Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Hijackthis Log: Please Help Diagnose


  • This topic is locked This topic is locked
13 replies to this topic

#1 mmorse

mmorse

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:11:55 AM

Posted 19 March 2006 - 01:54 PM

Logfile of HijackThis v1.99.1
Scan saved at 9:13:05 AM, on 3/19/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\NavNT\defwatch.exe
C:\Program Files\NavNT\vptray.exe
C:\WINDOWS\System32\gearsec.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\NavNT\rtvscan.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\MsgSys.EXE
C:\WINDOWS\System32\wisptis.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\DOCUME~1\Mike\LOCALS~1\Temp\Temporary Directory 2 for HijackThis.zip\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL = http://www.isearch.com/index.php?app=SE&af...ODQ6NTo5&Terms=
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://www.isearch.com/index.php?app=SE&af...ODQ6NTo5&Terms=
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
R3 - Default URLSearchHook is missing
F0 - system.ini: Shell=Explorer.exe C:\WINDOWS\system32\winmgd.win
F1 - win.ini: run=C:\WINDOWS\system32\mouse_configurator.win
O1 - Hosts: 12.129.205.209 search.netscape.com12.129.205.209 sitefinder.verisign.com
O2 - BHO: NavErrRedir Class - {0199DF25-9820-4bd5-9FEE-5A765AB4371E} - C:\PROGRA~1\INCRED~1\BHO\INCFIN~2.DLL
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: (no name) - {AC109D01-32D6-4EB5-8300-D3C5EBAC7C83} - (no file)
O3 - Toolbar: (no name) - {2CDE1A7D-A478-4291-BF31-E1B4C16F92EB} - (no file)
O3 - Toolbar: (no name) - {014DA6C9-189F-421a-88CD-07CFE51CFF10} - (no file)
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [MsConfigs] C:\Program Files\MsConfigs\MsConfigs.exe
O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
O4 - HKLM\..\Run: [vptray] C:\Program Files\NavNT\vptray.exe
O4 - HKLM\..\Run: [UsbD] C:\WINDOWS\system32\svhost32.exe
O4 - HKLM\..\Run: [Kernel32] C:\WINDOWS\system32\Kernel32.win
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [EPSON PictureMate] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2P1.EXE /P17 "EPSON PictureMate" /O6 "USB003" /M "PictureMate"
O4 - HKLM\..\RunServices: [p2pnetwork] p2pnetwork.exe
O4 - HKCU\..\RunServices: [p2pnetwork] p2pnetwork.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O7 - HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\inetrepl.dll
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\inetrepl.dll
O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\inetrepl.dll
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\PartyPoker.exe (file missing)
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\PartyPoker.exe (file missing)
O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra button: Ebates - {6685509E-B47B-4f47-8E16-9A5F3A62F683} - file://C:\Program Files\Ebates_MoeMoneyMaker\Sy350\Tp350\scri350a.htm (file missing) (HKCU)
O16 - DPF: {99802379-7362-40E2-9D28-8A3B9AF880B7} - http://hotsearchbar.com/toolbar2/winhot32.cab
O16 - DPF: {9FC5238F-12C4-454F-B1B5-74599A21DE47} (Webshots Photo Uploader) - http://community.webshots.com/html/WSPhotoUploader.CAB
O16 - DPF: {ABD45F35-2E4C-44C0-A075-6EF1DE75398E} - http://www.riversoftware.net/x0ff.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://download.games.yahoo.com/games/popc...aploader_v5.cab
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
O20 - Winlogon Notify: NavLogon - C:\WINDOWS\System32\NavLogon.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\NavNT\defwatch.exe
O23 - Service: Gear Security Service (GEARSecurity) - GEAR Software - C:\WINDOWS\System32\gearsec.exe
O23 - Service: Norton AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\Program Files\NavNT\rtvscan.exe

BC AdBot (Login to Remove)

 


#2 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:06:55 PM

Posted 19 March 2006 - 05:53 PM

Hello,

I don't have good news for you...
Your system is badly compromised. You have several different infections present and I can't tell you yet what damage it already caused, but this can be huge! However, I can't see it actively running.. so we'll find out afterwards.
So I just hope we can repair the damage it already caused.
I don't know either if your antivirus is still up to date... but I have my doubts here, because it should at least also delete the related registry entries.

Let's restore main problems first before we can deal with the rest, because as long as this is not getting restored, you won't be able to run any tool or regfix afterwards.

So it is important you follow every step in the right order otherwise this doesn't make any sense and won't work.

First of all, you didn't unzip/extract hijackthis.. and it's still in the tempfolder.
So I strongly advise to unzip/extract hijackthis.zip.
Read here how to unzip/extract properly:
http://metallica.geekstogo.com/xpcompressedexplanation.html
Create a permanent folder and move hijackthis.exe into it. The reason is because hijackthis creates backups and when it's in your temp-folder it can be accidentally deleted.
How do you make a permanent folder:

Click My Computer, then C:\ and then on Program Files.
In the menu bar, File->New->Folder.
That will create a folder named New Folder, which you can rename to "HJT" or "HijackThis".
Now you have C:\Program Files\HijackThis. Put your HijackThis.exe there.

* Download UnhookExec.inf to your desktop.
Locate UnHookExec.inf on your desktop, rightclick it and choose 'install'.

Download Brute Force Uninstaller.
Unzip it to a folder of itís own (c:\BFU).
Read here how to unzip/extract properly:
http://metallica.geekstogo.com/xpcompressedexplanation.html
Start the Brute Force Uninstaller by doubleclicking BFU.exe

Next to the 'scriptfile to execute'-window you'll see a little icon as shown in next picture: Posted Image
When you click that icon, a little window will open that says: 'Please enter the full URL to the sript you want to execute'
In the field, copy and paste next URL:

http://metallica.geekstogo.com/p2pnetwork.bfu

Click Ok
Then click execute in Brute Force Uninstaller.

Wait for the complete script execution box to popup and press OK.
Press exit to terminate the BFU program.


* Start HijackThis, close all open windows leaving only HijackThis running. Place a check against each of the following:

R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL = http://www.isearch.com/index.php?app=SE&af...ODQ6NTo5&Terms=
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://www.isearch.com/index.php?app=SE&af...ODQ6NTo5&Terms=
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
R3 - Default URLSearchHook is missing
F0 - system.ini: Shell=Explorer.exe C:\WINDOWS\system32\winmgd.win
F1 - win.ini: run=C:\WINDOWS\system32\mouse_configurator.win
O1 - Hosts: 12.129.205.209 search.netscape.com12.129.205.209 sitefinder.verisign.com
O2 - BHO: NavErrRedir Class - {0199DF25-9820-4bd5-9FEE-5A765AB4371E} - C:\PROGRA~1\INCRED~1\BHO\INCFIN~2.DLL
O2 - BHO: (no name) - {AC109D01-32D6-4EB5-8300-D3C5EBAC7C83} - (no file)
O3 - Toolbar: (no name) - {2CDE1A7D-A478-4291-BF31-E1B4C16F92EB} - (no file)
O3 - Toolbar: (no name) - {014DA6C9-189F-421a-88CD-07CFE51CFF10} - (no file)
O4 - HKLM\..\Run: [MsConfigs] C:\Program Files\MsConfigs\MsConfigs.exe
O4 - HKLM\..\Run: [UsbD] C:\WINDOWS\system32\svhost32.exe
O4 - HKLM\..\Run: [Kernel32] C:\WINDOWS\system32\Kernel32.win
O4 - HKLM\..\RunServices: [p2pnetwork] p2pnetwork.exe
O4 - HKCU\..\RunServices: [p2pnetwork] p2pnetwork.exe
O7 - HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\PartyPoker.exe (file missing)
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\PartyPoker.exe (file missing)
O9 - Extra button: Ebates - {6685509E-B47B-4f47-8E16-9A5F3A62F683} - file://C:\Program Files\Ebates_MoeMoneyMaker\Sy350\Tp350\scri350a.htm (file missing) (HKCU)
O16 - DPF: {99802379-7362-40E2-9D28-8A3B9AF880B7} - http://hotsearchbar.com/toolbar2/winhot32.cab
O16 - DPF: {ABD45F35-2E4C-44C0-A075-6EF1DE75398E} - http://www.riversoftware.net/x0ff.cab


* Click on Fix Checked when finished and exit HijackThis.
Make sure your Internet Explorer is closed when you click Fix Checked!

Please download ATF Cleaner by Atribune.Double-click ATF-Cleaner.exe to run the program.
Under Main choose: Select All
Click the Empty Selected button.
If you use Firefox browserClick Firefox at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browserClick Opera at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.

REBOOT!

Please set your system to show all files.
Click Start.
Open My Computer.
Select the Tools menu and click Folder Options.
Select the View Tab. Under the Hidden files and folders heading, select Show hidden files and folders.
Uncheck: Hide file extensions for known file types
Uncheck the Hide protected operating system files (recommended) option.
Click Yes to confirm.
Click OK.

Delete next files if still present:

C:\WINDOWS\system32\winmgd.win
C:\WINDOWS\system32\mouse_configurator.win
C:\WINDOWS\system32\svhost32.exe
C:\WINDOWS\system32\Kernel32.win

Open notepad and copy and paste next bold in it:
(don't forget to copy and paste REGEDIT4)

REGEDIT4

[-HKEY_CLASSES_ROOT\keyfile]

[HKEY_CURRENT_USER\Software\Microsoft\Windows Scripting Host\Settings]
"Timeout"=-

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows Scripting Host\Settings]
"Timeout"=-


Save this as fix.reg Choose to save as *all files and place it on your desktop.
It should look like this: Posted Image
Doubleclick on it and when it asks you if you want to merge the contents to the registry, click yes/ok.

Please perform this online scan: Kaspersky Webscan
1. Read the Requirements and Privacy statement, then select "Accept"
2. A dialogue box will appearing asking "Do you want to install this software?" Name: kavwebscan_unicode.cab
3. Select "Install" to download the ActiveX controls that allows ActiveScan to run.
4. If running MSAS beta you may receive an alert that an IE ActiveX program requires your approval. Click "Allow"
5. When the download is complete it will say ready, click "Next"
6. Click "Scan Settings" and check the option to use the EXTENDED DATABASE, then click "OK"
7. Select a target to scan: Click on "My Computer"
8. When the scan is complete choose to save the results as "Save as Text"
9. Post the Kaspersky scan results in your next reply together with a new hijackthislog.
AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#3 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:06:55 PM

Posted 27 March 2006 - 05:48 PM

Due to the lack of feedback, this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team
a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.
AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#4 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:06:55 PM

Posted 02 April 2006 - 04:09 PM

Reopened, please perform my above steps. :thumbsup:
AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#5 mmorse

mmorse
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:11:55 AM

Posted 02 April 2006 - 05:17 PM

i did the above steps, one thing that did not work was the fix.reg part. i made the file and when i double click and hit yes it says "cannot import C:\Documents: Error opening the file. There may be a disk or file system error."

#6 mmorse

mmorse
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:11:55 AM

Posted 02 April 2006 - 05:21 PM

here are the two reports that i made after all the steps:

HiJackThis:

Logfile of HijackThis v1.99.1
Scan saved at 4:55:13 PM, on 4/2/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\NavNT\defwatch.exe
C:\WINDOWS\System32\gearsec.exe
C:\Program Files\NavNT\rtvscan.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\NavNT\vptray.exe
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2P1.EXE
C:\Program Files\Windows Defender\MSASCui.exe
C:\WINDOWS\system32\MsgSys.EXE
C:\PROGRA~1\MICROS~2\Office10\OUTLOOK.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\HiJackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
O4 - HKLM\..\Run: [vptray] C:\Program Files\NavNT\vptray.exe
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [EPSON PictureMate] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2P1.EXE /P17 "EPSON PictureMate" /O6 "USB003" /M "PictureMate"
O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\inetrepl.dll
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\inetrepl.dll
O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\inetrepl.dll
O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/downloads/kws/kav...can_unicode.cab
O16 - DPF: {9FC5238F-12C4-454F-B1B5-74599A21DE47} (Webshots Photo Uploader) - http://community.webshots.com/html/WSPhotoUploader.CAB
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://download.games.yahoo.com/games/popc...aploader_v5.cab
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
O20 - Winlogon Notify: NavLogon - C:\WINDOWS\System32\NavLogon.dll
O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\NavNT\defwatch.exe
O23 - Service: Gear Security Service (GEARSecurity) - GEAR Software - C:\WINDOWS\System32\gearsec.exe
O23 - Service: Norton AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\Program Files\NavNT\rtvscan.exe


Kapersky Scan:


-------------------------------------------------------------------------------
KASPERSKY ON-LINE SCANNER REPORT
Sunday, April 02, 2006 16:53:25
Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
Kaspersky On-line Scanner version: 5.0.67.0
Kaspersky Anti-Virus database last update: 2/04/2006
Kaspersky Anti-Virus database records: 185633
-------------------------------------------------------------------------------

Scan Settings:
Scan using the following antivirus database: extended
Scan Archives: true
Scan Mail Bases: true

Scan Target - My Computer:
A:\
C:\
D:\
E:\
F:\

Scan Statistics:
Total number of scanned objects: 57983
Number of viruses found: 43
Number of infected objects: 195
Number of suspicious objects: 1
Duration of the scan process: 4043 sec

Infected Object Name - Virus Name
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\APTemp\AP0.exe Infected: not-a-virus:AdWare.Win32.HelpExpress
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\APTemp\AP1.exe Infected: Trojan.Win32.KillAV.cj
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\APTemp\AP2.exe Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\01C40000.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\01C40001.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\01E80000.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\02380000.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\02380001.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\02640000.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\026C0000.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\026C0001.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\02DC0000.VBN Infected: Trojan-Proxy.Win32.Agent.cj
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\02F00000.VBN Infected: P2P-Worm.Win32.Alcan.a
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\02F00001.VBN Infected: P2P-Worm.Win32.Alcan.a
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\033C0000.VBN Infected: Backdoor.Win32.Rbot.pd
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\03CC0000.VBN Infected: Backdoor.Win32.Rbot.pd
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\04340000.VBN Infected: Backdoor.Win32.Rbot.pd
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\04340001.VBN Infected: Backdoor.Win32.Rbot.pd
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\04340002.VBN Infected: P2P-Worm.Win32.Alcan.a
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\04340003.VBN Infected: Backdoor.Win32.Rbot.pd
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\05480000.VBN Infected: Trojan-Proxy.Win32.Agent.cj
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\075C0000.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\075C0000.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\075C0001.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\075C0001.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\07AC0000.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\099C0000.VBN Infected: Trojan-Downloader.WMA.Wimad.b
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\099C0001.VBN Infected: Trojan-Downloader.WMA.Wimad.b
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\099C0002.VBN Infected: Trojan-Proxy.Win32.Agent.cj
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0A100000.VBN Infected: Backdoor.Win32.Rbot.pd
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0A180000.VBN Infected: Trojan-Downloader.Win32.Ani.c
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0A180001.VBN Infected: Trojan-Downloader.Win32.Ani.c
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0A940000.VBN Infected: Backdoor.Win32.Rbot.pd
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0A940001.VBN Infected: P2P-Worm.Win32.Alcan.a
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0A940002.VBN/setup.exe Infected: P2P-Worm.Win32.Alcan.a
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0A940002.VBN Infected: P2P-Worm.Win32.Alcan.a
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0A940003.VBN/setup.exe Infected: P2P-Worm.Win32.Alcan.a
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0A940003.VBN Infected: P2P-Worm.Win32.Alcan.a
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0A940004.VBN Infected: P2P-Worm.Win32.Alcan.a
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0A940005.VBN Infected: P2P-Worm.Win32.Alcan.a
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0A940006.VBN/setup.exe Infected: P2P-Worm.Win32.Alcan.a
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0A940006.VBN Infected: P2P-Worm.Win32.Alcan.a
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0A940007.VBN/setup.exe Infected: P2P-Worm.Win32.Alcan.a
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0A940007.VBN Infected: P2P-Worm.Win32.Alcan.a
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0A940008.VBN Infected: Backdoor.Win32.Rbot.pd
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0A940009.VBN Infected: P2P-Worm.Win32.Alcan.a
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0A94000A.VBN Infected: P2P-Worm.Win32.Alcan.a
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440000.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440000.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440002.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440002.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440004.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440004.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440006.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440006.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440008.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440008.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44000A.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44000A.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44000C.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44000C.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44000E.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44000E.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440010.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440010.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440012.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440012.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440014.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440014.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440016.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440016.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440018.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440018.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44001A.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44001A.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44001C.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44001C.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44001E.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44001E.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440020.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440020.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440022.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440022.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440024.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440024.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440026.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440026.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440028.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440028.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44002A.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44002A.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44002C.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44002C.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44002E.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44002E.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440030.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440030.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440032.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440032.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440034.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440034.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440036.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440036.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440038.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440038.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44003A.VBN/FILE.VBS Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44003A.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44003C.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44003E.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440040.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440042.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440044.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440046.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440048.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44004A.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44004C.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44004E.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440050.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440052.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440054.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440056.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440058.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44005A.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44005C.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F44005E.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440060.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine\0F440062.VBN Infected: Email-Worm.VBS.Gedza
C:\Documents and Settings\Mike\Local Settings\Temp\~16770.tmp Infected: not-a-virus:AdWare.Win32.Wintol.i
C:\Documents and Settings\Mike\Local Settings\Temp\~35955.tmp Infected: not-a-virus:AdWare.Win32.Wintol.i
C:\Documents and Settings\Mike\Local Settings\Temp\~892398.tmp Infected: not-a-virus:AdWare.Win32.Wintol.i
C:\Documents and Settings\Mike\Local Settings\Temp\~985659.tmp Infected: not-a-virus:AdWare.Win32.Wintol.i
C:\Documents and Settings\Mike\Local Settings\Temp\~995618.tmp Infected: not-a-virus:AdWare.Win32.Wintol.i
C:\Documents and Settings\Mike\Local Settings\Temporary Internet Files\Content.IE5\0LST2R8H\deliver46860[1].htm Suspicious: Exploit.HTML.Mht
C:\Documents and Settings\Mike\Local Settings\Temporary Internet Files\Content.IE5\5C54PZYI\dia553[1]/[From <x>]/html Infected: Exploit.VBS.Phel.i
C:\Documents and Settings\Mike\Local Settings\Temporary Internet Files\Content.IE5\5C54PZYI\dia553[1] Infected: Exploit.VBS.Phel.i
C:\Documents and Settings\Mike\Local Settings\Temporary Internet Files\Content.IE5\6D8FADIH\ysb_regular[1].cab/ysbactivex.dll Infected: Trojan-Downloader.Win32.IstBar.gen
C:\Documents and Settings\Mike\Local Settings\Temporary Internet Files\Content.IE5\6D8FADIH\ysb_regular[1].cab Infected: Trojan-Downloader.Win32.IstBar.gen
C:\Documents and Settings\Mike\Local Settings\Temporary Internet Files\Content.IE5\G1EZKHIF\ysb_prompt[1].htm Infected: Trojan-Downloader.JS.IstBar.j
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043649.exe Infected: Trojan.Win32.Small.cy
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043664.exe Infected: not-a-virus:AdWare.Win32.TotalVelocity.v
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043665.dll Infected: not-a-virus:AdWare.Win32.TotalVelocity.v
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043666.dll Infected: not-a-virus:AdWare.Win32.TotalVelocity.v
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043667.dll Infected: Trojan-Downloader.Win32.Keenval.e
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043668.dll Infected: not-a-virus:AdWare.Win32.Perfnav.a
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043670.dll Infected: not-a-virus:AdWare.Win32.WinComm
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043671.dll Infected: not-a-virus:AdWare.Win32.RiverAd.b
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043673.exe/data0002 Infected: Trojan-Downloader.Win32.Keenval
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043673.exe/data0004 Infected: Trojan-Downloader.Win32.Keenval
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043673.exe/data0005 Infected: Trojan-Downloader.Win32.Keenval
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043673.exe Infected: Trojan-Downloader.Win32.Keenval
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043674.exe/WISE0007.BIN Infected: Trojan-Downloader.Win32.VB.ah
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043674.exe Infected: Trojan-Downloader.Win32.VB.ah
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043675.dll Infected: not-a-virus:AdWare.Win32.BiSpy.p
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043676.exe Infected: Trojan-Downloader.Win32.Agent.ae
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043677.exe Infected: Trojan-Downloader.Win32.Agent.ae
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043678.exe Infected: Trojan-Downloader.Win32.Agent.ae
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043679.exe Infected: not-a-virus:AdWare.Win32.BiSpy.q
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043680.exe Infected: not-a-virus:AdWare.Win32.BiSpy.f
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043681.exe/systb.dll Infected: not-a-virus:AdWare.Win32.ImiBar.b
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043681.exe Infected: not-a-virus:AdWare.Win32.ImiBar.b
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043683.exe/stream Infected: Trojan-Downloader.NSIS.Agent.a
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043683.exe Infected: Trojan-Downloader.NSIS.Agent.a
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043684.dll Infected: Trojan-Downloader.Win32.Dyfuca.cv
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043685.dll Infected: Trojan-Downloader.Win32.Dyfuca.dc
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043686.dll Infected: Trojan-Downloader.Win32.Dyfuca.dt
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043687.dll Infected: not-a-virus:AdWare.Win32.F1Organizer.n
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043688.exe/data0002/data0002 Infected: Trojan-Downloader.Win32.Keenval
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043688.exe/data0002/data0004 Infected: Trojan-Downloader.Win32.Keenval
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043688.exe/data0002/data0005 Infected: Trojan-Downloader.Win32.Keenval
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043688.exe/data0002 Infected: Trojan-Downloader.Win32.Keenval
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043688.exe/data0008 Infected: Trojan-Downloader.Win32.Keenval.e
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043688.exe/data0009 Infected: Trojan-Downloader.Win32.Keenval.e
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043688.exe Infected: Trojan-Downloader.Win32.Keenval.e
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP699\A0043692.dll Infected: Trojan.Win32.Keenval.a
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP702\A0043799.exe/WISE0006.BIN Infected: Trojan-Downloader.Win32.VB.ah
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP702\A0043799.exe Infected: Trojan-Downloader.Win32.VB.ah
C:\System Volume Information\_restore{285DBF91-2297-4A9C-ADA9-6002DC509B74}\RP702\A0043800.dll Infected: not-a-virus:AdWare.Win32.F1Organizer.c
C:\WINDOWS\Downloaded Program Files\HDPlugin1018.dll Infected: not-a-virus:AdWare.Win32.Gator.1018
C:\WINDOWS\system32\64wu86rd.exe Infected: not-a-virus:AdWare.Win32.F1Organizer.h
C:\WINDOWS\system32\AST.exe/WISE0006.BIN Infected: Trojan-Downloader.Win32.VB.ah
C:\WINDOWS\system32\AST.exe Infected: Trojan-Downloader.Win32.VB.ah
C:\WINDOWS\system32\bo.exe Infected: not-a-virus:AdWare.Win32.BetterInternet
C:\WINDOWS\system32\in10b6s.dll Infected: Trojan-Dropper.Win32.Small.abe
C:\WINDOWS\system32\istinstall_145938.exe Infected: Trojan-Downloader.Win32.IstBar.er
C:\WINDOWS\system32\protect1.exe Infected: not-a-virus:AdWare.Win32.WinComm
C:\WINDOWS\system32\SHAgentNew.dll Infected: Trojan-Dropper.Win32.Small.mh
C:\WINDOWS\system32\thin-75-1-x-x.exe Infected: not-a-virus:AdWare.Win32.BetterInternet
C:\WINDOWS\system32\WebRebates_PlayaSolutions_InstallAS.exe/data0003/data0001 Infected: not-a-virus:AdWare.Win32.WebRebates.g
C:\WINDOWS\system32\WebRebates_PlayaSolutions_InstallAS.exe/data0003 Infected: not-a-virus:AdWare.Win32.WebRebates.g
C:\WINDOWS\system32\WebRebates_PlayaSolutions_InstallAS.exe/data0003 Infected: not-a-virus:AdWare.Win32.WebRebates.d
C:\WINDOWS\system32\WebRebates_PlayaSolutions_InstallAS.exe/data0004 Infected: not-a-virus:AdWare.Win32.WebRebates.d
C:\WINDOWS\system32\WebRebates_PlayaSolutions_InstallAS.exe/data0005 Infected: not-a-virus:AdWare.Win32.WebRebates.c
C:\WINDOWS\system32\WebRebates_PlayaSolutions_InstallAS.exe Infected: not-a-virus:AdWare.Win32.WebRebates.c
C:\WINDOWS\Temp\wtmp.exe Infected: Trojan-Downloader.Win32.Qoologic.a
C:\WINDOWS\Temp\~862329.tmp Infected: not-a-virus:AdWare.Win32.Wintol.i
C:\WINDOWS\Temp\~994497.tmp Infected: not-a-virus:AdWare.Win32.Wintol.i

Scan process completed.

#7 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:06:55 PM

Posted 02 April 2006 - 05:50 PM

Hello,

Not sure if you followed evey step I asked you to though...

Anyway, next step won't work anymore since the script is not available anymore and that may explain why the regfix didn't work either:

Next to the 'scriptfile to execute'-window you'll see a little icon as shown in next picture: IPB Image
When you click that icon, a little window will open that says: 'Please enter the full URL to the sript you want to execute'
In the field, copy and paste next URL:

http://metallica.geekstogo.com/p2pnetwork.bfu

Click Ok
Then click execute in Brute Force Uninstaller.

Wait for the complete script execution box to popup and press OK.
Press exit to terminate the BFU program.


So ignore above step and perform next instead:

* Download Brute Force Uninstaller.
Unzip it to a folder of itís own (c:\BFU).
Read here how to unzip/extract properly:
http://metallica.geekstogo.com/xpcompressedexplanation.html
Start the Brute Force Uninstaller by doubleclicking BFU.exe

Next to the 'scriptfile to execute'-window you'll see a little icon as shown in next picture: Posted Image
When you click that icon, a little window will open that says: 'Please enter the full URL to the sript you want to execute'
In the field, copy and paste next URL:

http://metallica.geekstogo.com/alcanshorty.bfu

Click Ok.
Then click execute in Brute Force Uninstaller.

Extra note:
If nothing happens after pressing the Execute button, this means that the script didn't download. In that case, download the script ( alcanshorty.bfu ) manually from above url ( rightclick on it and choose 'save as' and save it in your BFU-folder). Then start BFU.exe again and click the browse button next to the 'scriptfile to execute'-window
Browse to the script you downloaded and Click Ok and Execute in Brute Force Uninstaller.


Wait for the complete script execution box to popup and press OK.
Press exit to terminate the BFU program.

delete next files:

C:\WINDOWS\system32\64wu86rd.exe
C:\WINDOWS\system32\AST.exe
C:\WINDOWS\system32\bo.exe
C:\WINDOWS\system32\in10b6s.dll
C:\WINDOWS\system32\istinstall_145938.exe
C:\WINDOWS\system32\protect1.exe
C:\WINDOWS\system32\SHAgentNew.dll
C:\WINDOWS\system32\thin-75-1-x-x.exe
C:\WINDOWS\system32\WebRebates_PlayaSolutions_InstallAS.exe

Go to start > run and type: regsvr32 /u occache.dll
(or copy and paste this in the field in start > run )
Click Ok

Now search and delete:

C:\WINDOWS\Downloaded Program Files\HDPlugin1018.dll

Go to start > run and type regsvr32 occache.dll
Click OK

Post back to this topic using the add reply button with a fresh HijackThis log.
AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#8 mmorse

mmorse
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:11:55 AM

Posted 02 April 2006 - 06:05 PM

New HJT log:

Logfile of HijackThis v1.99.1
Scan saved at 7:02:16 PM, on 4/2/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\NavNT\defwatch.exe
C:\WINDOWS\System32\gearsec.exe
C:\Program Files\NavNT\rtvscan.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\NavNT\vptray.exe
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2P1.EXE
C:\Program Files\Windows Defender\MSASCui.exe
C:\WINDOWS\system32\MsgSys.EXE
C:\PROGRA~1\MICROS~2\Office10\OUTLOOK.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\HiJackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
O4 - HKLM\..\Run: [vptray] C:\Program Files\NavNT\vptray.exe
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [EPSON PictureMate] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2P1.EXE /P17 "EPSON PictureMate" /O6 "USB003" /M "PictureMate"
O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\inetrepl.dll
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\inetrepl.dll
O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\inetrepl.dll
O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/downloads/kws/kav...can_unicode.cab
O16 - DPF: {9FC5238F-12C4-454F-B1B5-74599A21DE47} (Webshots Photo Uploader) - http://community.webshots.com/html/WSPhotoUploader.CAB
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://download.games.yahoo.com/games/popc...aploader_v5.cab
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
O20 - Winlogon Notify: NavLogon - C:\WINDOWS\System32\NavLogon.dll
O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\NavNT\defwatch.exe
O23 - Service: Gear Security Service (GEARSecurity) - GEAR Software - C:\WINDOWS\System32\gearsec.exe
O23 - Service: Norton AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\Program Files\NavNT\rtvscan.exe

#9 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:06:55 PM

Posted 02 April 2006 - 06:10 PM

Nothing suspicious anymore. How are things running now?
AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#10 mmorse

mmorse
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:11:55 AM

Posted 02 April 2006 - 06:13 PM

how do i know if things are running better? will applications and games (i playe everquest 2) load and play faster?

#11 mmorse

mmorse
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:11:55 AM

Posted 02 April 2006 - 06:15 PM

i appreciate all your help with this, what should i be doing on a regular basis to keep my machine clean?

again, thank you for your help

#12 mmorse

mmorse
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:11:55 AM

Posted 02 April 2006 - 06:20 PM

the kapersky scan said i have 43 viruses, how do i get rid of them?

#13 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:06:55 PM

Posted 03 April 2006 - 01:16 AM

Hi,

The main reason why people post a hijackthislog here is because they are dealing with malware and that's what we solve.
That's why I asked you how things are running now.. If you still have problems concerning that.
We took care of what Kaspersky found. Most were present in the Quarantaine folder of Norton and for the others, I asked you to delete manually.

To keep this clean in the future, I would suggest the following things:

Install Spywareblaster
SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It blocks the popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.

* Avoid illegal sites, because that's where most malware is present.
* Don't click on links inside popups.
* Don't click on links in spam messages claiming to offer anti-spyware software; because most of these so called removers ARE spyware.
* Download free software only from sites you know and trust. Because a lot of free software can bundle other software, including spyware.

Let your antispywarescanner(s) scan frequently and don't forget to update before.

And I do suggest you perform an online virusscan once in a while. (Housecall and/or Bitdefender). Because what one virusscanner can't find another one maybe can.
Also make sure that your virusscanner, the one that is installed on your system is always up to date!

Make sure your windows has the latest updates: http://windowsupdate.microsoft.com/

If you are having XP SP2, read here how to configure Security Features for Internet Explorer:
http://www.microsoft.com/technet/security/...xp/iesecxp.mspx

Also visit this Free Online Scanner for PC Health and Safety and Microsoft Security At Home for tips to Protect your Pc, Protect yourself and Protect your Family.

More info on how to prevent malware you can also find here (By Tony Klein)
and here: http://wiki.castlecops.com/Malware_Prevent...nt_Re-infection

If you want to fight back the Malware Writers that have made your life a misery, please take a look here and read what you can do against it.

Happy surfing again! :thumbsup:
AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#14 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:06:55 PM

Posted 12 April 2006 - 05:37 AM

Since this issue appears resolved ... this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team
a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.
AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users