Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Venus123.com /contextplus Ads


  • Please log in to reply
12 replies to this topic

#1 dom920

dom920

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:08 AM

Posted 22 January 2006 - 12:27 AM

Hey,

I recently got a virus through AIM that installed all this crap on my computer. Please make it go away!

Logfile of HijackThis v1.99.1
Scan saved at 4:27:40 PM, on 1/21/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\Explorer.EXE
C:\Documents and Settings\Owner\Local Settings\Temp\hijackthis\hijackthis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://qus8.hpwis.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://srch-qus8.hpwis.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://mailhub.lawrence.edu/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://qus8.hpwis.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://srch-qus8.hpwis.com/
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://qus8.hpwis.com/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
N3 - Netscape 7: user_pref("browser.search.defaultengine", "engine://C%3A%5CProgram%20Files%5CNetscape%5CNetscape%5Csearchplugins%5CSBWeb_01.src"); (C:\Documents and Settings\Owner\Application Data\Mozilla\Profiles\default\cxy4i7l0.slt\prefs.js)
O2 - BHO: ngsh35.clsIS - {279A1B41-6CAC-4ABF-B39C-72C8E489F685} - C:\WINDOWS\system32\ngsh35.dll
O2 - BHO: ATLDistrib Object - {83A5F7B7-DC75-44CE-9195-264F41709FA9} - C:\WINDOWS\system32\mljge.dll
O2 - BHO: (no name) - {EA32FB3B-21C9-42cc-B8EF-01A9B28EDB0D} - C:\WINDOWS\system32\vtuts.dll
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [PS2] C:\WINDOWS\system32\ps2.exe
O4 - HKLM\..\Run: [Antivirus] C:\WINDOWS\b.exe
O4 - HKLM\..\Run: [vptray] C:\Program Files\NavNT\vptray.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE
O4 - HKLM\..\Run: [WinTools] C:\PROGRA~1\COMMON~1\WinTools\WToolsA.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [Dinst] C:\WINDOWS\dinst.exe
O4 - HKLM\..\Run: [freestyle] lockx.exe
O4 - HKLM\..\Run: [NIW\] C:\WINDOWS\mrjj.exe
O4 - HKLM\..\Run: [F ma] C:\WINDOWS\mrjj.exe
O4 - HKLM\..\Run: [\SWO] C:\WINDOWS\mrjj.exe
O4 - HKLM\..\Run: [sms_msn] C:\WINDOWS\system32\sms_msn.exe
O4 - HKLM\..\Run: [EVEL] C:\WINDOWS\mrjj.exe
O4 - HKLM\..\RunServices: [freestyle] lockx.exe
O4 - HKCU\..\Run: [JavaUpdate0.07] C:\WINDOWS\System32\uxltv.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {9E248641-0E24-4DDB-9A1F-705087832AD6} - (no file)
O9 - Extra 'Tools' menuitem: Java - {9E248641-0E24-4DDB-9A1F-705087832AD6} - (no file)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0E5F0222-96B9-11D3-8997-00104BD12D94} (PCPitstop Utility) - http://www.pcpitstop.com/pcpitstop/PCPitStop.CAB
O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} (RdxIE Class) - http://software-dl.real.com/29eedb00577aea...ip/RdxIE601.cab
O16 - DPF: {62475759-9E84-458E-A1AB-5D2C442ADFDE} - http://a1540.g.akamai.net/7/1540/52/200305...meInstaller.exe
O16 - DPF: {7B461720-5910-45A3-B617-3B53A972F209} (Pixami-PhotoWorks Upload UI Control) - http://services.photoworks.com/Pixami/PixamiSFWUploader.cab
O16 - DPF: {9AC54695-69A4-46F1-BE10-10C74F9520D5} (elitectl.DemoCtl) - http://cabs.elitemediagroup.net/cabs/mediaview.cab
O16 - DPF: {D30CA0FD-1CA0-11D4-AC78-006008A9A8BC} (WebBasedClientInstall Class) - http://www.lawrence.edu/navclient/webinst/WebInst.cab
O16 - DPF: {E855A2D4-987E-4F3B-A51C-64D10A7E2479} (EPSImageControl Class) - http://tools.ebayimg.com/eps/activex/EPSControl_v1-32.cab
O16 - DPF: {F5C90925-ABBF-4475-88F5-8622B452BA9E} (Compaq System Data Class) - http://ipgweb.cce.hp.com/bus-nacons/caller/SysQuery.cab
O20 - Winlogon Notify: Control Panel - C:\WINDOWS\system32\cqyptui.dll (file missing)
O20 - Winlogon Notify: CSCSettings - C:\WINDOWS\system32\q8ps0i77e8.dll
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
O20 - Winlogon Notify: mljge - C:\WINDOWS\system32\mljge.dll
O20 - Winlogon Notify: NavLogon - C:\WINDOWS\System32\NavLogon.dll
O20 - Winlogon Notify: vtuts - C:\WINDOWS\SYSTEM32\vtuts.dll
O23 - Service: AOL Connectivity Service (AOL ACS) - America Online, Inc. - C:\PROGRA~1\COMMON~1\AOL\ACS\acsd.exe
O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\NavNT\defwatch.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Local Security Authority Subsystem Service (lsass) - Unknown owner - C:\WINDOWS\scvhost.exe (file missing)
O23 - Service: Network Monitor - Unknown owner - C:\Program Files\Network Monitor\netmon.exe
O23 - Service: Norton AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\Program Files\NavNT\rtvscan.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe

BC AdBot (Login to Remove)

 


#2 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:04:08 AM

Posted 22 January 2006 - 04:02 PM

You have a real mess and it will take some time to get you clean

Please download http://www.atribune.org/ccount/click.php?id=4 to your desktop.
· Double-click VundoFix.exe to run it.
· Click the Scan for Vundo button.
· Once it's done scanning, click the Remove Vundo button.
· You will receive a prompt asking if you want to remove the files, click YES
· Once you click yes, your desktop will go blank as it starts removing Vundo.
· When completed, it will prompt that it will shutdown your computer, click OK.
· Turn your computer back on.
· Please post the contents of C:\vundofix.txt and a new HiJackThis log.
============
Download L2mfix from one of these two locations:

http://www.atribune.org/downloads/l2mfix.exe
http://www.downloads.subratam.org/l2mfix.exe

Save the file to your desktop and double click l2mfix.exe. Click the Install button to extract the files and follow the prompts, then open the newly added l2mfix folder on your desktop. Double click l2mfix.bat and select option #1 for Run Find Log by typing 1 and then pressing enter. This will scan your computer and it may appear nothing is happening, then, after a minute or 2, notepad will open with a log. Copy the contents of that log and paste it into this thread.

IMPORTANT: Do NOT run option #2 OR any other files in the l2mfix folder until you are asked to do so!

* Note: If you receive an error while running option #1 like: ''C:\windows\system32\cmd.exe
C:\windows\system32\autoexec.nt the system file is not suitable for running ms-dos and microsoft windows applications, choose close to terminate the application.."...then do one of the following:

1: Click on the l2mfix.bat again and choose option # 5 for Fix Autoexec.nt/cmd.exe error.
2: Alternatively, you can click the fixautont.html link in the l2mfix folder and follow the directions there to fix it manually.
Do not run the fix portion without fixing the error first.
After you have performed the procedures to fix the error, repeat the steps above to run option #1 for Run Find Log.
=====================
Get all of these and/or verify you have the current versions

SpywareBlaster 3.5.1 http://majorgeeks.com/download2859.html
SpyBot V1.4 http://www.majorgeeks.com/download2471.html
AdAware SE 1.06 http://www.majorgeeks.com/download506.html
MS AntiSpy - http://www.microsoft.com/downloads/details...&displaylang=en (XP and W2K only)

DownLoad them (they are free), install them, check each for their
definition updates
and then run AdAware, MS AntiSpy (W2k/XP) and Spybot, fixing anything
they say.

In SpywareBlaster - Always enable all protection after updates
In SpyBot - After an update run immunize
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#3 dom920

dom920
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:08 AM

Posted 22 January 2006 - 10:47 PM

I saved a vundofix log and another hijackthis log:

Hijackthis:

Logfile of HijackThis v1.99.1
Scan saved at 9:20:41 PM, on 1/22/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\Explorer.EXE
C:\Documents and Settings\Owner\Local Settings\Temp\hijackthis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://qus8.hpwis.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://srch-qus8.hpwis.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://mailhub.lawrence.edu/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://qus8.hpwis.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://srch-qus8.hpwis.com/
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://qus8.hpwis.com/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
N3 - Netscape 7: user_pref("browser.search.defaultengine", "engine://C%3A%5CProgram%20Files%5CNetscape%5CNetscape%5Csearchplugins%5CSBWeb_01.src"); (C:\Documents and Settings\Owner\Application Data\Mozilla\Profiles\default\cxy4i7l0.slt\prefs.js)
O2 - BHO: ngsh35.clsIS - {279A1B41-6CAC-4ABF-B39C-72C8E489F685} - C:\WINDOWS\system32\ngsh35.dll
O2 - BHO: ATLDistrib Object - {83A5F7B7-DC75-44CE-9195-264F41709FA9} - C:\WINDOWS\system32\mljge.dll
O2 - BHO: (no name) - {EA32FB3B-21C9-42cc-B8EF-01A9B28EDB0D} - C:\WINDOWS\system32\vtuts.dll
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [PS2] C:\WINDOWS\system32\ps2.exe
O4 - HKLM\..\Run: [Antivirus] C:\WINDOWS\b.exe
O4 - HKLM\..\Run: [vptray] C:\Program Files\NavNT\vptray.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [Dinst] C:\WINDOWS\dinst.exe
O4 - HKLM\..\Run: [freestyle] lockx.exe
O4 - HKLM\..\Run: [NIW\] C:\WINDOWS\mrjj.exe
O4 - HKLM\..\Run: [F ma] C:\WINDOWS\mrjj.exe
O4 - HKLM\..\Run: [\SWO] C:\WINDOWS\mrjj.exe
O4 - HKLM\..\Run: [sms_msn] C:\WINDOWS\system32\sms_msn.exe
O4 - HKLM\..\Run: [EVEL] C:\WINDOWS\mrjj.exe
O4 - HKLM\..\RunServices: [freestyle] lockx.exe
O4 - HKCU\..\Run: [JavaUpdate0.07] C:\WINDOWS\System32\uxltv.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {9E248641-0E24-4DDB-9A1F-705087832AD6} - (no file)
O9 - Extra 'Tools' menuitem: Java - {9E248641-0E24-4DDB-9A1F-705087832AD6} - (no file)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0E5F0222-96B9-11D3-8997-00104BD12D94} (PCPitstop Utility) - http://www.pcpitstop.com/pcpitstop/PCPitStop.CAB
O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} (RdxIE Class) - http://software-dl.real.com/29eedb00577aea...ip/RdxIE601.cab
O16 - DPF: {62475759-9E84-458E-A1AB-5D2C442ADFDE} - http://a1540.g.akamai.net/7/1540/52/200305...meInstaller.exe
O16 - DPF: {7B461720-5910-45A3-B617-3B53A972F209} (Pixami-PhotoWorks Upload UI Control) - http://services.photoworks.com/Pixami/PixamiSFWUploader.cab
O16 - DPF: {9AC54695-69A4-46F1-BE10-10C74F9520D5} (elitectl.DemoCtl) - http://cabs.elitemediagroup.net/cabs/mediaview.cab
O16 - DPF: {D30CA0FD-1CA0-11D4-AC78-006008A9A8BC} (WebBasedClientInstall Class) - http://www.lawrence.edu/navclient/webinst/WebInst.cab
O16 - DPF: {E855A2D4-987E-4F3B-A51C-64D10A7E2479} (EPSImageControl Class) - http://tools.ebayimg.com/eps/activex/EPSControl_v1-32.cab
O16 - DPF: {F5C90925-ABBF-4475-88F5-8622B452BA9E} (Compaq System Data Class) - http://ipgweb.cce.hp.com/bus-nacons/caller/SysQuery.cab
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
O20 - Winlogon Notify: mljge - C:\WINDOWS\system32\mljge.dll
O20 - Winlogon Notify: NavLogon - C:\WINDOWS\System32\NavLogon.dll
O20 - Winlogon Notify: vtuts - C:\WINDOWS\SYSTEM32\vtuts.dll
O20 - Winlogon Notify: WindowsUpdate - C:\WINDOWS\system32\g2400chmef4a0.dll
O23 - Service: AOL Connectivity Service (AOL ACS) - America Online, Inc. - C:\PROGRA~1\COMMON~1\AOL\ACS\acsd.exe
O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\NavNT\defwatch.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Local Security Authority Subsystem Service (lsass) - Unknown owner - C:\WINDOWS\scvhost.exe (file missing)
O23 - Service: Network Monitor - Unknown owner - C:\Program Files\Network Monitor\netmon.exe
O23 - Service: Norton AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\Program Files\NavNT\rtvscan.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe

Vundofix log:

VundoFix V4.0

Listing files found while scanning....

C:\WINDOWS\system32\vtuts.dll
C:\WINDOWS\system32\mljge.dll
C:\WINDOWS\system32\egjlm.ini
C:\WINDOWS\system32\egjlm.bak1
C:\WINDOWS\system32\egjlm.bak2
C:\WINDOWS\system32\egjlm.ini2
C:\WINDOWS\system32\egjlm.tmp

C:\WINDOWS\system32\egjlm.bak1
C:\WINDOWS\system32\egjlm.bak2
C:\WINDOWS\system32\egjlm.tmp
C:\WINDOWS\system32\egjlm.ini
C:\WINDOWS\system32\egjlm.ini2
C:\WINDOWS\system32\mljge.dll
Attempting to delete C:\WINDOWS\system32\vtuts.dll
C:\WINDOWS\system32\vtuts.dll Could not be deleted.

Attempting to delete C:\WINDOWS\system32\mljge.dll
C:\WINDOWS\system32\mljge.dll Could not be deleted.

Attempting to delete C:\WINDOWS\system32\egjlm.ini
C:\WINDOWS\system32\egjlm.ini Has been deleted!

Attempting to delete C:\WINDOWS\system32\egjlm.bak1
C:\WINDOWS\system32\egjlm.bak1 Has been deleted!

Attempting to delete C:\WINDOWS\system32\egjlm.bak2
C:\WINDOWS\system32\egjlm.bak2 Has been deleted!

Attempting to delete C:\WINDOWS\system32\egjlm.ini2
C:\WINDOWS\system32\egjlm.ini2 Has been deleted!

Attempting to delete C:\WINDOWS\system32\egjlm.tmp
C:\WINDOWS\system32\egjlm.tmp Has been deleted!

Attempting to delete C:\WINDOWS\system32\mljge.dll
C:\WINDOWS\system32\mljge.dll Could not be deleted.

Performing Repairs to the registry.
Done!
VundoFix V4.0

Listing files found while scanning....

C:\WINDOWS\system32\vtuts.dll
C:\WINDOWS\system32\mljge.dll
C:\WINDOWS\system32\egjlm.ini
C:\WINDOWS\system32\egjlm.bak2

Attempting to delete C:\WINDOWS\system32\vtuts.dll
C:\WINDOWS\system32\vtuts.dll Could not be deleted.

Attempting to delete C:\WINDOWS\system32\mljge.dll
C:\WINDOWS\system32\mljge.dll Could not be deleted.

Attempting to delete C:\WINDOWS\system32\egjlm.ini
C:\WINDOWS\system32\egjlm.ini Has been deleted!

Attempting to delete C:\WINDOWS\system32\egjlm.bak2
C:\WINDOWS\system32\egjlm.bak2 Has been deleted!

Performing Repairs to the registry.
Done!

Thanks for your help!!!

#4 dom920

dom920
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:08 AM

Posted 22 January 2006 - 11:06 PM

Also, here is the log from l2mfix:

L2MFIX find log 010406
These are the registry keys present
**********************************************************************************
Winlogon/notify:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt32chain]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,33,00,32,00,2e,00,64,00,6c,00,\
6c,00,00,00
"Logoff"="ChainWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cryptnet]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,6e,00,65,00,74,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Logoff"="CryptnetWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cscdll]
"DLLName"="cscdll.dll"
"Logon"="WinlogonLogonEvent"
"Logoff"="WinlogonLogoffEvent"
"ScreenSaver"="WinlogonScreenSaverEvent"
"Startup"="WinlogonStartupEvent"
"Shutdown"="WinlogonShutdownEvent"
"StartShell"="WinlogonStartShellEvent"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\igfxcui]
@=""
"DLLName"="igfxsrvc.dll"
"Asynchronous"=dword:00000001
"Impersonate"=dword:00000001
"Unlock"="WinlogonUnlockEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Installer]
"Asynchronous"=dword:00000000
"DllName"="C:\\WINDOWS\\system32\\hr6805jue.dll"
"Impersonate"=dword:00000000
"Logon"="WinLogon"
"Logoff"="WinLogoff"
"Shutdown"="WinShutdown"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mljge]
"Asynchronous"=dword:00000001
"DllName"="C:\\WINDOWS\\system32\\mljge.dll"
"Impersonate"=dword:00000000
"Startup"="SysLogon"
"Logoff"="SysLogoff"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\NavLogon]
"DllName"="C:\\WINDOWS\\System32\\NavLogon.dll"
"Logoff"="NavLogoffEvent"
"StartShell"="NavStartShellEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ScCertProp]
"DLLName"="wlnotify.dll"
"Logon"="SCardStartCertProp"
"Logoff"="SCardStopCertProp"
"Lock"="SCardSuspendCertProp"
"Unlock"="SCardResumeCertProp"
"Enabled"=dword:00000001
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Schedule]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"StartShell"="SchedStartShell"
"Logoff"="SchedEventLogOff"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\sclgntfy]
"Logoff"="WLEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001
"DllName"=hex(2):73,00,63,00,6c,00,67,00,6e,00,74,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SensLogn]
"DLLName"="WlNotify.dll"
"Lock"="SensLockEvent"
"Logon"="SensLogonEvent"
"Logoff"="SensLogoffEvent"
"Safe"=dword:00000001
"MaxWait"=dword:00000258
"StartScreenSaver"="SensStartScreenSaverEvent"
"StopScreenSaver"="SensStopScreenSaverEvent"
"Startup"="SensStartupEvent"
"Shutdown"="SensShutdownEvent"
"StartShell"="SensStartShellEvent"
"PostShell"="SensPostShellEvent"
"Disconnect"="SensDisconnectEvent"
"Reconnect"="SensReconnectEvent"
"Unlock"="SensUnlockEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\termsrv]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"Logoff"="TSEventLogoff"
"Logon"="TSEventLogon"
"PostShell"="TSEventPostShell"
"Shutdown"="TSEventShutdown"
"StartShell"="TSEventStartShell"
"Startup"="TSEventStartup"
"MaxWait"=dword:00000258
"Reconnect"="TSEventReconnect"
"Disconnect"="TSEventDisconnect"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\vtuts]
"Asynchronous"=dword:00000001
"DllName"="vtuts.dll"
"Impersonate"=dword:00000000
"Logon"="Logon"
"Logoff"="Logoff"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlballoon]
"DLLName"="wlnotify.dll"
"Logon"="RegisterTicketExpiredNotificationEvent"
"Logoff"="UnregisterTicketExpiredNotificationEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

**********************************************************************************
useragent:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
"{E31D9782-AD10-7FE8-AD9D-FC580CD7D816}"=""

**********************************************************************************
Shell Extension key:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]
"{00022613-0000-0000-C000-000000000046}"="Multimedia File Property Sheet"
"{176d6597-26d3-11d1-b350-080036a75b03}"="ICM Scanner Management"
"{1F2E5C40-9550-11CE-99D2-00AA006E086C}"="NTFS Security Page"
"{3EA48300-8CF6-101B-84FB-666CCB9BCD32}"="OLE Docfile Property Page"
"{40dd6e20-7c17-11ce-a804-00aa003ca9f6}"="Shell extensions for sharing"
"{41E300E0-78B6-11ce-849B-444553540000}"="PlusPack CPL Extension"
"{42071712-76d4-11d1-8b24-00a0c9068ff3}"="Display Adapter CPL Extension"
"{42071713-76d4-11d1-8b24-00a0c9068ff3}"="Display Monitor CPL Extension"
"{42071714-76d4-11d1-8b24-00a0c9068ff3}"="Display Panning CPL Extension"
"{4E40F770-369C-11d0-8922-00A024AB2DBB}"="DS Security Page"
"{513D916F-2A8E-4F51-AEAB-0CBC76FB1AF8}"="Compatibility Page"
"{56117100-C0CD-101B-81E2-00AA004AE837}"="Shell Scrap DataHandler"
"{59099400-57FF-11CE-BD94-0020AF85B590}"="Disk Copy Extension"
"{59be4990-f85c-11ce-aff7-00aa003ca9f6}"="Shell extensions for Microsoft Windows Network objects"
"{5DB2625A-54DF-11D0-B6C4-0800091AA605}"="ICM Monitor Management"
"{675F097E-4C4D-11D0-B6C1-0800091AA605}"="ICM Printer Management"
"{764BF0E1-F219-11ce-972D-00AA00A14F56}"="Shell extensions for file compression"
"{77597368-7b15-11d0-a0c2-080036af3f03}"="Web Printer Shell Extension"
"{7988B573-EC89-11cf-9C00-00AA00A14F56}"="Disk Quota UI"
"{853FE2B1-B769-11d0-9C4E-00C04FB6C6FA}"="Encryption Context Menu"
"{85BBD920-42A0-1069-A2E4-08002B30309D}"="Briefcase"
"{88895560-9AA2-1069-930E-00AA0030EBC8}"="HyperTerminal Icon Ext"
"{BD84B380-8CA2-1069-AB1D-08000948F534}"="Fonts"
"{DBCE2480-C732-101B-BE72-BA78E9AD5B27}"="ICC Profile"
"{F37C5810-4D3F-11d0-B4BF-00AA00BBB723}"="Printers Security Page"
"{f81e9010-6ea4-11ce-a7ff-00aa003ca9f6}"="Shell extensions for sharing"
"{f92e8c40-3d33-11d2-b1aa-080036a75b03}"="Display TroubleShoot CPL Extension"
"{7444C717-39BF-11D1-8CD9-00C04FC29D45}"="Crypto PKO Extension"
"{7444C719-39BF-11D1-8CD9-00C04FC29D45}"="Crypto Sign Extension"
"{7007ACC7-3202-11D1-AAD2-00805FC1270E}"="Network Connections"
"{992CFFA0-F557-101A-88EC-00DD010CCC48}"="Network Connections"
"{E211B736-43FD-11D1-9EFB-0000F8757FCD}"="Scanners & Cameras"
"{FB0C9C8A-6C50-11D1-9F1D-0000F8757FCD}"="Scanners & Cameras"
"{905667aa-acd6-11d2-8080-00805f6596d2}"="Scanners & Cameras"
"{3F953603-1008-4f6e-A73A-04AAC7A992F1}"="Scanners & Cameras"
"{83bbcbf3-b28a-4919-a5aa-73027445d672}"="Scanners & Cameras"
"{F0152790-D56E-4445-850E-4F3117DB740C}"="Remote Sessions CPL Extension"
"{60254CA5-953B-11CF-8C96-00AA00B8708C}"="Shell extensions for Windows Script Host"
"{2206CDB2-19C1-11D1-89E0-00C04FD7A829}"="Microsoft Data Link"
"{DD2110F0-9EEF-11cf-8D8E-00AA0060F5BF}"="Tasks Folder Icon Handler"
"{797F1E90-9EDD-11cf-8D8E-00AA0060F5BF}"="Tasks Folder Shell Extension"
"{D6277990-4C6A-11CF-8D87-00AA0060F5BF}"="Scheduled Tasks"
"{0DF44EAA-FF21-4412-828E-260A8728E7F1}"="Taskbar and Start Menu"
"{2559a1f0-21d7-11d4-bdaf-00c04f60b9f0}"="Search"
"{2559a1f1-21d7-11d4-bdaf-00c04f60b9f0}"="Help and Support"
"{2559a1f2-21d7-11d4-bdaf-00c04f60b9f0}"="Help and Support"
"{2559a1f3-21d7-11d4-bdaf-00c04f60b9f0}"="Run..."
"{2559a1f4-21d7-11d4-bdaf-00c04f60b9f0}"="Internet"
"{2559a1f5-21d7-11d4-bdaf-00c04f60b9f0}"="E-mail"
"{D20EA4E1-3957-11d2-A40B-0C5020524152}"="Fonts"
"{D20EA4E1-3957-11d2-A40B-0C5020524153}"="Administrative Tools"
"{875CB1A1-0F29-45de-A1AE-CFB4950D0B78}"="Audio Media Properties Handler"
"{40C3D757-D6E4-4b49-BB41-0E5BBEA28817}"="Video Media Properties Handler"
"{E4B29F9D-D390-480b-92FD-7DDB47101D71}"="Wav Properties Handler"
"{87D62D94-71B3-4b9a-9489-5FE6850DC73E}"="Avi Properties Handler"
"{A6FD9E45-6E44-43f9-8644-08598F5A74D9}"="Midi Properties Handler"
"{c5a40261-cd64-4ccf-84cb-c394da41d590}"="Video Thumbnail Extractor"
"{5E6AB780-7743-11CF-A12B-00AA004AE837}"="Microsoft Internet Toolbar"
"{22BF0C20-6DA7-11D0-B373-00A0C9034938}"="Download Status"
"{91EA3F8B-C99B-11d0-9815-00C04FD91972}"="Augmented Shell Folder"
"{6413BA2C-B461-11d1-A18A-080036B11A03}"="Augmented Shell Folder 2"
"{F61FFEC1-754F-11d0-80CA-00AA005B4383}"="BandProxy"
"{7BA4C742-9E81-11CF-99D3-00AA004AE837}"="Microsoft BrowserBand"
"{30D02401-6A81-11d0-8274-00C04FD5AE38}"="Search Band"
"{32683183-48a0-441b-a342-7c2a440a9478}"="Media Band"
"{169A0691-8DF9-11d1-A1C4-00C04FD75D13}"="In-pane search"
"{07798131-AF23-11d1-9111-00A0C98BA67D}"="Web Search"
"{AF4F6510-F982-11d0-8595-00AA004CD6D8}"="Registry Tree Options Utility"
"{01E04581-4EEE-11d0-BFE9-00AA005B4383}"="&Address"
"{A08C11D2-A228-11d0-825B-00AA005B4383}"="Address EditBox"
"{00BB2763-6A77-11D0-A535-00C04FD7D062}"="Microsoft AutoComplete"
"{7376D660-C583-11d0-A3A5-00C04FD706EC}"="TridentImageExtractor"
"{6756A641-DE71-11d0-831B-00AA005B4383}"="MRU AutoComplete List"
"{6935DB93-21E8-4ccc-BEB9-9FE3C77A297A}"="Custom MRU AutoCompleted List"
"{7e653215-fa25-46bd-a339-34a2790f3cb7}"="Accessible"
"{acf35015-526e-4230-9596-becbe19f0ac9}"="Track Popup Bar"
"{E0E11A09-5CB8-4B6C-8332-E00720A168F2}"="Address Bar Parser"
"{00BB2764-6A77-11D0-A535-00C04FD7D062}"="Microsoft History AutoComplete List"
"{03C036F1-A186-11D0-824A-00AA005B4383}"="Microsoft Shell Folder AutoComplete List"
"{00BB2765-6A77-11D0-A535-00C04FD7D062}"="Microsoft Multiple AutoComplete List Container"
"{ECD4FC4E-521C-11D0-B792-00A0C90312E1}"="Shell Band Site Menu"
"{3CCF8A41-5C85-11d0-9796-00AA00B90ADF}"="Shell DeskBarApp"
"{ECD4FC4C-521C-11D0-B792-00A0C90312E1}"="Shell DeskBar"
"{ECD4FC4D-521C-11D0-B792-00A0C90312E1}"="Shell Rebar BandSite"
"{DD313E04-FEFF-11d1-8ECD-0000F87A470C}"="User Assist"
"{EF8AD2D1-AE36-11D1-B2D2-006097DF8C11}"="Global Folder Settings"
"{EFA24E61-B078-11d0-89E4-00C04FC9E26E}"="Favorites Band"
"{0A89A860-D7B1-11CE-8350-444553540000}"="Shell Automation Inproc Service"
"{E7E4BC40-E76A-11CE-A9BB-00AA004AE837}"="Shell DocObject Viewer"
"{A5E46E3A-8849-11D1-9D8C-00C04FC99D61}"="Microsoft Browser Architecture"
"{FBF23B40-E3F0-101B-8488-00AA003E56F8}"="InternetShortcut"
"{3C374A40-BAE4-11CF-BF7D-00AA006946EE}"="Microsoft Url History Service"
"{FF393560-C2A7-11CF-BFF4-444553540000}"="History"
"{7BD29E00-76C1-11CF-9DD0-00A0C9034933}"="Temporary Internet Files"
"{7BD29E01-76C1-11CF-9DD0-00A0C9034933}"="Temporary Internet Files"
"{CFBFAE00-17A6-11D0-99CB-00C04FD64497}"="Microsoft Url Search Hook"
"{A2B0DD40-CC59-11d0-A3A5-00C04FD706EC}"="IE4 Suite Splash Screen"
"{67EA19A0-CCEF-11d0-8024-00C04FD75D13}"="CDF Extension Copy Hook"
"{131A6951-7F78-11D0-A979-00C04FD705A2}"="ISFBand OC"
"{9461b922-3c5a-11d2-bf8b-00c04fb93661}"="Search Assistant OC"
"{3DC7A020-0ACD-11CF-A9BB-00AA004AE837}"="The Internet"
"{871C5380-42A0-1069-A2EA-08002B30309D}"="Internet Name Space"
"{EFA24E64-B078-11d0-89E4-00C04FC9E26E}"="Explorer Band"
"{9E56BE60-C50F-11CF-9A2C-00A0C90A90CE}"="Sendmail service"
"{9E56BE61-C50F-11CF-9A2C-00A0C90A90CE}"="Sendmail service"
"{88C6C381-2E85-11D0-94DE-444553540000}"="ActiveX Cache Folder"
"{E6FB5E20-DE35-11CF-9C87-00AA005127ED}"="WebCheck"
"{ABBE31D0-6DAE-11D0-BECA-00C04FD940BE}"="Subscription Mgr"
"{F5175861-2688-11d0-9C5E-00AA00A45957}"="Subscription Folder"
"{08165EA0-E946-11CF-9C87-00AA005127ED}"="WebCheckWebCrawler"
"{E3A8BDE6-ABCE-11d0-BC4B-00C04FD929DB}"="WebCheckChannelAgent"
"{E8BB6DC0-6B4E-11d0-92DB-00A0C90C2BD7}"="TrayAgent"
"{7D559C10-9FE9-11d0-93F7-00AA0059CE02}"="Code Download Agent"
"{E6CC6978-6B6E-11D0-BECA-00C04FD940BE}"="ConnectionAgent"
"{D8BD2030-6FC9-11D0-864F-00AA006809D9}"="PostAgent"
"{7FC0B86E-5FA7-11d1-BC7C-00C04FD929DB}"="WebCheck SyncMgr Handler"
"{352EC2B7-8B9A-11D1-B8AE-006008059382}"="Shell Application Manager"
"{0B124F8F-91F0-11D1-B8B5-006008059382}"="Installed Apps Enumerator"
"{CFCCC7A0-A282-11D1-9082-006008059382}"="Darwin App Publisher"
"{e84fda7c-1d6a-45f6-b725-cb260c236066}"="Shell Image Verbs"
"{66e4e4fb-f385-4dd0-8d74-a2efd1bc6178}"="Shell Image Data Factory"
"{3F30C968-480A-4C6C-862D-EFC0897BB84B}"="GDI+ file thumbnail extractor"
"{9DBD2C50-62AD-11d0-B806-00C04FD706EC}"="Summary Info Thumbnail handler (DOCFILES)"
"{EAB841A0-9550-11cf-8C16-00805F1408F3}"="HTML Thumbnail Extractor"
"{eb9b1153-3b57-4e68-959a-a3266bc3d7fe}"="Shell Image Property Handler"
"{CC6EEFFB-43F6-46c5-9619-51D571967F7D}"="Web Publishing Wizard"
"{add36aa8-751a-4579-a266-d66f5202ccbb}"="Print Ordering via the Web"
"{6b33163c-76a5-4b6c-bf21-45de9cd503a1}"="Shell Publishing Wizard Object"
"{58f1f272-9240-4f51-b6d4-fd63d1618591}"="Get a Passport Wizard"
"{7A9D77BD-5403-11d2-8785-2E0420524153}"="User Accounts"
"{BD472F60-27FA-11cf-B8B4-444553540000}"="Compressed (zipped) Folder Right Drag Handler"
"{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}"="Compressed (zipped) Folder SendTo Target"
"{f39a0dc0-9cc8-11d0-a599-00c04fd64433}"="Channel File"
"{f3aa0dc0-9cc8-11d0-a599-00c04fd64434}"="Channel Shortcut"
"{f3ba0dc0-9cc8-11d0-a599-00c04fd64435}"="Channel Handler Object"
"{f3da0dc0-9cc8-11d0-a599-00c04fd64437}"="Channel Menu"
"{f3ea0dc0-9cc8-11d0-a599-00c04fd64438}"="Channel Properties"
"{63da6ec0-2e98-11cf-8d82-444553540000}"="FTP Folders Webview"
"{883373C3-BF89-11D1-BE35-080036B11A03}"="Microsoft DocProp Shell Ext"
"{A9CF0EAE-901A-4739-A481-E35B73E47F6D}"="Microsoft DocProp Inplace Edit Box Control"
"{8EE97210-FD1F-4B19-91DA-67914005F020}"="Microsoft DocProp Inplace ML Edit Box Control"
"{0EEA25CC-4362-4A12-850B-86EE61B0D3EB}"="Microsoft DocProp Inplace Droplist Combo Control"
"{6A205B57-2567-4A2C-B881-F787FAB579A3}"="Microsoft DocProp Inplace Calendar Control"
"{28F8A4AC-BBB3-4D9B-B177-82BFC914FA33}"="Microsoft DocProp Inplace Time Control"
"{8A23E65E-31C2-11d0-891C-00A024AB2DBB}"="Directory Query UI"
"{9E51E0D0-6E0F-11d2-9601-00C04FA31A86}"="Shell properties for a DS object"
"{163FDC20-2ABC-11d0-88F0-00A024AB2DBB}"="Directory Object Find"
"{F020E586-5264-11d1-A532-0000F8757D7E}"="Directory Start/Search Find"
"{0D45D530-764B-11d0-A1CA-00AA00C16E65}"="Directory Property UI"
"{62AE1F9A-126A-11D0-A14B-0800361B1103}"="Directory Context Menu Verbs"
"{ECF03A33-103D-11d2-854D-006008059367}"="MyDocs Copy Hook"
"{ECF03A32-103D-11d2-854D-006008059367}"="MyDocs Drop Target"
"{4a7ded0a-ad25-11d0-98a8-0800361b1103}"="MyDocs Properties"
"{750fdf0e-2a26-11d1-a3ea-080036587f03}"="Offline Files Menu"
"{10CFC467-4392-11d2-8DB4-00C04FA31A66}"="Offline Files Folder Options"
"{AFDB1F70-2A4C-11d2-9039-00C04F8EEB3E}"="Offline Files Folder"
"{143A62C8-C33B-11D1-84FE-00C04FA34A14}"="Microsoft Agent Character Property Sheet Handler"
"{ECCDF543-45CC-11CE-B9BF-0080C87CDBA6}"="DfsShell"
"{60fd46de-f830-4894-a628-6fa81bc0190d}"="%DESC_PublishDropTarget%"
"{7A80E4A8-8005-11D2-BCF8-00C04F72C717}"="MMC Icon Handler"
"{0CD7A5C0-9F37-11CE-AE65-08002B2E1262}"=".CAB file viewer"
"{32714800-2E5F-11d0-8B85-00AA0044F941}"="For &People..."
"{8DD448E6-C188-4aed-AF92-44956194EB1F}"="Windows Media Player Play as Playlist Context Menu Handler"
"{CE3FB1D1-02AE-4a5f-A6E9-D9F1B4073E6C}"="Windows Media Player Burn Audio CD Context Menu Handler"
"{F1B9284F-E9DC-4e68-9D7E-42362A59F0FD}"="Windows Media Player Add to Playlist Context Menu Handler"
"{F0CB00CD-5A07-4D91-97F5-A8C92CDA93E4}"="Shell Extensions for RealOne Player"
"{7F67036B-66F1-411A-AD85-759FB9C5B0DB}"="SampleView"
"{1D2680C9-0E2A-469d-B787-065558BC7D43}"="Fusion Cache"
"{1CDB2949-8F65-4355-8456-263E7C208A5D}"="Desktop Explorer"
"{1E9B04FB-F9E5-4718-997B-B8DA88302A47}"="Desktop Explorer Menu"
"{5F327514-6C5E-4d60-8F16-D07FA08A78ED}"="Auto Update Property Sheet Extension"
"{BDA77241-42F6-11d0-85E2-00AA001FE28C}"="LDVP Shell Extensions"
"{640167b4-59b0-47a6-b335-a6b3c0695aea}"="Portable Media Devices"
"{cc86590a-b60a-48e6-996b-41d25ed39a1e}"="Portable Media Devices Menu"
"{2559a1f7-21d7-11d4-bdaf-00c04f60b9f0}"="Set Program Access and Defaults"
"{596AB062-B4D2-4215-9F74-E9109B0A8153}"="Previous Versions Property Page"
"{9DB7A13C-F208-4981-8353-73CC61AE2783}"="Previous Versions"
"{692F0339-CBAA-47e6-B5B5-3B84DB604E87}"="Extensions Manager Folder"
"{B9E1D2CB-CCFF-4AA6-9579-D7A4754030EF}"="iTunes"
"{e57ce731-33e8-4c51-8354-bb4de9d215d1}"="Universal Plug and Play Devices"
"{BDEADF00-C265-11D0-BCED-00A0C90AB50F}"="Web Folders"
"{00020D75-0000-0000-C000-000000000046}"="Microsoft Office Outlook Desktop Icon Handler"
"{0006F045-0000-0000-C000-000000000046}"="Microsoft Office Outlook Custom Icon Handler"
"{42042206-2D85-11D3-8CFF-005004838597}"="Microsoft Office HTML Icon Handler"
"{21569614-B795-46b1-85F4-E737A8DC09AD}"="Shell Search Band"
"{2D6D60CC-100A-4DE0-AF39-267B34B7F6B4}"=""
"{897E0D42-8E72-410D-A134-03B463EAEC90}"=""
"{3FB96DAF-98EA-4CE5-B2C7-C1108C859875}"=""
"{C3D29B37-79DD-4777-9736-537EE1A7C2CD}"=""

**********************************************************************************
HKEY ROOT CLASSIDS:
Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{2D6D60CC-100A-4DE0-AF39-267B34B7F6B4}]
@=""
"IDEx"="ADDR"

[HKEY_CLASSES_ROOT\CLSID\{2D6D60CC-100A-4DE0-AF39-267B34B7F6B4}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\CLSID\{2D6D60CC-100A-4DE0-AF39-267B34B7F6B4}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{2D6D60CC-100A-4DE0-AF39-267B34B7F6B4}\InprocServer32]
@="C:\\WINDOWS\\system32\\cqyptui.dll"
"ThreadingModel"="Apartment"

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{897E0D42-8E72-410D-A134-03B463EAEC90}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{897E0D42-8E72-410D-A134-03B463EAEC90}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\CLSID\{897E0D42-8E72-410D-A134-03B463EAEC90}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{897E0D42-8E72-410D-A134-03B463EAEC90}\InprocServer32]
@="C:\\WINDOWS\\system32\\stlunirl.dll"
"ThreadingModel"="Apartment"

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{C3D29B37-79DD-4777-9736-537EE1A7C2CD}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{C3D29B37-79DD-4777-9736-537EE1A7C2CD}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\CLSID\{C3D29B37-79DD-4777-9736-537EE1A7C2CD}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{C3D29B37-79DD-4777-9736-537EE1A7C2CD}\InprocServer32]
@="C:\\WINDOWS\\system32\\guard.tmp"
"ThreadingModel"="Apartment"

**********************************************************************************
Files Found are not all bad files:

C:\WINDOWS\SYSTEM32\
08mcdqrw.dll Tue Jan 17 2006 11:16:46p A.... 44,544 43.50 K
bgtmeter.dll Sun Jan 22 2006 9:10:18p ..S.R 234,439 228.94 K
browseui.dll Wed Nov 23 2005 7:06:34p A.... 1,022,464 998.50 K
danim.dll Fri Nov 4 2005 9:16:24p A.... 1,054,208 1.00 M
ddtime.dll Sun Jan 22 2006 9:25:46p ..S.R 235,304 229.79 K
e4jmle~1.dll Sun Jan 22 2006 8:29:18p ..S.R 234,439 228.94 K
fplq03~1.dll Wed Jan 18 2006 7:00:54p ..S.R 235,894 230.36 K
gdi32.dll Wed Dec 28 2005 8:54:36p A.... 280,064 273.50 K
gppsl3~1.dll Wed Jan 18 2006 2:31:40a ..S.R 236,045 230.51 K
hhbclxr.dll Tue Jan 17 2006 10:11:08a A.... 139,264 136.00 K
hr6805~1.dll Sun Jan 22 2006 9:14:58p ..S.R 235,304 229.79 K
i624lg~1.dll Thu Jan 19 2006 12:37:28a ..S.R 236,787 231.23 K
ir2ml5~1.dll Wed Jan 18 2006 1:09:54p ..S.R 235,397 229.88 K
jdsd400.dll Thu Jan 19 2006 4:44:56p ..S.R 235,802 230.27 K
jtn207~1.dll Wed Jan 18 2006 2:36:00a ..S.R 234,529 229.03 K
kt2ol7~1.dll Tue Jan 17 2006 11:55:04p ..S.R 235,599 230.07 K
kt46l7~1.dll Sun Jan 22 2006 9:23:28p ..S.R 236,951 231.39 K
l4n4le~1.dll Sat Jan 21 2006 10:16:54p ..S.R 233,637 228.16 K
lv4o09~1.dll Sun Jan 22 2006 9:25:46p ..S.R 235,653 230.13 K
lv8s09~1.dll Fri Jan 20 2006 2:26:42p ..S.R 235,802 230.27 K
lycmgr10.dll Thu Jan 19 2006 12:37:30a ..S.R 235,361 229.84 K
mljge.dll Wed Jan 18 2006 1:11:58p ..... 565,300 552.05 K
mpctfp.dll Sat Jan 21 2006 4:23:40p ..S.R 233,637 228.16 K
mpiqtz32.dll Fri Jan 20 2006 4:00:52p ..S.R 237,214 231.65 K
mshtml.dll Wed Nov 23 2005 7:06:34p A.... 3,015,680 2.88 M
msxml3a.dll Tue Jan 17 2006 11:29:34p A.... 24,576 24.00 K
mvnml9~1.dll Wed Jan 18 2006 1:37:20a ..S.R 235,431 229.91 K
ngsh35.dll Wed Jan 18 2006 1:20:06a A.... 81,977 80.05 K
ngsh40.dll Wed Jan 18 2006 1:19:44a A.... 65,593 64.05 K
o0rola~1.dll Thu Jan 19 2006 4:34:32p ..S.R 235,361 229.84 K
oabcbcp.dll Sun Jan 22 2006 9:14:58p ..S.R 234,439 228.94 K
q0860a~1.dll Wed Jan 18 2006 2:21:36a ..S.R 234,952 229.45 K
regclass.dll Wed Jan 18 2006 1:20:00a A.... 49,152 48.00 K
s088la~1.dll Wed Jan 18 2006 7:29:16p ..S.R 235,361 229.84 K
s688lg~1.dll Wed Jan 18 2006 7:09:14p ..S.R 237,247 231.68 K
seardssp.dll Sat Jan 21 2006 9:45:54p ..S.R 233,637 228.16 K
shdocvw.dll Wed Nov 30 2005 9:59:30p A.... 1,492,480 1.42 M
ssttt.dll Tue Jan 17 2006 11:41:34p ..SH. 36,877 36.01 K
stlunirl.dll Sun Jan 22 2006 9:23:28p ..S.R 235,304 229.79 K
t8r80i~1.dll Wed Jan 18 2006 1:54:36a ..S.R 235,170 229.66 K
tnaffic.dll Thu Jan 19 2006 12:33:28a ..S.R 235,361 229.84 K
urlmon.dll Fri Nov 4 2005 9:16:28p A.... 609,280 595.00 K
vtuts.dll Tue Jan 17 2006 11:16:24p ..... 36,877 36.01 K
wuauclt.dll Tue Jan 17 2006 11:18:00p A.... 30,720 30.00 K
wyashext.dll Sat Jan 21 2006 4:19:28p ..S.R 237,214 231.65 K

45 items found: 45 files (30 H/S), 0 directories.
Total of file sizes: 15,376,327 bytes 14.66 M
Locate .tmp files:

C:\WINDOWS\SYSTEM32\
egjlm.tmp Sun Jan 22 2006 9:26:04p ..SH. 391,169 382.00 K
guard.tmp Sun Jan 22 2006 9:26:48p ..S.R 235,304 229.79 K
lat675.tmp Tue Jan 17 2006 11:52:26p A.... 0 0.00 K

3 items found: 3 files (2 H/S), 0 directories.
Total of file sizes: 626,473 bytes 611.79 K
**********************************************************************************
Directory Listing of system files:
Volume in drive C is PRESARIO
Volume Serial Number is D0BB-5117

Directory of C:\WINDOWS\System32

01/22/2006 10:03 PM 391,740 egjlm.ini2
01/22/2006 09:26 PM 235,304 guard.tmp
01/22/2006 09:26 PM 391,169 egjlm.tmp
01/22/2006 09:25 PM 235,304 dDtime.dll
01/22/2006 09:25 PM 235,653 lv4o09h3e.dll
01/22/2006 09:24 PM 391,169 egjlm.ini
01/22/2006 09:23 PM 235,304 stlunirl.dll
01/22/2006 09:23 PM 236,951 kt46l7hs1.dll
01/22/2006 09:14 PM 234,439 oabcbcp.dll
01/22/2006 09:14 PM 235,304 hr6805jue.dll
01/22/2006 09:10 PM 234,439 bGtmeter.dll
01/22/2006 08:29 PM 234,439 e4jmle111h.dll
01/21/2006 10:16 PM 233,637 l4n4le5q1h.dll
01/21/2006 09:45 PM 233,637 seardssp.dll
01/21/2006 04:23 PM 233,637 mpctfp.dll
01/21/2006 04:19 PM 237,214 wyashext.dll
01/20/2006 04:00 PM 237,214 mpiqtz32.dll
01/20/2006 02:26 PM 235,802 lv8s09l7e.dll
01/19/2006 04:44 PM 235,802 jdsd400.dll
01/19/2006 04:34 PM 235,361 o0rola931d.dll
01/19/2006 12:37 AM 235,361 lycmgr10.dll
01/19/2006 12:37 AM 236,787 i624lgfq162e.dll
01/19/2006 12:33 AM 235,361 tnaffic.dll
01/18/2006 07:29 PM 235,361 s088lalu1dq8.dll
01/18/2006 07:09 PM 237,247 s688lglu16q8.dll
01/18/2006 07:00 PM 235,894 fplq0335e.dll
01/18/2006 01:09 PM 235,397 ir2ml5f11.dll
01/18/2006 02:35 AM 234,529 jtn2075oe.dll
01/18/2006 02:31 AM 236,045 gppsl3771.dll
01/18/2006 02:21 AM 234,952 q0860alsedq60.dll
01/18/2006 01:54 AM 235,170 t8r80i9ue8.dll
01/18/2006 01:37 AM 235,431 mvnml9511.dll
01/17/2006 11:55 PM 235,599 kt2ol7f31.dll
01/17/2006 11:41 PM 36,877 ssttt.dll
01/17/2006 10:11 AM 405,504 l?gonui.exe
01/12/2006 03:01 AM <DIR> dllcache
04/10/2003 04:12 AM <DIR> Microsoft
35 File(s) 8,679,034 bytes
2 Dir(s) 4,047,974,400 bytes free

#5 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:04:08 AM

Posted 23 January 2006 - 09:14 AM

Close any programs you have open since this step requires a reboot.

From the l2mfix folder on your desktop, double click l2mfix.bat and select option #2 for Run Fix by typing 2 and then pressing enter, then press any key to reboot your computer. After a reboot, your desktop and icons will appear, then disappear (this is normal). L2mfix will continue to scan your computer and when it's finished, notepad will open with a log. Copy the contents of that log and paste it back into this thread, along with a new hijackthis log.


If after the reboot the desktop icons don’t disappear or the log does not pop up then in the l2mfix folder double click the second.bat file to continue with the fix.

IMPORTANT: Do NOT run any other files in the l2mfix folder until you are asked to do so!
===============
Go to the link below and download the trial version of SpySweeper:

SpySweeper http://www.webroot.com/consumer/products/s...&rc=4129&ac=tsg

* Click the Free Trial link under "SpySweeper" to download the program.
* Install it. Once the program is installed, it will open.
* It will prompt you to update to the latest definitions, click Yes.
* Once the definitions are installed, click Options on the left side.
* Click the Sweep Options tab.
* Under What to Sweep please put a check next to the following:
o Sweep Memory
o Sweep Registry
o Sweep Cookies
o Sweep All User Accounts
o Enable Direct Disk Sweeping
o Sweep Contents of Compressed Files
o Sweep for Rootkits

o Please UNCHECK Do not Sweep System Restore Folder.

* Click Sweep Now on the left side.
* Click the Start button.
* When it's done scanning, click the Next button.
* Make sure everything has a check next to it, then click the Next button.
* It will remove all of the items found.
* Click Session Log in the upper right corner, copy everything in that window.
* Click the Summary tab and click Finish.
* Paste the contents of the session log you copied into your next reply.
Also post a new Hijack This log.
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#6 dom920

dom920
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:08 AM

Posted 23 January 2006 - 02:40 PM

More and more logs:

L2mfix 010406
Creating Account.
The command completed successfully.

Adding Administrative privleges.
The command completed successfully.
Checking for L2MFix account(0=no 1=yes):
1
Granting SeDebugPrivilege to L2MFIX ... successful
Checking for L2MFix account(0=no 1=yes):
0
Zipping up files for submission:
zip warning: name not matched: dlls\*.*

zip error: Nothing to do! (backup.zip)
adding: backregs/notibac.reg (140 bytes security) (deflated 88%)

#7 dom920

dom920
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:08 AM

Posted 23 January 2006 - 02:43 PM

Logfile of HijackThis v1.99.1
Scan saved at 1:40:15 PM, on 1/23/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\COMMON~1\AOL\ACS\acsd.exe
C:\Program Files\NavNT\defwatch.exe
C:\Program Files\Network Monitor\netmon.exe
C:\Program Files\NavNT\rtvscan.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\MsPMSPSv.exe
C:\WINDOWS\system32\ps2.exe
C:\Program Files\NavNT\vptray.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\system32\sms_msn.exe
C:\Program Files\Microsoft AntiSpyware\gcasServ.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe
C:\Documents and Settings\Owner\Local Settings\Temp\hijackthis\hijackthis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://qus8.hpwis.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://srch-qus8.hpwis.com/
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://qus8.hpwis.com/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
N3 - Netscape 7: user_pref("browser.search.defaultengine", "engine://C%3A%5CProgram%20Files%5CNetscape%5CNetscape%5Csearchplugins%5CSBWeb_01.src"); (C:\Documents and Settings\Owner\Application Data\Mozilla\Profiles\default\cxy4i7l0.slt\prefs.js)
O2 - BHO: ngsh35.clsIS - {279A1B41-6CAC-4ABF-B39C-72C8E489F685} - C:\WINDOWS\system32\ngsh35.dll
O2 - BHO: ATLDistrib Object - {83A5F7B7-DC75-44CE-9195-264F41709FA9} - C:\WINDOWS\system32\mljge.dll
O2 - BHO: (no name) - {EA32FB3B-21C9-42cc-B8EF-01A9B28EDB0D} - C:\WINDOWS\system32\vtuts.dll
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [PS2] C:\WINDOWS\system32\ps2.exe
O4 - HKLM\..\Run: [Antivirus] C:\WINDOWS\b.exe
O4 - HKLM\..\Run: [vptray] C:\Program Files\NavNT\vptray.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [Dinst] C:\WINDOWS\dinst.exe
O4 - HKLM\..\Run: [freestyle] lockx.exe
O4 - HKLM\..\Run: [NIW\] C:\WINDOWS\mrjj.exe
O4 - HKLM\..\Run: [F ma] C:\WINDOWS\mrjj.exe
O4 - HKLM\..\Run: [\SWO] C:\WINDOWS\mrjj.exe
O4 - HKLM\..\Run: [sms_msn] C:\WINDOWS\system32\sms_msn.exe
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKLM\..\RunServices: [freestyle] lockx.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {9E248641-0E24-4DDB-9A1F-705087832AD6} - (no file)
O9 - Extra 'Tools' menuitem: Java - {9E248641-0E24-4DDB-9A1F-705087832AD6} - (no file)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0E5F0222-96B9-11D3-8997-00104BD12D94} (PCPitstop Utility) - http://www.pcpitstop.com/pcpitstop/PCPitStop.CAB
O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} (RdxIE Class) - http://software-dl.real.com/29eedb00577aea...ip/RdxIE601.cab
O16 - DPF: {62475759-9E84-458E-A1AB-5D2C442ADFDE} - http://a1540.g.akamai.net/7/1540/52/200305...meInstaller.exe
O16 - DPF: {7B461720-5910-45A3-B617-3B53A972F209} (Pixami-PhotoWorks Upload UI Control) - http://services.photoworks.com/Pixami/PixamiSFWUploader.cab
O16 - DPF: {9AC54695-69A4-46F1-BE10-10C74F9520D5} (elitectl.DemoCtl) - http://cabs.elitemediagroup.net/cabs/mediaview.cab
O16 - DPF: {D30CA0FD-1CA0-11D4-AC78-006008A9A8BC} (WebBasedClientInstall Class) - http://www.lawrence.edu/navclient/webinst/WebInst.cab
O16 - DPF: {E855A2D4-987E-4F3B-A51C-64D10A7E2479} (EPSImageControl Class) - http://tools.ebayimg.com/eps/activex/EPSControl_v1-32.cab
O16 - DPF: {F5C90925-ABBF-4475-88F5-8622B452BA9E} (Compaq System Data Class) - http://ipgweb.cce.hp.com/bus-nacons/caller/SysQuery.cab
O20 - Winlogon Notify: App Management - C:\WINDOWS\system32\irl8l53u1.dll (file missing)
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
O20 - Winlogon Notify: mljge - C:\WINDOWS\system32\mljge.dll
O20 - Winlogon Notify: NavLogon - C:\WINDOWS\System32\NavLogon.dll
O20 - Winlogon Notify: Telephony - C:\WINDOWS\system32\guard.tmp (file missing)
O20 - Winlogon Notify: vtuts - C:\WINDOWS\SYSTEM32\vtuts.dll
O23 - Service: AOL Connectivity Service (AOL ACS) - America Online, Inc. - C:\PROGRA~1\COMMON~1\AOL\ACS\acsd.exe
O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\NavNT\defwatch.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Local Security Authority Subsystem Service (lsass) - Unknown owner - C:\WINDOWS\scvhost.exe (file missing)
O23 - Service: Network Monitor - Unknown owner - C:\Program Files\Network Monitor\netmon.exe
O23 - Service: Norton AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\Program Files\NavNT\rtvscan.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe

#8 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:04:08 AM

Posted 23 January 2006 - 04:25 PM

Do you have an account that has admin authority as neither of the fixes so far have run correctly

=============

Go to the link below and download the trial version of SpySweeper:

SpySweeper http://www.webroot.com/consumer/products/s...&rc=4129&ac=tsg

* Click the Free Trial link under "SpySweeper" to download the program.
* Install it. Once the program is installed, it will open.
* It will prompt you to update to the latest definitions, click Yes.
* Once the definitions are installed, click Options on the left side.
* Click the Sweep Options tab.
* Under What to Sweep please put a check next to the following:
o Sweep Memory
o Sweep Registry
o Sweep Cookies
o Sweep All User Accounts
o Enable Direct Disk Sweeping
o Sweep Contents of Compressed Files
o Sweep for Rootkits

o Please UNCHECK Do not Sweep System Restore Folder.

* Click Sweep Now on the left side.
* Click the Start button.
* When it's done scanning, click the Next button.
* Make sure everything has a check next to it, then click the Next button.
* It will remove all of the items found.
* Click Session Log in the upper right corner, copy everything in that window.
* Click the Summary tab and click Finish.
* Paste the contents of the session log you copied into your next reply.
Also post a new Hijack This log.
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#9 dom920

dom920
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:08 AM

Posted 23 January 2006 - 05:44 PM

Whoever you are, thanks a ton! My computer is so much better so far! I REALLY appreciate your help!

Here are the results from spysweeper:

********
1:51 PM: | Start of Session, Monday, January 23, 2006 |
1:51 PM: Spy Sweeper started
1:51 PM: Sweep initiated using definitions version 605
1:51 PM: Starting Memory Sweep
1:51 PM: Found Adware: netwebsearch
1:51 PM: Detected running threat: C:\WINDOWS\system32\ngsh35.dll (ID = 236051)
1:54 PM: Detected running threat: C:\WINDOWS\system32\sms_msn.exe (ID = 221305)
1:54 PM: HKLM\Software\Microsoft\Windows\CurrentVersion\Run || sms_msn (ID = 0)
1:54 PM: Found Adware: command
1:54 PM: Detected running threat: C:\Program Files\Network Monitor\netmon.exe (ID = 231443)
1:56 PM: Memory Sweep Complete, Elapsed Time: 00:05:01
1:56 PM: Starting Registry Sweep
1:56 PM: Found Trojan Horse: 2nd-thought
1:56 PM: HKCR\interface\{6e0ed53c-9908-49ed-b055-7cb31b162577}\ (7 subtraces) (ID = 101978)
1:56 PM: HKCR\interface\{8c53bd8e-b12d-4c8f-ad0e-c9ddc39d1273}\ (8 subtraces) (ID = 101979)
1:56 PM: HKCR\interface\{9bcdd51b-4a7b-446c-8452-d32d38004582}\ (7 subtraces) (ID = 101980)
1:56 PM: HKCR\interface\{49db48ff-02b5-4645-b676-94a4df1aa026}\ (7 subtraces) (ID = 101981)
1:56 PM: HKCR\interface\{830d3aed-2fa9-454f-b266-d931862bbf34}\ (7 subtraces) (ID = 101982)
1:56 PM: HKCR\interface\{a986f4db-792e-4571-8974-0bb6e024766f}\ (7 subtraces) (ID = 101983)
1:56 PM: HKCR\interface\{bccab53d-0895-40c3-a942-a03538ce227a}\ (7 subtraces) (ID = 101984)
1:56 PM: HKCR\interface\{c0f88e9e-dceb-4655-968a-ae508a677c39}\ (7 subtraces) (ID = 101985)
1:56 PM: HKCR\interface\{d7eac2d8-2d52-4010-a4ad-dfdf60c1706c}\ (7 subtraces) (ID = 101986)
1:56 PM: HKLM\software\classes\interface\{6e0ed53c-9908-49ed-b055-7cb31b162577}\ (7 subtraces) (ID = 101993)
1:56 PM: HKLM\software\classes\interface\{8c53bd8e-b12d-4c8f-ad0e-c9ddc39d1273}\ (8 subtraces) (ID = 101994)
1:56 PM: HKLM\software\classes\interface\{9bcdd51b-4a7b-446c-8452-d32d38004582}\ (7 subtraces) (ID = 101995)
1:56 PM: HKLM\software\classes\interface\{49db48ff-02b5-4645-b676-94a4df1aa026}\ (7 subtraces) (ID = 101996)
1:56 PM: HKLM\software\classes\interface\{830d3aed-2fa9-454f-b266-d931862bbf34}\ (7 subtraces) (ID = 101997)
1:56 PM: HKLM\software\classes\interface\{a986f4db-792e-4571-8974-0bb6e024766f}\ (7 subtraces) (ID = 101998)
1:56 PM: HKLM\software\classes\interface\{bccab53d-0895-40c3-a942-a03538ce227a}\ (7 subtraces) (ID = 101999)
1:56 PM: HKLM\software\classes\interface\{c0f88e9e-dceb-4655-968a-ae508a677c39}\ (7 subtraces) (ID = 102000)
1:56 PM: HKLM\software\classes\interface\{d7eac2d8-2d52-4010-a4ad-dfdf60c1706c}\ (7 subtraces) (ID = 102001)
1:56 PM: Found Adware: addestroyer
1:56 PM: HKCR\interface\{6cdc3337-01f7-4a79-a4af-0b19303cc0be}\ (8 subtraces) (ID = 102732)
1:56 PM: HKCR\interface\{b288f21c-a144-4ca2-9b70-8afa1fae4b06}\ (8 subtraces) (ID = 102734)
1:56 PM: HKLM\software\classes\interface\{6cdc3337-01f7-4a79-a4af-0b19303cc0be}\ (8 subtraces) (ID = 102741)
1:56 PM: HKLM\software\classes\interface\{b288f21c-a144-4ca2-9b70-8afa1fae4b06}\ (8 subtraces) (ID = 102743)
1:56 PM: HKLM\software\classes\typelib\{e0d3b292-a0b0-4640-975c-2f882e039f52}\ (9 subtraces) (ID = 102747)
1:56 PM: HKCR\typelib\{e0d3b292-a0b0-4640-975c-2f882e039f52}\ (9 subtraces) (ID = 102751)
1:56 PM: Found Adware: gsim
1:56 PM: HKLM\software\microsoft\windows\currentversion\uninstall\gsim\ (2 subtraces) (ID = 127019)
1:56 PM: Found Adware: mirar webband
1:56 PM: HKCR\nn_bar_dummy.nn_bardummy.1\ (3 subtraces) (ID = 135075)
1:56 PM: HKCR\nn_bar_dummy.nn_bardummy\ (5 subtraces) (ID = 135076)
1:56 PM: HKLM\software\classes\nn_bar_dummy.nn_bardummy.1\ (3 subtraces) (ID = 135088)
1:56 PM: HKLM\software\classes\nn_bar_dummy.nn_bardummy\ (5 subtraces) (ID = 135089)
1:56 PM: HKLM\software\classes\nn_bar_dummy.nn_bardummy\clsid\ (1 subtraces) (ID = 135090)
1:56 PM: HKLM\software\classes\nn_bar_dummy.nn_bardummy\curver\ (1 subtraces) (ID = 135091)
1:56 PM: Found Adware: internetoptimizer
1:56 PM: HKCR\dyfuca_bh.bhobj.1\ (3 subtraces) (ID = 135175)
1:56 PM: HKCR\dyfuca_bh.bhobj\ (5 subtraces) (ID = 135176)
1:56 PM: HKLM\software\classes\dyfuca_bh.bhobj\ (5 subtraces) (ID = 135194)
1:56 PM: Found Adware: purityscan
1:56 PM: HKCR\interface\{3517fb25-305d-4012-b531-186e3851e7ed}\ (8 subtraces) (ID = 137348)
1:56 PM: HKCR\interface\{4781daa6-4de5-47a1-b02a-945f0d017a9e}\ (8 subtraces) (ID = 137349)
1:56 PM: HKCR\mediaticketsinstaller.mediaticketsinstallerctrl.1\ (3 subtraces) (ID = 137352)
1:56 PM: HKLM\software\classes\interface\{3517fb25-305d-4012-b531-186e3851e7ed}\ (8 subtraces) (ID = 137678)
1:56 PM: HKLM\software\classes\interface\{4781daa6-4de5-47a1-b02a-945f0d017a9e}\ (8 subtraces) (ID = 137679)
1:56 PM: HKLM\software\classes\interface\{4781daa6-4de5-47a1-b02a-945f0d017a9e}\typelib\ (2 subtraces) (ID = 137680)
1:56 PM: HKLM\software\classes\mediaticketsinstaller.mediaticketsinstallerctrl.1\ (3 subtraces) (ID = 137683)
1:56 PM: HKLM\software\classes\typelib\{5530d356-0063-41b9-b20d-e9d799e8d907}\ (9 subtraces) (ID = 137687)
1:56 PM: HKLM\software\microsoft\windows\currentversion\shareddlls\ || c:\windows\downloaded program files\mediaticketsinstaller.ocx (ID = 139077)
1:56 PM: HKCR\typelib\{5530d356-0063-41b9-b20d-e9d799e8d907}\ (9 subtraces) (ID = 139091)
1:56 PM: Found Adware: elitemediagroup-mediamotor
1:56 PM: HKLM\software\classes\iobjsafety.democtl\ (3 subtraces) (ID = 140120)
1:56 PM: HKLM\software\classes\typelib\{466c63ac-f26e-49f1-861a-e07da768a46a}\ (18 subtraces) (ID = 140131)
1:56 PM: HKCR\typelib\{466c63ac-f26e-49f1-861a-e07da768a46a}\ (18 subtraces) (ID = 140223)
1:56 PM: Found Adware: surfsidekick
1:56 PM: HKU\.default\software\surfsidekick3\ (2 subtraces) (ID = 143387)
1:56 PM: Found Trojan Horse: trojan-backdoor-soundcheck
1:56 PM: HKLM\system\currentcontrolset\services\msdirectx\ (7 subtraces) (ID = 144200)
1:56 PM: Found Adware: virtualbouncer
1:56 PM: HKLM\software\classes\typelib\{5e594162-60a9-487d-84b8-dbdd716cb862}\ (9 subtraces) (ID = 145551)
1:56 PM: HKCR\typelib\{5e594162-60a9-487d-84b8-dbdd716cb862}\ (9 subtraces) (ID = 145565)
1:56 PM: Found Adware: webhancer
1:56 PM: HKCR\whiehelperobj.whiehelperobj.1\ (3 subtraces) (ID = 146280)
1:56 PM: HKCR\whiehelperobj.whiehelperobj\ (3 subtraces) (ID = 146281)
1:56 PM: Found Adware: websearch toolbar
1:56 PM: HKLM\software\microsoft\windows\currentversion\installer\userdata\aui\ (1 subtraces) (ID = 146479)
1:56 PM: HKLM\system\currentcontrolset\enum\root\legacy_wintoolssvc\ (8 subtraces) (ID = 146518)
1:56 PM: Found Adware: ist yoursitebar
1:56 PM: HKLM\software\classes\ysb.ysbobj.1\ (3 subtraces) (ID = 147846)
1:56 PM: HKLM\software\classes\ysb.ysbobj\ (5 subtraces) (ID = 147847)
1:56 PM: HKLM\software\classes\ysbactivex.installer\ (3 subtraces) (ID = 147849)
1:56 PM: Found Adware: ist software
1:56 PM: HKLM\software\microsoft\windows\currentversion\moduleusage\c:/windows/downloaded program files/ysbactivex.dll\ (2 subtraces) (ID = 147854)
1:56 PM: HKLM\software\microsoft\windows\currentversion\shareddlls\ || c:\windows\downloaded program files\ysbactivex.dll (ID = 147857)
1:56 PM: HKLM\software\yoursitebar\ (1 subtraces) (ID = 147860)
1:56 PM: HKCR\ysb.ysbobj.1\ (3 subtraces) (ID = 147865)
1:56 PM: HKCR\ysb.ysbobj\ (5 subtraces) (ID = 147866)
1:56 PM: HKCR\ysbactivex.installer\ (3 subtraces) (ID = 147869)
1:57 PM: Found Adware: drsnsrch hijacker
1:57 PM: HKLM\software\microsoft\windows\currentversion\run\ || dinst (ID = 705664)
1:57 PM: Found Adware: clkoptimizer
1:57 PM: HKLM\software\microsoft\internet explorer\extensions\{9e248641-0e24-4ddb-9a1f-705087832ad6}\ (2 subtraces) (ID = 753449)
1:57 PM: Found Adware: ezula ilookup
1:57 PM: HKCR\bho.adware\ (5 subtraces) (ID = 819079)
1:57 PM: HKCR\bho.adware.1\ (3 subtraces) (ID = 819085)
1:57 PM: HKCR\bho.hider\ (5 subtraces) (ID = 819089)
1:57 PM: HKCR\bho.hider.1\ (3 subtraces) (ID = 819095)
1:57 PM: HKLM\software\classes\bho.adware\ (5 subtraces) (ID = 819212)
1:57 PM: HKLM\software\classes\bho.adware.1\ (3 subtraces) (ID = 819218)
1:57 PM: HKLM\software\classes\bho.hider\ (5 subtraces) (ID = 819222)
1:57 PM: HKLM\software\classes\bho.hider.1\ (3 subtraces) (ID = 819228)
1:57 PM: Found Adware: dollarrevenue
1:57 PM: HKLM\software\microsoft\drsmartload\ (1 subtraces) (ID = 916795)
1:57 PM: HKCR\ngsh35.clsdw\ (3 subtraces) (ID = 958369)
1:57 PM: HKCR\ngsh35.clsis\ (3 subtraces) (ID = 958373)
1:57 PM: HKLM\software\microsoft\windows\currentversion\run\ || sms_msn (ID = 958502)
1:57 PM: HKLM\software\classes\ngsh35.clsdw\ (3 subtraces) (ID = 958516)
1:57 PM: HKLM\software\classes\ngsh35.clsis\ (3 subtraces) (ID = 958520)
1:57 PM: HKLM\system\currentcontrolset\services\cmdservice\ (5 subtraces) (ID = 958670)
1:57 PM: Found Adware: mediamotor - popuppers
1:57 PM: HKCR\iemonitor.cbrowsers\ (3 subtraces) (ID = 960700)
1:57 PM: HKCR\iemonitor.ieevents\ (3 subtraces) (ID = 960704)
1:57 PM: HKLM\software\classes\iemonitor.cbrowsers\ (3 subtraces) (ID = 960762)
1:57 PM: HKLM\software\classes\iemonitor.ieevents\ (3 subtraces) (ID = 960766)
1:57 PM: Found Adware: safesurf
1:57 PM: HKCR\var9.iriras\ (5 subtraces) (ID = 966723)
1:57 PM: HKCR\var9.iriras.1\ (3 subtraces) (ID = 966729)
1:57 PM: HKLM\software\rasmon\ (20 subtraces) (ID = 966765)
1:57 PM: HKLM\software\classes\var9.iriras\ (5 subtraces) (ID = 966790)
1:57 PM: HKLM\software\classes\var9.iriras.1\ (3 subtraces) (ID = 966796)
1:57 PM: HKLM\software\microsoft\windows\currentversion\uninstall\rasmon\ (2 subtraces) (ID = 966833)
1:57 PM: Found Adware: elitemediagroup-pop64
1:57 PM: HKCR\elitectl.democtl\ (3 subtraces) (ID = 967500)
1:57 PM: HKCR\clsid\{9ac54695-69a4-46f1-be10-10c74f9520d5}\ (27 subtraces) (ID = 967504)
1:57 PM: HKCR\interface\{b216c7fc-397c-45f0-adfc-907df3c87339}\ (8 subtraces) (ID = 967532)
1:57 PM: HKCR\interface\{efdfe6ee-8888-422e-ab3c-b48589338ae3}\ (8 subtraces) (ID = 967541)
1:57 PM: HKCR\typelib\{5bec549d-581b-4636-ae75-28645e8cddc1}\ (9 subtraces) (ID = 967550)
1:57 PM: HKLM\software\classes\elitectl.democtl\ (3 subtraces) (ID = 967560)
1:57 PM: HKLM\software\classes\clsid\{9ac54695-69a4-46f1-be10-10c74f9520d5}\ (27 subtraces) (ID = 967564)
1:57 PM: HKLM\software\classes\interface\{b216c7fc-397c-45f0-adfc-907df3c87339}\ (8 subtraces) (ID = 967592)
1:57 PM: HKLM\software\classes\interface\{efdfe6ee-8888-422e-ab3c-b48589338ae3}\ (8 subtraces) (ID = 967601)
1:57 PM: HKLM\software\classes\typelib\{5bec549d-581b-4636-ae75-28645e8cddc1}\ (9 subtraces) (ID = 967610)
1:57 PM: HKLM\software\classes\whiehelperobj.whiehelperobj\ (3 subtraces) (ID = 972216)
1:57 PM: HKLM\software\classes\whiehelperobj.whiehelperobj.1\ (3 subtraces) (ID = 972220)
1:57 PM: HKLM\system\currentcontrolset\enum\root\legacy_cmdservice\0000\ (6 subtraces) (ID = 1016064)
1:57 PM: HKLM\system\currentcontrolset\enum\root\legacy_cmdservice\ (8 subtraces) (ID = 1016072)
1:57 PM: Found Adware: virtumonde
1:57 PM: HKCR\atldistrib.atldistrib\ (5 subtraces) (ID = 1030533)
1:57 PM: HKCR\atldistrib.atldistrib\clsid\ (1 subtraces) (ID = 1030535)
1:57 PM: HKCR\atldistrib.atldistrib\curver\ (1 subtraces) (ID = 1030537)
1:57 PM: HKCR\atldistrib.atldistrib.1\ (3 subtraces) (ID = 1030539)
1:57 PM: HKCR\atldistrib.atldistrib.1\clsid\ (1 subtraces) (ID = 1030541)
1:57 PM: HKLM\software\classes\atldistrib.atldistrib\ (5 subtraces) (ID = 1030666)
1:57 PM: HKLM\software\classes\atldistrib.atldistrib\clsid\ (1 subtraces) (ID = 1030668)
1:57 PM: HKLM\software\classes\atldistrib.atldistrib\curver\ (1 subtraces) (ID = 1030670)
1:57 PM: HKLM\software\classes\atldistrib.atldistrib.1\ (3 subtraces) (ID = 1030672)
1:57 PM: HKLM\software\classes\atldistrib.atldistrib.1\clsid\ (1 subtraces) (ID = 1030674)
1:57 PM: HKCR\mirar_dummy_ats.mirar_dummy_ats1\ (5 subtraces) (ID = 1055242)
1:57 PM: HKCR\mirar_dummy_ats.mirar_dummy_ats1.1\ (3 subtraces) (ID = 1055248)
1:57 PM: HKCR\mirar_dummy_ats.mirar_dummy_ats1.1\clsid\ (1 subtraces) (ID = 1055250)
1:57 PM: HKLM\software\classes\mirar_dummy_ats.mirar_dummy_ats1\ (5 subtraces) (ID = 1055285)
1:57 PM: HKLM\software\classes\mirar_dummy_ats.mirar_dummy_ats1.1\ (3 subtraces) (ID = 1055291)
1:57 PM: HKLM\software\classes\mirar_dummy_ats.mirar_dummy_ats1.1\clsid\ (1 subtraces) (ID = 1055293)
1:57 PM: HKLM\software\microsoft\windows\currentversion\shareddlls\ || c:\windows\system32\winats.dll (ID = 1055333)
1:57 PM: HKLM\software\microsoft\windows\currentversion\moduleusage\c:/windows/system32/winats.dll\ (2 subtraces) (ID = 1066860)
1:57 PM: HKCR\ngsh40.clsdw\ (3 subtraces) (ID = 1105127)
1:57 PM: HKCR\ngsh40.clsis\ (3 subtraces) (ID = 1105131)
1:57 PM: HKCR\clsid\{1d3a8f36-1267-46f7-8b77-7661df9161c3}\ (13 subtraces) (ID = 1105135)
1:57 PM: HKCR\clsid\{279a1b41-6cac-4abf-b39c-72c8e489f685}\ (13 subtraces) (ID = 1105149)
1:57 PM: HKCR\clsid\{7d9cb362-375b-4fb9-8024-e55079cc69d1}\ (13 subtraces) (ID = 1105163)
1:57 PM: HKCR\clsid\{9f34843f-7a90-499f-828f-90e0e63a1aff}\ (13 subtraces) (ID = 1105177)
1:57 PM: HKCR\typelib\{33198daa-bb5e-4f9d-aa4a-03da4bd4ca87}\ (9 subtraces) (ID = 1105191)
1:57 PM: HKCR\typelib\{57ffdab5-d0ca-460b-9119-c934147cccde}\ (9 subtraces) (ID = 1105201)
1:57 PM: HKLM\software\classes\clsid\{1d3a8f36-1267-46f7-8b77-7661df9161c3}\ (13 subtraces) (ID = 1105212)
1:57 PM: HKLM\software\classes\clsid\{279a1b41-6cac-4abf-b39c-72c8e489f685}\ (13 subtraces) (ID = 1105226)
1:57 PM: HKLM\software\classes\clsid\{7d9cb362-375b-4fb9-8024-e55079cc69d1}\ (13 subtraces) (ID = 1105240)
1:57 PM: HKLM\software\classes\ngsh40.clsdw\ (3 subtraces) (ID = 1105254)
1:57 PM: HKLM\software\classes\ngsh40.clsis\ (3 subtraces) (ID = 1105258)
1:57 PM: HKLM\software\microsoft\windows\currentversion\explorer\browser helper objects\{279a1b41-6cac-4abf-b39c-72c8e489f685}\ (ID = 1105262)
1:57 PM: HKLM\software\classes\clsid\{9f34843f-7a90-499f-828f-90e0e63a1aff}\ (13 subtraces) (ID = 1105264)
1:57 PM: HKLM\software\classes\typelib\{33198daa-bb5e-4f9d-aa4a-03da4bd4ca87}\ (9 subtraces) (ID = 1105278)
1:57 PM: HKLM\software\classes\typelib\{57ffdab5-d0ca-460b-9119-c934147cccde}\ (9 subtraces) (ID = 1105288)
1:57 PM: HKLM\software\microsoft\windows\currentversion\uninstall\{a394e835-c8d6-4b4b-884b-d2709059f3be}\ (7 subtraces) (ID = 1110756)
1:57 PM: HKU\WRSS_Profile_S-1-5-21-1629701515-3963290079-144182628-501\software\dynamic toolbar\gsim\ (102 subtraces) (ID = 127017)
1:57 PM: Found Adware: 180search assistant/zango
1:57 PM: HKU\WRSS_Profile_S-1-5-21-1629701515-3963290079-144182628-501\software\msbb\ (22 subtraces) (ID = 135781)
1:57 PM: HKU\WRSS_Profile_S-1-5-21-1629701515-3963290079-144182628-501\software\microsoft\internet explorer\urlsearchhooks\ || {87766247-311c-43b4-8499-3d5fec94a183} (ID = 146467)
1:57 PM: Found Adware: drsnsrch.com hijack
1:57 PM: HKU\S-1-5-21-1629701515-3963290079-144182628-1003\software\microsoft\search assistant\ || defaultsearchurl (ID = 128205)
1:57 PM: HKU\S-1-5-21-1629701515-3963290079-144182628-1003\software\dsrch\ (11 subtraces) (ID = 509156)
1:57 PM: Found Adware: sidesearch
1:57 PM: HKU\S-1-5-21-1629701515-3963290079-144182628-1003\software\microsoft\internet explorer\extensions\cmdmapping\ || {000007c6-17df-4438-92a4-de5537471ba3} (ID = 530423)
1:57 PM: Found Adware: lopdotcom
1:57 PM: HKU\S-1-5-18\software\microsoft\windows\currentversion\run\ || notn (ID = 131448)
1:57 PM: HKU\S-1-5-18\software\surfsidekick3\ (2 subtraces) (ID = 143412)
1:57 PM: HKU\S-1-5-18\software\toolbar\ (ID = 146513)
1:57 PM: HKU\S-1-5-18\software\toolbar\ (ID = 646239)
1:57 PM: HKU\S-1-5-18\software\microsoft\windows\currentversion\policies\ameopt\ (ID = 654042)
1:57 PM: Registry Sweep Complete, Elapsed Time:00:01:08
1:57 PM: Starting Cookie Sweep
1:57 PM: Found Spy Cookie: primaryads cookie
1:57 PM: owner@1.primaryads[1].txt (ID = 3190)
1:57 PM: Found Spy Cookie: 203.199.200 cookie
1:57 PM: owner@203.199.200[1].txt (ID = 1941)
1:57 PM: Found Spy Cookie: 888 cookie
1:57 PM: owner@888[2].txt (ID = 2019)
1:57 PM: owner@888[3].txt (ID = 2019)
1:57 PM: Found Spy Cookie: websponsors cookie
1:57 PM: owner@a.websponsors[2].txt (ID = 3665)
1:57 PM: Found Spy Cookie: go.com cookie
1:57 PM: owner@abc.go[2].txt (ID = 2729)
1:57 PM: Found Spy Cookie: abetterinternet cookie
1:57 PM: owner@abetterinternet[2].txt (ID = 2035)
1:57 PM: Found Spy Cookie: yieldmanager cookie
1:57 PM: owner@ad.yieldmanager[2].txt (ID = 3751)
1:57 PM: Found Spy Cookie: adecn cookie
1:57 PM: owner@adecn[2].txt (ID = 2063)
1:57 PM: Found Spy Cookie: adknowledge cookie
1:57 PM: owner@adknowledge[2].txt (ID = 2072)
1:57 PM: Found Spy Cookie: adlegend cookie
1:57 PM: owner@adlegend[1].txt (ID = 2074)
1:57 PM: Found Spy Cookie: hbmediapro cookie
1:57 PM: owner@adopt.hbmediapro[2].txt (ID = 2768)
1:57 PM: Found Spy Cookie: hotbar cookie
1:57 PM: owner@adopt.hotbar[2].txt (ID = 4207)
1:57 PM: Found Spy Cookie: precisead cookie
1:57 PM: owner@adopt.precisead[1].txt (ID = 3182)
1:57 PM: Found Spy Cookie: adprofile cookie
1:57 PM: owner@adprofile[2].txt (ID = 2084)
1:57 PM: Found Spy Cookie: adultfriendfinder cookie
1:57 PM: owner@adultfriendfinder[1].txt (ID = 2165)
1:57 PM: Found Spy Cookie: atwola cookie
1:57 PM: owner@ar.atwola[1].txt (ID = 2256)
1:57 PM: Found Spy Cookie: ask cookie
1:57 PM: owner@ask[1].txt (ID = 2245)
1:57 PM: Found Spy Cookie: belnk cookie
1:57 PM: owner@ath.belnk[1].txt (ID = 2293)
1:57 PM: owner@atwola[1].txt (ID = 2255)
1:57 PM: Found Spy Cookie: azjmp cookie
1:57 PM: owner@azjmp[2].txt (ID = 2270)
1:57 PM: Found Spy Cookie: a cookie
1:57 PM: owner@a[2].txt (ID = 2027)
1:57 PM: owner@belnk[1].txt (ID = 2292)
1:57 PM: Found Spy Cookie: btgrab cookie
1:57 PM: owner@btg.btgrab[2].txt (ID = 2333)
1:57 PM: Found Spy Cookie: enhance cookie
1:57 PM: owner@c.enhance[2].txt (ID = 2614)
1:57 PM: Found Spy Cookie: cardomain cookie
1:57 PM: owner@cardomain[2].txt (ID = 2350)
1:57 PM: Found Spy Cookie: cassava cookie
1:57 PM: owner@cassava[1].txt (ID = 2362)
1:57 PM: Found Spy Cookie: ccbill cookie
1:57 PM: owner@ccbill[2].txt (ID = 2369)
1:57 PM: Found Spy Cookie: centralmedia cookie
1:57 PM: owner@centralmedia[1].txt (ID = 2373)
1:57 PM: Found Spy Cookie: cliks cookie
1:57 PM: owner@cliks[1].txt (ID = 2414)
1:57 PM: Found Spy Cookie: columbiahouse cookie
1:57 PM: owner@columbiahouse[2].txt (ID = 2443)
1:57 PM: Found Spy Cookie: tickle cookie
1:57 PM: owner@cookie.tickle[1].txt (ID = 3530)
1:57 PM: Found Spy Cookie: dealtime cookie
1:57 PM: owner@dealtime[1].txt (ID = 2505)
1:57 PM: Found Spy Cookie: desktop kazaa cookie
1:57 PM: owner@desktop.kazaa[2].txt (ID = 2515)
1:57 PM: Found Spy Cookie: directtrack cookie
1:57 PM: owner@directtrack[1].txt (ID = 2527)
1:57 PM: owner@dist.belnk[2].txt (ID = 2293)
1:57 PM: Found Spy Cookie: exitexchange cookie
1:57 PM: owner@exitexchange[2].txt (ID = 2633)
1:57 PM: Found Spy Cookie: gotoast cookie
1:57 PM: owner@gotoast[2].txt (ID = 2751)
1:57 PM: owner@gozing.directtrack[2].txt (ID = 2528)
1:57 PM: owner@go[1].txt (ID = 2728)
1:57 PM: Found Spy Cookie: hitmgt cookie
1:57 PM: owner@hitmgt[1].txt (ID = 2787)
1:57 PM: Found Spy Cookie: clickandtrack cookie
1:57 PM: owner@hits.clickandtrack[2].txt (ID = 2397)
1:57 PM: owner@hotbar[1].txt (ID = 2797)
1:57 PM: Found Spy Cookie: hypertracker.com cookie
1:57 PM: owner@hypertracker[1].txt (ID = 2817)
1:57 PM: Found Spy Cookie: infospace cookie
1:57 PM: owner@infospace[2].txt (ID = 2865)
1:57 PM: Found Spy Cookie: kmpads cookie
1:57 PM: owner@kmpads[2].txt (ID = 2909)
1:57 PM: Found Spy Cookie: mx-targeting cookie
1:57 PM: owner@master.mx-targeting[1].txt (ID = 3024)
1:57 PM: Found Spy Cookie: metareward.com cookie
1:57 PM: owner@metareward[2].txt (ID = 2990)
1:57 PM: Found Spy Cookie: 2o7.net cookie
1:57 PM: owner@msnportal.112.2o7[1].txt (ID = 1958)
1:57 PM: Found Spy Cookie: nextag cookie
1:57 PM: owner@nextag[2].txt (ID = 5014)
1:57 PM: Found Spy Cookie: offeroptimizer cookie
1:57 PM: owner@offeroptimizer[1].txt (ID = 3087)
1:57 PM: owner@offeroptimizer[3].txt (ID = 3087)
1:57 PM: Found Spy Cookie: touchclarity cookie
1:57 PM: owner@partypoker.touchclarity[1].txt (ID = 3567)
1:57 PM: Found Spy Cookie: partypoker cookie
1:57 PM: owner@partypoker[2].txt (ID = 3111)
1:57 PM: Found Spy Cookie: passion cookie
1:57 PM: owner@passion[1].txt (ID = 3113)
1:57 PM: Found Spy Cookie: pub cookie
1:57 PM: owner@pub[2].txt (ID = 3205)
1:57 PM: owner@rapidresponse.directtrack[2].txt (ID = 2528)
1:57 PM: Found Spy Cookie: rednova cookie
1:57 PM: owner@rednova[2].txt (ID = 3245)
1:57 PM: Found Spy Cookie: rightmedia cookie
1:57 PM: owner@rightmedia[2].txt (ID = 3259)
1:57 PM: Found Spy Cookie: rn11 cookie
1:57 PM: owner@rn11[2].txt (ID = 3261)
1:57 PM: Found Spy Cookie: coolsavings cookie
1:57 PM: owner@sav.coolsavings[1].txt (ID = 2466)
1:57 PM: Found Spy Cookie: pch cookie
1:57 PM: owner@sb.pch[1].txt (ID = 3124)
1:57 PM: Found Spy Cookie: search123 cookie
1:57 PM: owner@search123[1].txt (ID = 3305)
1:57 PM: Found Spy Cookie: servlet cookie
1:57 PM: owner@servlet[2].txt (ID = 3345)
1:57 PM: owner@stat.dealtime[1].txt (ID = 2506)
1:57 PM: Found Spy Cookie: reliablestats cookie
1:57 PM: owner@stats1.reliablestats[2].txt (ID = 3254)
1:57 PM: Found Spy Cookie: tacoda cookie
1:57 PM: owner@tacoda[2].txt (ID = 6444)
1:57 PM: Found Spy Cookie: videodome cookie
1:57 PM: owner@videodome[1].txt (ID = 3638)
1:57 PM: owner@www9.dealtime[2].txt (ID = 2506)
1:57 PM: owner@yieldmanager[1].txt (ID = 3749)
1:57 PM: Found Spy Cookie: zenotecnico cookie
1:57 PM: owner@zenotecnico[1].txt (ID = 3858)
1:57 PM: system@ad.yieldmanager[1].txt (ID = 3751)
1:57 PM: system@adopt.hbmediapro[2].txt (ID = 2768)
1:57 PM: system@hits.clickandtrack[2].txt (ID = 2397)
1:57 PM: Found Spy Cookie: monstermarketplace cookie
1:57 PM: system@monstermarketplace[1].txt (ID = 3006)
1:57 PM: system@rn11[2].txt (ID = 3261)
1:57 PM: system@yieldmanager[1].txt (ID = 3749)
1:57 PM: Cookie Sweep Complete, Elapsed Time: 00:00:17
1:57 PM: Starting File Sweep
1:57 PM: Found Adware: clearsearch
1:57 PM: c:\documents and settings\guest\local settings\temp\clrsch (ID = -2147481250)
1:57 PM: c:\program files\network monitor (1 subtraces) (ID = -2147459771)
1:57 PM: c:\windows\system32\fleok (2 subtraces) (ID = -2147480556)
1:58 PM: a0154546.dll (ID = 215893)
1:59 PM: elite.ocx (ID = 187157)
1:59 PM: mediaview[1].cab (ID = 187158)
1:59 PM: a0154536.exe (ID = 197976)
2:00 PM: drsmartload[1].exe (ID = 235307)
2:00 PM: sms_msn[1].exe (ID = 221305)
2:00 PM: wtoolsu[1].cab (ID = 87826)
2:00 PM: a0150494.exe (ID = 125346)
2:00 PM: a0150500.exe (ID = 125346)
2:01 PM: Found Adware: look2me
2:01 PM: a0155709.exe (ID = 65722)
2:01 PM: a0155702.exe (ID = 197976)
2:01 PM: a0154518.exe (ID = 216567)
2:02 PM: a0155717.exe (ID = 236066)
2:02 PM: a0154519.exe (ID = 197976)
2:02 PM: a0155686.cpl (ID = 189954)
2:03 PM: a0155703.exe (ID = 216567)
2:03 PM: Found Adware: dialerplatform
2:03 PM: sportsinteraction.ico (ID = 58328)
2:04 PM: Found Adware: cydoor peer-to-peer dependency
2:04 PM: cd_clint.dll (ID = 57300)
2:04 PM: ngpw40[1].exe (ID = 236049)
2:06 PM: ngpw40.exe (ID = 236049)
2:06 PM: a0155716.exe (ID = 236049)
2:07 PM: a0155711.exe (ID = 186213)
2:07 PM: a0154511.exe (ID = 216712)
2:08 PM: ir2ml5f11.dll (ID = 159)
2:08 PM: a0162000.ocx (ID = 186211)
2:08 PM: a0155718.exe (ID = 186213)
2:08 PM: a0155705.exe (ID = 185455)
2:08 PM: a0154512.dll (ID = 189)
2:09 PM: a0162002.ocx (ID = 188117)
2:09 PM: a0159817.dll (ID = 159)
2:11 PM: a0155723.exe (ID = 185463)
2:12 PM: a0160147.exe (ID = 213484)
2:14 PM: ngsh40[1].dll (ID = 236050)
2:14 PM: sngsh40.dll (ID = 236050)
2:14 PM: a0150487.exe (ID = 83829)
2:16 PM: a0155722.exe (ID = 213483)
2:16 PM: conflict.cab (ID = 84685)
2:16 PM: a0154535.exe (ID = 216567)
2:17 PM: ngsh35[1].dll (ID = 236051)
2:19 PM: a0155710.exe (ID = 213482)
2:20 PM: conflict.cab (ID = 84685)
2:20 PM: a0155721.exe (ID = 83829)
2:20 PM: elite.inf (ID = 187156)
2:20 PM: a0155692.exe (ID = 235307)
2:21 PM: conflict.cab (ID = 84685)
2:21 PM: a0154531.exe (ID = 65739)
2:21 PM: a0155704.exe (ID = 216567)
2:21 PM: conflict.cab (ID = 84685)
2:21 PM: conflict.cab (ID = 84685)
2:21 PM: a0154481.exe (ID = 125346)
2:23 PM: Found Adware: tvmedia
2:23 PM: tvmknwrd.dll (ID = 81726)
2:23 PM: a0150491.exe (ID = 186212)
2:23 PM: sngsh35.dll (ID = 236051)
2:24 PM: gsim.inf (ID = 61964)
2:24 PM: a0155712.exe (ID = 186212)
2:25 PM: bw2.com (ID = 65739)
2:25 PM: Found Adware: visfx
2:25 PM: a0151492.exe (ID = 232747)
2:26 PM: conflict.cab (ID = 84685)
2:26 PM: conflict.cab (ID = 84685)
2:26 PM: installer[1].exe (ID = 231664)
2:26 PM: a0150493.ocx (ID = 186211)
2:27 PM: conflict.cab (ID = 84685)
2:28 PM: a0154522.exe (ID = 204831)
2:29 PM: a0161991.dll (ID = 159)
2:30 PM: a0150499.exe (ID = 83849)
2:30 PM: a0154540.exe (ID = 204831)
2:31 PM: mpvcp50.dll (ID = 159)
2:31 PM: ddtime.dll (ID = 159)
2:32 PM: a0155713.exe (ID = 204831)
2:33 PM: a0151480.exe (ID = 83849)
2:33 PM: lv8s09l7e.dll (ID = 159)
2:33 PM: o0lula391d.dll (ID = 159)
2:33 PM: conflict.cab (ID = 84685)
2:34 PM: conflict.cab (ID = 84685)
2:34 PM: conflict.cab (ID = 84685)
2:35 PM: conflict.cab (ID = 84685)
2:35 PM: conflict.cab (ID = 84685)
2:35 PM: a0162005.dll (ID = 159)
2:35 PM: Found Adware: zenosearchassistant
2:35 PM: a0155720.exe (ID = 235993)
2:36 PM: appwrap[2].exe (ID = 65722)
2:36 PM: a0154504.exe (ID = 83849)
2:37 PM: whcc-giant[1].exe (ID = 83829)
2:37 PM: stup3[1].exe (ID = 236066)
2:38 PM: a0150457.dll (ID = 150806)
2:39 PM: a0158750.dll (ID = 159)
2:39 PM: a0159791.dll (ID = 159)
2:39 PM: a0154486.exe (ID = 83849)
2:39 PM: o0rola931d.dll (ID = 159)
2:40 PM: lxn4le5q1h.dll (ID = 159)
2:41 PM: bgtmeter.dll (ID = 159)
2:41 PM: kt2ol7f31.dll (ID = 159)
2:41 PM: i624lgfq162e.dll (ID = 159)
2:41 PM: a0154513.dll (ID = 216713)
2:43 PM: tnaffic.dll (ID = 159)
2:43 PM: gppsl3771.dll (ID = 159)
2:44 PM: eliteunstall[1].exe (ID = 185456)
2:44 PM: a0155724.exe (ID = 125346)
2:44 PM: a0150489.exe (ID = 185456)
2:44 PM: a0155701.exe (ID = 185456)
2:45 PM: a0150475.exe (ID = 188701)
2:46 PM: a0161987.dll (ID = 159)
2:48 PM: Warning: Failed to open file "c:\system volume information\_restore{e0c22ec0-d318-4d95-967d-a5c2b4653ed0}\rp725\a0149666.pif". Access is denied
2:48 PM: oabcbcp.dll (ID = 159)
2:49 PM: a0160931.dll (ID = 159)
2:49 PM: a0162001.ocx (ID = 74058)
2:50 PM: a0155708.exe (ID = 235944)
2:51 PM: Found Adware: wfgtech
2:51 PM: a0151489.exe (ID = 203674)
2:51 PM: s688lglu16q8.dll (ID = 159)
2:51 PM: mvnml9511.dll (ID = 159)
2:52 PM: Found Adware: targetsaver
2:52 PM: a0155719.exe (ID = 208148)
2:54 PM: mpctfp.dll (ID = 159)
2:54 PM: uninstall_nmon.vbs (ID = 231442)
2:54 PM: sms_msn40[1].exe (ID = 221306)
2:54 PM: backup-20060119-002055-705.dll (ID = 208226)
2:55 PM: lycmgr10.dll (ID = 159)
2:55 PM: fplq0335e.dll (ID = 159)
2:56 PM: sms_msn40.exe (ID = 221306)
2:56 PM: a0159787.dll (ID = 159)
2:56 PM: a0159812.dll (ID = 159)
2:56 PM: appwrap[1].exe (ID = 65739)
2:56 PM: tsupdate2[1].ini (ID = 193498)
2:56 PM: mrj[1].exe (ID = 186213)
2:56 PM: optimize[1].exe (ID = 125346)
2:56 PM: a0155744.dll (ID = 159)
2:57 PM: a0154527.exe (ID = 216230)
2:57 PM: a0155802.exe (ID = 212830)
2:58 PM: e4jmle111h.dll (ID = 159)
2:58 PM: a0158762.dll (ID = 159)
2:58 PM: a0156747.dll (ID = 159)
2:58 PM: a0160914.dll (ID = 159)
2:58 PM: wyashext.dll (ID = 159)
2:58 PM: s088lalu1dq8.dll (ID = 159)
2:59 PM: a0160938.dll (ID = 159)
2:59 PM: class-barrel (ID = 78229)
2:59 PM: vocabulary (ID = 78283)
2:59 PM: kt46l7hs1.dll (ID = 159)
3:00 PM: a0150458.exe (ID = 208542)
3:00 PM: a0162003.dll (ID = 82814)
3:00 PM: l4n4le5q1h.dll (ID = 159)
3:01 PM: sms_msn.exe (ID = 221305)
3:01 PM: HKLM\Software\Microsoft\Windows\CurrentVersion\Run || sms_msn (ID = 0)
3:01 PM: wuauclt.dll (ID = 150833)
3:01 PM: a0155818.dll (ID = 208226)
3:01 PM: netmon.exe (ID = 231443)
3:02 PM: a0159759.dll (ID = 159)
3:02 PM: a0149667.dll (ID = 208226)
3:02 PM: dwdsregt.exe (ID = 235995)
3:02 PM: a0150456.exe (ID = 211200)
3:02 PM: a0149668.dll (ID = 208226)
3:03 PM: 08mcdqrw.dll (ID = 235362)
3:03 PM: a0160816.dll (ID = 159)
3:03 PM: a0160939.dll (ID = 159)
3:03 PM: ngsh35.dll (ID = 236051)
3:03 PM: a0149669.dll (ID = 208226)
3:03 PM: enlml1311.dll (ID = 159)
3:03 PM: a0149670.dll (ID = 208226)
3:04 PM: a0160947.dll (ID = 159)
3:04 PM: ngsh40.dll (ID = 236050)
3:05 PM: seardssp.dll (ID = 159)
3:05 PM: a0161982.dll (ID = 159)
3:05 PM: stlunirl.dll (ID = 159)
3:05 PM: mpiqtz32.dll (ID = 159)
3:06 PM: a0160842.dll (ID = 159)
3:06 PM: 4635e38d-45c8-4be0-bd85-da9dd5 (ID = 231664)
3:06 PM: jtn2075oe.dll (ID = 159)
3:07 PM: t8r80i9ue8.dll (ID = 159)
3:07 PM: a0160862.dll (ID = 159)
3:07 PM: a0160863.dll (ID = 159)
3:07 PM: a0161958.dll (ID = 159)
3:07 PM: a0158754.dll (ID = 159)
3:08 PM: q0860alsedq60.dll (ID = 159)
3:09 PM: jdsd400.dll (ID = 159)
3:09 PM: a0160146.cfg (ID = 91140)
3:11 PM: Found Adware: directrevenue-abetterinternet
3:11 PM: set8e.tmp (ID = 83180)
3:11 PM: a0155812.cfg (ID = 91140)
3:11 PM: setb4.tmp (ID = 83180)
3:11 PM: setba.tmp (ID = 83180)
3:11 PM: backup-20060119-002055-705.inf (ID = 208224)
3:11 PM: a0154500.ini (ID = 188794)
3:11 PM: a0154507.ini (ID = 83847)
3:11 PM: a0159809.cfg (ID = 91140)
3:11 PM: biini.inf (ID = 83199)
3:11 PM: ke.vbs (ID = 185675)
3:11 PM: a0155688.cfg (ID = 91140)
3:11 PM: a0150492.ini (ID = 188794)
3:11 PM: a0150506.ini (ID = 83847)
3:11 PM: a0150467.inf (ID = 208224)
3:11 PM: set9a.tmp (ID = 83180)
3:11 PM: set2f.tmp (ID = 83180)
3:17 PM: a0159818.lnk (ID = 235995)
3:18 PM: a0158756.lnk (ID = 235995)
3:18 PM: a0155751.lnk (ID = 235995)
3:18 PM: File Sweep Complete, Elapsed Time: 01:21:07
3:18 PM: Full Sweep has completed. Elapsed time 01:27:44
3:18 PM: Traces Found: 1375
4:13 PM: Removal process initiated
4:13 PM: Quarantining All Traces: 180search assistant/zango
4:13 PM: Quarantining All Traces: 2nd-thought
4:14 PM: Quarantining All Traces: clearsearch
4:14 PM: Quarantining All Traces: clkoptimizer
4:14 PM: Quarantining All Traces: directrevenue-abetterinternet
4:14 PM: Quarantining All Traces: look2me
4:15 PM: Quarantining All Traces: lopdotcom
4:15 PM: Quarantining All Traces: purityscan
4:15 PM: Quarantining All Traces: virtumonde
4:15 PM: Quarantining All Traces: visfx
4:15 PM: Quarantining All Traces: websearch toolbar
4:15 PM: Quarantining All Traces: dollarrevenue
4:15 PM: Quarantining All Traces: internetoptimizer
4:15 PM: Quarantining All Traces: sidesearch
4:16 PM: Quarantining All Traces: surfsidekick
4:16 PM: Quarantining All Traces: trojan-backdoor-soundcheck
4:16 PM: Quarantining All Traces: addestroyer
4:16 PM: Quarantining All Traces: command
4:16 PM: command is in use. It will be removed on reboot.
4:16 PM: c:\program files\network monitor is in use. It will be removed on reboot.
4:16 PM: netmon.exe is in use. It will be removed on reboot.
4:16 PM: C:\Program Files\Network Monitor\netmon.exe is in use. It will be removed on reboot.
4:20 PM: Quarantining All Traces: cydoor peer-to-peer dependency
4:20 PM: Quarantining All Traces: dialerplatform
4:20 PM: Quarantining All Traces: drsnsrch hijacker
4:20 PM: Quarantining All Traces: drsnsrch.com hijack
4:20 PM: Quarantining All Traces: elitemediagroup-mediamotor
4:20 PM: Quarantining All Traces: elitemediagroup-pop64
4:20 PM: Quarantining All Traces: ezula ilookup
4:20 PM: Quarantining All Traces: gsim
4:20 PM: Quarantining All Traces: ist software
4:20 PM: Quarantining All Traces: ist yoursitebar
4:20 PM: Quarantining All Traces: mediamotor - popuppers
4:20 PM: Quarantining All Traces: mirar webband
4:20 PM: Quarantining All Traces: netwebsearch
4:21 PM: netwebsearch is in use. It will be removed on reboot.
4:21 PM: sms_msn.exe is in use. It will be removed on reboot.
4:21 PM: ngsh35.dll is in use. It will be removed on reboot.
4:21 PM: Quarantining All Traces: safesurf
4:21 PM: Quarantining All Traces: targetsaver
4:21 PM: Quarantining All Traces: tvmedia
4:21 PM: Quarantining All Traces: virtualbouncer
4:21 PM: Quarantining All Traces: webhancer
4:21 PM: Quarantining All Traces: wfgtech
4:21 PM: Quarantining All Traces: zenosearchassistant
4:22 PM: Quarantining All Traces: 203.199.200 cookie
4:22 PM: Quarantining All Traces: 2o7.net cookie
4:22 PM: Quarantining All Traces: 888 cookie
4:22 PM: Quarantining All Traces: a cookie
4:22 PM: Quarantining All Traces: abetterinternet cookie
4:22 PM: Quarantining All Traces: adecn cookie
4:22 PM: Quarantining All Traces: adknowledge cookie
4:22 PM: Quarantining All Traces: adlegend cookie
4:22 PM: Quarantining All Traces: adprofile cookie
4:22 PM: Quarantining All Traces: adultfriendfinder cookie
4:22 PM: Quarantining All Traces: ask cookie
4:22 PM: Quarantining All Traces: atwola cookie
4:22 PM: Quarantining All Traces: azjmp cookie
4:22 PM: Quarantining All Traces: belnk cookie
4:22 PM: Quarantining All Traces: btgrab cookie
4:22 PM: Quarantining All Traces: cardomain cookie
4:22 PM: Quarantining All Traces: cassava cookie
4:22 PM: Quarantining All Traces: ccbill cookie
4:22 PM: Quarantining All Traces: centralmedia cookie
4:22 PM: Quarantining All Traces: clickandtrack cookie
4:22 PM: Quarantining All Traces: cliks cookie
4:22 PM: Quarantining All Traces: columbiahouse cookie
4:22 PM: Quarantining All Traces: coolsavings cookie
4:22 PM: Quarantining All Traces: dealtime cookie
4:22 PM: Quarantining All Traces: desktop kazaa cookie
4:22 PM: Quarantining All Traces: directtrack cookie
4:22 PM: Quarantining All Traces: enhance cookie
4:22 PM: Quarantining All Traces: exitexchange cookie
4:22 PM: Quarantining All Traces: go.com cookie
4:22 PM: Quarantining All Traces: gotoast cookie
4:22 PM: Quarantining All Traces: hbmediapro cookie
4:22 PM: Quarantining All Traces: hitmgt cookie
4:22 PM: Quarantining All Traces: hotbar cookie
4:22 PM: Quarantining All Traces: hypertracker.com cookie
4:22 PM: Quarantining All Traces: infospace cookie
4:22 PM: Quarantining All Traces: kmpads cookie
4:22 PM: Quarantining All Traces: metareward.com cookie
4:22 PM: Quarantining All Traces: monstermarketplace cookie
4:22 PM: Quarantining All Traces: mx-targeting cookie
4:22 PM: Quarantining All Traces: nextag cookie
4:22 PM: Quarantining All Traces: offeroptimizer cookie
4:22 PM: Quarantining All Traces: partypoker cookie
4:22 PM: Quarantining All Traces: passion cookie
4:22 PM: Quarantining All Traces: pch cookie
4:22 PM: Quarantining All Traces: precisead cookie
4:22 PM: Quarantining All Traces: primaryads cookie
4:22 PM: Quarantining All Traces: pub cookie
4:22 PM: Quarantining All Traces: rednova cookie
4:22 PM: Quarantining All Traces: reliablestats cookie
4:22 PM: Quarantining All Traces: rightmedia cookie
4:22 PM: Quarantining All Traces: rn11 cookie
4:22 PM: Quarantining All Traces: search123 cookie
4:22 PM: Quarantining All Traces: servlet cookie
4:22 PM: Quarantining All Traces: tacoda cookie
4:22 PM: Quarantining All Traces: tickle cookie
4:22 PM: Quarantining All Traces: touchclarity cookie
4:22 PM: Quarantining All Traces: videodome cookie
4:22 PM: Quarantining All Traces: websponsors cookie
4:22 PM: Quarantining All Traces: yieldmanager cookie
4:22 PM: Quarantining All Traces: zenotecnico cookie
4:25 PM: Preparing to restart your computer. Please wait...
4:25 PM: Removal process completed. Elapsed time 00:11:43
4:32 PM: Error: Access violation at address 0000000B. Read of address 0000000B.
********
1:48 PM: | Start of Session, Monday, January 23, 2006 |
1:48 PM: Spy Sweeper started
1:49 PM: Your spyware definitions have been updated.
1:51 PM: | End of Session, Monday, January 23, 2006 |




Here is the Hijackthis log:

Logfile of HijackThis v1.99.1
Scan saved at 4:40:47 PM, on 1/23/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\COMMON~1\AOL\ACS\acsd.exe
C:\Program Files\NavNT\defwatch.exe
C:\Program Files\NavNT\rtvscan.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\MsPMSPSv.exe
C:\WINDOWS\system32\ps2.exe
C:\Program Files\NavNT\vptray.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Microsoft AntiSpyware\gcasServ.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Owner\Local Settings\Temp\hijackthis\hijackthis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://qus8.hpwis.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://srch-qus8.hpwis.com/
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://qus8.hpwis.com/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
N3 - Netscape 7: user_pref("browser.search.defaultengine", "engine://C%3A%5CProgram%20Files%5CNetscape%5CNetscape%5Csearchplugins%5CSBWeb_01.src"); (C:\Documents and Settings\Owner\Application Data\Mozilla\Profiles\default\cxy4i7l0.slt\prefs.js)
O2 - BHO: ATLDistrib Object - {83A5F7B7-DC75-44CE-9195-264F41709FA9} - C:\WINDOWS\system32\mljge.dll
O2 - BHO: (no name) - {EA32FB3B-21C9-42cc-B8EF-01A9B28EDB0D} - C:\WINDOWS\system32\vtuts.dll
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [PS2] C:\WINDOWS\system32\ps2.exe
O4 - HKLM\..\Run: [Antivirus] C:\WINDOWS\b.exe
O4 - HKLM\..\Run: [vptray] C:\Program Files\NavNT\vptray.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [freestyle] lockx.exe
O4 - HKLM\..\Run: [NIW\] C:\WINDOWS\mrjj.exe
O4 - HKLM\..\Run: [F ma] C:\WINDOWS\mrjj.exe
O4 - HKLM\..\Run: [\SWO] C:\WINDOWS\mrjj.exe
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKLM\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe" /startintray
O4 - HKLM\..\RunServices: [freestyle] lockx.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0E5F0222-96B9-11D3-8997-00104BD12D94} (PCPitstop Utility) - http://www.pcpitstop.com/pcpitstop/PCPitStop.CAB
O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} (RdxIE Class) - http://software-dl.real.com/29eedb00577aea...ip/RdxIE601.cab
O16 - DPF: {62475759-9E84-458E-A1AB-5D2C442ADFDE} - http://a1540.g.akamai.net/7/1540/52/200305...meInstaller.exe
O16 - DPF: {7B461720-5910-45A3-B617-3B53A972F209} (Pixami-PhotoWorks Upload UI Control) - http://services.photoworks.com/Pixami/PixamiSFWUploader.cab
O16 - DPF: {9AC54695-69A4-46F1-BE10-10C74F9520D5} - http://cabs.elitemediagroup.net/cabs/mediaview.cab
O16 - DPF: {D30CA0FD-1CA0-11D4-AC78-006008A9A8BC} (WebBasedClientInstall Class) - http://www.lawrence.edu/navclient/webinst/WebInst.cab
O16 - DPF: {E855A2D4-987E-4F3B-A51C-64D10A7E2479} (EPSImageControl Class) - http://tools.ebayimg.com/eps/activex/EPSControl_v1-32.cab
O16 - DPF: {F5C90925-ABBF-4475-88F5-8622B452BA9E} (Compaq System Data Class) - http://ipgweb.cce.hp.com/bus-nacons/caller/SysQuery.cab
O20 - Winlogon Notify: App Management - C:\WINDOWS\system32\irl8l53u1.dll (file missing)
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
O20 - Winlogon Notify: mljge - C:\WINDOWS\system32\mljge.dll
O20 - Winlogon Notify: NavLogon - C:\WINDOWS\System32\NavLogon.dll
O20 - Winlogon Notify: Telephony - C:\WINDOWS\system32\guard.tmp (file missing)
O20 - Winlogon Notify: vtuts - C:\WINDOWS\SYSTEM32\vtuts.dll
O20 - Winlogon Notify: WRNotifier - C:\WINDOWS\SYSTEM32\WRLogonNTF.dll
O23 - Service: AOL Connectivity Service (AOL ACS) - America Online, Inc. - C:\PROGRA~1\COMMON~1\AOL\ACS\acsd.exe
O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\NavNT\defwatch.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Local Security Authority Subsystem Service (lsass) - Unknown owner - C:\WINDOWS\scvhost.exe (file missing)
O23 - Service: Network Monitor - Unknown owner - C:\Program Files\Network Monitor\netmon.exe (file missing)
O23 - Service: Norton AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\Program Files\NavNT\rtvscan.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: Webroot Spy Sweeper Engine (svcWRSSSDK) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe

#10 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:04:08 AM

Posted 23 January 2006 - 05:50 PM

YOu did not answer my question about having and admin account

================

Adware-Virtumundo Removal Tool v1.2 (Associated with WinFixer Popups)

Note: This tools does not remove the WinFixer application. WinFixer alone does not cause popups or disrupt the system. If WinFixer was installed on your system because Adware or a Trojan Downloader installed it without your permission, please remove it using the Add/Remove Programs Control Panel Applet.

If Virtumundo is not found, the tool will exit showing the log file.

If Virtumundo is found it will do the following:
Version 1.1
Create a Date/Time Stamped log file (VBG.TXT) on the All Users profile's Desktop.
Kill Internet Explorer and Explorer processes.
Rename the infected files with a .Vir extension (this is disable them from being run)
Remove the Browser Helper Object registry key
Adds a registry value to block file from running in Internet Explorer again.
Remove the Winlogon Notify registry key
Automatically restart the computer (via STOP error)
Note: This is a BLUE SCREEN "Fatal Error" Message. It is normal and expected. The tool ends an important Windows Process that was protecting the file and NT Security STOPS the system as soon as it detects this is happening.


VirusScan will now be able to remove the files normally when you run an on-demand scan.

Download Link -> http://secured2k.home.comcast.net/tools/VirtumundoBeGone.exe

Then run your antivirus or Ewido to remove any left over files and then post a fresh hjt log & the report from this tool
================


Fix these with HJT – mark them, close IE, click fix checked

O2 - BHO: ATLDistrib Object - {83A5F7B7-DC75-44CE-9195-264F41709FA9} - C:\WINDOWS\system32\mljge.dll

O2 - BHO: (no name) - {EA32FB3B-21C9-42cc-B8EF-01A9B28EDB0D} - C:\WINDOWS\system32\vtuts.dll

O4 - HKLM\..\Run: [Antivirus] C:\WINDOWS\b.exe

O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE

O4 - HKLM\..\Run: [freestyle] lockx.exe

O4 - HKLM\..\Run: [NIW\] C:\WINDOWS\mrjj.exe

O4 - HKLM\..\Run: [F ma] C:\WINDOWS\mrjj.exe

O4 - HKLM\..\Run: [\SWO] C:\WINDOWS\mrjj.exe

O4 - HKLM\..\RunServices: [freestyle] lockx.exe

O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} (RdxIE Class) - http://software-dl.real.com/29eedb00577aea...ip/RdxIE601.cab

O16 - DPF: {62475759-9E84-458E-A1AB-5D2C442ADFDE} - http://a1540.g.akamai.net/7/1540/52/200305...meInstaller.exe

O16 - DPF: {9AC54695-69A4-46F1-BE10-10C74F9520D5} - http://cabs.elitemediagroup.net/cabs/mediaview.cab

O20 - Winlogon Notify: App Management - C:\WINDOWS\system32\irl8l53u1.dll (file missing)

O20 - Winlogon Notify: mljge - C:\WINDOWS\system32\mljge.dll

O20 - Winlogon Notify: Telephony - C:\WINDOWS\system32\guard.tmp (file missing)

O20 - Winlogon Notify: vtuts - C:\WINDOWS\SYSTEM32\vtuts.dll

DownLoad http://www.downloads.subratam.org/KillBox.zip

Restart your computer into safe mode now. (Tapping F8 at the first black screen) Perform the following steps in safe mode:

Double-click on Killbox.exe to run it. Now put a tick by Standard File Kill. In the "Full Path of File to Delete" box, copy and paste each of the following lines one at a time then click on the button that has the red circle with the X in the middle after you enter each file. It will ask for confimation to delete the file. Click Yes. Continue with that same procedure until you have copied and pasted all of these in the "Paste Full Path of File to Delete" box.

C:\WINDOWS\SYSTEM32\vtuts.dll
C:\WINDOWS\system32\mljge.dll
C:\WINDOWS\mrjj.exe
C:\WINDOWS\system32\lockx.exe
C:\WINDOWS\b.exe


Note: It is possible that Killbox will tell you that one or more files do not exist. If that happens, just continue on with all the files. Be sure you don't miss any.

START – RUN – type in %temp% OK - Edit – Select all – File – Delete

Delete everything in the C:\Windows\Temp folder or C:\WINNT\temp

Empty the recycle bin
Boot and post a new log from normal NOT safe mode

Please give feedback on what worked/didn’t work and the current status of your system
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#11 dom920

dom920
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:08 AM

Posted 30 January 2006 - 09:49 PM

Yes, I do have an admin account. My computer has been acting very strange, and by strange I mean the applications are moving pretty slow(not the internet). But here are some logs:


[01/26/2006, 0:40:52] - VirtumundoBeGone v1.5 ( "C:\Documents and Settings\Owner\Desktop\VirtumundoBeGone.exe" )
[01/26/2006, 0:41:09] - Detected System Information:
[01/26/2006, 0:41:09] - Windows Version: 5.1.2600, Service Pack 2
[01/26/2006, 0:41:09] - Current Username: Owner (Admin)
[01/26/2006, 0:41:09] - Windows is in NORMAL mode.
[01/26/2006, 0:41:09] - Searching for Browser Helper Objects:
[01/26/2006, 0:41:09] - BHO 1: {83A5F7B7-DC75-44CE-9195-264F41709FA9} (ATLDistrib Object)
[01/26/2006, 0:41:09] - ALERT: Found ATLDistrib Object!
[01/26/2006, 0:41:09] - BHO 2: {EA32FB3B-21C9-42cc-B8EF-01A9B28EDB0D} ()
[01/26/2006, 0:41:09] - WARNING: BHO has no default name. Checking for Winlogon reference.
[01/26/2006, 0:41:09] - Checking for HKLM\...\Winlogon\Notify\vtuts
[01/26/2006, 0:41:09] - Found: HKLM\...\Winlogon\Notify\vtuts - This is probably Virtumundo.
[01/26/2006, 0:41:09] - Assigning {EA32FB3B-21C9-42cc-B8EF-01A9B28EDB0D} MSEvents Object
[01/26/2006, 0:41:09] - BHO list has been changed! Starting over...
[01/26/2006, 0:41:09] - BHO 1: {83A5F7B7-DC75-44CE-9195-264F41709FA9} (ATLDistrib Object)
[01/26/2006, 0:41:09] - ALERT: Found ATLDistrib Object!
[01/26/2006, 0:41:09] - BHO 2: {EA32FB3B-21C9-42cc-B8EF-01A9B28EDB0D} (MSEvents Object)
[01/26/2006, 0:41:09] - ALERT: Found MSEvents Object!
[01/26/2006, 0:41:09] - Finished Searching Browser Helper Objects
[01/26/2006, 0:41:09] - *** Detected ATLDistrib Object
[01/26/2006, 0:41:09] - *** Detected MSEvents Object
[01/26/2006, 0:41:09] - Trying to remove ATLDistrib Object...
[01/26/2006, 0:41:10] - Terminating Process: IEXPLORE.EXE
[01/26/2006, 0:41:11] - Terminating Process: RUNDLL32.EXE
[01/26/2006, 0:41:12] - Disabling Automatic Shell Restart
[01/26/2006, 0:41:12] - Terminating Process: EXPLORER.EXE
[01/26/2006, 0:41:13] - Suspending the NT Session Manager System Service
[01/26/2006, 0:41:14] - Terminating Windows NT Logon/Logoff Manager
[01/26/2006, 0:41:15] - Re-enabling Automatic Shell Restart
[01/26/2006, 0:41:15] - File to disable: C:\WINDOWS\system32\mljge.dll
[01/26/2006, 0:41:15] - Renaming C:\WINDOWS\system32\mljge.dll -> C:\WINDOWS\system32\mljge.dll.vir
[01/26/2006, 0:41:16] - ! File rename was unsucessful.
[01/26/2006, 0:41:16] - Attempting to Deny Access to C:\WINDOWS\system32\mljge.dll
[01/26/2006, 0:41:17] - *** IMPORTANT: Delete/Rename/Move on reboot (like Killbox) MAY NOT work.
[01/26/2006, 0:41:17] - processed file: C:\WINDOWS\system32\mljge.dll

[01/26/2006, 0:41:17] - *** IMPORTANT: The file is disabled and will need to be deleted by the user.
[01/26/2006, 0:41:17] - Removing HKLM\...\Browser Helper Objects\{83A5F7B7-DC75-44CE-9195-264F41709FA9}
[01/26/2006, 0:41:18] - Removing HKCR\CLSID\{83A5F7B7-DC75-44CE-9195-264F41709FA9}
[01/26/2006, 0:41:18] - Adding Kill Bit for ActiveX for GUID: {83A5F7B7-DC75-44CE-9195-264F41709FA9}
[01/26/2006, 0:41:23] - Deleting ATLEvents/MSEvents Registry entries
[01/26/2006, 0:41:23] - Removing HKLM\...\Winlogon\Notify\mljge
[01/26/2006, 0:41:23] - Trying to remove MSEvents Object...
[01/26/2006, 0:41:24] - Terminating Process: IEXPLORE.EXE
[01/26/2006, 0:41:24] - Terminating Process: RUNDLL32.EXE
[01/26/2006, 0:41:24] - Disabling Automatic Shell Restart
[01/26/2006, 0:41:25] - Terminating Process: EXPLORER.EXE
[01/26/2006, 0:41:25] - Suspending the NT Session Manager System Service
[01/26/2006, 0:41:28] - Terminating Windows NT Logon/Logoff Manager
[01/26/2006, 0:41:29] - Re-enabling Automatic Shell Restart
[01/26/2006, 0:41:29] - Searching for Browser Helper Objects:
[01/26/2006, 0:41:29] - Finished Searching Browser Helper Objects
[01/26/2006, 0:41:29] - *** Detected MSEvents Object
[01/26/2006, 0:41:29] - Trying to remove MSEvents Object...

#12 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:04:08 AM

Posted 31 January 2006 - 10:29 AM

Need a new HiJack log
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#13 dom920

dom920
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:08 AM

Posted 31 January 2006 - 04:46 PM

Sorry, I meant to come back with the hjt log and post it, but here it is:

Logfile of HijackThis v1.99.1
Scan saved at 3:26:58 PM, on 1/31/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\COMMON~1\AOL\ACS\acsd.exe
C:\Program Files\NavNT\defwatch.exe
C:\Program Files\NavNT\rtvscan.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ps2.exe
C:\Program Files\NavNT\vptray.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Real\RealOne Player\RealPlay.exe
C:\Documents and Settings\Owner\Local Settings\Temp\hijackthis\hijackthis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://qus8.hpwis.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://srch-qus8.hpwis.com/
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://qus8.hpwis.com/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
N3 - Netscape 7: user_pref("browser.search.defaultengine", "engine://C%3A%5CProgram%20Files%5CNetscape%5CNetscape%5Csearchplugins%5CSBWeb_01.src"); (C:\Documents and Settings\Owner\Application Data\Mozilla\Profiles\default\cxy4i7l0.slt\prefs.js)
O2 - BHO: ATLDistrib Object - {83A5F7B7-DC75-44CE-9195-264F41709FA9} - C:\WINDOWS\system32\awtqp.dll
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [PS2] C:\WINDOWS\system32\ps2.exe
O4 - HKLM\..\Run: [Antivirus] C:\WINDOWS\b.exe
O4 - HKLM\..\Run: [vptray] C:\Program Files\NavNT\vptray.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [freestyle] lockx.exe
O4 - HKLM\..\Run: [NIW\] C:\WINDOWS\mrjj.exe
O4 - HKLM\..\Run: [F ma] C:\WINDOWS\mrjj.exe
O4 - HKLM\..\Run: [\SWO] C:\WINDOWS\mrjj.exe
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKLM\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe" /startintray
O4 - HKLM\..\RunServices: [freestyle] lockx.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0E5F0222-96B9-11D3-8997-00104BD12D94} (PCPitstop Utility) - http://www.pcpitstop.com/pcpitstop/PCPitStop.CAB
O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} (RdxIE Class) - http://software-dl.real.com/29eedb00577aea...ip/RdxIE601.cab
O16 - DPF: {62475759-9E84-458E-A1AB-5D2C442ADFDE} - http://a1540.g.akamai.net/7/1540/52/200305...meInstaller.exe
O16 - DPF: {7B461720-5910-45A3-B617-3B53A972F209} (Pixami-PhotoWorks Upload UI Control) - http://services.photoworks.com/Pixami/PixamiSFWUploader.cab
O16 - DPF: {9AC54695-69A4-46F1-BE10-10C74F9520D5} - http://cabs.elitemediagroup.net/cabs/mediaview.cab
O16 - DPF: {D30CA0FD-1CA0-11D4-AC78-006008A9A8BC} (WebBasedClientInstall Class) - http://www.lawrence.edu/navclient/webinst/WebInst.cab
O16 - DPF: {E855A2D4-987E-4F3B-A51C-64D10A7E2479} (EPSImageControl Class) - http://tools.ebayimg.com/eps/activex/EPSControl_v1-32.cab
O16 - DPF: {F5C90925-ABBF-4475-88F5-8622B452BA9E} (Compaq System Data Class) - http://ipgweb.cce.hp.com/bus-nacons/caller/SysQuery.cab
O20 - Winlogon Notify: App Management - C:\WINDOWS\system32\irl8l53u1.dll (file missing)
O20 - Winlogon Notify: awtqp - C:\WINDOWS\system32\awtqp.dll
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
O20 - Winlogon Notify: NavLogon - C:\WINDOWS\System32\NavLogon.dll
O20 - Winlogon Notify: Telephony - C:\WINDOWS\system32\guard.tmp (file missing)
O20 - Winlogon Notify: WRNotifier - C:\WINDOWS\SYSTEM32\WRLogonNTF.dll
O23 - Service: AOL Connectivity Service (AOL ACS) - America Online, Inc. - C:\PROGRA~1\COMMON~1\AOL\ACS\acsd.exe
O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\NavNT\defwatch.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Local Security Authority Subsystem Service (lsass) - Unknown owner - C:\WINDOWS\scvhost.exe (file missing)
O23 - Service: Network Monitor - Unknown owner - C:\Program Files\Network Monitor\netmon.exe (file missing)
O23 - Service: Norton AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\Program Files\NavNT\rtvscan.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: Webroot Spy Sweeper Engine (svcWRSSSDK) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users