1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Help

Discussion in 'Virus & Other Malware Removal' started by Alvin68, Aug 10, 2006.

Thread Status:
Not open for further replies.
Advertisement
  1. Alvin68

    Alvin68 Thread Starter

    Joined:
    Aug 10, 2006
    Messages:
    10
    Hi all, I went into services the otherday and tweaked my machine for the first time. Today I noticed when I booted up that alot of my settings where reset. I was wondering if I have somekind of virus and xp just took matters into its own hands,lol. Here is my Hijackthis log. Also I can't seem to get rid of the imesh toolbar, I accidently deleted the file and now I can't remove it from Add/Remove programs. Accually looking at the Add/remove programs, it seems my machine was rolled back, because alot of stuff I remove have now returned :(. Thanks for any help.

    Logfile of HijackThis v1.99.1
    Scan saved at 1:43:24 PM, on 8/10/2006
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    F:\WINDOWS\System32\smss.exe
    F:\WINDOWS\system32\winlogon.exe
    F:\WINDOWS\system32\services.exe
    F:\WINDOWS\system32\lsass.exe
    F:\WINDOWS\system32\svchost.exe
    F:\WINDOWS\System32\svchost.exe
    F:\WINDOWS\system32\spoolsv.exe
    F:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    F:\WINDOWS\system32\nvsvc32.exe
    F:\WINDOWS\system32\svchost.exe
    F:\WINDOWS\system32\ZoneLabs\vsmon.exe
    F:\WINDOWS\Explorer.EXE
    F:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
    F:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
    F:\Program Files\Messenger\msmsgs.exe
    F:\Documents and Settings\Al\Desktop\hijackthis\HijackThis.exe
    F:\Program Files\Lavasoft\Ad-Aware SE Personal\Ad-Aware.exe
    F:\WINDOWS\system32\wuauclt.exe
    F:\Program Files\Adobe\Acrobat 5.0\Reader\AcroRd32.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr7/*http://www.yahoo.com/ext/search/search.html
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr7/*http://www.yahoo.com
    N3 - Netscape 7: user_pref("browser.search.defaultengine", "engine://F%3A%5CProgram%20Files%5CNetscape%5CNetscape%5Csearchplugins%5CSBWeb_01.src"); (F:\Documents and Settings\Al\Application Data\Mozilla\Profiles\default\j64ojzny.slt\prefs.js)
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - F:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O2 - BHO: (no name) - {1da7dbe8-c51b-4ae4-bc6e-21863349b0b4} - F:\Program Files\IntCodec\isaddon.dll (file missing)
    O2 - BHO: iMeshBar BHO - {5345A7A1-805A-4923-B505-86B2FEBA3FE0} - F:\Program Files\iMeshBar\bar\1.bin\IMESHBAR.DLL (file missing)
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - F:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O3 - Toolbar: iMeshBar - {5345A7A9-805A-4923-B505-86B2FEBA3FE0} - F:\Program Files\iMeshBar\bar\1.bin\IMESHBAR.DLL (file missing)
    O4 - HKLM\..\Run: [UpdReg] F:\WINDOWS\UpdReg.EXE
    O4 - HKLM\..\Run: [Jet Detection] "F:\Program Files\Creative\SBAudigy\PROGRAM\ADGJDet.exe"
    O4 - HKLM\..\Run: [CTStartup] F:\Program Files\Creative\Splash Screen\CTEaxSpl.EXE /run
    O4 - HKLM\..\Run: [Lexmark X1100 Series] "F:\Program Files\Lexmark X1100 Series\lxbkbmgr.exe"
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE F:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE F:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
    O4 - HKLM\..\Run: [SunJavaUpdateSched] F:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
    O4 - HKLM\..\Run: [NeroFilterCheck] F:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [QuickTime Task] "F:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [Zone Labs Client] F:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
    O4 - HKCU\..\Run: [MSMSGS] "F:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [MsnMsgr] "F:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
    O4 - Global Startup: Adobe Gamma Loader.lnk = F:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Microsoft Office.lnk = F:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://F:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - F:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - F:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
    O12 - Plugin for .spop: F:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=48835
    O16 - DPF: {2B323CD9-50E3-11D3-9466-00A0C9700498} - http://us.chat1.yimg.com/us.yimg.com/i/chat/applet/v45/yacscom.cab
    O16 - DPF: {4E010EB6-E1D4-4CD6-A506-E5DC564586DB} - http://activex.microsoft.com/objects/ocget.dll
    O16 - DPF: {7D1E9C49-BD6A-11D3-87A8-009027A35D73} - http://chat.yahoo.com/cab/yacsui.cab
    O16 - DPF: {AAF15A90-F3EC-4FEE-9A00-F65B25B83D05} - http://activex.microsoft.com/objects/ocget.dll
    O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
    O16 - DPF: {CFCDAA03-8BE4-11CF-B84B-0020AFBBCCFA} (RealPlayer G2 Control) - http://activex.microsoft.com/objects/ocget.dll
    O16 - DPF: {D18F962A-3722-4B59-B08D-28BB9EB2281E} - http://activex.microsoft.com/objects/ocget.dll
    O16 - DPF: {FDC7A535-4070-4B92-A0EA-D9994BCC0DC5} - http://activex.microsoft.com/objects/ocget.dll
    O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - F:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "F:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - F:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - F:\WINDOWS\system32\LEXBCES.EXE
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - F:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - F:\WINDOWS\system32\ZoneLabs\vsmon.exe
     
  2. Cookiegal

    Cookiegal Administrator Malware Specialist Coordinator

    Joined:
    Aug 27, 2003
    Messages:
    112,042
    Hi and welcome to TSG,

    Please download SmitfraudFix (by S!Ri)

    Extract (unzip) the content (a folder named SmitfraudFix) to your Desktop. This is imperative for the tool to function properly. If using a utility such as winzip you will have to direct it there as it will not unzip to the desktop by default. The desination location should look like this (C: being your primary drive): C:\Documents and Settings\User\Desktop\SmitfraudFix

    Open the SmitfraudFix folder and double-click smitfraudfix.cmd
    Select option #1 - Search by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present).
    Please copy/paste the content of that report into your next reply.

    Note : process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
    http://www.beyondlogic.org/consulting/proc...processutil.htm
     
  3. Alvin68

    Alvin68 Thread Starter

    Joined:
    Aug 10, 2006
    Messages:
    10
    Thank you, here is the smitfraudfix file
    My hard drive is F: btw, thanks again

    SmitFraudFix v2.81

    Scan done at 15:41:27.26, Thu 08/10/2006
    Run from F:\Documents and Settings\Al\Desktop\SmitfraudFix\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    Fix ran in normal mode

    »»»»»»»»»»»»»»»»»»»»»»»» F:\


    »»»»»»»»»»»»»»»»»»»»»»»» F:\WINDOWS


    »»»»»»»»»»»»»»»»»»»»»»»» F:\WINDOWS\system


    »»»»»»»»»»»»»»»»»»»»»»»» F:\WINDOWS\Web


    »»»»»»»»»»»»»»»»»»»»»»»» F:\WINDOWS\system32


    »»»»»»»»»»»»»»»»»»»»»»»» F:\WINDOWS\system32\LogFiles


    »»»»»»»»»»»»»»»»»»»»»»»» F:\Documents and Settings\Al\Application Data


    »»»»»»»»»»»»»»»»»»»»»»»» Start Menu


    »»»»»»»»»»»»»»»»»»»»»»»» F:\DOCUME~1\Al\FAVORI~1


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop


    »»»»»»»»»»»»»»»»»»»»»»»» F:\Program Files


    »»»»»»»»»»»»»»»»»»»»»»»» Corrupted keys


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop Components

    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
    "Source"="About:Home"
    "SubscribedURL"="About:Home"
    "FriendlyName"="My Current Home Page"


    »»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    »»»»»»»»»»»»»»»»»»»»»»»» Scanning wininet.dll infection


    »»»»»»»»»»»»»»»»»»»»»»»» End
     
  4. Cookiegal

    Cookiegal Administrator Malware Specialist Coordinator

    Joined:
    Aug 27, 2003
    Messages:
    112,042
    Download the trial version of Ewido Anti-spyware from HERE and save that file to your desktop. When the trial period expires it becomes freeware with reduced functions but still worth keeping.



    • Once you have downloaded Ewido Anti-spyware, locate the icon on the desktop and double-click it to launch the set up program.
    • Once the setup is complete you will need run Ewido and update the definition files.
    • On the main screen select the icon "Update" then select the "Update now" link.
    • Next select the "Start Update" button, the update will start and a progress bar will show the updates being installed.
    • Once the update has completed select the "Scanner" icon at the top of the screen, then select the "Settings" tab.
    • Once in the Settings screen click on "Recommended actions" and then select "Quarantine"
    • Under "Reports"
    • Select "Automatically generate report after every scan"
    • Un-Select "Only if threats were found"

    Close Ewido Anti-spyware, Do NOT run a scan yet. We will do that later in safe mode.


    • Reboot your computer into Safe Mode now. You can do this by restarting your computer and continually tapping the F8 key until a menu appears. Use your up arrow key to highlight Safe Mode then hit enter.
      IMPORTANT: Do not open any other windows or programs while Ewido is scanning as it may interfere with the scanning process:
    • Launch Ewido Anti-spyware by double-clicking the icon on your desktop.
    • Select the "Scanner" icon at the top and then the "Scan" tab then click on "Complete System Scan".
    • Ewido will now begin the scanning process. Be patient this may take a little time.
      Once the scan is complete do the following:
    • If you have any infections you will prompted, then select "Apply all actions"
    • Next select the "Reports" icon at the top.
    • Select the "Save report as" button in the lower left hand of the screen and save it to a text file on your system (make sure to remember where you saved that file, this is important).
    • Close Ewido and reboot your system back into Normal Mode.


    Please go HERE to run Panda's ActiveScan
    • Once you are on the Panda site click the Scan your PC button
    • A new window will open...click the Check Now button
    • Enter your Country
    • Enter your State/Province
    • Enter your e-mail address and click send
    • Select either Home User or Company
    • Click the big Scan Now button
    • If it wants to install an ActiveX component allow it
    • It will start downloading the files it requires for the scan (Note: It may take a couple of minutes)
    • When download is complete, click on My Computer to start the scan
    • When the scan completes, if anything malicious is detected, click the See Report button, then Save Report and save it to a convenient location. Post the contents of the ActiveScan report


    Come back here and post a new HijackThis log along with the logs from the Ewido and Panda scans.
     
  5. Alvin68

    Alvin68 Thread Starter

    Joined:
    Aug 10, 2006
    Messages:
    10
    After a couple of hours of scanning, I am definately infected, here are all the logs you requested. Thanks again.

    ACTIVESCAN LOG!

    Incident Status Location

    Adware:adware/ist.istbar Not disinfected Windows Registry
    Spyware:Cookie/bravenetA Not disinfected F:\Documents and Settings\Al\Application Data\Mozilla\Profiles\default\j64ojzny.slt\cookies.txt[.bravenet.com/]
    Spyware:Cookie/Atwola Not disinfected F:\Documents and Settings\Al\Application Data\Mozilla\Profiles\default\j64ojzny.slt\cookies.txt[.atwola.com/]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\arr3.jar-44f46a26-419146a9.zip[Gummy.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\arr3.jar-44f46a26-419146a9.zip[Counter.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\arr3.jar-44f46a26-419146a9.zip[VerifierBug.class]
    Virus:Trj/Classloader.AD Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\arr3.jar-44f46a26-419146a9.zip[Beyond.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-2fa9f21f-2622e2ff.zip[GetAccess.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-2fa9f21f-2622e2ff.zip[InsecureClassLoader.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-2fa9f21f-2622e2ff.zip[Dummy.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-2fa9f21f-2622e2ff.zip[Installer.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-5c9ed667-462bd870.zip[BlackBox.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-5c9ed667-462bd870.zip[VerifierBug.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-5c9ed667-462bd870.zip[Dummy.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-5c9ed667-462bd870.zip[Beyond.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-1ba13978-7ac065bc.zip[Counter.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-1ba13978-7ac065bc.zip[Gummy.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-1ba13978-7ac065bc.zip[VerifierBug.class]
    Adware:Adware/PestTrap Not disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-1ba13978-7ac065bc.zip[web.exe]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-1ba13978-7ac065bc.zip[Worker.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-1ba13978-7ac065bc.zip[Xeyond.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-29defbe1-2a56a41f.zip[Counter.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-29defbe1-2a56a41f.zip[Gummy.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-29defbe1-2a56a41f.zip[VerifierBug.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-29defbe1-2a56a41f.zip[Worker.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-29defbe1-2a56a41f.zip[Xeyond.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-2ad522e1-41ed000f.zip[Counter.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-2ad522e1-41ed000f.zip[Gummy.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-2ad522e1-41ed000f.zip[VerifierBug.class]
    Virus:Trj/Lowzones.SE Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-2ad522e1-41ed000f.zip[web.exe]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-2ad522e1-41ed000f.zip[Worker.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-2ad522e1-41ed000f.zip[Xeyond.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-521c4f7f-7aa8c5c3.zip[Counter.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-521c4f7f-7aa8c5c3.zip[Gummy.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-521c4f7f-7aa8c5c3.zip[VerifierBug.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-521c4f7f-7aa8c5c3.zip[Worker.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-521c4f7f-7aa8c5c3.zip[Xeyond.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-66a18b46-4d5aa0b8.zip[Counter.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-66a18b46-4d5aa0b8.zip[Gummy.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-66a18b46-4d5aa0b8.zip[VerifierBug.class]
    Virus:Trj/Lowzones.KI Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-66a18b46-4d5aa0b8.zip[web.exe]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-66a18b46-4d5aa0b8.zip[Worker.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jar.jar-66a18b46-4d5aa0b8.zip[Xeyond.class]
    Adware:Adware/CWS.Searchmeup Not disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-10015c94-14a8b919.zip[GetAccess.class]
    Adware:Adware/CWS.Searchmeup Not disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-10015c94-14a8b919.zip[Installer.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-10015c94-14a8b919.zip[NewSecurityClassLoader.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-10015c94-14a8b919.zip[NewURLClassLoader.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv599.jar-5d941347-79ac79ab.zip[Matrix.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv599.jar-5d941347-79ac79ab.zip[Counter.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv599.jar-5d941347-79ac79ab.zip[Dummy.class]
    Virus:Exploit/ByteVerify Disinfected F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv599.jar-5d941347-79ac79ab.zip[Parser.class]
    Spyware:Cookie/Atlas DMT Not disinfected F:\Documents and Settings\Al\Cookies\[email protected][1].txt
    Spyware:Cookie/Belnk Not disinfected F:\Documents and Settings\Al\Cookies\[email protected][1].txt
    Spyware:Cookie/Belnk Not disinfected F:\Documents and Settings\Al\Cookies\[email protected][2].txt
    Spyware:Cookie/Go Not disinfected F:\Documents and Settings\Al\Cookies\[email protected][2].txt
    Spyware:Cookie/Statcounter Not disinfected F:\Documents and Settings\Al\Cookies\[email protected][1].txt
    Potentially unwanted tool:Application/Processor Not disinfected F:\Documents and Settings\Al\Desktop\SmitfraudFix\SmitfraudFix\Process.exe
    Potentially unwanted tool:Application/Processor Not disinfected F:\Documents and Settings\Al\Desktop\SmitfraudFix.zip[SmitfraudFix/Process.exe]
    Potentially unwanted tool:Application/Processor Not disinfected F:\Documents and Settings\Al\Desktop\smitRem\Process.exe
    Potentially unwanted tool:Application/Processor Not disinfected F:\Documents and Settings\Al\Desktop\smitRem.exe[smitRem/Process.exe]
    HIJACKTHIS LOG!

    Logfile of HijackThis v1.99.1
    Scan saved at 7:05:01 PM, on 8/10/2006
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    F:\WINDOWS\System32\smss.exe
    F:\WINDOWS\system32\winlogon.exe
    F:\WINDOWS\system32\services.exe
    F:\WINDOWS\system32\lsass.exe
    F:\WINDOWS\system32\svchost.exe
    F:\WINDOWS\System32\svchost.exe
    F:\WINDOWS\system32\LEXBCES.EXE
    F:\WINDOWS\system32\spoolsv.exe
    F:\WINDOWS\system32\LEXPPS.EXE
    F:\Program Files\ewido anti-spyware 4.0\guard.exe
    F:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    F:\WINDOWS\system32\nvsvc32.exe
    F:\WINDOWS\system32\svchost.exe
    F:\WINDOWS\system32\ZoneLabs\vsmon.exe
    F:\WINDOWS\Explorer.EXE
    F:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
    F:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
    F:\Program Files\ewido anti-spyware 4.0\ewido.exe
    F:\Program Files\Messenger\msmsgs.exe
    F:\Program Files\MSN Messenger\MsnMsgr.Exe
    F:\Program Files\Internet Explorer\iexplore.exe
    F:\Documents and Settings\Al\Desktop\hijackthis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr7/*http://www.yahoo.com/ext/search/search.html
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr7/*http://www.yahoo.com
    N3 - Netscape 7: user_pref("browser.search.defaultengine", "engine://F%3A%5CProgram%20Files%5CNetscape%5CNetscape%5Csearchplugins%5CSBWeb_01.src"); (F:\Documents and Settings\Al\Application Data\Mozilla\Profiles\default\j64ojzny.slt\prefs.js)
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - F:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - F:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O4 - HKLM\..\Run: [UpdReg] F:\WINDOWS\UpdReg.EXE
    O4 - HKLM\..\Run: [Jet Detection] "F:\Program Files\Creative\SBAudigy\PROGRAM\ADGJDet.exe"
    O4 - HKLM\..\Run: [CTStartup] F:\Program Files\Creative\Splash Screen\CTEaxSpl.EXE /run
    O4 - HKLM\..\Run: [Lexmark X1100 Series] "F:\Program Files\Lexmark X1100 Series\lxbkbmgr.exe"
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE F:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE F:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
    O4 - HKLM\..\Run: [NeroFilterCheck] F:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [QuickTime Task] "F:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [Zone Labs Client] F:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] F:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
    O4 - HKLM\..\Run: [!ewido] "F:\Program Files\ewido anti-spyware 4.0\ewido.exe" /minimized
    O4 - HKCU\..\Run: [MSMSGS] "F:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [MsnMsgr] "F:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
    O4 - Global Startup: Adobe Gamma Loader.lnk = F:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Microsoft Office.lnk = F:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://F:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - F:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - F:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
    O12 - Plugin for .spop: F:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: {2B323CD9-50E3-11D3-9466-00A0C9700498} - http://us.chat1.yimg.com/us.yimg.com/i/chat/applet/v45/yacscom.cab
    O16 - DPF: {4E010EB6-E1D4-4CD6-A506-E5DC564586DB} - http://activex.microsoft.com/objects/ocget.dll
    O16 - DPF: {7D1E9C49-BD6A-11D3-87A8-009027A35D73} - http://chat.yahoo.com/cab/yacsui.cab
    O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
    O16 - DPF: {AAF15A90-F3EC-4FEE-9A00-F65B25B83D05} - http://activex.microsoft.com/objects/ocget.dll
    O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
    O16 - DPF: {CFCDAA03-8BE4-11CF-B84B-0020AFBBCCFA} (RealPlayer G2 Control) - http://activex.microsoft.com/objects/ocget.dll
    O16 - DPF: {D18F962A-3722-4B59-B08D-28BB9EB2281E} - http://activex.microsoft.com/objects/ocget.dll
    O16 - DPF: {FDC7A535-4070-4B92-A0EA-D9994BCC0DC5} - http://activex.microsoft.com/objects/ocget.dll
    O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - F:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "F:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
    O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - F:\WINDOWS\system32\WPDShServiceObj.dll
    O23 - Service: ewido anti-spyware 4.0 guard - Anti-Malware Development a.s. - F:\Program Files\ewido anti-spyware 4.0\guard.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - F:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - F:\WINDOWS\system32\LEXBCES.EXE
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - F:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - F:\WINDOWS\system32\ZoneLabs\vsmon.exe


    EWIDO LOGFILE!
     
  6. Alvin68

    Alvin68 Thread Starter

    Joined:
    Aug 10, 2006
    Messages:
    10
    ---------------------------------------------------------
    ewido anti-spyware - Scan Report
    ---------------------------------------------------------

    + Created at: 6:08:33 PM 8/10/2006

    + Scan result:



    HKLM\SOFTWARE\Classes\CLSID\{1da7dbe8-c51b-4ae4-bc6e-21863349b0b4} -> Adware.Generic : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\CLSID\{5345A7A9-805A-4923-B505-86B2FEBA3FE0} -> Adware.Generic : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1da7dbe8-c51b-4ae4-bc6e-21863349b0b4} -> Adware.Generic : Cleaned with backup (quarantined).
    HKU\S-1-5-21-1454471165-823518204-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{1DA7DBE8-C51B-4AE4-BC6E-21863349B0B4} -> Adware.Generic : Cleaned with backup (quarantined).
    HKU\S-1-5-21-1454471165-823518204-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{5345A7A1-805A-4923-B505-86B2FEBA3FE0} -> Adware.Generic : Cleaned with backup (quarantined).
    HKU\S-1-5-21-1454471165-823518204-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{5345A7A9-805A-4923-B505-86B2FEBA3FE0} -> Adware.Generic : Cleaned with backup (quarantined).
    F:\WINDOWS\system32\actskn45.ocx -> Downloader.IstBar : Cleaned with backup (quarantined).
    F:\data -> Downloader.IstBar.nh : Cleaned with backup (quarantined).
    C:\programs\Evrsoft First Page 2006\Iscripts\Page Details\crazy-window.izs -> Not-A-Virus.BadJoke.JS.RJump : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\VerifierBug.class-4c57db09-3547d991.class -> Not-A-Virus.Exploit.Java.Bytverify : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Cookies\[email protected][1].txt -> TrackingCookie.2o7 : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Cookies\[email protected][1].txt -> TrackingCookie.Addynamix : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Cookies\[email protected][1].txt -> TrackingCookie.Adserver : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Cookies\[email protected][1].txt -> TrackingCookie.Advertising : Cleaned with backup (quarantined).
    :mozilla.25:F:\Documents and Settings\Al\Application Data\Mozilla\Firefox\Profiles\o2i39igi.default\cookies.txt -> TrackingCookie.Atdmt : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Cookies\[email protected][2].txt -> TrackingCookie.Atdmt : Cleaned with backup (quarantined).
    :mozilla.11:F:\Documents and Settings\Al\Application Data\Mozilla\Firefox\Profiles\o2i39igi.default\cookies.txt -> TrackingCookie.Belstat : Cleaned with backup (quarantined).
    :mozilla.9:F:\Documents and Settings\Al\Application Data\Mozilla\Firefox\Profiles\o2i39igi.default\cookies.txt -> TrackingCookie.Belstat : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Cookies\[email protected][1].txt -> TrackingCookie.Burstnet : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Cookies\[email protected][1].txt -> TrackingCookie.Doubleclick : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Cookies\[email protected][1].txt -> TrackingCookie.Euroclick : Cleaned with backup (quarantined).
    :mozilla.19:F:\Documents and Settings\Al\Application Data\Mozilla\Firefox\Profiles\o2i39igi.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup (quarantined).
    :mozilla.20:F:\Documents and Settings\Al\Application Data\Mozilla\Firefox\Profiles\o2i39igi.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup (quarantined).
    :mozilla.21:F:\Documents and Settings\Al\Application Data\Mozilla\Firefox\Profiles\o2i39igi.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup (quarantined).
    :mozilla.22:F:\Documents and Settings\Al\Application Data\Mozilla\Firefox\Profiles\o2i39igi.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup (quarantined).
    :mozilla.23:F:\Documents and Settings\Al\Application Data\Mozilla\Firefox\Profiles\o2i39igi.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup (quarantined).
    :mozilla.24:F:\Documents and Settings\Al\Application Data\Mozilla\Firefox\Profiles\o2i39igi.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Cookies\[email protected][1].txt -> TrackingCookie.Findwhat : Cleaned with backup (quarantined).
    F:\Documents and Settings\Guest\Cookies\[email protected][1].txt -> TrackingCookie.Hitbox : Cleaned with backup (quarantined).
    F:\Documents and Settings\Guest\Cookies\[email protected][2].txt -> TrackingCookie.Hitbox : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Cookies\[email protected][1].txt -> TrackingCookie.Hotlog : Cleaned with backup (quarantined).
    :mozilla.12:F:\Documents and Settings\Al\Application Data\Mozilla\Firefox\Profiles\o2i39igi.default\cookies.txt -> TrackingCookie.Masterstats : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Cookies\[email protected][2].txt -> TrackingCookie.Mediaplex : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Cookies\[email protected][1].txt -> TrackingCookie.Questionmarket : Cleaned with backup (quarantined).
    :mozilla.12:F:\Documents and Settings\Al\Application Data\Mozilla\Profiles\default\j64ojzny.slt\cookies.txt -> TrackingCookie.Sextracker : Cleaned with backup (quarantined).
    :mozilla.13:F:\Documents and Settings\Al\Application Data\Mozilla\Profiles\default\j64ojzny.slt\cookies.txt -> TrackingCookie.Sextracker : Cleaned with backup (quarantined).
    :mozilla.14:F:\Documents and Settings\Al\Application Data\Mozilla\Profiles\default\j64ojzny.slt\cookies.txt -> TrackingCookie.Sextracker : Cleaned with backup (quarantined).
    :mozilla.15:F:\Documents and Settings\Al\Application Data\Mozilla\Profiles\default\j64ojzny.slt\cookies.txt -> TrackingCookie.Sextracker : Cleaned with backup (quarantined).
    :mozilla.16:F:\Documents and Settings\Al\Application Data\Mozilla\Profiles\default\j64ojzny.slt\cookies.txt -> TrackingCookie.Sextracker : Cleaned with backup (quarantined).
    :mozilla.17:F:\Documents and Settings\Al\Application Data\Mozilla\Profiles\default\j64ojzny.slt\cookies.txt -> TrackingCookie.Sextracker : Cleaned with backup (quarantined).
    :mozilla.18:F:\Documents and Settings\Al\Application Data\Mozilla\Profiles\default\j64ojzny.slt\cookies.txt -> TrackingCookie.Sextracker : Cleaned with backup (quarantined).
    :mozilla.19:F:\Documents and Settings\Al\Application Data\Mozilla\Profiles\default\j64ojzny.slt\cookies.txt -> TrackingCookie.Sextracker : Cleaned with backup (quarantined).
    :mozilla.20:F:\Documents and Settings\Al\Application Data\Mozilla\Profiles\default\j64ojzny.slt\cookies.txt -> TrackingCookie.Sextracker : Cleaned with backup (quarantined).
    :mozilla.21:F:\Documents and Settings\Al\Application Data\Mozilla\Profiles\default\j64ojzny.slt\cookies.txt -> TrackingCookie.Sextracker : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Cookies\[email protected][1].txt -> TrackingCookie.Spylog : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Cookies\[email protected][2].txt -> TrackingCookie.Statcounter : Cleaned with backup (quarantined).
    :mozilla.31:F:\Documents and Settings\Al\Application Data\Mozilla\Firefox\Profiles\o2i39igi.default\cookies.txt -> TrackingCookie.Tacoda : Cleaned with backup (quarantined).
    :mozilla.32:F:\Documents and Settings\Al\Application Data\Mozilla\Firefox\Profiles\o2i39igi.default\cookies.txt -> TrackingCookie.Tacoda : Cleaned with backup (quarantined).
    :mozilla.33:F:\Documents and Settings\Al\Application Data\Mozilla\Firefox\Profiles\o2i39igi.default\cookies.txt -> TrackingCookie.Tacoda : Cleaned with backup (quarantined).
    :mozilla.34:F:\Documents and Settings\Al\Application Data\Mozilla\Firefox\Profiles\o2i39igi.default\cookies.txt -> TrackingCookie.Tacoda : Cleaned with backup (quarantined).
    :mozilla.35:F:\Documents and Settings\Al\Application Data\Mozilla\Firefox\Profiles\o2i39igi.default\cookies.txt -> TrackingCookie.Tacoda : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Cookies\[email protected][1].txt -> TrackingCookie.Tacoda : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Cookies\[email protected][1].txt -> TrackingCookie.Tribalfusion : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Cookies\[email protected][2].txt -> TrackingCookie.Yieldmanager : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\BlackBox.class-1beb930b-5b59aafb.class -> Trojan.ClassLoader.c : Cleaned with backup (quarantined).
    F:\Documents and Settings\Al\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\Dummy.class-79bf5cf3-2c50316f.class -> Trojan.ClassLoader.Dummy.d : Cleaned with backup (quarantined).


    ::Report end
     
  7. Cookiegal

    Cookiegal Administrator Malware Specialist Coordinator

    Joined:
    Aug 27, 2003
    Messages:
    112,042
    The log looks good.

    • Go to the Control Panel and double-click the Java Icon.
    • Under Temporary Internet Files, click the Delete Files button.
    • There are three options in the window to clear the cache - Leave ALL 3 Checked
      • Downloaded Applets
      • Downloaded Applications
      • Other Files
    • Click OK on Delete Temporary Files Window
    • Click OK to leave the Java Control Panel.


    How are things running now?
     
  8. Alvin68

    Alvin68 Thread Starter

    Joined:
    Aug 10, 2006
    Messages:
    10
    Things are running ok now, Thank you for your time.
    Al
     
  9. Alvin68

    Alvin68 Thread Starter

    Joined:
    Aug 10, 2006
    Messages:
    10
    thanks :)
     
  10. Cookiegal

    Cookiegal Administrator Malware Specialist Coordinator

    Joined:
    Aug 27, 2003
    Messages:
    112,042
    You're welcome. :)

    Now you should turn system restore off to flush out all previous system restore points, then turn it back on and create a new restore point:

    To turn off system restore, on the Desktop, right click on My Computer and click on Properties.
    Click the System Restore tab.
    Check Turn off System Restore.
    Click Apply and then click OK.

    Restart your computer, turn System Restore back on and create a restore point.

    To create a new restore point, click on Start – All Programs – Accessories – System Tools and then select System Restore.

    In the System Restore wizard, select Create a restore point and click the Next button.

    Type a name for your new restore point then click on Create.


    I also recommend downloading SPYWAREBLASTER for added protection.

    Read here for info on how to tighten your security.



    Delete your temporary files:

    In safe mode navigate to the C:\Windows\Temp folder. Open the Temp folder and go to Edit - Select All then Edit - Delete to delete the entire contents of the Temp folder.

    Go to Start - Run and type %temp% in the Run box. The Temp folder will open. Click Edit - Select All then hit Delete to delete the entire contents of the Temp folder.

    Finally go to Control Panel - Internet Options. On the General tab under "Temporary Internet Files" Click "Delete Files". Put a check by "Delete Offline Content" and click OK. Click on the Programs tab then click the "Reset Web Settings" button. Click Apply then OK.

    While still in safe mode, go to Start - Run and copy and paste then click OK:

    shell:cache\content.ie5

    This should open your content.ie5 folder. Select everything in there and click delete. You will not be able to delete the index.bat file and that’s normal.


    Empty the recycle bin.
     
  11. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/491182

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice