1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Solved: Ctrl+Alt+Delete Won't Work Please Help the Task Manager is always suppost to work!!

Discussion in 'Windows XP' started by ferrija1, Apr 12, 2006.

Thread Status:
Not open for further replies.
Advertisement
  1. ferrija1

    ferrija1 Thread Starter

    Joined:
    Apr 11, 2006
    Messages:
    7,954
    HELP Ctrl+Alt+Delete Wont Work​


    Hello

    I just recently tried to use Ctrl+Alt+Delete but it wouldn't work please help!!!!
    I haven't recently installed anything I tried enabling everything from msconfig.

    HELP


    Ctrl+Alt+Delete is supposed to be your last resort, the thing that always works, the last trick up your sleeve, the best weapon you have...but now it doesn't work.
    :( :( :( :( :( :( :( :( :( :( :( :( :( :( :( :( :( :( :(:( they won't even let me have any more smilies...
     
  2. Cheeseball81

    Cheeseball81 Retired Moderator

    Joined:
    Mar 3, 2004
    Messages:
    84,315
    You may be infected with something.

    * Click here to download HJTsetup.exe.
    Save HJTsetup.exe to your desktop.

    Double click on the HJTsetup.exe icon on your desktop.
    By default it will install to C:\Program Files\Hijack This.
    Continue to click Next in the setup dialogue boxes until you get to the Select Addition Tasks dialogue.
    Put a check by Create a desktop icon then click Next again.
    Continue to follow the rest of the prompts from there.
    At the final dialogue box click Finish and it will launch Hijack This.
    Click on the Do a system scan and save a log file button. It will scan and then ask you to save the log.
    Click Save to save the log file and then the log will open in notepad.
    Click on "Edit > Select All" then click on "Edit > Copy" to copy the entire contents of the log.
    Come back here to this thread and Paste the log in your next reply.
    DO NOT have Hijack This fix anything yet. Most of what it finds will be harmless or even required.
     
  3. Cheeseball81

    Cheeseball81 Retired Moderator

    Joined:
    Mar 3, 2004
    Messages:
    84,315
    Wow the Hijack This log is impossible to read.
    Please rescan with Hijack This.
    When the log opens in Notepad, go to Format and select Wordwrap.
    Then copy and paste the log here.
     
  4. ferrija1

    ferrija1 Thread Starter

    Joined:
    Apr 11, 2006
    Messages:
    7,954
  5. ferrija1

    ferrija1 Thread Starter

    Joined:
    Apr 11, 2006
    Messages:
    7,954
    Logfile of HijackThis v1.99.1
    Scan saved at 2:33:00 PM, on 4/12/2006
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Verizon\Verizon Internet Security Suite\fws.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\PROGRA~1\COMMON~1\AOL\ACS\AOLacsd.exe
    C:\WINDOWS\system32\cisvc.exe
    C:\WINDOWS\eHome\ehRecvr.exe
    C:\WINDOWS\eHome\ehSched.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
    C:\WINDOWS\system32\dllhost.exe
    C:\Program Files\Common Files\Stardock\SDMCP.exe
    C:\Program Files\Verizon\Servicepoint\VerizonServicepoint.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
    C:\WINDOWS\stsystra.exe
    C:\WINDOWS\ehome\ehtray.exe
    C:\WINDOWS\system32\dla\tfswctrl.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\WINDOWS\eHome\ehmsas.exe
    C:\PROGRA~1\MYWEBS~1\bar\1.bin\mwsoemon.exe
    C:\Program Files\Free Download Manager\fdm.exe
    C:\Program Files\Google\Google Updater\1.1.454.29157\GoogleUpdater.exe
    C:\Program Files\Google\Web Accelerator\GoogleWebAccWarden.exe
    C:\Documents and Settings\All Users\Start Menu\Programs\Startup\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\LimeWire\LimeWire.exe
    C:\Program Files\Stardock\ObjectDock\ObjectDock.exe
    C:\Program Files\Google\Web Accelerator\googlewebaccclient.exe
    C:\WINDOWS\system32\cidaemon.exe
    C:\Program Files\Microsoft Office\Office10\WINWORD.EXE
    C:\WINDOWS\msagent\AgentSvr.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\explorer.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Common Files\Command Software\dvpapi.exe
    C:\Program Files\Common Files\Symantec Shared\Security Center\SymSCUI.exe
    C:\Program Files\Hijackthis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell4me.com/myway
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://dslstart.verizon.net/
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.dell4me.com/myway
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://localhost:9100/proxy.pac
    R3 - URLSearchHook: (no name) - {4D25F926-B9FE-4682-BF72-8AB8210D6D75} - C:\Program Files\MyWaySA\SrchAsDe\deSrcAs.dll
    R3 - URLSearchHook: (no name) - <default> - (no file)
    O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: Pop-Up Blocker BHO - {3C060EA2-E6A9-4E49-A530-D4657B8C449A} - C:\Program Files\Verizon\Verizon Internet Security Suite\pkR.dll
    O2 - BHO: (no name) - {4D25F921-B9FE-4682-BF72-8AB8210D6D75} - C:\Program Files\MyWaySA\SrchAsDe\deSrcAs.dll
    O2 - BHO: Verizon Broadband Toolbar - {4E7BD74F-2B8D-469E-D0FC-E57AF4D5FA7D} - C:\WINDOWS\DOWNLO~1\vzbb.dll
    O2 - BHO: Form Filler BHO - {56071E0D-C61B-11D3-B41C-00E02927A304} - C:\Program Files\Verizon\Verizon Internet Security Suite\FBHR.dll
    O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
    O2 - BHO: Google Web Accelerator Helper - {69A87B7D-DE56-4136-9655-716BA50C19C7} - C:\Program Files\Google\Web Accelerator\GoogleWebAccToolbar.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O3 - Toolbar: Google Web Accelerator - {DB87BFA2-A2E3-451E-8E5A-C89982D87CBF} - C:\Program Files\Google\Web Accelerator\GoogleWebAccToolbar.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
    O3 - Toolbar: Verizon Broadband Toolbar - {4E7BD74F-2B8D-469E-D0FC-E57AF4D5FA7D} - C:\WINDOWS\DOWNLO~1\vzbb.dll
    O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
    O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe
    O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Elements 4.0\apdproxy.exe"
    O4 - HKLM\..\Run: [VerizonServicepoint.exe] C:\Program Files\Verizon\Servicepoint\VerizonServicepoint.exe
    O4 - HKLM\..\Run: [Verizon Internet Security Suite] "C:\Program Files\Verizon\Verizon Internet Security Suite\Rps.exe"
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [My Web Search Bar] rundll32 C:\PROGRA~1\MYWEBS~1\bar\1.bin\MWSBAR.DLL,S
    O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
    O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
    O4 - HKLM\..\Run: [SigmatelSysTrayApp] stsystra.exe
    O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
    O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SpyderBar] C:\Program Files\TGTSoft\SpyderBar\SpyderBar.exe
    O4 - HKCU\..\Run: [MyWebSearch Email Plugin] C:\PROGRA~1\MYWEBS~1\bar\1.bin\mwsoemon.exe
    O4 - HKCU\..\Run: [Free Download Manager] C:\Program Files\Free Download Manager\fdm.exe -autorun
    O4 - Startup: LimeWire On Startup.lnk = C:\Program Files\LimeWire\LimeWire.exe
    O4 - Startup: Morpheus.lnk = C:\Program Files\Morpheus\Morpheus.exe
    O4 - Startup: Stardock ObjectDock.lnk = C:\Program Files\Stardock\ObjectDock\ObjectDock.exe
    O4 - User Startup: LimeWire On Startup.lnk = C:\Program Files\LimeWire\LimeWire.exe
    O4 - User Startup: Morpheus.lnk = C:\Program Files\Morpheus\Morpheus.exe
    O4 - User Startup: Stardock ObjectDock.lnk = C:\Program Files\Stardock\ObjectDock\ObjectDock.exe
    O4 - Global Startup: Google Updater.lnk = C:\Program Files\Google\Google Updater\1.1.454.29157\GoogleUpdater.exe
    O4 - Global Startup: Run Google Web Accelerator.lnk = C:\Program Files\Google\Web Accelerator\GoogleWebAccWarden.exe
    O4 - Global Startup: svchost.exe
    O8 - Extra context menu item: &Search - http://edits.mywebsearch.com/toolbaredits/menusearch.jhtml?p=ZNxmk762DJUS
    O8 - Extra context menu item: Download all with Free Download Manager - file://C:\Program Files\Free Download Manager\dlall.htm
    O8 - Extra context menu item: Download selected with Free Download Manager - file://C:\Program Files\Free Download Manager\dlselected.htm
    O8 - Extra context menu item: Download web site with Free Download Manager - file://C:\Program Files\Free Download Manager\dlpage.htm
    O8 - Extra context menu item: Download with Free Download Manager - file://C:\Program Files\Free Download Manager\dllink.htm
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\Office10\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O15 - Trusted Zone: http://www.pcworld.com
    O16 - DPF: {01113300-3E00-11D2-8470-0060089874ED} (Support.com Configuration Class) - https://activatemyfios.verizon.net/sdcCommon/download/tgctlcm.cab
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: {1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB} - http://ak.exe.imgfarm.com/images/nocache/funwebproducts/ei/SmileyCentralFWBInitialSetup1.0.0.15.cab
    O16 - DPF: {31E68DE2-5548-4B23-88F0-C51E6A0F695E} (Microsoft PID Sniffer) - https://support.microsoft.com/OAS/ActiveX/odc.cab
    O16 - DPF: {596AF4AC-40A0-474A-9F86-33F0A90F0FD6} (PictureItLauncher Class) - http://photos.msn.com/resources/neutral/controls/DigWebX2.cab
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1143165792230
    O16 - DPF: {A8F2B9BD-A6A0-486A-9744-18920D898429} (ScorchPlugin Class) - http://www.sibelius.com/download/software/win/ActiveXPlugin.cab
    O16 - DPF: {B020B534-4AA2-4B99-BD6D-5F6EE286DF5C} (Symantec Download Bridge) - https://a248.e.akamai.net/f/248/546...img/operations/symbizpr/xcontrol/SymDlBrg.cab
    O16 - DPF: {D2BD7935-05FC-11D2-9059-00C04FD7A1BD} - http://activex.microsoft.com/objects/ocget.dll
    O16 - DPF: {DECEAAA2-370A-49BB-9362-68C3A58DDC62} (SAIX) - http://static.zangocash.com/cab/Zan...858ddc2e736e:e3eb4becbb5c1ba39dd084361d36488e
    O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxdev.dll
    O20 - Winlogon Notify: MCPClient - C:\Program Files\Common Files\Stardock\mcpstub.dll
    O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: AOL Connectivity Service (AOL ACS) - America Online, Inc. - C:\PROGRA~1\COMMON~1\AOL\ACS\AOLacsd.exe
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: DvpApi (dvpapi) - Command Software Systems, Inc. - C:\Program Files\Common Files\Command Software\dvpapi.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: Verizon Internet Security Suite Firewall (RP_FWS) - Radialpoint Inc. - C:\Program Files\Verizon\Verizon Internet Security Suite\fws.exe
    O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
     
  6. ferrija1

    ferrija1 Thread Starter

    Joined:
    Apr 11, 2006
    Messages:
    7,954
    there you go
     
  7. Cheeseball81

    Cheeseball81 Retired Moderator

    Joined:
    Mar 3, 2004
    Messages:
    84,315
    Thank you. That is much easier.

    Uninstall the following from Add/Remove Programs (if listed there):

    My Way Search Assistant
    MyWebSearch


    * Click here to download Webroot SpySweeper.

    (It's a 2 week trial.)

    * Click the Free Trial link under "SpySweeper" to download the program.
    * Install it. Once the program is installed, it will open.
    * It will prompt you to update to the latest definitions, click Yes.
    * Once the definitions are installed, click Options on the left side.
    * Click the Sweep Options tab.
    * Under What to Sweep please put a check next to the following:
    o Sweep Memory
    o Sweep Registry
    o Sweep Cookies
    o Sweep All User Accounts
    o Enable Direct Disk Sweeping
    o Sweep Contents of Compressed Files
    o Sweep for Rootkits

    o Please UNCHECK Do not Sweep System Restore Folder.

    * Click Sweep Now on the left side.
    * Click the Start button.
    * When it's done scanning, click the Next button.
    * Make sure everything has a check next to it, then click the Next button.
    * It will remove all of the items found.
    * Click Session Log in the upper right corner, copy everything in that window.
    * Click the Summary tab and click Finish.
    * Paste the contents of the session log you copied into your next reply.

    Also post a new Hijack This log.
     
  8. ferrija1

    ferrija1 Thread Starter

    Joined:
    Apr 11, 2006
    Messages:
    7,954
    I am scanning now...
     
  9. ferrija1

    ferrija1 Thread Starter

    Joined:
    Apr 11, 2006
    Messages:
    7,954
    Thanks for all your help so far.
     
  10. Cheeseball81

    Cheeseball81 Retired Moderator

    Joined:
    Mar 3, 2004
    Messages:
    84,315
    Okay good. It may take awhile.
     
  11. ferrija1

    ferrija1 Thread Starter

    Joined:
    Apr 11, 2006
    Messages:
    7,954
    scanning...
     
  12. ferrija1

    ferrija1 Thread Starter

    Joined:
    Apr 11, 2006
    Messages:
    7,954
    still scanning...
     
  13. Cheeseball81

    Cheeseball81 Retired Moderator

    Joined:
    Mar 3, 2004
    Messages:
    84,315
    Figured it would take awhile...
     
  14. ferrija1

    ferrija1 Thread Starter

    Joined:
    Apr 11, 2006
    Messages:
    7,954
    Done Scanning...
     
  15. ferrija1

    ferrija1 Thread Starter

    Joined:
    Apr 11, 2006
    Messages:
    7,954
    ********
    2:48 PM: | Start of Session, Wednesday, April 12, 2006 |
    2:48 PM: Spy Sweeper started
    2:48 PM: Sweep initiated using definitions version 655
    2:48 PM: Starting Memory Sweep
    2:59 PM: Memory Sweep Complete, Elapsed Time: 00:10:37
    2:59 PM: Starting Registry Sweep
    2:59 PM: Found Adware: hotbar
    2:59 PM: HKLM\software\classes\clsid\{460ac4db-b0de-4626-a0f0-175dd84dcb9b}\ (2 subtraces) (ID = 127416)
    2:59 PM: HKLM\software\classes\typelib\{4cf5a3c1-07a2-4336-9b54-6870452ebde1}\ (ID = 127537)
    2:59 PM: HKLM\software\classes\typelib\{71e9cf40-af72-4b55-bd3f-1fea2a0eaea6}\ (ID = 127542)
    2:59 PM: HKLM\software\classes\typelib\{71efe583-62fe-4419-9918-ca3b683f7b36}\ (ID = 127543)
    2:59 PM: HKLM\software\classes\typelib\{793af621-5cd0-4b92-b765-6712f6aaf48e}\ (ID = 127545)
    2:59 PM: HKLM\software\classes\typelib\{9967a873-40f3-4c7e-9239-6c8760f19f61}\ (ID = 127547)
    2:59 PM: HKLM\software\classes\typelib\{45397063-d7d0-47c2-9508-26487608a298}\ (ID = 127549)
    2:59 PM: HKLM\software\classes\typelib\{b9f51d42-cca0-4408-bb02-d433d1865a3a}\ (ID = 127552)
    2:59 PM: HKLM\software\classes\typelib\{f8ee014f-b34c-4544-8e45-95a7971d323b}\ (ID = 127558)
    2:59 PM: HKCR\typelib\{4cf5a3c1-07a2-4336-9b54-6870452ebde1}\ (ID = 127635)
    2:59 PM: HKCR\typelib\{71e9cf40-af72-4b55-bd3f-1fea2a0eaea6}\ (ID = 127640)
    2:59 PM: HKCR\typelib\{71efe583-62fe-4419-9918-ca3b683f7b36}\ (ID = 127641)
    2:59 PM: HKCR\typelib\{793af621-5cd0-4b92-b765-6712f6aaf48e}\ (ID = 127643)
    2:59 PM: HKCR\typelib\{9967a873-40f3-4c7e-9239-6c8760f19f61}\ (ID = 127645)
    2:59 PM: HKCR\typelib\{45397063-d7d0-47c2-9508-26487608a298}\ (ID = 127647)
    2:59 PM: HKCR\typelib\{b9f51d42-cca0-4408-bb02-d433d1865a3a}\ (ID = 127651)
    2:59 PM: HKCR\typelib\{f8ee014f-b34c-4544-8e45-95a7971d323b}\ (ID = 127657)
    2:59 PM: Found Adware: timesink
    2:59 PM: HKLM\software\timesink, inc.\ (4 subtraces) (ID = 143767)
    2:59 PM: Found Adware: accoona toolbar
    2:59 PM: HKCR\typelib\{21f022c8-c045-4555-8a90-651e6a3dc6c6}\ (ID = 520528)
    2:59 PM: HKCR\typelib\{ea3956d2-ec38-41ab-b601-47aa281e4952}\ (ID = 520538)
    2:59 PM: HKLM\software\microsoft\windows\currentversion\uninstall\accoona toolbar\ (ID = 520624)
    2:59 PM: HKLM\software\microsoft\windows\currentversion\internet settings\5.0\user agent\post platform\ || hbtools 4.7.1 (ID = 869108)
    2:59 PM: HKCR\clsid\{f80c1d93-0d22-436e-963e-9d3156997a4e}\ (2 subtraces) (ID = 954998)
    2:59 PM: HKLM\software\classes\clsid\{f80c1d93-0d22-436e-963e-9d3156997a4e}\ (2 subtraces) (ID = 955055)
    2:59 PM: HKLM\software\classes\typelib\{21f022c8-c045-4555-8a90-651e6a3dc6c6}\ (ID = 955497)
    2:59 PM: HKLM\software\classes\typelib\{ea3956d2-ec38-41ab-b601-47aa281e4952}\ (ID = 955503)
    2:59 PM: Found Adware: winad
    2:59 PM: HKCR\appid\activex.dll\ || appid (ID = 1049592)
    2:59 PM: HKLM\software\classes\appid\activex.dll\ || appid (ID = 1049594)
    2:59 PM: HKCR\clsid\{460ac4db-b0de-4626-a0f0-175dd84dcb9b}\ (2 subtraces) (ID = 1084062)
    2:59 PM: Found Adware: 180search assistant/zango
    2:59 PM: HKCR\saix.installercaller.1\ (3 subtraces) (ID = 1156609)
    2:59 PM: HKCR\saix.installercaller\ (5 subtraces) (ID = 1156613)
    2:59 PM: HKCR\clsid\{deceaaa2-370a-49bb-9362-68c3a58ddc62}\ (15 subtraces) (ID = 1156619)
    2:59 PM: HKLM\software\classes\clsid\{deceaaa2-370a-49bb-9362-68c3a58ddc62}\ (15 subtraces) (ID = 1156640)
    2:59 PM: HKLM\software\classes\saix.installercaller.1\ (3 subtraces) (ID = 1156657)
    2:59 PM: HKLM\software\classes\saix.installercaller\ (5 subtraces) (ID = 1156661)
    2:59 PM: HKLM\software\microsoft\windows\currentversion\moduleusage\c:/windows/downloaded program files/saix.dll\ (2 subtraces) (ID = 1156667)
    2:59 PM: HKLM\software\microsoft\windows\currentversion\shareddlls\ || c:\windows\downloaded program files\saix.dll (ID = 1156675)
    2:59 PM: HKLM\software\microsoft\code store database\distribution units\{deceaaa2-370a-49bb-9362-68c3a58ddc62}\ (10 subtraces) (ID = 1156677)
    2:59 PM: Found Adware: dealbar toolbar
    2:59 PM: HKU\S-1-5-21-3339840375-680263248-2645039063-1007\software\microsoft\internet explorer\extensions\cmdmapping\ || {bfa03761-5565-41b3-93d9-82b354c0a8ec} (ID = 826846)
    2:59 PM: HKU\S-1-5-21-3339840375-680263248-2645039063-1007\software\microsoft\internet explorer\urlsearchhooks\{944864a5-3916-46e2-96a9-a2e84f3f1208}\ (ID = 955003)
    2:59 PM: HKU\S-1-5-21-3339840375-680263248-2645039063-1006\software\microsoft\internet explorer\toolbar\webbrowser\ || {3d782bb3-f2a5-11d3-bf4c-000000000000} (ID = 826103)
    2:59 PM: HKU\S-1-5-21-3339840375-680263248-2645039063-1006\software\microsoft\internet explorer\extensions\cmdmapping\ || {bfa03761-5565-41b3-93d9-82b354c0a8ec} (ID = 826846)
    3:00 PM: HKU\WRSS_Profile_S-1-5-21-3339840375-680263248-2645039063-1005\software\microsoft\internet explorer\toolbar\webbrowser\ || {3d782bb3-f2a5-11d3-bf4c-000000000000} (ID = 826103)
    3:00 PM: HKU\WRSS_Profile_S-1-5-21-3339840375-680263248-2645039063-1005\software\microsoft\internet explorer\extensions\cmdmapping\ || {bfa03761-5565-41b3-93d9-82b354c0a8ec} (ID = 826846)
    3:00 PM: Registry Sweep Complete, Elapsed Time:00:00:42
    3:00 PM: Starting Cookie Sweep
    3:00 PM: Found Spy Cookie: go.com cookie
    3:00 PM: [email protected][2].txt (ID = 2729)
    3:00 PM: Found Spy Cookie: adknowledge cookie
    3:00 PM: [email protected][2].txt (ID = 2072)
    3:00 PM: Found Spy Cookie: addynamix cookie
    3:00 PM: [email protected][2].txt (ID = 2062)
    3:00 PM: Found Spy Cookie: pointroll cookie
    3:00 PM: [email protected][1].txt (ID = 3148)
    3:00 PM: Found Spy Cookie: falkag cookie
    3:00 PM: [email protected][2].txt (ID = 2650)
    3:00 PM: Found Spy Cookie: ask cookie
    3:00 PM: [email protected][1].txt (ID = 2245)
    3:00 PM: Found Spy Cookie: atlas dmt cookie
    3:00 PM: [email protected][2].txt (ID = 2253)
    3:00 PM: Found Spy Cookie: atwola cookie
    3:00 PM: [email protected][1].txt (ID = 2255)
    3:00 PM: [email protected][1].txt (ID = 2728)
    3:00 PM: Found Spy Cookie: webtrends cookie
    3:00 PM: [email protected][1].txt (ID = 3669)
    3:00 PM: Found Spy Cookie: mediaplex cookie
    3:00 PM: [email protected][1].txt (ID = 6442)
    3:00 PM: Found Spy Cookie: 2o7.net cookie
    3:00 PM: [email protected][1].txt (ID = 1958)
    3:00 PM: Found Spy Cookie: overture cookie
    3:00 PM: [email protected][2].txt (ID = 3105)
    3:00 PM: Found Spy Cookie: pricegrabber cookie
    3:00 PM: [email protected][1].txt (ID = 3186)
    3:00 PM: [email protected][2].txt (ID = 3185)
    3:00 PM: Found Spy Cookie: valuead cookie
    3:00 PM: [email protected][2].txt (ID = 3627)
    3:00 PM: [email protected][1].txt (ID = 2729)
    3:00 PM: Found Spy Cookie: techtarget cookie
    3:00 PM: [email protected][1].txt (ID = 3500)
    3:00 PM: [email protected][1].txt (ID = 2650)
    3:00 PM: Found Spy Cookie: statcounter cookie
    3:00 PM: [email protected][2].txt (ID = 3447)
    3:00 PM: Found Spy Cookie: tacoda cookie
    3:00 PM: [email protected][2].txt (ID = 6444)
    3:00 PM: Found Spy Cookie: coremetrics cookie
    3:00 PM: [email protected][1].txt (ID = 2472)
    3:00 PM: Found Spy Cookie: burstbeacon cookie
    3:00 PM: [email protected][1].txt (ID = 2335)
    3:00 PM: Found Spy Cookie: websponsors cookie
    3:00 PM: [email protected][2].txt (ID = 3665)
    3:00 PM: Found Spy Cookie: specificclick.com cookie
    3:00 PM: [email protected][2].txt (ID = 3400)
    3:00 PM: Found Spy Cookie: adrevolver cookie
    3:00 PM: [email protected][1].txt (ID = 2088)
    3:00 PM: [email protected][2].txt (ID = 2088)
    3:00 PM: [email protected][2].txt (ID = 2062)
    3:00 PM: [email protected][2].txt (ID = 3148)
    3:00 PM: Found Spy Cookie: primaryads cookie
    3:00 PM: [email protected][2].txt (ID = 3190)
    3:00 PM: [email protected][2].txt (ID = 2255)
    3:00 PM: [email protected][1].txt (ID = 3106)
    3:00 PM: [email protected][1].txt (ID = 2729)
    3:00 PM: [email protected][2].txt (ID = 2728)
    3:00 PM: Found Spy Cookie: clickandtrack cookie
    3:00 PM: [email protected][2].txt (ID = 2397)
    3:00 PM: Found Spy Cookie: infospace cookie
    3:00 PM: [email protected][2].txt (ID = 2865)
    3:00 PM: Found Spy Cookie: fastclick cookie
    3:00 PM: [email protected][2].txt (ID = 2652)
    3:00 PM: Found Spy Cookie: mywebsearch cookie
    3:00 PM: [email protected][1].txt (ID = 3051)
    3:00 PM: [email protected][1].txt (ID = 1958)
    3:00 PM: Found Spy Cookie: paypopup cookie
    3:00 PM: [email protected][1].txt (ID = 3119)
    3:00 PM: [email protected][1].txt (ID = 3106)
    3:00 PM: [email protected][1].txt (ID = 2729)
    3:00 PM: [email protected][1].txt (ID = 2729)
    3:00 PM: [email protected][1].txt (ID = 2650)
    3:00 PM: [email protected][1].txt (ID = 2729)
    3:00 PM: Found Spy Cookie: upspiral cookie
    3:00 PM: [email protected][1].txt (ID = 3614)
    3:00 PM: [email protected][1].txt (ID = 2729)
    3:00 PM: Found Spy Cookie: redzip cookie
    3:00 PM: [email protected][1].txt (ID = 3250)
    3:00 PM: [email protected][2].txt (ID = 3615)
    3:00 PM: lindy [email protected][1].txt (ID = 2255)
    3:00 PM: lindy [email protected][1].txt (ID = 2728)
    3:00 PM: lindy [email protected][1].txt (ID = 1958)
    3:00 PM: lindy [email protected][1].txt (ID = 2729)
    3:00 PM: lindy [email protected][1].txt (ID = 2472)
    3:00 PM: Cookie Sweep Complete, Elapsed Time: 00:00:03
    3:00 PM: Starting File Sweep
    3:00 PM: c:\documents and settings\james\application data\hbtools (11 subtraces) (ID = -2147480879)
    3:00 PM: Found Adware: limeshop
    3:00 PM: c:\program files\limeshop (120 subtraces) (ID = -2147480733)
    3:00 PM: c:\program files\timesink (21 subtraces) (ID = -2147480152)
    3:09 PM: Found Adware: ebates money maker
    3:09 PM: cd.class (ID = 59507)
    3:09 PM: cl.class (ID = 59524)
    3:09 PM: cn.class (ID = 59528)
    3:09 PM: cu.class (ID = 59543)
    3:09 PM: ck.class (ID = 59521)
    3:09 PM: cv.class (ID = 59545)
    3:09 PM: cx.class (ID = 59548)
    3:09 PM: cs.class (ID = 59539)
    3:09 PM: cq.class (ID = 59534)
    3:09 PM: cr.class (ID = 59537)
    3:09 PM: da.class (ID = 59557)
    3:09 PM: dg.class (ID = 59568)
    3:09 PM: cz.class (ID = 59553)
    3:09 PM: dv.class (ID = 59600)
    3:09 PM: de.class (ID = 59564)
    3:09 PM: dj.class (ID = 59576)
    3:09 PM: cc.class (ID = 59506)
    3:09 PM: cj.class (ID = 59519)
    3:09 PM: ca.class (ID = 59501)
    3:09 PM: dl.class (ID = 59582)
    3:09 PM: bw.class (ID = 59492)
    3:10 PM: dq.class (ID = 59588)
    3:10 PM: dx.class (ID = 59604)
    3:10 PM: dm.class (ID = 59583)
    3:10 PM: dn.class (ID = 59584)
    3:10 PM: ch.class (ID = 59516)
    3:10 PM: dp.class (ID = 59586)
    3:10 PM: bc.class (ID = 59453)
    3:10 PM: br.class (ID = 59482)
    3:10 PM: bp.class (ID = 59478)
    3:10 PM: dy.class (ID = 59605)
    3:10 PM: dr.class (ID = 59591)
    3:10 PM: dz.class (ID = 59608)
    3:10 PM: ed.class (ID = 59657)
    3:10 PM: system.dls (ID = 59701)
    3:10 PM: bm.class (ID = 59471)
    3:10 PM: cf.class (ID = 59511)
    3:10 PM: bk.class (ID = 59468)
    3:10 PM: topmoxie_conflicts2.htm (ID = 59712)
    3:10 PM: cb.class (ID = 59504)
    3:10 PM: topmoxie_proxy.htm (ID = 59713)
    3:10 PM: limeshop_readme.txt (ID = 65532)
    3:10 PM: bh.class (ID = 59461)
    3:10 PM: bf.class (ID = 59458)
    3:11 PM: be.class (ID = 59457)
    3:11 PM: bz.class (ID = 59498)
    3:11 PM: bu.class (ID = 59487)
    3:11 PM: n.class (ID = 59687)
    3:11 PM: l.class (ID = 59673)
    3:11 PM: f.class (ID = 59660)
    3:11 PM: d.class (ID = 59555)
    3:11 PM: b.class (ID = 59446)
    3:11 PM: r.class (ID = 59694)
    3:11 PM: bo.class (ID = 59475)
    3:11 PM: bl.class (ID = 59469)
    3:11 PM: bi.class (ID = 59463)
    3:12 PM: bg.class (ID = 59460)
    3:16 PM: a0123835.dll (ID = 178624)
    3:20 PM: a0123830.exe (ID = 121066)
    3:24 PM: a0123843.exe (ID = 178634)
    3:24 PM: a0123836.exe (ID = 157504)
    3:26 PM: a0123844.exe (ID = 178636)
    3:30 PM: a0123840.exe (ID = 178630)
    3:33 PM: limeshop.exe (ID = 65525)
    3:33 PM: ds.class (ID = 59593)
    3:39 PM: a0123837.dll (ID = 178627)
    3:47 PM: Warning: Failed to open file "c:\documents and settings\all users\desktop\owner's manual.lnk". Access is denied
    3:48 PM: a0123841.exe (ID = 178631)
    3:53 PM: a0123839.dll (ID = 178629)
    3:54 PM: a0123834.exe (ID = 178623)
    3:55 PM: a0123842.dll (ID = 178632)
    3:56 PM: a0123838.dll (ID = 178628)
    4:02 PM: 7ac831f9-4722-4278-a8c3-076674 (ID = 178626)
    4:02 PM: a0123825.dll (ID = 184244)
    4:14 PM: eb.class (ID = 59614)
    4:14 PM: q.class (ID = 59693)
    4:14 PM: e.class (ID = 59610)
    4:14 PM: g.class (ID = 59663)
    4:14 PM: ec.class (ID = 59654)
    4:14 PM: i.class (ID = 59665)
    4:14 PM: k.class (ID = 59671)
    4:14 PM: s.class (ID = 59698)
    4:14 PM: a.class (ID = 59443)
    4:14 PM: m.class (ID = 59678)
    4:14 PM: j.class (ID = 59670)
    4:14 PM: p.class (ID = 59689)
    4:14 PM: v.class (ID = 59718)
    4:14 PM: x.class (ID = 59729)
    4:14 PM: ba.class (ID = 59449)
    4:14 PM: bd.class (ID = 59455)
    4:14 PM: bj.class (ID = 59466)
    4:14 PM: bq.class (ID = 59480)
    4:14 PM: bs.class (ID = 59484)
    4:14 PM: bv.class (ID = 59490)
    4:14 PM: t.class (ID = 59708)
    4:14 PM: cg.class (ID = 59513)
    4:14 PM: ci.class (ID = 59517)
    4:14 PM: cm.class (ID = 59526)
    4:14 PM: co.class (ID = 59530)
    4:14 PM: cw.class (ID = 59547)
    4:14 PM: cy.class (ID = 59551)
    4:14 PM: dc.class (ID = 59561)
    4:14 PM: u.class (ID = 59714)
    4:14 PM: dh.class (ID = 59570)
    4:14 PM: dk.class (ID = 59579)
    4:14 PM: du.class (ID = 59596)
    4:15 PM: Warning: Unhandled Archive Type
    4:16 PM: Warning: Unhandled Archive Type
    4:16 PM: Warning: Unhandled Archive Type
    4:16 PM: File Sweep Complete, Elapsed Time: 01:16:30
    4:16 PM: Full Sweep has completed. Elapsed time 01:27:58
    4:16 PM: Traces Found: 428
    4:30 PM: Removal process initiated
    4:30 PM: Quarantining All Traces: 180search assistant/zango
    4:30 PM: Quarantining All Traces: hotbar
    4:30 PM: Quarantining All Traces: winad
    4:30 PM: Quarantining All Traces: accoona toolbar
    4:30 PM: Quarantining All Traces: dealbar toolbar
    4:30 PM: Quarantining All Traces: ebates money maker
    4:30 PM: IE Security Shield: found: C:\PROGRAM FILES\GOLD MINER\GOLDMINER.EXE -- IE Security modification allowed at user request
    4:30 PM: Quarantining All Traces: limeshop
    4:30 PM: Quarantining All Traces: timesink
    4:30 PM: Quarantining All Traces: 2o7.net cookie
    4:30 PM: Quarantining All Traces: addynamix cookie
    4:30 PM: Quarantining All Traces: adknowledge cookie
    4:30 PM: Quarantining All Traces: adrevolver cookie
    4:30 PM: Quarantining All Traces: ask cookie
    4:30 PM: Quarantining All Traces: atlas dmt cookie
    4:30 PM: Quarantining All Traces: atwola cookie
    4:30 PM: Quarantining All Traces: burstbeacon cookie
    4:30 PM: Quarantining All Traces: clickandtrack cookie
    4:30 PM: Quarantining All Traces: coremetrics cookie
    4:30 PM: Quarantining All Traces: falkag cookie
    4:30 PM: Quarantining All Traces: fastclick cookie
    4:30 PM: Quarantining All Traces: go.com cookie
    4:30 PM: Quarantining All Traces: infospace cookie
    4:30 PM: Quarantining All Traces: mediaplex cookie
    4:30 PM: Quarantining All Traces: mywebsearch cookie
    4:30 PM: Quarantining All Traces: overture cookie
    4:30 PM: Quarantining All Traces: paypopup cookie
    4:30 PM: Quarantining All Traces: pointroll cookie
    4:30 PM: Quarantining All Traces: pricegrabber cookie
    4:30 PM: Quarantining All Traces: primaryads cookie
    4:30 PM: Quarantining All Traces: redzip cookie
    4:30 PM: Quarantining All Traces: specificclick.com cookie
    4:30 PM: Quarantining All Traces: statcounter cookie
    4:30 PM: Quarantining All Traces: tacoda cookie
    4:30 PM: Quarantining All Traces: techtarget cookie
    4:30 PM: Quarantining All Traces: upspiral cookie
    4:30 PM: Quarantining All Traces: valuead cookie
    4:30 PM: Quarantining All Traces: websponsors cookie
    4:30 PM: Quarantining All Traces: webtrends cookie
    4:31 PM: Removal process completed. Elapsed time 00:00:58
    ********
    2:47 PM: | Start of Session, Wednesday, April 12, 2006 |
    2:47 PM: Spy Sweeper started
    2:47 PM: Sweep initiated using definitions version 655
    2:47 PM: Starting Memory Sweep
    2:47 PM: Sweep Canceled
    2:47 PM: Memory Sweep Complete, Elapsed Time: 00:00:20
    2:47 PM: Traces Found: 0
    2:48 PM: | End of Session, Wednesday, April 12, 2006 |
    ********
    2:46 PM: | Start of Session, Wednesday, April 12, 2006 |
    2:46 PM: Spy Sweeper started
    2:46 PM: Your spyware definitions have been updated.
    2:47 PM: | End of Session, Wednesday, April 12, 2006 |
     
  16. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/458452

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice