1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Exclamation mark

Discussion in 'Virus & Other Malware Removal' started by sonic16, Jan 29, 2007.

Thread Status:
Not open for further replies.
Advertisement
  1. sonic16

    sonic16 Thread Starter

    Joined:
    Jan 29, 2007
    Messages:
    7
    I keep getting a exclamation mark and System Alert popping up and informing me of dire consequences if I don't download certain virus programs. Also my internet home page is changed to allsecuritynotes.com and I can not change it back. Help me please!!!
     
  2. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Click here to download HJTsetup.exe:

    http://www.thespykiller.co.uk/forum/index.php?action=tpmod;dl=item5
    Scroll down to the download section

    Save HJTsetup.exe to your desktop.

    Double click on the HJTsetup.exe icon on your desktop.
    By default it will install to C:\Program Files\Hijack This.
    Continue to click Next in the setup dialogue boxes until you get to the Select Addition Tasks dialogue.
    Put a check by Create a desktop icon then click Next again.
    Continue to follow the rest of the prompts from there.
    At the final dialogue box click Finish and it will launch Hijack This.
    Click on the Do a system scan and save a log file button. It will scan and then ask you to save the log.
    Click Save to save the log file and then the log will open in notepad.
    Click on "Edit > Select All" then click on "Edit > Copy" to copy the entire contents of the log.
    Come back here to this thread and Paste the log in your next reply.
    DO NOT have Hijack This fix anything yet. Most of what it finds will be harmless or even required.
     
  3. sonic16

    sonic16 Thread Starter

    Joined:
    Jan 29, 2007
    Messages:
    7
    Ok here it is
    Logfile of HijackThis v1.99.1
    Scan saved at 3:41:55 PM, on 29/01/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.5730.0011)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\McAfee\HackerWatch\HWAPI.exe
    C:\PROGRA~1\McAfee\MSC\mclogsrv.exe
    C:\PROGRA~1\McAfee\MSC\mcupdmgr.exe
    c:\program files\common files\mcafee\mna\mcnasvc.exe
    C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
    C:\PROGRA~1\McAfee\MSC\mcpromgr.exe
    c:\PROGRA~1\COMMON~1\mcafee\redirsvc\redirsvc.exe
    C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
    C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
    C:\PROGRA~1\McAfee\MSC\mctskshd.exe
    C:\PROGRA~1\McAfee\MSC\mcusrmgr.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\Program Files\McAfee\MPF\MPFSrv.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    c:\PROGRA~1\mcafee.com\agent\mcagent.exe
    C:\Program Files\Video ActiveX Object\pmsngr.exe
    C:\Program Files\Video ActiveX Object\isamonitor.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\WINDOWS\system32\hkcmd.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\Java\jre1.5.0_08\bin\jusched.exe
    C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
    C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb04.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe
    C:\Program Files\802.11 Wireless LAN\802.11g Wireless Cardbus & PCI Adapter HW.51 V1.00\WlanCU.exe
    C:\Program Files\Video ActiveX Object\pmmon.exe
    C:\Program Files\Video ActiveX Object\isamini.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\PROGRA~1\COMMON~1\McAfee\EmProxy\emproxy.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Hijackthis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dellnet.com
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.dellnet.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://g.msn.com/8SEENUS020100/FRWCompleteAddIns
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = http://localhost;
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O2 - BHO: (no name) - {67982BB7-0F95-44C5-92DC-E3AF3DC19D6D} - C:\Program Files\Video ActiveX Object\isaddon.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_08\bin\ssv.dll
    O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - c:\program files\mcafee\virusscan\scriptcl.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar3.dll
    O2 - BHO: Nothing - {b0398eca-0bcd-4645-8261-5e9dc70248d0} - C:\WINDOWS\system32\hpCCFF.tmp (file missing)
    O3 - Toolbar: My &Web Search - {07B18EA9-A523-4961-B6BB-170DE4475CCA} - C:\Program Files\MyWebSearch\bar\1.bin\MWSBAR.DLL
    O3 - Toolbar: (no name) - {4D1C4E89-A32A-416b-BCDB-33B3EF3617D3} - (no file)
    O3 - Toolbar: &Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll (file missing)
    O3 - Toolbar: Starware - {D49E9D35-254C-4c6a-9D17-95018D228FF5} - C:\Program Files\Starware\bin\Starware.dll (file missing)
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar3.dll
    O4 - HKLM\..\Run: [keysvr] C:\WINDOWS\addins\keysvr.exe
    O4 - HKLM\..\Run: [*keysvr] C:\WINDOWS\addins\keysvr.exe
    O4 - HKLM\..\Run: [*explib] C:\WINDOWS\repair\explib.exe
    O4 - HKLM\..\Run: [dlllog] C:\WINDOWS\Driver Cache\dlllog.exe
    O4 - HKLM\..\Run: [*doshard] C:\WINDOWS\Config\doshard.exe
    O4 - HKLM\..\Run: [odbcftp] C:\WINDOWS\repair\odbcftp.exe
    O4 - HKLM\..\Run: [*avkb] C:\WINDOWS\addins\avkb.exe
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [SpySpotter System Defender] C:\Program Files\SpySpotter3\Defender.exe -startup
    O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.5.0_08\bin\jusched.exe"
    O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
    O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb04.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe
    O4 - Global Startup: Wireless Configuration Utility HW.51.lnk = C:\Program Files\802.11 Wireless LAN\802.11g Wireless Cardbus & PCI Adapter HW.51 V1.00\WlanCU.exe
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: ShopperReports - Compare product prices - {946B3E9E-E21A-49c8-9F63-900533FAFE14} - C:\Program Files\ShopperReports\Bin\2.0.0\ShprRprt.dll (file missing)
    O9 - Extra button: ShopperReports - Compare travel rates - {946B3E9E-E21A-49c8-9F63-900533FAFE15} - C:\Program Files\ShopperReports\Bin\2.0.0\ShprRprt.dll (file missing)
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O11 - Options group: [INTERNATIONAL] International*
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O18 - Filter: text/html - {2AB289AE-4B90-4281-B2AE-1F4BB034B647} - (no file)
    O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
    O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
    O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
    O21 - SSODL: breadthes - {5c4f2cbc-f32d-4a03-9812-86f39379811b} - C:\WINDOWS\system32\oksrqqu.dll
    O23 - Service: McAfee E-mail Proxy (Emproxy) - McAfee, Inc. - C:\PROGRA~1\COMMON~1\McAfee\EmProxy\emproxy.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: McAfee HackerWatch Service - McAfee, Inc. - C:\Program Files\Common Files\McAfee\HackerWatch\HWAPI.exe
    O23 - Service: McAfee Log Manager (McLogManagerService) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mclogsrv.exe
    O23 - Service: McAfee Update Manager (mcmispupdmgr) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcupdmgr.exe
    O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\program files\common files\mcafee\mna\mcnasvc.exe
    O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
    O23 - Service: McAfee Protection Manager (mcpromgr) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcpromgr.exe
    O23 - Service: McAfee Redirector Service (McRedirector) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\redirsvc\redirsvc.exe
    O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
    O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
    O23 - Service: McAfee Task Scheduler (mctskshd.exe) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mctskshd.exe
    O23 - Service: McAfee User Manager (mcusrmgr) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcusrmgr.exe
    O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe

    Now what? *L*
     
  4. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Add remove programs - remove My Web Search

    You should print out these instructions, or copy them to a NotePad file for reading while in Safe Mode, because you will not be able to connect to the Internet to read from this site.

    Please download SmitfraudFix (by S!Ri)
    Extract the content (a folder named SmitfraudFix) to your Desktop.

    Next, please reboot your computer in Safe Mode by doing the following :
    • Restart your computer
    • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
    • Instead of Windows loading as normal, a menu with options should appear;
    • Select the first option, to run Windows in Safe Mode, then press "Enter".
    • Choose your usual account.
    Once in Safe Mode, open the SmitfraudFix folder again and double-click smitfraudfix.cmd
    Select option #2 - Clean by typing 2 and press "Enter" to delete infected files.

    You will be prompted: "Registry cleaning - Do you want to clean the registry?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.

    The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".

    The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart it into Normal Windows.

    A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply along with a new hijack log.

    The report can also be found at the root of the system drive, usually at C:\rapport.txt

    Warning: running option #2 on a non infected computer will remove your Desktop background.
    ======================

    Download Superantispyware

    http://www.superantispyware.com/superantispywarefreevspro.html

    Install it and double-click the icon on your desktop to run it.
    · It will ask if you want to update the program definitions, click Yes.
    · Under Configuration and Preferences, click the Preferences button.
    · Click the Scanning Control tab.
    · Under Scanner Options make sure the following are checked:
    o Close browsers before scanning
    o Scan for tracking cookies
    o Terminate memory threats before quarantining.
    o Please leave the others unchecked.
    o Click the Close button to leave the control center screen.
    · On the main screen, under Scan for Harmful Software click Scan your computer.
    · On the left check C:\Fixed Drive.
    · On the right, under Complete Scan, choose Perform Complete Scan.
    · Click Next to start the scan. Please be patient while it scans your computer.
    · After the scan is complete a summary box will appear. Click OK.
    · Make sure everything in the white box has a check next to it, then click Next.
    · It will quarantine what it found and if it asks if you want to reboot, click Yes.
    · To retrieve the removal information for me please do the following:
    o After reboot, double-click the SUPERAntispyware icon on your desktop.
    o Click Preferences. Click the Statistics/Logs tab.
    o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    o It will open in your default text editor (such as Notepad/Wordpad).
    o Please highlight everything in the notepad, then right-click and choose copy.
    · Click close and close again to exit the program.
    · Please paste that information here for me with a new HijackThis log.
     
  5. sonic16

    sonic16 Thread Starter

    Joined:
    Jan 29, 2007
    Messages:
    7
    OK, I've done all that and everything seems to be fabulous! THANKS!
    I am sending requested logs.
    SmitFraudFix v2.137

    Scan done at 17:19:24.45, 29/01/2007
    Run from C:\Documents and Settings\Sandi\Desktop\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    The filesystem type is NTFS
    Fix run in safe mode

    »»»»»»»»»»»»»»»»»»»»»»»» Before SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
    "{5c4f2cbc-f32d-4a03-9812-86f39379811b}"="breadthes"

    [HKEY_CLASSES_ROOT\CLSID\{5c4f2cbc-f32d-4a03-9812-86f39379811b}\InProcServer32]
    @="C:\WINDOWS\system32\oksrqqu.dll"

    [HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{5c4f2cbc-f32d-4a03-9812-86f39379811b}\InProcServer32]
    @="C:\WINDOWS\system32\oksrqqu.dll"


    »»»»»»»»»»»»»»»»»»»»»»»» Killing process


    »»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

    GenericRenosFix by S!Ri

    C:\WINDOWS\system32\oksrqqu.dll -> Hoax.Win32.Renos.gen.i
    C:\WINDOWS\system32\oksrqqu.dll -> Deleted


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files

    C:\WINDOWS\system32\ot.ico Deleted
    C:\WINDOWS\system32\ts.ico Deleted
    C:\WINDOWS\system32\1024\ Deleted
    C:\Program Files\AntiVerminser\ Deleted
    C:\Program Files\SpyFalcon\ Deleted
    C:\Program Files\Video ActiveX Object\ Deleted

    »»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


    »»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "System"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

    Registry Cleaning done.

    »»»»»»»»»»»»»»»»»»»»»»»» After SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll



    file of HijackThis v1.99.1
    Scan saved at 6:09:43 PM, on 29/01/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.5730.0011)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\McAfee\HackerWatch\HWAPI.exe
    C:\PROGRA~1\McAfee\MSC\mclogsrv.exe
    C:\WINDOWS\Explorer.EXE
    C:\PROGRA~1\McAfee\MSC\mcupdmgr.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\WINDOWS\system32\hkcmd.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\Java\jre1.5.0_08\bin\jusched.exe
    C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
    C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb04.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\802.11 Wireless LAN\802.11g Wireless Cardbus & PCI Adapter HW.51 V1.00\WlanCU.exe
    c:\program files\common files\mcafee\mna\mcnasvc.exe
    C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
    C:\PROGRA~1\McAfee\MSC\mcpromgr.exe
    c:\PROGRA~1\COMMON~1\mcafee\redirsvc\redirsvc.exe
    C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
    C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
    C:\PROGRA~1\McAfee\MSC\mctskshd.exe
    C:\PROGRA~1\McAfee\MSC\mcusrmgr.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\Program Files\McAfee\MPF\MPFSrv.exe
    C:\WINDOWS\System32\svchost.exe
    c:\PROGRA~1\mcafee.com\agent\mcagent.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\PROGRA~1\COMMON~1\McAfee\EmProxy\emproxy.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\Program Files\Hijackthis\HijackThis.exe
    \?\C:\WINDOWS\system32\WBEM\WMIADAP.EXE

    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://g.msn.com/8SEENUS020100/FRWCompleteAddIns
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = http://localhost;
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_08\bin\ssv.dll
    O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - c:\program files\mcafee\virusscan\scriptcl.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar3.dll
    O3 - Toolbar: (no name) - {07B18EA9-A523-4961-B6BB-170DE4475CCA} - (no file)
    O3 - Toolbar: (no name) - {4D1C4E89-A32A-416b-BCDB-33B3EF3617D3} - (no file)
    O3 - Toolbar: &Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll (file missing)
    O3 - Toolbar: (no name) - {D49E9D35-254C-4c6a-9D17-95018D228FF5} - (no file)
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar3.dll
    O4 - HKLM\..\Run: [keysvr] C:\WINDOWS\addins\keysvr.exe
    O4 - HKLM\..\Run: [*keysvr] C:\WINDOWS\addins\keysvr.exe
    O4 - HKLM\..\Run: [*explib] C:\WINDOWS\repair\explib.exe
    O4 - HKLM\..\Run: [dlllog] C:\WINDOWS\Driver Cache\dlllog.exe
    O4 - HKLM\..\Run: [*doshard] C:\WINDOWS\Config\doshard.exe
    O4 - HKLM\..\Run: [odbcftp] C:\WINDOWS\repair\odbcftp.exe
    O4 - HKLM\..\Run: [*avkb] C:\WINDOWS\addins\avkb.exe
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [SpySpotter System Defender] C:\Program Files\SpySpotter3\Defender.exe -startup
    O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.5.0_08\bin\jusched.exe"
    O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
    O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb04.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - Global Startup: Wireless Configuration Utility HW.51.lnk = C:\Program Files\802.11 Wireless LAN\802.11g Wireless Cardbus & PCI Adapter HW.51 V1.00\WlanCU.exe
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: ShopperReports - Compare product prices - {946B3E9E-E21A-49c8-9F63-900533FAFE14} - C:\Program Files\ShopperReports\Bin\2.0.0\ShprRprt.dll (file missing)
    O9 - Extra button: ShopperReports - Compare travel rates - {946B3E9E-E21A-49c8-9F63-900533FAFE15} - C:\Program Files\ShopperReports\Bin\2.0.0\ShprRprt.dll (file missing)
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O11 - Options group: [INTERNATIONAL] International*
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O18 - Filter: text/html - {2AB289AE-4B90-4281-B2AE-1F4BB034B647} - (no file)
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
    O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
    O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
    O23 - Service: McAfee E-mail Proxy (Emproxy) - McAfee, Inc. - C:\PROGRA~1\COMMON~1\McAfee\EmProxy\emproxy.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: McAfee HackerWatch Service - McAfee, Inc. - C:\Program Files\Common Files\McAfee\HackerWatch\HWAPI.exe
    O23 - Service: McAfee Log Manager (McLogManagerService) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mclogsrv.exe
    O23 - Service: McAfee Update Manager (mcmispupdmgr) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcupdmgr.exe
    O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\program files\common files\mcafee\mna\mcnasvc.exe
    O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
    O23 - Service: McAfee Protection Manager (mcpromgr) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcpromgr.exe
    O23 - Service: McAfee Redirector Service (McRedirector) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\redirsvc\redirsvc.exe
    O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
    O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
    O23 - Service: McAfee Task Scheduler (mctskshd.exe) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mctskshd.exe
    O23 - Service: McAfee User Manager (mcusrmgr) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcusrmgr.exe
    O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe
     
  6. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Where is the log from SuperAntiSpyware?
     
  7. sonic16

    sonic16 Thread Starter

    Joined:
    Jan 29, 2007
    Messages:
    7
    SUPERAntiSpyware Scan Log
    Generated 01/29/2007 at 05:59 PM

    Application Version : 3.5.1016

    Core Rules Database Version : 3174
    Trace Rules Database Version: 1184

    Scan type : Quick Scan
    Total Scan Time : 00:27:56

    Memory items scanned : 435
    Memory threats detected : 0
    Registry items scanned : 882
    Registry threats detected : 258
    File items scanned : 22203
    File threats detected : 268

    Adware.Tracking Cookie
    C:\Documents and Settings\Sandi\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sandi\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sandi\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sandi\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sandi\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sandi\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sandi\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sandi\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sandi\Cookies\[email protected][3].txt
    C:\Documents and Settings\Sandi\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sandi\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sandi\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sandi\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sandi\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sandi\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sandi\Cookies\[email protected][2].txt
    C:\Documents and Settings\Sandi\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sandi\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sandi\Cookies\[email protected][1].txt
    C:\Documents and Settings\Sandi\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][2].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][2].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][2].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][2].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][2].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][2].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][3].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][3].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][2].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][2].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][2].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][2].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][2].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][2].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][2].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][2].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][2].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][2].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][3].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][4].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][5].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][6].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][7].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][2].txt
    C:\Documents and Settings\Lee\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ryan\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ryan\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][1].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt
    C:\Documents and Settings\Scott\Cookies\[email protected][2].txt

    Adware.MyWebSearch
    HKCR\CLSID\{07B18EA1-A523-4961-B6BB-170DE4475CCA}
    HKCR\CLSID\{07B18EA1-A523-4961-B6BB-170DE4475CCA}\InprocServer32
    HKCR\CLSID\{07B18EA1-A523-4961-B6BB-170DE4475CCA}\InprocServer32#ThreadingModel
    HKCR\CLSID\{07B18EA1-A523-4961-B6BB-170DE4475CCA}\Programmable
    HKCR\CLSID\{07B18EA1-A523-4961-B6BB-170DE4475CCA}\TypeLib
    HKCR\CLSID\{00A6FAF1-072E-44CF-8957-5838F569A31D}
    HKCR\CLSID\{00A6FAF1-072E-44CF-8957-5838F569A31D}\InprocServer32
    HKCR\CLSID\{00A6FAF1-072E-44CF-8957-5838F569A31D}\InprocServer32#ThreadingModel
    HKCR\CLSID\{00A6FAF1-072E-44CF-8957-5838F569A31D}\Programmable
    HKCR\CLSID\{07B18EA9-A523-4961-B6BB-170DE4475CCA}
    HKCR\CLSID\{07B18EA9-A523-4961-B6BB-170DE4475CCA}\InprocServer32
    HKCR\CLSID\{07B18EA9-A523-4961-B6BB-170DE4475CCA}\InprocServer32#ThreadingModel
    HKCR\CLSID\{07B18EA9-A523-4961-B6BB-170DE4475CCA}\Programmable
    HKCR\CLSID\{07B18EA9-A523-4961-B6BB-170DE4475CCA}\TypeLib

    Adware.HotBar/ShopperReports (Low Risk)
    HKCR\CLSID\{2178C864-B8BC-41AE-A1FB-EB6A32F87EB1}
    HKCR\CLSID\{2178C864-B8BC-41AE-A1FB-EB6A32F87EB1}\Implemented Categories
    HKCR\CLSID\{2178C864-B8BC-41AE-A1FB-EB6A32F87EB1}\Implemented Categories\{00021493-0000-0000-C000-000000000046}
    HKCR\CLSID\{2178C864-B8BC-41AE-A1FB-EB6A32F87EB1}\InprocServer32
    HKCR\CLSID\{2178C864-B8BC-41AE-A1FB-EB6A32F87EB1}\InprocServer32#ThreadingModel
    HKCR\CLSID\{2178C864-B8BC-41AE-A1FB-EB6A32F87EB1}\ProgID
    HKCR\CLSID\{2178C864-B8BC-41AE-A1FB-EB6A32F87EB1}\TypeLib
    HKCR\CLSID\{2178C864-B8BC-41AE-A1FB-EB6A32F87EB1}\VersionIndependentProgID
    HKCR\CLSID\{2A8A997F-BB9F-48F6-AA2B-2762D50F9289}
    HKCR\CLSID\{2A8A997F-BB9F-48F6-AA2B-2762D50F9289}\InprocServer32
    HKCR\CLSID\{2A8A997F-BB9F-48F6-AA2B-2762D50F9289}\InprocServer32#ThreadingModel
    HKCR\CLSID\{2A8A997F-BB9F-48F6-AA2B-2762D50F9289}\ProgID
    HKCR\CLSID\{2A8A997F-BB9F-48F6-AA2B-2762D50F9289}\TypeLib
    HKCR\CLSID\{2A8A997F-BB9F-48F6-AA2B-2762D50F9289}\VersionIndependentProgID
    HKCR\CLSID\{A798E2B4-B6A0-4B96-8C53-8EC7A3B0895A}
    HKCR\CLSID\{A798E2B4-B6A0-4B96-8C53-8EC7A3B0895A}\Control
    HKCR\CLSID\{A798E2B4-B6A0-4B96-8C53-8EC7A3B0895A}\Implemented Categories
    HKCR\CLSID\{A798E2B4-B6A0-4B96-8C53-8EC7A3B0895A}\Implemented Categories\{00021494-0000-0000-C000-000000000046}
    HKCR\CLSID\{A798E2B4-B6A0-4B96-8C53-8EC7A3B0895A}\InprocServer32
    HKCR\CLSID\{A798E2B4-B6A0-4B96-8C53-8EC7A3B0895A}\InprocServer32#ThreadingModel
    HKCR\CLSID\{A798E2B4-B6A0-4B96-8C53-8EC7A3B0895A}\ProgID
    HKCR\CLSID\{A798E2B4-B6A0-4B96-8C53-8EC7A3B0895A}\Programmable
    HKCR\CLSID\{A798E2B4-B6A0-4B96-8C53-8EC7A3B0895A}\TypeLib
    HKCR\CLSID\{A798E2B4-B6A0-4B96-8C53-8EC7A3B0895A}\Version
    HKCR\CLSID\{A798E2B4-B6A0-4B96-8C53-8EC7A3B0895A}\VersionIndependentProgID
    HKCR\ShprRprts.HbAx
    HKCR\ShprRprts.HbAx\CLSID
    HKCR\ShprRprts.HbAx\CurVer
    HKCR\ShprRprts.HbAx.1
    HKCR\ShprRprts.HbAx.1\CLSID
    HKCR\ShprRprts.HbInfoBand
    HKCR\ShprRprts.HbInfoBand\CLSID
    HKCR\ShprRprts.HbInfoBand\CurVer
    HKCR\ShprRprts.HbInfoBand.1
    HKCR\ShprRprts.HbInfoBand.1\CLSID
    HKCR\ShprRprts.IEButton
    HKCR\ShprRprts.IEButton\CLSID
    HKCR\ShprRprts.IEButton\CurVer
    HKCR\ShprRprts.IEButton.1
    HKCR\ShprRprts.IEButton.1\CLSID
    HKCR\ShprRprts.IEButtonA
    HKCR\ShprRprts.IEButtonA\CLSID
    HKCR\ShprRprts.IEButtonA\CurVer
    HKCR\ShprRprts.IEButtonA.1
    HKCR\ShprRprts.IEButtonA.1\CLSID
    HKCR\ShprRprts.SmrtShprCtl
    HKCR\ShprRprts.SmrtShprCtl\CLSID
    HKCR\ShprRprts.SmrtShprCtl\CurVer
    HKCR\ShprRprts.SmrtShprCtl.1
    HKCR\ShprRprts.SmrtShprCtl.1\CLSID

    Adware.VirtuMonde Variant
    HKCR\CLSID\{870B70D4-F6DA-47AE-9158-D146440A0A4D}
    HKCR\CLSID\{870B70D4-F6DA-47AE-9158-D146440A0A4D}#AppID
    HKCR\CLSID\{870B70D4-F6DA-47AE-9158-D146440A0A4D}\InprocServer32
    HKCR\CLSID\{870B70D4-F6DA-47AE-9158-D146440A0A4D}\InprocServer32#ThreadingModel
    HKCR\CLSID\{870B70D4-F6DA-47AE-9158-D146440A0A4D}\ProgID
    HKCR\CLSID\{870B70D4-F6DA-47AE-9158-D146440A0A4D}\Programmable
    HKCR\CLSID\{870B70D4-F6DA-47AE-9158-D146440A0A4D}\TypeLib
    HKCR\CLSID\{870B70D4-F6DA-47AE-9158-D146440A0A4D}\VersionIndependentProgID

    Adware.Starware
    HKCR\CLSID\{2D51D869-C36B-42BD-AE68-0A81BC771FA5}
    HKCR\CLSID\{2D51D869-C36B-42BD-AE68-0A81BC771FA5}\Implemented Categories
    HKCR\CLSID\{2D51D869-C36B-42BD-AE68-0A81BC771FA5}\Implemented Categories\{00021494-0000-0000-C000-000000000046}
    HKCR\CLSID\{2D51D869-C36B-42BD-AE68-0A81BC771FA5}\InprocServer32
    HKCR\CLSID\{2D51D869-C36B-42BD-AE68-0A81BC771FA5}\InprocServer32#ThreadingModel
    HKCR\CLSID\{7BED0340-176B-44BC-915E-C21C1DD6F617}
    HKCR\CLSID\{7BED0340-176B-44BC-915E-C21C1DD6F617}\Implemented Categories
    HKCR\CLSID\{7BED0340-176B-44BC-915E-C21C1DD6F617}\Implemented Categories\{00021493-0000-0000-C000-000000000046}
    HKCR\CLSID\{7BED0340-176B-44BC-915E-C21C1DD6F617}\InprocServer32
    HKCR\CLSID\{7BED0340-176B-44BC-915E-C21C1DD6F617}\InprocServer32#ThreadingModel
    HKCR\CLSID\{CA356D79-679B-4B4C-8E49-5AF97014F4C1}
    HKCR\CLSID\{CA356D79-679B-4B4C-8E49-5AF97014F4C1}\InprocServer32
    HKCR\CLSID\{CA356D79-679B-4B4C-8E49-5AF97014F4C1}\InprocServer32#ThreadingModel
    HKCR\CLSID\{D49E9D35-254C-4C6A-9D17-95018D228FF5}
    HKCR\CLSID\{D49E9D35-254C-4C6A-9D17-95018D228FF5}\InprocServer32
    HKCR\CLSID\{D49E9D35-254C-4C6A-9D17-95018D228FF5}\InprocServer32#ThreadingModel
    C:\Program Files\Starware\bin
    C:\Program Files\Starware\brand.bmp
    C:\Program Files\Starware\icons\star_16.ico
    C:\Program Files\Starware\icons
    C:\Program Files\Starware\StarwareConfig.xml
    C:\Program Files\Starware\StarwareUninstall.exe
    C:\Program Files\Starware

    Unclassified.Unknown Origin
    HKCR\CLSID\{B3E19860-0CD5-4991-A066-4FCA2704DE59}
    HKCR\CLSID\{B3E19860-0CD5-4991-A066-4FCA2704DE59}#AppID
    HKCR\CLSID\{B3E19860-0CD5-4991-A066-4FCA2704DE59}\InprocServer32
    HKCR\CLSID\{B3E19860-0CD5-4991-A066-4FCA2704DE59}\InprocServer32#ThreadingModel
    HKCR\CLSID\{B3E19860-0CD5-4991-A066-4FCA2704DE59}\ProgID
    HKCR\CLSID\{B3E19860-0CD5-4991-A066-4FCA2704DE59}\Programmable
    HKCR\CLSID\{B3E19860-0CD5-4991-A066-4FCA2704DE59}\TypeLib
    HKCR\CLSID\{B3E19860-0CD5-4991-A066-4FCA2704DE59}\VersionIndependentProgID

    Adware.MovieLand/MediaPipe
    HKCR\MPAgent.Agent
    HKCR\MPAgent.Agent\CLSID
    HKCR\MPAgent.Agent\CurVer
    HKCR\MPAgent.Agent.1
    HKCR\MPAgent.Agent.1\CLSID
    HKCR\AppId\AMNotifier.EXE
    HKCR\AppId\AMNotifier.EXE#AppID
    HKCR\AppId\MPAgent.DLL
    HKCR\AppId\MPAgent.DLL#AppID
    HKCR\AMNotifier.HUBAWindow
    HKCR\AMNotifier.HUBAWindow\CLSID
    HKCR\AMNotifier.HUBAWindow\CurVer
    HKCR\AMNotifier.HUBAWindow.1
    HKCR\AMNotifier.HUBAWindow.1\CLSID
    HKCR\CLSID\{7BF58804-E672-4B96-8EEC-BFCCE6492C9A}
    HKCR\CLSID\{7BF58804-E672-4B96-8EEC-BFCCE6492C9A}#AppID
    HKCR\CLSID\{7BF58804-E672-4B96-8EEC-BFCCE6492C9A}\LocalServer32
    HKCR\CLSID\{7BF58804-E672-4B96-8EEC-BFCCE6492C9A}\ProgID
    HKCR\CLSID\{7BF58804-E672-4B96-8EEC-BFCCE6492C9A}\Programmable
    HKCR\CLSID\{7BF58804-E672-4B96-8EEC-BFCCE6492C9A}\TypeLib
    HKCR\CLSID\{7BF58804-E672-4B96-8EEC-BFCCE6492C9A}\VersionIndependentProgID
    HKCR\TypeLib\{AFDBB222-DEA9-4C12-B3A3-A13C2985E3EE}
    HKCR\TypeLib\{AFDBB222-DEA9-4C12-B3A3-A13C2985E3EE}\1.0
    HKCR\TypeLib\{AFDBB222-DEA9-4C12-B3A3-A13C2985E3EE}\1.0\0
    HKCR\TypeLib\{AFDBB222-DEA9-4C12-B3A3-A13C2985E3EE}\1.0\0\win32
    HKCR\TypeLib\{AFDBB222-DEA9-4C12-B3A3-A13C2985E3EE}\1.0\FLAGS
    HKCR\TypeLib\{AFDBB222-DEA9-4C12-B3A3-A13C2985E3EE}\1.0\HELPDIR
    HKCR\TypeLib\{CCEBBEB5-D011-41B5-9F92-01F88A38DC0D}
    HKCR\TypeLib\{CCEBBEB5-D011-41B5-9F92-01F88A38DC0D}\1.0
    HKCR\TypeLib\{CCEBBEB5-D011-41B5-9F92-01F88A38DC0D}\1.0\0
    HKCR\TypeLib\{CCEBBEB5-D011-41B5-9F92-01F88A38DC0D}\1.0\0\win32
    HKCR\TypeLib\{CCEBBEB5-D011-41B5-9F92-01F88A38DC0D}\1.0\FLAGS
    HKCR\TypeLib\{CCEBBEB5-D011-41B5-9F92-01F88A38DC0D}\1.0\HELPDIR
    C:\Program Files\moviepass Terms.html

    Trojan.WinAntiSpyware/WinAntiVirus 2006/2007
    HKCR\WAP6.PCheck
    HKCR\WAP6.PCheck\CLSID
    HKCR\WAP6.PCheck\CurVer
    HKCR\WAP6.PCheck.1
    HKCR\WAP6.PCheck.1\CLSID
    HKCR\CLSID\{B2A3156E-3332-4b47-AF5A-5B121503514F}
    HKCR\CLSID\{B2A3156E-3332-4b47-AF5A-5B121503514F}\Implemented Categories
    HKCR\CLSID\{B2A3156E-3332-4b47-AF5A-5B121503514F}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}
    HKCR\CLSID\{B2A3156E-3332-4b47-AF5A-5B121503514F}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}
    HKCR\CLSID\{B2A3156E-3332-4b47-AF5A-5B121503514F}\InprocServer32
    HKCR\CLSID\{B2A3156E-3332-4b47-AF5A-5B121503514F}\InprocServer32#ThreadingModel
    HKCR\CLSID\{B2A3156E-3332-4b47-AF5A-5B121503514F}\ProgID
    HKCR\CLSID\{B2A3156E-3332-4b47-AF5A-5B121503514F}\Programmable
    HKCR\CLSID\{B2A3156E-3332-4b47-AF5A-5B121503514F}\VersionIndependentProgID
    HKCR\TypeLib\{1234890A-5E6E-4867-8136-CA6F1456B235}
    HKCR\TypeLib\{1234890A-5E6E-4867-8136-CA6F1456B235}\1.0
    HKCR\TypeLib\{1234890A-5E6E-4867-8136-CA6F1456B235}\1.0\0
    HKCR\TypeLib\{1234890A-5E6E-4867-8136-CA6F1456B235}\1.0\0\win32
    HKCR\TypeLib\{1234890A-5E6E-4867-8136-CA6F1456B235}\1.0\FLAGS
    HKCR\TypeLib\{1234890A-5E6E-4867-8136-CA6F1456B235}\1.0\HELPDIR
    HKCR\Interface\{E18B69D0-7E9E-4C6E-BDD8-879A1FFF7123}
    HKCR\Interface\{E18B69D0-7E9E-4C6E-BDD8-879A1FFF7123}\ProxyStubClsid
    HKCR\Interface\{E18B69D0-7E9E-4C6E-BDD8-879A1FFF7123}\ProxyStubClsid32
    HKCR\Interface\{E18B69D0-7E9E-4C6E-BDD8-879A1FFF7123}\TypeLib
    HKCR\Interface\{E18B69D0-7E9E-4C6E-BDD8-879A1FFF7123}\TypeLib#Version
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF#NextInstance
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF\0000
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF\0000#Service
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF\0000#Legacy
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF\0000#ConfigFlags
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF\0000#Class
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF\0000#ClassGUID
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF\0000#DeviceDesc
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF\0000#Capabilities
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF\0000\Control
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF_HK
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF_HK#NextInstance
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF_HK\0000
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF_HK\0000#Service
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF_HK\0000#Legacy
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF_HK\0000#ConfigFlags
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF_HK\0000#Class
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF_HK\0000#ClassGUID
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF_HK\0000#DeviceDesc
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF_HK\0000#
     
  8. sonic16

    sonic16 Thread Starter

    Joined:
    Jan 29, 2007
    Messages:
    7
    Capabilities
    HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VSPF_HK\0000\Control
    HKLM\SYSTEM\CurrentControlSet\Services\vspf
    HKLM\SYSTEM\CurrentControlSet\Services\vspf#Type
    HKLM\SYSTEM\CurrentControlSet\Services\vspf#Start
    HKLM\SYSTEM\CurrentControlSet\Services\vspf#ErrorControl
    HKLM\SYSTEM\CurrentControlSet\Services\vspf#Tag
    HKLM\SYSTEM\CurrentControlSet\Services\vspf#ImagePath
    HKLM\SYSTEM\CurrentControlSet\Services\vspf#DisplayName
    HKLM\SYSTEM\CurrentControlSet\Services\vspf#Group
    HKLM\SYSTEM\CurrentControlSet\Services\vspf#DependOnService
    HKLM\SYSTEM\CurrentControlSet\Services\vspf#DependOnGroup
    HKLM\SYSTEM\CurrentControlSet\Services\vspf\Security
    HKLM\SYSTEM\CurrentControlSet\Services\vspf\Security#Security
    HKLM\SYSTEM\CurrentControlSet\Services\vspf\Enum
    HKLM\SYSTEM\CurrentControlSet\Services\vspf\Enum#0
    HKLM\SYSTEM\CurrentControlSet\Services\vspf\Enum#Count
    HKLM\SYSTEM\CurrentControlSet\Services\vspf\Enum#NextInstance
    HKLM\SYSTEM\CurrentControlSet\Services\vspf\Enum#INITSTARTFAILED
    HKLM\SYSTEM\CurrentControlSet\Services\vspf_hk
    HKLM\SYSTEM\CurrentControlSet\Services\vspf_hk#Type
    HKLM\SYSTEM\CurrentControlSet\Services\vspf_hk#Start
    HKLM\SYSTEM\CurrentControlSet\Services\vspf_hk#ErrorControl
    HKLM\SYSTEM\CurrentControlSet\Services\vspf_hk#Tag
    HKLM\SYSTEM\CurrentControlSet\Services\vspf_hk#ImagePath
    HKLM\SYSTEM\CurrentControlSet\Services\vspf_hk#DisplayName
    HKLM\SYSTEM\CurrentControlSet\Services\vspf_hk#Group
    HKLM\SYSTEM\CurrentControlSet\Services\vspf_hk\Security
    HKLM\SYSTEM\CurrentControlSet\Services\vspf_hk\Security#Security
    HKLM\SYSTEM\CurrentControlSet\Services\vspf_hk\Enum
    HKLM\SYSTEM\CurrentControlSet\Services\vspf_hk\Enum#0
    HKLM\SYSTEM\CurrentControlSet\Services\vspf_hk\Enum#Count
    HKLM\SYSTEM\CurrentControlSet\Services\vspf_hk\Enum#NextInstance
    HKLM\SYSTEM\CurrentControlSet\Services\vspf_hk\Enum#INITSTARTFAILED
    HKU\S-1-5-21-1775986737-1343696441-3242701025-1012\Software\WinAntiVirus Pro 2007
    C:\WINDOWS\system32\stera.job
    C:\Program Files\Common Files\WinAntiVirus Pro 2007\err.log
    C:\Program Files\Common Files\WinAntiVirus Pro 2007\uwa7pcw.exe
    C:\Program Files\Common Files\WinAntiVirus Pro 2007\WAPChk.dll
    C:\Program Files\Common Files\WinAntiVirus Pro 2007
    C:\Documents and Settings\Sandi\Application Data\WinAntiVirus Pro 2007\Logs\update.log
    C:\Documents and Settings\Sandi\Application Data\WinAntiVirus Pro 2007\Logs\wa6Support.log
    C:\Documents and Settings\Sandi\Application Data\WinAntiVirus Pro 2007\Logs\winav.log
    C:\Documents and Settings\Sandi\Application Data\WinAntiVirus Pro 2007\Logs
    C:\Documents and Settings\Sandi\Application Data\WinAntiVirus Pro 2007\PGE.dat
    C:\Documents and Settings\Sandi\Application Data\WinAntiVirus Pro 2007
    \WA7P\Quar
    \WA7P
    C:\WINDOWS\Prefetch\UWA7PCW.EXE-08941290.pf

    Trojan.WinFixer 2006
    HKCR\UWFX6PCheck.UWFX6PCheck.1
    HKCR\UWFX6PCheck.UWFX6PCheck.1\CLSID
    C:\Program Files\Common Files\WinFixer 2006
    C:\Program Files\WinFixer_2006
    C:\WINDOWS\system32\drivers\d_kmd.sys

    Adware.MyWay
    HKCR\MyWayToolBar.SettingsPlugin
    HKCR\MyWayToolBar.SettingsPlugin\CLSID
    HKCR\MyWayToolBar.SettingsPlugin\CurVer
    HKCR\MyWayToolBar.SettingsPlugin.1
    HKCR\MyWayToolBar.SettingsPlugin.1\CLSID
    HKCR\CLSID\{014DA6CD-189F-421a-88CD-07CFE51CFF10}
    HKCR\CLSID\{014DA6CD-189F-421a-88CD-07CFE51CFF10}\InProcServer32
    HKCR\TypeLib\{0494D0D0-F8E0-41AD-92A3-14154ECE70AC}
    HKCR\TypeLib\{0494D0D0-F8E0-41AD-92A3-14154ECE70AC}\1.0
    HKCR\TypeLib\{0494D0D0-F8E0-41AD-92A3-14154ECE70AC}\1.0\0
    HKCR\TypeLib\{0494D0D0-F8E0-41AD-92A3-14154ECE70AC}\1.0\0\win32
    HKCR\TypeLib\{0494D0D0-F8E0-41AD-92A3-14154ECE70AC}\1.0\FLAGS
    HKCR\TypeLib\{0494D0D0-F8E0-41AD-92A3-14154ECE70AC}\1.0\HELPDIR
    HKLM\Software\MyWay
    HKLM\Software\MyWay\myBar
    HKLM\Software\MyWay\myBar#Dir
    HKLM\Software\MyWay\myBar#ShzmCurInstall
    HKLM\Software\MyWay\myBar#pid
    HKLM\Software\MyWay\myBar#strings
    HKLM\Software\MyWay\myBar#CurInstall
    HKLM\Software\MyWay\myBar#sr
    HKLM\Software\MyWay\myBar#Id
    HKLM\Software\MyWay\myBar#Build
    HKLM\Software\MyWay\myBar#CacheDir
    HKLM\Software\MyWay\myBar#HistoryDir
    HKLM\Software\MyWay\myBar#Visible
    HKLM\Software\MyWay\myBar#Maximized
    HKLM\Software\MyWay\myBar#SettingsDir
    HKLM\Software\MyWay\myBar#ConfigRevision
    HKLM\Software\MyWay\myBar#ConfigRevisionURL
    HKLM\Software\MyWay\myBar#ConfigDateStamp
    HKLM\Software\MyWay\myBar#pl
    HKLM\Software\MyWay\myBar\partner
    HKLM\Software\MyWay\myBar\partner#bitmap
    HKLM\Software\MyWay\myBar\partner#name
    HKLM\Software\MyWay\myBar\partner#test
    HKLM\Software\MyWay\myBar\partner#PM-Home
    HKLM\Software\MyWay\myBar\partner#PM-Points
    HKLM\Software\MyWay\myBar\partner#PM-Redeem
    HKLM\Software\MyWay\myBar\partner#PM-Wallet
    HKLM\Software\MyWay\myBar\partner#PM-Settings
    C:\Program Files\MyWay\myBar\1.bin
    C:\Program Files\MyWay\myBar\Cache\00019F77.bin
    C:\Program Files\MyWay\myBar\Cache\00019FE4.bin
    C:\Program Files\MyWay\myBar\Cache\0001A071.bin
    C:\Program Files\MyWay\myBar\Cache\002777B2
    C:\Program Files\MyWay\myBar\Cache\003707A5.bmp
    C:\Program Files\MyWay\myBar\Cache\0037162C.bmp
    C:\Program Files\MyWay\myBar\Cache\003FBFC3.bmp
    C:\Program Files\MyWay\myBar\Cache\files.ini
    C:\Program Files\MyWay\myBar\Cache
    C:\Program Files\MyWay\myBar\History\search
    C:\Program Files\MyWay\myBar\History
    C:\Program Files\MyWay\myBar\Settings\prevcfg.htm
    C:\Program Files\MyWay\myBar\Settings
    C:\Program Files\MyWay\myBar
    C:\Program Files\MyWay

    Malware.SystemDoctor
    HKLM\Software\SystemDoctor 2006 Free
    HKLM\Software\SystemDoctor 2006 Free#ProductCode

    Trojan.Media-Codec
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Alert Popup
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Alert Popup#DisplayName
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Alert Popup#UninstallString
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\explorer\run#none [ C:\Program Files\Video ActiveX Object\pmsngr.exe ]

    Trojan.WinAntiSpyware/WinAntiVirus 2006
    C:\DOCUMENTS AND SETTINGS\LEE\APPLICATION DATA\WINANTIVIRUSPRO2007FREEINSTALL[1].EXE

    Browser Hijacker.Favorites
    C:\DOCUMENTS AND SETTINGS\SCOTT\FAVORITES\ANTIVIRUS TEST ONLINE.URL

    Trojan.SpyFalcon
    C:\DOCUMENTS AND SETTINGS\SCOTT\LOCAL SETTINGS\TEMP\SFLANGUAGE.INI
    C:\WINDOWS\TEMP\SFLANGUAGE.INI

    Adware.CamNotifier
    C:\DOCUMENTS AND SETTINGS\SCOTT\LOCAL SETTINGS\TEMP\UPD187.TMP
    So Long. Sorry.
     
  9. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    IE - Block Third party cookies
    1. Click on the Tools button on the Internet Explorer tool bar.
    2. Highlight and click on Internet options at the bottom of the Tools menu.
    3. Select the Privacy Tab of the Internet Options menu.
    4. Select the Advanced... button at the bottom of the screen.
    5. Select override automatic cookie handling button.
    6. To block third party cookies select block under "Third-party cookies".
    7. Select "always allow session cookies".
    8. Click on the OK button at the bottom of the screen.
    =======================

    You may want to print this or save it to notepad as we will go to safe mode.

    Fix these with HiJackThis – mark them, close IE, click fix checked

    O3 - Toolbar: (no name) - {07B18EA9-A523-4961-B6BB-170DE4475CCA} - (no file)

    O3 - Toolbar: (no name) - {4D1C4E89-A32A-416b-BCDB-33B3EF3617D3} - (no file)

    O3 - Toolbar: (no name) - {D49E9D35-254C-4c6a-9D17-95018D228FF5} - (no file)

    O4 - HKLM\..\Run: [keysvr] C:\WINDOWS\addins\keysvr.exe

    O4 - HKLM\..\Run: [*keysvr] C:\WINDOWS\addins\keysvr.exe

    O4 - HKLM\..\Run: [*explib] C:\WINDOWS\repair\explib.exe

    O4 - HKLM\..\Run: [dlllog] C:\WINDOWS\Driver Cache\dlllog.exe

    O4 - HKLM\..\Run: [*doshard] C:\WINDOWS\Config\doshard.exe

    O4 - HKLM\..\Run: [odbcftp] C:\WINDOWS\repair\odbcftp.exe

    O4 - HKLM\..\Run: [*avkb] C:\WINDOWS\addins\avkb.exe

    O9 - Extra button: ShopperReports - Compare product prices - {946B3E9E-E21A-49c8-9F63-900533FAFE14} - C:\Program Files\ShopperReports\Bin\2.0.0\ShprRprt.dll (file missing)

    O9 - Extra button: ShopperReports - Compare travel rates - {946B3E9E-E21A-49c8-9F63-900533FAFE15} - C:\Program Files\ShopperReports\Bin\2.0.0\ShprRprt.dll (file missing)

    O18 - Filter: text/html - {2AB289AE-4B90-4281-B2AE-1F4BB034B647} - (no file)

    DownLoad http://www.downloads.subratam.org/KillBox.zip or
    http://www.thespykiller.co.uk/files/killbox.exe

    Restart your computer into safe mode now. (Tapping F8 at the first black screen) Perform the following steps in safe mode:

    Double-click on Killbox.exe to run it. Now put a tick by Standard File Kill. In the "Full Path of File to Delete" box, copy and paste each of the following lines one at a time then click on the button that has the red circle with the X in the middle after you enter each file. It will ask for confimation to delete the file. Click Yes. Continue with that same procedure until you have copied and pasted all of these in the "Paste Full Path of File to Delete" box.

    C:\WINDOWS\addins
    C:\WINDOWS\Driver Cache\dlllog.exe
    C:\WINDOWS\Config\doshard.exe
    C:\WINDOWS\repair

    Note: It is possible that Killbox will tell you that one or more files do not exist. If that happens, just continue on with all the files. Be sure you don't miss any.

    START – RUN – type in %temp% - OK - Edit – Select all – File – Delete

    Delete everything in the C:\Windows\Temp folder or C:\WINNT\temp

    Not all temp files will delete and that is normal
    Empty the recycle bin
    Boot and post a new hijack log from normal NOT safe mode

    Please give feedback on what worked/didn’t work and the current status of your system
     
  10. sonic16

    sonic16 Thread Starter

    Joined:
    Jan 29, 2007
    Messages:
    7
    Everything worked and my computer is as goos as new. Thank you much!:)
     
  11. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Sonic - do this

    Please download http://www.atribune.org/ccount/click.php?id=4 to C:\
    Double-click VundoFix.exe to run it.
    click the Scan for Vundo button.
    Once it's done scanning, click the Remove Vundo button.
    You will receive a prompt asking if you want to remove the files, click YES.
    Once you click yes, your desktop will go blank as it starts removing Vundo.
    When completed, it will prompt that it will shutdown your computer, click OK.
    Turn your computer back on.
    Please post the contents of C:\vundofix.txt and a new HijackThis log.
    Note: It is possible that VundoFix encountered a file it could not remove. In this case, VundoFix will run on reboot, simply follow the above instructions starting from "Click the Scan for Vundo button" when VundoFix appears at reboot.
     
  12. sonic16

    sonic16 Thread Starter

    Joined:
    Jan 29, 2007
    Messages:
    7
    Beginning removal...

    Beginning removal...

    Beginning removal...

    Big problems. When computer boots up error message: Drive 0 primary paralell EIDE controller operating outside of normal specifications. Run Vundo fix did not remove when asked to.
    Here is log
    VundoFix V6.3.5

    Checking Java version...

    Java version is 1.5.0.3

    Java version is 1.5.0.8

    Scan started at 7:15:55 PM 31/01/2007

    Listing files found while scanning....

    No infected files were found.


    Beginning removal...
    Here is new hijack this log:
    Logfile of HijackThis v1.99.1
    Scan saved at 7:30:36 PM, on 31/01/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.5730.0011)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Common Files\McAfee\HackerWatch\HWAPI.exe
    C:\PROGRA~1\McAfee\MSC\mclogsrv.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\WINDOWS\system32\hkcmd.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\Java\jre1.5.0_08\bin\jusched.exe
    C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
    C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb04.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe
    C:\Program Files\802.11 Wireless LAN\802.11g Wireless Cardbus & PCI Adapter HW.51 V1.00\WlanCU.exe
    C:\PROGRA~1\McAfee\MSC\mcupdmgr.exe
    c:\program files\common files\mcafee\mna\mcnasvc.exe
    C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
    C:\PROGRA~1\McAfee\MSC\mcpromgr.exe
    c:\PROGRA~1\COMMON~1\mcafee\redirsvc\redirsvc.exe
    C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
    C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
    C:\PROGRA~1\McAfee\MSC\mctskshd.exe
    C:\PROGRA~1\McAfee\MSC\mcusrmgr.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\Program Files\McAfee\MPF\MPFSrv.exe
    C:\WINDOWS\System32\svchost.exe
    c:\PROGRA~1\mcafee.com\agent\mcagent.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Java\jre1.5.0_08\bin\jucheck.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Hijackthis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://g.msn.com/8SEENUS020100/FRWCompleteAddIns
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = http://localhost;
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_08\bin\ssv.dll
    O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - c:\program files\mcafee\virusscan\scriptcl.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar3.dll
    O3 - Toolbar: (no name) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar3.dll
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [SpySpotter System Defender] C:\Program Files\SpySpotter3\Defender.exe -startup
    O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.5.0_08\bin\jusched.exe"
    O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
    O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb04.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe
    O4 - Global Startup: Wireless Configuration Utility HW.51.lnk = C:\Program Files\802.11 Wireless LAN\802.11g Wireless Cardbus & PCI Adapter HW.51 V1.00\WlanCU.exe
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: ShopperReports - Compare product prices - {946B3E9E-E21A-49c8-9F63-900533FAFE14} - C:\WINDOWS\System32\shdocvw.dll
    O9 - Extra button: ShopperReports - Compare travel rates - {946B3E9E-E21A-49c8-9F63-900533FAFE15} - C:\WINDOWS\System32\shdocvw.dll
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O11 - Options group: [INTERNATIONAL] International*
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
    O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
    O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
    O23 - Service: McAfee E-mail Proxy (Emproxy) - McAfee, Inc. - C:\PROGRA~1\COMMON~1\McAfee\EmProxy\emproxy.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: McAfee HackerWatch Service - McAfee, Inc. - C:\Program Files\Common Files\McAfee\HackerWatch\HWAPI.exe
    O23 - Service: McAfee Log Manager (McLogManagerService) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mclogsrv.exe
    O23 - Service: McAfee Update Manager (mcmispupdmgr) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcupdmgr.exe
    O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\program files\common files\mcafee\mna\mcnasvc.exe
    O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
    O23 - Service: McAfee Protection Manager (mcpromgr) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcpromgr.exe
    O23 - Service: McAfee Redirector Service (McRedirector) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\redirsvc\redirsvc.exe
    O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
    O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
    O23 - Service: McAfee Task Scheduler (mctskshd.exe) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mctskshd.exe
    O23 - Service: McAfee User Manager (mcusrmgr) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcusrmgr.exe
    O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe
     
  13. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    OK just wanted to make sure

    Sounds as if your HD is getting ready to die - back up critical data!
     
  14. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/539424

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice