1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

can't seem to get rid of Adware problem...

Discussion in 'Virus & Other Malware Removal' started by ECL1137, Apr 13, 2008.

Thread Status:
Not open for further replies.
Advertisement
  1. ECL1137

    ECL1137 Thread Starter

    Joined:
    Apr 13, 2008
    Messages:
    9
    My parents' computer is having some issues, and I don't think they've been very careful with it, so there could be years worth of problems. But the main concern seems to be Adware... I think... random IE windows popping up (even when running FireFox), right? I've run Search & Destroy and then Dr Web which seemed to catch things the other missed, but the problem is still there. Any help would be appreciated!!


    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 8:37:06 PM, on 4/13/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.5730.0013)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\$sys$filesystem\$sys$DRMServer.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\WINDOWS\CDProxyServ.exe
    C:\WINDOWS\system32\cisvc.exe
    c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
    C:\WINDOWS\System32\nvsvc32.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Viewpoint\Common\ViewpointService.exe
    C:\WINDOWS\wanmpsvc.exe
    c:\PROGRA~1\mcafee.com\vso\mcshield.exe
    C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
    C:\WINDOWS\system32\cidaemon.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\System32\DSentry.exe
    C:\Program Files\McAfee.com\Agent\mcagent.exe
    C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe
    C:\PROGRA~1\mcafee.com\vso\mcvsshld.exe
    C:\PROGRA~1\Java\J2RE14~1.2\bin\jusched.exe
    C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2D1.EXE
    C:\PROGRA~1\VERIZO~1\HELPSU~1\VERIZO~1.EXE
    C:\PROGRA~1\VERIZO~1\HELPSU~1\SMARTB~1\MotiveSB.exe
    C:\PROGRA~1\Yahoo!\browser\ybrwicon.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\Verizon\VSP\VerizonServicepoint.exe
    C:\WINDOWS\System32\Rundll32.exe
    C:\Program Files\Common Files\Verizon Online\ConnMgr\cmisrv.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\PROGRA~1\Yahoo!\browser\ycommon.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\Digital Line Detect\DLG.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Common Files\Verizon Online\AppMgr\vzOpenUIServer.exe
    C:\Program Files\Common Files\MotiveBrowser\MotiveBrowser.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dellnet.com
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.yahoo.com/search/ie.html
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://mail.yahoo.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/cus.../sbcydsl/*http://www.yahoo.com/search/ie.html
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = mail.yahoo.com
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://red.clientapps.yahoo.com/customize/ie/defaults/su/ymsgr/*http://www.yahoo.com
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = 0.0.0.0:80
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: ZIBho Class - {029CA12C-89C1-46a7-A3C7-82F2F98635CB} - C:\Program Files\Kontiki\bin\bh309190.dll
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {243B17DE-77C7-46BF-B94B-0B5F309A0E64} - C:\Program Files\Microsoft Money\System\mnyside.dll
    O2 - BHO: (no name) - {24E9519B-3F70-429B-99BC-4B2B49B96F66} - C:\WINDOWS\system32\cbXOFuuv.dll (file missing)
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: MySidesearch Search Assistant - {9506910A-0F94-4ea1-B567-7070428B8B2B} - C:\WINDOWS\system32\mysidesearch_sidebar.dll
    O2 - BHO: (no name) - {9C6513E0-E35B-4A7D-85CD-8CB7A7E5332A} - C:\WINDOWS\system32\pmnmligf.dll (file missing)
    O2 - BHO: gooochi browser optimizer - {b3aa78d6-612d-a27c-c2d2-625e02452721} - C:\WINDOWS\system32\{dc25a79c-8a4e-054d-7bcd-0ba97ee5b0eb}.dll
    O2 - BHO: SidebarAutoLaunch Class - {F2AA9440-6328-4933-B7C9-A6CCDF9CBF6D} - C:\Program Files\Yahoo!\browser\YSidebarIEBHO.dll
    O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [DVDSentry] C:\WINDOWS\System32\DSentry.exe
    O4 - HKLM\..\Run: [MCAgentExe] C:\Program Files\McAfee.com\Agent\mcagent.exe
    O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\McAfee.com\Agent\McUpdate.exe
    O4 - HKLM\..\Run: [AdaptecDirectCD] "C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe"
    O4 - HKLM\..\Run: [VirusScan Online] c:\PROGRA~1\mcafee.com\vso\mcvsshld.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\PROGRA~1\Java\J2RE14~1.2\bin\jusched.exe
    O4 - HKLM\..\Run: [EPSON Stylus C84 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2D1.EXE /P23 "EPSON Stylus C84 Series" /O6 "USB001" /M "Stylus C84"
    O4 - HKLM\..\Run: [A Verizon App] C:\PROGRA~1\VERIZO~1\HELPSU~1\VERIZO~1.EXE
    O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\VERIZO~1\HELPSU~1\SMARTB~1\MotiveSB.exe
    O4 - HKLM\..\Run: [YBrowser] C:\PROGRA~1\Yahoo!\browser\ybrwicon.exe
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [VerizonServicepoint.exe] "C:\Program Files\Verizon\VSP\VerizonServicepoint.exe" /AUTORUN
    O4 - HKLM\..\Run: [spa_start] C:\WINDOWS\System32\Rundll32.exe "C:\WINDOWS\system32\{dc25a79c-8a4e-054d-7bcd-0ba97ee5b0eb}.dll" DllInit
    O4 - HKCU\..\Run: [DellSupport] "C:\Program Files\Dell Support\DSAgnt.exe" /startup
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet
    O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Startup: Deewoo.lnk = C:\WINDOWS\SYSTEM32\pcntokdn.exe
    O4 - Startup: DW_Start.lnk = C:\WINDOWS\SYSTEM32\jnwnw64m.exe
    O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Digital Line Detect.lnk = ?
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
    O9 - Extra button: Verizon Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - C:\Program Files\Microsoft Money\System\mnyside.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O15 - Trusted Zone: *.imageservr.com
    O16 - DPF: Yahoo! Chat - http://us.chat1.yimg.com/us.yimg.com/i/chat/applet/c381/chat.cab
    O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
    O16 - DPF: {4A3CF76B-EC7A-405D-A67D-8DC6B52AB35B} (QDiagAOLCCUpdateObj Class) - http://aolcc.aol.com/computercheckup/qdiagcc.cab
    O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} - http://207.188.7.150/29d1dd3a6680825fa600/netzip/RdxIE601.cab
    O16 - DPF: {6B4788E2-BAE8-11D2-A1B4-00400512739B} (PWMediaSendControl Class) - http://216.249.24.140/code/PWActiveXImgCtl.CAB
    O16 - DPF: {72C23FEC-3AF9-48FC-9597-241A8EBDFE0A} (InstallShield International Setup Player) - http://ftp.hp.com/pub/automatic/player/isetupML.cab
    O16 - DPF: {90C9629E-CD32-11D3-BBFB-00105A1F0D68} (InstallShield International Setup Player) - http://ps.theport.com/xmlplayer/english/isetup.cab
    O16 - DPF: {A17E30C4-A9BA-11D4-8673-60DB54C10000} (Yahoo! MailTo) - http://us.dl1.yimg.com/download.yahoo.com/dl/installs/yse/ymmapi_416.dll
    O16 - DPF: {C606BA60-AB76-48B6-96A7-2C4D5C386F70} (PreQualifier Class) - http://www.verizon.net/checkmypc/includes/MotivePreQual.cab
    O20 - Winlogon Notify: cbXOFuuv - cbXOFuuv.dll (file missing)
    O23 - Service: Plug and Play Device Manager ($sys$DRMServer) - First 4 Internet Ltd - C:\WINDOWS\system32\$sys$filesystem\$sys$DRMServer.exe
    O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: XCP CD Proxy (CD_Proxy) - Unknown owner - C:\WINDOWS\CDProxyServ.exe
    O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: McAfee.com McShield (McShield) - Unknown owner - c:\PROGRA~1\mcafee.com\vso\mcshield.exe
    O23 - Service: McAfee.com VirusScan Online Realtime Engine (MCVSRte) - Mcafee.com Corporation - c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
    O23 - Service: Intel(R) NMS (NMSSvc) - Intel Corporation - C:\WINDOWS\System32\NMSSvc.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
    O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe
    O23 - Service: WAN Miniport (ATW) Service (WANMiniportService) - America Online, Inc. - C:\WINDOWS\wanmpsvc.exe

    --
    End of file - 11347 bytes
     
  2. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Hi, Welcome to TSG!!


    Run HJT again and put a check in the following:

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/cust...search/ie.html
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://red.clientapps.yahoo.com/cust.../www.yahoo.com
    O2 - BHO: (no name) - {24E9519B-3F70-429B-99BC-4B2B49B96F66} - C:\WINDOWS\system32\cbXOFuuv.dll (file missing)
    O2 - BHO: (no name) - {9C6513E0-E35B-4A7D-85CD-8CB7A7E5332A} - C:\WINDOWS\system32\pmnmligf.dll (file missing)
    O2 - BHO: gooochi browser optimizer - {b3aa78d6-612d-a27c-c2d2-625e02452721} - C:\WINDOWS\system32\{dc25a79c-8a4e-054d-7bcd-0ba97ee5b0eb}.dll
    O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
    O4 - Startup: Deewoo.lnk = C:\WINDOWS\SYSTEM32\pcntokdn.exe
    O4 - Startup: DW_Start.lnk = C:\WINDOWS\SYSTEM32\jnwnw64m.exe
    O15 - Trusted Zone: *.imageservr.com
    O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} - http://207.188.7.150/29d1dd3a6680825...p/RdxIE601.cab
    O20 - Winlogon Notify: cbXOFuuv - cbXOFuuv.dll (file missing)

    Close all applications and browser windows before you click "fix checked".


    Please download ATF Cleaner by Atribune.
    This program is for XP and Windows 2000 only
    • Double-click ATF-Cleaner.exe to run the program.
    • Under Select Files to Delete choose: Select All
    • Click the Empty Selected button.

    Click Exit on the Main menu to close the program.



    Download (save and select your desktop to save it to) SUPERAntiSpyware Free for Home Users
    • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
    • An icon will be created on your desktop. Double-click that icon to launch the program.
    • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here.)
    • Under "Configuration and Preferences", click the Preferences button.
    • Click the Scanning Control tab.
    • Under Scanner Options make sure the following are checked (leave all others unchecked):
      • Close browsers before scanning.
      • Scan for tracking cookies.
      • Terminate memory threats before quarantining.
    • Click the "Close" button to leave the control center screen.
    • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
    • On the left, make sure you check C:\Fixed Drive and all other fixed drives..
    • On the right, under "Complete Scan", choose Perform Complete Scan.
    • Click "Next" to start the scan. Please be patient while it scans your computer.
    • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
    • Make sure everything has a checkmark next to it and click "Next".
    • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
    • If asked if you want to reboot, click "Yes".
    • To retrieve the removal information after reboot, launch SUPERAntispyware again.
      • Click Preferences, then click the Statistics/Logs tab.
      • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
      • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
      • Please copy and paste the Scan Log results in your next reply with a new hijackthis log.
    • Click Close to exit the program.


    Please perform a scan with Kaspersky Webscan Online Virus Scanner
    • Read the Requirements and Privacy statement, then select "Accept".
    • A new window will appear promting you to install an ActiveX component from Kaspersky - "Do you want to install this software?".
    • Click "Yes" or select "Install" to download the ActiveX controls that allows ActiveScan to run.
    • When the download is complete it will say ready, click "Next".
    • Click "Scan Settings" and check the option to use the Extended Database if available otherwise Standard).
    • Click "Scan Options" and select both "Scan Archives" and "Scan Mail Bases".
    • Click "OK".
    • Under "Select a target to scan", click on "My Computer".
    • When the scan is complete choose to save the results as "Save as Text" named kaspersky.txt to your desktop and post them in your next reply.


    Kaspersky does not remove anything but will provide a log of anything it finds. On August 8th, 2006 Kaspersky updated the software used for Free Online Virus Scanner. In order to continue using the online scanner you will need to uninstall the old version (if previously used) from your Add/Remove Programs list and then install the latest version. To do this, follow the steps here and reboot afterwards if your system does not reboot automatically or it will show 'Kaspersky Online Scanner license key was not found!
     
  3. ECL1137

    ECL1137 Thread Starter

    Joined:
    Apr 13, 2008
    Messages:
    9
    Other logs as I get them...

    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 04/14/2008 at 07:02 PM

    Application Version : 4.0.1154

    Core Rules Database Version : 3437
    Trace Rules Database Version: 1429

    Scan type : Complete Scan
    Total Scan Time : 01:10:39

    Memory items scanned : 427
    Memory threats detected : 0
    Registry items scanned : 5152
    Registry threats detected : 48
    File items scanned : 103256
    File threats detected : 36

    Kontiki Download Manager Browser Helper Object
    HKLM\Software\Classes\CLSID\{029CA12C-89C1-46a7-A3C7-82F2F98635CB}
    HKCR\CLSID\{029CA12C-89C1-46A7-A3C7-82F2F98635CB}
    HKCR\CLSID\{029CA12C-89C1-46A7-A3C7-82F2F98635CB}
    HKCR\CLSID\{029CA12C-89C1-46A7-A3C7-82F2F98635CB}\InprocServer32
    HKCR\CLSID\{029CA12C-89C1-46A7-A3C7-82F2F98635CB}\InprocServer32#ThreadingModel
    HKCR\CLSID\{029CA12C-89C1-46A7-A3C7-82F2F98635CB}\ProgID
    HKCR\CLSID\{029CA12C-89C1-46A7-A3C7-82F2F98635CB}\Programmable
    HKCR\CLSID\{029CA12C-89C1-46A7-A3C7-82F2F98635CB}\TypeLib
    HKCR\CLSID\{029CA12C-89C1-46A7-A3C7-82F2F98635CB}\VersionIndependentProgID
    C:\PROGRAM FILES\KONTIKI\BIN\BH309190.DLL
    HKLM\Software\Classes\CLSID\{0CF993CD-8A9F-4c26-BB7C-CF9EED62245E}
    HKCR\CLSID\{0CF993CD-8A9F-4C26-BB7C-CF9EED62245E}
    HKCR\CLSID\{0CF993CD-8A9F-4C26-BB7C-CF9EED62245E}
    HKCR\CLSID\{0CF993CD-8A9F-4C26-BB7C-CF9EED62245E}\InprocServer32
    HKCR\CLSID\{0CF993CD-8A9F-4C26-BB7C-CF9EED62245E}\InprocServer32#ThreadingModel
    HKCR\CLSID\{0CF993CD-8A9F-4C26-BB7C-CF9EED62245E}\ProgID
    HKCR\CLSID\{0CF993CD-8A9F-4C26-BB7C-CF9EED62245E}\Programmable
    HKCR\CLSID\{0CF993CD-8A9F-4C26-BB7C-CF9EED62245E}\TypeLib
    HKCR\CLSID\{0CF993CD-8A9F-4C26-BB7C-CF9EED62245E}\VersionIndependentProgID
    HKLM\Software\Classes\CLSID\{1632C030-61AA-4ba9-908C-4822E1060166}
    HKCR\CLSID\{1632C030-61AA-4BA9-908C-4822E1060166}
    HKCR\CLSID\{1632C030-61AA-4BA9-908C-4822E1060166}
    HKCR\CLSID\{1632C030-61AA-4BA9-908C-4822E1060166}\InprocServer32
    HKCR\CLSID\{1632C030-61AA-4BA9-908C-4822E1060166}\InprocServer32#ThreadingModel
    HKCR\CLSID\{1632C030-61AA-4BA9-908C-4822E1060166}\ProgID
    HKCR\CLSID\{1632C030-61AA-4BA9-908C-4822E1060166}\Programmable
    HKCR\CLSID\{1632C030-61AA-4BA9-908C-4822E1060166}\TypeLib
    HKCR\CLSID\{1632C030-61AA-4BA9-908C-4822E1060166}\VersionIndependentProgID
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{029CA12C-89C1-46a7-A3C7-82F2F98635CB}

    Adware.Vundo Variant
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks#{24E9519B-3F70-429B-99BC-4B2B49B96F66}
    C:\DOCUMENTS AND SETTINGS\EMMY\DOCTORWEB\QUARANTINE\A0299303.DLL

    Unclassified.Unknown Origin
    HKU\S-1-5-21-1750895639-1449728246-2142279666-1009\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser#{FE6BC4EF-5676-484B-88AE-883323913256}
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP986\A0311610.EXE

    Adware.Tracking Cookie
    C:\Documents and Settings\Emmy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emmy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Emmy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emmy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emmy\Cookies\[email protected][1].txt
    C:\Documents and Settings\Emmy\Cookies\[email protected][2].txt
    C:\Documents and Settings\Emmy\Cookies\[email protected][1].txt

    Adware.ClickSpring
    HKLM\Software\ClickSpring
    HKLM\Software\ClickSpring#UBWKR
    C:\DOCUMENTS AND SETTINGS\EMMY\DOCTORWEB\QUARANTINE\A0298321.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP971\A0298322.EXE

    Registry Cleaner Trial
    HKCR\Install.Install
    HKCR\Install.Install\CLSID
    HKCR\Install.Install\CurVer
    HKCR\Install.Install.1
    HKCR\Install.Install.1\CLSID

    Trojan.NetMon/DNSChange
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR#NextInstance
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Service
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Legacy
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ConfigFlags
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Class
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ClassGUID
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#DeviceDesc

    Trojan.ZenoSearch
    C:\WINDOWS\system32\msnav32.ax

    Adware.Adservs
    C:\WINDOWS\system32\atmtd.dll
    C:\WINDOWS\system32\atmtd.dll._
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP986\A0311609.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP986\A0311612.EXE

    Trojan.Unknown Origin
    HKLM\Software\xpre
    HKLM\Software\xpre#execount
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP972\A0305450.VBS
    C:\WINDOWS\RWFYBA\LQIVVE.VBS

    RootKit.TnCore/Trace
    C:\WINDOWS\system32\drivers\core.cache.dsk

    Trojan.Downloader-Gen/Suspicious
    C:\DOCUMENTS AND SETTINGS\EMMY\DOCTORWEB\QUARANTINE\110094.DLR
    C:\DOCUMENTS AND SETTINGS\EMMY\DOCTORWEB\QUARANTINE\120104.DLR

    Adware.Vundo-Variant
    C:\DOCUMENTS AND SETTINGS\EMMY\DOCTORWEB\QUARANTINE\A0305448.DLL

    Trojan.Vundo-Variant/F
    C:\DOCUMENTS AND SETTINGS\EMMY\DOCTORWEB\QUARANTINE\A0306457.DLL
    C:\DOCUMENTS AND SETTINGS\EMMY\DOCTORWEB\QUARANTINE\A0311582.DLL

    Trojan.Unclassified/BrowserDriver
    C:\DOCUMENTS AND SETTINGS\EMMY\DOCTORWEB\QUARANTINE\JNWNW64M.EXE
    C:\DOCUMENTS AND SETTINGS\EMMY\DOCTORWEB\QUARANTINE\RWWNW64D.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP986\A0311614.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP986\A0311616.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP986\A0311623.EXE

    Adware.Yazzle-Installer
    C:\DOCUMENTS AND SETTINGS\EMMY\DOCTORWEB\QUARANTINE\YAZZSNET.EXE

    Trojan.Downloader-Gen/SnapSNet
    C:\DOCUMENTS AND SETTINGS\EMMY\LOCAL SETTINGS\TEMP\SNAPSNET.EXE

    Rogue.AntiSpywareMaster
    C:\DOCUMENTS AND SETTINGS\EMMY\LOCAL SETTINGS\TEMP\WINVSNET.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP971\A0298332.EXE

    Adware.Vundo Variant/Rel
    C:\WINDOWS\SYSTEM32\MCRH.TMP

    Adware.Unknown Origin
    C:\WINDOWS\SYSTEM32\ZXDNT3D.CFG
     
  4. ECL1137

    ECL1137 Thread Starter

    Joined:
    Apr 13, 2008
    Messages:
    9
    KASPERSKY ONLINE SCANNER REPORT
    Monday, April 14, 2008 9:11:39 PM
    Operating System: Microsoft Windows XP Home Edition, Service Pack 2 (Build 2600)
    Kaspersky Online Scanner version: 5.0.98.0
    Kaspersky Anti-Virus database last update: 14/04/2008
    Kaspersky Anti-Virus database records: 704805
    Scan Settings
    Scan using the following antivirus database extended
    Scan Archives true
    Scan Mail Bases true
    Scan Target My Computer
    A:\
    C:\
    D:\
    E:\
    G:\
    Scan Statistics
    Total number of scanned objects 106720
    Number of viruses found 34
    Number of infected objects 90
    Number of suspicious objects 2
    Duration of the scan process 01:29:45

    Infected Object Name Virus Name Last Action
    C:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\4e9c837ad662bc338b9a390aa280ec74_1dce0e75-1303-433a-bfc1-6b582bd25551 Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\dcf613970d4bb92c75e020b6b24abeab_1dce0e75-1303-433a-bfc1-6b582bd25551 Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\ea43263818ba47c62448ca0d75bebb8d_1dce0e75-1303-433a-bfc1-6b582bd25551 Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Microsoft\Dr Watson\user.dmp Object is locked skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl1.zip/mrofinu572.exe Suspicious: Password-protected-EXE skipped
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl1.zip ZIP: suspicious - 1 skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\a.jar-5a2beeb6-4cb2031c.zip/a.class Infected: Trojan.Java.ClassLoader.b skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\a.jar-5a2beeb6-4cb2031c.zip/Dummy.class Infected: Trojan.Java.ClassLoader.Dummy.a skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\a.jar-5a2beeb6-4cb2031c.zip/VerifierBug.class Infected: Trojan.Java.ClassLoader.u skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\a.jar-5a2beeb6-4cb2031c.zip ZIP: infected - 3 skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\ar3.jar-5000a103-159c4a85.zip/Counter.class Infected: Trojan.Java.ClassLoader.i skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\ar3.jar-5000a103-159c4a85.zip/VerifierBug.class Infected: Trojan.Java.ClassLoader.k skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\ar3.jar-5000a103-159c4a85.zip/Beyond.class Infected: Trojan.Java.ClassLoader.k skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\ar3.jar-5000a103-159c4a85.zip ZIP: infected - 3 skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-52a4015b-29cc4949.zip/BlackBox.class Infected: Trojan.Java.ClassLoader.z skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-52a4015b-29cc4949.zip/VB.class Infected: Trojan.Java.ClassLoader.ak skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-52a4015b-29cc4949.zip/Beyond.class Infected: Trojan-Downloader.Java.OpenConnection.v skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-52a4015b-29cc4949.zip ZIP: infected - 3 skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive1213.jar-68b1b007-665d2a1f.zip/BlackBox.class Infected: Trojan.Java.ClassLoader.ak skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive1213.jar-68b1b007-665d2a1f.zip/VB.class Infected: Trojan.Java.ClassLoader.ak skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive1213.jar-68b1b007-665d2a1f.zip/Beyond.class Infected: Trojan-Downloader.Java.OpenConnection.ah skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive1213.jar-68b1b007-665d2a1f.zip ZIP: infected - 3 skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-19061f19-1cd61e68.zip/GetAccess.class Infected: Trojan.Java.ClassLoader.c skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-19061f19-1cd61e68.zip/InsecureClassLoader.class Infected: Exploit.Java.ByteVerify skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-19061f19-1cd61e68.zip/Dummy.class Infected: Trojan.Java.ClassLoader.Dummy.a skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-19061f19-1cd61e68.zip/Installer.class Infected: Trojan-Downloader.Java.OpenConnection.v skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-19061f19-1cd61e68.zip ZIP: infected - 4 skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76ba5970-4edea386.zip/GetAccess.class Infected: Trojan.Java.ClassLoader.c skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76ba5970-4edea386.zip/InsecureClassLoader.class Infected: Exploit.Java.ByteVerify skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76ba5970-4edea386.zip/Dummy.class Infected: Trojan.Java.ClassLoader.Dummy.a skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76ba5970-4edea386.zip/Installer.class Infected: Trojan-Downloader.Java.OpenConnection.v skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76ba5970-4edea386.zip ZIP: infected - 4 skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-77914e34-67040ff3.zip/GetAccess.class Infected: Trojan.Java.ClassLoader.c skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-77914e34-67040ff3.zip/InsecureClassLoader.class Infected: Exploit.Java.ByteVerify skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-77914e34-67040ff3.zip/Dummy.class Infected: Trojan.Java.ClassLoader.Dummy.a skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-77914e34-67040ff3.zip/Installer.class Infected: Trojan-Downloader.Java.OpenConnection.v skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-77914e34-67040ff3.zip ZIP: infected - 4 skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-ab3806d-6ba23b53.zip/GetAccess.class Infected: Trojan.Java.ClassLoader.c skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-ab3806d-6ba23b53.zip/InsecureClassLoader.class Infected: Exploit.Java.ByteVerify skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-ab3806d-6ba23b53.zip/Dummy.class Infected: Trojan.Java.ClassLoader.Dummy.a skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-ab3806d-6ba23b53.zip/Installer.class Infected: Trojan-Downloader.Java.OpenConnection.v skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-ab3806d-6ba23b53.zip ZIP: infected - 4 skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-66caba6e-12f667aa.zip/BlackBox.class Infected: Exploit.Java.ByteVerify skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-66caba6e-12f667aa.zip/VerifierBug.class Infected: Exploit.Java.ByteVerify skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-66caba6e-12f667aa.zip/Beyond.class Infected: Trojan-Downloader.Java.OpenConnection.aa skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-66caba6e-12f667aa.zip ZIP: infected - 3 skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-60c0da59-13cb514d.zip/Counter.class Infected: Trojan.Java.Femad skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-60c0da59-13cb514d.zip/VerifierBug.class Infected: Trojan.Java.Femad skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-60c0da59-13cb514d.zip/web.exe Infected: Trojan-Clicker.Win32.Small.gj skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-60c0da59-13cb514d.zip/Worker.class Infected: Trojan.Java.Femad skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-60c0da59-13cb514d.zip/Xeyond.class Infected: Trojan.Java.Femad skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-60c0da59-13cb514d.zip ZIP: infected - 5 skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv234.jar-6335e2d7-27ebaa39.zip/Counter.class Infected: Trojan.Java.ClassLoader.h skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv234.jar-6335e2d7-27ebaa39.zip/Matrix.class Infected: Trojan-Downloader.Java.OpenStream.c skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv234.jar-6335e2d7-27ebaa39.zip/Parser.class Infected: Trojan.Java.ClassLoader.d skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv234.jar-6335e2d7-27ebaa39.zip ZIP: infected - 3 skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv414.jar-315690ec-5ae1856f.zip/Counter.class Infected: Trojan.Java.ClassLoader.h skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv414.jar-315690ec-5ae1856f.zip/Matrix.class Infected: Trojan-Downloader.Java.OpenStream.c skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv414.jar-315690ec-5ae1856f.zip/Parser.class Infected: Trojan.Java.ClassLoader.d skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv414.jar-315690ec-5ae1856f.zip ZIP: infected - 3 skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv415.jar-3164a86d-10711e80.zip/Counter.class Infected: Trojan.Java.ClassLoader.h skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv415.jar-3164a86d-10711e80.zip/Matrix.class Infected: Trojan-Downloader.Java.OpenStream.c skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv415.jar-3164a86d-10711e80.zip/Parser.class Infected: Trojan.Java.ClassLoader.d skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv415.jar-3164a86d-10711e80.zip ZIP: infected - 3 skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv420.jar-32d30b87-2ed23e01.zip/Counter.class Infected: Trojan.Java.ClassLoader.h skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv420.jar-32d30b87-2ed23e01.zip/Matrix.class Infected: Trojan-Downloader.Java.OpenStream.c skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv420.jar-32d30b87-2ed23e01.zip/Parser.class Infected: Trojan.Java.ClassLoader.d skipped
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv420.jar-32d30b87-2ed23e01.zip ZIP: infected - 3 skipped
    C:\Documents and Settings\Emmy\Application Data\Mozilla\Firefox\Profiles\jfw9j3m9.default\cert8.db Object is locked skipped
    C:\Documents and Settings\Emmy\Application Data\Mozilla\Firefox\Profiles\jfw9j3m9.default\history.dat Object is locked skipped
    C:\Documents and Settings\Emmy\Application Data\Mozilla\Firefox\Profiles\jfw9j3m9.default\key3.db Object is locked skipped
    C:\Documents and Settings\Emmy\Application Data\Mozilla\Firefox\Profiles\jfw9j3m9.default\parent.lock Object is locked skipped
    C:\Documents and Settings\Emmy\Application Data\Mozilla\Firefox\Profiles\jfw9j3m9.default\search.sqlite Object is locked skipped
    C:\Documents and Settings\Emmy\Application Data\Mozilla\Firefox\Profiles\jfw9j3m9.default\urlclassifier2.sqlite Object is locked skipped
    C:\Documents and Settings\Emmy\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\AppLogs\SUPERANTISPYWARE-4-14-2008( 19-10-50 ).LOG Object is locked skipped
    C:\Documents and Settings\Emmy\Application Data\Verizon\VSP\client_gateway.log Object is locked skipped
    C:\Documents and Settings\Emmy\Cookies\index.dat Object is locked skipped
    C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\A0298326.exe/data0001 Infected: not-a-virus:AdWare.Win32.PurityScan.gp skipped
    C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\A0298326.exe NSIS: infected - 1 skipped
    C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\A0298327.exe Infected: Trojan.Win32.Scapur.k skipped
    C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\A0305454.ocx Infected: not-a-virus:AdWare.Win32.Coupons skipped
    C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\A0309232.exe Infected: not-a-virus:Client-IRC.Win32.mIRC.603 skipped
    C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\cbXqrPfg.dll.bad Infected: Packed.Win32.Monder.gen skipped
    C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\disp1050.exe Infected: not-a-virus:AdWare.Win32.WebRebates.c skipped
    C:\Documents and Settings\Emmy\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\Emmy\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\Emmy\Local Settings\Application Data\Mozilla\Firefox\Profiles\jfw9j3m9.default\Cache\_CACHE_001_ Object is locked skipped
    C:\Documents and Settings\Emmy\Local Settings\Application Data\Mozilla\Firefox\Profiles\jfw9j3m9.default\Cache\_CACHE_002_ Object is locked skipped
    C:\Documents and Settings\Emmy\Local Settings\Application Data\Mozilla\Firefox\Profiles\jfw9j3m9.default\Cache\_CACHE_003_ Object is locked skipped
    C:\Documents and Settings\Emmy\Local Settings\Application Data\Mozilla\Firefox\Profiles\jfw9j3m9.default\Cache\_CACHE_MAP_ Object is locked skipped
    C:\Documents and Settings\Emmy\Local Settings\History\History.IE5\INDEX.DAT Object is locked skipped
    C:\Documents and Settings\Emmy\Local Settings\History\History.IE5\MSHist012008041420080415\index.dat Object is locked skipped
    C:\Documents and Settings\Emmy\Local Settings\Temp\bbassistant.log Object is locked skipped
    C:\Documents and Settings\Emmy\Local Settings\Temp\Perflib_Perfdata_b18.dat Object is locked skipped
    C:\Documents and Settings\Emmy\Local Settings\Temp\~DF44E8.tmp Object is locked skipped
    C:\Documents and Settings\Emmy\Local Settings\Temp\~DF5FDA.tmp Object is locked skipped
    C:\Documents and Settings\Emmy\Local Settings\Temporary Internet Files\AntiPhishing\B3BB5BBA-E7D5-40AB-A041-A5B1C0B26C8F.dat Object is locked skipped
    C:\Documents and Settings\Emmy\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\Emmy\NTUSER.DAT Object is locked skipped
    C:\Documents and Settings\Emmy\ntuser.dat.LOG Object is locked skipped
    C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\INDEX.DAT Object is locked skipped
    C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
    C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
    C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
    C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
    C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
    C:\Documents and Settings\Sue\Desktop\spamblockerutility.exe/data0018/data0002 Infected: not-a-virus:AdWare.Win32.180Solutions.ay skipped
    C:\Documents and Settings\Sue\Desktop\spamblockerutility.exe/data0018/data0003 Infected: not-a-virus:AdWare.Win32.180Solutions.ay skipped
    C:\Documents and Settings\Sue\Desktop\spamblockerutility.exe/data0018/data0004 Infected: not-a-virus:AdWare.Win32.HotBar.bi skipped
    C:\Documents and Settings\Sue\Desktop\spamblockerutility.exe/data0018 Infected: not-a-virus:AdWare.Win32.HotBar.bi skipped
    C:\Documents and Settings\Sue\Desktop\spamblockerutility.exe NSIS: infected - 4 skipped
    C:\Program Files\Common Files\Verizon Online\ConnMgr\VZLog Object is locked skipped
    C:\Program Files\Verizon Online\Help Support\SmartBridge\AlertFilter.log Object is locked skipped
    C:\Program Files\Verizon Online\Help Support\SmartBridge\log\httpclient.log Object is locked skipped
    C:\Program Files\Verizon Online\Help Support\SmartBridge\SmartBridge.log Object is locked skipped
    C:\Program Files\Yahoo!\Messenger\logs\billing_Emmy.log Object is locked skipped
    C:\Program Files\Yahoo!\Messenger\logs\client_Emmy.log Object is locked skipped
    C:\Program Files\Yahoo!\Messenger\logs\network_Emmy.log Object is locked skipped
    C:\System Volume Information\catalog.wci\00000002.ps1 Object is locked skipped
    C:\System Volume Information\catalog.wci\00000002.ps2 Object is locked skipped
    C:\System Volume Information\catalog.wci\00010002.ci Object is locked skipped
    C:\System Volume Information\catalog.wci\cicat.fid Object is locked skipped
    C:\System Volume Information\catalog.wci\cicat.hsh Object is locked skipped
    C:\System Volume Information\catalog.wci\CiCL0001.000 Object is locked skipped
    C:\System Volume Information\catalog.wci\CiP10000.000 Object is locked skipped
    C:\System Volume Information\catalog.wci\CiP20000.000 Object is locked skipped
    C:\System Volume Information\catalog.wci\CiPT0000.000 Object is locked skipped
    C:\System Volume Information\catalog.wci\CiSL0001.000 Object is locked skipped
    C:\System Volume Information\catalog.wci\CiSP0000.000 Object is locked skipped
    C:\System Volume Information\catalog.wci\CiST0000.000 Object is locked skipped
    C:\System Volume Information\catalog.wci\CiVP0000.000 Object is locked skipped
    C:\System Volume Information\catalog.wci\INDEX.000 Object is locked skipped
    C:\System Volume Information\catalog.wci\propstor.bk1 Object is locked skipped
    C:\System Volume Information\catalog.wci\propstor.bk2 Object is locked skipped
    C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP916\A0293827.sys Infected: not-a-virus:RiskTool.Win32.XCP.b skipped
    C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP976\A0309408.exe/data.rar/SmitfraudFix/Reboot.exe Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped
    C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP976\A0309408.exe/data.rar Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped
    C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP976\A0309408.exe RarSFX: infected - 2 skipped
    C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP986\A0311608.exe Infected: Trojan-Downloader.Win32.Homles.bc skipped
    C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP986\A0311611.exe Infected: Trojan-Downloader.Win32.VB.dsf skipped
    C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP986\A0311613.exe Infected: not-a-virus:AdWare.Win32.ZenoSearch.aw skipped
    C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP986\A0311622.exe Infected: not-a-virus:AdWare.Win32.WebRebates.c skipped
    C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP989\A0312113.dll Infected: not-a-virus:AdWare.Win32.PurityScan.gv skipped
    C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP989\A0312114.exe Infected: Trojan-Downloader.Win32.PurityScan.fj skipped
    C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP989\A0312119.dll Infected: Packed.Win32.Monder.gen skipped
    C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP989\A0312120.dll Infected: Packed.Win32.Monder.gen skipped
    C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP989\A0312121.exe Infected: not-a-virus:AdWare.Win32.ZenoSearch.am skipped
    C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP989\A0312122.exe Infected: not-a-virus:AdWare.Win32.ZenoSearch.am skipped
    C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP989\A0312123.exe/data0003 Infected: Trojan.Win32.Scapur.k skipped
    C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP989\A0312123.exe NSIS: infected - 1 skipped
    C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP989\change.log Object is locked skipped
    C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
    C:\WINDOWS\SchedLgU.Txt Object is locked skipped
    C:\WINDOWS\SoftwareDistribution\EventCache\{D327AB38-3377-4031-9CCC-92BD1867E5A6}.bin Object is locked skipped
    C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
    C:\WINDOWS\Sti_Trace.log Object is locked skipped
    C:\WINDOWS\SYSTEM32\CatRoot2\edb.log Object is locked skipped
    C:\WINDOWS\SYSTEM32\CatRoot2\tmp.edb Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\AppEvent.Evt Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\DEFAULT Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\DEFAULT.LOG Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\Internet.evt Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SAM Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SAM.LOG Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SecEvent.Evt Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SECURITY Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SECURITY.LOG Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SOFTWARE Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SOFTWARE.LOG Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SysEvent.Evt Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SYSTEM Object is locked skipped
    C:\WINDOWS\SYSTEM32\CONFIG\SYSTEM.LOG Object is locked skipped
    C:\WINDOWS\SYSTEM32\DRIVERS\core.cache.dsk Object is locked skipped
    C:\WINDOWS\SYSTEM32\DRIVERS\usb80233.sys Object is locked skipped
    C:\WINDOWS\SYSTEM32\H323LOG.TXT Object is locked skipped
    C:\WINDOWS\SYSTEM32\WBEM\Repository\FS\INDEX.BTR Object is locked skipped
    C:\WINDOWS\SYSTEM32\WBEM\Repository\FS\INDEX.MAP Object is locked skipped
    C:\WINDOWS\SYSTEM32\WBEM\Repository\FS\MAPPING.VER Object is locked skipped
    C:\WINDOWS\SYSTEM32\WBEM\Repository\FS\MAPPING1.MAP Object is locked skipped
    C:\WINDOWS\SYSTEM32\WBEM\Repository\FS\MAPPING2.MAP Object is locked skipped
    C:\WINDOWS\SYSTEM32\WBEM\Repository\FS\OBJECTS.DATA Object is locked skipped
    C:\WINDOWS\SYSTEM32\WBEM\Repository\FS\OBJECTS.MAP Object is locked skipped
    C:\WINDOWS\WIADEBUG.LOG Object is locked skipped
    C:\WINDOWS\WIASERVC.LOG Object is locked skipped
    C:\WINDOWS\WindowsUpdate.log Object is locked skipped
    Scan process completed.
     
  5. ECL1137

    ECL1137 Thread Starter

    Joined:
    Apr 13, 2008
    Messages:
    9
    And finally...

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 9:12:59 PM, on 4/14/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16640)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\$sys$filesystem\$sys$DRMServer.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\WINDOWS\CDProxyServ.exe
    C:\WINDOWS\system32\cisvc.exe
    c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
    C:\WINDOWS\System32\nvsvc32.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Viewpoint\Common\ViewpointService.exe
    C:\WINDOWS\wanmpsvc.exe
    c:\PROGRA~1\mcafee.com\vso\mcshield.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\System32\DSentry.exe
    C:\Program Files\McAfee.com\Agent\mcagent.exe
    C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe
    C:\PROGRA~1\mcafee.com\vso\mcvsshld.exe
    C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
    C:\PROGRA~1\Java\J2RE14~1.2\bin\jusched.exe
    C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2D1.EXE
    C:\PROGRA~1\VERIZO~1\HELPSU~1\VERIZO~1.EXE
    C:\PROGRA~1\VERIZO~1\HELPSU~1\SMARTB~1\MotiveSB.exe
    C:\PROGRA~1\Yahoo!\browser\ybrwicon.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\Verizon\VSP\VerizonServicepoint.exe
    C:\WINDOWS\System32\Rundll32.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\PROGRA~1\Yahoo!\browser\ycommon.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Digital Line Detect\DLG.exe
    C:\Program Files\Common Files\Verizon Online\ConnMgr\cmisrv.exe
    C:\Program Files\Common Files\Verizon Online\AppMgr\vzOpenUIServer.exe
    C:\Program Files\Common Files\MotiveBrowser\MotiveBrowser.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\WINDOWS\system32\cidaemon.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dellnet.com
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.yahoo.com/search/ie.html
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://mail.yahoo.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = mail.yahoo.com
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = 0.0.0.0:80
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {243B17DE-77C7-46BF-B94B-0B5F309A0E64} - C:\Program Files\Microsoft Money\System\mnyside.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: MySidesearch Search Assistant - {9506910A-0F94-4ea1-B567-7070428B8B2B} - C:\WINDOWS\system32\mysidesearch_sidebar.dll
    O2 - BHO: SidebarAutoLaunch Class - {F2AA9440-6328-4933-B7C9-A6CCDF9CBF6D} - C:\Program Files\Yahoo!\browser\YSidebarIEBHO.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [DVDSentry] C:\WINDOWS\System32\DSentry.exe
    O4 - HKLM\..\Run: [MCAgentExe] C:\Program Files\McAfee.com\Agent\mcagent.exe
    O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\McAfee.com\Agent\McUpdate.exe
    O4 - HKLM\..\Run: [AdaptecDirectCD] "C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe"
    O4 - HKLM\..\Run: [VirusScan Online] c:\PROGRA~1\mcafee.com\vso\mcvsshld.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\PROGRA~1\Java\J2RE14~1.2\bin\jusched.exe
    O4 - HKLM\..\Run: [EPSON Stylus C84 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2D1.EXE /P23 "EPSON Stylus C84 Series" /O6 "USB001" /M "Stylus C84"
    O4 - HKLM\..\Run: [A Verizon App] C:\PROGRA~1\VERIZO~1\HELPSU~1\VERIZO~1.EXE
    O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\VERIZO~1\HELPSU~1\SMARTB~1\MotiveSB.exe
    O4 - HKLM\..\Run: [YBrowser] C:\PROGRA~1\Yahoo!\browser\ybrwicon.exe
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [VerizonServicepoint.exe] "C:\Program Files\Verizon\VSP\VerizonServicepoint.exe" /AUTORUN
    O4 - HKLM\..\Run: [spa_start] C:\WINDOWS\System32\Rundll32.exe "C:\WINDOWS\system32\{dc25a79c-8a4e-054d-7bcd-0ba97ee5b0eb}.dll" DllInit
    O4 - HKCU\..\Run: [DellSupport] "C:\Program Files\Dell Support\DSAgnt.exe" /startup
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Digital Line Detect.lnk = ?
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
    O9 - Extra button: Verizon Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - C:\Program Files\Microsoft Money\System\mnyside.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: Yahoo! Chat - http://us.chat1.yimg.com/us.yimg.com/i/chat/applet/c381/chat.cab
    O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/eng/partner/default/kavwebscan_unicode.cab
    O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
    O16 - DPF: {4A3CF76B-EC7A-405D-A67D-8DC6B52AB35B} (QDiagAOLCCUpdateObj Class) - http://aolcc.aol.com/computercheckup/qdiagcc.cab
    O16 - DPF: {6B4788E2-BAE8-11D2-A1B4-00400512739B} (PWMediaSendControl Class) - http://216.249.24.140/code/PWActiveXImgCtl.CAB
    O16 - DPF: {72C23FEC-3AF9-48FC-9597-241A8EBDFE0A} (InstallShield International Setup Player) - http://ftp.hp.com/pub/automatic/player/isetupML.cab
    O16 - DPF: {90C9629E-CD32-11D3-BBFB-00105A1F0D68} (InstallShield International Setup Player) - http://ps.theport.com/xmlplayer/english/isetup.cab
    O16 - DPF: {A17E30C4-A9BA-11D4-8673-60DB54C10000} (Yahoo! MailTo) - http://us.dl1.yimg.com/download.yahoo.com/dl/installs/yse/ymmapi_416.dll
    O16 - DPF: {C606BA60-AB76-48B6-96A7-2C4D5C386F70} (PreQualifier Class) - http://www.verizon.net/checkmypc/includes/MotivePreQual.cab
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Plug and Play Device Manager ($sys$DRMServer) - First 4 Internet Ltd - C:\WINDOWS\system32\$sys$filesystem\$sys$DRMServer.exe
    O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: XCP CD Proxy (CD_Proxy) - Unknown owner - C:\WINDOWS\CDProxyServ.exe
    O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: McAfee.com McShield (McShield) - Unknown owner - c:\PROGRA~1\mcafee.com\vso\mcshield.exe
    O23 - Service: McAfee.com VirusScan Online Realtime Engine (MCVSRte) - Mcafee.com Corporation - c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
    O23 - Service: Intel(R) NMS (NMSSvc) - Intel Corporation - C:\WINDOWS\System32\NMSSvc.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
    O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe
    O23 - Service: WAN Miniport (ATW) Service (WANMiniportService) - America Online, Inc. - C:\WINDOWS\wanmpsvc.exe

    --
    End of file - 10529 bytes
     
  6. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Please download the OTMoveIt2 by OldTimer.
    • Save it to your desktop.
    • Please double-click OTMoveIt2.exe to run it. (Vista users, please right click on OTMoveit2.exe and select "Run as an Administrator")
    • Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

      Code:
      [b] C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl1.zip
      C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\a.jar-5a2beeb6-4cb2031c.zip
      C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\ar3.jar-5000a103-159c4a85.zip
      C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-52a4015b-29cc4949.zip
      C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive1213.jar-68b1b007-665d2a1f.zip
      C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-19061f19-1cd61e68.zip
      C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76ba5970-4edea386.zip
      C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-77914e34-67040ff3.zip
      C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-ab3806d-6ba23b53.zip
      C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-66caba6e-12f667aa.zip
      C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-60c0da59-13cb514d.zip
      C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv234.jar-6335e2d7-27ebaa39.zip
      C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv414.jar-315690ec-5ae1856f.zip
      C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv415.jar-3164a86d-10711e80.zip
      C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv420.jar-32d30b87-2ed23e01.zip
      C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\A0298326.exe
      C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\A0298327.exe
      C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\A0305454.ocx
      C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\A0309232.exe
      C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\cbXqrPfg.dll.bad
      C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\disp1050.exe
      C:\Documents and Settings\Sue\Desktop\spamblockerutility.exe
       [/b]
    • Return to OTMoveIt2, right click in the "Paste List of Files/Folders to Move" window (under the light Yellow bar) and choose Paste.
    • Click the red Moveit! button.
    • A log of files and folders moved will be created in the c:\_OTMoveIt\MovedFiles folder in the form of Date and Time (mmddyyyy_hhmmss.log). Please open this log in Notepad and post its contents in your next reply.
    • Close OTMoveIt2
    If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.


    [​IMG] Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system. Please follow these steps to remove older version of Java components and upgrade the application. Beware it is NOT supported for use in 9x or ME and probably will not install in those systems

    Upgrading Java:
    • Download the latest version of Java Runtime Environment (JRE) 6 update 5.
    • Scroll down to where it says "The J2SE Runtime Environment (JRE) allows end-users to run Java applications".
    • Click the "Download" button to the right.
    • Check the box that says: "Accept License Agreement".
    • The page will refresh.
    • Click on the link to download Windows Offline Installation with or without Multi-language and save to your desktop.
    • Close any programs you may have running - especially your web browser.
    • Go to Start > Control Panel, double-click on Add/Remove programs and remove all older versions of Java.
    • Check any item with Java Runtime Environment (JRE or J2SE) in the name.
    • Click the Remove or Change/Remove button.
    • Repeat as many times as necessary to remove each Java version.
    • Reboot your computer once all Java components are removed.
    • Then from your desktop double-click on the download to install the newest version.


    Please let me know if you are still having problems.
     
  7. ECL1137

    ECL1137 Thread Starter

    Joined:
    Apr 13, 2008
    Messages:
    9
    Unfortunately I'm still getting random IE windows popping up...
    Thanks so much for your help so far!

    Here are my logs:

    OTMoveIt Log:

    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinSmallazl1.zip moved successfully.
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\a.jar-5a2beeb6-4cb2031c.zip moved successfully.
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\ar3.jar-5000a103-159c4a85.zip moved successfully.
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-52a4015b-29cc4949.zip moved successfully.
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive1213.jar-68b1b007-665d2a1f.zip moved successfully.
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-19061f19-1cd61e68.zip moved successfully.
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-76ba5970-4edea386.zip moved successfully.
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-77914e34-67040ff3.zip moved successfully.
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-ab3806d-6ba23b53.zip moved successfully.
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-66caba6e-12f667aa.zip moved successfully.
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-60c0da59-13cb514d.zip moved successfully.
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv234.jar-6335e2d7-27ebaa39.zip moved successfully.
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv414.jar-315690ec-5ae1856f.zip moved successfully.
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv415.jar-3164a86d-10711e80.zip moved successfully.
    C:\Documents and Settings\Earl\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv420.jar-32d30b87-2ed23e01.zip moved successfully.
    C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\A0298326.exe moved successfully.
    C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\A0298327.exe moved successfully.
    C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\A0305454.ocx unregistered successfully.
    C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\A0305454.ocx moved successfully.
    C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\A0309232.exe moved successfully.
    C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\cbXqrPfg.dll.bad moved successfully.
    C:\Documents and Settings\Emmy\DoctorWeb\Quarantine\disp1050.exe moved successfully.
    C:\Documents and Settings\Sue\Desktop\spamblockerutility.exe moved successfully.

    OTMoveIt2 by OldTimer - Version 1.0.4.1 log created on 04152008_200345






    C84 Series" /O6 "USB001" /M "Stylus C84"
    O4 - HKLM\..\Run: [A Verizon App] C:\PROGRA~1\VERIZO~1\HELPSU~1\VERIZO~1.EXE
    O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\VERIZO~1\HELPSU~1\SMARTB~1\MotiveSB.exe
    O4 - HKLM\..\Run: [YBrowser] C:\PROGRA~1\Yahoo!\browser\ybrwicon.exe
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [VerizonServicepoint.exe] "C:\Program Files\Verizon\VSP\VerizonServicepoint.exe" /AUTORUN
    O4 - HKLM\..\Run: [spa_start] C:\WINDOWS\System32\Rundll32.exe "C:\WINDOWS\system32\{dc25a79c-8a4e-054d-7bcd-0ba97ee5b0eb}.dll" DllInit
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
    O4 - HKCU\..\Run: [DellSupport] "C:\Program Files\Dell Support\DSAgnt.exe" /startup
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Digital Line Detect.lnk = ?
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
    O9 - Extra button: Verizon Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - C:\Program Files\Microsoft Money\System\mnyside.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: Yahoo! Chat - http://us.chat1.yimg.com/us.yimg.com/i/chat/applet/c381/chat.cab
    O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/eng/partner/default/kavwebscan_unicode.cab
    O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
    O16 - DPF: {4A3CF76B-EC7A-405D-A67D-8DC6B52AB35B} (QDiagAOLCCUpdateObj Class) - http://aolcc.aol.com/computercheckup/qdiagcc.cab
    O16 - DPF: {6B4788E2-BAE8-11D2-A1B4-00400512739B} (PWMediaSendControl Class) - http://216.249.24.140/code/PWActiveXImgCtl.CAB
    O16 - DPF: {72C23FEC-3AF9-48FC-9597-241A8EBDFE0A} (InstallShield International Setup Player) - http://ftp.hp.com/pub/automatic/player/isetupML.cab
    O16 - DPF: {90C9629E-CD32-11D3-BBFB-00105A1F0D68} (InstallShield International Setup Player) - http://ps.theport.com/xmlplayer/english/isetup.cab
    O16 - DPF: {A17E30C4-A9BA-11D4-8673-60DB54C10000} (Yahoo! MailTo) - http://us.dl1.yimg.com/download.yahoo.com/dl/installs/yse/ymmapi_416.dll
    O16 - DPF: {C606BA60-AB76-48B6-96A7-2C4D5C386F70} (PreQualifier Class) - http://www.verizon.net/checkmypc/includes/MotivePreQual.cab
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Plug and Play Device Manager ($sys$DRMServer) - First 4 Internet Ltd - C:\WINDOWS\system32\$sys$filesystem\$sys$DRMServer.exe
    O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: XCP CD Proxy (CD_Proxy) - Unknown owner - C:\WINDOWS\CDProxyServ.exe
    O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: McAfee.com McShield (McShield) - Unknown owner - c:\PROGRA~1\mcafee.com\vso\mcshield.exe
    O23 - Service: McAfee.com VirusScan Online Realtime Engine (MCVSRte) - Mcafee.com Corporation - c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
    O23 - Service: Intel(R) NMS (NMSSvc) - Intel Corporation - C:\WINDOWS\System32\NMSSvc.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
    O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe
    O23 - Service: WAN Miniport (ATW) Service (WANMiniportService) - America Online, Inc. - C:\WINDOWS\wanmpsvc.exe

    --
    End of file - 10541 bytes
     
  8. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Run HJT again and put a check in the following:

    O4 - HKLM\..\Run: [spa_start] C:\WINDOWS\System32\Rundll32.exe "C:\WINDOWS\system32\{dc25a79c-8a4e-054d-7bcd-0ba97ee5b0eb}.dll" DllInit

    Close all applications and browser windows before you click "fix checked".


    Please visit this webpage for instructions on installing recovery console and downloading/running ComboFix.

    Post the log from ComboFix along with a new HijackThis log.
     
  9. ECL1137

    ECL1137 Thread Starter

    Joined:
    Apr 13, 2008
    Messages:
    9
    I followed their instructions for installing the recovery console... so I'm not sure why it's saying I don't have it installed....

    Things seem okay on my end... so far! How am I looking?




    ComboFix 08-04-15.4 - Emmy 2008-04-16 11:58:51.1 - NTFSx86
    Running from: C:\Documents and Settings\Emmy\Desktop\ComboFix.exe
    * Created a new restore point

    WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\Documents and Settings\Earl\Application Data\DriveCleaner Free
    C:\Documents and Settings\Earl\Application Data\DriveCleaner Free\Logs\update.log
    C:\Documents and Settings\Earl\err.log
    C:\Documents and Settings\Emmy\Application Data\DriveCleaner Free
    C:\Documents and Settings\Emmy\Application Data\DriveCleaner Free\Logs\update.log
    C:\Documents and Settings\Emmy\err.log
    C:\Documents and Settings\Guest\Local Settings\Application Data\Microsoft\Windows Media\10.0\WMSDKNSD.XML
    C:\Documents and Settings\Shanna\err.log
    C:\Documents and Settings\Shanna\Start Menu\Programs\Startup\DW_Start.lnk
    C:\Documents and Settings\Sue\Application Data\DriveCleaner Free
    C:\Documents and Settings\Sue\Application Data\DriveCleaner Free\Logs\update.log
    C:\Documents and Settings\Sue\err.log
    C:\Documents and Settings\Sue\Start Menu\Programs\Startup\DW_Start.lnk
    C:\Program Files\Common Files\sks~1
    C:\Temp\1cb
    C:\Temp\1cb\syscheck.log
    C:\temp\tn3
    C:\WINDOWS\system32\drivers\core.cache.dsk
    C:\WINDOWS\system32\drivers\usb80233.sys
    C:\WINDOWS\SYSTEM32\fgilmnmp.ini
    C:\WINDOWS\SYSTEM32\fgilmnmp.ini2
    C:\WINDOWS\system32\pac.txt

    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    -------\Legacy_USB80233
    -------\Service_usb80233


    ((((((((((((((((((((((((( Files Created from 2008-03-16 to 2008-04-16 )))))))))))))))))))))))))))))))
    .

    2008-04-15 20:23 . 2008-02-22 02:33 69,632 --a------ C:\WINDOWS\SYSTEM32\javacpl.cpl
    2008-04-15 20:22 . 2008-04-15 20:22 <DIR> d-------- C:\Program Files\Common Files\Java
    2008-04-15 20:03 . 2008-04-15 20:03 <DIR> d-------- C:\_OTMoveIt
    2008-04-15 19:59 . 2008-04-15 19:59 89,070 --a------ C:\WINDOWS\SYSTEM32\myss_sb_uninstall.exe
    2008-04-14 19:16 . 2008-04-14 19:16 <DIR> d-------- C:\WINDOWS\SYSTEM32\Kaspersky Lab
    2008-04-14 19:16 . 2008-04-14 19:16 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
    2008-04-14 17:46 . 2008-04-14 17:46 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
    2008-04-14 17:45 . 2008-04-14 19:10 <DIR> d-------- C:\Program Files\SUPERAntiSpyware
    2008-04-14 17:45 . 2008-04-14 17:45 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
    2008-04-14 17:45 . 2008-04-14 17:45 <DIR> d-------- C:\Documents and Settings\Emmy\Application Data\SUPERAntiSpyware.com
    2008-04-13 22:56 . 2008-04-13 22:56 <DIR> d-------- C:\Documents and Settings\4\Application Data\Yahoo!
    2008-04-13 22:55 . 2008-04-13 22:55 <DIR> d-------- C:\Documents and Settings\4\Application Data\Verizon
    2008-04-13 22:55 . 2008-04-13 22:58 <DIR> d-------- C:\Documents and Settings\4\Application Data\GTek
    2008-04-13 22:54 . 2008-04-13 22:54 <DIR> d-------- C:\Documents and Settings\4
    2008-04-13 15:05 . 2008-04-13 15:18 <DIR> d-------- C:\Documents and Settings\Emmy\DoctorWeb
    2008-04-13 15:03 . 2008-04-13 15:03 88,961 --a------ C:\WINDOWS\SYSTEM32\mysidesearch_sidebar_uninstall.exe
    2008-04-13 15:02 . 2008-04-13 15:02 298,311 --a------ C:\WINDOWS\SYSTEM32\gside.exe
    2008-04-13 14:42 . 2008-04-13 17:57 <DIR> d-------- C:\VundoFix Backups
    2008-04-13 12:24 . 2008-04-13 12:24 399,415 --a------ C:\WINDOWS\SYSTEM32\g7.exe
    2008-04-13 12:24 . 2008-04-13 12:24 63,893 --a------ C:\WINDOWS\SYSTEM32\{dc25a79c-8a4e-054d-7bcd-0ba97ee5b0eb}.dll-uninst.exe
    2008-04-13 12:24 . 2008-04-13 12:24 939 --a------ C:\WINDOWS\SYSTEM32\winpfz33.sys
    2008-04-13 12:20 . 2006-10-17 14:31 66,048 --a------ C:\WINDOWS\ieResetIcons.exe
    2008-04-13 12:12 . 2008-04-13 12:12 <DIR> d-------- C:\Program Files\InterMute
    2008-04-13 11:20 . 2008-04-13 11:20 <DIR> d-------- C:\Program Files\Trend Micro
    2008-04-11 11:46 . 2008-04-11 11:46 334,848 --a------ C:\WINDOWS\SYSTEM32\myss_sb.dll
    2008-04-10 22:35 . 2008-04-10 22:35 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Verizon
    2008-04-10 22:34 . 2008-04-10 22:34 <DIR> d-------- C:\Program Files\Radialpoint
    2008-04-10 17:08 . 2008-04-10 17:08 <DIR> d-------- C:\Program Files\Alwil Software
    2008-04-09 23:38 . 2008-04-10 23:19 359 --a------ C:\WINDOWS\wininit.ini
    2008-04-09 21:20 . 2008-04-09 21:17 691,545 --a------ C:\WINDOWS\unins000.exe
    2008-04-09 21:20 . 2008-04-09 21:20 2,542 --a------ C:\WINDOWS\unins000.dat
    2008-04-09 21:06 . 2008-04-09 21:07 <DIR> d-------- C:\Documents and Settings\Emmy\.housecall6.6
    2008-04-09 20:52 . 2008-04-10 17:24 <DIR> d-------- C:\Documents and Settings\Administrator
    2008-04-09 20:24 . 2008-04-09 20:24 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Avira
    2008-04-09 19:14 . 2008-04-13 18:44 <DIR> d-------- C:\WINDOWS\SYSTEM32\pinz1
    2008-04-09 19:14 . 2008-04-09 19:14 <DIR> d-------- C:\WINDOWS\SYSTEM32\IDE2
    2008-04-09 19:14 . 2008-04-13 18:41 <DIR> d-------- C:\WINDOWS\SYSTEM32\ExTmp
    2008-04-09 19:14 . 2008-04-14 19:04 <DIR> d--hs---- C:\WINDOWS\RWFybA
    2008-04-09 19:13 . 2008-04-13 18:38 <DIR> d-------- C:\WINDOWS\SYSTEM32\bharebio01
    2008-04-09 19:13 . 2008-04-09 19:14 <DIR> d-------- C:\Temp\wdlw14
    2008-04-09 09:10 . 2008-03-01 09:06 6,066,176 --a------ C:\WINDOWS\SYSTEM32\SET2A.tmp
    2008-04-09 09:10 . 2008-03-01 09:06 1,159,680 --a------ C:\WINDOWS\SYSTEM32\SET1B.tmp
    2008-04-09 09:10 . 2008-03-01 09:06 826,368 --a------ C:\WINDOWS\SYSTEM32\SET19.tmp
    2008-04-09 09:10 . 2008-03-01 09:06 459,264 --a------ C:\WINDOWS\SYSTEM32\SET24.tmp
    2008-04-09 09:10 . 2008-03-01 09:06 383,488 --a------ C:\WINDOWS\SYSTEM32\SET2C.tmp
    2008-04-09 09:10 . 2008-03-01 09:06 267,776 --a------ C:\WINDOWS\SYSTEM32\SET28.tmp
    2008-04-09 09:10 . 2008-03-01 09:06 124,928 --a------ C:\WINDOWS\SYSTEM32\SET34.tmp
    2008-04-09 09:10 . 2008-03-01 09:06 105,984 --a------ C:\WINDOWS\SYSTEM32\SET1C.tmp
    2008-04-09 09:10 . 2008-03-01 09:06 63,488 --a------ C:\WINDOWS\SYSTEM32\SET31.tmp
    2008-04-09 09:10 . 2008-03-01 09:06 52,224 --a------ C:\WINDOWS\SYSTEM32\SET23.tmp
    2008-04-07 12:16 . 2008-04-07 12:16 328,192 --a------ C:\WINDOWS\SYSTEM32\{dc25a79c-8a4e-054d-7bcd-0ba97ee5b0eb}.dll

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2008-04-16 00:23 --------- d-----w C:\Program Files\Java
    2008-04-14 00:10 --------- d-----w C:\Documents and Settings\Earl\Application Data\Skype
    2008-04-13 23:16 --------- d-----w C:\Documents and Settings\Sue\Application Data\Skype
    2008-04-13 23:05 --------- d-----w C:\Documents and Settings\Shanna\Application Data\Yahoo!
    2008-04-13 22:45 --------- d-----w C:\Program Files\Upromise_RemindU
    2008-04-13 22:45 --------- d-----w C:\Program Files\Common Files\Sandlot Shared
    2008-04-13 21:38 --------- d-----w C:\Program Files\SBITPlugin
    2008-04-13 16:33 --------- d--h--w C:\Program Files\InstallShield Installation Information
    2008-04-13 15:30 --------- d-----w C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
    2008-04-13 13:44 --------- d-----w C:\Program Files\Spybot - Search & Destroy
    2008-04-12 01:13 --------- d-----w C:\Program Files\ICQLite
    2008-04-12 01:12 --------- d-----w C:\Documents and Settings\Emmy\Application Data\Aim
    2008-04-12 01:11 --------- d-----w C:\Program Files\AIM Toolbar
    2008-04-12 01:09 --------- d-----w C:\Program Files\Common Files\AOL
    2008-04-12 01:09 --------- d-----w C:\Documents and Settings\All Users\Application Data\AOL
    2008-04-11 02:35 --------- d-----w C:\Program Files\Verizon
    2008-04-10 23:55 --------- d-----w C:\Program Files\mIRC
    2008-04-10 20:57 --------- d-----w C:\Program Files\XoftSpy
    2008-04-05 01:01 --------- d-----w C:\Documents and Settings\Emmy\Application Data\Canon
    2008-03-19 09:47 1,845,248 ----a-w C:\WINDOWS\SYSTEM32\win32k.sys
    2008-03-12 01:24 --------- d-----w C:\Program Files\Winamp
    2008-03-01 22:36 3,591,680 ----a-w C:\WINDOWS\SYSTEM32\SET22.tmp
    2008-03-01 13:06 826,368 ----a-w C:\WINDOWS\SYSTEM32\wininet.dll
    2008-02-20 06:51 282,624 ----a-w C:\WINDOWS\SYSTEM32\gdi32.dll
    2008-02-20 05:32 45,568 ----a-w C:\WINDOWS\SYSTEM32\dnsrslvr.dll
    2008-02-19 23:29 --------- d-----w C:\Documents and Settings\Earl\Application Data\Yahoo!
    2007-12-04 04:43 68,320 -c--a-w C:\Documents and Settings\Earl\Application Data\GDIPFONTCACHEV1.DAT
    2007-12-01 15:38 68,320 -c--a-w C:\Documents and Settings\Sue\Application Data\GDIPFONTCACHEV1.DAT
    2007-10-28 19:23 68,320 -c--a-w C:\Documents and Settings\Emmy\Application Data\GDIPFONTCACHEV1.DAT
    2007-04-24 02:21 774,144 ----a-w C:\Program Files\RngInterstitial.dll
    2004-09-16 11:54 63,560 -c--a-w C:\Documents and Settings\Shanna\Application Data\GDIPFONTCACHEV1.DAT
    2003-06-15 14:32 1,173 -c--a-w C:\Program Files\INSTALL.LOG
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{6156A32A-C512-4e23-AA9A-2315F4265681}]
    2008-04-11 11:46 334848 --a------ C:\WINDOWS\system32\myss_sb.dll

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "DellSupport"="C:\Program Files\Dell Support\DSAgnt.exe" [ ]
    "ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-04 03:56 15360]
    "SpybotSD TeaTimer"="C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe" [2008-01-28 11:43 2097488]
    "Yahoo! Pager"="C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" [2007-08-30 18:43 4670704]
    "SUPERAntiSpyware"="C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2008-02-29 16:03 1481968]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "NvCplDaemon"="C:\WINDOWS\System32\NvCpl.dll" [2003-10-06 15:16 5058560]
    "DVDSentry"="C:\WINDOWS\System32\DSentry.exe" [2002-08-14 20:22 28672]
    "MCAgentExe"="C:\Program Files\McAfee.com\Agent\mcagent.exe" [2002-09-06 20:15 192512]
    "MCUpdateExe"="C:\PROGRA~1\McAfee.com\Agent\McUpdate.exe" [2002-09-04 12:28 151552]
    "AdaptecDirectCD"="C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe" [2002-04-10 18:44 679936]
    "VirusScan Online"="c:\PROGRA~1\mcafee.com\vso\mcvsshld.exe" [2002-10-04 17:09 139264]
    "QuickTime Task"="C:\Program Files\QuickTime\QTTask.exe" [2008-01-10 16:27 385024]
    "nwiz"="nwiz.exe" [2003-10-06 15:16 741376 C:\WINDOWS\SYSTEM32\nwiz.exe]
    "EPSON Stylus C84 Series"="C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2D1.exe" [2003-05-27 03:00 99840]
    "A Verizon App"="C:\PROGRA~1\VERIZO~1\HELPSU~1\VERIZO~1.EXE" [2005-05-23 13:20 50744]
    "Motive SmartBridge"="C:\PROGRA~1\VERIZO~1\HELPSU~1\SMARTB~1\MotiveSB.exe" [2005-04-13 19:51 385024]
    "YBrowser"="C:\PROGRA~1\Yahoo!\browser\ybrwicon.exe" [2003-12-09 12:03 57344]
    "TkBellExe"="C:\Program Files\Common Files\Real\Update_OB\realsched.exe" [2006-07-28 11:30 180269]
    "VerizonServicepoint.exe"="C:\Program Files\Verizon\VSP\VerizonServicepoint.exe" [2007-11-16 16:30 2065648]
    "SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe" [2008-02-22 04:25 144784]

    C:\Documents and Settings\Sue\Start Menu\Programs\Startup\
    Event Reminder.lnk - C:\pmw\PMREMIND.EXE [1997-08-08 12:23:00 255408]

    C:\Documents and Settings\Earl\Start Menu\Programs\Startup\
    Event Reminder.lnk - C:\pmw\PMREMIND.EXE [1997-08-08 12:23:00 255408]

    C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
    Adobe Gamma Loader.lnk - C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2003-11-02 12:37:32 113664]
    Digital Line Detect.lnk - C:\Program Files\Digital Line Detect\DLG.exe [2003-01-14 22:57:14 24576]
    Microsoft Office.lnk - C:\Program Files\Microsoft Office\Office10\OSA.EXE [2001-02-13 03:01:04 83360]

    [hkey_local_machine\software\microsoft\windows\currentversion\explorer\shellexecutehooks]
    "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= C:\Program Files\SUPERAntiSpyware\SASSEH.DLL [2006-12-20 12:55 77824]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
    C:\Program Files\SUPERAntiSpyware\SASWINLO.dll 2007-04-19 12:41 294912 C:\Program Files\SUPERAntiSpyware\SASWINLO.dll

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
    backup=C:\WINDOWS\pss\Adobe Reader Speed Launch.lnkCommon Startup

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^America Online 9.0 Tray Icon.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\America Online 9.0 Tray Icon.lnk
    backup=C:\WINDOWS\pss\America Online 9.0 Tray Icon.lnkCommon Startup

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^NkvMon.exe.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\NkvMon.exe.lnk
    backup=C:\WINDOWS\pss\NkvMon.exe.lnkCommon Startup

    [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^ymetray.lnk]
    path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\ymetray.lnk
    backup=C:\WINDOWS\pss\ymetray.lnkCommon Startup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
    --a------ 2008-01-15 04:22 267048 C:\Program Files\iTunes\iTunesHelper.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RealPlayer]
    --a------ 2006-07-28 11:30 208941 C:\Program Files\Real\RealPlayer\realplay.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ymetray]
    --a------ 2006-10-03 14:04 6104568 C:\Program Files\Yahoo!\Yahoo! Music Engine\YahooMusicEngine.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
    "cmdService"=2 (0x2)
    "AOL ACS"=2 (0x2)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"=
    "C:\\Program Files\\Kontiki\\bin\\kontiki.exe"=
    "C:\\Program Files\\America Online 9.0\\waol.exe"=
    "C:\\Program Files\\Messenger\\msmsgs.exe"=
    "C:\\Program Files\\Yahoo! Games\\BeTrapped!\\BeTrapped.exe"=
    "C:\\Program Files\\America Online 7.0\\waol.exe"=
    "C:\\Program Files\\Yahoo!\\Messenger\\YPager.exe"=
    "C:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"=
    "C:\\PROGRA~1\\Yahoo!\\MESSEN~1\\YPager.exe"= C:\\Program Files\\Yahoo!\\Messenger\\YPager.exe
    "C:\\PROGRA~1\\Yahoo!\\MESSEN~1\\Yserver.exe"= C:\\Program Files\\Yahoo!\\Messenger\\YServer.exe
    "C:\\Program Files\\Yahoo!\\Yahoo! Music Engine\\YahooMusicEngine.exe"=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "C:\\Program Files\\Macromedia\\Dreamweaver 4\\Dreamweaver.exe"=
    "C:\\WINDOWS\\SYSTEM32\\SPOOL\\DRIVERS\\W32X86\\3\\SAGENT4.EXE"=
    "C:\\Program Files\\Bonjour\\mDNSResponder.exe"=
    "C:\\Program Files\\iTunes\\iTunes.exe"=
    "C:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
    "C:\\Program Files\\Skype\\Phone\\Skype.exe"=

    R0 $sys$cor;$sys$cor;C:\WINDOWS\system32\Drivers\$sys$cor.sys [2005-07-04 08:52]
    R1 $sys$crater;$sys$crater;C:\WINDOWS\system32\$sys$filesystem\crater.sys [2005-07-04 06:51]
    R2 $sys$DRMServer;Plug and Play Device Manager;C:\WINDOWS\system32\$sys$filesystem\$sys$DRMServer.exe [2004-12-14 05:49]
    R2 CD_Proxy;XCP CD Proxy;C:\WINDOWS\CDProxyServ.exe [2004-10-07 10:42]
    R2 Viewpoint Manager Service;Viewpoint Manager Service;"C:\Program Files\Viewpoint\Common\ViewpointService.exe" [2007-01-04 17:38]
    S3 cvspydr2;ColorVision Spyder 2;C:\WINDOWS\system32\DRIVERS\cvspydr2.sys [2002-04-02 12:30]
    S3 jnv4_mib;jnv4_mib;C:\DOCUME~1\Emmy\LOCALS~1\Temp\jnv4_mib.sys []
    S3 NMSCFG;NIC Management Service Configuration Driver;C:\WINDOWS\System32\drivers\NMSCFG.SYS [2002-05-03 13:30]
    S3 NMSSvc;Intel(R) NMS;C:\WINDOWS\System32\NMSSvc.exe [2002-05-03 13:29]

    .
    Contents of the 'Scheduled Tasks' folder
    "2008-02-21 18:39:00 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job"
    - C:\Program Files\Apple Software Update\SoftwareUpdate.exe
    "2003-01-25 02:06:48 C:\WINDOWS\Tasks\ISP signup reminder 1.job"
    - C:\WINDOWS\System32\OOBE\OOBEBALN.EXE
    "2008-04-16 16:08:00 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-1).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:09:00 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-2).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:12:00 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-3).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:09:00 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-4).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:08:00 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-A).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:09:00 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-e2).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:10:00 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-Earl).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:08:00 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-ECL).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:10:00 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-Eeeeeeemmy).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:10:00 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-Em).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:09:01 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-Em2).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:11:00 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-Emmalynne).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agen
    "2008-04-16 16:08:00 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-emmy c ludwig).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:11:00 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-Emmy CL).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:12:00 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-Emmy Emmy Bo Bemmy).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:12:00 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-emmy jr).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:10:00 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-Emmy).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:09:01 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-Emmy1).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:09:01 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-emmy2).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:09:01 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-emmy3).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:11:00 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-EmmyCL).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent.EmmyCLXMcAfee.com SecurityCenter periodically checks for updates for your McAfee.com Services.
    "2008-04-16 16:09:02 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-EMMYEMMY).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:11:00 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-General).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:11:00 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-Guest).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:08:01 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-Owner).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    "2008-04-16 16:10:01 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-Shanna).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent.ShannaXMcAfee.com SecurityCenter periodically checks for updates for your McAfee.com Services.
    "2008-04-16 16:09:02 C:\WINDOWS\Tasks\McAfee.com Update Check (D6WDK921-Sue).job"
    - C:\PROGRA~1\McAfee.com\Agent\mcupdate.ex
    - C:\PROGRA~1\McAfee.com\Agent
    .
    **************************************************************************

    catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-04-16 12:06:29
    Windows 5.1.2600 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    ------------------------ Other Running Processes ------------------------
    .
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\PROGRA~1\McAfee.com\VSO\mcvsrte.exe
    C:\WINDOWS\SYSTEM32\nvsvc32.exe
    C:\WINDOWS\SYSTEM32\wdfmgr.exe
    C:\WINDOWS\wanmpsvc.exe
    C:\Program Files\McAfee.com\VSO\mcvsshld.exe
    C:\PROGRA~1\Yahoo!\browser\ycommon.exe
    C:\Program Files\Common Files\Verizon Online\ConnMgr\cmisrv.exe
    C:\PROGRA~1\McAfee.com\VSO\McShield.exe
    C:\WINDOWS\SYSTEM32\wscntfy.exe
    C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
    C:\Program Files\Common Files\Verizon Online\AppMgr\vzOpenUIServer.exe
    C:\Program Files\Common Files\MotiveBrowser\MotiveBrowser.exe
    .
    **************************************************************************
    .
    Completion time: 2008-04-16 12:12:41 - machine was rebooted
    ComboFix-quarantined-files.txt 2008-04-16 16:12:36

    Pre-Run: 103,611,781,120 bytes free
    Post-Run: 103,988,363,264 bytes free
    .
    2008-04-16 03:54:58 --- E O F ---
     
  10. ECL1137

    ECL1137 Thread Starter

    Joined:
    Apr 13, 2008
    Messages:
    9
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 12:24:36 PM, on 4/16/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16640)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\$sys$filesystem\$sys$DRMServer.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\WINDOWS\CDProxyServ.exe
    c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
    C:\WINDOWS\System32\nvsvc32.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Viewpoint\Common\ViewpointService.exe
    C:\WINDOWS\wanmpsvc.exe
    C:\WINDOWS\System32\DSentry.exe
    C:\Program Files\McAfee.com\Agent\mcagent.exe
    C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe
    C:\PROGRA~1\mcafee.com\vso\mcvsshld.exe
    C:\Program Files\QuickTime\QTTask.exe
    C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2D1.EXE
    C:\PROGRA~1\VERIZO~1\HELPSU~1\VERIZO~1.EXE
    C:\PROGRA~1\VERIZO~1\HELPSU~1\SMARTB~1\MotiveSB.exe
    C:\PROGRA~1\Yahoo!\browser\ybrwicon.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\Verizon\VSP\VerizonServicepoint.exe
    C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\Digital Line Detect\DLG.exe
    C:\PROGRA~1\Yahoo!\browser\ycommon.exe
    C:\Program Files\Common Files\Verizon Online\ConnMgr\cmisrv.exe
    c:\PROGRA~1\mcafee.com\vso\mcshield.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
    C:\Program Files\Common Files\Verizon Online\AppMgr\vzOpenUIServer.exe
    C:\Program Files\Common Files\MotiveBrowser\MotiveBrowser.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\explorer.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://mail.yahoo.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = mail.yahoo.com
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = 0.0.0.0:80
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {243B17DE-77C7-46BF-B94B-0B5F309A0E64} - C:\Program Files\Microsoft Money\System\mnyside.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: Search Assistant MySidesearch - {6156A32A-C512-4e23-AA9A-2315F4265681} - C:\WINDOWS\system32\myss_sb.dll
    O2 - BHO: SidebarAutoLaunch Class - {F2AA9440-6328-4933-B7C9-A6CCDF9CBF6D} - C:\Program Files\Yahoo!\browser\YSidebarIEBHO.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [DVDSentry] C:\WINDOWS\System32\DSentry.exe
    O4 - HKLM\..\Run: [MCAgentExe] C:\Program Files\McAfee.com\Agent\mcagent.exe
    O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\McAfee.com\Agent\McUpdate.exe
    O4 - HKLM\..\Run: [AdaptecDirectCD] "C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe"
    O4 - HKLM\..\Run: [VirusScan Online] c:\PROGRA~1\mcafee.com\vso\mcvsshld.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [EPSON Stylus C84 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2D1.EXE /P23 "EPSON Stylus C84 Series" /O6 "USB001" /M "Stylus C84"
    O4 - HKLM\..\Run: [A Verizon App] C:\PROGRA~1\VERIZO~1\HELPSU~1\VERIZO~1.EXE
    O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\VERIZO~1\HELPSU~1\SMARTB~1\MotiveSB.exe
    O4 - HKLM\..\Run: [YBrowser] C:\PROGRA~1\Yahoo!\browser\ybrwicon.exe
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [VerizonServicepoint.exe] "C:\Program Files\Verizon\VSP\VerizonServicepoint.exe" /AUTORUN
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
    O4 - HKCU\..\Run: [DellSupport] "C:\Program Files\Dell Support\DSAgnt.exe" /startup
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Digital Line Detect.lnk = ?
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
    O9 - Extra button: Verizon Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - C:\Program Files\Microsoft Money\System\mnyside.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: Yahoo! Chat - http://us.chat1.yimg.com/us.yimg.com/i/chat/applet/c381/chat.cab
    O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/eng/partner/default/kavwebscan_unicode.cab
    O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
    O16 - DPF: {4A3CF76B-EC7A-405D-A67D-8DC6B52AB35B} (QDiagAOLCCUpdateObj Class) - http://aolcc.aol.com/computercheckup/qdiagcc.cab
    O16 - DPF: {6B4788E2-BAE8-11D2-A1B4-00400512739B} (PWMediaSendControl Class) - http://216.249.24.140/code/PWActiveXImgCtl.CAB
    O16 - DPF: {72C23FEC-3AF9-48FC-9597-241A8EBDFE0A} (InstallShield International Setup Player) - http://ftp.hp.com/pub/automatic/player/isetupML.cab
    O16 - DPF: {90C9629E-CD32-11D3-BBFB-00105A1F0D68} (InstallShield International Setup Player) - http://ps.theport.com/xmlplayer/english/isetup.cab
    O16 - DPF: {A17E30C4-A9BA-11D4-8673-60DB54C10000} (Yahoo! MailTo) - http://us.dl1.yimg.com/download.yahoo.com/dl/installs/yse/ymmapi_416.dll
    O16 - DPF: {C606BA60-AB76-48B6-96A7-2C4D5C386F70} (PreQualifier Class) - http://www.verizon.net/checkmypc/includes/MotivePreQual.cab
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Plug and Play Device Manager ($sys$DRMServer) - First 4 Internet Ltd - C:\WINDOWS\system32\$sys$filesystem\$sys$DRMServer.exe
    O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: XCP CD Proxy (CD_Proxy) - Unknown owner - C:\WINDOWS\CDProxyServ.exe
    O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: McAfee.com McShield (McShield) - Unknown owner - c:\PROGRA~1\mcafee.com\vso\mcshield.exe
    O23 - Service: McAfee.com VirusScan Online Realtime Engine (MCVSRte) - Mcafee.com Corporation - c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
    O23 - Service: Intel(R) NMS (NMSSvc) - Intel Corporation - C:\WINDOWS\System32\NMSSvc.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
    O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe
    O23 - Service: WAN Miniport (ATW) Service (WANMiniportService) - America Online, Inc. - C:\WINDOWS\wanmpsvc.exe

    --
    End of file - 10276 bytes
     
  11. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Open Notepad and copy and paste the text in the quote box below into it:

    Save the file to you desktop and name it CFScript.txt

    Then drag the CFScript.txt into the ComboFix.exe as shown in the screenshot below.

    [​IMG]

    This will start ComboFix again. It may ask to reboot. Post the contents of Combofix.txt in your next reply together with a new HijackThis log.
     
  12. ECL1137

    ECL1137 Thread Starter

    Joined:
    Apr 13, 2008
    Messages:
    9
    Hmm... maybe I'm doing something wrong, but dragging the text icon over the ComboFix icon doesn't do anything for me. It brings up a little "progress" type bar, but then nothing happens. Any ideas?
    Thanks so much for your help!
     
  13. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Please download the OTMoveIt2 by OldTimer.
    • Save it to your desktop.
    • Please double-click OTMoveIt2.exe to run it. (Vista users, please right click on OTMoveit2.exe and select "Run as an Administrator")
    • Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

      Code:
      [b]C:\WINDOWS\SYSTEM32\mysidesearch_sidebar_uninstall.exe
      C:\WINDOWS\SYSTEM32\gside.exe
      C:\WINDOWS\SYSTEM32\g7.exe
      C:\WINDOWS\SYSTEM32\{dc25a79c-8a4e-054d-7bcd-0ba97ee5b0eb}.dll-uninst.exe
      C:\WINDOWS\SYSTEM32\{dc25a79c-8a4e-054d-7bcd-0ba97ee5b0eb}.dll
      C:\WINDOWS\SYSTEM32\myss_sb_uninstall.exe
      C:\WINDOWS\system32\myss_sb.dll
      C:\WINDOWS\SYSTEM32\pinz1
      C:\WINDOWS\SYSTEM32\IDE2
      C:\WINDOWS\SYSTEM32\ExTmp
      C:\WINDOWS\RWFybA
      C:\WINDOWS\SYSTEM32\bharebio01
      C:\Temp\wdlw14 [/b]
    • Return to OTMoveIt2, right click in the "Paste List of Files/Folders to Move" window (under the light Yellow bar) and choose Paste.
    • Click the red Moveit! button.
    • A log of files and folders moved will be created in the c:\_OTMoveIt\MovedFiles folder in the form of Date and Time (mmddyyyy_hhmmss.log). Please open this log in Notepad and post its contents in your next reply.
    • Close OTMoveIt2
    If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.
     
  14. ECL1137

    ECL1137 Thread Starter

    Joined:
    Apr 13, 2008
    Messages:
    9
    Thanks!



    C:\WINDOWS\SYSTEM32\mysidesearch_sidebar_uninstall.exe moved successfully.
    C:\WINDOWS\SYSTEM32\gside.exe moved successfully.
    C:\WINDOWS\SYSTEM32\g7.exe moved successfully.
    C:\WINDOWS\SYSTEM32\{dc25a79c-8a4e-054d-7bcd-0ba97ee5b0eb}.dll-uninst.exe moved successfully.
    C:\WINDOWS\SYSTEM32\{dc25a79c-8a4e-054d-7bcd-0ba97ee5b0eb}.dll unregistered successfully.
    C:\WINDOWS\SYSTEM32\{dc25a79c-8a4e-054d-7bcd-0ba97ee5b0eb}.dll moved successfully.
    C:\WINDOWS\SYSTEM32\myss_sb_uninstall.exe moved successfully.
    C:\WINDOWS\system32\myss_sb.dll NOT unregistered.
    C:\WINDOWS\system32\myss_sb.dll moved successfully.
    C:\WINDOWS\SYSTEM32\pinz1 moved successfully.
    C:\WINDOWS\SYSTEM32\IDE2 moved successfully.
    C:\WINDOWS\SYSTEM32\ExTmp moved successfully.
    C:\WINDOWS\RWFybA moved successfully.
    C:\WINDOWS\SYSTEM32\bharebio01 moved successfully.
    C:\Temp\wdlw14 moved successfully.

    OTMoveIt2 by OldTimer - Version 1.0.4.1 log created on 04182008_183321


    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 6:35:42 PM, on 4/18/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16640)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\$sys$filesystem\$sys$DRMServer.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\WINDOWS\CDProxyServ.exe
    c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
    C:\WINDOWS\System32\nvsvc32.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Viewpoint\Common\ViewpointService.exe
    C:\WINDOWS\wanmpsvc.exe
    c:\PROGRA~1\mcafee.com\vso\mcshield.exe
    C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\System32\DSentry.exe
    C:\Program Files\McAfee.com\Agent\mcagent.exe
    C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe
    C:\PROGRA~1\mcafee.com\vso\mcvsshld.exe
    C:\Program Files\QuickTime\QTTask.exe
    C:\PROGRA~1\VERIZO~1\HELPSU~1\VERIZO~1.EXE
    C:\PROGRA~1\VERIZO~1\HELPSU~1\SMARTB~1\MotiveSB.exe
    C:\PROGRA~1\Yahoo!\browser\ybrwicon.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\Verizon\VSP\VerizonServicepoint.exe
    C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Digital Line Detect\DLG.exe
    C:\PROGRA~1\Yahoo!\browser\ycommon.exe
    C:\Program Files\Common Files\Verizon Online\ConnMgr\cmisrv.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Common Files\Verizon Online\AppMgr\vzOpenUIServer.exe
    C:\Program Files\Common Files\MotiveBrowser\MotiveBrowser.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://mail.yahoo.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = mail.yahoo.com
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = 0.0.0.0:80
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {243B17DE-77C7-46BF-B94B-0B5F309A0E64} - C:\Program Files\Microsoft Money\System\mnyside.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: SidebarAutoLaunch Class - {F2AA9440-6328-4933-B7C9-A6CCDF9CBF6D} - C:\Program Files\Yahoo!\browser\YSidebarIEBHO.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [DVDSentry] C:\WINDOWS\System32\DSentry.exe
    O4 - HKLM\..\Run: [MCAgentExe] C:\Program Files\McAfee.com\Agent\mcagent.exe
    O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\McAfee.com\Agent\McUpdate.exe
    O4 - HKLM\..\Run: [AdaptecDirectCD] "C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe"
    O4 - HKLM\..\Run: [VirusScan Online] c:\PROGRA~1\mcafee.com\vso\mcvsshld.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [EPSON Stylus C84 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2D1.EXE /P23 "EPSON Stylus C84 Series" /O6 "USB001" /M "Stylus C84"
    O4 - HKLM\..\Run: [A Verizon App] C:\PROGRA~1\VERIZO~1\HELPSU~1\VERIZO~1.EXE
    O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\VERIZO~1\HELPSU~1\SMARTB~1\MotiveSB.exe
    O4 - HKLM\..\Run: [YBrowser] C:\PROGRA~1\Yahoo!\browser\ybrwicon.exe
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [VerizonServicepoint.exe] "C:\Program Files\Verizon\VSP\VerizonServicepoint.exe" /AUTORUN
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
    O4 - HKCU\..\Run: [DellSupport] "C:\Program Files\Dell Support\DSAgnt.exe" /startup
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Digital Line Detect.lnk = ?
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
    O9 - Extra button: Verizon Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - C:\Program Files\Microsoft Money\System\mnyside.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: Yahoo! Chat - http://us.chat1.yimg.com/us.yimg.com/i/chat/applet/c381/chat.cab
    O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/eng/partner/default/kavwebscan_unicode.cab
    O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
    O16 - DPF: {4A3CF76B-EC7A-405D-A67D-8DC6B52AB35B} (QDiagAOLCCUpdateObj Class) - http://aolcc.aol.com/computercheckup/qdiagcc.cab
    O16 - DPF: {6B4788E2-BAE8-11D2-A1B4-00400512739B} (PWMediaSendControl Class) - http://216.249.24.140/code/PWActiveXImgCtl.CAB
    O16 - DPF: {72C23FEC-3AF9-48FC-9597-241A8EBDFE0A} (InstallShield International Setup Player) - http://ftp.hp.com/pub/automatic/player/isetupML.cab
    O16 - DPF: {90C9629E-CD32-11D3-BBFB-00105A1F0D68} (InstallShield International Setup Player) - http://ps.theport.com/xmlplayer/english/isetup.cab
    O16 - DPF: {A17E30C4-A9BA-11D4-8673-60DB54C10000} (Yahoo! MailTo) - http://us.dl1.yimg.com/download.yahoo.com/dl/installs/yse/ymmapi_416.dll
    O16 - DPF: {C606BA60-AB76-48B6-96A7-2C4D5C386F70} (PreQualifier Class) - http://www.verizon.net/checkmypc/includes/MotivePreQual.cab
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Plug and Play Device Manager ($sys$DRMServer) - First 4 Internet Ltd - C:\WINDOWS\system32\$sys$filesystem\$sys$DRMServer.exe
    O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: XCP CD Proxy (CD_Proxy) - Unknown owner - C:\WINDOWS\CDProxyServ.exe
    O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: McAfee.com McShield (McShield) - Unknown owner - c:\PROGRA~1\mcafee.com\vso\mcshield.exe
    O23 - Service: McAfee.com VirusScan Online Realtime Engine (MCVSRte) - Mcafee.com Corporation - c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
    O23 - Service: Intel(R) NMS (NMSSvc) - Intel Corporation - C:\WINDOWS\System32\NMSSvc.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
    O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe
    O23 - Service: WAN Miniport (ATW) Service (WANMiniportService) - America Online, Inc. - C:\WINDOWS\wanmpsvc.exe

    --
    End of file - 9977 bytes
     
  15. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Please download ATF Cleaner by Atribune.
    This program is for XP and Windows 2000 only
    • Double-click ATF-Cleaner.exe to run the program.
    • Under Main choose: Select All
    • Click the Empty Selected button.

    Click Exit on the Main menu to close the program.



    Please perform a scan with Kaspersky Webscan Online Virus Scanner
    • Read the Requirements and Privacy statement, then select "Accept".
    • A new window will appear promting you to install an ActiveX component from Kaspersky - "Do you want to install this software?".
    • Click "Yes" or select "Install" to download the ActiveX controls that allows ActiveScan to run.
    • When the download is complete it will say ready, click "Next".
    • Click "Scan Settings" and check the option to use the Extended Database if available otherwise Standard).
    • Click "Scan Options" and select both "Scan Archives" and "Scan Mail Bases".
    • Click "OK".
    • Under "Select a target to scan", click on "My Computer".
    • When the scan is complete choose to save the results as "Save as Text" named kaspersky.txt to your desktop and post them in your next reply.

    Kaspersky does not remove anything but will provide a log of anything it finds. On August 8th, 2006 Kaspersky updated the software used for Free Online Virus Scanner. In order to continue using the online scanner you will need to uninstall the old version (if previously used) from your Add/Remove Programs list and then install the latest version. To do this, follow the steps here and reboot afterwards if your system does not reboot automatically or it will show 'Kaspersky Online Scanner license key was not found!
     
  16. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/703468

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice