1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Solved: Weird virus or something? HELP! "D:\WINDOWS\system32\DL5EB7~1.EXE"

Discussion in 'Virus & Other Malware Removal' started by sv490665, Jan 28, 2007.

Thread Status:
Not open for further replies.
Advertisement
  1. sv490665

    sv490665 Thread Starter

    Joined:
    Jan 28, 2007
    Messages:
    11
    Hey, the above DL5EB7~1.EXE thing is happening to me too and i just downloaded Hijackthis, followed the instructions above, and so here is my log of the scan, please help! :confused: Thanks

    Logfile of HijackThis v1.99.1
    Scan saved at 8:38:53 PM, on 1/28/2007
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    D:\WINDOWS\System32\smss.exe
    D:\WINDOWS\system32\winlogon.exe
    D:\WINDOWS\system32\services.exe
    D:\WINDOWS\system32\lsass.exe
    D:\WINDOWS\system32\svchost.exe
    D:\WINDOWS\System32\svchost.exe
    D:\WINDOWS\system32\spoolsv.exe
    D:\WINDOWS\system32\pctspk.exe
    D:\WINDOWS\System32\svchost.exe
    D:\WINDOWS\system32\ntvdm.exe
    D:\WINDOWS\system32\dla\tfswctrl.exe
    D:\WINDOWS\System32\P2P Networking\P2P Networking.exe
    D:\Program Files\iTunes\iTunesHelper.exe
    D:\Program Files\QuickTime\qttask.exe
    D:\Program Files\Java\jre1.5.0_03\bin\jusched.exe
    D:\WINDOWS\System32\kernels88.exe
    D:\Program Files\Juno\exec.exe
    D:\Program Files\Messenger\msmsgs.exe
    D:\Program Files\iPod\bin\iPodService.exe
    D:\OPLIMIT\ocrawr32.exe
    D:\Program Files\Juno\exec.exe
    D:\WINDOWS\explorer.exe
    D:\Program Files\Internet Explorer\iexplore.exe
    D:\Program Files\Hijackthis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://my.juno.com/s/search?r=minisearch
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://my.juno.com/s/search?r=minisearch
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://surfline.com/surfline/livecams/getsurfmapsurfbreakreport.cfm?alias=obcam
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://my.juno.com/s/search?r=minisearch
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://my.juno.com/s/search?r=minisearch
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://my.juno.com/s/search?r=minisearch
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://my.juno.com/s/search?r=minisearch
    R3 - URLSearchHook: URLSearchHook Class - {37D2CDBF-2AF4-44AA-8113-BD0D2DA3C2B8} - D:\Program Files\JUSearch\SearchEnh1.dll
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    F3 - REG:win.ini: load=D:\OPLIMIT\ocraware.exe
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - D:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
    O2 - BHO: RXResultTracker Class - {59879FA4-4790-461c-A1CC-4EC4DE4CA483} - D:\PROGRA~1\RXTOOL~1\sfcont.dll (file missing)
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - D:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - D:\WINDOWS\system32\dla\tfswshx.dll
    O2 - BHO: (no name) - {5E9755A1-314A-4ae6-99E1-B9F7DC7C7CF0} - D:\WINDOWS\System32\2C.tmp
    O2 - BHO: (no name) - {7A1693A1-AFAF-4F1E-9B05-EEC38A85FBF3} - D:\WINDOWS\system32\9rfw2cz.dll (file missing)
    O2 - BHO: (no name) - {7DA39570-5FD2-4f18-94B4-20730CB3F727} - D:\WINDOWS\System32\vista.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - D:\WINDOWS\System32\msdxm.ocx
    O3 - Toolbar: JunoBar - {5854FAC4-5BF0-47DD-B5A9-A5EA8CFF3CF4} - D:\Program Files\Juno\Toolbar.dll
    O4 - HKLM\..\Run: [dla] D:\WINDOWS\system32\dla\tfswctrl.exe
    O4 - HKLM\..\Run: [StorageGuard] "D:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe" /r
    O4 - HKLM\..\Run: [P2P Networking] D:\WINDOWS\System32\P2P Networking\P2P Networking.exe /AUTOSTART
    O4 - HKLM\..\Run: [iTunesHelper] "D:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "D:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [SunJavaUpdateSched] D:\Program Files\Java\jre1.5.0_03\bin\jusched.exe
    O4 - HKLM\..\Run: [System] D:\WINDOWS\System32\kernels88.exe
    O4 - HKLM\..\Run: [DllRunning] rundll32.exe "D:\WINDOWS\bywuro.dll",setvm
    O4 - HKCU\..\Run: [Juno_uoltray] D:\Program Files\Juno\exec.exe regrun
    O4 - HKCU\..\Run: [MSMSGS] "D:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [spc_w] "D:\Program Files\JUSearch\juspc.exe" -w
    O4 - Global Startup: Adobe Gamma Loader.exe.lnk = D:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Microsoft Office.lnk = D:\Program Files\Microsoft Office\Office\OSA9.EXE
    O8 - Extra context menu item: &Yahoo! Search - file:///D:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///D:\Program Files\Yahoo!\Common/ycdict.htm
    O8 - Extra context menu item: Yahoo! &Maps - file:///D:\Program Files\Yahoo!\Common/ycmap.htm
    O8 - Extra context menu item: Yahoo! &SMS - file:///D:\Program Files\Yahoo!\Common/ycsms.htm
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - D:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - D:\WINDOWS\web\related.htm
    O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - D:\WINDOWS\web\related.htm
    O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - D:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
    O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - D:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\MSMSGS.EXE
    O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab31267.cab
    O16 - DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} (StagingUI Object) - http://zone.msn.com/binFrameWork/v10/StagingUI.cab53083.cab
    O16 - DPF: {1D6711C8-7154-40BB-8380-3DEA45B69CBF} (Web P2P Installer) -
    O16 - DPF: {26098EA2-C95D-48EA-89B4-63C5A63BD42F} - http://www.pacimedia.com/install/pcs_0025.exe
    O16 - DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} (ZoneBuddy Class) - http://zone.msn.com/BinFrameWork/v10/ZBuddy.cab53083.cab
    O16 - DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} (ZonePAChat Object) - http://zone.msn.com/binframework/v10/ZPAChat.cab53083.cab
    O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/EN-US/a-UNO1/GAME_UNO1.cab
    O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
    O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://cdn2.zone.msn.com/binFramework/v10/ZIntro.cab53083.cab
    O16 - DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} (StadiumProxy Class) - http://zone.msn.com/binframework/v10/StProxy.cab53852.cab
    O16 - DPF: {FF3C5A9F-5A91-4930-80E8-4709194C2AD3} (CheckersZPA Object) - http://zone.msn.com/bingame/zpagames/CheckersZPA.cab53083.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{8284CEBB-8BED-4AC3-89A6-0AA1C2AE94AB}: NameServer = 64.136.20.121 64.136.28.121
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "D:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
    O18 - Filter: text/html - {2AB289AE-4B90-4281-B2AE-1F4BB034B647} - D:\PROGRA~1\RXTOOL~1\sfcont.dll
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - D:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - D:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: PCTEL Speaker Phone (Pctspk) - PCtel, Inc. - D:\WINDOWS\system32\pctspk.exe
    O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - %ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini (file missing)
     
  2. sv490665

    sv490665 Thread Starter

    Joined:
    Jan 28, 2007
    Messages:
    11
    Hi, I got a problem here. Everytime I start up my computer MS-DOS windows pop up and when I do ctrl+alt+del i get this message: "task manager has been disabled by your administrator" so i go into 'run' to get my task manager back, but then these MS-DOS windows come up, sometimes they pop up like 5 or 6 at a time and then they just go away. Then every once in a while they flash up for a second and go away again, it's annoying, and i think they say something like D:\WINDOWS\system32\DL5EB7~1.EXE. I followed Cheeseball81's advice to download Hijack This and here is a copy of the log, now do i need to delete any of these processes to get rid of this or something? I have a feeling it's some sort of a trojan or something but i'm not sure. I don't know where to go from here... I'm on Windows XP. If you need any other information to help me fix this, just let me know. Any help/advice is much appreciated!!!(y)

    Logfile of HijackThis v1.99.1
    Scan saved at 8:38:53 PM, on 1/28/2007
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    D:\WINDOWS\System32\smss.exe
    D:\WINDOWS\system32\winlogon.exe
    D:\WINDOWS\system32\services.exe
    D:\WINDOWS\system32\lsass.exe
    D:\WINDOWS\system32\svchost.exe
    D:\WINDOWS\System32\svchost.exe
    D:\WINDOWS\system32\spoolsv.exe
    D:\WINDOWS\system32\pctspk.exe
    D:\WINDOWS\System32\svchost.exe
    D:\WINDOWS\system32\ntvdm.exe
    D:\WINDOWS\system32\dla\tfswctrl.exe
    D:\WINDOWS\System32\P2P Networking\P2P Networking.exe
    D:\Program Files\iTunes\iTunesHelper.exe
    D:\Program Files\QuickTime\qttask.exe
    D:\Program Files\Java\jre1.5.0_03\bin\jusched.exe
    D:\WINDOWS\System32\kernels88.exe
    D:\Program Files\Juno\exec.exe
    D:\Program Files\Messenger\msmsgs.exe
    D:\Program Files\iPod\bin\iPodService.exe
    D:\OPLIMIT\ocrawr32.exe
    D:\Program Files\Juno\exec.exe
    D:\WINDOWS\explorer.exe
    D:\Program Files\Internet Explorer\iexplore.exe
    D:\Program Files\Hijackthis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://my.juno.com/s/search?r=minisearch
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://my.juno.com/s/search?r=minisearch
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://surfline.com/surfline/livecam...fm?alias=obcam
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://my.juno.com/s/search?r=minisearch
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://my.juno.com/s/search?r=minisearch
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://my.juno.com/s/search?r=minisearch
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://my.juno.com/s/search?r=minisearch
    R3 - URLSearchHook: URLSearchHook Class - {37D2CDBF-2AF4-44AA-8113-BD0D2DA3C2B8} - D:\Program Files\JUSearch\SearchEnh1.dll
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    F3 - REG:win.ini: load=D:\OPLIMIT\ocraware.exe
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - D:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
    O2 - BHO: RXResultTracker Class - {59879FA4-4790-461c-A1CC-4EC4DE4CA483} - D:\PROGRA~1\RXTOOL~1\sfcont.dll (file missing)
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - D:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - D:\WINDOWS\system32\dla\tfswshx.dll
    O2 - BHO: (no name) - {5E9755A1-314A-4ae6-99E1-B9F7DC7C7CF0} - D:\WINDOWS\System32\2C.tmp
    O2 - BHO: (no name) - {7A1693A1-AFAF-4F1E-9B05-EEC38A85FBF3} - D:\WINDOWS\system32\9rfw2cz.dll (file missing)
    O2 - BHO: (no name) - {7DA39570-5FD2-4f18-94B4-20730CB3F727} - D:\WINDOWS\System32\vista.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - D:\WINDOWS\System32\msdxm.ocx
    O3 - Toolbar: JunoBar - {5854FAC4-5BF0-47DD-B5A9-A5EA8CFF3CF4} - D:\Program Files\Juno\Toolbar.dll
    O4 - HKLM\..\Run: [dla] D:\WINDOWS\system32\dla\tfswctrl.exe
    O4 - HKLM\..\Run: [StorageGuard] "D:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe" /r
    O4 - HKLM\..\Run: [P2P Networking] D:\WINDOWS\System32\P2P Networking\P2P Networking.exe /AUTOSTART
    O4 - HKLM\..\Run: [iTunesHelper] "D:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "D:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [SunJavaUpdateSched] D:\Program Files\Java\jre1.5.0_03\bin\jusched.exe
    O4 - HKLM\..\Run: [System] D:\WINDOWS\System32\kernels88.exe
    O4 - HKLM\..\Run: [DllRunning] rundll32.exe "D:\WINDOWS\bywuro.dll",setvm
    O4 - HKCU\..\Run: [Juno_uoltray] D:\Program Files\Juno\exec.exe regrun
    O4 - HKCU\..\Run: [MSMSGS] "D:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [spc_w] "D:\Program Files\JUSearch\juspc.exe" -w
    O4 - Global Startup: Adobe Gamma Loader.exe.lnk = D:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Microsoft Office.lnk = D:\Program Files\Microsoft Office\Office\OSA9.EXE
    O8 - Extra context menu item: &Yahoo! Search - file:///D:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///D:\Program Files\Yahoo!\Common/ycdict.htm
    O8 - Extra context menu item: Yahoo! &Maps - file:///D:\Program Files\Yahoo!\Common/ycmap.htm
    O8 - Extra context menu item: Yahoo! &SMS - file:///D:\Program Files\Yahoo!\Common/ycsms.htm
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - D:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - D:\WINDOWS\web\related.htm
    O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - D:\WINDOWS\web\related.htm
    O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - D:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
    O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - D:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\MSMSGS.EXE
    O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary...r.cab31267.cab
    O16 - DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} (StagingUI Object) - http://zone.msn.com/binFrameWork/v10...I.cab53083.cab
    O16 - DPF: {1D6711C8-7154-40BB-8380-3DEA45B69CBF} (Web P2P Installer) -
    O16 - DPF: {26098EA2-C95D-48EA-89B4-63C5A63BD42F} - http://www.pacimedia.com/install/pcs_0025.exe
    O16 - DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} (ZoneBuddy Class) - http://zone.msn.com/BinFrameWork/v10...y.cab53083.cab
    O16 - DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} (ZonePAChat Object) - http://zone.msn.com/binframework/v10...t.cab53083.cab
    O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/EN-US/.../GAME_UNO1.cab
    O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary...t.cab31267.cab
    O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://cdn2.zone.msn.com/binFramewor...o.cab53083.cab
    O16 - DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} (StadiumProxy Class) - http://zone.msn.com/binframework/v10...y.cab53852.cab
    O16 - DPF: {FF3C5A9F-5A91-4930-80E8-4709194C2AD3} (CheckersZPA Object) - http://zone.msn.com/bingame/zpagames...A.cab53083.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{8284CEBB-8BED-4AC3-89A6-0AA1C2AE94AB}: NameServer = 64.136.20.121 64.136.28.121
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "D:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
    O18 - Filter: text/html - {2AB289AE-4B90-4281-B2AE-1F4BB034B647} - D:\PROGRA~1\RXTOOL~1\sfcont.dll
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - D:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - D:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: PCTEL Speaker Phone (Pctspk) - PCtel, Inc. - D:\WINDOWS\system32\pctspk.exe
    O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - %ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini (file missing)
     
  3. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Hi Welcome to TSG!!

    I've moved you to a thread of your own so please reply here.


    Please download VundoFix.exe to your desktop.
    • Double-click VundoFix.exe to run it.
    • Click the Scan for Vundo button.
    • Once it's done scanning, click the Remove Vundo button.
    • You will receive a prompt asking if you want to remove the files, click YES
    • Once you click yes, your desktop will go blank as it starts removing Vundo.
    • When completed, it will prompt that it will shutdown your computer, click OK.
    • Turn your computer back on.
    • Please post the contents of C:\vundofix.txt and a new HiJackThis log.

    Note: It is possible that VundoFix encountered a file it could not remove.
    In this case, VundoFix will run on reboot, simply follow the above instructions starting from "Click the Scan for Vundo button." when VundoFix appears at reboot.
     
  4. sv490665

    sv490665 Thread Starter

    Joined:
    Jan 28, 2007
    Messages:
    11
    VundoFix V6.3.5

    Checking Java version...

    Java version is 1.5.0.3

    Scan started at 3:46:48 PM 1/29/2007

    Listing files found while scanning....


    VundoFix V6.3.5

    Checking Java version...

    Java version is 1.5.0.3

    Scan started at 6:14:31 PM 1/29/2007

    Listing files found while scanning....

    D:\DOCUME~1\FULLER\LOCALS~1\Temp\vista.dll
    D:\WINDOWS\System32\2C.tmp
    D:\WINDOWS\System32\vista.dll

    Beginning removal...

    Attempting to delete D:\DOCUME~1\FULLER\LOCALS~1\Temp\vista.dll
    D:\DOCUME~1\FULLER\LOCALS~1\Temp\vista.dll Has been deleted!

    Attempting to delete D:\WINDOWS\System32\2C.tmp
    D:\WINDOWS\System32\2C.tmp Has been deleted!

    Attempting to delete D:\WINDOWS\System32\vista.dll
    D:\WINDOWS\System32\vista.dll Has been deleted!

    Performing Repairs to the registry.
    Done!
     
  5. sv490665

    sv490665 Thread Starter

    Joined:
    Jan 28, 2007
    Messages:
    11
    Logfile of HijackThis v1.99.1
    Scan saved at 8:25:44 PM, on 1/29/2007
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    D:\WINDOWS\System32\smss.exe
    D:\WINDOWS\system32\winlogon.exe
    D:\WINDOWS\system32\services.exe
    D:\WINDOWS\system32\savedump.exe
    D:\WINDOWS\system32\lsass.exe
    D:\WINDOWS\system32\svchost.exe
    D:\WINDOWS\System32\svchost.exe
    D:\WINDOWS\system32\spoolsv.exe
    D:\WINDOWS\system32\pctspk.exe
    D:\WINDOWS\System32\svchost.exe
    D:\WINDOWS\Explorer.EXE
    D:\WINDOWS\system32\ntvdm.exe
    D:\WINDOWS\system32\dla\tfswctrl.exe
    D:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe
    D:\WINDOWS\System32\P2P Networking\P2P Networking.exe
    D:\Program Files\iTunes\iTunesHelper.exe
    D:\Program Files\QuickTime\qttask.exe
    D:\Program Files\Java\jre1.5.0_03\bin\jusched.exe
    D:\WINDOWS\System32\kernels88.exe
    D:\WINDOWS\System32\inet.exe
    D:\WINDOWS\System32\lnwin.exe
    D:\Program Files\iPod\bin\iPodService.exe
    D:\Program Files\Juno\exec.exe
    c:\exe.exe
    D:\Program Files\Messenger\msmsgs.exe
    D:\OPLIMIT\ocrawr32.exe
    D:\Program Files\Juno\exec.exe
    D:\Program Files\Hijackthis\HijackThis.exe
    D:\WINDOWS\System32\dlh9jkd1q6.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://my.juno.com/s/search?r=minisearch
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://my.juno.com/s/search?r=minisearch
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://surfline.com/surfline/livecams/getsurfmapsurfbreakreport.cfm?alias=obcam
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://my.juno.com/s/search?r=minisearch
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://my.juno.com/s/search?r=minisearch
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://my.juno.com/s/search?r=minisearch
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://my.juno.com/s/search?r=minisearch
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    F3 - REG:win.ini: load=D:\OPLIMIT\ocraware.exe
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - D:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
    O2 - BHO: RXResultTracker Class - {59879FA4-4790-461c-A1CC-4EC4DE4CA483} - D:\PROGRA~1\RXTOOL~1\sfcont.dll (file missing)
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - D:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - D:\WINDOWS\system32\dla\tfswshx.dll
    O2 - BHO: (no name) - {5E9755A1-314A-4ae6-99E1-B9F7DC7C7CF0} - D:\WINDOWS\System32\2C.tmp (file missing)
    O2 - BHO: (no name) - {68D5CF1D-EC5C-4bdd-A9EF-F0E517565D50} - D:\WINDOWS\System32\vista.dll (file missing)
    O2 - BHO: (no name) - {7A1693A1-AFAF-4F1E-9B05-EEC38A85FBF3} - D:\WINDOWS\system32\9rfw2cz.dll (file missing)
    O3 - Toolbar: JunoBar - {5854FAC4-5BF0-47DD-B5A9-A5EA8CFF3CF4} - D:\Program Files\Juno\Toolbar.dll
    O3 - Toolbar: JunoBar - {5854FAC4-5BF0-47DD-B5A9-A5EA8CFF3CF4} - D:\Program Files\Juno\Toolbar.dll
    O4 - HKLM\..\Run: [dla] D:\WINDOWS\system32\dla\tfswctrl.exe
    O4 - HKLM\..\Run: [StorageGuard] "D:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe" /r
    O4 - HKLM\..\Run: [P2P Networking] D:\WINDOWS\System32\P2P Networking\P2P Networking.exe /AUTOSTART
    O4 - HKLM\..\Run: [iTunesHelper] "D:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "D:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [SunJavaUpdateSched] D:\Program Files\Java\jre1.5.0_03\bin\jusched.exe
    O4 - HKLM\..\Run: [System] D:\WINDOWS\System32\kernels88.exe
    O4 - HKLM\..\Run: [System64] D:\WINDOWS\System32\inet.exe
    O4 - HKLM\..\Run: [sysinter] D:\WINDOWS\System32\adirss.exe
    O4 - HKLM\..\Run: [lnwin.exe] D:\WINDOWS\System32\lnwin.exe
    O4 - HKCU\..\Run: [Juno_uoltray] D:\Program Files\Juno\exec.exe regrun
    O4 - HKCU\..\Run: [MSMSGS] "D:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [spc_w] "D:\Program Files\JUSearch\juspc.exe" -w
    O4 - Global Startup: Adobe Gamma Loader.exe.lnk = D:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Microsoft Office.lnk = D:\Program Files\Microsoft Office\Office\OSA9.EXE
    O8 - Extra context menu item: &Yahoo! Search - file:///D:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///D:\Program Files\Yahoo!\Common/ycdict.htm
    O8 - Extra context menu item: Yahoo! &Maps - file:///D:\Program Files\Yahoo!\Common/ycmap.htm
    O8 - Extra context menu item: Yahoo! &SMS - file:///D:\Program Files\Yahoo!\Common/ycsms.htm
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - D:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - D:\WINDOWS\web\related.htm
    O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - D:\WINDOWS\web\related.htm
    O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - D:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
    O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - D:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\MSMSGS.EXE
    O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab31267.cab
    O16 - DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} (StagingUI Object) - http://zone.msn.com/binFrameWork/v10/StagingUI.cab53083.cab
    O16 - DPF: {1D6711C8-7154-40BB-8380-3DEA45B69CBF} (Web P2P Installer) -
    O16 - DPF: {26098EA2-C95D-48EA-89B4-63C5A63BD42F} - http://www.pacimedia.com/install/pcs_0025.exe
    O16 - DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} (ZoneBuddy Class) - http://zone.msn.com/BinFrameWork/v10/ZBuddy.cab53083.cab
    O16 - DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} (ZonePAChat Object) - http://zone.msn.com/binframework/v10/ZPAChat.cab53083.cab
    O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/EN-US/a-UNO1/GAME_UNO1.cab
    O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
    O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://cdn2.zone.msn.com/binFramework/v10/ZIntro.cab55579.cab
    O16 - DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} (StadiumProxy Class) - http://zone.msn.com/binframework/v10/StProxy.cab53852.cab
    O16 - DPF: {FF3C5A9F-5A91-4930-80E8-4709194C2AD3} (CheckersZPA Object) - http://zone.msn.com/bingame/zpagames/CheckersZPA.cab53083.cab
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "D:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
    O18 - Filter: text/html - {2AB289AE-4B90-4281-B2AE-1F4BB034B647} - D:\PROGRA~1\RXTOOL~1\sfcont.dll
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - D:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - D:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: PCTEL Speaker Phone (Pctspk) - PCtel, Inc. - D:\WINDOWS\system32\pctspk.exe
    O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - %ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini (file missing)
     
  6. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Since I don't see any anti-virus software running load AVG http://free.grisoft.com/freeweb.php/doc/2/ it's free.

    It would be pointless to continue without any anti-virus software!



    Download (save) combofix from one of these two sites:
    Double click combofix.exe & follow the prompts.
    When finished, it will produce a log for you.

    Note:
    Do not mouseclick combofix's window while it's running. That may cause it to stall.

    Please post a new hijackthis log with the log from combofix in your next reply.
     
  7. sv490665

    sv490665 Thread Starter

    Joined:
    Jan 28, 2007
    Messages:
    11
    Logfile of HijackThis v1.99.1
    Scan saved at 9:13:43 PM, on 1/31/2007
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    D:\WINDOWS\System32\smss.exe
    D:\WINDOWS\system32\winlogon.exe
    D:\WINDOWS\system32\services.exe
    D:\WINDOWS\system32\lsass.exe
    D:\WINDOWS\system32\svchost.exe
    D:\WINDOWS\System32\svchost.exe
    D:\WINDOWS\system32\spoolsv.exe
    D:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    D:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    D:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    D:\WINDOWS\system32\pctspk.exe
    D:\WINDOWS\System32\svchost.exe
    D:\WINDOWS\Explorer.EXE
    D:\WINDOWS\system32\dla\tfswctrl.exe
    D:\WINDOWS\System32\P2P Networking\P2P Networking.exe
    D:\Program Files\iTunes\iTunesHelper.exe
    D:\Program Files\Java\jre1.5.0_03\bin\jusched.exe
    D:\Program Files\iPod\bin\iPodService.exe
    D:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
    D:\Program Files\Juno\exec.exe
    D:\Program Files\Messenger\msmsgs.exe
    D:\Program Files\Juno\exec.exe
    D:\Program Files\Microsoft Office\Office\WINWORD.EXE
    D:\Program Files\Hijackthis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://my.juno.com/s/search?r=minisearch
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://my.juno.com/s/search?r=minisearch
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://my.juno.com/s/search?r=minisearch
    R3 - URLSearchHook: URLSearchHook Class - {37D2CDBF-2AF4-44AA-8113-BD0D2DA3C2B8} - D:\Program Files\JUSearch\SearchEnh1.dll
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - D:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
    O2 - BHO: RXResultTracker Class - {59879FA4-4790-461c-A1CC-4EC4DE4CA483} - D:\PROGRA~1\RXTOOL~1\sfcont.dll (file missing)
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - D:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - D:\WINDOWS\system32\dla\tfswshx.dll
    O2 - BHO: (no name) - {5E9755A1-314A-4ae6-99E1-B9F7DC7C7CF0} - D:\WINDOWS\System32\2C.tmp (file missing)
    O2 - BHO: (no name) - {68D5CF1D-EC5C-4bdd-A9EF-F0E517565D50} - D:\WINDOWS\System32\vista.dll (file missing)
    O2 - BHO: (no name) - {7A1693A1-AFAF-4F1E-9B05-EEC38A85FBF3} - D:\WINDOWS\system32\9rfw2cz.dll (file missing)
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - D:\WINDOWS\System32\msdxm.ocx
    O3 - Toolbar: JunoBar - {5854FAC4-5BF0-47DD-B5A9-A5EA8CFF3CF4} - D:\Program Files\Juno\Toolbar.dll
    O4 - HKLM\..\Run: [dla] D:\WINDOWS\system32\dla\tfswctrl.exe
    O4 - HKLM\..\Run: [StorageGuard] "D:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe" /r
    O4 - HKLM\..\Run: [P2P Networking] D:\WINDOWS\System32\P2P Networking\P2P Networking.exe /AUTOSTART
    O4 - HKLM\..\Run: [iTunesHelper] "D:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "D:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [SunJavaUpdateSched] D:\Program Files\Java\jre1.5.0_03\bin\jusched.exe
    O4 - HKLM\..\Run: [AVG7_CC] D:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
    O4 - HKCU\..\Run: [Juno_uoltray] D:\Program Files\Juno\exec.exe regrun
    O4 - HKCU\..\Run: [MSMSGS] "D:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [spc_w] "D:\Program Files\JUSearch\juspc.exe" -w
    O4 - Global Startup: Adobe Gamma Loader.exe.lnk = D:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Microsoft Office.lnk = D:\Program Files\Microsoft Office\Office\OSA9.EXE
    O8 - Extra context menu item: &Yahoo! Search - file:///D:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///D:\Program Files\Yahoo!\Common/ycdict.htm
    O8 - Extra context menu item: Yahoo! &Maps - file:///D:\Program Files\Yahoo!\Common/ycmap.htm
    O8 - Extra context menu item: Yahoo! &SMS - file:///D:\Program Files\Yahoo!\Common/ycsms.htm
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - D:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\MSMSGS.EXE
    O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab31267.cab
    O16 - DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} (StagingUI Object) - http://zone.msn.com/binFrameWork/v10/StagingUI.cab53083.cab
    O16 - DPF: {1D6711C8-7154-40BB-8380-3DEA45B69CBF} (Web P2P Installer) -
    O16 - DPF: {26098EA2-C95D-48EA-89B4-63C5A63BD42F} - http://www.pacimedia.com/install/pcs_0025.exe
    O16 - DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} (ZoneBuddy Class) - http://zone.msn.com/BinFrameWork/v10/ZBuddy.cab53083.cab
    O16 - DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} (ZonePAChat Object) - http://zone.msn.com/binframework/v10/ZPAChat.cab53083.cab
    O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/EN-US/a-UNO1/GAME_UNO1.cab
    O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
    O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://cdn2.zone.msn.com/binFramework/v10/ZIntro.cab55579.cab
    O16 - DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} (StadiumProxy Class) - http://zone.msn.com/binframework/v10/StProxy.cab53852.cab
    O16 - DPF: {FF3C5A9F-5A91-4930-80E8-4709194C2AD3} (CheckersZPA Object) - http://zone.msn.com/bingame/zpagames/CheckersZPA.cab53083.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{8284CEBB-8BED-4AC3-89A6-0AA1C2AE94AB}: NameServer = 64.136.20.121 64.136.28.121
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "D:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - D:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - D:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - D:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - D:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - D:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: PCTEL Speaker Phone (Pctspk) - PCtel, Inc. - D:\WINDOWS\system32\pctspk.exe
    O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - %ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini (file missing)

    --------------------------------------------------------------------------------------------------------

    "FULLER" - 07-01-31 21:10:30 Service Pack 1
    ComboFix 07.01.30 - Running from: "D:\Documents and Settings\FULLER\Desktop"

    (((((((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))


    D:\WINDOWS\system32\zlbw.dll


    ((((((((((((((((((((((((((((((( Files Created from 2006-12-31 to 2007-01-31 ))))))))))))))))))))))))))))))))))


    2007-01-31 20:54 <DIR> dr-h----- D:\$VAULT$.AVG
    2007-01-31 15:35 816,672 --a------ D:\WINDOWS\system32\drivers\avg7core.sys
    2007-01-31 15:35 4,960 --a------ D:\WINDOWS\system32\drivers\avgtdi.sys
    2007-01-31 15:35 4,224 --a------ D:\WINDOWS\system32\drivers\avg7rsw.sys
    2007-01-31 15:35 3,968 --a------ D:\WINDOWS\system32\drivers\avgclean.sys
    2007-01-31 15:35 28,416 --a------ D:\WINDOWS\system32\drivers\avg7rsxp.sys
    2007-01-31 15:35 18,240 --a------ D:\WINDOWS\system32\drivers\avgmfx86.sys
    2007-01-31 15:35 <DIR> d-------- D:\Program Files\Grisoft
    2007-01-31 15:35 <DIR> d-------- D:\DOCUME~1\LOCALS~1\Application Data\AVG7
    2007-01-31 15:35 <DIR> d-------- D:\DOCUME~1\FULLER\Application Data\AVG7
    2007-01-31 15:35 <DIR> d-------- D:\DOCUME~1\ALLUSE~1\Application Data\Grisoft
    2007-01-31 15:35 <DIR> d-------- D:\DOCUME~1\ALLUSE~1\Application Data\avg7
    2007-01-29 15:46 <DIR> d-------- D:\VundoFix Backups
    2007-01-29 15:43 153,088 --a------ D:\WINDOWS\khihig.dll
    2007-01-29 13:57 54,177 --a------ D:\WINDOWS\system32\abc.exe
    2007-01-28 20:37 <DIR> d-------- D:\Program Files\Hijackthis
    2007-01-28 20:36 488,144 --a------ D:\HJTSetup.exe
    2007-01-23 17:21 <DIR> d-------- D:\Program Files\RADVideo


    (((((((((((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))))


    2007-01-31 21:04 -------- d-------- D:\Program Files\juno
    2007-01-28 17:49 -------- d-------- D:\Program Files\movie maker
    2007-01-27 10:31 -------- d-------- D:\Program Files\messenger
    2007-01-27 10:31 -------- d-------- D:\Program Files\limewire
    2007-01-21 16:52 -------- d---s---- D:\DOCUME~1\FULLER\Application Data\microsoft
    2007-01-06 22:18 -------- d-------- D:\Program Files\mw dictionary-thesaurus
    2006-10-19 11:36 194512 --a------ D:\DOCUME~1\FULLER\Application Data\shb.dat


    (((((((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))

    *Note* empty entries & legit default entries are not shown

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run]
    "Juno_uoltray"="D:\\Program Files\\Juno\\exec.exe regrun"
    "MSMSGS"="\"D:\\Program Files\\Messenger\\msmsgs.exe\" /background"
    "spc_w"="\"D:\\Program Files\\JUSearch\\juspc.exe\" -w"

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run]
    "dla"="D:\\WINDOWS\\system32\\dla\\tfswctrl.exe"
    "StorageGuard"="\"D:\\Program Files\\Common Files\\Sonic\\Update Manager\\sgtray.exe\" /r"
    "P2P Networking"="D:\\WINDOWS\\System32\\P2P Networking\\P2P Networking.exe /AUTOSTART"
    "AltnetPointsManager"=""
    "iTunesHelper"="\"D:\\Program Files\\iTunes\\iTunesHelper.exe\""
    "QuickTime Task"="\"D:\\Program Files\\QuickTime\\qttask.exe\" -atboottime"
    "SunJavaUpdateSched"="D:\\Program Files\\Java\\jre1.5.0_03\\bin\\jusched.exe"
    "AVG7_CC"="D:\\PROGRA~1\\Grisoft\\AVGFRE~1\\avgcc.exe /STARTUP"

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\IMAIL]
    "Installed"="1"

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\MAPI]
    "NoChange"="1"
    "Installed"="1"

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\MSFS]
    "Installed"="1"

    [HKEY_USERS\.default\software\microsoft\windows\currentversion\run]
    "taskdir"="D:\\WINDOWS\\System32\\taskdir.exe"
    "AVG7_Run"="D:\\PROGRA~1\\Grisoft\\AVGFRE~1\\avgw.exe /RUNONCE"

    [HKEY_USERS\s-1-5-18\software\microsoft\windows\currentversion\run]
    "taskdir"="D:\\WINDOWS\\System32\\taskdir.exe"
    "AVG7_Run"="D:\\PROGRA~1\\Grisoft\\AVGFRE~1\\avgw.exe /RUNONCE"

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\securityproviders]
    "SecurityProviders"="msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll, zwebauth.dll"

    HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\dfd.sys

    [HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Svchost]
    LocalService REG_MULTI_SZ Alerter\0WebClient\0LmHosts\0RemoteRegistry\0upnphost\0SSDPSRV\0\0
    NetworkService REG_MULTI_SZ DnsCache\0\0
    rpcss REG_MULTI_SZ RpcSs\0\0
    imgsvc REG_MULTI_SZ StiSvc\0\0
    termsvcs REG_MULTI_SZ TermService\0\0


    Completion time: 07-01-31 21:12:57
    D:\ComboFix2.txt ... 07-01-30 16:06
    D:\ComboFix3.txt ... 07-01-30 15:58
     
  8. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Run HJT again and put a check in the following:

    O2 - BHO: RXResultTracker Class - {59879FA4-4790-461c-A1CC-4EC4DE4CA483} - D:\PROGRA~1\RXTOOL~1\sfcont.dll (file missing)
    O2 - BHO: (no name) - {5E9755A1-314A-4ae6-99E1-B9F7DC7C7CF0} - D:\WINDOWS\System32\2C.tmp (file missing)
    O2 - BHO: (no name) - {68D5CF1D-EC5C-4bdd-A9EF-F0E517565D50} - D:\WINDOWS\System32\vista.dll (file missing)
    O2 - BHO: (no name) - {7A1693A1-AFAF-4F1E-9B05-EEC38A85FBF3} - D:\WINDOWS\system32\9rfw2cz.dll (file missing)
    O4 - HKLM\..\Run: [P2P Networking] D:\WINDOWS\System32\P2P Networking\P2P Networking.exe /AUTOSTART
    O16 - DPF: {1D6711C8-7154-40BB-8380-3DEA45B69CBF} (Web P2P Installer) -

    Close all applications and browser windows before you click "fix checked".


    Click Here and download Killbox and save it to your desktop.


    Double-click on Killbox.exe to run it.
    Put a tick by Delete on Reboot.
    Copy the following list of files to clipboard, CTRL+C to copy

    D:\WINDOWS\khihig.dll
    D:\WINDOWS\system32\abc.exe


    Now in Killbox go to File, Paste from clipboard.
    Click the All Files button.
    Click on the button that has the red circle with the X in the middle.
    It will ask for confimation to delete the file.
    Click Yes.
    It will ask if you want to reboot now,
    Click Yes.

    Note: It is possible that Killbox will tell you that the file does not exist.

    If your computer does not restart automatically then please restart it manually.
    If you get an error message "PendingFileRenameOperations Registry Data has been Removed by External Process!" message then just restart manually.


    Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system.
    Please follow these steps to remove older version Java components and update.

    Updating Java:
    • Download the latest version of Java Runtime Environment (JRE) 6.
    • Scroll down to where it says "The J2SE Runtime Environment (JRE) allows end-users to run Java applications".
    • Click the "Download" button to the right.
    • Check the box that says: "Accept License Agreement".
    • The page will refresh.
    • Click on the link to download Windows Offline Installation with or without Multi-language and save to your desktop.
    • Close any programs you may have running - especially your web browser.
    • Go to Start > Control Panel double-click on Add/Remove programs and remove all older versions of Java.
    • Check any item with Java Runtime Environment (JRE or J2SE) in the name.
    • Click the Remove or Change/Remove button.
    • Repeat as many times as necessary to remove each Java versions.
    • Reboot your computer once all Java components are removed.
    • Then from your desktop double-click on the download to install the newest version.


    Please download ATF Cleaner by Atribune.
    This program is for XP and Windows 2000 only

    • Double-click ATF-Cleaner.exe to run the program.
      Under Main choose: Select All
      Click the Empty Selected button.
    If you use Firefox browser
    • Click Firefox at the top and choose: Select All
      Click the Empty Selected button.
      NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    If you use Opera browser
    • Click Opera at the top and choose: Select All
      Click the Empty Selected button.
      NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    Click Exit on the Main menu to close the program.
    For Technical Support, double-click the e-mail address located at the bottom of each menu.





    Download and install AVG Anti-Spyware 7.5 AVG ANTI-SPYWARE IS ONLY FOR SYSTEMS RUNNING WIN 2K and XP
    (This is Ewdio 4.0 renamed. If you already have Ewido installed, please update to this version which has a special "clean driver" for removing persistent malware)
    1. After download, double click on the file to launch the install process.
    2. Choose a language, click "OK" and then click "Next".
    3. Read the "License Agreement" and click "I Agree".
    4. Accept default installation path: C:\Program Files\Grisoft\AVG Anti-Spyware 7.5, click "Next", then click "Install".
    5. After setup completes, click "Finish" to start the program automatically or launch AVG Anti-Spyware by double-clicking its icon on your desktop or in the system tray.
    6. The main "Status" menu will appear. Select "Change state" to inactivate 'Resident Shield' and 'Automatic Updates'.
    7. Then right click on AVG Anti-Spyware in the system tray and uncheck "Start with Windows".
    8. Go to Start > Run and type: services.msc
    • Press "OK".
    • Click the "Extended tab" and scroll down the list to find AVG Anti-Spyware guard.
    • When you find the guard service, double-click on it.
    • In the Properties Window > General Tab that opens, click the "Stop" button.
    • From the drop-down menu next to "Startup Type", click on "Manual".
    • Now click "Apply", then "OK" and close the Services window.
    9. Select the "Update" button and click "Start update". Wait until you see the "Update succesfull message. If you are having problems with the updater, manually update with the AVG Anti-Spyware Full database installer from here. Exit AVG Anti-Spyware when done - DO NOT perform a scan yet.

    Reboot your computer in "SAFE MODE" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup [but before the Windows icon appears] press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

    Scan with AVG Anti-Spyware as follows:
    1. Launch AVG Anti-Spyware, click on the "Scanner" button and choose the "Settings" tab.
    • Under "How to act?", click on "Recommended actions" and choose "Quarantine" to set default action for detected malware.
    • Under "How to Scan?" check all (default).
    • Under "Possibly unwanted software" check all (default).
    • Under "What to Scan?" make sure "Scan every file" is selected (default).
    • Under "Reports" select "Automatically generate report after every scan" and UNcheck "Only if threats were found".
    2. Click the "Scan" tab to return to scanning options.
    3. Click "Complete System Scan" to start.
    4. When the scan has finished you will be presented with a list of infected objects found. Click "Apply all actions" to place the files in Quarantine.

    IMPORTANT! Do not save the report before you have clicked the Apply all actions button. If you do, the log that is created will indicate "No action taken", making it more difficult to interpret the report. So be sure you save it only AFTER clicking the "Apply all actions" button?

    5. Click on "Save Report" to view all completed scans. Click on the most recent scan you just performed and select "Save report as" - the default file name will be in date/time format as follows: Report-Scan-20060620-142816.txt. Save to your desktop. A copy of each report will also be saved in C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\Reports\
    6. Exit AVG Anti-Spyware when done, reboot normally and submit the log report in your next response.

    Note: Close all open windows, programs, and DO NOT USE the computer while AVG Anti-Spyware is scanning. If Explorer or other programs are open during the scan that means certain files will also be in use. Some malware will insert itself and hide in areas that are "protected" by Windows when the files are being used. This can hamper AVG Anti-Spyware's ability to clean properly and may result in reinfection.

    Note: If AVG Anti-Spyware "crashes" or "hangs" during the scan, try scanning again by doing this:
    1. Scan one sector of the system at a time by using the "Custom Scan" feature. To do this select Scanner > Custom Scan and click on Add drive/directory/file. Browse to C:\Windows > System, add this folder to the list and click on "Start Scan". When the scan is complete, repeat the Custom Scan but this time, browse to and add the System32 folder. Then keep repeating this procedure until all your folders have been scanned. Make sure you include the Documents & Settings folder.

    2. If this still does not help, then turn the ADS scanner off while making a Custom Scan. To do this select Scanner > Scan Settings and untick "Scan in NTFS Alternate Data Streams". Then repeat the steps above for performing a Custom Scan.
     
  9. sv490665

    sv490665 Thread Starter

    Joined:
    Jan 28, 2007
    Messages:
    11
    ---------------------------------------------------------
    AVG Anti-Spyware - Scan Report
    ---------------------------------------------------------

    + Created at: 1:23:11 PM 2/1/2007

    + Scan result:



    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP389\A0037589.exe -> Adware.404Search : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP452\A0052356.dll -> Adware.404Search : Cleaned with backup (quarantined).
    C:\Program Files\Altnet\Download Manager\adm25.dll -> Adware.Altnet : Cleaned with backup (quarantined).
    C:\Program Files\Altnet\Download Manager\adm4.dll -> Adware.Altnet : Cleaned with backup (quarantined).
    C:\Program Files\Altnet\Download Manager\adm4005.exe -> Adware.Altnet : Cleaned with backup (quarantined).
    C:\Program Files\Altnet\Download Manager\admdata.dll -> Adware.Altnet : Cleaned with backup (quarantined).
    C:\Program Files\Altnet\Download Manager\admdloader.dll -> Adware.Altnet : Cleaned with backup (quarantined).
    C:\Program Files\Altnet\Download Manager\admfdi.dll -> Adware.Altnet : Cleaned with backup (quarantined).
    C:\Program Files\Altnet\Download Manager\admprog.dll -> Adware.Altnet : Cleaned with backup (quarantined).
    C:\Program Files\Altnet\Download Manager\altnetuninstall.exe -> Adware.Altnet : Cleaned with backup (quarantined).
    C:\Program Files\Altnet\Points Manager\Points Manager.exe -> Adware.Altnet : Cleaned with backup (quarantined).
    D:\Program Files\Altnet -> Adware.Altnet : Cleaned with backup (quarantined).
    D:\Program Files\Altnet\Download Manager -> Adware.Altnet : Cleaned with backup (quarantined).
    D:\Program Files\Altnet\Download Manager\asm.exe -> Adware.Altnet : Cleaned with backup (quarantined).
    D:\Program Files\Altnet\Download Manager\asmps.dll -> Adware.Altnet : Cleaned with backup (quarantined).
    D:\Program Files\Altnet\My Altnet Shares -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Altnet -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Altnet\ADM -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Altnet\Dashboard -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Altnet\Dashboard\Messages -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Altnet\Dashboard\Settings -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Altnet\Dashboard\Setup -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Altnet\Dashboard\Temp Internet Shares -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Altnet\DownloadManager -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Altnet\LocalFiles -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Altnet\TopSearch -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\ADM.ADM -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\ADM.ADM.1 -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\ADM.ADM\CLSID -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\ADM.ADM\CurVer -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\ADM25.ADM25 -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\ADM25.ADM25.1 -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\ADM25.ADM25\CurVer -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\ADM4.ADM4 -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\ADM4.ADM4.1 -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\ADM4.ADM4\CurVer -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\AppID\Altnet Signing Module.EXE -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\AppID\adm.EXE -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\SigningModule.SigningModule -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\SigningModule.SigningModule.1 -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\SigningModule.SigningModule\CLSID -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\SigningModule.SigningModule\CurVer -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\TopSearch.TSLink -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\TopSearch.TSLink.1 -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\TopSearch.TSLink\CLSID -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Classes\TopSearch.TSLink\CurVer -> Adware.Altnet : Cleaned with backup (quarantined).
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AltnetDM -> Adware.Altnet : Cleaned with backup (quarantined).
    C:\Program Files\Altnet\Points Manager\sysdetect.dll -> Adware.BrilliantDigital : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache -> Adware.Cydoor : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache\B_329_0_0_105300.htm -> Adware.Cydoor : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache\B_329_0_0_106800.htm -> Adware.Cydoor : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache\B_329_0_0_107400.htm -> Adware.Cydoor : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache\B_329_1_0_449200.gif -> Adware.Cydoor : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache\B_329_1_0_449200.htm -> Adware.Cydoor : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache\B_329_1_0_449600.gif -> Adware.Cydoor : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache\B_329_1_0_449600.htm -> Adware.Cydoor : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache\B_329_1_0_454300.gif -> Adware.Cydoor : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache\B_329_1_0_454300.htm -> Adware.Cydoor : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache\B_329_2_0_105300.htm -> Adware.Cydoor : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache\B_329_2_0_106800.htm -> Adware.Cydoor : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache\B_329_2_0_107400.htm -> Adware.Cydoor : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache\B_329_3_0_105300.htm -> Adware.Cydoor : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache\B_329_3_0_106800.htm -> Adware.Cydoor : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache\B_329_3_0_107400.htm -> Adware.Cydoor : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache\B_329_4_0_111600.htm -> Adware.Cydoor : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache\B_329_4_0_152400.htm -> Adware.Cydoor : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache\B_329_4_0_155300.htm -> Adware.Cydoor : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\AdCache\B_329_4_0_164100.htm -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_0 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_0\Level_0 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_0\Level_0\Seqn_1068 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_0\Level_0\Seqn_1074 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_1 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_1\Level_0 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_1\Level_0\Seqn_4492 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_1\Level_0\Seqn_4496 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_1\Level_0\Seqn_4543 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_2 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_2\Level_0 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_2\Level_0\Seqn_1068 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_2\Level_0\Seqn_1074 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_3 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_3\Level_0 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_3\Level_0\Seqn_1068 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_3\Level_0\Seqn_1074 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_4 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_4\Level_0 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_4\Level_0\Seqn_1116 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_4\Level_0\Seqn_1524 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_4\Level_0\Seqn_1553 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Loct_4\Level_0\Seqn_1641 -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Services -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Services\Queue -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Kazaa\Promotions\Cydoor\Adwr_329\Services\Status -> Adware.Cydoor : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Hiwire -> Adware.HiWire : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Hiwire\MusicMatch -> Adware.HiWire : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Hiwire\MusicMatch\Browser -> Adware.HiWire : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Hiwire\MusicMatch\Faceplate -> Adware.HiWire : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Hiwire\MusicMatch\History -> Adware.HiWire : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Hiwire\MusicMatch\Resources -> Adware.HiWire : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Hiwire\MusicMatch\Stations -> Adware.HiWire : Cleaned with backup (quarantined).
    HKU\S-1-5-21-73586283-839522115-1957994488-1004\Software\Hiwire\MusicMatch\WebUpdate -> Adware.HiWire : Cleaned with backup (quarantined).
     
  10. sv490665

    sv490665 Thread Starter

    Joined:
    Jan 28, 2007
    Messages:
    11
    D:\WINDOWS\system32\P2P Networking v126.cpl -> Adware.P2PNet : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\P2P Networking -> Adware.P2PNetworking : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\P2P Networking\Cache -> Adware.P2PNetworking : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\P2P Networking\Cache\Database -> Adware.P2PNetworking : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\P2P Networking\Cache\Database\index256.dbb -> Adware.P2PNetworking : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\P2P Networking\MARSHAL.DLL -> Adware.P2PNetworking : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\P2P Networking\P2P Networking.eng -> Adware.P2PNetworking : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\P2P Networking\P2P Networking.exe -> Adware.P2PNetworking : Cleaned with backup (quarantined).
    D:\Program Files\Hijackthis\backups\backup-20070201-092115-160.dll -> Adware.PeerNet : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP451\A0052328.dll -> Adware.RXBar : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP451\A0052329.dll -> Adware.RXBar : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP432\A0045712.dll -> Adware.Virtumonde : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP432\A0045713.dll -> Adware.Virtumonde : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP433\A0045726.dll -> Adware.Virtumonde : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP434\A0045754.dll -> Adware.Virtumonde : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP434\A0045755.dll -> Adware.Virtumonde : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP437\A0046833.dll -> Adware.Virtumonde : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP437\A0046834.dll -> Adware.Virtumonde : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP437\A0046835.dll -> Adware.Virtumonde : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP439\A0048891.dll -> Adware.Virtumonde : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP440\A0048909.dll -> Adware.Virtumonde : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP440\A0048910.dll -> Adware.Virtumonde : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP440\A0048911.dll -> Adware.Virtumonde : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP443\A0049000.dll -> Adware.Virtumonde : Cleaned with backup (quarantined).
    D:\Program Files\Common Files\WinSoftware\FCrXML.dll -> Adware.Winfixer : Cleaned with backup (quarantined).
    D:\Program Files\Common Files\WinSoftware\PrCheck.dll -> Adware.WinFixer : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0059653.exe -> Downloader.Delf.zw : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0058536.exe -> Downloader.Small.agq : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0058534.exe -> Downloader.Tibs.hh : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054461.exe -> Downloader.Tibs.kc : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055459.exe -> Downloader.Tibs.kc : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055478.exe -> Downloader.Tibs.kc : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055502.exe -> Downloader.Tibs.kc : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0058549.exe -> Downloader.Tibs.kc : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP452\A0053418.sys -> Dropper.Agent.bbv : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054467.sys -> Dropper.Agent.bbv : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055465.sys -> Dropper.Agent.bbv : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055484.sys -> Dropper.Agent.bbv : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0058614.sys -> Dropper.Agent.bbv : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0059716.sys -> Dropper.Agent.bbv : Cleaned with backup (quarantined).
    D:\Documents and Settings\FULLER\My Documents\WinFixer2005ScannerInstall.exe -> Not-A-Virus.Downloader.Win32.Agent.d : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054453.dll -> Proxy.Agent.ji : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055453.dll -> Proxy.Agent.ji : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055472.dll -> Proxy.Agent.ji : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055491.dll -> Proxy.Agent.ji : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0056491.dll -> Proxy.Agent.ji : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0056513.dll -> Proxy.Agent.ji : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0057513.dll -> Proxy.Agent.ji : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0058553.dll -> Proxy.Agent.ji : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP452\A0053413.exe -> Proxy.Lager.dp : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054443.exe -> Proxy.Lager.dp : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054463.exe -> Proxy.Lager.dp : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055461.exe -> Proxy.Lager.dp : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055480.exe -> Proxy.Lager.dp : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055504.exe -> Proxy.Lager.dp : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0056504.exe -> Proxy.Lager.dp : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0058542.exe -> Proxy.Lager.dp : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0058548.exe -> Proxy.Lager.dp : Cleaned with backup (quarantined).
    C:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0059643.exe -> Trojan.Agent.ct : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP421\A0045416.dll -> Trojan.BHO.g : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP422\A0045462.dll -> Trojan.BHO.g : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP424\A0045518.dll -> Trojan.BHO.g : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP425\A0045574.dll -> Trojan.BHO.g : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP427\A0045632.dll -> Trojan.BHO.g : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP452\A0053410.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP452\A0053411.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP452\A0053412.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP452\A0053415.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054440.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054441.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054442.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054444.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054460.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054462.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054464.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055458.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055460.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055462.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055477.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055479.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055481.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055501.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055503.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0056499.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0056500.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0056503.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0056505.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0058541.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0058543.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0058544.exe -> Trojan.Small : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP452\A0053403.dll -> Worm.Banwarum.f : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054407.dll -> Worm.Banwarum.f : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054420.dll -> Worm.Banwarum.f : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054427.dll -> Worm.Banwarum.f : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054452.dll -> Worm.Banwarum.f : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055452.dll -> Worm.Banwarum.f : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055471.dll -> Worm.Banwarum.f : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055490.dll -> Worm.Banwarum.f : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0056490.dll -> Worm.Banwarum.f : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0056512.dll -> Worm.Banwarum.f : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0057512.dll -> Worm.Banwarum.f : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0058547.dll -> Worm.Banwarum.f : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0059645.dll -> Worm.Banwarum.f : Cleaned with backup (quarantined).
    D:\WINDOWS\system32\adir.dll -> Worm.Banwarum.f : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP452\A0053417.exe -> Worm.Zhelatin.h : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055464.exe -> Worm.Zhelatin.h : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055483.exe -> Worm.Zhelatin.h : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0058613.exe -> Worm.Zhelatin.h : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0059651.exe -> Worm.Zhelatin.h : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP452\A0053408.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP452\A0053409.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP452\A0053414.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0053421.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054438.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054439.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054458.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0054459.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055456.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055457.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055463.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055475.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055476.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055482.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055499.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0055500.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0058550.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0058612.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0058615.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0059656.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0059657.exe -> Worm.Zhelatin.j : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP453\A0056498.exe -> Worm.Zhelatin.l : Cleaned with backup (quarantined).
    D:\System Volume Information\_restore{00358BD2-2E45-4D34-BB2A-AA7879DA5798}\RP454\A0058545.exe -> Worm.Zhelatin.l : Cleaned with backup (quarantined).


    ::Report end
     
  11. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Please post a new hijackthis log.
     
  12. sv490665

    sv490665 Thread Starter

    Joined:
    Jan 28, 2007
    Messages:
    11
    Logfile of HijackThis v1.99.1
    Scan saved at 5:15:37 PM, on 2/1/2007
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    D:\WINDOWS\System32\smss.exe
    D:\WINDOWS\system32\winlogon.exe
    D:\WINDOWS\system32\services.exe
    D:\WINDOWS\system32\lsass.exe
    D:\WINDOWS\system32\svchost.exe
    D:\WINDOWS\System32\svchost.exe
    D:\WINDOWS\system32\spoolsv.exe
    D:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    D:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    D:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    D:\WINDOWS\system32\pctspk.exe
    D:\WINDOWS\System32\svchost.exe
    D:\WINDOWS\Explorer.EXE
    D:\WINDOWS\system32\dla\tfswctrl.exe
    D:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe
    D:\Program Files\iTunes\iTunesHelper.exe
    D:\Program Files\QuickTime\qttask.exe
    D:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
    D:\WINDOWS\System32\lnwin.exe
    D:\Program Files\Java\jre1.6.0\bin\jusched.exe
    D:\Program Files\iPod\bin\iPodService.exe
    D:\Program Files\Juno\exec.exe
    D:\Program Files\Messenger\msmsgs.exe
    D:\Program Files\Juno\exec.exe
    D:\Program Files\Internet Explorer\iexplore.exe
    D:\Program Files\MSN Messenger\msnmsgr.exe
    D:\Program Files\Hijackthis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://my.juno.com/s/search?r=minisearch
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://my.juno.com/s/search?r=minisearch
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://surfline.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://my.juno.com/s/search?r=minisearch
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://my.juno.com/s/search?r=minisearch
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://my.juno.com/s/search?r=minisearch
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://my.juno.com/s/search?r=minisearch
    R3 - URLSearchHook: URLSearchHook Class - {37D2CDBF-2AF4-44AA-8113-BD0D2DA3C2B8} - D:\Program Files\JUSearch\SearchEnh1.dll
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - D:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - D:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - D:\WINDOWS\system32\dla\tfswshx.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - D:\Program Files\Java\jre1.6.0\bin\ssv.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - D:\WINDOWS\System32\msdxm.ocx
    O3 - Toolbar: JunoBar - {5854FAC4-5BF0-47DD-B5A9-A5EA8CFF3CF4} - D:\Program Files\Juno\Toolbar.dll
    O4 - HKLM\..\Run: [dla] D:\WINDOWS\system32\dla\tfswctrl.exe
    O4 - HKLM\..\Run: [StorageGuard] "D:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe" /r
    O4 - HKLM\..\Run: [iTunesHelper] "D:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "D:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [AVG7_CC] D:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
    O4 - HKLM\..\Run: [lnwin.exe] D:\WINDOWS\System32\lnwin.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "D:\Program Files\Java\jre1.6.0\bin\jusched.exe"
    O4 - HKCU\..\Run: [Juno_uoltray] D:\Program Files\Juno\exec.exe regrun
    O4 - HKCU\..\Run: [MSMSGS] "D:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [spc_w] "D:\Program Files\JUSearch\juspc.exe" -w
    O4 - Global Startup: Adobe Gamma Loader.exe.lnk = D:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Microsoft Office.lnk = D:\Program Files\Microsoft Office\Office\OSA9.EXE
    O8 - Extra context menu item: &Yahoo! Search - file:///D:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///D:\Program Files\Yahoo!\Common/ycdict.htm
    O8 - Extra context menu item: Yahoo! &Maps - file:///D:\Program Files\Yahoo!\Common/ycmap.htm
    O8 - Extra context menu item: Yahoo! &SMS - file:///D:\Program Files\Yahoo!\Common/ycsms.htm
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - D:\Program Files\Java\jre1.6.0\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - D:\Program Files\Java\jre1.6.0\bin\ssv.dll
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - D:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\MSMSGS.EXE
    O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab31267.cab
    O16 - DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} (StagingUI Object) - http://zone.msn.com/binFrameWork/v10/StagingUI.cab53083.cab
    O16 - DPF: {26098EA2-C95D-48EA-89B4-63C5A63BD42F} - http://www.pacimedia.com/install/pcs_0025.exe
    O16 - DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} (ZoneBuddy Class) - http://zone.msn.com/BinFrameWork/v10/ZBuddy.cab53083.cab
    O16 - DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} (ZonePAChat Object) - http://zone.msn.com/binframework/v10/ZPAChat.cab53083.cab
    O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/EN-US/a-UNO1/GAME_UNO1.cab
    O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
    O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://cdn2.zone.msn.com/binFramework/v10/ZIntro.cab55579.cab
    O16 - DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} (StadiumProxy Class) - http://zone.msn.com/binframework/v10/StProxy.cab53852.cab
    O16 - DPF: {FF3C5A9F-5A91-4930-80E8-4709194C2AD3} (CheckersZPA Object) - http://zone.msn.com/bingame/zpagames/CheckersZPA.cab53083.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{8284CEBB-8BED-4AC3-89A6-0AA1C2AE94AB}: NameServer = 64.136.20.121 64.136.28.121
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "D:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
    O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - D:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - D:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - D:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - D:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - D:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: PCTEL Speaker Phone (Pctspk) - PCtel, Inc. - D:\WINDOWS\system32\pctspk.exe
    O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - %ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini (file missing)
     
  13. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Run HJT again and put a check in the following:

    O4 - HKLM\..\Run: [lnwin.exe] D:\WINDOWS\System32\lnwin.exe

    Close all applications and browser windows before you click "fix checked".


    Click Here and download Killbox and save it to your desktop.


    Double-click on Killbox.exe to run it.
    Put a tick by Delete on Reboot.
    In the "Full Path of File to Delete" box, copy and paste the following:

    D:\WINDOWS\System32\lnwin.exe

    Click on the button that has the red circle with the X in the middle after you enter the file name.
    It will ask for confimation to delete the file.
    Click Yes.
    It will ask if you want to reboot now,
    Click Yes.

    Note: It is possible that Killbox will tell you that the file does not exist.

    If your computer does not restart automatically then please restart it manually.
    If you get an error message "PendingFileRenameOperations Registry Data has been Removed by External Process!" message then just restart manually.

    Post a new log when you have rebooted.
     
  14. sv490665

    sv490665 Thread Starter

    Joined:
    Jan 28, 2007
    Messages:
    11
    Logfile of HijackThis v1.99.1
    Scan saved at 10:51:23 AM, on 2/2/2007
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    D:\WINDOWS\System32\smss.exe
    D:\WINDOWS\system32\winlogon.exe
    D:\WINDOWS\system32\services.exe
    D:\WINDOWS\system32\lsass.exe
    D:\WINDOWS\system32\svchost.exe
    D:\WINDOWS\System32\svchost.exe
    D:\WINDOWS\system32\spoolsv.exe
    D:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    D:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    D:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    D:\WINDOWS\system32\pctspk.exe
    D:\WINDOWS\System32\svchost.exe
    D:\WINDOWS\Explorer.EXE
    D:\WINDOWS\system32\dla\tfswctrl.exe
    D:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe
    D:\Program Files\iTunes\iTunesHelper.exe
    D:\Program Files\QuickTime\qttask.exe
    D:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
    D:\Program Files\Java\jre1.6.0\bin\jusched.exe
    D:\Program Files\Juno\exec.exe
    D:\Program Files\Messenger\msmsgs.exe
    D:\Program Files\iPod\bin\iPodService.exe
    D:\Program Files\Juno\exec.exe
    D:\Program Files\Hijackthis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://my.juno.com/s/search?r=minisearch
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://my.juno.com/s/search?r=minisearch
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://surfline.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://my.juno.com/s/search?r=minisearch
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://my.juno.com/s/search?r=minisearch
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://my.juno.com/s/search?r=minisearch
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://my.juno.com/s/search?r=minisearch
    R3 - URLSearchHook: URLSearchHook Class - {37D2CDBF-2AF4-44AA-8113-BD0D2DA3C2B8} - D:\Program Files\JUSearch\SearchEnh1.dll
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - D:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - D:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - D:\WINDOWS\system32\dla\tfswshx.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - D:\Program Files\Java\jre1.6.0\bin\ssv.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - D:\WINDOWS\System32\msdxm.ocx
    O3 - Toolbar: JunoBar - {5854FAC4-5BF0-47DD-B5A9-A5EA8CFF3CF4} - D:\Program Files\Juno\Toolbar.dll
    O4 - HKLM\..\Run: [dla] D:\WINDOWS\system32\dla\tfswctrl.exe
    O4 - HKLM\..\Run: [StorageGuard] "D:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe" /r
    O4 - HKLM\..\Run: [iTunesHelper] "D:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "D:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [AVG7_CC] D:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "D:\Program Files\Java\jre1.6.0\bin\jusched.exe"
    O4 - HKCU\..\Run: [Juno_uoltray] D:\Program Files\Juno\exec.exe regrun
    O4 - HKCU\..\Run: [MSMSGS] "D:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [spc_w] "D:\Program Files\JUSearch\juspc.exe" -w
    O4 - Global Startup: Adobe Gamma Loader.exe.lnk = D:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Microsoft Office.lnk = D:\Program Files\Microsoft Office\Office\OSA9.EXE
    O8 - Extra context menu item: &Yahoo! Search - file:///D:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///D:\Program Files\Yahoo!\Common/ycdict.htm
    O8 - Extra context menu item: Yahoo! &Maps - file:///D:\Program Files\Yahoo!\Common/ycmap.htm
    O8 - Extra context menu item: Yahoo! &SMS - file:///D:\Program Files\Yahoo!\Common/ycsms.htm
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - D:\Program Files\Java\jre1.6.0\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - D:\Program Files\Java\jre1.6.0\bin\ssv.dll
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - D:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\MSMSGS.EXE
    O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab31267.cab
    O16 - DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} (StagingUI Object) - http://zone.msn.com/binFrameWork/v10/StagingUI.cab53083.cab
    O16 - DPF: {26098EA2-C95D-48EA-89B4-63C5A63BD42F} - http://www.pacimedia.com/install/pcs_0025.exe
    O16 - DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} (ZoneBuddy Class) - http://zone.msn.com/BinFrameWork/v10/ZBuddy.cab53083.cab
    O16 - DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} (ZonePAChat Object) - http://zone.msn.com/binframework/v10/ZPAChat.cab53083.cab
    O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/EN-US/a-UNO1/GAME_UNO1.cab
    O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
    O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://cdn2.zone.msn.com/binFramework/v10/ZIntro.cab55579.cab
    O16 - DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} (StadiumProxy Class) - http://zone.msn.com/binframework/v10/StProxy.cab53852.cab
    O16 - DPF: {FF3C5A9F-5A91-4930-80E8-4709194C2AD3} (CheckersZPA Object) - http://zone.msn.com/bingame/zpagames/CheckersZPA.cab53083.cab
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "D:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
    O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - D:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - D:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - D:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - D:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPodService - Apple Computer, Inc. - D:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: PCTEL Speaker Phone (Pctspk) - PCtel, Inc. - D:\WINDOWS\system32\pctspk.exe
    O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - %ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini (file missing)
     
  15. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    How is it running now? Any problems?
     
  16. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/539418

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice