Review my HJT Log Please

Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

compaquser

Thread Starter
Joined
Jun 22, 2005
Messages
138
Logfile of HijackThis v1.99.1
Scan saved at 9:12:14 PM, on 7/9/2005
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 (6.00.2600.0000)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\AVPersonal\AVWUPSRV.EXE
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\carpserv.exe
C:\Program Files\AVPersonal\AVGNT.EXE
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Lavasoft\Ad-aware 6\Ad-watch.exe
C:\Program Files\AVPersonal\AVGUARD.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\user\Local Settings\Temp\Temporary Directory 2 for hijackthis.zip\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\ceofx.dll/sp.html#28129
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\system32\tiiyp.dll/sp.html#28129
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system32\tiiyp.dll/sp.html#28129
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system32\tiiyp.dll/sp.html#28129
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system32\tiiyp.dll/sp.html#28129
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by Verizon Online
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
R3 - Default URLSearchHook is missing
F2 - REG:system.ini: UserInit=C:\WINDOWS\System32\Userinit.exe
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O3 - Toolbar: &Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\COMPAN~1\Installs\cpn\ycomp5_3_12_0.dll (file missing)
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\system32\msdxm.ocx
O4 - HKLM\..\Run: [CARPService] carpserv.exe
O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\VERIZO~1\SUPPOR~1\SMARTB~1\MotiveSB.exe
O4 - HKLM\..\Run: [tzjuxp] c:\windows\system32\emojis.exe
O4 - HKLM\..\Run: [AVGCtrl] "C:\Program Files\AVPersonal\AVGNT.EXE" /min
O4 - HKLM\..\Run: [Zone Labs Client] C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [VVSN] C:\Program Files\VVSN\VVSN.exe
O4 - HKLM\..\Run: [Ad-watch] "C:\Program Files\Lavasoft\Ad-aware 6\Ad-watch.exe"
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [WebRebates0] "C:\Program Files\Web_Rebates\WebRebates0.exe"
O4 - HKLM\..\Run: [iTunesHelper] C:\Program Files\iTunes\iTunesHelper.exe
O4 - HKLM\..\Run: [EbatesMoeMoneyMaker0] C:\Program Files\Ebates_MoeMoneyMaker\EbatesMoeMoneyMaker0.exe
O4 - HKLM\..\Run: [Stop-Sign_Install_Recovery] C:\DOCUME~1\user\LOCALS~1\Temp\ss_tscanner.exe -k
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe
O4 - HKCU\..\Run: [SFP] C:\Program Files\Common Files\Verizon Online\SFP\vzSFPWin.EXE /s
O4 - HKCU\..\Run: [Egdf] C:\WINDOWS\System32\t?skmgr.exe
O4 - HKCU\..\Run: [Rahi] C:\Documents and Settings\user\Application Data\sais.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O15 - ProtocolDefaults: 'http' protocol is in My Computer Zone, should be Internet Zone (HKLM)
O16 - DPF: ChatSpace Full Java Client 3.1.0.235N - http://205.177.13.50/Java/cfsn31235.cab
O16 - DPF: DigiChat Applet - http://albany.digi-net.com/DigiChat/DigiClasses/Client_IE_5_0_1_7.cab
O16 - DPF: Yahoo! Pool 2 - http://download.games.yahoo.com/games/clients/y/pote_x.cab
O16 - DPF: {09C6CAC0-936E-40A0-BC26-707480103DC3} (shizmoo Class) - http://www.uproar.com/applets/activex/shizmoo/flipside_web18.cab
O16 - DPF: {15AD4789-CDB4-47E1-A9DA-992EE8E6BAD6} - http://public.windupdates.com/get_f...71b0834b3328:522a1c137ec85ca995271ab95b94951b
O16 - DPF: {4B1A4A31-8845-11D5-9769-00B0D071D434} (Avaya ICM Client) - http://iowacniceweb01.ic.ncs.com/icm/caller.cab
O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} (RdxIE Class) - http://software-dl.real.com/12ff2e0752b1a460ab16/netzip/RdxIE601.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.c...ls/en/x86/client/wuweb_site.cab?1094173104841
O16 - DPF: {75D1F3B2-2A21-11D7-97B9-0010DC2A6243} (SecureLogin.SecureControl) - http://secure2.comned.com/signuptemplates/ActiveSecurity.cab
O16 - DPF: {87067F04-DE4C-4688-BC3C-4FCF39D609E7} - http://download.websearch.com/Dnl/T_50038/QDow_AS2.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/binFramework/v10/ZIntro.cab27513.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://download.games.yahoo.com/games/popcap/zuma/popcaploader_v6.cab
O16 - DPF: {E5D419D6-A846-4514-9FAD-97E826C84822} (HeartbeatCtl Class) - http://fdl.msn.com/zone/datafiles/heartbeat.cab
O16 - DPF: {F58E1CEF-A068-4C15-BA5E-587CAF3EE8C6} (MSN Chat Control 4.5) - http://chat.msn.com/bin/msnchat45.cab
O23 - Service: AntiVir Service (AntiVirService) - H+BEDV Datentechnik GmbH - C:\Program Files\AVPersonal\AVGUARD.EXE
O23 - Service: AntiVir Update (AVWUpSrv) - H+BEDV Datentechnik GmbH, Germany - C:\Program Files\AVPersonal\AVWUPSRV.EXE
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe
 

Cookiegal

Karen
Administrator
Malware Specialist Coordinator
Joined
Aug 27, 2003
Messages
119,166
Go to Control Panel - Add/Remove programs and remove this, if there:

180 Solutions or
180 Search Assistant
Web_Rebates
Ebates_MoeMoneyMaker


That's an older version of Ad-Aware AdWatch which is probably no longer supported. You should update the program to the Personal SE 1.06 version.

Please disable AdWatch, as it may hinder the removal of some entries.
To disable AdWatch:

Open AdAware
Go to AdWatch User Interface.
Go to Tools and Preferences.
At the bottom of the screen you will see 2 options Active and Automatic.
Active: This will turn Ad-Watch On\Off without closing it.
Automatic: Suspicious activity will be blocked automatically.
Uncheck both options. You can enable these after resolving your problem.

You will need to download the following tools and have them ready to run. Do not run any of them until instructed to do so:


Click here to download cwsserviceremove.zip and unzip it to your desktop.


Click here to download and install CCleaner.


Click here to download Killbox and save it to your desktop.


Click here to download CWSinstall.exe to the desktop.


Click here to download AboutBuster created by Rubber Ducky.

Unzip AboutBuster to the Desktop then click the Update Button then click Check for Update and download the updates and then click Exit because I don't want you to run it yet. Just get the updates so it is ready to run later in safe mode.


Download the trial version of Ewido Security Suite here.
  • Install Ewido.
  • During the installation, under "Additional Options" uncheck "Install background guard" and "Install scan via context menu".
  • Launch Ewido
  • It will prompt you to update click the OK button and it will go to the main screen
  • On the left side of the main screen click update
  • Click on Start and let it update.
  • DO NOT run a scan yet. You will do that later in safe mode.


Now go ahead and set your computer to show hidden files like so:

Go to Start – Search and under More advanced search options, make sure there is a check by Search System Folders and Search hidden files and folders and Search system subfolders.

Next, click on My Computer, Go to Tools – Folder Options. Click on the View tab and make sure that Show hidden files and folders is checked. Also uncheck Hide protected operating system files and Hide extensions for known file types. Now click Apply to all folders. Click Apply and then OK.


After you have downloaded all the above tools, sign off the Internet and remain offline until this procedure is complete. Copy these instructions to notepad and save them on your desktop for easy access. You must follow these directions exactly and you cannot skip any part of it.



Restart to safe mode now and perform the following steps in safe mode:

How to boot to safe mode


Double click on the cwsserviceemove.reg file you downloaded at the beginning to enter into the registry. Answer yes when asked to have its contents added to the registry.

Run HijackThis and put a check by these entries:


R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\ceofx.dll/sp.html#28129

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\system32\tiiyp.dll/sp.html#28129

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system32\tiiyp.dll/sp.html#28129

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system32\tiiyp.dll/sp.html#28129

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system32\tiiyp.dll/sp.html#28129

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =

R3 - Default URLSearchHook is missing

O3 - Toolbar: &Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\COMPAN~1\Installs\cpn\ycomp5_3_12_0.dll (file missing)

O4 - HKLM\..\Run: [tzjuxp] c:\windows\system32\emojis.exe

O4 - HKLM\..\Run: [VVSN] C:\Program Files\VVSN\VVSN.exe

O4 - HKLM\..\Run: [WebRebates0] "C:\Program Files\Web_Rebates\WebRebates0.exe"

O4 - HKLM\..\Run: [EbatesMoeMoneyMaker0] C:\Program Files\Ebates_MoeMoneyMaker\EbatesMoeMoneyMaker0.exe

O4 - HKLM\..\Run: [Stop-Sign_Install_Recovery] C:\DOCUME~1\user\LOCALS~1\Temp\ss_tscanner.exe -k

O4 - HKCU\..\Run: [Egdf] C:\WINDOWS\System32\t?skmgr.exe

O4 - HKCU\..\Run: [Rahi] C:\Documents and Settings\user\Application Data\sais.exe

O16 - DPF: {15AD4789-CDB4-47E1-A9DA-992EE8E6BAD6} - http://public.windupdates.com/get_f...71 ab95b94951b

O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} (RdxIE Class) - http://software-dl.real.com/12ff2e0...ip/RdxIE601.cab

O16 - DPF: {75D1F3B2-2A21-11D7-97B9-0010DC2A6243} (SecureLogin.SecureControl) - http://secure2.comned.com/signuptem...iveSecurity.cab

O16 - DPF: {87067F04-DE4C-4688-BC3C-4FCF39D609E7} - http://download.websearch.com/Dnl/T_50038/QDow_AS2.cab




Once you’ve checked all of the above entries, click the Fix Checked button.

Exit Hijack This.

Double-click on Killbox.exe to run it. Now put a tick by Standard File Kill. In the Full Path of File to Delete box, copy and paste each of the following lines one at a time then click on the button that has the red circle with the X in the middle after you enter each file. It will ask for confirmation to delete the file. Click Yes. Continue with that same procedure until you have copied and pasted all of these in the Paste Full Path of File to Delete box.



C:\WINDOWS\system32\tiiyp.dll

c:\windows\system32\emojis.exe

C:\Program Files\VVSN\VVSN.exe

C:\Program Files\Web_Rebates\WebRebates0.exe"

C:\Program Files\Ebates_MoeMoneyMaker\EbatesMoeMoneyMaker0.exe

C:\DOCUME~1\user\LOCALS~1\Temp\ss_tscanner.exe

C:\WINDOWS\System32\t?skmgr.exe

C:\Documents and Settings\user\Application Data\sais.exe



Note: It is possible that Killbox will tell you that one or more files do not exist. If that happens, just continue on with all the files. Be sure not to miss any.

Exit the Killbox.


Locate and delete these folders:

C:\Program Files\VVSN

C:\Program Files\Web_Rebates

C:\Program Files\Ebates_MoeMoneyMaker


Next run AboutBuster. Double click Aboutbuster.exe, click OK, click Start then click OK. This will scan your computer for the bad files and delete them.


Run CWShredder. Just click on the cwshredder.exe then click Fix (Not Scan only) and let it do its thing.


Start Ccleaner and click Run Cleaner


Go to Control Panel – Internet Options. Click on the Programs tab then click the Reset Web Settings button. Click Apply then OK.


* Run Ewido:
  • Click on scanner
  • Click Complete System Scan and the scan will begin.
  • During the scan it will prompt you to clean files, click OK
  • When the scan is finished, look at the bottom of the screen and click the Save report button.
  • Save the report to your desktop.

Go to Control Panel > Internet Options. Click on the Programs tab then click the "Reset Web Settings" button. Click Apply then OK.


Now, restart back into Windows normally and do the following:

Turn off System Restore:

On the Desktop, right-clickMy Computer.

Click Properties.

Click the System Restore tab.

Check Turn off System Restore.

Click Apply, and then click OK.

Restart your computer.

Click here and do an on-line virus scan.

Be sure and put a check in the box by Auto Clean before you do the scan. If it finds anything that it cannot clean have it delete it or make a note of the file location so you can delete it yourself. Housecall will detect the leftover files from this hijacker.


Click here and download The Hoster. UnZip the file and press Restore Original Hosts and press OK. Exit Program.

If you have Spybot S&D installed you will also need to replace one file. Click here and download SDHelper.dll. Copy the file to the folder containing your Spybot S&D program (normally C:\Program Files\Spybot - Search & Destroy)

Check in the C:\Windows\system32 folder to be sure you have a file named Shell.dll. If you do not have one, go to the C:\Windows\system32\dllcache folder. Find shell.dll and right click on it. Choose Copy from the menu. Open the System32 folder and right click on an empty space in the window. Choose Paste from the menu.

control.exe may have been deleted.
See if control.exe is present in C:\windows\system32

If control.exe isn't there, go here and download control.exe per the instructions at the site.

IMPORTANT!: Please check your ActiveX security settings. They may have been changed by this CWS variant to allow ALL ActiveX!! Reset your ActiveX security settings like so... Go to Internet Options - Security - Internet, press 'default level', then OK. Now press "Custom Level."

In the ActiveX section, set the first two options (Download signed and unsigned ActiveX
controls) to 'prompt', and 'Initialize and Script ActiveX controls not marked as safe" to 'disable'.

Reboot and post another Hijack This log please.
 

compaquser

Thread Starter
Joined
Jun 22, 2005
Messages
138
Here is my new HJT Log I notice the difference in my cpu speed performance already thanks for all the help. If you have any extra processes for me to do please post them here



Logfile of HijackThis v1.99.1
Scan saved at 1:40:49 AM, on 7/10/2005
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 (6.00.2600.0000)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\AVPersonal\AVGUARD.EXE
C:\Program Files\AVPersonal\AVWUPSRV.EXE
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\WINDOWS\System32\carpserv.exe
C:\Program Files\AVPersonal\AVGNT.EXE
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Common Files\Verizon Online\SFP\vzSFPWin.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Documents and Settings\user\Local Settings\Temp\Temporary Directory 1 for hijackthis.zip\HijackThis.exe
C:\Program Files\Symantec\LiveUpdate\AUpdate.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by Verizon Online
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
F2 - REG:system.ini: UserInit=C:\WINDOWS\System32\Userinit.exe
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\system32\msdxm.ocx
O4 - HKLM\..\Run: [CARPService] carpserv.exe
O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\VERIZO~1\SUPPOR~1\SMARTB~1\MotiveSB.exe
O4 - HKLM\..\Run: [AVGCtrl] "C:\Program Files\AVPersonal\AVGNT.EXE" /min
O4 - HKLM\..\Run: [Zone Labs Client] C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [iTunesHelper] C:\Program Files\iTunes\iTunesHelper.exe
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe
O4 - HKLM\..\Run: [Ad-watch] "C:\Program Files\Lavasoft\Ad-aware 6\Ad-watch.exe"
O4 - HKCU\..\Run: [SFP] C:\Program Files\Common Files\Verizon Online\SFP\vzSFPWin.EXE /s
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O15 - ProtocolDefaults: 'http' protocol is in My Computer Zone, should be Internet Zone (HKLM)
O16 - DPF: ChatSpace Full Java Client 3.1.0.235N - http://205.177.13.50/Java/cfsn31235.cab
O16 - DPF: DigiChat Applet - http://albany.digi-net.com/DigiChat/DigiClasses/Client_IE_5_0_1_7.cab
O16 - DPF: Yahoo! Pool 2 - http://download.games.yahoo.com/games/clients/y/pote_x.cab
O16 - DPF: {04E214E5-63AF-4236-83C6-A7ADCBF9BD02} (HouseCall Control) - http://housecall60.trendmicro.com/housecall/xscan60.cab
O16 - DPF: {09C6CAC0-936E-40A0-BC26-707480103DC3} (shizmoo Class) - http://www.uproar.com/applets/activex/shizmoo/flipside_web18.cab
O16 - DPF: {4B1A4A31-8845-11D5-9769-00B0D071D434} (Avaya ICM Client) - http://iowacniceweb01.ic.ncs.com/icm/caller.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.c...ls/en/x86/client/wuweb_site.cab?1094173104841
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/binFramework/v10/ZIntro.cab27513.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://download.games.yahoo.com/games/popcap/zuma/popcaploader_v6.cab
O16 - DPF: {E5D419D6-A846-4514-9FAD-97E826C84822} (HeartbeatCtl Class) - http://fdl.msn.com/zone/datafiles/heartbeat.cab
O16 - DPF: {F58E1CEF-A068-4C15-BA5E-587CAF3EE8C6} (MSN Chat Control 4.5) - http://chat.msn.com/bin/msnchat45.cab
O23 - Service: AntiVir Service (AntiVirService) - H+BEDV Datentechnik GmbH - C:\Program Files\AVPersonal\AVGUARD.EXE
O23 - Service: AntiVir Update (AVWUpSrv) - H+BEDV Datentechnik GmbH, Germany - C:\Program Files\AVPersonal\AVWUPSRV.EXE
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe
 

compaquser

Thread Starter
Joined
Jun 22, 2005
Messages
138
By the way, here is my Ewido scan results:



---------------------------------------------------------
ewido security suite - Scan report
---------------------------------------------------------

+ Created on: 12:08:54 AM, 7/10/2005
+ Report-Checksum: FA77CF33

+ Scan result:

HKLM\SOFTWARE\Classes\CLSID\{029DB004-6BCD-0E73-3AEA-F205B565F0F8} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{14697B9D-80B3-6F3E-5DD5-6A207F1EB529} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{283715D8-4B32-91ED-58C5-CDF8C4F6A0D0} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{2AD4D876-81B0-B087-D7C1-18BD7A709292} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{38EAD4E2-8EB6-5806-07DA-402D55C50939} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{676575DD-4D46-911D-8037-9B10D6EE8BB5} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{72A95655-0AD6-3F3C-4EDB-FB9E350A96ED} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{75D05867-E38D-2939-A8D4-F77D51475C5A} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{7E5B9131-9DA3-5441-BE0E-FA6A3B539A96} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{7FE16BED-1E1A-0F9A-E962-90627CF19B7B} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{8E0B1D03-0ACA-38EE-8146-CB8797FC4F80} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{931A8005-8460-7AEC-010F-C5E04983BE41} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{A692FF9A-5879-5C99-6791-53A31CA19934} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{AB537FC9-E3D4-FBBF-80FD-2CDE0ABCC38B} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{B2561711-375A-C5C2-DBF9-4F87C6CDEC0E} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{BD757058-7180-2CE5-E5B6-8C70AEF236CC} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{BDA8AF27-D057-4727-6CE7-CFF4CE61A0FD} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{CAFF6042-9822-36A6-4764-C0BF5E59EF31} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{F252B597-9791-2380-904F-55CD7338EA24} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{FA368488-8008-3889-4E2F-86BBFD486BD2} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\Interface\{04D7391C-AB32-4921-84F3-B63FC0EEDF43} -> Spyware.CometCursor : Cleaned with backup
HKLM\SOFTWARE\Classes\Interface\{09F19D39-3084-47B0-B1CE-26581074BC36} -> Spyware.CometCursor : Cleaned with backup
HKLM\SOFTWARE\Classes\Interface\{2CEC1D83-1F31-41A7-B2BC-A2FE25E3BF34} -> Spyware.CometCursor : Cleaned with backup
HKLM\SOFTWARE\Classes\Interface\{41943AC1-46DC-41EF-A365-713C14C50A06} -> Spyware.CometCursor : Cleaned with backup
HKLM\SOFTWARE\Classes\Interface\{439508F6-E48B-4095-B000-ADC7A02AB29E} -> Spyware.CometCursor : Cleaned with backup
HKLM\SOFTWARE\Classes\Interface\{4A0F42B7-A61B-4131-BF41-BF05A2635BFD} -> Spyware.CometCursor : Cleaned with backup
HKLM\SOFTWARE\Classes\Interface\{4E86A93F-4E89-45FD-866B-80D25B0F21A6} -> Spyware.CometCursor : Cleaned with backup
HKLM\SOFTWARE\Classes\Interface\{665ABE65-2C16-4341-B4B8-01FF799E8F4C} -> Spyware.CometCursor : Cleaned with backup
HKLM\SOFTWARE\Classes\Interface\{9DBDD71C-0A7F-48AC-9FFA-E102B3750B9D} -> Spyware.CometCursor : Cleaned with backup
HKLM\SOFTWARE\Classes\Interface\{A42C0EF4-1C76-43CC-989F-EADC7E4B755D} -> Spyware.VX2 : Cleaned with backup
HKLM\SOFTWARE\Classes\Interface\{C2E56E18-2F04-4AB9-9333-B2DB3C350956} -> Spyware.CometCursor : Cleaned with backup
HKLM\SOFTWARE\Classes\Interface\{C7E7863D-2EF7-46F9-A2C2-DD08B2B3C0A5} -> Spyware.CometCursor : Cleaned with backup
HKLM\SOFTWARE\Classes\Interface\{CA74A032-869B-4752-927E-D0DA5677DC23} -> Spyware.CometCursor : Cleaned with backup
HKLM\SOFTWARE\Classes\Interface\{E9CBBEED-20B6-456C-8589-CF364D9D2370} -> Spyware.CometCursor : Cleaned with backup
HKLM\SOFTWARE\Classes\Interface\{F8C5EA77-7D72-405C-B90A-093655B0F544} -> Spyware.CometCursor : Cleaned with backup
HKLM\SOFTWARE\Classes\LocalNRDDll.LocalNRDDllObj -> Spyware.BetterInternet : Cleaned with backup
HKLM\SOFTWARE\Classes\LocalNRDDll.LocalNRDDllObj\CLSID -> Spyware.BetterInternet : Cleaned with backup
HKLM\SOFTWARE\Classes\LocalNRDDll.LocalNRDDllObj\CurVer -> Spyware.BetterInternet : Cleaned with backup
HKLM\SOFTWARE\Classes\PROTOCOLS\Name-Space Handler\res -> Spyware.WebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\TypeLib\{3FA866AC-40D7-4FE6-BABF-78EE854A4325} -> Spyware.VX2 : Cleaned with backup
HKLM\SOFTWARE\Classes\WinTaskAdX.Installer -> Spyware.BlazeFind : Cleaned with backup
HKLM\SOFTWARE\Classes\WinTaskAdX.Installer\CLSID -> Spyware.BlazeFind : Cleaned with backup
HKLM\SOFTWARE\Microsoft\Internet Explorer\Main\ins -> Spyware.WebRebates : Cleaned with backup
HKLM\SOFTWARE\SearchRelevancy -> Spyware.SearchRelevancy : Cleaned with backup
HKU\S-1-5-21-796845957-152049171-1957994488-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{24D627C3-088F-DDEB-85B3-5A49ED6BD761} -> Spyware.CoolWebSearch : Cleaned with backup
HKU\S-1-5-21-796845957-152049171-1957994488-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{A2341EC7-2146-9AD5-C963-1C8D49C2EB4C} -> Spyware.CoolWebSearch : Cleaned with backup
HKU\S-1-5-21-796845957-152049171-1957994488-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{01F44A8A-8C97-4325-A378-76E68DC4AB2E} -> Spyware.IEPlugin : Cleaned with backup
HKU\S-1-5-21-796845957-152049171-1957994488-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{24D627C3-088F-DDEB-85B3-5A49ED6BD761} -> Spyware.CoolWebSearch : Cleaned with backup
HKU\S-1-5-21-796845957-152049171-1957994488-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{8E0B1D03-0ACA-38EE-8146-CB8797FC4F80} -> Spyware.CoolWebSearch : Cleaned with backup
HKU\S-1-5-21-796845957-152049171-1957994488-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{A2341EC7-2146-9AD5-C963-1C8D49C2EB4C} -> Spyware.CoolWebSearch : Cleaned with backup
C:\WINDOWS\ahevq.txt:xzscur -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\apiff.dll:tuqew -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\apilf32.dll:mvjjr -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\appfv32.dll:pfzif -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\apptg32.dll:hgrwz -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\atlrm.dll:jsxrv -> TrojanDownloader.Agent.an : Cleaned with backup
C:\WINDOWS\atlyf.dll:hlzpo -> TrojanDownloader.Agent.kd : Cleaned with backup
C:\WINDOWS\cdplayer.ini:valzn -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\crmj.dll:ycaoq -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\crmj.dll:zgpuu -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\crmt.dll:daspu -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\crsr32.dll:vbkuw -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\crvv32.dll:zfucj -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\d3hn.dll:udvmfs -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\d3yp.dll:ymeiy -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\decdb.txt:nilwaz -> Trojan.Agent.bi : Cleaned with backup
C:\WINDOWS\desktop.ini:dcyywu -> Trojan.Agent.bi : Cleaned with backup
C:\WINDOWS\Downloaded Program Files\CONFLICT.1\HDPlugin1019.dll -> Adware.Gator : Cleaned with backup
C:\WINDOWS\Downloaded Program Files\popcaploader.dll -> Not-A-Virus.PornWare.PopCap.b : Cleaned with backup
C:\WINDOWS\dujwk.txt:rfgig -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\duvvo.txt:mxxqrt -> Trojan.Agent.bi : Cleaned with backup
C:\WINDOWS\iedi32.dll:zragz -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\ieiy32.dll:bsaow -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\iejz.dll:tslty -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\iepk.dll:qnfdbd -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\iesf32.dll:jnyjdn -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\iwkmt.txt:kxojdp -> Trojan.Agent.bi : Cleaned with backup
C:\WINDOWS\iwkmt.txt:pkxpgm -> Trojan.Agent.bi : Cleaned with backup
C:\WINDOWS\iwkmt.txt:zzmzel -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\javapr32.dll:hlsnx -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\javarp32.dll:nklevy -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\javasc32.dll:zelaz -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\javasr.dll:glejpb -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\javavc.dll:jfvgt -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\javayx.dll:hhzha -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\jrfab.txt:gvlqrq -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\jrfab.txt:hbbixl -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\jsfpj.txt:xkanuu -> Trojan.Agent.bi : Cleaned with backup
C:\WINDOWS\krwub.txt:taaonn -> Trojan.Agent.bi : Cleaned with backup
C:\WINDOWS\lrlut.txt:iyghtt -> Trojan.Agent.bi : Cleaned with backup
C:\WINDOWS\lvfhg.txt:ayzuwd -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\lvfhg.txt:fnruss -> Trojan.Agent.bi : Cleaned with backup
C:\WINDOWS\mfcov.dll:klvjt -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\mfcvz32.dll:qzmilv -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\mfcww.dll:adpkh -> TrojanDownloader.Agent.an : Cleaned with backup
C:\WINDOWS\mfcww.dll:dmoon -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\msew32.dll:tuigct -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\mshg.dll:cwkta -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\msli.dll:uxuyu -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\msli.dll:vdnzui -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\msnk32.dll:ubwiwt -> Spyware.OneMoreSearch : Cleaned with backup
C:\WINDOWS\msox32.dll:eek:dgfos -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\mssk32.dll:erddhd -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\netag.dll:ptovdy -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\netbr.dll:acgfc -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\netgg32.dll:sdzsf -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\nethv32.dll:qgejm -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\netlu32.dll:fgiffy -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\netpr32.dll:zxtbfg -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\netrh.dll:ahpcj -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\netsc.dll:lpwjxq -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\netsc.dll:qhlpbl -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\netsc.dll:rqlpzr -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\netuq.dll:bievvv -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\netuq.dll:dpgozs -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\ntci.dll:qecld -> TrojanDownloader.Agent.an : Cleaned with backup
C:\WINDOWS\ntoa32.dll:kmwkn -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\ntse32.dll:vkkyx -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\nttx32.dll:dmppi -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\ntwl32.dll:nkvdz -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\n_cvhudx.txt:pzxody -> Trojan.Agent.bi : Cleaned with backup
C:\WINDOWS\n_dwvqwy.txt:hzpufi -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\n_nakowz.txt:dgalpk -> Trojan.Agent.bi : Cleaned with backup
C:\WINDOWS\n_wrlpdb.txt:hatrcb -> Trojan.Agent.bi : Cleaned with backup
C:\WINDOWS\n_xrdbca.txt:ablxee -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\n_xrdbca.txt:ftrsyd -> Trojan.Agent.bi : Cleaned with backup
C:\WINDOWS\ODBC.INI:eek:ksymc -> Trojan.Agent.bi : Cleaned with backup
C:\WINDOWS\ODBCINST.INI:fcefmy -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\ontpj.txt:daodts -> Trojan.Agent.bi : Cleaned with backup
C:\WINDOWS\ovyfk.txt:pciaio -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\syseo32.dll:cdrtq -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\system32\mfcjl.dll -> TrojanDownloader.Agent.bc : Cleaned with backup
C:\WINDOWS\sysyg32.dll:kiylj -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\sysza32.dll:zhguek -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\twain.dll:bbrfaw -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\twain.dll:pqusg -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\tzmld.txt:naxnna -> Trojan.Agent.bi : Cleaned with backup
C:\WINDOWS\vb.ini:sjamdq -> Spyware.OneMoreSearch : Cleaned with backup
C:\WINDOWS\winel.dll:eek:ownnr -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\winoo32.dll:duvvok -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\WinPoET_PreInstallation.txt:ustke -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\wjxzq.txt:dcbyzv -> Trojan.Agent.bi : Cleaned with backup
C:\WINDOWS\xnskh.txt:ungxmv -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\yamjc.txt:tsnkwu -> TrojanDownloader.Agent.ap : Cleaned with backup
C:\WINDOWS\yogzg.txt:awjla -> TrojanDownloader.Agent.kd : Cleaned with backup
C:\WINDOWS\yogzg.txt:wltaq -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\zragz.txt:yjmsvo -> TrojanDownloader.Agent.bq : Cleaned with backup


::Report End
 
Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 807,865 other people just like you!

Latest posts

Top