Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Brower Has Been Hijacked


  • Please log in to reply
5 replies to this topic

#1 dannysdad

dannysdad

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:43 AM

Posted 03 January 2007 - 07:18 PM

Logfile of HijackThis v1.99.1
Scan saved at 6:13:32 PM, on 1/3/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
C:\Program Files\Norton GoBack\GBPoll.exe
C:\Program Files\Cheetah Burner\Cheetah DVD Burner\NMSAccess.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\Fast.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
C:\Program Files\SpywareBot\SpywareBot.exe
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\Program Files\Norton GoBack\GBTray.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\taskmgr.exe
C:\downloads2\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://www.microsoft.com/isapi/redir.dll?p...amp;ar=iesearch
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.microsoft.com/isapi/redir.dll?p...amp;ar=iesearch
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.microsoft.com/isapi/redir.dll?p...&ar=msnhome
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://www.microsoft.com/isapi/redir.dll?p...amp;ar=iesearch
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.microsoft.com/isapi/redir.dll?p...amp;ar=iesearch
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.microsoft.com/isapi/redir.dll?p...ER}&ar=home
R1 - HKLM\Software\Microsoft\Internet Explorer\Search,Default_Search_URL = http://www.microsoft.com/isapi/redir.dll?p...amp;ar=iesearch
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://home.microsoft.com/access/autosearch.asp?p=%s
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Tom Pick's Internet Explorer
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe"
O4 - HKLM\..\Run: [DllRunning] rundll32.exe "C:\WINDOWS\system32\wubdohmr.dll",setvm
O4 - HKLM\..\Run: [spywarebot] C:\Program Files\SpywareBot\SpywareBot.exe -boot
O4 - Global Startup: Norton GoBack.lnk = C:\Program Files\Norton GoBack\GBTray.exe
O8 - Extra context menu item: (PopUpCop) Allow images... - res://C:\PROGRA~1\PopUpCop\PopUpCop.dll/allowimages
O9 - Extra button: Web Anti-Virus - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\scieplugin.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} (Windows Live Safety Center Base Module) - http://cdn.scan.safety.live.com/resource/d...lscbase8460.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O21 - SSODL: buprestidae - {b59f3ba4-98da-4b5f-8a2d-7b56fb11140b} - (no file)
O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: Kaspersky Anti-Virus 6.0 (AVP) - Unknown owner - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe" -r (file missing)
O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
O23 - Service: GoBack Polling Service (GBPoll) - Symantec Corporation - C:\Program Files\Norton GoBack\GBPoll.exe
O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: NMSAccess - Unknown owner - C:\Program Files\Cheetah Burner\Cheetah DVD Burner\NMSAccess.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe

BC AdBot (Login to Remove)

 


m

#2 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:01:43 AM

Posted 03 January 2007 - 07:47 PM

Add remove programs - remove SpywareBot it is questionable

You should print out these instructions, or copy them to a NotePad file for reading while in Safe Mode, because you will not be able to connect to the Internet to read from this site.

Please download SmitfraudFix (by S!Ri)
Extract the content (a folder named SmitfraudFix) to your Desktop.

Next, please reboot your computer in Safe Mode by doing the following :
  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
  • Instead of Windows loading as normal, a menu with options should appear;
  • Select the first option, to run Windows in Safe Mode, then press "Enter".
  • Choose your usual account.
Once in Safe Mode, open the SmitfraudFix folder again and double-click smitfraudfix.cmd
Select option #2 - Clean by typing 2 and press "Enter" to delete infected files.

You will be prompted: "Registry cleaning - Do you want to clean the registry?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.

The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".

The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart it into Normal Windows.

A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply along with a new hijack log.

The report can also be found at the root of the system drive, usually at C:\rapport.txt

Warning: running option #2 on a non infected computer will remove your Desktop background.
========================

Download Superantispyware

http://www.superantispyware.com/superantis...efreevspro.html

Install it and double-click the icon on your desktop to run it.
· It will ask if you want to update the program definitions, click Yes.
· Under Configuration and Preferences, click the Preferences button.
· Click the Scanning Control tab.
· Under Scanner Options make sure the following are checked:
o Close browsers before scanning
o Scan for tracking cookies
o Terminate memory threats before quarantining.
o Please leave the others unchecked.
o Click the Close button to leave the control center screen.
· On the main screen, under Scan for Harmful Software click Scan your computer.
· On the left check C:\Fixed Drive.
· On the right, under Complete Scan, choose Perform Complete Scan.
· Click Next to start the scan. Please be patient while it scans your computer.
· After the scan is complete a summary box will appear. Click OK.
· Make sure everything in the white box has a check next to it, then click Next.
· It will quarantine what it found and if it asks if you want to reboot, click Yes.
· To retrieve the removal information for me please do the following:
o After reboot, double-click the SUPERAntispyware icon on your desktop.
o Click Preferences. Click the Statistics/Logs tab.
o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
o It will open in your default text editor (such as Notepad/Wordpad).
o Please highlight everything in the notepad, then right-click and choose copy.
· Click close and close again to exit the program.
· Please paste that information here for me with a new HijackThis log.
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#3 dannysdad

dannysdad
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:43 AM

Posted 03 January 2007 - 09:22 PM

Here you go.... Thanks so much for your help and time.



Logfile of HijackThis v1.99.1
Scan saved at 8:20:00 PM, on 1/3/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Norton GoBack\GBTray.exe
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
C:\Program Files\Norton GoBack\GBPoll.exe
C:\Program Files\Cheetah Burner\Cheetah DVD Burner\NMSAccess.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\Fast.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\notepad.exe
C:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXE
C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\downloads2\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://www.microsoft.com/isapi/redir.dll?p...amp;ar=iesearch
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.microsoft.com/isapi/redir.dll?p...amp;ar=iesearch
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.microsoft.com/isapi/redir.dll?p...&ar=msnhome
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://www.microsoft.com/isapi/redir.dll?p...amp;ar=iesearch
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.microsoft.com/isapi/redir.dll?p...amp;ar=iesearch
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.microsoft.com/isapi/redir.dll?p...ER}&ar=home
R1 - HKLM\Software\Microsoft\Internet Explorer\Search,Default_Search_URL = http://www.microsoft.com/isapi/redir.dll?p...amp;ar=iesearch
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://home.microsoft.com/access/autosearch.asp?p=%s
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Tom Pick's Internet Explorer
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {104460C4-1CB9-48CB-A0EA-F3573F92A9F8} - (no file)
O2 - BHO: (no name) - {2771D8F7-933D-4D4E-B79F-DEF857511A82} - C:\WINDOWS\system32\cbxywur.dll (file missing)
O2 - BHO: (no name) - {30DA3E59-87CB-AE63-C75C-8BCD2A6982C3} - (no file)
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {7DA39570-5FD2-4f18-94B4-20730CB3F727} - (no file)
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe"
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - Global Startup: Norton GoBack.lnk = C:\Program Files\Norton GoBack\GBTray.exe
O8 - Extra context menu item: (PopUpCop) Allow images... - res://C:\PROGRA~1\PopUpCop\PopUpCop.dll/allowimages
O9 - Extra button: Web Anti-Virus - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\scieplugin.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} (Windows Live Safety Center Base Module) - http://cdn.scan.safety.live.com/resource/d...lscbase8460.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O20 - Winlogon Notify: cbxywur - cbxywur.dll (file missing)
O20 - Winlogon Notify: klogon - C:\WINDOWS\system32\klogon.dll
O20 - Winlogon Notify: winrkp32 - C:\WINDOWS\
O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: Kaspersky Anti-Virus 6.0 (AVP) - Unknown owner - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe" -r (file missing)
O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
O23 - Service: GoBack Polling Service (GBPoll) - Symantec Corporation - C:\Program Files\Norton GoBack\GBPoll.exe
O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: NMSAccess - Unknown owner - C:\Program Files\Cheetah Burner\Cheetah DVD Burner\NMSAccess.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe



SmitFraudFix v2.132

Scan done at 19:15:50.73, Wed 01/03/2007
Run from C:\Documents and Settings\Tom\Desktop\smithfraudfix\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in safe mode

»»»»»»»»»»»»»»»»»»»»»»»» Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» Killing process


»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

GenericRenosFix by S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files


»»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""


»»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

Registry Cleaning done.

»»»»»»»»»»»»»»»»»»»»»»»» After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


»»»»»»»»»»»»»»»»»»»»»»»» End




SUPERAntiSpyware Scan Log
Generated 01/03/2007 at 08:11 PM

Application Version : 3.4.1000

Core Rules Database Version : 3158
Trace Rules Database Version: 1171

Scan type : Complete Scan
Total Scan Time : 00:45:49

Memory items scanned : 313
Memory threats detected : 2
Registry items scanned : 5848
Registry threats detected : 12
File items scanned : 40146
File threats detected : 193

Trojan.WinFixer
C:\WINDOWS\SYSTEM32\MLLJG.DLL
C:\WINDOWS\SYSTEM32\MLLJG.DLL
HKLM\Software\Classes\CLSID\{104460C4-1CB9-48CB-A0EA-F3573F92A9F8}
HKCR\CLSID\{104460C4-1CB9-48CB-A0EA-F3573F92A9F8}
HKCR\CLSID\{104460C4-1CB9-48CB-A0EA-F3573F92A9F8}\InprocServer32
HKCR\CLSID\{104460C4-1CB9-48CB-A0EA-F3573F92A9F8}\InprocServer32#ThreadingModel
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{104460C4-1CB9-48CB-A0EA-F3573F92A9F8}
Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\mlljg

Trojan.Downloader-AutoAff
C:\WINDOWS\SYSTEM32\CBXYWUR.DLL
C:\WINDOWS\SYSTEM32\CBXYWUR.DLL

