨ã¦C - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn0\yt.dll
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn0\yt.dll
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O3 - Toolbar: Norton Internet Security - {0B53EAC3-8D69-4b9e-9B19-A37C9A5676A7} - C:\Program Files\Common Files\Symantec Shared\AdBlocking\NISShExt.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton Internet Security\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: Yahoo! ¤u¨ã¦C - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn0\yt.dll
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Network Proxy (ccProxy) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: ISSvc (ISSVC) - Symantec Corporation - C:\Program Files\Norton Internet Security\ISSVC.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: Norton AntiVirus Auto-Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton Internet Security\Norton AntiVirus\navapsvc.exe
O23 - Service: PrismXL - New Boundary Technologies, Inc. - C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton Internet Security\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe

--
End of file - 6771 bytes


Open HJT, and checkmark:
- R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = file://c:/windows/homepage.html
Click "Fix checked".

Restart computer.
Post new HJT log.did the fix on R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = file://c:/windows/homepage.html


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 8:27:32 PM, on 5/8/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Norton Internet Security\ISSVC.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Norton Internet Security\Norton AntiVirus\navapsvc.exe
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Windows Media Player\wmplayer.exe
C:\Program Files\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R3 - URLSearchHook: Yahoo! ¤u¨ã¦C - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn0\yt.dll
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn0\yt.dll
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O3 - Toolbar: Norton Internet Security - {0B53EAC3-8D69-4b9e-9B19-A37C9A5676A7} - C:\Program Files\Common Files\Symantec Shared\AdBlocking\NISShExt.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton Internet Security\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: Yahoo! ¤u¨ã¦C - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn0\yt.dll
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Network Proxy (ccProxy) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: ISSvc (ISSVC) - Symantec Corporation - C:\Program Files\Norton Internet Security\ISSVC.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: Norton AntiVirus Auto-Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton Internet Security\Norton AntiVirus\navapsvc.exe
O23 - Service: PrismXL - New Boundary Technologies, Inc. - C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton Internet Security\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe

--
End of file - 6604 bytes
Still redirecting?yes, still redirecting....my test page is yahoo search...

http://search.yahoo.com/search?p=separate+oxygen+from+water&fr=yfp-t-501&toggle=1&cop=mss&ei=UTF-8


when I clik on the 1st selection, it goes to other stuff like shopica and other stuff

it never goes to the "instructables.com" as desired
See, if Google will do same thing.google does the same thing.....it redirected to "toseeka.com"Upgrade to IE7.

3903.

Solve : xfly - virus?? how do I get rid?

Answer»

Xfly has APPEARED on my DESK top. I cant unistall it as when I try a pop appears saying programe is open close before uninstalling - I have closed it but apparently not. What do I do please help
Ta muchly We need more info. Xfly is not necessary a nasty. It may be MOZILLA application, a game, and so on.more information - always a problem for a ludite like me. I think it is a game that my son was playing but after a couple of days he couldn't acess the game and we are left with something that cant be uninstalled and is blocking acess to the internet

Any suggestionsDownload HIJACKTHIS:
http://www.trendsecure.com/portal/en-US/tools/security_tools/hijackthis/download
Click on Download HijackThis Installer
Post HijackTHis log.thank you will GIVE it a go this evening

3904.

Solve : Track an attack?

Answer»

If someone want to run exploit on my computer,How can I track him?Which FIREWALL do you suggest?

Thanks!
What KIND of SECURITY protection do you have installed now? Windows version?I USE windows,AnitvirusWhat Windows version, what TYPE of antivirus?
Are you having any particular problems with your computer?
3905.

Solve : Trojans!!!!!?

Answer»

I was scaning my dell dimension 2350 with Avast an it found four of them. I thought I could just get RID of them but it said it couldnt delete or REPAIR them to be deleted. Sorry not good with this kind of thing if any other needed info is required I'll try an post it asap.Follow These INSTRUCTIONS and post the required logs and one of our Malware Removal Specialists will be ALONG shortly....Cool will try it later, Patio

3906.

Solve : Glitchy monitor, freezing computer, etc. Pretty much the works.?

Answer» ALRIGHT, thank you for all your help, I REALLY APPRECIATE it.Well, we had to go through it, just to make sure...
3907.

Solve : Internet Browser redirection?

Answer»

I am using Win Vista IE7. Whenever I get to the search page in Google or Yahoo and click on a link, the browser ALWAYS REDIRECT me to a sight that has nothing to do with what I am searching for. How do I fix this?Print these instructions out.

1. Download SUPERAntiSpyware Free for Home Users:
http://www.superantispyware.com/

* Double-click SUPERAntiSpyware.exe and use the default settings for installation.
* An icon will be created on your desktop. Double-click that icon to LAUNCH the program.
* If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
* Close SUPERAntiSpyware.

Restart computer in Safe Mode.
To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

* Open SUPERAntiSpyware.
* Under "Configuration and Preferences", click the Preferences button.
* Click the Scanning Control tab.
* Under Scanner Options make sure the following are checked (leave all others unchecked):
o Close browsers before scanning.
o Scan for tracking cookies.
o Terminate memory threats before quarantining.
* Click the "Close" button to leave the control center screen.
* Back on the main screen, under "Scan for HARMFUL Software" click Scan your computer.
* On the left, make sure you check C:\Fixed Drive.
* On the right, under "Complete Scan", choose Perform Complete Scan.
* Click "Next" to start the scan. Please be patient while it scans your computer.
* After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
* Make sure everything has a checkmark next to it and click "Next".
* A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
* If asked if you want to reboot, click "Yes".
* To retrieve the removal information after reboot, launch SUPERAntispyware again.
o Click Preferences, then click the Statistics/Logs tab.
o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
o If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
o Please copy and paste the Scan Log results in your next reply.
* Click Close to exit the program.
Post SUPERAntiSpyware log.

RESTART COMPUTER!

2. Download Malwarebytes' Anti-Malware: http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform full scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

RESTART COMPUTER!

3. Download HijackThis:
http://www.snapfiles.com/get/hijackthis.html
Post HijackThis log.1. The Spyware program would not operate in Safe Mode because of a message that stated that Windows Installer does not operate in Safe Mode. As a result, I ran it in normal mode. After 6 grueling hours and over 100,000 files later (I didn't know I had that many files), the only thing it detected was some "Ardware Tracking Cookie files." After completing the scan and following the other steps to get rid of the files, I discovered that my browser is still doing the exact same thing. Do you have another suggestion that doesn't include spyware programs?

P.S. Why does my designation have to be "newbie"? Why can't it be, WELL I don't know, "sage"?


Here is the exact log finding.

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 04/22/2008 at 04:25 PM

Application Version : 4.0.1154

Core Rules Database Version : 3444
Trace Rules Database Version: 1436

Scan type : Complete Scan
Total Scan Time : 07:09:17

Memory items scanned : 494
Memory threats detected : 0
Registry items scanned : 5340
Registry threats detected : 0
File items scanned : 1039520
File threats detected : 80

Adware.Tracking Cookie
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\t[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
C:\Users\TERRY\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
I need two other logs.

3908.

Solve : HELP PLEASE IM GOING INSANE!?

Answer»

Quote

i do not have my computer under start menu
??



Another way to get there is to go Start>Run, type in:
C:\WINDOWS\system32\Restore\rstrui.exe
Click OK.
Click System Restore Settings, put checkmark in Turn off System Restore, and click OK.

Quote
and new java refuses to download
Download, or install?right done system restore done c/cleaner and turned system restore BACK on

java gets about half way through downloading and says error downloading and then deltes whats already been downloaded have tried it 5 times now same thing every time

all other PROBLEMS sorted

Try here: http://www.java.com/en/download/index.jsp[hi

just want to say a massive THANKYOU for helping me with my computer problem all is running great at the moment managed to download java and all works brilliant

thanks again

dale wiggettSuper
3909.

Solve : Data Execution Program..?

Answer»

Could you help me about the data execution program please...

when i surfing, my computer will pop-up the message data execution program and when i choose the close message. my taskbar and desktop icons are gone?and i can't OPERATE the computer unless i will log-off or re-start my computer...is there a virus of my PC?because, before this happens their is a antispyware pop-up that is coming out.when i accidentally chose scan, they detected many worms and torjans..i dont know if this is true or not..please help...

Thnks a lot........ Print these instructions out.

1. Download SUPERAntiSpyware Free for Home Users:
http://www.superantispyware.com/

* Double-click SUPERAntiSpyware.exe and use the default settings for installation.
* An icon will be created on your desktop. Double-click that icon to launch the program.
* If asked to update the program DEFINITIONS, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
* Close SUPERAntiSpyware.

Restart computer in Safe Mode.
To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

* Open SUPERAntiSpyware.
* Under "Configuration and Preferences", click the Preferences button.
* Click the Scanning Control tab.
* Under Scanner Options make sure the following are checked (leave all others unchecked):
o Close browsers before scanning.
o Scan for tracking cookies.
o Terminate memory threats before quarantining.
* Click the "Close" button to leave the control center screen.
* Back on the MAIN screen, under "Scan for Harmful Software" click Scan your computer.
* On the left, make sure you check C:\Fixed Drive.
* On the right, under "Complete Scan", choose Perform Complete Scan.
* Click "Next" to start the scan. Please be patient while it scans your computer.
* After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
* Make sure everything has a checkmark next to it and click "Next".
* A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
* If asked if you want to reboot, click "Yes".
* To retrieve the removal information after reboot, launch SUPERAntispyware again.
o Click Preferences, then click the Statistics/Logs tab.
o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
o If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
o Please copy and paste the Scan Log results in your next reply.
* Click Close to exit the program.
POST SUPERAntiSpyware log.

RESTART COMPUTER!

2. Download Malwarebytes' Anti-Malware: http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the LATEST version.
* Once the program has loaded, select Perform full scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

RESTART COMPUTER!

3. Download HijackThis:
http://www.snapfiles.com/get/hijackthis.html
Post HijackThis log.

3910.

Solve : Error loading C:\WINDOWS\system32\xfvwmuke.dll on startup?

Answer»

When I start my computer I get a message saying:

"Error Loading C:\WINDOWS\system32\xfvwmuke.dll Specified module could not be found."

It started after running some anti-spyware programs to get rid of a virus. When the message pops up I just hit OK and everything seems to be working fine, but I keep getting the message whenever I restart. A search on the internet for xfvwmuke.dll doesn't find anything. I'm running windows XP, can anybody help me with this? Thanks.it sounds like a virus that your anti virus didn't catch what anti-virus do you have?Print these instructions out.

1. Download SUPERAntiSpyware Free for Home Users:
http://www.superantispyware.com/

* Double-click SUPERAntiSpyware.exe and use the default settings for installation.
* An icon will be created on your desktop. Double-click that icon to launch the program.
* If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
* Close SUPERAntiSpyware.

Restart computer in Safe Mode.
To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

* Open SUPERAntiSpyware.
* Under "Configuration and Preferences", click the Preferences button.
* Click the Scanning Control tab.
* Under Scanner Options MAKE sure the following are checked (leave all others unchecked):
o Close browsers before scanning.
o Scan for tracking cookies.
o Terminate memory threats before quarantining.
* Click the "Close" button to leave the control center screen.
* Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
* On the left, make sure you check C:\Fixed Drive.
* On the right, under "Complete Scan", choose Perform Complete Scan.
* Click "Next" to start the scan. Please be patient while it scans your computer.
* After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
* Make sure everything has a checkmark next to it and click "Next".
* A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
* If asked if you want to reboot, click "Yes".
* To retrieve the removal information after reboot, launch SUPERAntispyware again.
o Click Preferences, then click the Statistics/Logs tab.
o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
o If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
o Please copy and paste the Scan Log results in your next reply.
* Click Close to exit the program.
Post SUPERAntiSpyware log.

RESTART COMPUTER!

2. Download Malwarebytes' Anti-Malware: http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform full scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

RESTART COMPUTER!

3. Download HijackThis:
http://www.snapfiles.com/get/hijackthis.html
Post HijackThis log.Here are my logs:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 04/20/2008 at 07:31 AM

Application Version : 4.0.1154

Core Rules Database Version : 3442
Trace Rules Database Version: 1434

Scan type : Complete Scan
Total Scan Time : 11:57:37

Memory items scanned : 176
Memory threats detected : 0
Registry items scanned : 6207
Registry threats detected : 0
File items scanned : 87313
File threats detected : 3

Adware.Tracking Cookie
C:\Documents and Settings\David Goforth\Cookies\[emailprotected][1].txt
C:\Documents and Settings\David Goforth\Cookies\[emailprotected][1].txt

Adware.Vundo Variant/Rel
C:\WINDOWS\SYSTEM32\MCRH.TMP

Malwarebytes' Anti-Malware 1.11
Database version: 663

Scan type: Full Scan (C:\|)
Objects scanned: 121784
Time elapsed: 1 hour(s), 13 minute(s), 9 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{3c78b8e2-6c4d-11d1-ade2-0000f8754b99} (Adware.Casino) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Program Files\Music Editing Master\wavdest.ax (Adware.Casino) -> Quarantined and deleted successfully.

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 5:04:51 PM, on 4/20/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16640)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\ACS.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Adobe\Photoshop Elements 4.0\PhotoshopElementsFileAgent.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\WINDOWS\system32\DVDRAMSV.exe
C:\WINDOWS\system32\svchost.exe
c:\TOSHIBA\IVP\swupdate\swupdtmr.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\WINDOWS\system32\MsPMSPSv.exe
C:\WINDOWS\system32\TCtrlIOHook.exe
C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
C:\Program Files\Toshiba\Tvs\TvsTray.exe
C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
C:\WINDOWS\system32\TPSMain.exe
C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
C:\WINDOWS\system32\ZoomingHook.exe
C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
C:\Program Files\ScanSoft\OmniPageSE2.0\OpwareSE2.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\system32\TPSBattM.exe
C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe


And I'm running Symantec Antivirus. Thanks for the help.I need a whole HJT log.Oops, guess I cut it off. Here it is:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 5:04:51 PM, on 4/20/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16640)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\ACS.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Adobe\Photoshop Elements 4.0\PhotoshopElementsFileAgent.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\WINDOWS\system32\DVDRAMSV.exe
C:\WINDOWS\system32\svchost.exe
c:\TOSHIBA\IVP\swupdate\swupdtmr.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\WINDOWS\system32\MsPMSPSv.exe
C:\WINDOWS\system32\TCtrlIOHook.exe
C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
C:\Program Files\Toshiba\Tvs\TvsTray.exe
C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
C:\WINDOWS\system32\TPSMain.exe
C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
C:\WINDOWS\system32\ZoomingHook.exe
C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
C:\Program Files\ScanSoft\OmniPageSE2.0\OpwareSE2.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\system32\TPSBattM.exe
C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\Program Files\Nikon\PictureProject\NkbMonitor.exe
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O3 - Toolbar: Easy-WebPrint - {327C2873-E90D-4c37-AA9D-10AC9BABA46C} - C:\Program Files\Canon\Easy-WebPrint\Toolband.dll
O4 - HKLM\..\Run: [TCtryIOHook] TCtrlIOHook.exe
O4 - HKLM\..\Run: [TFncKy] TFncKy.exe
O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [NDSTray.exe] NDSTray.exe
O4 - HKLM\..\Run: [HWSetup] C:\Program Files\TOSHIBA\TOSHIBA Applet\HWSetup.exe hwSetUP
O4 - HKLM\..\Run: [SVPWUTIL] C:\Program Files\Toshiba\Windows Utilities\SVPWUTIL.exe SVPwUTIL
O4 - HKLM\..\Run: [Tvs] C:\Program Files\Toshiba\Tvs\TvsTray.exe
O4 - HKLM\..\Run: [CeEKEY] C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
O4 - HKLM\..\Run: [TPSMain] TPSMain.exe
O4 - HKLM\..\Run: [PadTouch] C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
O4 - HKLM\..\Run: [ZoomingHook] ZoomingHook.exe
O4 - HKLM\..\Run: [SmoothView] C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
O4 - HKLM\..\Run: [TPNF] C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
O4 - HKLM\..\Run: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run
O4 - HKLM\..\Run: [RoxioEngineUtility] "C:\Program Files\Common Files\Roxio Shared\System\EngUtil.exe"
O4 - HKLM\..\Run: [OpwareSE2] "C:\Program Files\ScanSoft\OmniPageSE2.0\OpwareSE2.exe"
O4 - HKLM\..\Run: [Logitech Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [b4bda793] rundll32.exe "C:\WINDOWS\system32\xfvwmuke.dll",b
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe"
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Logitech SetPoint.lnk = C:\Program Files\Logitech\SetPoint\SetPoint.exe
O4 - Global Startup: NkbMonitor.exe.lnk = C:\Program Files\Nikon\PictureProject\NkbMonitor.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O8 - Extra context menu item: Easy-WebPrint Add To Print List - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_AddToList.html
O8 - Extra context menu item: Easy-WebPrint High Speed Print - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_HSPrint.html
O8 - Extra context menu item: Easy-WebPrint Preview - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_Preview.html
O8 - Extra context menu item: Easy-WebPrint Print - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_Print.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing)
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing)
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O14 - IERESET.INF: START_PAGE_URL=http://www.toshibadirect.com/dpdstart
O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcafee.com/molbin/shared/mcinsctl/4,0,0,101/mcinsctl.cab
O16 - DPF: {78AEEDE8-7345-4FB5-A8FE-4BFF16EF25FC} (McAfee Virtual Technician Control Class) - http://us-download.mcafee.com/products/protected/mvt/mvt.cab
O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} (DwnldGroupMgr Class) - http://download.mcafee.com/molbin/shared/mcgdmgr/1,0,0,26/mcgdmgr.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - https://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\system32\ACS.exe
O23 - Service: Adobe ACTIVE File Monitor V4 (AdobeActiveFileMonitor4.0) - Unknown owner - C:\Program Files\Adobe\Photoshop Elements 4.0\PhotoshopElementsFileAgent.exe
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: DVD-RAM_Service - Matsushita Electric Industrial Co., Ltd. - C:\WINDOWS\system32\DVDRAMSV.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Logitech Bluetooth Service (LBTServ) - Logitech, Inc. - C:\Program Files\Common Files\Logitech\Bluetooth\LBTServ.exe
O23 - Service: McAfee WSC Integration (McDetect.exe) - Unknown owner - c:\program files\mcafee.com\agent\mcdetect.exe (file missing)
O23 - Service: McAfee Task Scheduler (McTskshd.exe) - Unknown owner - c:\PROGRA~1\mcafee.com\agent\mctskshd.exe (file missing)
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: SoundMovieServer - SoundMovieServer - C:\WINDOWS\system32\snmvtsvc.exe
O23 - Service: Swupdtmr - Unknown owner - c:\TOSHIBA\IVP\swupdate\swupdtmr.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe

--
End of file - 11613 bytes

Thanks again.*** Disable TeaTimer, as it'll interfere with the cleaning process:
Right click Spybot's TeaTimer System Tray Icon.
Click Exit Spybot-S&D Resident.
TeaTimer closes.

1. Print this post out, since you won't have an access to it, at some point.

2. Close all windows, except for HijackThis.

3. Put a checkmark next to the following HijackThis entries (some entries will be checkmarked to disable unnecessary startups; in those cases (marked with *), no actual program will be removed):

- *O4 - HKLM\..\Run: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run
- *O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
- *O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
- O4 - HKLM\..\Run: [b4bda793] rundll32.exe "C:\WINDOWS\system32\xfvwmuke.dll",b
- *O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
- O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)
- O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing)
- O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing)


4. Click on Fix checked button.

5. Restart your computer in Safe Mode (keep tapping F8 key, when your computer starts, until meny appears)

6. Open Windows Explorer. Go Tools>Folder Options>View tab, put a checkmark next to Show hidden files, and folders.

7. Delete following files/folders (if present):

- xfvwmuke.dll file from C:\WINDOWS\system32

8. Restart in Normal Mode.

9. Post new HijackThis log.Ok, here is the log. And FYI, there was no file to delete in Step 7 above and when RESTARTING, the error message did not pop up this time.

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:36:56 PM, on 4/21/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16640)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\ACS.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Adobe\Photoshop Elements 4.0\PhotoshopElementsFileAgent.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\WINDOWS\system32\DVDRAMSV.exe
C:\WINDOWS\system32\svchost.exe
c:\TOSHIBA\IVP\swupdate\swupdtmr.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\WINDOWS\system32\MsPMSPSv.exe
C:\WINDOWS\system32\TCtrlIOHook.exe
C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
C:\Program Files\Toshiba\Tvs\TvsTray.exe
C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
C:\WINDOWS\system32\TPSMain.exe
C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
C:\WINDOWS\system32\ZoomingHook.exe
C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
C:\Program Files\ScanSoft\OmniPageSE2.0\OpwareSE2.exe
C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe
C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\Program Files\Nikon\PictureProject\NkbMonitor.exe
C:\WINDOWS\system32\TPSBattM.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O3 - Toolbar: Easy-WebPrint - {327C2873-E90D-4c37-AA9D-10AC9BABA46C} - C:\Program Files\Canon\Easy-WebPrint\Toolband.dll
O4 - HKLM\..\Run: [TCtryIOHook] TCtrlIOHook.exe
O4 - HKLM\..\Run: [TFncKy] TFncKy.exe
O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [NDSTray.exe] NDSTray.exe
O4 - HKLM\..\Run: [HWSetup] C:\Program Files\TOSHIBA\TOSHIBA Applet\HWSetup.exe hwSetUP
O4 - HKLM\..\Run: [SVPWUTIL] C:\Program Files\Toshiba\Windows Utilities\SVPWUTIL.exe SVPwUTIL
O4 - HKLM\..\Run: [Tvs] C:\Program Files\Toshiba\Tvs\TvsTray.exe
O4 - HKLM\..\Run: [CeEKEY] C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
O4 - HKLM\..\Run: [TPSMain] TPSMain.exe
O4 - HKLM\..\Run: [PadTouch] C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
O4 - HKLM\..\Run: [ZoomingHook] ZoomingHook.exe
O4 - HKLM\..\Run: [SmoothView] C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
O4 - HKLM\..\Run: [TPNF] C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
O4 - HKLM\..\Run: [RoxioEngineUtility] "C:\Program Files\Common Files\Roxio Shared\System\EngUtil.exe"
O4 - HKLM\..\Run: [OpwareSE2] "C:\Program Files\ScanSoft\OmniPageSE2.0\OpwareSE2.exe"
O4 - HKLM\..\Run: [Logitech Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe"
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Logitech SetPoint.lnk = C:\Program Files\Logitech\SetPoint\SetPoint.exe
O4 - Global Startup: NkbMonitor.exe.lnk = C:\Program Files\Nikon\PictureProject\NkbMonitor.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O8 - Extra context menu item: Easy-WebPrint Add To Print List - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_AddToList.html
O8 - Extra context menu item: Easy-WebPrint High Speed Print - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_HSPrint.html
O8 - Extra context menu item: Easy-WebPrint Preview - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_Preview.html
O8 - Extra context menu item: Easy-WebPrint Print - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_Print.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O14 - IERESET.INF: START_PAGE_URL=http://www.toshibadirect.com/dpdstart
O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcafee.com/molbin/shared/mcinsctl/4,0,0,101/mcinsctl.cab
O16 - DPF: {78AEEDE8-7345-4FB5-A8FE-4BFF16EF25FC} (McAfee Virtual Technician Control Class) - http://us-download.mcafee.com/products/protected/mvt/mvt.cab
O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} (DwnldGroupMgr Class) - http://download.mcafee.com/molbin/shared/mcgdmgr/1,0,0,26/mcgdmgr.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - https://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\system32\ACS.exe
O23 - Service: Adobe Active File Monitor V4 (AdobeActiveFileMonitor4.0) - Unknown owner - C:\Program Files\Adobe\Photoshop Elements 4.0\PhotoshopElementsFileAgent.exe
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: DVD-RAM_Service - Matsushita Electric Industrial Co., Ltd. - C:\WINDOWS\system32\DVDRAMSV.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Logitech Bluetooth Service (LBTServ) - Logitech, Inc. - C:\Program Files\Common Files\Logitech\Bluetooth\LBTServ.exe
O23 - Service: McAfee WSC Integration (McDetect.exe) - Unknown owner - c:\program files\mcafee.com\agent\mcdetect.exe (file missing)
O23 - Service: McAfee Task Scheduler (McTskshd.exe) - Unknown owner - c:\PROGRA~1\mcafee.com\agent\mctskshd.exe (file missing)
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: SoundMovieServer - SoundMovieServer - C:\WINDOWS\system32\snmvtsvc.exe
O23 - Service: Swupdtmr - Unknown owner - c:\TOSHIBA\IVP\swupdate\swupdtmr.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe

--
End of file - 10751 bytes
Good job

HJT log is clean.

1. Download, and install CCleaner: http://www.ccleaner.com/download/builds. Get "Slim" version.
Read CCleaner instruction here: http://www.jahewi.nl/ccleaner/ccleaner.html.
Run CCleaner.

2. Turn off System Restore:

- Windows XP:
1. Click Start.
2. Right-click the My Computer icon, and then click Properties.
3. Click the System Restore tab.
4. Check "Turn off System Restore".
5. Click Apply.
6. When turning off System Restore, the existing restore points will be deleted. Click Yes to do this.
7. Click OK.
- Windows Vista:
1. Click Start.
2. Right-click the Computer icon, and then click Properties.
3. Click on System Protection under the Tasks column on the left side
4. Click on Continue on the "User Account Control" window that pops up
5. Under the System Protection tab, find Available Disks
6. Uncheck the box for any drive you wish to disable system restore on (in most cases, drive "C:")
7. When turning off System Restore, the existing restore points will be deleted. Click "Turn System Restore Off" on the popup window to do this.
8. Click OK

3. Restart computer.

4. Turn System Restore on.

5. Download, and install free ThreatFire: http://www.threatfire.com/, which will give you real-time protection against malwares.
It won't interfere with your antivirus, nor firewall.

6. Let me know, how your computer is doing.
Everything is working great, thanks so much for your help.Very good
Happy computing

3911.

Solve : Trojan.win32.Blackbird help please?

Answer»

I wanted to start by saying thank you for the great information already posted together with the links which make it so easy to help myself.

My computer ended up with the trojan.win32.blackbird and I read and followed the instructions but I am at a point where I just dont know what to do next. I will post the logs for the results next and see if there is something that I need to do now.

The desktop icons are still there and I am worried incase there is something I have not done which allows the INFECTION to redo itself.

thank you for any and all help. I really do appreciate it! Here is the Superanti virus log

[recovering SPACE - attachment deleted by admin]here is the malware log

[recovering space - attachment deleted by admin]here is the hijack this log
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 7:45:15 AM, on 4/21/2008
Platform: Windows Vista (WinNT 6.00.1904)
MSIE: Internet Explorer v7.00 (7.00.6000.16609)
Boot mode: Normal

Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskeng.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Hp\QuickPlay\QPService.exe
C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe
C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe
C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\Program Files\Microsoft IntelliPoint\ipoint.exe
C:\Program Files\Hp\HP Software Update\hpwuSchd2.exe
C:\Windows\System32\rundll32.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe
C:\Program Files\Internet Explorer\ieuser.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
C:\Windows\system32\Macromed\Flash\FlashUtil9d.exe
C:\Program Files\Grisoft\AVG7\avgcc.exe
C:\Program Files\Grisoft\AVG7\avgwb.dat
C:\Windows\system32\SearchFilterHost.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

O1 - Hosts: ::1 localhost
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O3 - Toolbar: (no name) - {838B6BFB-94D5-4C3F-851C-EEBF6108BDA8} - (no file)
O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [QPService] "C:\Program Files\HP\QuickPlay\QPService.exe"
O4 - HKLM\..\Run: [QlbCtrl] "C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe" /Start
O4 - HKLM\..\Run: [hpWirelessAssistant] "C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe"
O4 - HKLM\..\Run: [WAWifiMessage] "C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKLM\..\Run: [IntelliPoint] "C:\Program Files\Microsoft IntelliPoint\ipoint.exe"
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\Hp\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [NvSvc] RUNDLL32.EXE C:\Windows\system32\nvsvc.dll,nvsvcStart
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [HP Health Check Scheduler] [ProgramFilesFolder]Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKLM\..\RunOnce: [Launcher] %WINDIR%\SMINST\launcher.exe
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [RunSpySweeperScheduleAtStartup] "C:\Windows\system32\msfeedssync.exe" /ScheduleSweep=User_Feed_Synchronization-{D0C076B8-7BB4-403D-8235-784CDEBA0B13}
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [Spyware Begone] "C:\Program Files\SpywareBeGone.exe" -FastScan
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O16 - DPF: {01016526-5E80-11D8-9E86-0007E96C65AE} (SmartAccess Ctl Class) - https://install.charter.com/diskless/bin/ssctlsma.dll
O16 - DPF: {2EB1E425-74DC-4DC0-A9E1-03A4C852E1F2} (CPlayFirstTriJinxControl Object) - http://zone.msn.com/bingame/trix/default/TriJinx.1.0.0.87.cab
O16 - DPF: {49232000-16E4-426C-A231-62846947304B} (SysData Class) - http://ipgweb.cce.hp.com/rdqnbk/downloads/sysinfo.cab
O16 - DPF: {49E67060-2C0D-415E-94C7-52A49F73B2F1} (CPlayFirstPiratePoppersControl Object) - http://zone.msn.com/bingame/pppp/default/PiratePoppers.1.0.0.39.cab
O16 - DPF: {4B9F2C37-C0CF-42BC-BB2D-DCFA8B25CABF} (PopCapLoaderCtrl Class) - http://zone.msn.com/bingame/rock/default/popcaploader1.cab
O16 - DPF: {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} (OnlineScanner Control) - http://www.eset.eu/buxus/docs/OnlineScanner.cab
O16 - DPF: {6B75345B-AA36-438A-BBE6-4078B4C6984D} (HpProductDetection Class) - http://h20270.www2.hp.com/ediags/gmn2/install/HPProductDetection.cab
O16 - DPF: {7E980B9B-8AE5-466A-B6D6-DA8CF814E78A} (MJLauncherCtrl Class) - http://zone.msn.com/bingame/amun/default/mjolauncher.cab
O16 - DPF: {7FC1B346-83E6-4774-8D20-1A6B09B0E737} (Windows Live Photo Upload Control) - http://amo1968.spaces.live.com/PhotoUpload/VistaMsnPUplden-us.cab
O16 - DPF: {9AA73F41-EC64-489E-9A73-9CD52E528BC4} (ZoneAxRcMgr Class) - http://cdn2.zone.msn.com/binframework/v10/ZAxRcMgr.cab31267.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://cdn2.zone.msn.com/binFramework/v10/ZIntro.cab56649.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {C7E002D6-324B-4500-883D-84B620FD8640} (Bridge Installer) - http://cdn2.zone.msn.com/Bingame/BRDG/dataFiles_64916/heartbeat.cab
O16 - DPF: {C86FF4B0-AA1D-46D4-8612-025FB86583C7} (AstoundLauncher Control) - http://zone.msn.com/bingame/jobo/default/AstoundLauncher.cab#version=1,0,0,10
O16 - DPF: {D77EF652-9A6B-40C8-A4B9-1C0697C6CF41} (TikGames Online Control) - http://zone.msn.com/bingame/cnma/default/cinematycoon.cab
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O20 - Winlogon Notify: avgwlntf - C:\Windows\SYSTEM32\avgwlntf.dll
O21 - SSODL: wdpoefan - {2B1BBF9D-F793-44D1-BEFC-4371234C27AD} - C:\Windows\wdpoefan.dll (file missing)
O21 - SSODL: vadokmxt - {BB69B45B-7B64-4B8F-BA0D-98E2EB95F020} - C:\Windows\vadokmxt.dll (file missing)
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: AVG7 Resident Shield Service (AvgCoreSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgrssvc.exe
O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
O23 - Service: CyberLink Background Capture Service (CBCS) (CLCapSvc) - Unknown owner - C:\Program Files\HP\QuickPlay\Kernel\TV\CLCapSvc.exe
O23 - Service: CyberLink Task Scheduler (CTS) (CLSched) - Unknown owner - C:\Program Files\HP\QuickPlay\Kernel\TV\CLSched.exe
O23 - Service: Com4Qlb - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\Com4Qlb.exe
O23 - Service: GameConsoleService - WildTangent, Inc. - C:\Program Files\HP Games\My HP Game Console\GameConsoleService.exe
O23 - Service: HP Health Check Service - Hewlett-Packard - c:\Program Files\Hewlett-Packard\HP Health Check\hphc_service.exe
O23 - Service: hpqwmiex - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Roxio\Roxio MyDVD Basic v9\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: RoxMediaDB9 - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exe
O23 - Service: stllssvr - MicroVision Development, Inc. - C:\Program Files\Common Files\SureThing Shared\stllssvr.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe

--
End of file - 9967 bytes
I am really sorry I thought I was in the virus forum posting this but apparently I was not.
Can an Admin please move this thread to the correct forum?

Sorry again, I was trying to get all the information to make life as easy as it can be and managed to mess up the forum!

Thank you and also in advance for any and all help and assistance!!!

Alistair*** Go Start>Control Panel>Programs and Features, and uninstall SpywareBeGone (rogue program)

*** You need to update your Java:
http://java.sun.com/javase/downloads/index.jsp
Java Runtime Environment (JRE) 6 Update 6
Uninstall all previous versions of Java through Add\Remove.

*** Disable Windows Defender, as it'll interfere with cleaning process:
* Open Windows Defender
* Click Tools
* Click General Settings
* Scroll down to Real Time Protection Options
* Uncheck Turn on Real Time Protection
* After you uncheck this, click on the Save button
* CLOSE Windows Defender

1. Print this post out, since you won't have an access to it, at some point.

2. Close all windows, except for HijackThis.

3. Put a checkmark next to the following HijackThis entries (some entries will be checkmarked to disable unnecessary startups; in those cases (marked with *), no actual program will be removed):

- O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
- O3 - Toolbar: (no name) - {838B6BFB-94D5-4C3F-851C-EEBF6108BDA8} - (no file)
- *O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\Hp\HP Software Update\HPWuSchd2.exe
- *O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
- O4 - HKCU\..\Run: [Spyware Begone] "C:\Program Files\SpywareBeGone.exe" -FastScan
- *O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
- *O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
- *O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
- O21 - SSODL: wdpoefan - {2B1BBF9D-F793-44D1-BEFC-4371234C27AD} - C:\Windows\wdpoefan.dll (file missing)
- O21 - SSODL: vadokmxt - {BB69B45B-7B64-4B8F-BA0D-98E2EB95F020} - C:\Windows\vadokmxt.dll (file missing)


4. Click on Fix checked button.

5. Restart your computer in Safe Mode (keep tapping F8 key, when your computer starts, until meny appears)

6. Open Windows Explorer. Go Tools>Folder Options>View tab, put a checkmark next to Show hidden files, and folders.

7. Delete following files/folders (if present):

- SpywareBeGone folder from C:\Program Files

8. Restart in Normal Mode.

9. Post new HijackThis log.Thank you very much for all your help and time Broni, I really really appreciate it. I also thought that spyware begone was a genuine spyware removal program On the upside I have now switched to using all the ones you have recommended.

This really is a fabulous website!!!!

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 6:09:41 PM, on 4/21/2008
Platform: Windows Vista (WinNT 6.00.1904)
MSIE: Internet Explorer v7.00 (7.00.6000.16609)
Boot mode: Normal

Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Hp\QuickPlay\QPService.exe
C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe
C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe
C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe
C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe
C:\Program Files\Microsoft IntelliPoint\ipoint.exe
C:\Program Files\Adobe\Reader 8.0\Reader\reader_sl.exe
C:\Program Files\Grisoft\AVG7\avgcc.exe
C:\Windows\System32\rundll32.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe
C:\Windows\System32\mobsync.exe
C:\Windows\system32\SearchFilterHost.exe

O1 - Hosts: ::1 localhost
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [QPService] "C:\Program Files\HP\QuickPlay\QPService.exe"
O4 - HKLM\..\Run: [QlbCtrl] "C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe" /Start
O4 - HKLM\..\Run: [hpWirelessAssistant] "C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe"
O4 - HKLM\..\Run: [WAWifiMessage] "C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe"
O4 - HKLM\..\Run: [IntelliPoint] "C:\Program Files\Microsoft IntelliPoint\ipoint.exe"
O4 - HKLM\..\Run: [NvSvc] RUNDLL32.EXE C:\Windows\system32\nvsvc.dll,nvsvcStart
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [HP Health Check Scheduler] [ProgramFilesFolder]Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKLM\..\RunOnce: [Launcher] %WINDIR%\SMINST\launcher.exe
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [RunSpySweeperScheduleAtStartup] "C:\Windows\system32\msfeedssync.exe" /ScheduleSweep=User_Feed_Synchronization-{D0C076B8-7BB4-403D-8235-784CDEBA0B13}
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O16 - DPF: {01016526-5E80-11D8-9E86-0007E96C65AE} (SmartAccess Ctl Class) - https://install.charter.com/diskless/bin/ssctlsma.dll
O16 - DPF: {2EB1E425-74DC-4DC0-A9E1-03A4C852E1F2} (CPlayFirstTriJinxControl Object) - http://zone.msn.com/bingame/trix/default/TriJinx.1.0.0.87.cab
O16 - DPF: {49232000-16E4-426C-A231-62846947304B} (SysData Class) - http://ipgweb.cce.hp.com/rdqnbk/downloads/sysinfo.cab
O16 - DPF: {49E67060-2C0D-415E-94C7-52A49F73B2F1} (CPlayFirstPiratePoppersControl Object) - http://zone.msn.com/bingame/pppp/default/PiratePoppers.1.0.0.39.cab
O16 - DPF: {4B9F2C37-C0CF-42BC-BB2D-DCFA8B25CABF} (PopCapLoaderCtrl Class) - http://zone.msn.com/bingame/rock/default/popcaploader1.cab
O16 - DPF: {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} (OnlineScanner Control) - http://www.eset.eu/buxus/docs/OnlineScanner.cab
O16 - DPF: {6B75345B-AA36-438A-BBE6-4078B4C6984D} (HpProductDetection Class) - http://h20270.www2.hp.com/ediags/gmn2/install/HPProductDetection.cab
O16 - DPF: {7E980B9B-8AE5-466A-B6D6-DA8CF814E78A} (MJLauncherCtrl Class) - http://zone.msn.com/bingame/amun/default/mjolauncher.cab
O16 - DPF: {7FC1B346-83E6-4774-8D20-1A6B09B0E737} (Windows Live Photo Upload Control) - http://amo1968.spaces.live.com/PhotoUpload/VistaMsnPUplden-us.cab
O16 - DPF: {9AA73F41-EC64-489E-9A73-9CD52E528BC4} (ZoneAxRcMgr Class) - http://cdn2.zone.msn.com/binframework/v10/ZAxRcMgr.cab31267.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://cdn2.zone.msn.com/binFramework/v10/ZIntro.cab56649.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {C7E002D6-324B-4500-883D-84B620FD8640} (Bridge Installer) - http://cdn2.zone.msn.com/Bingame/BRDG/dataFiles_64916/heartbeat.cab
O16 - DPF: {C86FF4B0-AA1D-46D4-8612-025FB86583C7} (AstoundLauncher Control) - http://zone.msn.com/bingame/jobo/default/AstoundLauncher.cab#version=1,0,0,10
O16 - DPF: {D77EF652-9A6B-40C8-A4B9-1C0697C6CF41} (TikGames Online Control) - http://zone.msn.com/bingame/cnma/default/cinematycoon.cab
O20 - Winlogon Notify: avgwlntf - C:\Windows\SYSTEM32\avgwlntf.dll
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: AVG7 Resident Shield Service (AvgCoreSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgrssvc.exe
O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
O23 - Service: CyberLink Background Capture Service (CBCS) (CLCapSvc) - Unknown owner - C:\Program Files\HP\QuickPlay\Kernel\TV\CLCapSvc.exe
O23 - Service: CyberLink Task Scheduler (CTS) (CLSched) - Unknown owner - C:\Program Files\HP\QuickPlay\Kernel\TV\CLSched.exe
O23 - Service: Com4Qlb - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\Com4Qlb.exe
O23 - Service: GameConsoleService - WildTangent, Inc. - C:\Program Files\HP Games\My HP Game Console\GameConsoleService.exe
O23 - Service: HP Health Check Service - Hewlett-Packard - c:\Program Files\Hewlett-Packard\HP Health Check\hphc_service.exe
O23 - Service: hpqwmiex - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Roxio\Roxio MyDVD Basic v9\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: RoxMediaDB9 - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exe
O23 - Service: stllssvr - MicroVision Development, Inc. - C:\Program Files\Common Files\SureThing Shared\stllssvr.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe

--
End of file - 8711 bytes
You're very welcome

LOOKS good...

HJT log is clean.

1. Download, and install CCleaner: http://www.ccleaner.com/download/builds. Get "Slim" version.
Read CCleaner instruction here: http://www.jahewi.nl/ccleaner/ccleaner.html.
Run CCleaner.

2. Turn off System Restore:

- Windows XP:
1. Click Start.
2. Right-click the My Computer icon, and then click Properties.
3. Click the System Restore tab.
4. Check "Turn off System Restore".
5. Click Apply.
6. When turning off System Restore, the existing restore points will be deleted. Click Yes to do this.
7. Click OK.
- Windows Vista:
1. Click Start.
2. Right-click the Computer icon, and then click Properties.
3. Click on System Protection under the Tasks column on the left side
4. Click on Continue on the "User Account Control" WINDOW that pops up
5. Under the System Protection tab, find Available Disks
6. Uncheck the box for any drive you wish to disable system restore on (in most cases, drive "C:")
7. When turning off System Restore, the existing restore points will be deleted. Click "Turn System Restore Off" on the popup window to do this.
8. Click OK

3. Restart computer.

4. Turn System Restore on.

5. Download, and install free ThreatFire: http://www.threatfire.com/, which will give you real-time protection against malwares.
It won't interfere with your antivirus, nor firewall.

6. Let me know, how your computer is doing.
Thank you so much again Broni!!

Computer seems to be working so much better than before!! I have downloaded and running all the programs reccommended.

One thing I need to ask is that I have several desktop icons still relating to the blackbird Trojan sitting on my desktop. I have not wanted to touch them until everything was OK.

Should they now be manually deleted?

AlistairGood going
By all means, remove any suspicious icon.
Happy surfing

3912.

Solve : What is vcsron, csvnro, svconr??!!?

Answer»

Does anyone KNOW what these are?

Vcsron was installed during the time my pc was hit with viruses and spyware. I deleted it from my ADD/Remove program list, but "csvnro" appeared in its place. I deleted that one and then "svconr" appeared.

See the pattern? It basically reconfigs its letter patterns so we can't detect it.

Has anyone encountered these before? What is the danger level?

...

And yes, I know I already have a thread where Evilfantasy is helping me fix my infected pc and it's working. This is aim to GET more info on what these are if you must. Thanks in advanceLets get a look at whats going on.

Use the Kaspersky Online Scanner

  • Click Accept.
  • Answer Yes, when prompted to install an ActiveX component.
  • The program will then begin downloading the latest definition files.
  • Once the files have been downloaded click on NEXT
  • Locate the Scan Settings button & configure to:
    • Scan using the following Anti-Virus database:
      • Extended
    • Scan Options:
      • Scan Archives
      • Scan Mail Bases
      • Click OK & have it scan My Computer
      When the scan is done, in the Scan is complete window (below), any infection is displayed.
      There is no option to clean/disinfect, however, we need to analyze the information on the report.

      To obtain the report:
      Click on: Save Report As...



      • Next, in the Save as prompt, Save in area, select: Desktop.
      • In the File name area, use KScan, or something similar.
      • In Save as type: click the drop arrow and select: Text file [*.txt]
      • Then, click: Save


      Please copy and paste the Kaspersky Online Scanner Report in your next post.[/list]Ok, wish me luck. I hope it completes smoothly, unlike last time.Scan completed and everything's clean.

      Log attached

      [recovering space - attachment deleted by admin]Download PANDA Anti-Rootkit.zip

      Unzip it and run the PAVARK.exe file.

      Tick the box that says In depth scan and follow the on screen instructions.

      Let me know the results in your reply.

      PLease Note: Panda Antirootkit is not comaptible with Windows Vista.

      If you are running Vista, please download the AVG Antirootkit

      Run the scan and be sure to check mark the In depth scan.

      ----------

      Download Deckard's SYSTEM Scanner (DSS) and save it to your Desktop.
      • Close all other windows before proceeding.
      • Double-click on dss.exe and follow the prompts.
      • When it has finished, dss will open two Notepads main.txt and extra.txt
      • Add the contents of main.txt and extra.txt in your next reply.
      When I restart after selecting "in depth scan" for Pavark.exe, how does it work? Does it run automatically when I log in?

      I just ok'd for Winpatrol to add Pavark.exe to the startup list.
      Have you go tit running? Just follow the instructions, it will tell you everything.
      3913.

      Solve : AVG Free 7.5 uninstall problems?

      Answer»

      The AVG 7.5 anti-virus program I currently have on the computer will not UNINSTALL. I need it to be uninstall so I can add another program as I'm currently having virus problems.

      I tried going through the control panel and start menu to remove it....when I do I always get an error that says:

      Local machine: installation failed
      Initialization:
      Error: Checking of state of the item file avgcc.exe failed.


      File opening failed. %FILE% = "C:..Program Files..Grisoft..AVG7..avgcc.

      exe"
      Permission denied


      I even downloaded the program back to my computer, but I can't reinstall it because I get the same error.

      any ideas or help would be much appreciatedAssuming you're using the windows on your computer..

      Ok... let's have you check for errors and clean out some temp files first... after those are done, restart the system and try it again...

      First let's start by cleaning up all temporary files, you may use Disk Cleanup that comes with Windows or I prefer one called CCleaner found at [www.ccleaner.com] which does an even better job.

      Check your hard drive for file/system errors by running chkdsk. Open My Computer and right click on Local Disk C: selecting Properties, click the Tools tab and in the Error Checking area click the "Check now" button and select "Automatically fix file system errors". It will tell you that it can't test the drive right now and it will ask if you want to schedule it for the next system startup... select Yes. Restart your computer so that it can check the drive.

      Ok ... after having done that, tell us how it went.
      start >run > "regedit" > Find > "AVG" > delete

      C:/ > Program files > AVG > delete all files or as many as possible individually

      Install your new softwareQuote from: NOT ADMIN :P on April 20, 2008, 07:23:32 PM

      start >run > "regedit" > Find > "AVG" > delete

      C:/ > Program files > AVG > delete all files or as many as possible individually

      Install your new software

      I wouldn't do this, because if you did, all the registry keys would be left behind.I tried the disk cleaner and it failed and had to close. I ran the chkdsk and said to run it again with the f option. Didn't read more after that due to nagging pop ups.

      and yes i am still getting the AVG error.Quote
      as I'm currently having virus problems.

      Print these instructions out.

      1. Download SUPERAntiSpyware Free for Home Users:
      http://www.superantispyware.com/

      * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
      * An icon will be CREATED on your desktop. Double-click that icon to launch the program.
      * If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
      * Close SUPERAntiSpyware.

      Restart computer in Safe Mode.
      To ENTER Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

      * Open SUPERAntiSpyware.
      * Under "Configuration and Preferences", click the Preferences button.
      * Click the Scanning Control tab.
      * Under Scanner Options make sure the following are checked (leave all others unchecked):
      o Close browsers before scanning.
      o Scan for tracking cookies.
      o Terminate memory threats before quarantining.
      * Click the "Close" button to leave the control center screen.
      * Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
      * On the left, make sure you check C:\Fixed Drive.
      * On the right, under "Complete Scan", choose Perform Complete Scan.
      * Click "Next" to start the scan. Please be patient while it scans your computer.
      * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
      * Make sure everything has a checkmark next to it and click "Next".
      * A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
      * If asked if you want to reboot, click "Yes".
      * To retrieve the removal INFORMATION after reboot, launch SUPERAntispyware again.
      o Click Preferences, then click the Statistics/Logs tab.
      o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
      o If there are several logs, click the current dated log and press VIEW log. A text file will open in your default text editor.
      o Please copy and paste the Scan Log results in your next reply.
      * Click Close to exit the program.
      Post SUPERAntiSpyware log.

      RESTART COMPUTER!

      2. Download Malwarebytes' Anti-Malware: http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html to your desktop.

      * Double-click mbam-setup.exe and follow the prompts to install the program.
      * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
      * If an update is found, it will download and install the latest version.
      * Once the program has loaded, select Perform full scan, then click Scan.
      * When the scan is complete, click OK, then Show Results to view the results.
      * Be sure that everything is checked, and click Remove Selected.
      * When completed, a log will open in Notepad.
      * Post the log back here.

      The log can also be found here:
      C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
      Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

      RESTART COMPUTER!

      3. Download HijackThis:
      http://www.snapfiles.com/get/hijackthis.html
      Post HijackThis log.
      3914.

      Solve : Administrator has disable Task Manager?

      Answer»

      I read a previous answer to this problem. I have downloaded the suggested programs including Super AntiSpyware, Malewarebytes Anti-Maleware, HijackThis-renamed sniper.exe. I have logs and will attach. I have not been able to detect any virus or spyware currently in my system. This is probably left over from from a removed spyware.;
      Please help me get my taskmanager back under my control, thanks for the forum.

      SuperAntiSpyware Log:
      SUPERAntiSpyware Scan Log
      http://www.superantispyware.com


      [recovering space - attachment deleted by admin]Welcome to CH.

      I can see no indication of any antivirus software.
      Please install an antivirus before continuing.

      Install antiVirus Software
      It is very important that you have antivirus software running on your computer.
      This alone can save you a lot of trouble with malware now and in the future.
      Install a free AV before we go any further.
      Only install one.
      Avast! Home Free
      Avira AntiVir


      Once installed update the antivirus software
      It is imperative that you update your antivirus software at least once a week.
      The best SOLUTION is to enable automatic updates.
      Most AVs install with this option turned on.
      If you do not update your antivirus software then it will not be able to catch any of the new variants of malware that may come out.

      ----------

      Download SDFix.exe and save it to your Desktop.

      Double click SDFix.exe and it will extract the files to %systemdrive%
      (DRIVE that contains the Windows Directory, typically C:\SDFix)

      Please then reboot your computer in Safe Mode by doing the following:

      • Restart your computer
      • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
      • Instead of Windows loading as normal, the Advanced Options Menu should appear;
      • Select the first option, to run Windows in Safe Mode, then press Enter.
      • Choose your usual account.
      • Open the extracted SDFix folder and double click RunThis.bat to start the script.
      • TYPE Y to begin the cleanup process.
      • It will remove any TROJAN Services and Registry Entries that it finds then prompt you to press any key to Reboot.
      • Press any Key and it will restart the PC.
      • When the PC restarts the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
      • Once the desktop icons load the SDFix report will open on screen and also save into the SDFix folder as Report.txt
        (Report.txt will also be copied to Clipboard).
      • Finally add the CONTENTS of the Report.txt in your next post.
      .
      ----------

      Next post add
      SDFix log




      3915.

      Solve : java byte verify?

      Answer»

      I woke up this morning and both my anti virus and spy sweeper went nuts and I wasn't even online anyways the anti viru quarentined it. Has anyone had this beforeYou better....

      Print these instructions out.

      1. Download SUPERAntiSpyware Free for HOME Users:
      http://www.superantispyware.com/

      * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
      * An icon will be created on your desktop. Double-click that icon to launch the program.
      * If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
      * Close SUPERAntiSpyware.

      Restart computer in Safe Mode.
      To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

      * Open SUPERAntiSpyware.
      * Under "Configuration and Preferences", click the Preferences button.
      * Click the Scanning Control tab.
      * Under Scanner Options make sure the following are checked (leave all others unchecked):
      o Close browsers before scanning.
      o Scan for tracking cookies.
      o Terminate memory threats before quarantining.
      * Click the "Close" button to leave the control center screen.
      * Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
      * On the left, make sure you check C:\Fixed DRIVE.
      * On the right, under "Complete Scan", choose Perform Complete Scan.
      * Click "Next" to start the scan. Please be patient while it scans your computer.
      * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
      * Make sure everything has a checkmark next to it and click "Next".
      * A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "FINISH" button to return to the main menu.
      * If asked if you want to reboot, click "Yes".
      * To retrieve the removal information after reboot, launch SUPERAntispyware again.
      o Click Preferences, then click the Statistics/Logs tab.
      o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
      o If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
      o Please COPY and paste the Scan Log results in your next reply.
      * Click Close to exit the program.
      Post SUPERAntiSpyware log.

      RESTART COMPUTER!

      2. Download Malwarebytes' Anti-Malware: http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html to your desktop.

      * Double-click mbam-setup.exe and follow the prompts to install the program.
      * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
      * If an update is found, it will download and install the latest version.
      * Once the program has loaded, select Perform full scan, then click Scan.
      * When the scan is complete, click OK, then Show Results to view the results.
      * Be sure that everything is checked, and click Remove Selected.
      * When completed, a log will open in Notepad.
      * Post the log back here.

      The log can also be found here:
      C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
      Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

      RESTART COMPUTER!

      3. Download HijackThis:
      http://www.snapfiles.com/get/hijackthis.html
      Post HijackThis log.

      3916.

      Solve : Viruses and Adware?

      Answer»

      My DAUGHTER has a gateway laptop with XP. The sp1 has been downloaded and all updates for that. She has a big problem with the virus/worm.... BV:Malware-gen, Trojan horse, and a couple others. There is even a desktop wallpaper that takes over and appears. If you try to get rid of it it automatically sends you to the internet and a website to download a program to get rid of viruses and malicious spyware. Then when you get rid of it on the internet it keeps popping up every so often, again. This all started Saturday morning when a message came up and SAID SOMEONE was trying to access the computer.

      What can be done to get rid of it? Have tried everything I can think of to help her out!
      THANKS! Go through the steps here and post the required logs.
      Then one of our malware experts will be along to assist you.Quote from: Deerpark on April 21, 2008, 09:41:37 AM

      Go through the steps here and post the required logs.
      Then one of our malware experts will be along to assist you.

      I followed the directions that Deerpark gave but still have the problem.

      Here is one of the web addresses that comes up...ucleaner.com/main.php?wmd=MjI
      Here is only a part of another address that the internet goes to......Systemerrorfixer.com/clean/index.php?57520-d0d16- There is more web address disappeare before I could jot it all down.
      The wallpaper that takes over the desktop reads.....YOUR PRIVACY IS IN DANGER! DOWNLOAD PRIVACY PROTECTION SOFTWARE NOW

      And last but not least, the following are some things I was WONDERING if I should remove
      Brower Address Error Redirecor
      DVD Solution
      gtw_logo
      OneStepSearch 1.0 Build 166
      Power2go 4.0
      Power DVD

      Again THANKS for the attention given for this problem.
      Quote
      I followed the directions that Deerpark gave but still have the problem.

      Then you should have three logs to post. We need the logs to be able to see what to do next.
      3917.

      Solve : Cannot even see Control Panel...Loaded with restrictions?

      Answer»

      Hello evilfantacy,

      I have been running the MEM" test on Keri's COMPUTER for the last 20 hours. All is fine. ZERO errors. I will get her some more memory. I believe this once very sick computer has now come back to life, thanks to you.

      I sent you a long PM. I hope you got it. If not, please let me know.

      Dan
      Yes I think more memory will help to improve the performance.

      Haven't received the PM.Thanks evilfantacy.

      The memory is a must.

      I am re-sending the PM (it is a copy and paste from MS Word.) If it doesn't go thru this time perhaps you could e-mail me at [emailprotected] and I will do a reply that way.

      Thanks for all you have DONE,

      Dan and Keri
      evilfantacy,

      PM has been sent again. Please advise if you did or did not recieve it.

      db10

      3918.

      Solve : Avast ruined my pc?

      Answer» OK, so I just CALLED my pc manufacturer and they said that Avast has cleaned my whole pc off. I have nothing at all. The only way to get it back to working conditions is to recover it back to when I purchased it. Now I have to go to the shop and spend over $100 to see what they can do. This is just crazy. SORRY but Avast simply does NOT do that...ignore what the shop told you.
      Remove that HDD from that machine and jumper it as a slave drive and install it in a working machine preferably with the same ver. of Windows.
      Open Windows EXPLORER and you will probably see all your data intact.
      Copy and burn what you need to CD and i'd then suggest a clean re-install of XP.if you installed avast right, it shouldn't destroy your computer. So just get a new copy of the windows operating system onto your computer and it'll be fine.

      And install the avast or whatever programs before you do anything else then ...Quote
      if you installed avast right
      Right, or wrong, as patio said, it couldn't have happened.
      BTW...how do you install program wrong?i meant if you followed all the directions right and it didn't cause you any errors anytime in between.

      There's no technically WRONG way to install a program but to not follow any instructions program may have been giving you.What happen was the viruses attached themselves to my regular files. So when Avast started deleting the viruses, it took the files also.

      I spent the whole day calling circuit city, best buy etc. asking them how to get it fixed. All of them said I am going to have to restore it back to when I first bought it and they will try to transfer my files back to it or to a new pc.

      Luckly, I found a pc company here that will restore my pc back to when it was last good and install the anti-virus software for $100. Everywhere else was going to charge at least $400.

      I wish I was as SMART as you guys then I would Remove the HDD and all that stuff but I'd rather let a professional handle it.

      Thanks to everyone who tried to help me though. This day has been awful.$100 is not bad...Quote from: Broni on April 18, 2008, 11:25:31 PM
      $100 is not bad...

      $100 is not bad to get a new computer or what appears to be a computer that will work fine and nobody would've ever guessed it's been used before.

      I would suggest to invinciblejones that he disable windows firewall and install comodo firewall. And now, that your computer is supposedly clean, I would suggest you install the anti-virus immediately and get it updated and running before you touch anything else.

      3919.

      Solve : Ad-Aware 2008 BETA?

      Answer»

      I stopped using Ad-Aware a while BACK but it is still one of the most reliable adware removal tools there is. Looks like they are working on a new release.

      This is Beta software so it is to be used with caution at your own risk.

      Ad-Aware 2008 BETA Win XP/Vista
      Quote

      Redesigned Engine – Benefit from superior PROGRAM flexibility and more accurate scanning methods with all-new program architecture.

      Improved Code Sequence Identification (CSI) Technology – Boost your privacy protection with precise detection of embedded malware, including known and emerging threats.
      Incremental Definition File Updates – Save PRECIOUS time and resources with smaller update files resulting in faster download times.

      TrackSweep - Control privacy by erasing tracks left behind while surfing the Web on Internet Explorer, Firefox, and Opera, with one easy click.

      Multiple Browser Support – Choose Internet Explorer, Firefox, or Opera with expanded browser support.
      New Straightforward USER Interface – Effortlessly maneuver the complexities of malware detection and removal with our new user-friendly interface.

      User-Controlled Spyware Removal - DECIDE for yourself what to delete from your system and what to keep.
      Extensive Detection Database – Stay protected with regular updates from the extensive library of identified and analyzed spyware.

      System Restore Point – Easily revert back to your clean system to recover from a spyware attack.

      Limitations: Scan and remove only, must purchase for on live protection.

      Requires this Instalation key: 6DB04-PR6TJ-LN6N7-SGL2L-2N337 for the beta test

      If you would like to sign up directly for the Beta program Go Here
      it hanged up on my computer and appeared to run slowly but it's a beta so I didn't expect it to be perfect enough
      3920.

      Solve : Help! Malware Bytes, SuperAntispyware and Hijack this logs included?

      Answer»

      Well, you have to select, which threat, you're gonna stay in.Hey broni, since u have been very helpful, want to tell me how this new hijackthis log looks?

      Logfile of Trend Micro HijackThis v2.0.2
      Scan saved at 10:32:37 PM, on 5/5/2008
      Platform: Windows XP SP2 (WinNT 5.01.2600)
      MSIE: Internet Explorer v7.00 (7.00.6000.16640)
      Boot mode: Normal

      Running processes:
      C:\WINDOWS\System32\smss.exe
      C:\WINDOWS\system32\winlogon.exe
      C:\WINDOWS\system32\services.exe
      C:\WINDOWS\system32\lsass.exe
      C:\WINDOWS\system32\svchost.exe
      C:\WINDOWS\System32\svchost.exe
      C:\WINDOWS\system32\LEXBCES.EXE
      C:\WINDOWS\system32\spoolsv.exe
      C:\WINDOWS\system32\LEXPPS.EXE
      C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
      C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\GUARD.exe
      C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
      C:\WINDOWS\system32\nvsvc32.exe
      C:\WINDOWS\System32\svchost.exe
      C:\PROGRA~1\AVG\AVG8\avgemc.exe
      C:\WINDOWS\BCMSMMSG.exe
      C:\Program Files\Lexmark X74-X75\lxbbbmgr.exe
      C:\Program Files\iTunes\iTunesHelper.exe
      C:\Program Files\Lexmark X74-X75\lxbbbmon.exe
      C:\PROGRA~1\AVG\AVG8\avgtray.exe
      C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
      C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
      C:\WINDOWS\system32\ctfmon.exe
      C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
      C:\Program Files\iPod\bin\iPodService.exe
      C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
      C:\WINDOWS\explorer.exe
      C:\Program Files\AIM6\aim6.exe
      C:\Program Files\AIM6\aolsoftware.exe
      C:\Program Files\AVG\AVG8\avgrsx.exe
      C:\Program Files\AVG\AVG8\avgrsx.exe
      C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

      R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
      R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
      R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
      R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://dslstart.verizon.net
      R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
      R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
      R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
      O3 - Toolbar: AVG Security Toolbar - {A057A204-BACC-4D26-9990-79A187E2698E} - C:\PROGRA~1\AVG\AVG8\AVGTOO~1.DLL
      O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
      O4 - HKLM\..\Run: [UpdReg] C:\WINDOWS\UpdReg.EXE
      O4 - HKLM\..\Run: [BCMSMMSG] BCMSMMSG.exe
      O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
      O4 - HKLM\..\Run: [Lexmark X74-X75] "C:\Program Files\Lexmark X74-X75\lxbbbmgr.exe"
      O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
      O4 - HKLM\..\Run: [OM2_Monitor] "C:\Program Files\OLYMPUS\OLYMPUS Master 2\FirstStart.exe" /OM
      O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
      O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
      O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
      O4 - HKCU\..\Run: [Aim6] "C:\Program Files\AIM6\aim6.exe" /d locale=en-US ee://aol/imApp
      O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
      O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
      O4 - HKCU\..\Run: [OM2_Monitor] "C:\Program Files\OLYMPUS\OLYMPUS Master 2\MMonitor.exe" -NoStart
      O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
      O4 - HKUS\S-1-5-18\..\Run: [ALUAlert] C:\Program Files\Symantec\LiveUpdate\ALUNotify.exe (User 'SYSTEM')
      O4 - HKUS\.DEFAULT\..\Run: [ALUAlert] C:\Program Files\Symantec\LiveUpdate\ALUNotify.exe (User 'Default user')
      O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
      O4 - Global Startup: Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
      O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
      O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
      O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
      O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\AIM95_c1\aim.exe
      O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
      O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
      O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\WINDOWS\System32\shdocvw.dll
      O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\WINDOWS\System32\shdocvw.dll
      O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5) - http://upload.facebook.com/controls/FacebookPhotoUploader5.cab
      O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx2.hotmail.com/mail/w2/resources/MSNPUpld.cab
      O16 - DPF: {A90A5822-F108-45AD-8482-9BC8B12DD539} (Crucial cpcScan) - http://www.crucial.com/controls/cpcScanner.cab
      O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
      O20 - AppInit_DLLs: avgrsstx.dll
      O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
      O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
      O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
      O23 - Service: AVG8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exe
      O23 - Service: AVG8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
      O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe
      O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
      O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
      O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

      --
      End of file - 6485 bytesI'm assuming evilfantasy was helpful, as well?
      The log is clean.Yes, both yourself and evilfantasy have bee VERY helpufl....... and this BEIN ur second time helping me haha Thank you so much, my girlfriend also thanks you One more step...

      1. Download, and install CCleaner: http://www.ccleaner.com/download/builds. Get "Slim" version.
      Read CCleaner INSTRUCTION here: http://www.jahewi.nl/ccleaner/ccleaner.html.
      Run CCleaner.

      2. Turn off System Restore:

      - Windows XP:
      1. Click Start.
      2. Right-click the My Computer icon, and then click Properties.
      3. Click the System Restore tab.
      4. Check "Turn off System Restore".
      5. Click Apply.
      6. When turning off System Restore, the existing restore points will be deleted. Click Yes to do this.
      7. Click OK.
      - Windows Vista:
      1. Click Start.
      2. Right-click the Computer icon, and then click Properties.
      3. Click on System Protection under the Tasks column on the left side
      4. Click on Continue on the "User Account Control" window that pops up
      5. Under the System Protection tab, find Available Disks
      6. Uncheck the box for any drive you wish to disable system restore on (in most cases, drive "C:")
      7. When turning off System Restore, the existing restore points will be deleted. Click "Turn System Restore Off" on the popup window to do this.
      8. Click OK

      3. Restart computer.

      4. Turn System Restore on.
      Ok thank you ill have to run that next time im at my girlfriend's house..... didnt teach her too much yet lol so ill do it tomorro..... thank you You have to try HARDER to teach your girlfriend Eh..... shes not worth it...... haha just kidding, she will kill me if she saw that..... but also, i tried to uninstall symnetac or whatever it is called that is part of norton, but it says its with norton. I had uninstalled norton completely, but in add/remove programs, it shows norton there, but no option to actually remove it.....It's most likely dead/empty entry. SEE here: http://www.majorgeeks.com/AddRemove_Program_Cleaner_d5111.html

      3921.

      Solve : virus has took over my computer?

      Answer»

      I will try to explain ,every thing I click on my windows 2000 pro, says file cannot be FOUND,all I can access is the,control panel,and documents.I have trojan remover on it which failed to remove it,I have a-sguared also,I cannot access ANYONE them,I even TRIED to down load new antivirus ,called combofix,it said access to files or folders denied.what can I do,I can download nothing to try to remove it? Thanks for your time KenI'd suggest clean Windows reinstall.before complete clean windows reinstall, try booting windows to the safe MODE with networking and then going to some site like TrendMicro Housecall or Bitdefender free scan or panda active scan and get a check out.

      Maybe it would detect virus or infection(s) and clean it out......


      OTHERWISE you should get clean window install if nothing else happens the way it should.

      3922.

      Solve : Infection?

      Answer»

      Hi Guys,

      I have a laptop which has multiple infected files. I've run the scans as requested and attached them below...

      Cheers

      Nick

      [recovering space - attachment deleted by admin]Did you're virus scan remove those infections?Open Hijackthis and select Do a system scan only then place a check mark next to

      - O2 - BHO: (no name) - {3cab59b4-55a3-4737-9fd5-b93c6430bf75} - C:\WINDOWS\system32\mlhtjoxf.dll
      - O2 - BHO: (no name) - {8e1bfc0e-8ad2-424d-ac8a-06038481516e} - (no file)
      - O2 - BHO: (no name) - {ac4600c0-3418-4dfc-a670-e7feee88a80f} - (no file)
      - O20 - Winlogon Notify: awtsTMfF - awtsTMfF.dll (file missing)

      Close all windows except for Hijackthis and click Fix checked.

      ----------

      Please download Malwarebytes' Anti-Malware (MBAM) to your desktop from either of these two links.

      • Double-click mbam-setup.exe and follow the prompts to install the program.
      • At the end, be sure a checkmark is PLACED next to
        • Update Malwarebytes' Anti-Malware
        • Launch Malwarebytes' Anti-Malware
        • Click Finish.
        • If an update is found, it will download and install the latest version.
        • Once the program has loaded, select PERFORM full scan, then click Scan.
        • When the scan is complete, click OK, then Show Results to view the results.
        • Be sure that everything is checked, and click Remove Selected.
        • When completed, a log will open in Notepad.
        • Please copy and paste the log into your next reply
        .
        ----------

        Next post
        MBAM log
        NEW Hijackthis logHi,

        Thanks for your help.

        I deleted the items from Hijack This, then I did a scan using MBAM. It found quite a few things, so I had it remove everything, then did a reboot.

        I NOTICED that the anti virus was still finding infected files in the system restore folder, so I disabled system restore, then rebooted.

        I was also getting an error message when booting up:

        RUNDLL
        Error loading C:\WINDOWS\System32\wldibtay.dll
        The specified module could not be found

        I'm not sure what this refers to, so I opened MSCONFIG and disabled wldibtay.dll in startup.

        I ran the scan with MBAM again and then scanned with Hijack This again. I have attached both MBAM logs and the new Hijack This log.

        Cheers

        Nick

        [recovering space - attachment deleted by admin]Hello, sorry it has taken so long for me to get back to this.

        If you still need help then please post a new Hijackthis log. Thanks.I think everything is SORTED on this one. Thanks for you help - I'll repost if I have any more issues with it.
        3923.

        Solve : How to stop random nternet sites from popping up?

        Answer»

        Please download Vundofix.exe to your desktop.
        Double-click VundoFix.exe to run it.
        * Click the Scan for Vundo button.
        * Once it's done scanning, click the Remove Vundo button.
        * You will receive a prompt asking if you want to remove the files, click YES.
        * Once you click yes, your desktop will go blank as it starts REMOVING Vundo.
        * When completed, it will prompt that it will shutdown your computer, click OK.
        * Turn your computer back on.
        * Please post the contents of C:\vundofix.txt

        Note: It is possible that VundoFix encountered a file it could not remove. In this case, VundoFix will run on reboot, simply follow the above instructions starting from "Click the Scan for Vundo button" when VundoFix appears at reboot.

        Please let Vundo finish, sometimes it can take multiple passesEvilfantasy, I've been having the same trouble recently... I've renewed my Norton Internet Security subscription and tried Windows Defender and neither have yet to work..Hi mariog.

        Please START a new thread with the below information in it.

        In order to help you clean any MALWARE on the computer we will need some more information from you and about the computer. Please go to this thread and read the instructions for posting the required logs.

        Once the logs are POSTED a malware SPECIALIST will be along to assist you in further removal instructions.

        3924.

        Solve : I need help removing 02 - BHO files! From HijackThis?

        Answer»

        Looks fine. How is everything now?Workin better than ever Thank you so much, ALONG with Broni, who have helped my girlfreind's computer.... she says THATNK you as WELL you have been a GREAT help

        3925.

        Solve : Virus has my computer froze?

        Answer»

        my latest hijack log

        Logfile of Trend Micro HijackThis v2.0.2
        Scan saved at 9:06:18 PM, on 5/5/2008
        Platform: Windows XP SP2 (WinNT 5.01.2600)
        MSIE: Internet Explorer v7.00 (7.00.6000.16640)
        Boot mode: Normal

        Running processes:
        C:\WINDOWS\System32\smss.exe
        C:\WINDOWS\system32\csrss.exe
        C:\WINDOWS\system32\winlogon.exe
        C:\WINDOWS\system32\services.exe
        C:\WINDOWS\system32\lsass.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\system32\svchost.exe
        C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
        C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
        C:\WINDOWS\system32\LEXBCES.EXE
        C:\WINDOWS\system32\spoolsv.exe
        C:\WINDOWS\system32\LEXPPS.EXE
        C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
        C:\WINDOWS\system32\cisvc.exe
        C:\Program Files\Norton AntiVirus\navapsvc.exe
        C:\WINDOWS\system32\svchost.exe
        C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
        C:\WINDOWS\Explorer.EXE
        C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
        C:\Program Files\Common Files\Symantec Shared\ccApp.exe
        C:\WINDOWS\zHotkey.exe
        C:\WINDOWS\SOUNDMAN.EXE
        C:\WINDOWS\ALCWZRD.EXE
        C:\Program Files\Enigma Software Group\SpyHunter\SpyHunter3.exe
        C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
        C:\WINDOWS\system32\ctfmon.exe
        C:\Program Files\Messenger\msmsgs.exe
        C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
        C:\WINDOWS\System32\alg.exe
        C:\WINDOWS\system32\wbem\wmiprvse.exe
        C:\Program Files\Norton AntiVirus\SAVScan.exe
        C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

        R0 - HKCU\Software\Microsoft\Internet Explorer\Main,START Page = http://www.yahoo.com/
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
        R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com
        R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Windows Internet Explorer provided by Yahoo!
        R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn2\yt.dll
        O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn2\yt.dll
        O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
        O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
        O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
        O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
        O2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
        O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
        O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn2\yt.dll
        O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
        O4 - HKLM\..\Run: [High Definition Audio Property Page Shortcut] HDAudPropShortcut.exe
        O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
        O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
        O4 - HKLM\..\Run: [CHotkey] zHotkey.exe
        O4 - HKLM\..\Run: [ShowWnd] ShowWnd.exe
        O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
        O4 - HKLM\..\Run: [AlcWzrd] ALCWZRD.EXE
        O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
        O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
        O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
        O4 - HKLM\..\Run: [SpyHunter Security Suite] C:\Program Files\Enigma Software Group\SpyHunter\SpyHunter3.exe
        O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
        O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
        O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
        O4 - HKUS\S-1-5-18\..\RunOnce: [RunNarrator] Narrator.exe (User 'SYSTEM')
        O4 - HKUS\.DEFAULT\..\RunOnce: [RunNarrator] Narrator.exe (User 'Default user')
        O4 - Global Startup: Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
        O8 - Extra CONTEXT menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
        O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
        O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
        O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
        O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
        O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
        O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
        O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
        O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
        O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
        O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
        O14 - IERESET.INF: START_PAGE_URL=http://www.gateway.com
        O16 - DPF: {11260943-421B-11D0-8EAC-0000C07D88CF} (iPIX ActiveX Control) - http://www.ipix.com/download/ipixx.cab
        O16 - DPF: {2D8ED06D-3C30-438B-96AE-4D110FDC1FB8} (ActiveScan 2.0 Installer Class) - http://acs.pandasoftware.com/activescan/cabs/as2stubie.cab
        O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
        O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://www1.snapfish.com/SnapfishActivia.cab
        O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1191771137488
        O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} (Java Runtime Environment 1.6.0) - http://sdlc-esd.sun.com/ESD40/JSCDL/jre/6u5-b19/jinstall-6u5-windows-i586-jc.cab?AuthParam=1210039020_b17417888ee118449a3f19c339fb1b9c&GroupName=JSC&BHost=javadl.sun.com&FilePath=/ESD40/JSCDL/jre/6u5-b19/jinstall-6u5-windows-i586-jc.cab&File=jinstall-6u5-windows-i586-jc.cab
        O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~3\GOEC62~1.DLL
        O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
        O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
        O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
        O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
        O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
        O23 - Service: GoogleDesktopManager - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
        O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
        O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
        O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
        O23 - Service: Kodak Camera Connection Software (KodakCCS) - EASTMAN Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
        O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
        O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
        O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
        O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
        O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
        O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe

        --
        End of file - 9677 bytes
        HJT log is clean

        1. Download, and install CCleaner: http://www.ccleaner.com/download/builds. Get "Slim" version.
        Read CCleaner instruction here: http://www.jahewi.nl/ccleaner/ccleaner.html.
        Run CCleaner.

        2. Turn off System RESTORE:

        - Windows XP:
        1. Click Start.
        2. Right-click the My Computer icon, and then click Properties.
        3. Click the System Restore tab.
        4. Check "Turn off System Restore".
        5. Click Apply.
        6. When turning off System Restore, the existing restore points will be deleted. Click Yes to do this.
        7. Click OK.
        - Windows Vista:
        1. Click Start.
        2. Right-click the Computer icon, and then click Properties.
        3. Click on System Protection under the Tasks column on the left side
        4. Click on Continue on the "User Account Control" window that pops up
        5. Under the System Protection tab, find Available Disks
        6. Uncheck the box for any drive you wish to disable system restore on (in most cases, drive "C:")
        7. When turning off System Restore, the existing restore points will be deleted. Click "Turn System Restore Off" on the popup window to do this.
        8. Click OK

        3. Restart computer.

        4. Turn System Restore on.

        5. Let me know, how your computer is doing.
        So far so good. Thank you so much, I really appreciate it.You're welcome
        Happy COMPUTING.

        3926.

        Solve : Strange things happening?

        Answer»

        Over the past few days i have been having PROBLEMS ,with OUTLOOK express
        and icons off my desk top disapearing
        windows xp pro,
        Could you check my log please
        Logfile of HijackThis v1.99.1
        Scan saved at 11:55:48, on 12/04/2008
        Platform: Windows XP SP2 (WinNT 5.01.2600)
        MSIE: Internet Explorer v7.00 (7.00.6000.16640)

        Running processes:
        C:\WINDOWS\System32\smss.exe
        C:\WINDOWS\system32\winlogon.exe
        C:\WINDOWS\system32\services.exe
        C:\WINDOWS\system32\lsass.exe
        C:\WINDOWS\system32\svchost.exe
        C:\Program Files\PC Tools Firewall Plus\FWService.exe
        C:\WINDOWS\System32\svchost.exe
        C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
        C:\WINDOWS\Explorer.EXE
        C:\WINDOWS\system32\brsvc01a.exe
        C:\WINDOWS\system32\brss01a.exe
        C:\WINDOWS\system32\spoolsv.exe
        C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
        C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
        C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
        C:\Program Files\PCPal\PCPalSrvHost.exe
        C:\Program Files\SiteAdvisor\6253\SAService.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\system32\keyhook.exe
        C:\Program Files\SiteAdvisor\6253\SiteAdv.exe
        C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
        C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
        C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe
        C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\system32\ctfmon.exe
        C:\WINDOWS\System32\svchost.exe
        C:\Documents and Settings\Windows XP\Local Settings\Temporary Internet Files\Content.IE5\F5IMGDUJ\VundoFix[1].exe
        C:\Program Files\Internet Explorer\IEXPLORE.EXE
        C:\Program Files\HijackThis\HijackThis.exe

        R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.sky.com
        R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.sky.com/portal/site/skycom/home?&lid=GLOBALNAV_SKY_COM&lpos=GLOBAL_NAV
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
        R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
        R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
        R3 - URLSearchHook: YAHOO! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
        F2 - REG:system.ini: UserInit=userinit.exe,
        O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
        O2 - BHO: (no name) - {089FD14D-132B-48FC-8861-0048AE113215} - C:\Program Files\SiteAdvisor\6253\SiteAdv.dll
        O2 - BHO: SearchGT - {684B7DF7-51DE-4852-ACF8-7BA3934D9BD1} - C:\Program Files\SearchGT\SearchGTShell.dll
        O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
        O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
        O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\3.0.1225.9868\swg.dll
        O3 - Toolbar: McAfee SiteAdvisor - {0BF43445-2F28-4351-9252-17FE6E806AA0} - C:\Program Files\SiteAdvisor\6253\SiteAdv.dll
        O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
        O4 - HKLM\..\Run: [SiS Windows KeyHook] C:\WINDOWS\system32\keyhook.exe
        O4 - HKLM\..\Run: [SiteAdvisor] C:\Program Files\SiteAdvisor\6253\SiteAdv.exe
        O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
        O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
        O4 - HKLM\..\Run: [00PCTFW] "C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe" -s
        O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
        O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
        O8 - Extra context menu item: Add to Windows &Live Favorites - http://favorites.live.com/quickadd.aspx
        O8 - Extra context menu item: E&xport to Microsoft Excel - RES://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
        O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
        O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
        O9 - Extra button: Sky - {08E730A4-FB02-45BD-A900-01E4AD8016F6} - C:\WINDOWS\System32\shdocvw.dll
        O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
        O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
        O11 - Options group: [INTERNATIONAL] International*
        O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
        O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
        O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.6) - http://housecall65.trendmicro.com/housecall/applet/html/native/x86/win32/activex/hcImpl.cab
        O16 - DPF: {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} (OnlineScanner Control) - http://www.eset.eu/buxus/docs/OnlineScanner.cab
        O16 - DPF: {A90A5822-F108-45AD-8482-9BC8B12DD539} (Crucial cpcScan) - http://crucial.com/controls/cpcScanner.cab
        O18 - Protocol: siteadvisor - {3A5DC592-7723-4EAA-9EE6-AF4222BCF879} - C:\Program Files\SiteAdvisor\6253\SiteAdv.dll
        O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
        O20 - AppInit_DLLs:
        O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
        O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
        O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
        O23 - Service: ASP.NET State Service (aspnet_state) - Unknown owner - C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\aspnet_state.exe (file missing)
        O23 - Service: AutoExNT - Unknown owner - C:\WINDOWS\system32\AutoExNT.Exe
        O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
        O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
        O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
        O23 - Service: BrSplService (Brother XP spl Service) - brother Industries Ltd - C:\WINDOWS\system32\brsvc01a.exe
        O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
        O23 - Service: PCPalSrvHost - Unknown owner - C:\Program Files\PCPal\PCPalSrvHost.exe
        O23 - Service: PC Tools Firewall Plus (PCToolsFirewallPlus) - PC Tools - C:\Program Files\PC Tools Firewall Plus\FWService.exe
        O23 - Service: SiteAdvisor Service - Unknown owner - C:\Program Files\SiteAdvisor\6253\SAService.exe
        O23 - Service: Spyware Terminator Clam Service (sp_clamsrv) - Crawler.com - C:\Program Files\WinClamAVShield\sp_clamsrv.exe
        This is outdated HJT version.
        Download HijackThis from here:
        http://www.trendsecure.com/portal/en-US/tools/security_tools/hijackthis/download
        Click on Download HijackThis Installer
        sorry for the delay isp not been working

        Logfile of Trend Micro HijackThis v2.0.2
        Scan saved at 12:27:50, on 20/04/2008
        Platform: Windows XP SP2 (WinNT 5.01.2600)
        MSIE: Internet Explorer v7.00 (7.00.6000.16640)
        Boot mode: Normal

        Running processes:
        C:\WINDOWS\System32\smss.exe
        C:\WINDOWS\system32\csrss.exe
        C:\WINDOWS\system32\winlogon.exe
        C:\WINDOWS\system32\services.exe
        C:\WINDOWS\system32\lsass.exe
        C:\WINDOWS\system32\svchost.exe
        C:\Program Files\PC Tools Firewall Plus\FWService.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\System32\svchost.exe
        C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
        C:\WINDOWS\Explorer.EXE
        C:\WINDOWS\system32\brsvc01a.exe
        C:\WINDOWS\system32\brss01a.exe
        C:\WINDOWS\system32\spoolsv.exe
        C:\WINDOWS\system32\keyhook.exe
        C:\Program Files\SiteAdvisor\6253\SiteAdv.exe
        C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
        C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe
        C:\WINDOWS\system32\ctfmon.exe
        C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
        C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
        C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
        C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
        C:\Program Files\PCPal\PCPalSrvHost.exe
        C:\Program Files\SiteAdvisor\6253\SAService.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\System32\alg.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\System32\svchost.exe
        C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
        C:\WINDOWS\System32\wbem\wmiprvse.exe

        R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.sky.com
        R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.sky.com/portal/site/skycom/home?&lid=GLOBALNAV_SKY_COM&lpos=GLOBAL_NAV
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
        R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
        R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
        R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
        R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
        F2 - REG:system.ini: UserInit=userinit.exe,
        O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
        O2 - BHO: (no name) - {089FD14D-132B-48FC-8861-0048AE113215} - C:\Program Files\SiteAdvisor\6253\SiteAdv.dll
        O2 - BHO: SearchGT - {684B7DF7-51DE-4852-ACF8-7BA3934D9BD1} - C:\Program Files\SearchGT\SearchGTShell.dll
        O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
        O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
        O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\3.0.1225.9868\swg.dll
        O3 - Toolbar: McAfee SiteAdvisor - {0BF43445-2F28-4351-9252-17FE6E806AA0} - C:\Program Files\SiteAdvisor\6253\SiteAdv.dll
        O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
        O4 - HKLM\..\Run: [SiS Windows KeyHook] C:\WINDOWS\system32\keyhook.exe
        O4 - HKLM\..\Run: [SiteAdvisor] C:\Program Files\SiteAdvisor\6253\SiteAdv.exe
        O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
        O4 - HKLM\..\Run: [00PCTFW] "C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe" -s
        O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
        O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
        O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'LOCAL SERVICE')
        O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
        O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'NETWORK SERVICE')
        O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SYSTEM')
        O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'Default user')
        O8 - Extra context menu item: Add to Windows &Live Favorites - http://favorites.live.com/quickadd.aspx
        O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
        O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
        O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
        O9 - Extra button: Sky - {08E730A4-FB02-45BD-A900-01E4AD8016F6} - C:\WINDOWS\System32\shdocvw.dll
        O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
        O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
        O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
        O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
        O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.6) - http://housecall65.trendmicro.com/housecall/applet/html/native/x86/win32/activex/hcImpl.cab
        O16 - DPF: {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} (OnlineScanner Control) - http://www.eset.eu/buxus/docs/OnlineScanner.cab
        O16 - DPF: {A90A5822-F108-45AD-8482-9BC8B12DD539} (Crucial cpcScan) - http://crucial.com/controls/cpcScanner.cab
        O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
        O20 - AppInit_DLLs:
        O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
        O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
        O23 - Service: ASP.NET State Service (aspnet_state) - Unknown owner - C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\aspnet_state.exe (file missing)
        O23 - Service: AutoExNT - Unknown owner - C:\WINDOWS\system32\AutoExNT.Exe
        O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
        O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
        O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
        O23 - Service: BrSplService (Brother XP spl Service) - brother Industries Ltd - C:\WINDOWS\system32\brsvc01a.exe
        O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
        O23 - Service: PCPalSrvHost - Unknown owner - C:\Program Files\PCPal\PCPalSrvHost.exe
        O23 - Service: PC Tools Firewall Plus (PCToolsFirewallPlus) - PC Tools - C:\Program Files\PC Tools Firewall Plus\FWService.exe
        O23 - Service: SiteAdvisor Service - Unknown owner - C:\Program Files\SiteAdvisor\6253\SAService.exe
        O23 - Service: Spyware Terminator Clam Service (sp_clamsrv) - Crawler.com - C:\Program Files\WinClamAVShield\sp_clamsrv.exe
        O24 - Desktop Component 0: (no name) - http://f.screensavers.com/migration/wp/bottlenosedolphins_215.gif
        O24 - Desktop Component 1: (no name) - http://www.screensavers.com/Dlg/images/rclick_wp.gif
        O24 - Desktop Component 2: (no name) - http://www.screensavers.com/Dlg/img/button_next.gif
        O24 - Desktop Component 3: (no name) - http://www.glyphlab.com/img/highlights.jpg
        O24 - Desktop Component 4: (no name) - http://www.pctools.com/res/images/sd/title_rm_3.gif
        O24 - Desktop Component 5: (no name) - http://pic.photobucket.com/logos/PbLogo.170.g.gif
        O24 - Desktop Component 6: (no name) - https://a248.e.akamai.net/sec.yimg.com/i/my/accnt4.gif

        --
        End of file - 8073 bytes
        Open HJT, and checkmark following line:
        - O20 - AppInit_DLLs:
        Click "Fix checked".

        Other, then that, HJT log is clean.
        You may a double antivirus problem. You're running AVG, and also Spyware Terminator Clam Service, which is also antivirus part of Spyware Terminator.
        Open Spyware Terminator, and disable Clam Service.

        3927.

        Solve : AVG Free 8.0 download problem?

        Answer»

        Hello Forum. I have tried twice to download the new AVG 8.0 Free software program from Download.com. (45.5 MB) Both times the download reached a point where it gave me an error message in a dialog box saying that " CRC failed in files.dat Unexpected end of archive " On my first attempt to download I got the message early on . After about 2 megs were downloaded. I tried again and on the 2nd attempt I got as far as 37megs downloaded before I got the same message. I have dialup so you know how long I had been downloading.( 3hours) All in vain.
        So... what to do? Stay with AVG 7.5? No more updates after 5-31-08. Should I REMOVE 7.5 and try again.? Is there another freeware anti-virus program I can download. I have WIN XP IE6 . 80% free disk space. 512 MB RAM. Never had any problems with AVG 7.5 Everything is up to date. Just can't download the new edition 8.0. Also this question: Even if there are no auto updates with AVG 7.5 is it still possible to go to AVG site and manually download updates for AVG 7.5 after 5-31-08? Just as I still do with Ad-Aware SE. I would appreciate any responses. Thank You.Check this site: http://forum.grisoft.cz/freeforum/Try different sites:
        http://free.grisoft.com/
        http://www.majorgeeks.com/download886.html
        http://www.filehippo.com/download_avg_antivirus/Thanks for replies. I went to AVG Forum and found more than a few people who had a problem downloading AVG Free 8.0. Most questions were not answered on their forum. The moderator spent more time chastising those seeking help for one thing or another. No help there. I will try another down load site as suggested. I am wary about uninstalling 7.5 first, since many on the AVG forum said they had done that and still could not download AVG 8.0 . They downloaded another free anti-virus program called Avast. Question: Must I uninstall 7.5 before downloading 8.0 ? And is Avast a good anti-virus program? Are there any other good freeware programs out there. I don't really want to buy MacAfee or Norton. EVERYBODY I know who uses them has slowdown problems. Thanks again for the help.Quote

        I am wary about uninstalling 7.5 first, since many on the AVG forum said they had done that and still could not download AVG 8.0 . They downloaded another free anti-virus program called Avast.

        I'm one of them.

        My opinion 'was' AVG and Avast were the best. I am now down to Avast. I couldn't wait to figure out why it wouldn't download. You have to have an antivirus.

        Look here http://www.av-comparatives.org Avast tops the list. The free version has the same detection rate and database as the Pro version so don't worry about there being any difference in the free and paid version giving you protection. Stay away from McAfee, or Norton.
        No, you don't have to uninstall 7.5, while downloading 8.0.
        Yes, you have to uninstall 7.5, before installing 8.0.
        Avast is very good program.
        I'm considering switching to it, if AVG won't fix their problem by the end of the month.Hello Forum. Thanks for all your replies and help. Here is what I did. I went to majorgeeks.com as advised. I downloaded and saved AVG 8.0(45.5 mb) to desktop. It downloaded without any problem. No error messages as twice before. Then I opened it and ran it from desktop. It completely installed without a hitch. (miracle?)At that point AVG 7.5 disappeared from system tray and Windows could not locate it with its flashlight. I presume the 8.0 installer must have uninstalled it. I LOOKED in program list and 7.5 folder was there but it had 0 bytes. It is now in recycle bin. AVG 8.0 is now entered on program list. All OK so far. I downloaded the latest updates etc. and ran 8.0. It took 45 min to scan the whole computer. It did find 199 items including 5 or 6 Trojans. I never got a warning about Trojans with 7.5. So..I will play it by ear for now. If I have any problems I will go to Avast as you have recommended. Again, thanks for all your help. It is appreciated.Thats quite a few items to be found and could explain why you were having problems installing it to start with. You could post a HJT log so we can make sure everything nasty is actually gone.


        Download and rename HijackThis (HJT)
        • Double-click on HJTInstall.
        • Click on the Install button.
        • It will automatically place HJT in C:\Program Files\TrendMicro\HijackThis\HijackThis.exe.
        • Upon install, HijackThis should open for you.
          • Close HijackThis and rename it.
          • Go to C:\Program Files\Trend Micro\HijackThis.exe
          • Right click on HijackThis.exe and select Rename.
          • Type in sniper.exe and press Enter.
          • Right-click on sniper.exe and select Send To > Desktop (create shortcut)
        • From the desktop open Hijackthis.
        • If using Windows Vista, Right-click and Run As Administrator.
        • Click on the Do a system scan and save a log file button
        • Hijackthis will scan and then a log will open in notepad.
        • Copy and then paste the entire contents of the log in your post.
          • Do not have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.
          Although we have renamed Hijackthis to sniper, we will still refer to it as Hijackthis or HJT.
        OK ,evilfantasy, I will download it and follow your procedures and get back with a post. I have never used HJT before and am not sure exactly what it does other than identify entries in programs. But I will do it and get back with a post. Thanks for your help.HLogfile of Trend Micro HijackThis v2.0.2
        Scan saved at 2:30:31 PM, on 5/3/2008
        Platform: Windows XP SP2 (WinNT 5.01.2600)
        MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
        Boot mode: Normal

        Running processes:
        C:\WINDOWS\System32\smss.exe
        C:\WINDOWS\system32\winlogon.exe
        C:\WINDOWS\system32\services.exe
        C:\WINDOWS\system32\lsass.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\system32\spoolsv.exe
        C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
        C:\Program Files\Dell Support Center\bin\sprtsvc.exe
        C:\Program Files\Viewpoint\Common\ViewpointService.exe
        C:\WINDOWS\Explorer.EXE
        C:\WINDOWS\system32\hkcmd.exe
        C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
        C:\Program Files\Intel\Modem Event Monitor\IntelMEM.exe
        C:\Program Files\Dell\Media Experience\PCMService.exe
        C:\Program Files\MusicMatch\MusicMatch Jukebox\mmtask.exe
        C:\WINDOWS\system32\dla\tfswctrl.exe
        C:\PROGRA~1\AVG\AVG8\avgtray.exe
        C:\Program Files\NetZero\exec.exe
        C:\Program Files\Dell Support Center\bin\sprtcmd.exe
        C:\Program Files\SpywareGuard\sgmain.exe
        C:\Program Files\SpywareGuard\sgbhp.exe
        C:\PROGRA~1\AVG\AVG8\avgrsx.exe
        C:\PROGRA~1\AVG\AVG8\avgemc.exe
        C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
        C:\Program Files\NetZero\exec.exe
        C:\Program Files\Internet Explorer\iexplore.exe
        C:\Program Files\Internet Explorer\IEXPLORE.EXE
        C:\Program Files\Trend Micro\sniper.exe\HijackThis.exe

        R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell4me.com/myway
        R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://my.netzero.net/s/search?r=minisearch
        R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
        R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.dell4me.com/myway
        R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://my.netzero.net/s/search?r=minisearch
        R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://my.netzero.net/s/search?r=minisearch
        R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.dell4me.com/myway
        R3 - URLSearchHook: URLSearchHook Class - {37D2CDBF-2AF4-44AA-8113-BD0D2DA3C2B8} - C:\Program Files\NetZero\SearchEnh1.dll
        O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
        O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll
        O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
        O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
        O3 - Toolbar: ZeroBar - {F5735C15-1FB2-41FE-BA12-242757E69DDE} - C:\Program Files\NetZero\toolbar.dll
        O3 - Toolbar: (no name) - {40D41A8B-D79B-43d7-99A7-9EE0F344C385} - (no file)
        O3 - Toolbar: ZeroBar - {F0F8ECBE-D460-4B34-B007-56A92E8F84A7} - C:\Program Files\NetZero\Toolbar.dll
        O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
        O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
        O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
        O4 - HKLM\..\Run: [IntelMeM] C:\Program Files\Intel\Modem Event Monitor\IntelMEM.exe
        O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Dell\Media Experience\PCMService.exe"
        O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
        O4 - HKLM\..\Run: [mmtask] c:\Program Files\MusicMatch\MusicMatch Jukebox\mmtask.exe
        O4 - HKLM\..\Run: [UpdateManager] "C:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe" /r
        O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
        O4 - HKLM\..\Run: [dscactivate] "C:\Program Files\Dell Support Center\gs_agent\custom\dsca.exe"
        O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
        O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
        O4 - HKCU\..\Run: [NetZero_uoltray] C:\Program Files\NetZero\exec.exe regrun
        O4 - HKCU\..\Run: [DellSupportCenter] "C:\Program Files\Dell Support Center\bin\sprtcmd.exe" /P DellSupportCenter
        O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
        O8 - Extra context menu item: &AIM Search - res://C:\Program Files\AIM Toolbar\AIMBar.dll/aimsearch.htm
        O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
        O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
        O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
        O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
        O9 - Extra button: MUSICMATCH MX Web Player - {d81ca86b-ef63-42af-bee3-4502d9a03c2d} - http://wwws.musicmatch.com/mmz/openWebRadio.html (file missing)
        O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation TOOL) - http://go.microsoft.com/fwlink/?linkid=39204
        O16 - DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} (Windows Live Safety Center Base Module) - http://cdn.scan.onecare.live.com/resource/download/scanner/wlscbase370.cab
        O16 - DPF: {A90A5822-F108-45AD-8482-9BC8B12DD539} (Crucial cpcScan) - http://www.crucial.com/controls/cpcScanner.cab
        O16 - DPF: {C606BA60-AB76-48B6-96A7-2C4D5C386F70} (PreQualifier Class) - http://www.verizon.net/checkmypc/includes/MotivePreQual.cab
        O16 - DPF: {E856B973-45FD-4559-8F82-EAB539144667} (Dell PC Checkup Installer Control) - http://pccheckup.dellfix.com/rel/41/install/gtdownde.cab
        O16 - DPF: {E8F628B5-259A-4734-97EE-BA914D7BE941} - http://www.driveragent.com/files/driveragent.cab
        O16 - DPF: {F04A8AE2-A59D-11D2-8792-00C04F8EF29D} (Hotmail Attachments Control) - http://by106fd.bay106.hotmail.msn.com/activex/HMAtchmt.ocx
        O17 - HKLM\System\CCS\Services\Tcpip\..\{108D86AC-BE6E-4842-AEFE-582F860D3D44}: NameServer = 64.136.44.74 64.136.52.74
        O17 - HKLM\System\CS1\Services\Tcpip\..\{108D86AC-BE6E-4842-AEFE-582F860D3D44}: NameServer = 64.136.44.74 64.136.52.74
        O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
        O20 - AppInit_DLLs: avgrsstx.dll
        O23 - Service: AVG8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exe
        O23 - Service: AVG8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
        O23 - Service: SupportSoft Sprocket Service (dellsupportcenter) (sprtsvc_dellsupportcenter) - SupportSoft, Inc. - C:\Program Files\Dell Support Center\bin\sprtsvc.exe
        O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe

        --
        End of file - 7136 bytes
        ere is HJT log file. Sorry it took me a while to get back to you. The email went to my spam box for some reason.

        Any way... I don't see any malware but there are a few things that need to be taken care of.

        Open Hijackthis and select Do a system scan only.

        Place a check mark next to the following entries: (if there)

        O3 - Toolbar: (no name) - {40D41A8B-D79B-43d7-99A7-9EE0F344C385} - (no file)

        Important: Close all windows except for Hijackthis and then click Fix checked.

        Exit Hijackthis.

        ---------

        You have Viewpoint installed.

        Viewpoint Media Player/Manager/Toolbar is considered as foistware instead of malware since it is installed without users approval but doesn't spy or do anything "bad". See Viewpoint to Plunge Into Adware

        It is suggested to remove the program now.
        Go to Start > Settings > Control Panel > Add/Remove Programs and remove the following programs if present.
        • Viewpoint
        • Viewpoint Manager
        • Viewpoint Media Player
        • Viewpoint Toolbar
        • Viewpoint Experience Technology
        If you have trouble removing Viewpoint, I suggest that you use ViewpointKiller

        Once you have downloaded ViewpointKiller, unzip it to a convenient location such as your desktop.
        Run ViewpointKiller, and select File > Do All Killings
        Follow the prompts, selecting Yes or No, depending on which selection you are most comfortable with.
        A logfile will be created in the folder you unzipped ViewpointKiller to, please paste the contents here.

        Let me know how everything is now.
        Broni: Thanks for reply. I ran HJT "System Scan Only". found the specific entry and deleted it. Also went to 'Add/Remove Programs' and found ' Viewpoint Manager' and 'Viewpoint Media Player'. Removed both. No other Viewpoint programs were listed. Did not yet download 'Viewpoint Killer' program. Presume it is not necessary now. If it is necessary to view logfile, let me know and I will download Killer and copy the log file and paste it here. Thanks again for your help. BillNot necessary to post the log as long as the uninstall went OK.

        One more thing.

        Use the Secunia Software Inspector

        • Click Start Now
        • Check the box next to Enable thorough system inspection.
        • Click Start
        • Allow the scan to finish and scroll down to see if any updates are needed.
        • Update anything listed.
        .
        You might also have a look through this article for tips on KEEPING your PC running smooth. Slow Computer/browser? It May Not Be Malware

        Let us know if anything else comes up.

        Safe surfing...Evil, I'm studying Hijack this logs and I'm curious why you re-named it to sniper.exe?Some forms of malware can detect the hijackthis.exe and "hide" from it. You have a better chance of seeing certain infections.
        3928.

        Solve : How to turn on AVG Free Edition Antivirus??

        Answer»

        I just installed AVG Free Edition antivirus on my SYSTEM and I'm not able to "turn on" AVG antivirus..How do I do it?? Where is that option??...This is the first time I'm using it...Pls see the snapshot of it.....

        How far AVG Free Edition works against viruses??

        [recovering space - attachment deleted by admin]Are you sure you installed AVG Antivirus or was it AVG antispyware?From AVG version, 7.5.432, it looks LIKE AV...
        Did you restart computer?Yea..I'm sure I hav installed avg antivirus only...Check the snapshot of it..I restarted my system...Is my antivirus running...Shall I try reinstalling it...

        [recovering space - attachment deleted by admin]You should see an icon in your SYSTRAY, like this:


        [recovering space - attachment deleted by admin]Quote from: Broni on April 19, 2008, 09:29:55 PM

        You should see an icon in your systray, like this:


        That is what you should see normally but if not...

        click start button on the bottom-left of the screen, hover over where it says "All Programs". A menu should slide to the right, and if you're up-to-date then just hover over where it says AVG 7.5. A smaller menu should appear then you just click on "AVG CONTROL Center."

        This should get it working if the AVG is properly installed and it's just a matter of the AVG not being started.Hi all,

        Thanx for your replies....The problem got solved...It was due to an expired installation package that I used for installation...Again I download it and installed..Now its working properly....Hurry......

        [recovering space - attachment deleted by admin]Good going
        3929.

        Solve : Slowing, freezing, stopping altogether?

        Answer»

        My computer has moved from Noosa, QLD to Melbourne, VIC, and for some reason hasn't liked the move!
        I recently removed Bitdefender 9 and installed Bitdefender Total. Also renewed RegCure through Paretologic.
        Computer keeps slowing down and freezing. When it freezes it will frequently not allow Ctr+Alt+Delete to function, and frequently if it does function and the programme is not responding and I tell it to close the programme it will then freeze completely. It then kept coming up with messages that my virtual memory minimum was too low, so I upped my minimum as per instructions from microsoft website. Still problems happening.

        I have a Dell Dimension DIM3000
        Intel(R)
        Pentium(R) 4 CPU 3.00GHz
        2.99 GHz, 512 MB of RAM

        I have run a HijackThis and this is the log:

        Logfile of Trend Micro HijackThis v2.0.2
        Scan saved at 12:36:22 AM, on 18/04/2008
        Platform: Windows XP SP2 (WinNT 5.01.2600)
        MSIE: Internet Explorer v7.00 (7.00.6000.16640)
        Boot mode: Normal

        Running processes:
        C:\WINDOWS\System32\smss.exe
        C:\WINDOWS\system32\winlogon.exe
        C:\WINDOWS\system32\services.exe
        C:\WINDOWS\system32\lsass.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\system32\spoolsv.exe
        C:\WINDOWS\system32\drivers\CDAC11BA.EXE
        C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
        C:\WINDOWS\system32\svchost.exe
        C:\Program Files\Common Files\BitDefender\BitDefender Communicator\xcommsvr.exe
        C:\Program Files\Common Files\BitDefender\BitDefender Update Service\livesrv.exe
        C:\Program Files\BitDefender\BitDefender 2008\vsserv.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\Explorer.EXE
        C:\Program Files\Analog Devices\Core\smax4pnp.exe
        C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
        C:\WINDOWS\system32\hkcmd.exe
        C:\Program Files\QuickTime\qttask.exe
        C:\Program Files\Microsoft IntelliType Pro\type32.exe
        C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe
        C:\Program Files\Common Files\Real\Update_OB\realsched.exe
        C:\Program Files\BitDefender\BitDefender 2008\bdagent.exe
        C:\WINDOWS\system32\ctfmon.exe
        C:\Program Files\MSN Messenger\MsnMsgr.Exe
        C:\Program Files\iolo\System Mechanic 5\StartupGuard.exe
        C:\Program Files\Internet Explorer\iexplore.exe
        C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
        C:\WINDOWS\system32\taskmgr.exe
        C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

        R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell.com/ap/ap/en/gen/default.htm
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
        R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
        R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
        O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
        O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
        O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
        O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
        O3 - Toolbar: BitDefender Toolbar - {381FFDE8-2394-4f90-B10D-FC6124A40F8C} - C:\Program Files\BitDefender\BitDefender 2008\IEToolbar.dll
        O4 - HKLM\..\Run: [SoundMAXPnP] "C:\Program Files\Analog Devices\Core\smax4pnp.exe"
        O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
        O4 - HKLM\..\Run: [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe
        O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
        O4 - HKLM\..\Run: [type32] "C:\Program Files\Microsoft IntelliType Pro\type32.exe"
        O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe"
        O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
        O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
        O4 - HKLM\..\Run: [BDAgent] "C:\Program Files\BitDefender\BitDefender 2008\bdagent.exe"
        O4 - HKLM\..\Run: [BitDefender Antiphishing Helper] "C:\Program Files\BitDefender\BitDefender 2008\IEShow.exe"
        O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
        O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
        O4 - HKCU\..\Run: [LogitechSoftwareUpdate] "C:\Program Files\Logitech\Video\ManifestEngine.exe" boot
        O4 - HKCU\..\Run: [System Mechanic STARTUP Guard] "C:\Program Files\iolo\System Mechanic 5\StartupGuard.exe"
        O4 - HKUS\S-1-5-18\..\Run: [ctfmon.exe] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
        O4 - HKUS\.DEFAULT\..\Run: [ctfmon.exe] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
        O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
        O8 - Extra context menu item: &eBay Search - res://C:\Program Files\eBay\eBay Toolbar2\eBayTb.dll/RCSearch.html
        O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
        O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
        O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
        O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
        O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
        O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
        O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
        O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O15 - Trusted Zone: http://www.worldwinner.com
        O16 - DPF: {1A1F56AA-3401-46F9-B277-D57F3421F821} (FunGamesLoader Object) - http://www.worldwinner.com/games/v46/shared/FunGamesLoader.cab
        O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcafee.com/molbin/shared/mcinsctl/en-au/4,0,0,90/mcinsctl.cab
        O16 - DPF: {615F158E-D5CA-422F-A8E7-F6A5EED7063B} (Bejeweled Control) - http://www.worldwinner.com/games/v46/bejeweled/bejeweled.cab
        O16 - DPF: {62969CF2-0F7A-433B-A221-FD8818C06C2F} (Blockwerx Control) - http://www.worldwinner.com/games/v49/blockwerx/blockwerx.cab
        O16 - DPF: {8A94C905-FF9D-43B6-8708-F0F22D22B1CB} (Wwlaunch Control) - http://www.worldwinner.com/games/shared/wwlaunch.cab
        O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
        O16 - DPF: {94299420-321F-4FF9-A247-62A23EBB640B} (WordMojo Control) - http://www.worldwinner.com/games/v46/wordmojo/wordmojo.cab
        O16 - DPF: {A91FB93D-7561-4524-8484-5C27C8FA8D42} (WwLuxor Control) - http://www.worldwinner.com/games/v49/luxor/luxor.cab
        O16 - DPF: {B06CE1BC-5D9D-4676-BD28-1752DBF394E0} (Hangman Control) - http://www.worldwinner.com/games/v41/hangman/hangman.cab
        O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
        O16 - DPF: {BA94245D-2AA0-4953-9D9F-B0EE4CC02C43} (Tilecity Control) - http://www.worldwinner.com/games/v42/tilecity/tilecity.cab
        O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} (DwnldGroupMgr Class) - http://download.mcafee.com/molbin/shared/mcgdmgr/en-au/1,0,0,23/mcgdmgr.cab
        O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
        O23 - Service: Boonty Games - BOONTY - C:\Program Files\Common Files\BOONTY Shared\Service\Boonty.exe
        O23 - Service: C-DillaCdaC11BA - Macrovision - C:\WINDOWS\system32\drivers\CDAC11BA.EXE
        O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
        O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
        O23 - Service: BitDefender Desktop Update Service (LIVESRV) - BitDefender SRL - C:\Program Files\Common Files\BitDefender\BitDefender Update Service\livesrv.exe
        O23 - Service: McAfee WSC Integration (McDetect.exe) - Logitech Inc. - (no file)
        O23 - Service: McAfee Task Scheduler (McTskshd.exe) - Logitech Inc. - (no file)
        O23 - Service: McAfee SecurityCenter Update Manager (mcupdmgr.exe) - Logitech Inc. - (no file)
        O23 - Service: Intel NCS NetService (NetSvc) - Intel(R) Corporation - C:\Program Files\Intel\PROSetWired\NCS\Sync\NetSvc.exe
        O23 - Service: BitDefender Virus Shield (VSSERV) - BitDefender S.R.L. - C:\Program Files\BitDefender\BitDefender 2008\vsserv.exe
        O23 - Service: BitDefender Communicator (XCOMM) - BitDefender - C:\Program Files\Common Files\BitDefender\BitDefender Communicator\xcommsvr.exe

        --
        End of file - 8696 bytes

        No doubt there is a lot of crap on my computer, but I also run Adaware SE and Spybot Search & Destroy every few weeks, though I just uninstalled Spybot as the new updated version seemed to be playing up when I ran it the first time.

        Hope you can help!

        JeiPrint these instructions out.

        1. Download SUPERAntiSpyware Free for Home Users:
        http://www.superantispyware.com/

        * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
        * An icon will be created on your desktop. Double-click that icon to launch the program.
        * If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
        * Close SUPERAntiSpyware.

        Restart computer in Safe Mode.
        To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

        * Open SUPERAntiSpyware.
        * Under "Configuration and Preferences", click the Preferences button.
        * Click the Scanning Control tab.
        * Under Scanner Options make sure the following are checked (leave all others unchecked):
        o Close browsers before scanning.
        o Scan for tracking cookies.
        o Terminate memory threats before quarantining.
        * Click the "Close" button to leave the control center screen.
        * Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
        * On the left, make sure you check C:\Fixed Drive.
        * On the right, under "Complete Scan", choose Perform Complete Scan.
        * Click "Next" to start the scan. Please be patient while it scans your computer.
        * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
        * Make sure everything has a checkmark next to it and click "Next".
        * A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
        * If asked if you want to reboot, click "Yes".
        * To retrieve the removal information after reboot, launch SUPERAntispyware again.
        o Click Preferences, then click the Statistics/Logs tab.
        o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
        o If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
        o Please copy and paste the Scan Log results in your next reply.
        * Click Close to exit the program.
        Post SUPERAntiSpyware log.

        RESTART COMPUTER!

        2. Download Malwarebytes' Anti-Malware: http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html to your desktop.

        * Double-click mbam-setup.exe and follow the prompts to install the program.
        * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
        * If an update is found, it will download and install the latest version.
        * Once the program has loaded, select Perform full scan, then click Scan.
        * When the scan is complete, click OK, then Show Results to view the results.
        * Be sure that everything is checked, and click Remove Selected.
        * When completed, a log will open in Notepad.
        * Post the log back here.

        The log can also be found here:
        C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
        Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

        RESTART COMPUTER!

        3. Post new HijackThis log.you are using xp i assume. And yes, use the safe mode during the scanning. On default, your internet connection will not run so you can't get infected during/before scanning and you have nothing running. No drivers, nothing except for anything that will give you the most minimal windows you can get.

        Thanks Broni

        Have taken the first step as you instructed, here is the log produced by SUPERAntiSpyware...

        SUPERAntiSpyware Scan Log
        http://www.superantispyware.com

        Generated 04/18/2008 at 05:54 PM

        Application Version : 4.0.1154

        Core Rules Database Version : 3441
        Trace Rules Database Version: 1433

        Scan type : Complete Scan
        Total Scan Time : 01:59:37

        Memory items scanned : 175
        Memory threats detected : 0
        Registry items scanned : 5411
        Registry threats detected : 12
        File items scanned : 119401
        File threats detected : 59

        Adware.Tracking Cookie
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][4].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][3].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Jei Hayes\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\Michael Ely\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\Ota Desan De\Cookies\ota desan [emailprotected][1].txt
        C:\Documents and Settings\Ota Desan De\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Ota Desan De\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Ota Desan De\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Ota Desan De\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Ota Desan De\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Ota Desan De\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Ota Desan De\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Ota Desan De\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\Ota Desan De\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Ota Desan De\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Ota Desan De\Cookies\[emailprotected][3].txt
        C:\Documents and Settings\Ota Desan De\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\Ota Desan De\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Ota Desan De\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\Ota Desan De\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Ota Desan De\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\Ota Desan De\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\Ota Desan De\Cookies\[emailprotected][1].txt

        Trojan.WinFixer 2006
        C:\WINDOWS\system32\drivers\d_kmd.sys

        Trojan.Anti-Virus Pro
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SECUREDISK
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SECUREDISK#NextInstance
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SECUREDISK\0000
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SECUREDISK\0000#Service
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SECUREDISK\0000#Legacy
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SECUREDISK\0000#ConfigFlags
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SECUREDISK\0000#Class
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SECUREDISK\0000#ClassGUID
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SECUREDISK\0000#DeviceDesc
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SECUREDISK\0000#Capabilities
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SECUREDISK\0000#Driver
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SECUREDISK\0000\LogConf

        Desktop Hijacker.AboutYourPrivacy
        C:\Documents and Settings\Jei Hayes\Desktop\Privacy Protector.url
        C:\WINDOWS\PRIVACY_DANGER(2)\IMAGES(2)\CAPT.GIF
        C:\WINDOWS\PRIVACY_DANGER(2)\IMAGES(2)\DOWN.GIF


        Will proceed with next step as per your instructions.

        Thanks!

        JeiAnd here is the log of the next step you instructed from Malwarebytes' Anti-Malware:

        Malwarebytes' Anti-Malware 1.11
        Database version: 647

        Scan type: Full Scan (C:\|)
        Objects scanned: 163284
        Time elapsed: 1 hour(s), 40 minute(s), 21 second(s)

        Memory Processes Infected: 0
        Memory Modules Infected: 0
        Registry Keys Infected: 1
        Registry Values Infected: 0
        Registry Data Items Infected: 0
        Folders Infected: 1
        Files Infected: 5

        Memory Processes Infected:
        (No malicious items detected)

        Memory Modules Infected:
        (No malicious items detected)

        Registry Keys Infected:
        HKEY_CLASSES_ROOT\CustReg.CustRg (Trojan.FakeAlert) -> Quarantined and deleted successfully.

        Registry Values Infected:
        (No malicious items detected)

        Registry Data Items Infected:
        (No malicious items detected)

        Folders Infected:
        C:\Program Files\SecurePCCleaner (Rogue.SecurePCCleaner) -> Quarantined and deleted successfully.

        Files Infected:
        C:\Program Files\SecurePCCleaner\diagnosis.dat (Rogue.SecurePCCleaner) -> Quarantined and deleted successfully.
        C:\Program Files\SecurePCCleaner\sr.log (Rogue.SecurePCCleaner) -> Quarantined and deleted successfully.
        C:\Program Files\SecurePCCleaner\unins000.dat (Rogue.SecurePCCleaner) -> Quarantined and deleted successfully.
        C:\Documents and Settings\Jei Hayes\g2mdlhlpx.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\Documents and Settings\Jei Hayes\Application Data\Install.dat (Trojan.Agent) -> Quarantined and deleted successfully.


        Thanks!

        JeiLastly, here is the latest HijackThis log after using SUPERAntiSpyware and Anti-Malware:

        Logfile of Trend Micro HijackThis v2.0.2
        Scan saved at 10:13:25 PM, on 18/04/2008
        Platform: Windows XP SP2 (WinNT 5.01.2600)
        MSIE: Internet Explorer v7.00 (7.00.6000.16640)
        Boot mode: Normal

        Running processes:
        C:\WINDOWS\System32\smss.exe
        C:\WINDOWS\system32\winlogon.exe
        C:\WINDOWS\system32\services.exe
        C:\WINDOWS\system32\lsass.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\system32\spoolsv.exe
        C:\WINDOWS\system32\drivers\CDAC11BA.EXE
        C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
        C:\WINDOWS\system32\svchost.exe
        C:\Program Files\Common Files\BitDefender\BitDefender Communicator\xcommsvr.exe
        C:\Program Files\Common Files\BitDefender\BitDefender Update Service\livesrv.exe
        C:\Program Files\BitDefender\BitDefender 2008\vsserv.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\Explorer.EXE
        C:\Program Files\Analog Devices\Core\smax4pnp.exe
        C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
        C:\WINDOWS\system32\hkcmd.exe
        C:\Program Files\Microsoft IntelliType Pro\type32.exe
        C:\Program Files\BitDefender\BitDefender 2008\bdagent.exe
        C:\Program Files\QuickTime\qttask.exe
        C:\WINDOWS\system32\ctfmon.exe
        C:\Program Files\iolo\System Mechanic 5\StartupGuard.exe
        C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
        C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

        R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell.com/ap/ap/en/gen/default.htm
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
        R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
        R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
        O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
        O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
        O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
        O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
        O3 - Toolbar: BitDefender Toolbar - {381FFDE8-2394-4f90-B10D-FC6124A40F8C} - C:\Program Files\BitDefender\BitDefender 2008\IEToolbar.dll
        O4 - HKLM\..\Run: [SoundMAXPnP] "C:\Program Files\Analog Devices\Core\smax4pnp.exe"
        O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
        O4 - HKLM\..\Run: [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe
        O4 - HKLM\..\Run: [type32] "C:\Program Files\Microsoft IntelliType Pro\type32.exe"
        O4 - HKLM\..\Run: [BDAgent] "C:\Program Files\BitDefender\BitDefender 2008\bdagent.exe"
        O4 - HKLM\..\Run: [BitDefender Antiphishing Helper] "C:\Program Files\BitDefender\BitDefender 2008\IEShow.exe"
        O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
        O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
        O4 - HKCU\..\Run: [LogitechSoftwareUpdate] "C:\Program Files\Logitech\Video\ManifestEngine.exe" boot
        O4 - HKCU\..\Run: [System Mechanic Startup Guard] "C:\Program Files\iolo\System Mechanic 5\StartupGuard.exe"
        O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
        O4 - HKUS\S-1-5-18\..\Run: [ctfmon.exe] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
        O4 - HKUS\.DEFAULT\..\Run: [ctfmon.exe] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
        O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
        O8 - Extra context menu item: &eBay Search - res://C:\Program Files\eBay\eBay Toolbar2\eBayTb.dll/RCSearch.html
        O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
        O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
        O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
        O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
        O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
        O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
        O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
        O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O15 - Trusted Zone: http://www.worldwinner.com
        O16 - DPF: {1A1F56AA-3401-46F9-B277-D57F3421F821} (FunGamesLoader Object) - http://www.worldwinner.com/games/v46/shared/FunGamesLoader.cab
        O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcafee.com/molbin/shared/mcinsctl/en-au/4,0,0,90/mcinsctl.cab
        O16 - DPF: {615F158E-D5CA-422F-A8E7-F6A5EED7063B} (Bejeweled Control) - http://www.worldwinner.com/games/v46/bejeweled/bejeweled.cab
        O16 - DPF: {62969CF2-0F7A-433B-A221-FD8818C06C2F} (Blockwerx Control) - http://www.worldwinner.com/games/v49/blockwerx/blockwerx.cab
        O16 - DPF: {8A94C905-FF9D-43B6-8708-F0F22D22B1CB} (Wwlaunch Control) - http://www.worldwinner.com/games/shared/wwlaunch.cab
        O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
        O16 - DPF: {94299420-321F-4FF9-A247-62A23EBB640B} (WordMojo Control) - http://www.worldwinner.com/games/v46/wordmojo/wordmojo.cab
        O16 - DPF: {A91FB93D-7561-4524-8484-5C27C8FA8D42} (WwLuxor Control) - http://www.worldwinner.com/games/v49/luxor/luxor.cab
        O16 - DPF: {B06CE1BC-5D9D-4676-BD28-1752DBF394E0} (Hangman Control) - http://www.worldwinner.com/games/v41/hangman/hangman.cab
        O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
        O16 - DPF: {BA94245D-2AA0-4953-9D9F-B0EE4CC02C43} (Tilecity Control) - http://www.worldwinner.com/games/v42/tilecity/tilecity.cab
        O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} (DwnldGroupMgr Class) - http://download.mcafee.com/molbin/shared/mcgdmgr/en-au/1,0,0,23/mcgdmgr.cab
        O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
        O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
        O23 - Service: Boonty Games - BOONTY - C:\Program Files\Common Files\BOONTY Shared\Service\Boonty.exe
        O23 - Service: C-DillaCdaC11BA - Macrovision - C:\WINDOWS\system32\drivers\CDAC11BA.EXE
        O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
        O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
        O23 - Service: BitDefender Desktop Update Service (LIVESRV) - BitDefender SRL - C:\Program Files\Common Files\BitDefender\BitDefender Update Service\livesrv.exe
        O23 - Service: McAfee WSC Integration (McDetect.exe) - Unknown owner - (no file)
        O23 - Service: McAfee Task Scheduler (McTskshd.exe) - Unknown owner - (no file)
        O23 - Service: McAfee SecurityCenter Update Manager (mcupdmgr.exe) - Unknown owner - (no file)
        O23 - Service: Intel NCS NetService (NetSvc) - Intel(R) Corporation - C:\Program Files\Intel\PROSetWired\NCS\Sync\NetSvc.exe
        O23 - Service: BitDefender Virus Shield (VSSERV) - BitDefender S.R.L. - C:\Program Files\BitDefender\BitDefender 2008\vsserv.exe
        O23 - Service: BitDefender Communicator (XCOMM) - BitDefender - C:\Program Files\Common Files\BitDefender\BitDefender Communicator\xcommsvr.exe

        --
        End of file - 8173 bytes


        Thanks! Now I'll just have to wait and see whether they've done the trick ;-)

        Much thanks to you !

        Jei*** You need to update your Java:
        http://java.sun.com/javase/downloads/index.jsp
        #4 - Java Runtime Environment (JRE) 6 Update 6
        Uninstall all previous versions of Java through Add\Remove.

        1. Print this post out, since you won't have an access to it, at some point.

        2. Close all windows, except for HijackThis.

        3. Put a checkmark next to the following HijackThis entries (some entries will be checkmarked to disable unnecessary startups; in those cases (marked with *), no actual program will be removed):

        - O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
        - *O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
        - *O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
        - *O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
        - O23 - Service: Boonty Games - BOONTY - C:\Program Files\Common Files\BOONTY Shared\Service\Boonty.exe
        - O23 - Service: McAfee WSC Integration (McDetect.exe) - Unknown owner - (no file)
        - O23 - Service: McAfee Task Scheduler (McTskshd.exe) - Unknown owner - (no file)
        - O23 - Service: McAfee SecurityCenter Update Manager (mcupdmgr.exe) - Unknown owner - (no file)

        4. Click on Fix checked button.

        5. Restart your computer in Safe Mode (keep tapping F8 key, when your computer starts, until meny appears)

        6. Open Windows Explorer. Go Tools>Folder Options>View tab, put a checkmark next to Show HIDDEN files, and folders.

        7. Delete following files/folders (if present):

        - BOONTY Shared folder from C:\Program Files\Common Files

        8. Restart in Normal Mode.

        9. Post new HijackThis log.Hi, here's the latest HijackThis log after doing the latest instructions:

        Logfile of Trend Micro HijackThis v2.0.2
        Scan saved at 4:36:46 PM, on 19/04/2008
        Platform: Windows XP SP2 (WinNT 5.01.2600)
        MSIE: Internet Explorer v7.00 (7.00.6000.16640)
        Boot mode: Normal

        Running processes:
        C:\WINDOWS\System32\smss.exe
        C:\WINDOWS\system32\winlogon.exe
        C:\WINDOWS\system32\services.exe
        C:\WINDOWS\system32\lsass.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\system32\spoolsv.exe
        C:\WINDOWS\system32\drivers\CDAC11BA.EXE
        C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
        C:\WINDOWS\system32\svchost.exe
        C:\Program Files\Common Files\BitDefender\BitDefender Communicator\xcommsvr.exe
        C:\Program Files\Common Files\BitDefender\BitDefender Update Service\livesrv.exe
        C:\Program Files\BitDefender\BitDefender 2008\vsserv.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\Explorer.EXE
        C:\Program Files\Analog Devices\Core\smax4pnp.exe
        C:\WINDOWS\system32\hkcmd.exe
        C:\Program Files\Microsoft IntelliType Pro\type32.exe
        C:\Program Files\BitDefender\BitDefender 2008\bdagent.exe
        C:\WINDOWS\system32\ctfmon.exe
        C:\Program Files\iolo\System Mechanic 5\StartupGuard.exe
        C:\WINDOWS\system32\wuauclt.exe
        C:\Program Files\Internet Explorer\iexplore.exe
        C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
        C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

        R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell.com/ap/ap/en/gen/default.htm
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
        R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
        R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
        O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
        O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
        O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
        O3 - Toolbar: BitDefender Toolbar - {381FFDE8-2394-4f90-B10D-FC6124A40F8C} - C:\Program Files\BitDefender\BitDefender 2008\IEToolbar.dll
        O4 - HKLM\..\Run: [SoundMAXPnP] "C:\Program Files\Analog Devices\Core\smax4pnp.exe"
        O4 - HKLM\..\Run: [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe
        O4 - HKLM\..\Run: [type32] "C:\Program Files\Microsoft IntelliType Pro\type32.exe"
        O4 - HKLM\..\Run: [BDAgent] "C:\Program Files\BitDefender\BitDefender 2008\bdagent.exe"
        O4 - HKLM\..\Run: [BitDefender Antiphishing Helper] "C:\Program Files\BitDefender\BitDefender 2008\IEShow.exe"
        O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
        O4 - HKCU\..\Run: [LogitechSoftwareUpdate] "C:\Program Files\Logitech\Video\ManifestEngine.exe" boot
        O4 - HKCU\..\Run: [System Mechanic Startup Guard] "C:\Program Files\iolo\System Mechanic 5\StartupGuard.exe"
        O4 - HKUS\S-1-5-18\..\Run: [ctfmon.exe] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
        O4 - HKUS\.DEFAULT\..\Run: [ctfmon.exe] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
        O8 - Extra context menu item: &eBay Search - res://C:\Program Files\eBay\eBay Toolbar2\eBayTb.dll/RCSearch.html
        O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
        O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
        O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
        O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
        O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
        O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
        O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
        O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O15 - Trusted Zone: http://www.worldwinner.com
        O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
        O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
        O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
        O23 - Service: C-DillaCdaC11BA - Macrovision - C:\WINDOWS\system32\drivers\CDAC11BA.EXE
        O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
        O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
        O23 - Service: BitDefender Desktop Update Service (LIVESRV) - BitDefender SRL - C:\Program Files\Common Files\BitDefender\BitDefender Update Service\livesrv.exe
        O23 - Service: McAfee WSC Integration (McDetect.exe) - Unknown owner - (no file)
        O23 - Service: McAfee Task Scheduler (McTskshd.exe) - Unknown owner - (no file)
        O23 - Service: McAfee SecurityCenter Update Manager (mcupdmgr.exe) - Unknown owner - (no file)
        O23 - Service: Intel NCS NetService (NetSvc) - Intel(R) Corporation - C:\Program Files\Intel\PROSetWired\NCS\Sync\NetSvc.exe
        O23 - Service: BitDefender Virus Shield (VSSERV) - BitDefender S.R.L. - C:\Program Files\BitDefender\BitDefender 2008\vsserv.exe
        O23 - Service: BitDefender Communicator (XCOMM) - BitDefender - C:\Program Files\Common Files\BitDefender\BitDefender Communicator\xcommsvr.exe

        --
        End of file - 6165 bytes


        Thanks!

        JeiGo Start>Run, type in:
        cmd
        Click OK.

        In Command Prompt window...
        Type in:
        sc stop McDetect.exe
        Hit Enter.
        Type in:
        sc delete McDetect.exe
        Hit Enter.

        Repeat same sc stop, and sc delete action for:
        - McTskshd.exe
        - mcupdmgr.exe

        Open HJT, and see if these three entries still exist:
        O23 - Service: McAfee WSC Integration (McDetect.exe) - Unknown owner - (no file)
        O23 - Service: McAfee Task Scheduler (McTskshd.exe) - Unknown owner - (no file)
        O23 - Service: McAfee SecurityCenter Update Manager (mcupdmgr.exe) - Unknown owner - (no file)

        If they do, perform same commands in Safe Mode.
        Report on progress.

        3930.

        Solve : Another AVG 8 problem?

        Answer»

        C:\Documents, and Settings\Mike\Local Settings\Temp\AVG8INST.log
        ..and, disregard the warning, you just posted. Click Next.Quote

        and, disregard the warning, you just posted. Click Next.

        I did and got as faras post 1

        [recovering space - attachment deleted by admin]Error 0x80070005 basically is "Access denied" error. There are some permission issues here.
        I checked AVG log, and bunch of other registry keys were created.
        For some reason, AVG is denied to create a new key in:
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows

        Go START>Run, type in:
        regedit
        Click OK.
        Navigate to the above key, and post a screenshot of right pane listings related to the above key.Here is this what you need and THANKS again for your TIME

        [recovering space - attachment deleted by admin]This is weird. There should be several keys in right pane.

        Go Start>Run, type in:
        sfc /scannow
        Click OK.
        Have Windows XP CD ready.Quote
        Go Start>Run, type in:
        sfc /scannow
        This is the first things i tried yesterday ,do you want me to have another try ?
        SkyblueNo. That's fine.
        Try to COMPLETELY uninstall AVG 7.Ok used revo UNINSTALLER which seems to have cleared it out
        Where do we go from here?Try to install AVG 8 again.
        If no go, go for Avast, because I'm sick, and tired of these AVG problems. This is what I did on Vista.Thanks anyway ,no go with 8 so went back to avg 7.5 for now ,if you have any second thoughts i will be lurking,
        CheersThis is what I initially did (went back to 7.5), when I wasn't able to install 8.0.
        Maybe AVG will release some update, because there is a lot of problems around the net with 8.0 installation,
        3931.

        Solve : Hijack this.?

        Answer»

        I ran a log and (I am not a geek.com) says I need to remove this file- HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exeCtfmon.exe
        "CoolWebSearch Ctfmon32 parasite variant" . Just wanted to know If It was safe to remove? Thanks.

        I need the whole log.

        And here It IS! Running processes:
        C:\WINDOWS\System32\smss.exe
        C:\WINDOWS\system32\winlogon.exe
        C:\WINDOWS\system32\services.exe
        C:\WINDOWS\system32\lsass.exe
        C:\WINDOWS\system32\Ati2evxx.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\system32\Ati2evxx.exe
        C:\WINDOWS\Explorer.EXE
        C:\WINDOWS\system32\spoolsv.exe
        C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
        C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe
        C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe
        C:\Program Files\Intel\Intel Matrix Storage Manager\Iaanotif.exe
        C:\WINDOWS\system32\ctfmon.exe
        C:\Program Files\Messenger\msmsgs.exe
        C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe
        C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
        C:\Program Files\Network Associates\VirusScan\Mcshield.exe
        C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
        C:\WINDOWS\system32\PnkBstrA.exe
        C:\Program Files\Analog Devices\SoundMAX\spkrmon.exe
        C:\WINDOWS\system32\PnkBstrB.exe
        C:\Program Files\Internet Explorer\iexplore.exe
        C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = HTTP://go.microsoft.com/fwlink/?LinkId=69157
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
        R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
        O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
        O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
        O4 - HKLM\..\Run: [McAfeeUpdaterUI] "C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" /StartedFromRunKey
        O4 - HKLM\..\Run: [Network Associates Error Reporting Service] "C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe"
        O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
        O4 - HKLM\..\Run: [IAAnotif] "C:\Program Files\Intel\Intel Matrix Storage Manager\Iaanotif.exe"
        O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
        O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
        O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
        O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
        O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O16 - DPF: {01113300-3E00-11D2-8470-0060089874ED} (Support.com Configuration Class) - http://echat.bellsouth.net/sdccommon/download/tgctlcm.cab
        O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
        O23 - Service: Ati HotKey Poller - ATI TECHNOLOGIES Inc. - C:\WINDOWS\system32\Ati2evxx.exe
        O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
        O23 - Service: Intel(R) Matrix Storage Event Monitor (IAANTMON) - Intel Corporation - C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe
        O23 - Service: McAfee Framework Service (McAfeeFramework) - Network Associates, Inc. - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
        O23 - Service: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\Mcshield.exe
        O23 - Service: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
        O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe
        O23 - Service: PnkBstrB - Unknown owner - C:\WINDOWS\system32\PnkBstrB.exe
        O23 - Service: spkrmon - Unknown owner - C:\Program Files\Analog Devices\SoundMAX\spkrmon.exe
        Almost there, need the top part that looks like this.

        Logfile of Trend Micro HijackThis v2.0.2
        Scan saved at 9:55:40 PM, on 4/26/2008
        Platform: Windows XP SP2 (WinNT 5.01.2600)
        MSIE: Internet Explorer v7.00 (7.00.6000.16640)
        Boot mode: NormalAND HERE IT IS AGAIN!! gfile of Trend Micro HijackThis v2.0.2
        Scan saved at 12:02:43 AM, on 5/1/2008
        Platform: Windows XP SP2 (WinNT 5.01.2600)
        MSIE: Internet Explorer v7.00 (7.00.6000.16640)
        Boot mode: Normal

        Running processes:
        C:\WINDOWS\System32\smss.exe
        C:\WINDOWS\system32\winlogon.exe
        C:\WINDOWS\system32\services.exe
        C:\WINDOWS\system32\lsass.exe
        C:\WINDOWS\system32\Ati2evxx.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\system32\Ati2evxx.exe
        C:\WINDOWS\Explorer.EXE
        C:\WINDOWS\system32\spoolsv.exe
        C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
        C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe
        C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe
        C:\Program Files\Intel\Intel Matrix Storage Manager\Iaanotif.exe
        C:\WINDOWS\system32\ctfmon.exe
        C:\Program Files\Messenger\msmsgs.exe
        C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe
        C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
        C:\Program Files\Network Associates\VirusScan\Mcshield.exe
        C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
        C:\WINDOWS\system32\PnkBstrA.exe
        C:\Program Files\Analog Devices\SoundMAX\spkrmon.exe
        C:\Program Files\Internet Explorer\iexplore.exe
        C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
        R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
        O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
        O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
        O4 - HKLM\..\Run: [McAfeeUpdaterUI] "C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" /StartedFromRunKey
        O4 - HKLM\..\Run: [Network Associates Error Reporting Service] "C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe"
        O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
        O4 - HKLM\..\Run: [IAAnotif] "C:\Program Files\Intel\Intel Matrix Storage Manager\Iaanotif.exe"
        O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
        O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
        O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
        O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
        O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O16 - DPF: {01113300-3E00-11D2-8470-0060089874ED} (Support.com Configuration Class) - http://echat.bellsouth.net/sdccommon/download/tgctlcm.cab
        O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
        O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
        O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
        O23 - Service: Intel(R) Matrix Storage Event Monitor (IAANTMON) - Intel Corporation - C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe
        O23 - Service: McAfee Framework Service (McAfeeFramework) - Network Associates, Inc. - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
        O23 - Service: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\Mcshield.exe
        O23 - Service: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
        O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe
        O23 - Service: spkrmon - Unknown owner - C:\Program Files\Analog Devices\SoundMAX\spkrmon.exe

        --
        End of file - 4413 bytes
        ctfmon.exe is a legitimate Microsoft program. The online Hijackthis readers shouldn't ever be 100% trusted because people will put bad comments on a program simply because they don't like it. So you did a good thing in getting a SECOND opinion

        I remember a time when a few of the online readers had Internet Explorer marked as a malicious program....

        Quote

        This is a valid program, but it is up to you whether or not you want it to run on startup.

        Description: CTFMon is involved with the language/alternative input services in Office XP. CTFMON.exe will continue to put itself back into MSConfig when you run the Office XP apps as long as the Text Services and Speech applets in the Control Panel are enabled. Not required if you don't need these features. For more info on ctfmon see here

        BleepingComputer

        Although it is legitimate it isn't needed for most users it can be REMOVED. If you would like to remove ctfmon then go HERE for instructions. It isn't as easy as you would think it is but can be done.Wow, I am so glad I got a second opinion ! Just go's to show that you cannot believe EVERYTHING you read on the net. Thank you Knowledgeable One!No problem. And the log looks fine by the way.

        Safe surfing....
        3932.

        Solve : virus and speed?

        Answer»

        hello in my pc speed is very slow especially when i open word document it takes lot of time......

        i found VIRUS w32.almanahe b when i scanned through norton 2007...
        but still after removing speed is slow..

        also i tried to install cd for printer hp 3740 , but it will not show any thing in this pc where as in other pc this cd work properly......

        system details

        os xp professional 2002 sp1
        ram 256mb
        harddisk 80 gb
        intel p4 cpu 2.40ghz


        i also send u the hijack log file......

        [recovering space - attachment deleted by admin]Well first off looking at your PC stats I would say off the bat that you don't have enough RAM. 265 is just not enough for Win Xp. I would suggest at least 512mb. A new 256mb stick of ram should only run you about $15-30 DEPENDING on what your pc takes.

        Norton should catch most of your virus issue so I would think that viruses aren't an issue here. You could have allot of spyware/adware infesting your pc and that can harm performance.

        http://www.download.com/Ad-Aware-2007/3000-8022_4-10045910.html?part=dl-ad-aware&subj=dl&tag=top5&cdlPid=10837062

        That is Adaware which works pretty well at catching adaware infestations. Try running that and see if your condition improves.

        As FAR as the CD rom issue. I really can't diagnose why that wouldn't be working without more information. When the CD is in the tray click on my computer and see if you can explore the contents of the CD manually. Gonna need more though to make a conclusion. previously speed was not a problem.. even know only word doc take lot of time.......

        i tried manually for cd rom but still not working in this pc....

        after installling norton speed goes slow down ....

        so is it because of norton.... some one told me tat norton take lot of ram space.... tats why this antivirus should be installed only in pc having large ram.....

        is it so?

        and printer cd is properly working in other pcs.....Get rid of Norton, and get more RAM.Go to http://www.windowsupdate.com/ and get the updates.broni and evilfantasy...

        if virus is not a problem than why cd for printer is not working with vishal pc.... and working on other pcs......Is that the only CD that isn't working on that PC?

        3933.

        Solve : messy desktop?

        Answer»

        Hi,new menber. Hope some can give some help to my problem.I have a laptop with xp/sp2.
        Two weeks ago,I LOST mt xp desktop,in it's place I have a cute piece of *censored*.I have verizon
        security suite-anti-virus. I had SWITCHED from Google to Yahoo while on the net,then when I
        shut down the laptop,the *censored* appeared,then the computer shut down. Next DAY the same
        porn then appeared in the start up.

        Any help would be appreciatedLets get a look at a HJT log.


        Download and rename HijackThis (HJT)

        • Double-click on HJTInstall.
        • Click on the Install button.
        • It will automatically place HJT in C:\Program Files\TrendMicro\HijackThis\HijackThis.exe.
        • Upon install, HijackThis should open for you.
          • Close HijackThis and rename it.
          • Go to C:\Program Files\Trend Micro\HijackThis.exe
          • Right click on HijackThis.exe and select Rename.
          • Type in sniper.exe and press Enter.
          • Right-click on sniper.exe and select Send To > Desktop (create SHORTCUT)
        • From the desktop open Hijackthis.
        • If using Windows Vista, Right-click and Run As Administrator.
        • Click on the Do a system scan and save a log file button
        • Hijackthis will scan and then a log will open in notepad.
        • Copy and then paste the entire contents of the log in your post.
          • Do not have Hijackthis fix anything yet. Most of what it FINDS will be harmless or even required.
          Although we have renamed Hijackthis to sniper, we will still refer to it as Hijackthis or HJT.
        3934.

        Solve : pls help me mr evil..i have problem with malware files .. :(?

        Answer»

        Malwarebytes' Anti-Malware 1.11
        Database version: 704

        Scan type: Full Scan (C:\|E:\|)
        Objects scanned: 101592
        Time elapsed: 38 MINUTE(s), 41 second(s)

        MEMORY Processes Infected: 1
        Memory Modules Infected: 2
        Registry KEYS Infected: 39
        Registry Values Infected: 5
        Registry Data Items Infected: 0
        Folders Infected: 7
        Files Infected: 87

        Memory Processes Infected:
        C:\WINDOWS\system32\uvqhgpgh.exe (Trojan.FakeAlert) -> No action taken.

        Memory Modules Infected:
        C:\WINDOWS\system32\iifebARl.dll (Trojan.Vundo) -> No action taken.
        C:\Program Files\PC-Cleaner\com\pcsd.dll (Rogue.PC-Cleaner) -> No action taken.

        Registry Keys Infected:
        HKEY_CLASSES_ROOT\CLSID\{10f0c2a9-8e38-43e3-204d-45524c494e20} (Rogue.PC-Antispyware) -> No action taken.
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{10f0c2a9-8e38-43e3-204d-45524c494e20} (Rogue.PC-Antispyware) -> No action taken.
        HKEY_CLASSES_ROOT\CLSID\{0656a137-b161-cadd-9777-e37a75727e78} (Fake.Dropped.Malware) -> No action taken.
        HKEY_CLASSES_ROOT\CLSID\{0b682cc1-fb40-4006-a5dd-99edd3c9095d} (Fake.Dropped.Malware) -> No action taken.
        HKEY_CLASSES_ROOT\CLSID\{0e1230f8-ea50-42a9-983c-d22abc2eeb4c} (Fake.Dropped.Malware) -> No action taken.
        HKEY_CLASSES_ROOT\CLSID\{9dd4258a-7138-49c4-8d34-587879a5c7a4} (Fake.Dropped.Malware) -> No action taken.
        HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9dd4258a-7138-49c4-8d34-587879a5c7a4} (Fake.Dropped.Malware) -> No action taken.
        HKEY_CLASSES_ROOT\CLSID\{b8c0220d-763d-49a4-95f4-61dfdec66ee6} (Fake.Dropped.Malware) -> No action taken.
        HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b8c0220d-763d-49a4-95f4-61dfdec66ee6} (Fake.Dropped.Malware) -> No action taken.
        HKEY_CLASSES_ROOT\CLSID\{c3bcc488-1ae7-11d4-ab82-0010a4ec2338} (Fake.Dropped.Malware) -> No action taken.
        HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c3bcc488-1ae7-11d4-ab82-0010a4ec2338} (Fake.Dropped.Malware) -> No action taken.
        HKEY_CLASSES_ROOT\CLSID\{000000da-0786-4633-87c6-1aa7a4429ef1} (Fake.Dropped.Malware) -> No action taken.
        HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{000000da-0786-4633-87c6-1aa7a4429ef1} (Fake.Dropped.Malware) -> No action taken.
        HKEY_CLASSES_ROOT\CLSID\{54645654-2225-4455-44a1-9f4543d34545} (Fake.Dropped.Malware) -> No action taken.
        HKEY_CLASSES_ROOT\CLSID\{5c7f15e1-f31a-44fd-aa1a-2ec63aaffd3a} (Fake.Dropped.Malware) -> No action taken.
        HKEY_CLASSES_ROOT\CLSID\{ce86878f-d099-4ffc-a4dc-e51d192063b1} (Trojan.Vundo) -> No action taken.
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ce86878f-d099-4ffc-a4dc-e51d192063b1} (Trojan.Vundo) -> No action taken.
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\iifebarl (Trojan.Vundo) -> No action taken.
        HKEY_CLASSES_ROOT\CLSID\{fef15280-5332-4005-bf54-f76e3ab13c80} (Rogue.PC-Cleaner) -> No action taken.
        HKEY_CURRENT_USER\Software\dpcproxy (Fake.Dropped.Malware) -> No action taken.
        HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\logons (Fake.Dropped.Malware) -> No action taken.
        HKEY_CURRENT_USER\Software\uninstall (Fake.Dropped.Malware) -> No action taken.
        HKEY_CURRENT_USER\SYSTEM\CurrentControlSet\services (Fake.Dropped.Malware) -> No action taken.
        HKEY_CURRENT_USER\typelib (Fake.Dropped.Malware) -> No action taken.
        HKEY_CURRENT_USER\HOL5_VXIEWER.FULL.1 (Trojan.FakeAlert) -> No action taken.
        HKEY_CURRENT_USER\Software\Classes\HOL5_VXIEWER.FULL.1 (Trojan.FakeAlert) -> No action taken.
        HKEY_CURRENT_USER\Software\Classes\applications\accessdiver.exe (Trojan.FakeAlert) -> No action taken.
        HKEY_CURRENT_USER\Software\fwbd (Trojan.FakeAlert) -> No action taken.
        HKEY_CURRENT_USER\Software\HolLol (Trojan.FakeAlert) -> No action taken.
        HKEY_CURRENT_USER\Software\Inet Delivery (Trojan.FakeAlert) -> No action taken.
        HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Inet Delivery (Trojan.FakeAlert) -> No action taken.
        HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\mslagent (Trojan.FakeAlert) -> No action taken.
        HKEY_CURRENT_USER\Software\Invictus (Trojan.FakeAlert) -> No action taken.
        HKEY_CURRENT_USER\Software\mwc (Trojan.FakeAlert) -> No action taken.
        HKEY_CURRENT_USER\Software\Golden Palace Casino PT (Trojan.DNSChanger) -> No action taken.
        HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Golden Palace Casino NEW (Trojan.DNSChanger) -> No action taken.
        HKEY_LOCAL_MACHINE\SOFTWARE\PC-Antispyware (Rogue.PC-Antispyware) -> No action taken.
        HKEY_LOCAL_MACHINE\SOFTWARE\PC-Cleaner (Rogue.PC-Cleaner) -> No action taken.
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\webvideo (Trojan.FakeAlert) -> No action taken.

        Registry Values Infected:
        HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rhbkbkvj (Trojan.FakeAlert) -> No action taken.
        HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{0656a137-b161-cadd-9777-e37a75727e78} (Fake.Dropped.Malware) -> No action taken.
        HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{0e1230f8-ea50-42a9-983c-d22abc2eeb4c} (Fake.Dropped.Malware) -> No action taken.
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{ce86878f-d099-4ffc-a4dc-e51d192063b1} (Trojan.Vundo) -> No action taken.
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{fef15280-5332-4005-bf54-f76e3ab13c80} (Rogue.PC-Cleaner) -> No action taken.

        Registry Data Items Infected:
        (No malicious items detected)

        Folders Infected:
        C:\WINDOWS\mslagent (Adware.EGDAccess) -> No action taken.
        C:\Program Files\akl (Fake.Dropped.Malware) -> No action taken.
        C:\Program Files\PC-Cleaner (Rogue.PC-Cleaner) -> No action taken.
        C:\Program Files\PC-Cleaner\com (Rogue.PC-Cleaner) -> No action taken.
        C:\Program Files\PC-Antispyware (Rogue.PC-Antispyware) -> No action taken.
        C:\Program Files\Inet Delivery (Fake.Dropped.Malware) -> No action taken.
        C:\WINDOWS\system32\smp (Fake.Dropped.Malware) -> No action taken.

        Files Infected:
        C:\WINDOWS\system32\uvqhgpgh.exe (Trojan.FakeAlert) -> No action taken.
        C:\WINDOWS\system32\iifebARl.dll (Trojan.Vundo) -> No action taken.
        C:\Documents and Settings\jon\Local Settings\Temp\explorer32.exe (Trojan.FakeAlert) -> No action taken.
        C:\Documents and Settings\jon\Local Settings\Temporary Internet Files\Content.IE5\0HMBCX6V\CAOL81O7 (Trojan.Vundo) -> No action taken.
        C:\Documents and Settings\jon\Local Settings\Temporary Internet Files\Content.IE5\0NMFUAGS\CA2BUBE5 (Trojan.Vundo) -> No action taken.
        C:\Documents and Settings\jon\Local Settings\Temporary Internet Files\Content.IE5\EWOQQC1E\CA7MQH3Z (Trojan.Vundo) -> No action taken.
        C:\Documents and Settings\jon\Local Settings\Temporary Internet Files\Content.IE5\H11H2761\CAENCTQN (Trojan.Vundo) -> No action taken.
        C:\Documents and Settings\jon\Local Settings\Temporary Internet Files\Content.IE5\K9QBGH67\CAW5CT8N (Trojan.Vundo) -> No action taken.
        C:\Documents and Settings\jon\Local Settings\Temporary Internet Files\Content.IE5\OPA3WPIZ\CA1OED5V (Trojan.Vundo) -> No action taken.
        C:\System Volume Information\_restore{34651D36-FF23-41CA-B3A9-2A24D17FF121}\RP29\A0005593.exe (Trojan.FakeAlert) -> No action taken.
        C:\WINDOWS\system32\efcDTNhe.dll (Trojan.Vundo) -> No action taken.
        C:\WINDOWS\system32\yayvULcA.dll (Trojan.Vundo) -> No action taken.
        C:\WINDOWS\Web\def.htm (Trojan.FakeAlert) -> No action taken.
        C:\WINDOWS\mslagent\2_mslagent.dll (Adware.EGDAccess) -> No action taken.
        C:\WINDOWS\mslagent\mslagent.exe (Adware.EGDAccess) -> No action taken.
        C:\WINDOWS\mslagent\uninstall.exe (Adware.EGDAccess) -> No action taken.
        C:\Program Files\akl\akl.dll (Fake.Dropped.Malware) -> No action taken.
        C:\Program Files\akl\akl.exe (Fake.Dropped.Malware) -> No action taken.
        C:\Program Files\akl\uninstall.exe (Fake.Dropped.Malware) -> No action taken.
        C:\Program Files\akl\unsetup.exe (Fake.Dropped.Malware) -> No action taken.
        C:\Program Files\PC-Cleaner\com\pcsd.dll (Rogue.PC-Cleaner) -> No action taken.
        C:\Program Files\PC-Antispyware\PopupBlocker.dll (Rogue.PC-Antispyware) -> No action taken.
        C:\Program Files\Inet Delivery\inetdl.exe (Fake.Dropped.Malware) -> No action taken.
        C:\Program Files\Inet Delivery\intdel.exe (Fake.Dropped.Malware) -> No action taken.
        C:\WINDOWS\system32\smp\msrc.exe (Fake.Dropped.Malware) -> No action taken.
        C:\WINDOWS\a.bat (Fake.Dropped.Malware) -> No action taken.
        C:\WINDOWS\base64.tmp (Fake.Dropped.Malware) -> No action taken.
        C:\WINDOWS\FVProtect.exe (Fake.Dropped.Malware) -> No action taken.
        C:\WINDOWS\userconfig9x.dll (Fake.Dropped.Malware) -> No action taken.
        C:\WINDOWS\winsystem.exe (Fake.Dropped.Malware) -> No action taken.
        C:\WINDOWS\zip1.tmp (Fake.Dropped.Malware) -> No action taken.
        C:\WINDOWS\zip2.tmp (Fake.Dropped.Malware) -> No action taken.
        C:\WINDOWS\zip3.tmp (Fake.Dropped.Malware) -> No action taken.
        C:\WINDOWS\zipped.tmp (Fake.Dropped.Malware) -> No action taken.
        C:\WINDOWS\bdn.com (Trojan.Agent) -> No action taken.
        C:\WINDOWS\iTunesMusic.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\mssecu.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\akttzn.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\anticipator.dll (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\awtoolb.dll (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\bdn.com (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\bsva-egihsg52.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\dpcproxy.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\emesx.dll (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\[emailprotected]k.dll (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\hoproxy.dll (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\hxiwlgpm.dat (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\hxiwlgpm.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\medup012.dll (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\medup020.dll (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\msgp.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\msnbho.dll (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\mssecu.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\msvchost.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\mtr2.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\netode.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\newsd32.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\ps1.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\psof1.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\psoft1.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\regc64.dll (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\regm64.dll (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\Rundl1.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\sncntr.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\ssurf022.dll (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\ssvchost.com (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\ssvchost.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\sysreq.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\taack.dat (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\taack.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\temp#01.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\thun.dll (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\thun32.dll (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\VBIEWER.OCX (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\vbsys2.dll (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\vcatchpi.dll (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\winlogonpc.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\winsystem.exe (Trojan.Agent) -> No action taken.
        C:\WINDOWS\system32\WINWGPX.EXE (Trojan.Agent) -> No action taken.
        C:\WINDOWS\xbaqktfv.exe (Trojan.FakeAlert) -> No action taken.
        C:\WINDOWS\spwoqbmv.exe (Trojan.FakeAlert) -> No action taken.
        C:\WINDOWS\qadovnel.dll (Trojan.FakeAlert) -> No action taken.
        C:\WINDOWS\.protected (Rogue.Ultimate.Defender) -> No action taken.
        C:\WINDOWS\system32\drivers\etc\.protected (Rogue.Ultimate.Defender) -> No action taken.
        C:\Documents and Settings\All Users\Start Menu\Programs\Startup\.protected (Rogue.Ultimate.Defender) -> No action taken.
        C:\.protected (Rogue.Ultimate.Defender) -> No action taken.
        C:\Documents and Settings\jon\Start Menu\Programs\Startup\.protected (Rogue.Ultimate.Defender) -> No action taken.
        Still need the SAS and HJT logs from this thread

        3935.

        Solve : Root kit?

        Answer»

        Good evening gentlemen,

        First to the parameters. This is my home computer. Windows XP pro SP2 ( German language ). Avast version 4.8 home edition ( updated daily ), Spybot version 1.5.2 ( updated daily ). Sunbelt firewall currently installed for rasons I'll explain below.

        Hijackthis log file as follows:

        Logfile of Trend Micro HijackThis v2.0.0 (BETA)
        Scan saved at 10:02:29, on 29.04.2008
        Platform: Windows XP SP2 (WinNT 5.01.2600)
        Boot mode: Normal

        Running processes:
        C:\WINDOWS\System32\smss.exe
        C:\WINDOWS\system32\winlogon.exe
        C:\WINDOWS\system32\services.exe
        C:\WINDOWS\system32\lsass.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\Explorer.EXE
        C:\Programme\Alwil Software\Avast4\aswUpdSv.exe
        C:\Programme\Alwil Software\Avast4\ashServ.exe
        C:\WINDOWS\system32\spoolsv.exe
        C:\Programme\Microsoft LifeCam\MSCamS32.exe
        C:\WINDOWS\system32\nvsvc32.exe
        C:\Programme\Sunbelt Software\Personal Firewall\kpf4ss.exe
        C:\WINDOWS\system32\svchost.exe
        C:\Programme\Sunbelt Software\Personal Firewall\kpf4gui.exe
        C:\Programme\Microsoft IntelliType Pro\itype.exe
        C:\Programme\avmwlanstick\FRITZWLANMini.exe
        C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
        C:\WINDOWS\vVX3000.exe
        C:\PROGRA~1\MI948F~1\GAMECO~1\STRATE~1\daemon14.exe
        C:\WINDOWS\system32\nvraidservice.exe
        C:\WINDOWS\system32\ctfmon.exe
        C:\Programme\Windows Live\Messenger\MsnMsgr.Exe
        C:\WINDOWS\system32\wbem\unsecapp.exe
        C:\Programme\Alwil Software\Avast4\ashMaiSv.exe
        C:\Programme\Alwil Software\Avast4\ashWebSv.exe
        C:\Programme\Sunbelt Software\Personal Firewall\kpf4gui.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\System32\svchost.exe
        C:\Programme\Internet Explorer\iexplore.exe
        C:\Programme\Gemeinsame Dateien\Microsoft Shared\Windows Live\WLLoginProxy.exe
        C:\Dokumente und Einstellungen\jacko\Eigene Dateien\downloads\HiJackThis_v2.exe

        R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.de/
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
        R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
        O2 - BHO: (no name) - {2F1E71C9-D68C-42C3-9CCD-54719F00C03F} - (no file)
        O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Programme\Gemeinsame Dateien\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
        O2 - BHO: Windows Live Toolbar Helper - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Programme\Windows Live Toolbar\msntb.dll
        O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Programme\Windows Live Toolbar\msntb.dll
        O4 - HKLM\..\Run: [itype] "C:\Programme\Microsoft IntelliType Pro\itype.exe"
        O4 - HKLM\..\Run: [AVMWlanClient] C:\Programme\avmwlanstick\FRITZWLANMini.exe
        O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
        O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
        O4 - HKLM\..\Run: [VX3000] C:\WINDOWS\vVX3000.exe
        O4 - HKLM\..\Run: [Daemon14] C:\PROGRA~1\MI948F~1\GAMECO~1\STRATE~1\daemon14.exe
        O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe"
        O4 - HKLM\..\Run: [NVRaidService] C:\WINDOWS\system32\nvraidservice.exe
        O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
        O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
        O4 - HKCU\..\Run: [MsnMsgr] "C:\Programme\Windows Live\Messenger\MsnMsgr.Exe" /background
        O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOKALER DIENST')
        O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETZWERKDIENST')
        O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
        O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
        O4 - Global Startup: Microsoft Office.lnk = C:\Programme\Microsoft Office\Office10\OSA.EXE
        O8 - Extra context menu item: &Windows Live Search - res://C:\Programme\Windows Live Toolbar\msntb.dll/search.htm
        O8 - Extra context menu item: Add to Windows &Live Favorites - http://favorites.live.com/quickadd.aspx
        O8 - Extra context menu item: Nach Microsoft &Excel exportieren - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
        O9 - Extra button: Blog This - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Programme\Windows Live\Writer\WriterBrowserExtension.dll
        O9 - Extra 'Tools' menuitem: &Blog This in Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Programme\Windows Live\Writer\WriterBrowserExtension.dll
        O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
        O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
        O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
        O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
        O16 - DPF: {3EA4FA88-E0BE-419A-A732-9B79B87A6ED0} (CTVUAxCtrl Object) - http://dl.tvunetworks.com/TVUAx.cab
        O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx2.hotmail.com/mail/w2/resources/MSNPUpld.cab
        O16 - DPF: {7FC1B346-83E6-4774-8D20-1A6B09B0E737} (Windows Live Photo Upload Control) - http://jacksstuff41.spaces.live.com/PhotoUpload/MsnPUpld.cab
        O16 - DPF: {88D969C0-F192-11D4-A65F-0040963251E5} (XML DOM Document 4.0) - http://cm4all04.kundenserver.de/app/static/activex/msxml4.cab
        O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
        O20 - Winlogon Notify: WinNt32 - C:\WINDOWS\SYSTEM32\WinNt32.dll
        O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
        O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
        O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Programme\Alwil Software\Avast4\aswUpdSv.exe
        O23 - Service: avast! Antivirus - ALWIL Software - C:\Programme\Alwil Software\Avast4\ashServ.exe
        O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Programme\Alwil Software\Avast4\ashMaiSv.exe
        O23 - Service: avast! Web Scanner - ALWIL Software - C:\Programme\Alwil Software\Avast4\ashWebSv.exe
        O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
        O23 - Service: Sunbelt Personal Firewall 4 (SPF4) - Sunbelt Software - C:\Programme\Sunbelt Software\Personal Firewall\kpf4ss.exe
        O23 - Service: UPnPService - Magix AG - C:\Programme\Gemeinsame Dateien\MAGIX Shared\UPnPService\UPnPService.exe

        --
        End of file - 6845 bytes

        Hijackthis logfile shown is after my "bad file" removal.

        Here's what I did: I inadvertantly opened a text file ( instead of downloading it, right click and check ) from a Russian website. Contained in the " text file" were three executeables. Avast gave an immediate warning and I immediately deleted all three .exe files albeit, too late.

        This is my "notice list" from Avast:

        27.04.2008 23:42:15jacko1632Sign of "Win32:Renos-EE [trj]" has been found in "C:\Dokumente und Einstellungen\jacko\Lokale Einstellungen\Temporary Internet Files\Content.IE5\ZKK5GD9N\pxlyzzm[1].htm" file.
        27.04.2008 23:42:33jacko1632Sign of "Win32:Renos-EE [trj]" has been found in "C:\mvmeqe.exe" file.
        27.04.2008 23:42:38jacko1632Sign of "Win32:Renos-EE [trj]" has been found in "C:\Dokumente und Einstellungen\jacko\Lokale Einstellungen\Temporary Internet Files\Content.IE5\56KJDCYG\pxlyzzm[1].htm" file.
        27.04.2008 23:42:42jacko1632Sign of "Win32:Renos-EE [trj]" has been found in "C:\mvmeqe.exe" file.
        27.04.2008 23:42:52jacko1632Sign of "Win32:Tiny-II [trj]" has been found in "C:\Dokumente und Einstellungen\jacko\Lokale Einstellungen\Temporary Internet Files\Content.IE5\RY8WOCGF\yzznabofpg[1].htm" file.
        27.04.2008 23:43:02jacko1632Sign of "Win32:Socks-AD [Wrm]" has been found in "C:\Dokumente und Einstellungen\jacko\Lokale Einstellungen\Temporary Internet Files\Content.IE5\LJDB3KMX\ddos[1].htm" file.
        27.04.2008 23:43:16jacko1632Sign of "Win32:Socks-AD [Wrm]" has been found in "C:\d.exe" file.
        27.04.2008 23:43:42jacko1632Sign of "Win32:E404 [Adw]" has been found in "C:\Programme\Helper\1209332599.dll\[UPX]" file.
        28.04.2008 09:43:21jacko143316Sign of "Win32:E404 [Adw]" has been found in "C:\Dokumente und Einstellungen\LocalService.NT-AUTORITÄT\Lokale Einstellungen\Temporary Internet Files\Content.IE5\YHOZCJUT\sdferw[1].htm\[UPX]\[Embedded#0eb0]\[UPX]" file.

        Not to be outdone by a trojan. I ran an offline After thorough scan. The two, win32:socks-ad and win32:tiny-II have been moved to the avast "chest files" indicating they've been removed. The other two: win32.E404[adw] and win32:renos-EE [trj] are apparently still active.

        Upon re-booting and going back online I noticed the "Avast E-mailer scanner icon" was running in the task bar. What it appears, is my system was sending 10 E-mails every second to either a real or fictional E-mail addresses. Now, I panicked a little and pulled my W-lan out of the USB port..lol...and Considered my options, ran a spybot scan. Found a few "tracking cookies" but nothing major. Cleaned up my registry. Searched for all entries dated April 27th 2008 and promptly deleted all of them.

        Once again, upon re-booting the "'Avast E-mailer scanner icon" began running once again. Having no viable alternative I downloaded the sunbelt firewall which in the mean time has prevented outgoing connections from the source, which I currently cannot find. My final option was to do a system restore. Which I attempted to do however, all of my system restore points are no longer being shown. Except one: April 27th 2008 and it is damaged. What I'm finding odd is the fact that "whatever" this is, is running with remarkable clockwork. Every single second 10 E-mails are generated and are attemping to be sent.

        Although the file extensions shown by Avast call them "[adw] and [trj]" or adware and trojan respectively I am not entirely satisfied they are infact adware or trojans. This one something different. It is not being detected by Avast, Spybot and the entry was not shown on the hijackthis logfile.

        On a personal note. I build personal computers for a living and much of my time is spent helping poor people like myself rid themselves of viruses, trojans and worms. This one has me by the hair. Any help would be appreciated.

        Thanks in advance!

        saf-beagle


        PS: link to my original hijackthis logfile: http://hjt.networktechs.com/parse.php?log=470084


        Wow that is pretty nasty. My first suggestion would be to try a different anti-virus. I have complete faith in Avast but if your lucky maybe a different vendors anti virus will pick something up. I would try:

        http://free.grisoft.com/ww.download?prd=afe

        AVG is what I normally use. Now if that doesn't work..........well its really up to you. I hope all of yours files are backed up on an external DRIVE. I would try and reinstall avast and see if the problem persists. Also is anything else acting up besides avast? Hi soriano and thank you for your reply!

        I believe what I have on my pc is something that antivirus programmes cannot detect. It is not "persay" a virus because it is not destructive it's attempting to send E-mails which is very un-nerving. The source of the E-mails addresses is puzzling as well.

        Ran Avast in safe mode with network connections last evening with no results however, the rootkit didn't start. That opens a few possibilities where it could be hiding.


        Just last Friday I backed up all of my files to external.

        Actually, it's the avast "scan outbound mail" that tipped me off. Avast sounded a few warnings of multiple E-mails to the same recipients. Since I installed the firewall the outgoing connections have been blocked although, in the time it took me to write this response I've had over 300 connection attempts.

        I'm still working on it but could use more suggestions.

        Thanks!

        ~saf-b


        Ok, I nailed it. It was in fact a rootkit and a few trojans. I was on the right track.

        Have a LOOK:

        Malwarebytes' Anti-Malware 1.11
        Database version: 702

        Scan type: Full Scan (C:\|D:\|)
        Objects scanned: 218185
        Time elapsed: 1 hour(s), 22 minute(s), 30 second(s)

        Memory Processes INFECTED: 0
        Memory Modules Infected: 1
        Registry Keys Infected: 3
        Registry Values Infected: 0
        Registry Data Items Infected: 0
        Folders Infected: 0
        Files Infected: 18

        Memory Processes Infected:
        (No malicious items detected)

        Memory Modules Infected:
        C:\WINDOWS\system32\WinNt32.dll (Trojan.Agent) -> Unloaded module successfully.

        Registry Keys Infected:
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\winnt32 (Trojan.Agent) -> Quarantined and deleted successfully.
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.

        Registry Values Infected:
        (No malicious items detected)

        Registry Data Items Infected:
        (No malicious items detected)

        Folders Infected:
        (No malicious items detected)

        Files Infected:
        C:\System Volume Information\_restore{4E8D9A55-1C48-4078-8B23-262A31BB4056}\RP119\A0025331.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
        C:\System Volume Information\_restore{4E8D9A55-1C48-4078-8B23-262A31BB4056}\RP119\A0025332.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
        C:\System Volume Information\_restore{4E8D9A55-1C48-4078-8B23-262A31BB4056}\RP119\A0025336.exe (Trojan.DownLoader) -> Quarantined and deleted successfully.
        C:\System Volume Information\_restore{4E8D9A55-1C48-4078-8B23-262A31BB4056}\RP119\A0025388.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
        C:\System Volume Information\_restore{4E8D9A55-1C48-4078-8B23-262A31BB4056}\RP119\A0025389.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
        C:\System Volume Information\_restore{4E8D9A55-1C48-4078-8B23-262A31BB4056}\RP120\A0025460.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\System Volume Information\_restore{4E8D9A55-1C48-4078-8B23-262A31BB4056}\RP120\A0025461.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
        C:\WINDOWS\Temp\AE8AB41F91F72503.tmp (Malware.Trace) -> Quarantined and deleted successfully.
        C:\WINDOWS\Temp\BN3.tmp (Trojan.Dropper) -> Quarantined and deleted successfully.
        C:\WINDOWS\Temp\BN5.tmp (Trojan.Dropper) -> Quarantined and deleted successfully.
        C:\WINDOWS\Temp\BN7.tmp (Trojan.Dropper) -> Quarantined and deleted successfully.
        C:\WINDOWS\Temp\BN8.tmp (Trojan.Dropper) -> Quarantined and deleted successfully.
        C:\WINDOWS\Temp\BNA.tmp (Trojan.Dropper) -> Quarantined and deleted successfully.
        C:\WINDOWS\Temp\BNC.tmp (Trojan.Dropper) -> Quarantined and deleted successfully.
        C:\WINDOWS\Temp\BNE.tmp (Trojan.Dropper) -> Quarantined and deleted successfully.
        C:\WINDOWS\Temp\BNF.tmp (Trojan.Dropper) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\WinData.cab (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\WinNt32.dll (Trojan.Agent) -> Delete on reboot.


        The software "malwarebyte's Antimalware" I found at the Alwil ( www.avast.com ) forums. During the scan Avast sounded three warnings:

        30.04.2008 19:28:00SYSTEM1840Sign of "Win32:Rootkit-gen [Rtk]" has been found in "C:\System Volume Information\_restore{4E8D9A55-1C48-4078-8B23-262A31BB4056}\RP119\A0025331.exe\[UPX]" file.
        30.04.2008 19:28:41SYSTEM1840Sign of "Win32:Rootkit-gen [Rtk]" has been found in "C:\System Volume Information\_restore{4E8D9A55-1C48-4078-8B23-262A31BB4056}\RP119\A0025332.exe\[UPX]" file.
        30.04.2008 19:28:49SYSTEM1840Sign of "Win32:TratBHO [trj]" has been found in "C:\System Volume Information\_restore{4E8D9A55-1C48-4078-8B23-262A31BB4056}\RP119\A0025388.dll" file.

        I hope this can help people in the future.

        ~SAF-BPost a fresh Hijackthis log. Yes, of course:

        Logfile of Trend Micro HijackThis v2.0.0 (BETA)
        Scan saved at 21:25:07, on 30.04.2008
        Platform: Windows XP SP2 (WinNT 5.01.2600)
        Boot mode: Normal

        Running processes:
        C:\WINDOWS\System32\smss.exe
        C:\WINDOWS\system32\winlogon.exe
        C:\WINDOWS\system32\services.exe
        C:\WINDOWS\system32\lsass.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\Explorer.EXE
        C:\Programme\Alwil Software\Avast4\aswUpdSv.exe
        C:\Programme\Alwil Software\Avast4\ashServ.exe
        C:\WINDOWS\system32\spoolsv.exe
        C:\Programme\Microsoft LifeCam\MSCamS32.exe
        C:\WINDOWS\system32\nvsvc32.exe
        C:\Programme\Sunbelt Software\Personal Firewall\kpf4ss.exe
        C:\WINDOWS\system32\svchost.exe
        C:\Programme\Sunbelt Software\Personal Firewall\kpf4gui.exe
        C:\Programme\Microsoft IntelliType Pro\itype.exe
        C:\Programme\avmwlanstick\FRITZWLANMini.exe
        C:\Programme\Naturalpoint\TrackIR4\TrackIR.exe
        C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
        C:\WINDOWS\vVX3000.exe
        C:\PROGRA~1\MI948F~1\GAMECO~1\STRATE~1\daemon14.exe
        C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe
        C:\WINDOWS\system32\nvraidservice.exe
        C:\Programme\Java\jre1.6.0_06\bin\jusched.exe
        C:\Programme\Windows Live\Messenger\MsnMsgr.Exe
        C:\WINDOWS\system32\ctfmon.exe
        C:\WINDOWS\system32\wbem\unsecapp.exe
        C:\Programme\Alwil Software\Avast4\ashMaiSv.exe
        C:\Programme\Alwil Software\Avast4\ashWebSv.exe
        C:\Programme\Sunbelt Software\Personal Firewall\kpf4gui.exe
        C:\WINDOWS\system32\wuauclt.exe
        C:\Programme\Internet Explorer\IEXPLORE.EXE
        C:\Programme\Gemeinsame Dateien\Microsoft Shared\Windows Live\WLLoginProxy.exe
        C:\Programme\Windows Live Toolbar\msn_sl.exe
        C:\Dokumente und Einstellungen\jacko\Eigene Dateien\downloads\HiJackThis_v2.exe

        R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.de/
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
        R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
        R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
        O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Programme\Java\jre1.6.0_06\bin\ssv.dll
        O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Programme\Gemeinsame Dateien\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
        O2 - BHO: Windows Live Toolbar Helper - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Programme\Windows Live Toolbar\msntb.dll
        O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Programme\Windows Live Toolbar\msntb.dll
        O4 - HKLM\..\Run: [itype] "C:\Programme\Microsoft IntelliType Pro\itype.exe"
        O4 - HKLM\..\Run: [AVMWlanClient] C:\Programme\avmwlanstick\FRITZWLANMini.exe
        O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
        O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
        O4 - HKLM\..\Run: [VX3000] C:\WINDOWS\vVX3000.exe
        O4 - HKLM\..\Run: [Daemon14] C:\PROGRA~1\MI948F~1\GAMECO~1\STRATE~1\daemon14.exe
        O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe"
        O4 - HKLM\..\Run: [NVRaidService] C:\WINDOWS\system32\nvraidservice.exe
        O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
        O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Programme\Java\jre1.6.0_06\bin\jusched.exe"
        O4 - HKCU\..\Run: [MsnMsgr] "C:\Programme\Windows Live\Messenger\MsnMsgr.Exe" /background
        O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
        O4 - Global Startup: Microsoft Office.lnk = C:\Programme\Microsoft Office\Office10\OSA.EXE
        O8 - Extra context menu item: &Windows Live Search - res://C:\Programme\Windows Live Toolbar\msntb.dll/search.htm
        O8 - Extra context menu item: Add to Windows &Live Favorites - http://favorites.live.com/quickadd.aspx
        O8 - Extra context menu item: Nach Microsoft &Excel exportieren - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
        O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre1.6.0_06\bin\ssv.dll
        O9 - Extra 'Tools' menuitem: Sun Java Konsole - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre1.6.0_06\bin\ssv.dll
        O9 - Extra button: Blog This - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Programme\Windows Live\Writer\WriterBrowserExtension.dll
        O9 - Extra 'Tools' menuitem: &Blog This in Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Programme\Windows Live\Writer\WriterBrowserExtension.dll
        O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
        O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
        O16 - DPF: {3EA4FA88-E0BE-419A-A732-9B79B87A6ED0} (CTVUAxCtrl Object) - http://dl.tvunetworks.com/TVUAx.cab
        O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx2.hotmail.com/mail/w2/resources/MSNPUpld.cab
        O16 - DPF: {7FC1B346-83E6-4774-8D20-1A6B09B0E737} (Windows Live Photo Upload Control) - http://jacksstuff41.spaces.live.com/PhotoUpload/MsnPUpld.cab
        O16 - DPF: {88D969C0-F192-11D4-A65F-0040963251E5} (XML DOM Document 4.0) - http://cm4all04.kundenserver.de/app/static/activex/msxml4.cab
        O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
        O16 - DPF: {E8F628B5-259A-4734-97EE-BA914D7BE941} (Driver Agent ActiveX Control) - http://plugin.driveragent.com/files/driveragent.cab
        O20 - Winlogon Notify: WinNt32 - WinNt32.dll (file missing)
        O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Programme\Alwil Software\Avast4\aswUpdSv.exe
        O23 - Service: avast! Antivirus - ALWIL Software - C:\Programme\Alwil Software\Avast4\ashServ.exe
        O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Programme\Alwil Software\Avast4\ashMaiSv.exe
        O23 - Service: avast! Web Scanner - ALWIL Software - C:\Programme\Alwil Software\Avast4\ashWebSv.exe
        O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
        O23 - Service: Sunbelt Personal Firewall 4 (SPF4) - Sunbelt Software - C:\Programme\Sunbelt Software\Personal Firewall\kpf4ss.exe
        O23 - Service: UPnPService - Magix AG - C:\Programme\Gemeinsame Dateien\MAGIX Shared\UPnPService\UPnPService.exe

        --
        End of file - 6593 bytes

        ~SAF-B


        PS- JRE updated before running malwarebytes

        Open Hijackthis and select Do a system scan only.

        Place a check mark next to the following entries: (if there)

        O20 - Winlogon Notify: WinNt32 - WinNt32.dll (file missing)

        Important: Close all windows except for Hijackthis and then click Fix checked.

        Exit Hijackthis.

        ----------

        This is a good time to clear your infected system restore points and establish a new clean restore point:

        • Go to Start > All Programs > Accessories > System Tools > System Restore
        • Select Create a restore point, and click Next.
        • Next, go to Start > Run and type in cleanmgr
        • Select the More options tab
        • Next to System Restore click Clean up...
        This will remove all restore points except the new one you just created.

        ----------

        .
        Use the Secunia Software Inspector to check for out of date software.
        • Click Start Now
        • Check the box next to Enable thorough system inspection.
        • Click Start
        • Allow the scan to finish and scroll down to see if any updates are needed.
        • Update anything listed.
        .
        Here are some great tools to help you keep from getting infected again.

        To prevent unknown applications from being installed on your computer install WinPatrol 2007

        Another thing I would suggest installing SiteAdvisor. SiteAdvisor rates sites on business practices and spam.

        UPDATE!!! UPDATE!!! UPDATE!!! - If you do not have automatic updates enabled then visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer.
        * Help with Windows updates

        Learn more about how to protect yourself while on the internet read this article by Tony Klien: So how did I get infected in the first place?

        Let us know if anything else comes up.Hi Evil and thanks for your reply,

        I followed all of your suggestions. Deleted O20 - Winlogon Notify: WinNt32 - WinNt32.dll (file missing) entry and actually that entry did cause me a certain amount of interest however, I couldn't find any pertinant information regarding the .dll so I left it alone.

        Upon attempting to use the cleanup command in run, defrag started (), no options tab was shown (Only English commands will work in the German command console,I believe thats the same for every Windows foreign language versions ). Perhaps there is a small difference? A tip from you here would be helpful as the rootkit deleted all of my restore points and set a new one. That alone causes some anxiety.

        The other info you posted is also usefull. I know for example, exactly how, where and why the rootkit was installed on my pc: My own stupidity! I broke my own rules for downloading or viewing information on the internet and paid for it. Four days of work lost for moment of unattentiveness.

        This forum is very interesting indeed. Thanks for your help!

        ~SAF-B








        If removing the WinNt32.dll caused problems I apologize.

        Do you mean that system restore no longer works?No, no! No need to apologise. You're right on the money!

        I removed the entry without any problems. Initially, I found the WinNt32.dll to be interesting because I thought it didn't belong , however, I couldn't find any information on the internet regarding the situation with my pc. So I didn't remove it.

        I removed the entry with no NEGATIVE or noticeable effects.


        The system restore is in fact working. Oddly, all of my system restore points before April 27th 2008 are "missing" or are not being shown. Only April 27th 2008 which obviously contains the rootkit. So I'm assuming this "rootkit" hid or deleted my previous system restore points. ( I believe I have this XP pro version running since 2004 )

        I followed your instructions this morning:

        Go to Start > All Programs > Accessories > System Tools > System Restore

        Select Create a restore point, and click Next.

        That worked fine and did in fact create a restore point

        Next, go to Start > Run and type in cleanmgr

        Select the More options tab

        Next to System Restore click Clean up...

        After typing in "cleanmgr", defrag started. No options tab was shown. I started the console ( CMD) typed in cleanmgr and once again defrag started.


        Am I doing something wrong?


        ~SAF-B
        Try putting in cleanmgr.exe and see if it helps.Hmm. Same thing. Defrag starts. Try this.

        Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup. Pffft. That was a hit. Got it. Thanks for your help!Thats odd though that it isn't working with the run command.
        3936.

        Solve : Need to get rid of the Malware again (Outerinfo, Internet speed monitor, etc)?

        Answer»

        Not sure. Lets give it 24 hours or so and see if everything starts to come back to normal.

        Also go to www.secunia.com and check for updates again.Was looking at Avast! VRDB and mine was defaulted to "Generate VRDB only when screen-saver is running" I don't USE a screen saver at all, just turn the monitor off when I'm not using my pc..

        Would it be better to switch it to "Generate VRDB when computer is idle?" or should I do generate VRDB now?

        You can generate now if you like. It shouldn't slow down the PC any. If it does then do it when idle.Ok, I did generate now, and it finished.. so then I clicked on the "generate when idle".

        So having a windows firewall + Avast + winpatrol is sufficient enought to protect my pc? Any other things I need to do?Sounds good. You might check out SPYWAREBLASTER if you don't already have it.

        SpywareBlaster - Secure your Internet Explorer to make it harder for these ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
        * Using SpywareBlaster to protect your computer from Spyware and Malware

        Learn more about how to protect yourself while on the internet read this article by Tony Klien: So how did I GET infected in the first place? Ok, I'll install SpywareBlaster then. I want 100% protection if possible.

        Can you check this list from Winpatrol and advise on what I need to do. I'm worried about the ones detected today--I was d/ling a tv show via megaupload (I know, tsk tsk RIGHT? ) and then noticed that Scotty (winpatrol icon) looked like it was on a white dot. I immediately closed the d/l (which was at 4%) and then checked the list.



        Are the ones from Nvidia CORP legit? or can those get infected and replaced by inpersonators?I also just checked the "Active Tasks" tab in winpatrol and noticed WINPATROLEX.exe it was first detected around noon today as well. Under program descript, it says Winpatrol. And under company, it says BillP Studios.

        Is this safe?Everything looks fine. BillP Studios is who makes WinPatrol. Unless WinPartol pops up saying anything everything should be fine.Good to know. I'll start on spywareblaster then.

        3937.

        Solve : Rootkit found, but cannot remove-HELP Please.... worked on this for a week!?

        Answer»

        Ok, HJT DELETED those for me. Also froze my AOL, and had to reboot to GET it to do anything. Oh, oh. Two glasses of Sangria and I confuse zonealarm with antivir. Sorry Broni. My BAD. I'll be "passive" until I learn more from you gentlemen.

        ~SAF-Bsaf-beagle
        No problem Thanks for heads up about Norton.

        angelec23
        We didn't touch any AOL entry, so I'm not sure what happened.
        Does computer start faster?
        Did you look at services?Yes it is a little faster, not much. And yes I looked at the services, and I have Alot more running than the BlackViper link... TRY to adjust your services to his "Safe" column.
        It's TIME consuming process. Go slow, and don't disable anything necessary.:oWill do! Thanks again Broni! Keep us posted.

        3938.

        Solve : WGA importance?

        Answer»

        I've been researching this topic about Windows Genuine Advantage for some TIME and I haven't FOUND anything conclusive. My question is: how important is WGA? Does getting all the updates really protect your computer even though one has all the necessary Anti-viral, spyware and malware installed. I'll bet there are thousands out there surfing the net with Windows 98 who haven't had an update on over 10 years. In another 2 months MS will no LONGER be doing anything with Windows XP. Does this mean that we will be less protected. A friend gave me her old computer which is running XP. I went on-line to check if it was validated and it wasn't yet she was on-line every day. I ran all kind of checks and there were only a few tracking cookies on it. This is why I started to question WGA. Please give my your input.WGA is Windows Genuine Advantage and is used to verify if your copy of Windows is genuine.

        Quote

        Unpatched old software is a security hazard to your computer. Windows or Mac or Linux or any other operating system. Security updates are released for the SOLE REASON of patching holes that open your computer to vulnerabilities.

        Full read Why Users Still Don’t Get The Importance Of Update SoftwareSo what happens in June when XP is cut loose? Will we all have to update to Vista in order to remain secure?I see what you mean now. Sales will end for XP but support for the OS (updates) will reportedly continue through 2014. Quote from: evilfantasy on May 01, 2008, 03:59:11 PM
        I see what you mean now. Sales will end for XP but support for the OS (updates) will reportedly continue through 2014.
        That's better news. Thanks
        3939.

        Solve : Trojan.Win32.Blackbird strikes again!!?

        Answer»

        It turns out my kids got on my computer to look up something,and clicked on something wrong and put a trojan on my computer. I keep losing my desk top..... it blinks on and off but I can I can get on line if I click IE fast when I log in to the computer. I ran SUPERAntiSpyware, Malwarebytes' Anti-Malware and HijackThis. I really dont know what to do next...Thanks

        SUPERAntiSpyware Scan Log
        http://www.superantispyware.com

        Generated 05/03/2008 at 02:35 PM

        Application Version : 4.0.1154

        Core Rules Database Version : 3412
        Trace Rules Database Version: 1444

        Scan type : QUICK Scan
        Total Scan Time : 00:12:15

        Memory items scanned : 455
        Memory threats detected : 1
        Registry items scanned : 449
        Registry threats detected : 14
        File items scanned : 7643
        File threats detected : 37

        Adware.Vundo Variant/Resident
        C:\WINDOWS\SYSTEM32\GEBRROLF.DLL
        C:\WINDOWS\SYSTEM32\GEBRROLF.DLL

        Adware.Tracking Cookie
        C:\Documents and Settings\--\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\-roiservice[1].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][1].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][2].txt
        C:\Documents and Settings\--\Local Settings\Temp\Cookies\[emailprotected][1].txt

        Adware.IST/YourSiteBar
        HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/ysbactivex.dll
        HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/ysbactivex.dll#.Owner
        HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/ysbactivex.dll#{42F2C9BA-614F-47C0-B3E3-ECFD34EED658}

        Trojan.Unknown Origin
        C:\WINDOWS\system32\smp\msrc.exe
        C:\WINDOWS\system32\smp

        Trojan.DNSChanger-Codec
        HKU\S-1-5-21-3754134100-914501052-396334498-1005\Software\uninstall

        Adware.OneStepSearch
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ONESTEP_SEARCH_SERVICE
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ONESTEP_SEARCH_SERVICE#NextInstance
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ONESTEP_SEARCH_SERVICE\0000
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ONESTEP_SEARCH_SERVICE\0000#Service
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ONESTEP_SEARCH_SERVICE\0000#Legacy
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ONESTEP_SEARCH_SERVICE\0000#ConfigFlags
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ONESTEP_SEARCH_SERVICE\0000#Class
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ONESTEP_SEARCH_SERVICE\0000#ClassGUID
        HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ONESTEP_SEARCH_SERVICE\0000#DeviceDesc

        Rogue.PC-Cleaner
        HKU\S-1-5-21-3754134100-914501052-396334498-1005\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad#SystemCheck2 [ ]


        Malwarebytes' Anti-Malware 1.11
        Database version: 599

        Scan type: Quick Scan
        Objects scanned: 38071
        Time elapsed: 28 minute(s), 50 second(s)

        Memory Processes INFECTED: 2
        Memory Modules Infected: 3
        Registry Keys Infected: 42
        Registry Values Infected: 7
        Registry Data Items Infected: 1
        Folders Infected: 15
        Files Infected: 108

        Memory Processes Infected:
        C:\WINDOWS\system32\admrkvwp.exe (Trojan.FakeAlert) -> Unloaded process successfully.
        C:\Documents and Settings\All Users\Application Data\mduzoviz\grknynox.exe (Trojan.FakeAlert) -> Unloaded process successfully.

        Memory Modules Infected:
        c:\program files\internet explorer\msimg32.dll (Adware.MyWebSearch) -> Unloaded module successfully.
        C:\WINDOWS\system32\geBrroLF.dll (Trojan.Vundo) -> Unloaded module successfully.
        C:\WINDOWS\system32\xxyvvUNE.dll (Trojan.Vundo) -> Unloaded module successfully.

        Registry Keys Infected:
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{427deabc-3126-46c8-9ddc-6d3ebb70a41c} (Trojan.Vundo) -> Delete on reboot.
        HKEY_CLASSES_ROOT\CLSID\{427deabc-3126-46c8-9ddc-6d3ebb70a41c} (Trojan.Vundo) -> Delete on reboot.
        HKEY_CLASSES_ROOT\Interface\{9ebb289a-2d7b-465b-825f-1530b813e95a} (Adware.DosPopToolbar) -> Quarantined and deleted successfully.
        HKEY_CLASSES_ROOT\Interface\{cd5c92ae-97b0-4bc3-ba65-ba0308d543bf} (Adware.DosPopToolbar) -> Quarantined and deleted successfully.
        HKEY_CLASSES_ROOT\Typelib\{77aa25e8-6083-4949-a831-9cb11861dc10} (Adware.DosPopToolbar) -> Quarantined and deleted successfully.
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{5b4c3b43-49b6-42a7-a602-f7acdca0d409} (Adware.OneStepSearch) -> Quarantined and deleted successfully.
        HKEY_CLASSES_ROOT\Interface\{4897bba6-48d9-468c-8efa-846275d7701b} (Adware.Softomate) -> Quarantined and deleted successfully.
        HKEY_CLASSES_ROOT\Typelib\{4509d3cc-b642-4745-b030-645b79522c6d} (Adware.Softomate) -> Quarantined and deleted successfully.
        HKEY_CLASSES_ROOT\CLSID\{000000da-0786-4633-87c6-1aa7a4429ef1} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
        HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{000000da-0786-4633-87c6-1aa7a4429ef1} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
        HKEY_CLASSES_ROOT\CLSID\{0b682cc1-fb40-4006-a5dd-99edd3c9095d} (Fake.Dropped.Malware) -> Delete on reboot.
        HKEY_CLASSES_ROOT\CLSID\{54645654-2225-4455-44a1-9f4543d34545} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
        HKEY_CLASSES_ROOT\CLSID\{0e1230f8-ea50-42a9-983c-d22abc2eeb4c} (Fake.Dropped.Malware) -> Delete on reboot.
        HKEY_CLASSES_ROOT\CLSID\{5c7f15e1-f31a-44fd-aa1a-2ec63aaffd3a} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
        HKEY_CLASSES_ROOT\CLSID\{9dd4258a-7138-49c4-8d34-587879a5c7a4} (Fake.Dropped.Malware) -> Delete on reboot.
        HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9dd4258a-7138-49c4-8d34-587879a5c7a4} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
        HKEY_CLASSES_ROOT\CLSID\{b8c0220d-763d-49a4-95f4-61dfdec66ee6} (Fake.Dropped.Malware) -> Delete on reboot.
        HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b8c0220d-763d-49a4-95f4-61dfdec66ee6} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
        HKEY_CLASSES_ROOT\CLSID\{c3bcc488-1ae7-11d4-ab82-0010a4ec2338} (Fake.Dropped.Malware) -> Delete on reboot.
        HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c3bcc488-1ae7-11d4-ab82-0010a4ec2338} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
        HKEY_CLASSES_ROOT\CLSID\{147a976f-eee1-4377-8ea7-4716e4cdd239} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        HKEY_CLASSES_ROOT\Interface\{2e9937fc-cf2f-4f56-af54-5a6a3dd375cc} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        HKEY_CLASSES_ROOT\Interface\{741de825-a6f0-4497-9aa6-8023cf9b0fff} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        HKEY_CURRENT_USER\HOL5_VXIEWER.FULL.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
        HKEY_CURRENT_USER\Software\Classes\applications\accessdiver.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
        HKEY_CURRENT_USER\Software\fwbd (Trojan.FakeAlert) -> Quarantined and deleted successfully.
        HKEY_CURRENT_USER\Software\HolLol (Trojan.FakeAlert) -> Quarantined and deleted successfully.
        HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Inet Delivery (Trojan.FakeAlert) -> Quarantined and deleted successfully.
        HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\mslagent (Trojan.FakeAlert) -> Quarantined and deleted successfully.
        HKEY_CURRENT_USER\Software\mwc (Trojan.FakeAlert) -> Quarantined and deleted successfully.
        HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Golden Palace Casino NEW (Trojan.DNSChanger) -> Quarantined and deleted successfully.
        HKEY_CURRENT_USER\Software\IST (Adware.ISTBar) -> Quarantined and deleted successfully.
        HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\OneStep Search Service (Adware.OneStepSearch) -> Quarantined and deleted successfully.
        HKEY_CLASSES_ROOT\CLSID\{ce86878f-d099-4ffc-a4dc-e51d192063b1} (Trojan.Vundo) -> Delete on reboot.
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ce86878f-d099-4ffc-a4dc-e51d192063b1} (Trojan.Vundo) -> Delete on reboot.
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\xxyvvune (Trojan.Vundo) -> Delete on reboot.
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
        HKEY_LOCAL_MACHINE\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        HKEY_LOCAL_MACHINE\SOFTWARE\FocusInteractive (Adware.MyWebSearch) -> Quarantined and deleted successfully.

        Registry Values Infected:
        HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kncfiqsw (Trojan.FakeAlert) -> Quarantined and deleted successfully.
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\p2sAY2IYC6 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{b7d3e479-cc68-42b5-a338-938ece35f419} (Adware.Softomate) -> Quarantined and deleted successfully.
        HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\{b7d3e479-cc68-42b5-a338-938ece35f419} (Adware.Softomate) -> Quarantined and deleted successfully.
        HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{0656a137-b161-cadd-9777-e37a75727e78} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
        HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{0e1230f8-ea50-42a9-983c-d22abc2eeb4c} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{ce86878f-d099-4ffc-a4dc-e51d192063b1} (Trojan.Vundo) -> Delete on reboot.

        Registry Data Items Infected:
        HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\gebrrolf -> Quarantined and deleted successfully.

        Folders Infected:
        C:\Program Files\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Message (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Message\COMMON (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\WINDOWS\mslagent (Adware.EGDAccess) -> Quarantined and deleted successfully.
        C:\Program Files\OneStepSearch (Adware.OneStepSearch) -> Quarantined and deleted successfully.
        C:\Program Files\Inet Delivery (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
        C:\Documents and Settings\---\Application Data\ShoppingReport (Adware.Shopping.Report) -> Quarantined and deleted successfully.
        C:\Documents and Settings\---\Application Data\ShoppingReport\cs (Adware.Shopping.Report) -> Quarantined and deleted successfully.
        C:\Documents and Settings\---\Application Data\ShoppingReport\cs\db (Adware.Shopping.Report) -> Quarantined and deleted successfully.
        C:\Documents and Settings\---\Application Data\ShoppingReport\cs\dwld (Adware.Shopping.Report) -> Quarantined and deleted successfully.
        C:\Documents and Settings\---\Application Data\ShoppingReport\cs\report (Adware.Shopping.Report) -> Quarantined and deleted successfully.
        C:\Documents and Settings\---\Application Data\ShoppingReport\cs\res1 (Adware.Shopping.Report) -> Quarantined and deleted successfully.

        Files Infected:
        c:\program files\internet explorer\msimg32.dll (Adware.MyWebSearch) -> Delete on reboot.
        C:\WINDOWS\system32\geBrroLF.dll (Trojan.Vundo) -> Delete on reboot.
        C:\WINDOWS\system32\FLorrBeg.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\FLorrBeg.ini2 (Trojan.Vundo) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\admrkvwp.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
        C:\Documents and Settings\All Users\Application Data\mduzoviz\grknynox.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
        C:\WINDOWS\Web\def.htm (Trojan.FakeAlert) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\qtspcfqp.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\avatar.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\bgfadel.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\bgfader.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\common-x.css (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\common.css (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\cornerbl.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\cornerbr.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\ext_def.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\ext_roll.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\include.js (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\index.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\loader.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\loading.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\logo.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\max_def.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\max_roll.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\min_def.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\min_roll.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\noflash.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\res_def.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\res_roll.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\spacer.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\spacer.swf (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\topgrad.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Avatar\COMMON\window.ico (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Message\COMMON\ask_logo.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Message\COMMON\autoup.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Message\COMMON\autoup.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Message\COMMON\center.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Message\COMMON\index.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Message\COMMON\mid_dots.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Message\COMMON\mws_logo.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Message\COMMON\protect.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Message\COMMON\shocked.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Message\COMMON\stop.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Message\COMMON\systray.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Message\COMMON\systrayp.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Message\COMMON\tp_grad.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\Program Files\MyWebSearch\bar\Message\COMMON\warn.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
        C:\WINDOWS\mslagent\2_mslagent.dll (Adware.EGDAccess) -> Quarantined and deleted successfully.
        C:\WINDOWS\mslagent\mslagent.exe (Adware.EGDAccess) -> Quarantined and deleted successfully.
        C:\WINDOWS\mslagent\uninstall.exe (Adware.EGDAccess) -> Quarantined and deleted successfully.
        C:\Program Files\OneStepSearch\onestep.dll (Adware.OneStepSearch) -> Quarantined and deleted successfully.
        C:\Program Files\Inet Delivery\inetdl.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
        C:\Program Files\Inet Delivery\intdel.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
        C:\Documents and Settings\---\Application Data\ShoppingReport\cs\Config.xml (Adware.Shopping.Report) -> Quarantined and deleted successfully.
        C:\Documents and Settings\---\Application Data\ShoppingReport\cs\db\Aliases.dbs (Adware.Shopping.Report) -> Quarantined and deleted successfully.
        C:\Documents and Settings\---\Application Data\ShoppingReport\cs\db\Sites.dbs (Adware.Shopping.Report) -> Quarantined and deleted successfully.
        C:\Documents and Settings\---\Application Data\ShoppingReport\cs\dwld\WhiteList.xip (Adware.Shopping.Report) -> Quarantined and deleted successfully.
        C:\Documents and Settings\---\Application Data\ShoppingReport\cs\report\aggr_storage.xml (Adware.Shopping.Report) -> Quarantined and deleted successfully.
        C:\Documents and Settings\---\Application Data\ShoppingReport\cs\report\send_storage.xml (Adware.Shopping.Report) -> Quarantined and deleted successfully.
        C:\Documents and Settings\--\Application Data\ShoppingReport\cs\res1\WhiteList.dbs (Adware.Shopping.Report) -> Quarantined and deleted successfully.
        C:\WINDOWS\bdn.com (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\iTunesMusic.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\mssecu.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\akttzn.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\awtoolb.dll (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\bdn.com (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\bsva-egihsg52.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\emesx.dll (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\[emailprotected]k.dll (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\hoproxy.dll (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\hxiwlgpm.dat (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\hxiwlgpm.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\medup012.dll (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\medup020.dll (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\msgp.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\msnbho.dll (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\mssecu.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\msvchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\mtr2.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\mwin32.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\netode.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\newsd32.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\ps1.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\regc64.dll (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\regm64.dll (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\Rundl1.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\ssurf022.dll (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\ssvchost.com (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\ssvchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\sysreq.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\taack.dat (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\taack.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\temp#01.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\thun.dll (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\thun32.dll (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\VBIEWER.OCX (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\vbsys2.dll (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\vcatchpi.dll (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\winlogonpc.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\winsystem.exe (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\WINWGPX.EXE (Trojan.Agent) -> Quarantined and deleted successfully.
        C:\WINDOWS\system32\xxyvvUNE.dll (Trojan.Vundo) -> Delete on reboot.
        C:\Documents and Settings\---\Desktop\Spyware&Malware Protection.url (Rogue.Link) -> Quarantined and deleted successfully.
        C:\Documents and Settings\---\Desktop\Privacy Protector.url (Rogue.Link) -> Quarantined and deleted successfully.
        C:\Documents and Settings\----\Desktop\Error Cleaner.url (Rogue.Link) -> Quarantined and deleted successfully.
        C:\Documents and Settings\---\Favorites\Error Cleaner.url (Rogue.Link) -> Quarantined and deleted successfully.
        C:\Documents and Settings\---\Favorites\Privacy Protector.url (Rogue.Link) -> Quarantined and deleted successfully.
        C:\Documents and Settings\---\Favorites\Spyware&Malware Protection.url (Rogue.Link) -> Quarantined and deleted successfully.


        Logfile of Trend Micro HijackThis v2.0.2
        Scan saved at 2:46:47 PM, on 5/3/2008
        Platform: Windows XP SP2 (WinNT 5.01.2600)
        MSIE: Internet Explorer v7.00 (7.00.6000.16640)
        Boot mode: Normal

        Running processes:
        C:\WINDOWS\System32\smss.exe
        C:\WINDOWS\system32\winlogon.exe
        C:\WINDOWS\system32\services.exe
        C:\WINDOWS\system32\lsass.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\system32\spoolsv.exe
        C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe
        C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
        C:\WINDOWS\eHome\ehRecvr.exe
        C:\WINDOWS\eHome\ehSched.exe
        C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe
        C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
        c:\program files\common files\mcafee\mna\mcnasvc.exe
        c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
        C:\WINDOWS\ehome\ehtray.exe
        C:\Program Files\SiteAdvisor\6253\SiteAdv.exe
        C:\Program Files\McAfee.com\Agent\mcagent.exe
        C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
        C:\Program Files\McAfee\MPF\MPFSrv.exe
        C:\Program Files\iTunes\iTunesHelper.exe
        C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
        C:\WINDOWS\system32\ctfmon.exe
        C:\WINDOWS\system32\nvsvc32.exe
        C:\Program Files\Common Files\Ahead\lib\NMBgMonitor.exe
        C:\WINDOWS\system32\PnkBstrA.exe
        C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
        C:\Program Files\SiteAdvisor\6253\SAService.exe
        C:\Program Files\Dell Support Center\bin\sprtsvc.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\system32\dllhost.exe
        C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe
        C:\Program Files\iPod\bin\iPodService.exe
        C:\WINDOWS\eHome\ehmsas.exe
        C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
        C:\Program Files\Internet Explorer\iexplore.exe
        C:\WINDOWS\system32\taskmgr.exe
        C:\WINDOWS\system32\notepad.exe
        C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

        R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = yahoo.com
        O2 - BHO: (no name) - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - (no file)
        O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
        O2 - BHO: (no name) - {089FD14D-132B-48FC-8861-0048AE113215} - C:\Program Files\SiteAdvisor\6253\SiteAdv.dll
        O2 - BHO: (no name) - {427DEABC-3126-46C8-9DDC-6D3EBB70A41C} - C:\WINDOWS\system32\geBrroLF.dll
        O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\System32\DLA\DLASHX_W.DLL
        O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
        O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files\McAfee\VirusScan\scriptsn.dll
        O2 - BHO: TBSB04757 - {A1697815-8A79-4F11-8448-B05E283EFC2B} - (no file)
        O2 - BHO: CBrowserHelperObject Object - {CA6319C0-31B7-401E-A518-A07C3DB8F777} - c:\Program Files\BAE\BAE.dll
        O2 - BHO: (no name) - {CE86878F-D099-4FFC-A4DC-E51D192063B1} - C:\WINDOWS\system32\xxyvvUNE.dll
        O3 - Toolbar: McAfee SiteAdvisor - {0BF43445-2F28-4351-9252-17FE6E806AA0} - C:\Program Files\SiteAdvisor\6253\SiteAdv.dll
        O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
        O4 - HKLM\..\Run: [ISUSPM Startup] "C:\Program Files\Common Files\InstallShield\UpdateService\isuspm.exe" -startup
        O4 - HKLM\..\Run: [SiteAdvisor] C:\Program Files\SiteAdvisor\6253\SiteAdv.exe
        O4 - HKLM\..\Run: [mcagent_exe] C:\Program Files\McAfee.com\Agent\mcagent.exe /runkey
        O4 - HKLM\..\Run: [dscactivate] "C:\Program Files\Dell Support Center\gs_agent\custom\dsca.exe"
        O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
        O4 - HKLM\..\Run: [NVCPLDAEMON] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
        O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
        O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
        O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
        O4 - HKLM\..\Run: [Malwarebytes Anti-Malware Reboot] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
        O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
        O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\lib\NMBgMonitor.exe"
        O4 - HKCU\..\Run: [igndlm.exe] C:\Program Files\IGN\Download Manager\DLM.exe /windowsstart /startifwork
        O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
        O4 - HKUS\S-1-5-18\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'SYSTEM')
        O4 - HKUS\.DEFAULT\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'Default user')
        O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
        O4 - Global Startup: Digital Line Detect.lnk = ?
        O8 - Extra context menu item: &Search - http://edits.mywebsearch.com/toolbaredits/menusearch.jhtml?p=ZCxdm860YYUS
        O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
        O8 - Extra context menu item: Myxer - Send image to phone! - http://www.myxertones.com/magic/ie/
        O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
        O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
        O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~4\OFFICE11\REFIEBAR.DLL
        O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
        O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
        O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
        O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O15 - Trusted Zone: http://*.mcafee.com
        O16 - DPF: {0E5F0222-96B9-11D3-8997-00104BD12D94} - http://www.pcpitstop.com/pcpitstop/PCPitStop.CAB
        O16 - DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} - http://atv.disney.go.com/global/download/otoy/OTOYAX29b.cab
        O16 - DPF: {EF791A6B-FC12-4C68-99EF-FB9E207A39E6} (McFreeScan Class) - http://download.mcafee.com/molbin/iss-loc/mcfscan/2,2,0,5287/mcfscan.cab
        O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
        O20 - Winlogon Notify: xxyvvUNE - C:\WINDOWS\SYSTEM32\xxyvvUNE.dll
        O23 - Service: Adobe LM Service - Unknown owner - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
        O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
        O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe
        O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
        O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
        O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
        O23 - Service: LVCOMSer - Logitech Inc. - C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe
        O23 - Service: Process Monitor (LVPrcSrv) - Logitech Inc. - C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe
        O23 - Service: LVSrvLauncher - Logitech Inc. - C:\Program Files\Common Files\LogiShrd\SrvLnch\SrvLnch.exe
        O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
        O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\program files\common files\mcafee\mna\mcnasvc.exe
        O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
        O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
        O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
        O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
        O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe
        O23 - Service: Intel NCS NetService (NetSvc) - Intel(R) Corporation - C:\Program Files\Intel\PROSetWired\NCS\Sync\NetSvc.exe
        O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
        O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe
        O23 - Service: SiteAdvisor Service - Unknown owner - C:\Program Files\SiteAdvisor\6253\SAService.exe
        O23 - Service: SupportSoft Sprocket Service (dellsupportcenter) (sprtsvc_dellsupportcenter) - SupportSoft, Inc. - C:\Program Files\Dell Support Center\bin\sprtsvc.exe

        --
        End of file - 9177 bytes

        Wow! Your kids are pretty fast with messing up your computer.
        I suggest, you provide them with pencil, and paper to play with.
        I'm checking your HJT log right now.1. Print this post out, since you won't have an access to it, at some point.

        2. Close all windows, except for HijackThis.

        3. Put a checkmark next to the following HijackThis entries (some entries will be checkmarked to DISABLE unnecessary startups; in those cases (marked with *), no actual program will be removed):

        - O2 - BHO: (no name) - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - (no file)
        - O2 - BHO: (no name) - {427DEABC-3126-46C8-9DDC-6D3EBB70A41C} - C:\WINDOWS\system32\geBrroLF.dll
        - O2 - BHO: TBSB04757 - {A1697815-8A79-4F11-8448-B05E283EFC2B} - (no file)
        - O2 - BHO: (no name) - {CE86878F-D099-4FFC-A4DC-E51D192063B1} - C:\WINDOWS\system32\xxyvvUNE.dll
        - *O4 - HKLM\..\Run: [ISUSPM Startup] "C:\Program Files\Common Files\InstallShield\UpdateService\isuspm.exe" -startup
        - *O4 - HKLM\..\Run: [dscactivate] "C:\Program Files\Dell Support Center\gs_agent\custom\dsca.exe"
        - *O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
        - *O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
        - *O4 - HKLM\..\Run: [Malwarebytes Anti-Malware Reboot] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
        - *O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
        - *O4 - HKUS\S-1-5-18\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'SYSTEM')
        - *O4 - HKUS\.DEFAULT\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'Default user')
        - O4 - Global Startup: Digital Line Detect.lnk = ?
        - O8 - Extra context menu item: &Search - http://edits.mywebsearch.com/toolbaredits/menusearch.jhtml?p=ZCxdm860YYUS
        - *O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
        - O20 - Winlogon Notify: xxyvvUNE - C:\WINDOWS\SYSTEM32\xxyvvUNE.dll

        4. Click on Fix checked button.

        5. Restart your computer in Safe Mode (keep tapping F8 key, when your computer starts, until menu appears)

        6. Open Windows Explorer. Go Tools>Folder Options>View tab, put a checkmark next to Show hidden files, and folders.

        7. Delete following files/folders (if present):

        - geBrroLF.dll, xxyvvUNE.dll files from C:\WINDOWS\system32

        8. Restart in Normal Mode.

        9. Post new HijackThis log.Logfile of Trend Micro HijackThis v2.0.2
        Scan saved at 10:48:44 PM, on 5/3/2008
        Platform: Windows XP SP2 (WinNT 5.01.2600)
        MSIE: Internet Explorer v7.00 (7.00.6000.16640)
        Boot mode: Normal

        Running processes:
        C:\WINDOWS\System32\smss.exe
        C:\WINDOWS\system32\winlogon.exe
        C:\WINDOWS\system32\services.exe
        C:\WINDOWS\system32\lsass.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\system32\spoolsv.exe
        C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe
        C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
        C:\WINDOWS\eHome\ehRecvr.exe
        C:\WINDOWS\eHome\ehSched.exe
        C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe
        C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
        c:\program files\common files\mcafee\mna\mcnasvc.exe
        C:\WINDOWS\Explorer.EXE
        c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
        C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
        C:\Program Files\McAfee\MPF\MPFSrv.exe
        C:\WINDOWS\system32\nvsvc32.exe
        C:\WINDOWS\system32\PnkBstrA.exe
        C:\Program Files\SiteAdvisor\6253\SAService.exe
        C:\Program Files\Dell Support Center\bin\sprtsvc.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\ehome\ehtray.exe
        C:\Program Files\SiteAdvisor\6253\SiteAdv.exe
        C:\Program Files\McAfee.com\Agent\mcagent.exe
        C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
        C:\WINDOWS\system32\ctfmon.exe
        C:\Program Files\Common Files\Ahead\lib\NMBgMonitor.exe
        C:\WINDOWS\system32\dllhost.exe
        C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
        C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe
        C:\WINDOWS\eHome\ehmsas.exe

        R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = yahoo.com
        O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
        O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\System32\DLA\DLASHX_W.DLL
        O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
        O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files\McAfee\VirusScan\scriptsn.dll
        O2 - BHO: CBrowserHelperObject Object - {CA6319C0-31B7-401E-A518-A07C3DB8F777} - c:\Program Files\BAE\BAE.dll
        O3 - Toolbar: McAfee SiteAdvisor - {0BF43445-2F28-4351-9252-17FE6E806AA0} - C:\Program Files\SiteAdvisor\6253\SiteAdv.dll
        O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
        O4 - HKLM\..\Run: [SiteAdvisor] C:\Program Files\SiteAdvisor\6253\SiteAdv.exe
        O4 - HKLM\..\Run: [mcagent_exe] C:\Program Files\McAfee.com\Agent\mcagent.exe /runkey
        O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
        O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
        O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
        O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
        O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\lib\NMBgMonitor.exe"
        O4 - HKCU\..\Run: [igndlm.exe] C:\Program Files\IGN\Download Manager\DLM.exe /windowsstart /startifwork
        O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
        O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
        O8 - Extra context menu item: Myxer - Send image to phone! - http://www.myxertones.com/magic/ie/
        O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
        O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
        O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~4\OFFICE11\REFIEBAR.DLL
        O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
        O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
        O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
        O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O15 - Trusted Zone: http://*.mcafee.com
        O16 - DPF: {0E5F0222-96B9-11D3-8997-00104BD12D94} - http://www.pcpitstop.com/pcpitstop/PCPitStop.CAB
        O16 - DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} - http://atv.disney.go.com/global/download/otoy/OTOYAX29b.cab
        O16 - DPF: {EF791A6B-FC12-4C68-99EF-FB9E207A39E6} (McFreeScan Class) - http://download.mcafee.com/molbin/iss-loc/mcfscan/2,2,0,5287/mcfscan.cab
        O23 - Service: Adobe LM Service - Unknown owner - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
        O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
        O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe
        O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
        O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
        O23 - Service: LVCOMSer - Logitech Inc. - C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe
        O23 - Service: Process Monitor (LVPrcSrv) - Logitech Inc. - C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe
        O23 - Service: LVSrvLauncher - Logitech Inc. - C:\Program Files\Common Files\LogiShrd\SrvLnch\SrvLnch.exe
        O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
        O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\program files\common files\mcafee\mna\mcnasvc.exe
        O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
        O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
        O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
        O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
        O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe
        O23 - Service: Intel NCS NetService (NetSvc) - Intel(R) Corporation - C:\Program Files\Intel\PROSetWired\NCS\Sync\NetSvc.exe
        O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
        O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe
        O23 - Service: SiteAdvisor Service - Unknown owner - C:\Program Files\SiteAdvisor\6253\SAService.exe
        O23 - Service: SupportSoft Sprocket Service (dellsupportcenter) (sprtsvc_dellsupportcenter) - SupportSoft, Inc. - C:\Program Files\Dell Support Center\bin\sprtsvc.exe

        --
        End of file - 7173 bytesVery nice

        HJT log is clean.

        1. Download, and install CCleaner: http://www.ccleaner.com/download/builds. Get "Slim" version.
        Read CCleaner instruction here: http://www.jahewi.nl/ccleaner/ccleaner.html.
        Run CCleaner.

        2. Turn off System Restore:

        - Windows XP:
        1. Click Start.
        2. Right-click the My Computer icon, and then click Properties.
        3. Click the System Restore tab.
        4. Check "Turn off System Restore".
        5. Click Apply.
        6. When turning off System Restore, the existing restore points will be deleted. Click Yes to do this.
        7. Click OK.
        - Windows Vista:
        1. Click Start.
        2. Right-click the Computer icon, and then click Properties.
        3. Click on System Protection under the Tasks column on the left side
        4. Click on Continue on the "User Account Control" window that pops up
        5. Under the System Protection tab, find Available Disks
        6. Uncheck the box for any drive you wish to disable system restore on (in most cases, drive "C:")
        7. When turning off System Restore, the existing restore points will be deleted. Click "Turn System Restore Off" on the POPUP window to do this.
        8. Click OK

        3. Restart computer.

        4. Turn System Restore on.

        5. Let me know, how your computer is doing.

        3940.

        Solve : Unable to boot in any mode except Safe Mode?

        Answer»

        I'm helping a coworker with her personal computer, and she's run into a major issue that I don't know how to fix.

        First, she got WinFixer on it from some website, so I RECOMMENDED she download SpyBot and see if that would clear it up before I had time to go over and mess with it. She downloaded SpyBot and attempted to install it, but when she reached the point where she had to reboot, the computer just won't start up in any boot mode except Safe Mode. In Safe Mode, the program shows as not being installed yet.

        I've tried going to Safe Mode w/ Networking and Regular, but the computer hangs at the XP screen where the logo appears, then jumps back to the "Choose which mode you would like to boot in" screen.

        Unfortunately, as it's her only computer and mine's a desktop, I can't give any real specifics about the computer besides that it appears to be XP Home Edition that it's working with. I'm not even sure she has a boot CD, but I've never used one anyway, so if that's a possible solution, I'd need someone to walk me through that.

        Any ideas?First, make sure, she has Windows CD. That would be the easiest way to try to fix it.Quote

        WinFixer, WinAntiVirus, WinAntiVirusPro, ErrorSafe, SystemDoctor, WinAntiSpyware, AVSystemCare, WinAntiSpy, Performance Optimizer, StorageProtector, PrivacyProtector and others are very similar computer programs available only for Microsoft Windows that claim to repair computer system problems [1][2][3], but do not actually do so. They are sometimes installed without the user's consent, usually through Internet Explorer. They display false information about the user's computer, confusing the user into believing that their PC is infected with viruses, spyware and/or other forms of malware. The advertisements pop up a display with notifications to convince the user that SOMETHING may be amiss with the computer, or run a fake diagnostic. The program repeatedly prompts the user to purchase a licensed copy of the program. Due to these problems, WinFixer and its sister applications are generally considered SCAREWARE spyware through misleading popups and forced downloads.

        WinFixer claims it "is a useful utility to scan and fix any system, registry and hard drive errors. It ensures system stability and performance, frees wasted hard-drive space and recovers damaged Word, Excel, music and video files", but it has never been shown to do such things.

        Boot to safe mode and un-install WinFixer.
        Re-boot and see what happens...if it's stubborn as most scumware is we may need a lobotomy.
        Post back with the results...is it possible that you can use system restore? And restore to the point right before the winfixer got installed or some known clean restore point?

        the system restore can be run in safe mode so give it a shot (unless no system restore point exists which I doubt...)Do you have a flash drive to transfer over Vundofix

        Removal Steps:

        1. Please print these instructions as they will be needed later when Internet access is not available.

        2. Save these instructions in word or notepad to the desktop where they can be easily found.

        3. Download Vundo Fix and save it to your desktop.

        4. When it has completed downloading, double-click VundoFix.exe to run it.

        5. Click the Scan for Vundo button.

        6. Once it's done scanning, click the Remove Vundo button.

        7. You will now receive a prompt asking if you want to remove the files, click the YES button. Once you click yes, your desktop will go blank as it starts removing Vundo.

        8. When completed, it will prompt that it will shutdown your computer, click the OK button.

        9. When the computer has shutdown, turn your computer back on.

        The WinFixer and Vundo infection should now be removed from your computer.

        Next go HERE and do the instructions and post the logs back in the Computer Viruses and Spyware forum.

        Quote from: evilfantasy on April 19, 2008, 05:45:13 PM
        Do you have a flash drive to transfer over Vundofix

        Removal Steps:

        1. Please print these instructions as they will be needed later when Internet access is not available.

        2. Save these instructions in word or notepad to the desktop where they can be easily found.

        3. Download Vundo Fix and save it to your desktop.

        4. When it has completed downloading, double-click VundoFix.exe to run it.

        5. Click the Scan for Vundo button.

        6. Once it's done scanning, click the Remove Vundo button.

        7. You will now receive a prompt asking if you want to remove the files, click the YES button. Once you click yes, your desktop will go blank as it starts removing Vundo.

        8. When completed, it will prompt that it will shutdown your computer, click the OK button.

        9. When the computer has shutdown, turn your computer back on.

        The WinFixer and Vundo infection should now be removed from your computer.

        Next go HERE and do the instructions and post the logs back in the Computer Viruses and Spyware forum.



        That I think should fix the problem unless you have a system restore point and restoring earlier configurations don't matter to you too mucgh. In doing system restore, you might lose things that you did recently (more likely, you'll just have to reinstall any recent programs you installed so that the registry reads it right and cause no problem when loading)Yes it will fix it. Problem is what all else might be wrong. Winfixer shouldn't be blocking the internet. Malware writers don't profit on broken connections.........

        How To Remove Winfixer / Virtumonde / Msevents / Trojan.vundo.bWell, thank ya'll for the advice so far. Last night, I got the chance to go try it out on her computer, and here are my notes:

        - First, I took VundoFix over on CD, which seemed to work fine, since the program DLed and RAN on her computer.
        - I booted her computer up, and the first time it went into Safe Mode, the Safe Mode popup came up 5 times.
        - While VF was running, the WinFixer popups came up. One is a yellow yield sign in the system tray, and the other is a Windows-designed error message. After a while, a screensaver would consist of bugs crawling across the screen, eating the desktop.
        - VF took a half-hour to run, but found 6 infections, which I removed. When it began to remove them, a new Windows-designed error message popped up for a second that said due to a major problem, this computer would be shut down in 30 seconds. Then, all three error messages disappeared, and VF said it needed to restart the computer.
        - Upon restart, the computer still could not start in any mode except Safe Mode. As soon as it booted up to the desktop, the error messages reappeared.
        - I decided to just check out System Restore and see if I could find when it would restore to. Choosing System Restore from the Start MENU resulted in the following message: System Restore is not able to protect your computer. Please restart and run System Restore again.
        - I restarted one more time and System Restore gave the exact same error message again.

        I left off at this point because the first instruction didn't work. VF didn't remove the program, so I wasn't sure if I should go through with anything else before checking back with ya'll. Also, as I looked closely at it, the program is actually called WinIFixer, not just WinFixer. Not sure if they're the same thing.

        So, any more ideas?I am moving this to the virus and spyware forum.

        You need to run SmitFraudFix. Then post a Hijackthis log.

        Download and rename HijackThis (HJT)
        • Double-click on HJTInstall.
        • Click on the Install button.
        • It will automatically place HJT in C:\Program Files\TrendMicro\HijackThis\HijackThis.exe.
        • Upon install, HijackThis should open for you.
          • Close HijackThis and rename it.
          • Go to C:\Program Files\Trend Micro\HijackThis.exe
          • Right click on HijackThis.exe and select Rename.
          • Type in sniper.exe and press Enter.
          • Right-click on sniper.exe and select Send To > Desktop (create shortcut)
        • From the desktop open Hijackthis.
        • If using Windows Vista, Right-click and Run As Administrator.
        • Click on the Do a system scan and save a log file button
        • Hijackthis will scan and then a log will open in notepad.
        • Copy and then paste the entire contents of the log in your post.
          • Do not have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.
        Although we have renamed Hijackthis to sniper, we will still refer to it as Hijackthis or HJT.

        Okay, I apologize about the massive absence, but she was unable to print/save the HiJackThis log, so she had to hand-write the entire thing and I had to retype it all. Please excuse any slight typos (O's where 0's should be, uncapitalized letters, etc.) So, here it is:

        Logfile of trend micro hijackthis v2.0.2
        Scan saved at 9:09:25pm, on 4/23/2008
        Platform: WindowsXP SP2 (WinNT 5.01.2600)
        MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
        Boot mode: Safe mode

        Running processes :
        C:\windows\system32\smss.exe
        C:\windows\system32\winlogon.exe
        C:\windows\system32\services.exe
        C:\windows\system32\lsass.exe
        C:\windows\system32\svchost.exe
        C:\windows\system32\svchost.exe
        C:\windows\explorer.exe
        C:\windows\system32\drivers\spools.exe
        C:\Program Files\Trendmicro\HijackThis\sniper.exe.exe
        C:\Program Files\Internet Explorer\iexplore.exe
        R1_HKCU\Software\Microsoft\Windows\Current version\internet setting.proxyoverride=*.local
        R3_URLSearchHook:Yahoo! Toolbar_{EF99BD32-C1FB-11D2-892F0090271D4F88}-C:\PROGRA~1\Yahoo!\companion\Installs\cpn\yt.dll
        F2-Reg:system.ini:Shell=Explorer.exe C:\windows\Shell.exe
        F2-Reg:system.ini:userInit=C:\windows\system32\userint.exe, C:\programFiles\Common Files\Microsoft Shared\sysctc.exe,
        O2-BHOLno name)-{3FECA576-7AD2-4E11-A6AD-6B59D4FB5DB9}-C:\Windows\system32\jfiehayd.dll
        O2-BHO:C:\windows\system32\jfiehayd.dll-{C5AF49A2-94F3-42BD-F434-2604812C897D}-C:\windows\system32\jfiehayd.dll
        O3-Toolbar:Hpview-{B2847E28-SD7D-4DE8-8B67-05D28BCF79F5}-C:\Program Files\HP\Digital imaging\bin HPDTLKO2.dll
        O3-Toolbar:Yahoo! Toolbar-{EF99BD32-C1FB-11D2-892F-0090271D4F88}-C:\PROGRA~1\Yahoo!\companion\installs\cpn\yt.dll
        O4-HKLM\..\Run:[YsearchProtection]”C:\Program Files\Yahoo!\search protection\searchprotection.exe”
        O4-HKLM\..\Run:[QuickTime Task]”C:\Program Files\QuickTime\QTTASK.exe”-atboottime
        O4-HKLM\..Run:[itunesHelper]”C:\Program Files\itunes\ituneshelper.exe”
        O4-HKLM\..\Run:[Postsetupcheck]C:\windows\system32\Rundll32.exe”C:\windows\system32\atgban.dll” Dllstart
        O4-HKLM\..\Run:[runner1 C:\windows\mrofinu1000106.exe 61A847B5BBF72813329B385772FF01FOB3E35B6 638993F4661AA4EBD86D67C56389B284534F310 F3D1DC7E4638E8323A15806F97BDE4417E6FD96 7002BA754E2C2832213329D26033AAC
        O4-HKLM\..\Run:[b4fe43bd]rundll32.exe”C:\windows\system32\fqvtivpi.dll”,b
        O4-HKLM\..\Run:[ntuser]C:\windows\system32\drivers\spools.exe
        04-HKLM\..\Run:[autoload]C:\Documents and Settings\Adriana\cftmon.exe
        O4-HKLM\..\Run:[BluetoothAutorizationAgent]C:windows\system32\BluetoothAuthorizationAgent.exe
        O4-HKLM\..\Run:[WinIFixer]C:\Program Files\WinIFixer\WinIFixer.exe
        O4-HKLM\..\Run:[antivirus Pro]C:Program Files\AntivirusPro\AntivirusPro.exe
        O4-HKLM\..\Run:[jdgf894jrghoiistd]C:\windows\Temp\winlogan.exe
        O4-HKLM\..\Run:[advap32]C:windows\TEMP\loader2.exe\v
        O4-HKLM\..\Run:[SystemDrive]C:windows\system32\maxpaynow1.exe
        O4-HKLM\..\Run:[taskmon]C:windows\taskmon.exe
        O4-HKLM\..\Run:[msvtt]C:windows\system32\mmhkj.exe
        O4-HKLM\..\Run:[BMb7cd7021]Rundll32.exe “C:\windows\system32\amcakabk.dll”,s
        O4-HKLM\..\Run:[kernelFaultCheck]%systemroot%\system32\dumprep O-K
        O4-HKCU\..\Run:[ctfmon.exe]C:Windows\system32\ctfmon.exe
        O4-HKCU\..\Run:[Yahoo! Pager]”C:\PROGRA~1\Yahoo\MESSEN~1\YAHOOM~1.EXE”-quiet
        O4-HKCU\..\Run:[MSMSGS]”C:\Program Files\Messenger\msmsgs.exe”/background
        O4-HKCU\..\Run:[YsearchProtection]C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
        O4-HKCU\..\Run:[srro]”C:\DOCUME~1\adriana\MYDOCU~1\SSTEM~1\winlogon.exe” –vt ya2b
        O4-HKCU\..\Run:[Odog] “C:\Documents and settings\adriana\My Documents\M?crosoft.net\??rvices.exe”
        O4-HKCU\..\Run:[ntuser]C:\Windows\system32\drivers\spools.exe
        O4-HKCU\..\Run:[jdgf894jrghoiiskd]C:\Windows\TEMP\winlogan.exe
        O4-HKCU\..\Run:[Jnskdfmf9eldfd]C:\Docume~1\adriana\LOCALS~1\Temp\csrssc.exe
        O4-HKCU\..\Run:[ServicePack1]C:\Windows\system32\vedxgbame4.exe
        O4-HKCU\..\Run:[autoload]c:\Documents and settings\adriana\cftmon.exe
        O4-HKUS\S-1-5-18\..\Run:[autoload]C:\Documents and settings\\local service\cftmon.exe (user ‘SYSTEM’)
        O4-HKUS\S-1-5-18\..\Run:[jdgf894jrghoiiskd]C:\windows\temp\winlogan.exe (user ‘system’)
        O4-HKUS\S-1-5-18\..\Run:[jnskdfmf9eldfd]C:\windows\temp\csrssc.exe (user ‘system’)
        O4-HKUS\S-1-5-18\..\Run:[spoolsv]C:\windows\system32\spoolvs.exe (user ‘system’)
        O4-HKUS\S-1-5-18\..\Run:[windows update loader]C:\windows\xpupdate.exe (user ‘system’)
        O4-HKUS\.DEFAULT\..\Run:[ntuser]C:\windows\system32\drivers\spools.exe (user ‘Default user’)
        O4-Startup:DW-Start.lnk=C:\windows\system32\rwwnwb4d.exe
        O4-Global startup:adobe reader speed launch.lnk=c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
        O4-Global startup:Lumix simple viewer.lnk=?
        O7-HKCU\software\Microsoft\windows\current version\policies\system.disableregedit=1
        O8-Extra content menu item: Add to HP organize… -C:\PROGRA~1\HEWLET~1\HPORGA~1\bin\core.hp.main\sendTo.html
        O8-Extra content menu item: E &xopt to Microsoft Excel – res://C:\PROGRA~1\MI1933~1\Office10\EXCEL.EXE/3000
        O9-Extra button: (no name)-{O8BOE5CO-4FCB-11CF-AAA5-00401C608501}-C:\Program Files\Java\j2re1.4.2_03\bin\npjpi142_03.dll
        O9-Extra ‘tools’ menuitem:sunjava Console-{08BDE5CO-4FCB-11CF-AAA5-004016608501}C:\Program Files\java\j2re1.4.2_03\bin\npjpi142-03.dll
        O9 Extra button: Yahoo! Messenger-{E5012C4E-7B4F-11D3-B5C9-005004563C96}-C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
        O9 Extra ’Tools’ menuitem: Yahoo! Messenger-{E5D12C4E-7B4F-11D3-B5C9-0050045C3L96}-C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
        09-Extra button:Messenger-{FB5F1910-F110-11dz-BB9E-00C04F795683}-C:\Program Files\Messenger\msmsgs.exe
        09 Extra ’Tools’ menuitem:windows messenger-{FB5F1910-F110-11dz-BB9E-00C04F795683}-C:\Program Files\Messenger\msmsgs.exe
        OI7-HKLM\System\ccs\services\tcpip\..\{7345DF05-A119-4931-9OE6-666CF5AEA1DA}:nameserver 85.255.116.168.85.255.112.209
        OI7-HKLM\System\ccs\services\tcpip\..\{CD941F95-643F-460F-856B-CSD8263728DC}: nameserver 85.255.116.168.85.255.112.209
        OI7-HKLM\system\cs1\services\Tcpip\Parameters:Name Server=85.255.116.168.85.255.112.209
        OI7-HKLM\system\cs1\services\Tcpip\..\{7345DF05-A119-4931-90E6-666CF5AEA1DA}NameServer=85.255.116.168.85.255.112.209
        OI7- HKLM\system\cs1\services\Tcpip\parameters:Nameserver=85.255.116.168.85.255.112.209
        O20-Applnit_DLLS:C:\windows\system32\wowfx.dll
        O20-Winlogon Notify:awtttus-C:\windows\system32\awtttus.dll
        O20-Winlogon Notify:ibudu-C:\windows\system32\ibudu.dll
        O20-Winlogon Notify:partnershipreg-C:\Documents and settings\All users\\Documents\Settings\partnership.dll
        O20-Winlogon Notify:wlctrl32-C:\windows\system32\WLCtrl32.dll
        O21-SSODL:BeaQtlcG-{B4FE4313-1E54-E9B9-2D3B-2B96A415245B}-C:\windows\system32\zckmib.dll
        O21-SSODL:PrxRam-{439e5852-9e59-4240-84c8-fe09995e25c8}-C:windows\Installer\\{439e5852-9e59-4240-84c8-fe09995e25c8}\PrxRam.dd
        O21-SSODL:AlrtAlrt-{8bb3b421-ce22-4132-9140-a1fdefbfdo29}-C:\windows\Resources\AlrtAlrt.dll
        O21-SSODL:zip-{da053baf-f7e9-4f4f-b41d-a5139124b1a2}-C:\windows\Installer\{da053baf-f7e9-4f4f-b41d-a5139124b1a2}\zip.dll
        O22-Sharedtaskscheduler:jhsf8d984jief8dsfus98jkefn-{C5AF49A2-94F3-42BD-F434-Z604812C8970}-C:\window\system32\jfiehayd.dll
        O23-Service: Apple Mobile Device-Apple, Inc.-C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
        O23-Service :Bonjour Service-Apple Inc.-C:\Program Files\Bonjour\mdNSRejponder.exe
        O23-Service : Command Service (cmdservice) –unknown owner- C:\windows\IA\command.exe
        O23-Service :FC1 (fci)-unknown owner-C:\windows\system32\svchost.exe:ext.exe
        O23-Service:Google Online Services-Unknown owner-C:\Documents and settings\Adriana\ie_updates3r.exe
        O23-Service: iPod service-Apple Inc.-C:\Program Files\ipod\bin\ipodservice.exe
        O23-Service:Network Monitor-unknown owner-C:\Program Files\Network Monitor\netmon.exe
        O23-Service:task scheduler (schedule)-unknown owner-C:\windows\system32\drivers\spools.exe

        --
        End of File – 8463 bytes
        You have a massive problem.

        Do the steps in this post in order and then post all of the logs including a new hijackthis log.Well, the problem is that she still can't connect to the internet in any way, shape, or form.

        How would you recommend going about everything in that post without any type of access?

        Note that the computer can't reboot in any mode except Safe Mode either. Anything that requires an online verification won't work.It appears that all the downloads will have to be done by you and transferred using a flashdrive or CD.I would probably be easier to reinstall. When I say "You have a massive problem." I'm not exaggerating.Ah.

        Bummer.

        I appreciate the help, anyway. I'll pass the word along to her.
        3941.

        Solve : Dual boot and AV programs?

        Answer»

        I'm planning on adding Ubuntu as a dual boot on one of my computers. Will I need to ADD the USUAL AV & Anti-Spyware to that boot ALSO?Yes.Quote from: Broni on May 02, 2008, 07:59:05 PM

        Yes.
        So, there won't be a problem with running two AV's at the same TIME? What about a firewall?You won't be running 2 at a time...you will have 2 installations.
        You can only run one OS at a time so this wouldn't apply....What about firewalls. Do I need two?Yes.
        3942.

        Solve : system error dangerous virus message?

        Answer»

        You didn't do anything wrong, it won't scan 0 byte files.

        Go to Start > Run and copy then paste this line into the box and hit enter:

        sc stop wscsvc

        Now again Start > Run and paste this line and hit enter:

        sc delete wscsvc

        How is everything now?Did it! My computer is running great with no more annoying pop-ups. Thank you so very, very much for your help. People like you make the world a much better place! May God Bless you!Still a few more fianl steps.

        Let's clear out the programs we've been using to clean up your computer, they are not suitable for
        general malware removal and could cause damage if launched accidentally. These steps will also help secure the work you have done.
        .

        • CLICK START then RUN
        • Now type Combofix /u in the runbox
        • Make sure there's a space between Combofix and /u
        • Then hit Enter.
        .
        .
        The above procedure will:
        • Delete:
          • ComboFix and its associated files and FOLDERS.
          • VundoFix backups, if present
          • The C:\Deckard folder, if present
          • The C:_OtMoveIt folder, if present
          • Reset the clock settings.
          • Hide file extensions, if required.
          • Hide System/Hidden files, if required.
          • Set a new, clean Restore Point.
          .
          Download OTMoveIt2 by OldTimer OTMoveIt2.exe and place it on your desktop. (unless you already have it installed)

          1. Double click OTMoveIt2.exe to launch it.
          Vista users right click and choose Run As Administrator
          2. Click on the CleanUp! button.
          3. OTMoveIt2 will download a list from the Internet, if your firewall or other defensive programs alerts you, allow it access.
          4. Click YES at the next prompt (list downloaded, Do you want to begin cleanup process?)
          5. Once complete exit out of OTMoveIt2

          Set a New Restore Point to prevent possible reinfection from an old one
          Setting a new restore point AFTER cleaning your system will enable your computer to roll-back to a clean working state if needed.
          • Go to Start > Programs > Accessories > System Tools and click System Restore
          • Choose the radio button marked Create a Restore Point on the first screen then click Next Give the Restore Point a name then click Create.
          • The new restore point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
          • Next go to Start > Run and type Cleanmgr
          • Click OK
          • Click the More Options Tab.
          • Click Clean Up in the System Restore section to remove all previous restore points except the newly created clean one.
          .
          Use the Secunia Software Inspector to check for out of date software.
          • Click Start Now
          • Check the box next to Enable thorough system inspection.
          • Click Start
          • Allow the scan to finish and scroll down to see if any updates are needed.
          • Update anything listed.
          .
          Here are some great tools to help you keep from getting infected again.

          To prevent unknown applications from being installed on your computer install WinPatrol 2007

          Another thing I would suggest installing SiteAdvisor. SiteAdvisor rates sites on business practices and spam.

          Spybot Search & Destroy - A safe and effective spyware scanner.
          * Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

          AVG Anti-Spyware Free Edition - Very reliable with a high detection rate.
          * AVG Anti-Spyware User Manual

          SpywareBlaster - Secure your Internet Explorer to make it harder for these ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running MOZILLA based browsers like Firefox.
          * Using SpywareBlaster to protect your computer from Spyware and Malware

          Comodo BOClean - Stops trojans and many more malicious attacks.

          Use a Firewall - It can not be stressed enough how important it is that you use a Firewall on your computer. Without a firewall your computer is susceptible to being hacked and taken over.
          * Click here for a list of free firewalls.
          * Why would I consider a third party firewall?
          * Understanding and Using Firewalls

          UPDATE!!! UPDATE!!! UPDATE!!! - If you do not have automatic updates enabled then visit http://www.windowsupdate.com[/b]]http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer.
          * Help with Windows updates

          Learn more about how to protect yourself while on the internet read this article by Tony Klien: So how did I get infected in the first place?

          Let us know if anything else comes up.
          3943.

          Solve : don't know what to do.....help?

          Answer»

          I noticed agent.exe was causing issues with one of my profiles on my computer. I also noticed a new "3 search with google" that I can't delete. I ran hijackthis but don't know what to do next. I have included the logfile

          [file cleanup - saving space - attachment deleted by admin]I see couple of THINGS, but nothing deadly, though.
          However, I can't see any antivirus, nor firewall running.
          What's up with that?I just got everything replaced...I was doing research on whether to use norton corporate or macafee...I get them for free through the army. Any suggestions?Leave them both alone. You won't be happy.
          Download, and install AVG free antivirus: http://free.grisoft.com/
          Download, and install Comodo free firewall: http://www.personalfirewall.comodo.com/
          When you're done, run full AVG scan, and report its findings.
          We'll go from there.

          Before installing Comodo, make sure, Windows firewall is off
          Go Start>Control Panel. Double click on the Security Center icon. Click on the Windows Firewall icon beneath the status updates. Click Off, then OK.DOWNLOADED both anti-virus and firewall. ran a full scan. nothing found....here is another hijackthis logfile.

          [file cleanup - saving space - attachment deleted by admin]Quote

          nothing found
          This is good. Before we get to HJT log, I need you to perform couple more steps...

          1. Run free ESET Online Scanner at: http://www.eset.com/onlinescan/
          Note: This Scanner is for Internet Explorer Only
          1. You will notice that the "Start" button is grayed out. Place a CHECK mark at "Yes, I accept the Terms of use". The "Start" button will become visible. Click on it.
          2. If it wants to install an ActiveX component allow it
          3. You will be asked to install an ActiveX, click the "Install" button (Note: If you have a Firewall install you may have to approve the installation)
          4. Once ActiveX control is installed click on the "Start" button to initialize the scanner
          5. After initialization is complete, make sure, that "Remove found threats", and "Scan unwanted applications" are checkmarked.
          6. Click the "Scan" button
          7. Once the scan is done, you will find a log in C:\Program Files\esetonlinescanner\log.txt
          Post ESET's log.

          2. Download SUPERAntiSpyware Free for Home Users:
          http://www.superantispyware.com/

          Print these instructions out.

          * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
          * An icon will be created on your DESKTOP. Double-click that icon to launch the program.
          * If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
          * Close SUPERAntiSpyware.

          Restart computer in Safe Mode.
          To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; pick Safe Mode; you'll see "Safe Mode" in all four corners of your screen

          * Open SUPERAntiSpyware.
          * Under "CONFIGURATION and Preferences", click the Preferences button.
          * Click the Scanning Control tab.
          * Under Scanner Options make sure the following are checked (leave all others unchecked):
          o Close browsers before scanning.
          o Scan for tracking cookies.
          o Terminate memory threats before quarantining.
          * Click the "Close" button to leave the control center screen.
          * Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
          * On the left, make sure you check C:\Fixed Drive.
          * On the right, under "Complete Scan", choose Perform Complete Scan.
          * Click "Next" to start the scan. Please be patient while it scans your computer.
          * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
          * Make sure everything has a checkmark next to it and click "Next".
          * A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
          * If asked if you want to reboot, click "Yes".
          * To retrieve the removal information after reboot, launch SUPERAntispyware again.
          o Click Preferences, then click the Statistics/Logs tab.
          o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
          o If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
          o Please copy and paste the Scan Log results in your next reply with a new HijackThis log.
          * Click Close to exit the program.
          Post SUPERAntiSpyware log.

          3. Post new HijackThis log.I downloaded programs as instructed and ran them as instructed. I seemed to have a few spyware items. I have included the text version of everything.






          [file cleanup - saving space - attachment deleted by admin]1. Print this post out, since you won't have an access to it, at some point.

          2. Close all windows, except for HijackThis.

          3. Put a checkmark next to the following HijackThis entries (some entries will be checkmarked to disable unnecessary startups; in those cases (marked with *), no actual program will be removed):

          - O2 - BHO: XBTB06823 - {BA463437-C3DE-47da-8280-87596824388A} - C:\PROGRA~1\GOOGLE~1\TOOLBA~1.DLL (file missing)
          - O3 - Toolbar: (no name) - {BA52B914-B692-46c4-B683-905236F6F655} - (no file)
          - *O4 - HKLM\..\Run: [ISUSPM Startup] C:\PROGRA~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
          - *O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe" -start


          4. Click on "Fix checked" button.

          5. Turn off System Restore:

          - Windows XP:
          1. Click Start.
          2. Right-click the My Computer icon, and then click Properties.
          3. Click the System Restore tab.
          4. Check "Turn off System Restore".
          5. Click Apply.
          6. When turning off System Restore, the existing restore points will be deleted. Click Yes to do this.
          7. Click OK.
          - Windows Vista:
          1. Click Start.
          2. Right-click the Computer icon, and then click Properties.
          3. Click on System Protection under the Tasks column on the left side
          4. Click on Continue on the "User Account Control" window that pops up
          5. Under the System Protection tab, find Available Disks
          6. Uncheck the box for any drive you wish to disable system restore on (in most cases, drive "C:")
          7. When turning off System Restore, the existing restore points will be deleted. Click "Turn System Restore Off" on the popup window to do this.
          8. Click OK

          6. Restart in Normal Mode.

          7. Turn System Restore on.

          8. Post new HijackThis log.
          3944.

          Solve : I have no clue what is wrong with my computer.?

          Answer»

          I have a Dell laptop Latitude D500. Ok so my dad gave me his old work laptop for school. It has a tiny harddrive, only 27 gigs. When I got it there was MAYBE 5 gigs of free space. So in order for me to have music and games I got an external drive. Well everything was fine until about a week ago. I could of swore that when i got the external I had around 3 gigs left on the old harddrive. Well last week my harddrive was down to 1 gig, but problem is that the memory just kept draining. As of right now my computer is saying the C drive has 15mb of space left. Funny thing is, is that when i reboot it goes back up to around 200 mb but just drains back down. Any help with this problem would be much appreciated.

          Thanks, RudyThe Windows pagefile changes size while you are using your computer. This MAY be why you seem to gain and lose free space. Please provide info on which operating system you are using. I use windows vista corporate version.Corporate isn't really a version. Do you maybe mean Business or Enterprise? it would be business then. Im looking at the page file link but I still don't get how my hard drive is down to 15 mb. I'd totally reformat that drive, and reinstall Windows.The page file is not static - it is a range. It usually starts at an amount equal to the RAM in the system and with a maximum size of double. You're losing too much space though. Is there any sort of backup software running on a SCHEDULE? On one of my contract jobs a company installed backup software on all of the portable computers that made a complete backup every week and filled up the hard drive before overwriting any old backups. One of the supidest things I've ever seen, and done by a multi billion dollar company. Uh my roommate took a look at it and he found that there was 11 gigs in the history folder. Wierd right, well he looked at them and what was taking up so much space were these folders with just dots in them. I'm guessing its some virus. ALSO im looking in the windows folder and I see an abundance of spuninst folders. Is this a virus?They are uninstall folders for windows UPDATES/service packs. You may delete uninstallers for updates older, then, say 6 months.There is also an option to remove the Windows Update Uninstallers in CCleaner under Advanced > Hotfix Uninstallers.

          But as Broni stated, make sure your computer is running fine for a while before removing them. Once you delete them there is no getting them back.

          Eg0Deaths idea about the backup files is a good one to investigate.

          Also what security software do you use? PC-cIllin will take up loads of space with it's security logs.

          Download ExplorerXP. It will allow you to easily find out how big what folders areI recommended reformat, because since it was your dad laptop, and he left you 5 gig free space out of 27, I assume, 22 gig comes from Windows, and dad's stuff....unless, you need dad's stuff.

          3945.

          Solve : I have viruses and would like help?

          Answer»

          I have tried my ANTI virus and it will not get rid of the problem. I have asus ,windows xp sp2, intel pentium dual E2140, nivida Gforce 8500 gt. sound max, I do have hijack this saved on p.c . I am using mcafee enterprize 7.1 and spybot, spydoctor(free)1. Run free ESET Online Scanner at: http://www.eset.com/onlinescan/
          Note: This Scanner is for Internet Explorer Only
          1. You will notice that the "Start" button is grayed out. Place a check mark at "Yes, I accept the TERMS of use". The "Start" button will become visible. Click on it.
          2. If it wants to install an ActiveX component allow it
          3. You will be asked to install an ActiveX, click the "Install" button (Note: If you have a Firewall install you may have to approve the installation)
          4. Once ActiveX control is installed click on the "Start" button to initialize the scanner
          5. After initialization is complete, make sure, that "Remove found threats", and "Scan unwanted applications" are checkmarked.
          6. Click the "Scan" button
          7. Once the scan is done, you will find a log in C:\Program Files\esetonlinescanner\log.txt
          Post ESET's log.

          2. Download SUPERAntiSpyware Free for Home Users:
          http://www.superantispyware.com/

          Print these instructions out.

          * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
          * An icon will be CREATED on your desktop. Double-click that icon to launch the program.
          * If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
          * Close SUPERAntiSpyware.

          Restart computer in Safe Mode.
          To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; pick Safe Mode; you'll see "Safe Mode" in all four corners of your screen

          * Open SUPERAntiSpyware.
          * Under "Configuration and PREFERENCES", click the Preferences button.
          * Click the Scanning Control tab.
          * Under Scanner Options make sure the following are checked (leave all others unchecked):
          o Close browsers before scanning.
          o Scan for tracking cookies.
          o Terminate memory threats before quarantining.
          * Click the "Close" button to leave the control center screen.
          * Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
          * On the left, make sure you check C:\Fixed Drive.
          * On the right, under "Complete Scan", choose Perform Complete Scan.
          * Click "Next" to start the scan. Please be patient while it scans your computer.
          * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
          * Make sure everything has a checkmark next to it and click "Next".
          * A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
          * If asked if you want to reboot, click "Yes".
          * To retrieve the removal information after reboot, launch SUPERAntispyware again.
          o Click Preferences, then click the Statistics/Logs tab.
          o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
          o If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
          o Please copy and paste the Scan Log results in your next reply with a new HijackThis log.
          * Click Close to exit the program.
          Post SUPERAntiSpyware log.

          3. Download HijackThis:
          http://www.snapfiles.com/get/hijackthis.html
          Post HijackThis log.# version=4
          # OnlineScanner.ocx=1.0.0.56
          # OnlineScannerDLLA.dll=1, 0, 0, 51
          # OnlineScannerDLLW.dll=1, 0, 0, 51
          # OnlineScannerUninstaller.exe=1, 0, 0, 49
          # vers_standard_module=2851 (20080205)
          # vers_arch_module=1.063 (20080117)
          # vers_adv_heur_module=1.060 (20070601)
          # EOSSerial=29f107ba225ec148a89601fd092f0f6c
          # end=finished
          # remove_checked=true
          # unwanted_checked=true
          # utc_time=2008-02-06 03:55:58
          # local_time=2008-02-06 04:55:58 (+0100, Central Europe Standard Time)
          # country="United States"
          # osver=5.1.2600 NT Service Pack 2
          # scanned=253894
          # found=4
          # scan_time=2469
          C:\QUARANTINE\A0131822.exemultiple infiltrations (deleted)00000000000000000000000000000000
          C:\QUARANTINE\A0131822.exe »RAR »keygen.exea variant of Win32/TrojanDownloader.Small.NUS TROJAN (error while cleaning - operation unavailable for this type of object - error while deleting - operation unavailable for this type of object - was a part of the deleted object)00000000000000000000000000000000
          C:\QUARANTINE\A0131822.exe »RAR »install.exeWin32/Virut.AV virus (error while cleaning - operation unavailable for this type of object - error while deleting - operation unavailable for this type of object - was a part of the deleted object)00000000000000000000000000000000
          C:\QUARANTINE\A0131822.exe »RAR »readme.batprobably a variant of Win32/Agent trojan (error while cleaning - operation unavailable for this type of object - error while deleting - operation unavailable for this type of object - was a part of the deleted object)00000000000000000000000000000000
          I ran SUPERanti spy and it came back clean, no problems to fix, left no log after i rebooted. hereLogfile of Trend Micro HijackThis v2.0.0 (BETA)
          Scan saved at 6:07:28 AM, on 2/6/2008
          Platform: Windows XP SP2 (WinNT 5.01.2600)
          Boot mode: Normal

          Running processes:
          C:\WINDOWS\System32\smss.exe
          C:\WINDOWS\system32\csrss.exe
          C:\WINDOWS\system32\winlogon.exe
          C:\WINDOWS\system32\services.exe
          C:\WINDOWS\system32\lsass.exe
          C:\WINDOWS\system32\svchost.exe
          C:\WINDOWS\system32\svchost.exe
          C:\WINDOWS\System32\svchost.exe
          C:\WINDOWS\system32\svchost.exe
          C:\WINDOWS\system32\svchost.exe
          C:\WINDOWS\system32\spoolsv.exe
          C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
          C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
          C:\Program Files\Network Associates\VirusScan\Mcshield.exe
          C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
          C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
          C:\PROGRA~1\NETWOR~1\COMMON~1\naPrdMgr.exe
          C:\WINDOWS\system32\nvsvc32.exe
          C:\Program Files\Spyware Doctor\svcntaux.exe
          C:\WINDOWS\Explorer.EXE
          C:\Program Files\Spyware Doctor\swdsvc.exe
          C:\WINDOWS\system32\RUNDLL32.EXE
          C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
          C:\WINDOWS\system32\wfxsnt40.exe
          C:\Program Files\Neobee Speeedy Internet Accelerator\speeedycore.exe
          C:\Program Files\Analog Devices\Core\smax4pnp.exe
          C:\WINDOWS\system32\rundll32.exe
          C:\Program Files\Analog Devices\SoundMAX\Smax4.exe
          C:\Program Files\ASUS\AASP\1.00.23\aaCenter.exe
          C:\Program Files\ASUS\AI Suite\AiNap\AiNap.exe
          C:\WINDOWS\Samsung\PanelMgr\SSMMgr.exe
          C:\Program Files\Spyware Doctor\SDTrayApp.exe
          C:\WINDOWS\system32\ctfmon.exe
          C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
          C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
          C:\Program Files\WinFax\WFXCTL32.EXE
          C:\Program Files\Google\Google Updater\GoogleUpdater.exe
          C:\Program Files\Neobee Speeedy Internet Accelerator\speeedygui.exe
          C:\WINDOWS\system32\svchost.exe
          C:\WINDOWS\system32\wdfmgr.exe
          C:\WINDOWS\system32\WFXSVC.EXE
          C:\Program Files\WinFax\WFXMOD32.EXE
          C:\WINDOWS\system32\wbem\wmiprvse.exe
          C:\WINDOWS\System32\alg.exe
          C:\WINDOWS\system32\wuauclt.exe
          D:\applications\HiJackThis_v2.exe

          R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
          R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
          R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
          R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
          O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
          O4 - HKLM\..\Run: [nwiz] "nwiz.exe" /install
          O4 - HKLM\..\Run: [NvMediaCenter] "RUNDLL32.EXE" C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
          O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
          O4 - HKLM\..\Run: [WinFaxAppPortStarter] wfxsnt40.exe
          O4 - HKLM\..\Run: [SlipStream] "C:\Program Files\Neobee Speeedy Internet Accelerator\speeedycore.exe"
          O4 - HKLM\..\Run: [NvCplDaemon] "RUNDLL32.EXE" C:\WINDOWS\system32\NvCpl.dll,NvStartup
          O4 - HKLM\..\Run: [SoundMAXPnP] "C:\Program Files\Analog Devices\Core\smax4pnp.exe"
          O4 - HKLM\..\Run: [SoundMAX] "C:\Program Files\Analog Devices\SoundMAX\Smax4.exe" /tray
          O4 - HKLM\..\Run: [JMB36X IDE Setup] C:\WINDOWS\JM\JMInsIDE.exe
          O4 - HKLM\..\Run: [JMB36X Configure] "C:\WINDOWS\system32\JMRaidSetup.exe" boot
          O4 - HKLM\..\Run: [AsusServiceProvider] "C:\Program Files\ASUS\AASP\1.00.23\aaCenter.exe"
          O4 - HKLM\..\Run: [AsusStartupHelp] "C:\Program Files\ASUS\AASP\1.00.23\AsRunHelp.exe"
          O4 - HKLM\..\Run: [Ai Nap] "C:\Program Files\ASUS\AI Suite\AiNap\AiNap.exe"
          O4 - HKLM\..\Run: [Samsung PanelMgr] C:\WINDOWS\Samsung\PanelMgr\SSMMgr.exe /autorun
          O4 - HKLM\..\Run: [SDTray] "C:\Program Files\Spyware Doctor\SDTrayApp.exe"
          O4 - HKLM\..\Run: [PCSuiteTrayApplication] "C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe" -startup
          O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
          O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
          O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
          O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
          O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
          O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
          O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
          O4 - Startup: Yahoo! Widgets.lnk = C:\Program Files\Yahoo!\Widgets\YahooWidgets.exe
          O4 - Global Startup: Controller.LNK = C:\Program Files\WinFax\WFXCTL32.EXE
          O4 - Global Startup: Google Updater.lnk = C:\Program Files\Google\Google Updater\GoogleUpdater.exe
          O4 - Global Startup: Neobee Speeedy Internet Accelerator.lnk = C:\Program Files\Neobee Speeedy Internet Accelerator\speeedygui.exe
          O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
          O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
          O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
          O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe
          O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe
          O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
          O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
          O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
          O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
          O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
          O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/eng/partner/default/kavwebscan_unicode.cab
          O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
          O16 - DPF: {4D054067-DE3A-48F9-B19B-BCD229B9AE8D} (PrinterHelpEtcActiveX Control) - http://www.samsungdp.com/printerhelp/ActiveX/DrPrinter.cab
          O16 - DPF: {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} (OnlineScanner Control) - http://www.eset.eu/buxus/docs/OnlineScanner.cab
          O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} (Java Plug-in 1.6.0_03) -
          O16 - DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} (Java Plug-in 1.6.0_03) -
          O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} -
          O16 - DPF: {E8F628B5-259A-4734-97EE-BA914D7BE941} (Driver Agent ActiveX Control) - http://driveragent.com/files/driveragent.cab
          O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
          O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
          O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
          O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
          O23 - Service: McAfee Framework Service (McAfeeFramework) - Network Associates, Inc. - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
          O23 - Service: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\Mcshield.exe
          O23 - Service: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
          O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
          O23 - Service: PC Tools Auxiliary Service (sdAuxService) - Unknown owner - C:\Program Files\Spyware Doctor\svcntaux.exe
          O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\swdsvc.exe
          O23 - Service: ServiceLayer - Nokia. - C:\Program Files\PC Connectivity Solution\ServiceLayer.exe
          O23 - Service: WinFax PRO (wfxsvc) - Symantec Corporation - C:\WINDOWS\system32\WFXSVC.EXE

          --
          End of file - 8602 bytes
          is my highjack this.This is beta version.
          Please, download HJT from my link!It must be fresh HJT log.Logfile of Trend Micro HijackThis v2.0.2
          Scan saved at 6:34:12 AM, on 2/6/2008
          Platform: Windows XP SP2 (WinNT 5.01.2600)
          MSIE: Internet Explorer v7.00 (7.00.6000.16574)
          Boot mode: Normal

          Running processes:
          C:\WINDOWS\System32\smss.exe
          C:\WINDOWS\system32\csrss.exe
          C:\WINDOWS\system32\winlogon.exe
          C:\WINDOWS\system32\services.exe
          C:\WINDOWS\system32\lsass.exe
          C:\WINDOWS\system32\svchost.exe
          C:\WINDOWS\system32\svchost.exe
          C:\WINDOWS\System32\svchost.exe
          C:\WINDOWS\system32\svchost.exe
          C:\WINDOWS\system32\svchost.exe
          C:\WINDOWS\system32\spoolsv.exe
          C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
          C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
          C:\Program Files\Network Associates\VirusScan\Mcshield.exe
          C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
          C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
          C:\PROGRA~1\NETWOR~1\COMMON~1\naPrdMgr.exe
          C:\WINDOWS\system32\nvsvc32.exe
          C:\Program Files\Spyware Doctor\svcntaux.exe
          C:\WINDOWS\Explorer.EXE
          C:\Program Files\Spyware Doctor\swdsvc.exe
          C:\WINDOWS\system32\RUNDLL32.EXE
          C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
          C:\WINDOWS\system32\wfxsnt40.exe
          C:\Program Files\Neobee Speeedy Internet Accelerator\speeedycore.exe
          C:\Program Files\Analog Devices\Core\smax4pnp.exe
          C:\WINDOWS\system32\rundll32.exe
          C:\Program Files\Analog Devices\SoundMAX\Smax4.exe
          C:\Program Files\ASUS\AASP\1.00.23\aaCenter.exe
          C:\Program Files\ASUS\AI Suite\AiNap\AiNap.exe
          C:\WINDOWS\Samsung\PanelMgr\SSMMgr.exe
          C:\Program Files\Spyware Doctor\SDTrayApp.exe
          C:\WINDOWS\system32\ctfmon.exe
          C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
          C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
          C:\Program Files\WinFax\WFXCTL32.EXE
          C:\Program Files\Google\Google Updater\GoogleUpdater.exe
          C:\Program Files\Neobee Speeedy Internet Accelerator\speeedygui.exe
          C:\WINDOWS\system32\svchost.exe
          C:\WINDOWS\system32\wdfmgr.exe
          C:\WINDOWS\system32\WFXSVC.EXE
          C:\Program Files\WinFax\WFXMOD32.EXE
          C:\WINDOWS\System32\alg.exe
          C:\WINDOWS\system32\NOTEPAD.EXE
          C:\Program Files\Internet Explorer\iexplore.exe
          C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
          C:\WINDOWS\system32\wbem\wmiprvse.exe

          R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
          R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
          R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
          R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
          R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http=127.0.0.1:8080
          O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
          O4 - HKLM\..\Run: [nwiz] "nwiz.exe" /install
          O4 - HKLM\..\Run: [NvMediaCenter] "RUNDLL32.EXE" C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
          O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
          O4 - HKLM\..\Run: [WinFaxAppPortStarter] wfxsnt40.exe
          O4 - HKLM\..\Run: [SlipStream] "C:\Program Files\Neobee Speeedy Internet Accelerator\speeedycore.exe"
          O4 - HKLM\..\Run: [NvCplDaemon] "RUNDLL32.EXE" C:\WINDOWS\system32\NvCpl.dll,NvStartup
          O4 - HKLM\..\Run: [SoundMAXPnP] "C:\Program Files\Analog Devices\Core\smax4pnp.exe"
          O4 - HKLM\..\Run: [SoundMAX] "C:\Program Files\Analog Devices\SoundMAX\Smax4.exe" /tray
          O4 - HKLM\..\Run: [JMB36X IDE Setup] C:\WINDOWS\JM\JMInsIDE.exe
          O4 - HKLM\..\Run: [JMB36X Configure] "C:\WINDOWS\system32\JMRaidSetup.exe" boot
          O4 - HKLM\..\Run: [AsusServiceProvider] "C:\Program Files\ASUS\AASP\1.00.23\aaCenter.exe"
          O4 - HKLM\..\Run: [AsusStartupHelp] "C:\Program Files\ASUS\AASP\1.00.23\AsRunHelp.exe"
          O4 - HKLM\..\Run: [Ai Nap] "C:\Program Files\ASUS\AI Suite\AiNap\AiNap.exe"
          O4 - HKLM\..\Run: [Samsung PanelMgr] C:\WINDOWS\Samsung\PanelMgr\SSMMgr.exe /autorun
          O4 - HKLM\..\Run: [SDTray] "C:\Program Files\Spyware Doctor\SDTrayApp.exe"
          O4 - HKLM\..\Run: [PCSuiteTrayApplication] "C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe" -startup
          O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
          O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
          O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
          O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
          O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
          O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
          O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
          O4 - Startup: Yahoo! Widgets.lnk = C:\Program Files\Yahoo!\Widgets\YahooWidgets.exe
          O4 - Global Startup: Controller.LNK = C:\Program Files\WinFax\WFXCTL32.EXE
          O4 - Global Startup: Google Updater.lnk = C:\Program Files\Google\Google Updater\GoogleUpdater.exe
          O4 - Global Startup: Neobee Speeedy Internet Accelerator.lnk = C:\Program Files\Neobee Speeedy Internet Accelerator\speeedygui.exe
          O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
          O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
          O8 - Extra context menu item: Pokazi sve originalne slike - res://C:\Program Files\Neobee Speeedy Internet Accelerator\gui_resource.dll/327
          O8 - Extra context menu item: Pokaži originalnu sliku - res://C:\Program Files\Neobee Speeedy Internet Accelerator\gui_resource.dll/328
          O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
          O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe
          O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe
          O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
          O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
          O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
          O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
          O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
          O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/eng/partner/default/kavwebscan_unicode.cab
          O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
          O16 - DPF: {4D054067-DE3A-48F9-B19B-BCD229B9AE8D} (PrinterHelpEtcActiveX Control) - http://www.samsungdp.com/printerhelp/ActiveX/DrPrinter.cab
          O16 - DPF: {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} (OnlineScanner Control) - http://www.eset.eu/buxus/docs/OnlineScanner.cab
          O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} (Java Plug-in 1.6.0_03) -
          O16 - DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} (Java Plug-in 1.6.0_03) -
          O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} -
          O16 - DPF: {E8F628B5-259A-4734-97EE-BA914D7BE941} (Driver Agent ActiveX Control) - http://driveragent.com/files/driveragent.cab
          O17 - HKLM\System\CCS\Services\Tcpip\..\{6DE58A9D-42A7-427B-ABFA-082DC8395EFC}: NameServer = 80.74.160.38 80.74.160.12
          O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
          O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
          O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
          O23 - Service: McAfee Framework Service (McAfeeFramework) - Network Associates, Inc. - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
          O23 - Service: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\Mcshield.exe
          O23 - Service: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
          O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
          O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\svcntaux.exe
          O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\swdsvc.exe
          O23 - Service: ServiceLayer - Nokia. - C:\Program Files\PC Connectivity Solution\ServiceLayer.exe
          O23 - Service: WinFax PRO (wfxsvc) - Symantec Corporation - C:\WINDOWS\system32\WFXSVC.EXE

          --
          End of file - 9076 bytes
          sorry about thatThank you

          The log looks clean. Any particular problems?
          I will re-check everthing and get back to you tommorow I am out of time today. Thank you for your time No problem

          3946.

          Solve : Key stroke recorders.?

          Answer»

          When scanning for spy ware with Spybot, I noticed that " SmartKey Stroke recorder"
          went by in the scan subjects.

          Would that indicate there is a key recorder on my 'puter, or simply that it was scanning for one?

          How can I find out if there is one...? Anybody?[/size]
          If it went by at the very bottom of the SCREEN, it was just scanning for it. If it actually shows it in the list of threats, you've got it on the computer.Thanks, that's what I thought.
          no problem. btw- I enjoy your name. nice.Quote from: socrates on February 05, 2008, 12:28:29 PM

          no problem. btw- I enjoy your name. nice.
          I called my dog Pooper. His rl name was Prince Johnathan, or PJ, but he was ALWAYS "Pooper" to me.cheers to pooper. Quote from: pooper on February 04, 2008, 07:49:13 AM
          When scanning for spy ware with Spybot, I noticed that " SmartKey Stroke recorder"
          went by in the scan subjects.

          Would that indicate there is a key recorder on my 'puter, or simply that it was scanning for one?

          How can I find out if there is one...? Anybody?[/size]

          where did you get that keystrokker and is it any good?Quote from: robrowboski on February 05, 2008, 05:12:20 PM
          Quote from: pooper on February 04, 2008, 07:49:13 AM
          When scanning for spy ware with Spybot, I noticed that " SmartKey Stroke recorder"
          went by in the scan subjects.

          Would that indicate there is a key recorder on my 'puter, or simply that it was scanning for one?

          How can I find out if there is one...? Anybody?[/size]

          where did you get that keystrokker and is it any good?

          If you would've read the REST of the posts, you would have realized that he never had the keylogger INSTALLED. GEEZ.
          3947.

          Solve : Possible virus on my memory stick?

          Answer»

          My memory stick is continually creating duplicate folders I have run a virus scan with Mcafee but it detects nothing. The Mcafee is up to date and the version is 8.5.0i.

          I have a number of COLLEAGUES who have the same problem.

          The duplicate folders that are created are .EXE files, when one double-clicks on it Mcafee reports that it has detected and deleted a virus "hakaglan"

          Some assistance would be appreciated.To remove this infection, download & run this file.

          Download Flash_Disinfector.exe by sUBs and save it to your desktop:

          • Double-click Flash_Disinfector.exe to run it.
          • Your desktop and icons may disappear. This is normal.
          • Follow any prompts that may appear.
          • Wait until the program has finished scanning, then please exit the program.
            • The tool may ask you to INSERT your flash drive, or other REMOVABLE DRIVES. Please do so and allow the tool to clean it up as well.
            • Please restart your computer.
            .
            Running sUBs Flash Disinfector will target alot of auto run infections and create a hidden folder named autorun.inf on each partition and any USB drive you plug in, these dummy autorun.inf files will help protect your PC from reinfection because if the infected flash drive is then inserted, autorun looks for autorun.inf which would normally run the infection but its then prevented by the dummy autorun.inf that is in place. If you have any USB drives please insert them when prompted when running the tool.

            You can easily delete the new autorun.inf if you choose.
            3948.

            Solve : Broni need help here.?

            Answer» SUPERANTISPYWARE Scan Log
            http://www.superantispyware.com

            Generated 04/30/2007 at 05:06 AM

            Application Version : 3.9.1008

            Core Rules Database Version : 3396
            Trace Rules Database Version: 1388

            Scan type : Custom Scan
            Total Scan Time : 00:15:44

            Memory items scanned : 315
            Memory threats detected : 0
            Registry items scanned : 4472
            Registry threats detected : 24
            File items scanned : 20270
            File threats detected : 12

            Trojan.Net-RoAM
            HKLM\Software\Classes\CLSID\{4C579E8B-92F1-44d1-9444-66A4355E9386}
            HKCR\CLSID\{4C579E8B-92F1-44D1-9444-66A4355E9386}
            HKCR\CLSID\{4C579E8B-92F1-44D1-9444-66A4355E9386}
            HKCR\CLSID\{4C579E8B-92F1-44D1-9444-66A4355E9386}\InprocServer32
            HKCR\CLSID\{4C579E8B-92F1-44D1-9444-66A4355E9386}\InprocServer32#ThreadingModel
            HKCR\CLSID\{4C579E8B-92F1-44D1-9444-66A4355E9386}\ProgID
            HKCR\CLSID\{4C579E8B-92F1-44D1-9444-66A4355E9386}\TypeLib
            ROZMCHILD.DLL

            Unclassified.Unknown Origin
            HKLM\Software\Classes\CLSID\{85911752-BC96-4fff-9121-6EB9D8F438E1}
            HKCR\CLSID\{85911752-BC96-4FFF-9121-6EB9D8F438E1}
            HKCR\CLSID\{85911752-BC96-4FFF-9121-6EB9D8F438E1}
            HKCR\CLSID\{85911752-BC96-4FFF-9121-6EB9D8F438E1}\InprocServer32
            HKCR\CLSID\{85911752-BC96-4FFF-9121-6EB9D8F438E1}\InprocServer32#ThreadingModel
            HKCR\CLSID\{85911752-BC96-4FFF-9121-6EB9D8F438E1}\ProgID
            HKCR\CLSID\{85911752-BC96-4FFF-9121-6EB9D8F438E1}\TypeLib
            HYPERCONN.DLL
            HKLM\Software\Classes\CLSID\{B87D203B-B43D-4af9-9E1B-9C20478CBB74}
            HKCR\CLSID\{B87D203B-B43D-4AF9-9E1B-9C20478CBB74}
            HKCR\CLSID\{B87D203B-B43D-4AF9-9E1B-9C20478CBB74}
            HKCR\CLSID\{B87D203B-B43D-4AF9-9E1B-9C20478CBB74}\InprocServer32
            HKCR\CLSID\{B87D203B-B43D-4AF9-9E1B-9C20478CBB74}\InprocServer32#ThreadingModel
            HKCR\CLSID\{B87D203B-B43D-4AF9-9E1B-9C20478CBB74}\ProgID
            HKCR\CLSID\{B87D203B-B43D-4AF9-9E1B-9C20478CBB74}\TypeLib
            TARDEME2.DLL
            HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B87D203B-B43D-4af9-9E1B-9C20478CBB74}

            Adware.WhenU
            HKCR\WUSN.1
            HKCR\WUSN.1#WUSN_Id

            Adware.Tracking Cookie
            C:\Documents and Settings\Administrator.MICROSOF-7D6B22\Local Settings\Temp\Cookies\[emailprotected][2].txt
            C:\Documents and Settings\Administrator.MICROSOF-7D6B22\Local Settings\Temp\Cookies\[emailprotected][1].txt
            C:\Documents and Settings\Administrator.MICROSOF-7D6B22\Local Settings\Temp\Cookies\[emailprotected][1].txt
            C:\Documents and Settings\Administrator.MICROSOF-7D6B22\Local Settings\Temp\Cookies\[emailprotected][2].txt
            C:\Documents and Settings\Administrator.MICROSOF-7D6B22\Local Settings\Temp\Cookies\[emailprotected][2].txt
            C:\Documents and Settings\Administrator.MICROSOF-7D6B22\Local Settings\Temp\Cookies\[emailprotected][2].txt
            C:\Documents and Settings\Administrator.MICROSOF-7D6B22\Local Settings\Temp\Cookies\[emailprotected][1].txt
            C:\Documents and Settings\Administrator.MICROSOF-7D6B22\Local Settings\Temp\Cookies\[emailprotected][2].txt

            Trojan.Net-BSNH/Ambler
            C:\WINDOWS\SYSTEM32\STRIKE12.DLL
            Logfile of Trend Micro HijackThis v2.0.2
            Scan saved at 5:25:07, on 30/4/2550
            Platform: Windows XP SP2 (WinNT 5.01.2600)
            MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
            Boot mode: Normal

            Running processes:
            C:\WINDOWS\System32\smss.exe
            C:\WINDOWS\system32\winlogon.exe
            C:\WINDOWS\system32\services.exe
            C:\WINDOWS\system32\lsass.exe
            C:\WINDOWS\system32\svchost.exe
            C:\WINDOWS\System32\svchost.exe
            C:\WINDOWS\system32\spoolsv.exe
            C:\WINDOWS\Explorer.EXE
            C:\WINDOWS\system32\taskswitch.exe
            C:\WINDOWS\system32\VTTimer.exe
            C:\WINDOWS\system32\VTtrayp.exe
            C:\WINDOWS\SOUNDMAN.EXE
            C:\WINDOWS\system\svchosl.exe
            C:\WINDOWS\VMSnap3.EXE
            C:\WINDOWS\Domino.EXE
            C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
            C:\Program Files\Windows LIVE\Messenger\msnmsgr.exe
            C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
            C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
            C:\WINDOWS\system32\imapi.exe
            C:\WINDOWS\system32\svchost.exe
            C:\Program Files\Mozilla Firefox\firefox.exe
            C:\WINDOWS\system32\notepad.exe
            C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

            R0 - HKCU\Software\Microsoft\Internet Explorer\Main,START Page = http://go.microsoft.com/fwlink/?LinkId=69157
            R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
            R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
            R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
            R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = iLLUSiON
            R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
            R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
            O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
            O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
            O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
            O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
            O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
            O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
            O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
            O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
            O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
            O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
            O4 - HKLM\..\Run: [CoolSwitch] C:\WINDOWS\system32\taskswitch.exe
            O4 - HKLM\..\Run: [VTTimer] VTTimer.exe
            O4 - HKLM\..\Run: [VTTrayp] VTtrayp.exe
            O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
            O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
            O4 - HKLM\..\Run: [svchosl] C:\WINDOWS\system\svchosl.exe
            O4 - HKLM\..\Run: [VMSnap3] C:\WINDOWS\VMSnap3.EXE
            O4 - HKLM\..\Run: [Domino] C:\WINDOWS\Domino.EXE
            O4 - HKLM\..\Run: [BigDog303] C:\WINDOWS\VM303_STI.EXE VIMICRO USB PC Camera (ZC0301PLH)
            O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
            O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
            O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
            O4 - HKCU\..\Run: [BitTorrent] "C:\Program Files\BitTorrent\bittorrent.exe" --force_start_minimized
            O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
            O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
            O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
            O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
            O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
            O4 - Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
            O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
            O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
            O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycmap.htm
            O8 - Extra context menu item: Yahoo! &SMS - file:///C:\Program Files\Yahoo!\Common/ycsms.htm
            O8 - Extra context menu item: ส่&งออกไปยัง Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
            O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
            O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
            O9 - Extra button: Blog This - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
            O9 - Extra 'Tools' menuitem: &Blog This in Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
            O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
            O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
            O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
            O10 - Unknown file in Winsock LSP: wsock3.dll
            O10 - Unknown file in Winsock LSP: wsock3.dll
            O10 - Unknown file in Winsock LSP: wsock3.dll
            O10 - Unknown file in Winsock LSP: wsock3.dll
            O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
            O23 - Service: SPYWARE Doctor Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\svcntaux.exe
            O23 - Service: Spyware Doctor Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\swdsvc.exe

            --
            End of file - 6536 bytes
            *** I can't see any antivirus program running.
            Download, and install AVG free antivirus: http://free.grisoft.com/
            After installation, run full scan.

            *** Make sure, your Windows firewall is ON...
            Click Start, click Run, type Firewall.cpl, and then click OK.
            On the General tab, click On (recommended), and then click OK.


            *** Run free ESET Online Scanner at: http://www.eset.com/onlinescan/
            Note: This Scanner is for Internet Explorer Only
            1. You will notice that the "Start" button is grayed out. Place a check mark at "Yes, I accept the Terms of use". The "Start" button will become visible. Click on it.
            2. If it wants to install an ActiveX component allow it
            3. You will be asked to install an ActiveX, click the "Install" button (Note: If you have a Firewall install you may have to approve the installation)
            4. Once ActiveX control is installed click on the "Start" button to initialize the scanner
            5. After initialization is complete, make sure, that "Remove found threats", and "Scan unwanted applications" are checkmarked.
            6. Click the "Scan" button
            7. Once the scan is done, you will find a log in C:\Program Files\esetonlinescanner\log.txt
            Post ESET's log.

            *** Post new HJT log.
            3949.

            Solve : anylise hijack log?

            Answer»

            please see the attached logs.
            I Have norton360 installed (although it fails regularly). I also have one CLICK clean up that stops everytime I attempt to run it?

            [file cleanup - saving space - attachment deleted by admin]Pretty much clean...
            Open HJT, and checkmark these:
            - O9 - EXTRA button: WH GBP Casino - {37236812-C1A2-4529-A9CE-CFE04E3DF08A} - C:\Documents and Settings\James\Desktop\WH GBP Casino.lnk (file missing)
            - O9 - Extra 'Tools' menuitem: WH GBP Casino - {37236812-C1A2-4529-A9CE-CFE04E3DF08A} - C:\Documents and Settings\James\Desktop\WH GBP Casino.lnk (file missing)
            - O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe (file missing)
            - O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe (file missing)
            Click "Fix checked" button.
            Restart computer.

            1. Download, and install CCleaner: http://www.ccleaner.com/download/builds. Get "Slim" version.
            2. Read CCleaner instruction here: http://www.jahewi.nl/ccleaner/ccleaner.html, and run CCleanerThanks for your help. Will this get rid of the adware and spyware.
            Any simple solutions or posts to SPEED up my computer?You don't have any malwares on your computer...
            For extra PROTECTION....
            Download, and install free ThreatFire: http://www.threatfire.com/, which will GIVE you real-time protection against malwares.
            It won't interfere with your antivirus, nor firewall.

            CCleaner should be run regularly.

            3950.

            Solve : anti-virus and spyware for Intel Celeron processor and Comodo firewall?

            Answer»

            Hi- I have a Dell computer with an Intel Celeron processor with 128MB of RAM and 996hz processor. I downloaded a Comodo firewall. Now I NEED anti-virus(preferably free) and spyware(preferably free). I checked the system requirements for Avast, AVG, and Comomdo anti-virus and they all require an Intel Pentium processor(or equivalent). Can I still get one of these products with an Intel Celeron processor? Or what anti-virus can I get with an Intel processor? I can't afford to get a new processor right now. ALso, do you know of any registry cleaner that I can download for free that will scan and CLEAN my computer. One more thing, do you recommend more than one spyware PROGRAM for a computer?Yes all the software you mention will work with your processor.
            If the processor can run Windows it can run software created for Windows.For an extra antimalware protection...
            Download, and install free ThreatFire: http://www.threatfire.com/, which will give you real-time protection against malwares.
            It won't interfere with your antivirus, nor firewall.If you're looking for a registry cleaner then Wise Registry Cleaner will do the job for you. AVG WORKS fine with Intel processors, but I haven't tried it with less than 256MB RAM. As for COMODO Antivirus, isn't that still in BETA?