Adware.Tracking Cookie
C:\Documents and Settings\Tom\Cookies\tom@rotator.adjuggler[1].txt
C:\Documents and Settings\Tom\Cookies\tom@c5.zedo[1].txt
C:\Documents and Settings\Tom\Cookies\tom@1068383423[1].txt
C:\Documents and Settings\Tom\Cookies\tom@burstnet[2].txt
C:\Documents and Settings\Tom\Cookies\tom@entrepreneur.122.2o7[1].txt
C:\Documents and Settings\Tom\Cookies\tom@count.exitexchange[1].txt
C:\Documents and Settings\Tom\Cookies\tom@mb[3].txt
C:\Documents and Settings\Tom\Cookies\tom@1071363908[1].txt
C:\Documents and Settings\Tom\Cookies\tom@tacoda[1].txt
C:\Documents and Settings\Tom\Cookies\tom@track.searchignite[2].txt
C:\Documents and Settings\Tom\Cookies\tom@adbrite[1].txt
C:\Documents and Settings\Tom\Cookies\tom@www.cracksearchengine[1].txt
C:\Documents and Settings\Tom\Cookies\tom@findwhat[1].txt
C:\Documents and Settings\Tom\Cookies\tom@1072506049[1].txt
C:\Documents and Settings\Tom\Cookies\tom@msnservices.112.2o7[1].txt
C:\Documents and Settings\Tom\Cookies\tom@adjuggler[1].txt
C:\Documents and Settings\Tom\Cookies\tom@entrepreneur[1].txt
C:\Documents and Settings\Tom\Cookies\tom@1071694721[1].txt
C:\Documents and Settings\Tom\Cookies\tom@ehg-maniatv.hitbox[1].txt
C:\Documents and Settings\Tom\Cookies\tom@1071930148[1].txt
C:\Documents and Settings\Tom\Cookies\tom@anad.tacoda[1].txt
C:\Documents and Settings\Tom\Cookies\tom@ads.ethereal[1].txt
C:\Documents and Settings\Tom\Cookies\tom@cgi-bin[2].txt
C:\Documents and Settings\Tom\Cookies\tom@mb[2].txt
C:\Documents and Settings\Tom\Cookies\tom@partner2profit[1].txt
C:\Documents and Settings\Tom\Cookies\tom@warlog[1].txt
C:\Documents and Settings\Tom\Cookies\tom@advertising[1].txt
C:\Documents and Settings\Tom\Cookies\tom@anat.tacoda[1].txt
C:\Documents and Settings\Tom\Cookies\tom@as-us.falkag[1].txt
C:\Documents and Settings\Tom\Cookies\tom@exitexchange[2].txt
C:\Documents and Settings\Tom\Cookies\tom@stats1.reliablestats[2].txt
C:\Documents and Settings\Tom\Cookies\tom@count2.exitexchange[1].txt
C:\Documents and Settings\Tom\Cookies\tom@adinterax[1].txt
C:\Documents and Settings\Tom\Cookies\tom@indiads[1].txt
C:\Documents and Settings\Tom\Cookies\tom@1067357514[1].txt
C:\Documents and Settings\Tom\Cookies\tom@1068695247[1].txt
C:\Documents and Settings\Tom\Cookies\tom@interclick[2].txt
C:\Documents and Settings\Tom\Cookies\tom@1071265787[1].txt
C:\Documents and Settings\Tom\Cookies\tom@cgi-bin[1].txt
C:\Documents and Settings\Tom\Cookies\tom@statcounter[1].txt
C:\Documents and Settings\Tom\Cookies\tom@msnportal.112.2o7[1].txt
C:\Documents and Settings\Tom\Cookies\tom@login.tracking101[2].txt
C:\Documents and Settings\Tom\Cookies\tom@doubleclick[1].txt
C:\Documents and Settings\Tom\Cookies\tom@reduxads.valuead[1].txt
C:\Documents and Settings\Tom\Cookies\tom@1071743629[1].txt
C:\Documents and Settings\Tom\Cookies\tom@1070299046[1].txt
C:\Documents and Settings\Tom\Cookies\tom@ads.pointroll[1].txt
C:\Documents and Settings\Tom\Cookies\tom@247realmedia[1].txt
C:\Documents and Settings\Tom\Cookies\tom@1072680840[1].txt
C:\Documents and Settings\Tom\Cookies\tom@hitbox[2].txt
C:\Documents and Settings\Tom\Cookies\tom@ad1.emediate[2].txt
C:\Documents and Settings\Tom\Cookies\tom@atwola[1].txt
C:\Documents and Settings\Tom\Cookies\tom@count1.exitexchange[1].txt
C:\Documents and Settings\Tom\Cookies\tom@nextag[2].txt
C:\Documents and Settings\Tom\Cookies\tom@mb[1].txt
C:\Documents and Settings\Tom\Cookies\tom@heavycom.122.2o7[1].txt
C:\Documents and Settings\Tom\Cookies\tom@kanoodle[2].txt
C:\Documents and Settings\Tom\Cookies\tom@www.culturalcrack[2].txt
C:\Documents and Settings\Tom\Cookies\tom@cpvfeed[2].txt
C:\Documents and Settings\Tom\Cookies\tom@v7.stats.load[2].txt
C:\Documents and Settings\Tom\Cookies\tom@mediaplex[1].txt
C:\Documents and Settings\Tom\Cookies\tom@www.burstnet[2].txt
C:\Documents and Settings\Tom\Cookies\tom@www.burstbeacon[1].txt
C:\Documents and Settings\Tom\Cookies\tom@atdmt[2].txt
C:\Documents and Settings\Tom\Cookies\tom@fastclick[2].txt
C:\Documents and Settings\Tom\Cookies\tom@edge.ru4[1].txt
C:\Documents and Settings\Tom\Cookies\tom@tribalfusion[1].txt
C:\Documents and Settings\Tom\Cookies\tom@xiti[1].txt
C:\Documents and Settings\Tom\Cookies\tom@zedo[2].txt
C:\Documents and Settings\Tom\Cookies\tom@ads.addynamix[1].txt
C:\Documents and Settings\Tom\Cookies\tom@ads.soft32[1].txt

Unclassified.Unknown Origin
HKCR\CLSID\{7DA39570-5FD2-4F18-94B4-20730CB3F727}
HKCR\CLSID\{7DA39570-5FD2-4F18-94B4-20730CB3F727}\InprocServer32
HKCR\CLSID\{7DA39570-5FD2-4F18-94B4-20730CB3F727}\InprocServer32#ThreadingModel

Browser Hijacker.Favorites
C:\Documents and Settings\Tom\Favorites\Favorites\Music and Movies
C:\Documents and Settings\Tom\Favorites\Favorites\Spyware Removers

Trojan.Media-Codec
HKCR\VideoAXObject.Chl
HKCR\VideoAXObject.Chl\CLSID

Malware.SpywareBot
HKU\S-1-5-21-299502267-73586283-682003330-1003\Software\SpywareBot
C:\Program Files\SpywareBot\DataBaseNew.ref
C:\Program Files\SpywareBot\HOSTS Backups\2007-1-3-1167833505_hosts
C:\Program Files\SpywareBot\HOSTS Backups\2007-1-3-1167834204_hosts
C:\Program Files\SpywareBot\HOSTS Backups
C:\Program Files\SpywareBot\Log\log_2007_01_03_08_11_07.log
C:\Program Files\SpywareBot\Log\log_2007_01_03_08_11_19.log
C:\Program Files\SpywareBot\Log\log_2007_01_03_08_23_17.log
C:\Program Files\SpywareBot\Log\log_2007_01_03_08_57_35.log
C:\Program Files\SpywareBot\Log\log_2007_01_03_19_19_24.log
C:\Program Files\SpywareBot\Log\log_2007_01_03_19_19_50.log
C:\Program Files\SpywareBot\Log
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10000.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10000.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10001.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10001.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10002.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10002.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10003.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10003.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10004.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10004.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10005.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10005.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10006.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10006.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10007.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10007.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10008.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10008.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10009.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10009.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10010.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10010.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10011.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10011.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10012.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10012.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10013.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10013.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10014.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10014.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10015.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10015.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10016.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10016.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10017.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10017.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10018.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10018.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10019.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10019.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10020.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10020.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10021.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10021.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10022.qit\clink.jar
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10022.qit\commons-httpclient.jar
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10022.qit\commons-logging.jar
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10022.qit\commons-net.jar
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10022.qit\daap.jar
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10022.qit\i18n.jar
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10022.qit\icu4j.jar
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10022.qit\id3v2.jar
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10022.qit\jcraft.jar
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10022.qit\jl011.jar
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10022.qit\jmdns.jar
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10022.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10022.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10023.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10023.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10024.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10024.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10025.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10025.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10026.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10026.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10027.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10027.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10028.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10028.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10029.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20\10029.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-11-20
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-23-18\10000.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-23-18\10000.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-23-18\10001.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-23-18\10001.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-23-18\10002.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-23-18\10002.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-23-18\10003.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-23-18\10003.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-23-18\10004.qit
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-23-18\10004.qnf
C:\Program Files\SpywareBot\Quarantine\03-01-2007-08-23-18
C:\Program Files\SpywareBot\Quarantine
C:\Program Files\SpywareBot\Registry Backups
C:\Program Files\SpywareBot\Settings\CustomScan.stg
C:\Program Files\SpywareBot\Settings\IgnoreList.stg
C:\Program Files\SpywareBot\Settings\ScanInfo.stg
C:\Program Files\SpywareBot\Settings\ScanResults.stg
C:\Program Files\SpywareBot\Settings\SelectedFolders.stg
C:\Program Files\SpywareBot\Settings\Settings.stg
C:\Program Files\SpywareBot\Settings
C:\Program Files\SpywareBot
C:\DOWNLOADS2\SETUP.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{CA70B5DC-BE4E-4143-ADE3-EB91E8D6996A}\RP158\A0036731.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{CA70B5DC-BE4E-4143-ADE3-EB91E8D6996A}\RP163\A0040307.EXE
C:\WINDOWS\Prefetch\SETUP.EXE-2AF87ED1.pf

Adware.ClickSpring
C:\Documents and Settings\Tom\My Documents\WNSXS~1\WACLT~1.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{CA70B5DC-BE4E-4143-ADE3-EB91E8D6996A}\RP158\A0036720.EXE
C:\WINDOWS\SYSTEM32\ASKS~1\WUAUCLT.EXE

Adware.Unknown Origin
C:\PROGRAM FILES\COMMON FILES\IIFU\IIFUD\CLASS-BARREL

Adware.Toolbar888
C:\PROGRAM FILES\COMMON FILES\{3C43D032-0C01-1033-0525-060525040001}\BAR888.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{CA70B5DC-BE4E-4143-ADE3-EB91E8D6996A}\RP158\A0036767.DLL

Adware.IPWins
C:\PROGRAM FILES\IPWINDOWS\IPWINS.EXE

Trojan.Unknown Origin
C:\SYSTEM VOLUME INFORMATION\_RESTORE{CA70B5DC-BE4E-4143-ADE3-EB91E8D6996A}\RP158\A0036715.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{CA70B5DC-BE4E-4143-ADE3-EB91E8D6996A}\RP162\A0039225.EXE

Trojan Downloader-SystemAlert.Process
C:\SYSTEM VOLUME INFORMATION\_RESTORE{CA70B5DC-BE4E-4143-ADE3-EB91E8D6996A}\RP162\A0039273.DLL

#4 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:01:43 AM

Posted 04 January 2007 - 10:52 AM

IE - Block Third party cookies
1. Click on the Tools button on the Internet Explorer tool bar.
2. Highlight and click on Internet options at the bottom of the Tools menu.
3. Select the Privacy Tab of the Internet Options menu.
4. Select the Advanced... button at the bottom of the screen.
5. Select override automatic cookie handling button.
6. To block third party cookies select block under "Third-party cookies".
7. Select "always allow session cookies".
8. Click on the OK button at the bottom of the screen.
===========================

You may want to print this or save it to notepad as we will go to safe mode.

Fix these with HiJackThis – mark them, close IE, click fix checked

O2 - BHO: (no name) - {104460C4-1CB9-48CB-A0EA-F3573F92A9F8} - (no file)

O2 - BHO: (no name) - {2771D8F7-933D-4D4E-B79F-DEF857511A82} - C:\WINDOWS\system32\cbxywur.dll (file missing)

O2 - BHO: (no name) - {30DA3E59-87CB-AE63-C75C-8BCD2A6982C3} - (no file)

O2 - BHO: (no name) - {7DA39570-5FD2-4f18-94B4-20730CB3F727} - (no file)

O20 - Winlogon Notify: cbxywur - cbxywur.dll (file missing)

O20 - Winlogon Notify: winrkp32 - C:\WINDOWS\

DownLoad http://www.downloads.subratam.org/KillBox.zip or
http://www.thespykiller.co.uk/files/killbox.exe

Restart your computer into safe mode now. (Tapping F8 at the first black screen) Perform the following steps in safe mode:

Double-click on Killbox.exe to run it. Now put a tick by DELETE ON REBOOT. In the "Full Path of File to Delete" box, copy and paste each of the following lines one at a time then click on the button that has the red circle with the X in the middle after you enter each file. It will ask for confimation to delete the file. Click Yes. Continue with that same procedure until you have copied and pasted all of these in the "Paste Full Path of File to Delete" box.

C:\WINDOWS\System32\winrkp32.dll

Note: It is possible that Killbox will tell you that one or more files do not exist. If that happens, just continue on with all the files. Be sure you don't miss any.

START – RUN – type in %temp% - OK - Edit – Select all – File – Delete

Delete everything in the C:\Windows\Temp folder or C:\WINNT\temp

Not all temp files will delete and that is normal
Empty the recycle bin
Boot and post a new log from normal NOT safe mode

Please give feedback on what worked/didn’t work and the current status of your system
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#5 dannysdad

dannysdad
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:43 AM

Posted 04 January 2007 - 11:22 AM

THere seems to be a major improvement, especially since running Superantispyware. Do you recommend upgrading to the pro versions? Right now I'm running a trial version of Kaspersky Antivirus. Should I be using something else, instead? Should I upgrade to their full security suite? Should I use Zone Alarm?

I can't thank you enough for all of your help. I would really appreciate any guidance you can give me on which programs to use, going forward.

Tom




Logfile of HijackThis v1.99.1
Scan saved at 10:16:37 AM, on 1/4/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Norton GoBack\GBTray.exe
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
C:\Program Files\Norton GoBack\GBPoll.exe
C:\Program Files\Cheetah Burner\Cheetah DVD Burner\NMSAccess.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\Fast.exe
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\System32\svchost.exe
C:\downloads2\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://www.microsoft.com/isapi/redir.dll?p...amp;ar=iesearch
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.microsoft.com/isapi/redir.dll?p...amp;ar=iesearch
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.microsoft.com/isapi/redir.dll?p...&ar=msnhome
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://www.microsoft.com/isapi/redir.dll?p...amp;ar=iesearch
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.microsoft.com/isapi/redir.dll?p...amp;ar=iesearch
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.microsoft.com/isapi/redir.dll?p...ER}&ar=home
R1 - HKLM\Software\Microsoft\Internet Explorer\Search,Default_Search_URL = http://www.microsoft.com/isapi/redir.dll?p...amp;ar=iesearch
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://home.microsoft.com/access/autosearch.asp?p=%s
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Tom Pick's Internet Explorer
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe"
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - Global Startup: Norton GoBack.lnk = C:\Program Files\Norton GoBack\GBTray.exe
O8 - Extra context menu item: (PopUpCop) Allow images... - res://C:\PROGRA~1\PopUpCop\PopUpCop.dll/allowimages
O9 - Extra button: Web Anti-Virus - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\scieplugin.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} (Windows Live Safety Center Base Module) - http://cdn.scan.safety.live.com/resource/d...lscbase8460.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O20 - Winlogon Notify: klogon - C:\WINDOWS\system32\klogon.dll
O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: Kaspersky Anti-Virus 6.0 (AVP) - Unknown owner - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe" -r (file missing)
O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
O23 - Service: GoBack Polling Service (GBPoll) - Symantec Corporation - C:\Program Files\Norton GoBack\GBPoll.exe
O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: NMSAccess - Unknown owner - C:\Program Files\Cheetah Burner\Cheetah DVD Burner\NMSAccess.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe

#6 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:01:43 AM

Posted 04 January 2007 - 12:18 PM

The free version is just fine, I prefer AVG as an AV and its free and Yes ZOne Alarm


AVG AV 7.5 - http://free.grisoft.com/freeweb.php/doc/2/

Zone Alarm http://www.zonelabs.com/store/content/comp...kulist_download
"Nothing could be finer than to be in South Carolina ............"

Member ASAP




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users