Virus/spyware Problem Please Help!!!!!!!!

Can someone help me? I have AVG free edition and it has found 2 viruses (Downloader.Agent.11 and trojan horse Startpage.19) and I have run checks with Spybot(3 results) and AD-Aware Se (lots of "coolwebsearch" entries, possibly malware???). It seems to be affecting my system restore, as well as internet explorer, as when I open Internet explorer, it sets my home page to "about:blank" and AVG gives me about 3 notices of a virus each time I open Internet explorer. It seems to be adding links to my favorites, no matter how many times I delete them. Also, there seems to be 3 programs in my add/remove programs section I do not have, and will not let me delete(Home Search Assistant, Search extender, and Shopping Wizard). I seen a post earlier similar to mine, but the details followed were too complex for me. I am running windows XP Professional Sp1(cannot update to Sp2 as it is unregistered) and it is a multiple user computer. If someone can please help me, but put it in simplier terms it would be greatly appreciated. I have attached a HJT log, and if you need any more information just let me know. Thanks










Logfile of HijackThis v1.99.1
Scan saved at 5:25:03 PM, on 4/12/2005
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 (6.00.2600.0000)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\PROGRA~1\EFFICI~1\ENTERN~1\app\pppoeservice.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\wuauclt.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
C:\WINDOWS\System32\atiptaxx.exe
C:\Program Files\Java\j2re1.4.2_06\bin\jusched.exe
C:\WINDOWS\System32\devldr32.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Error Nuker\bin\ErrorNuker.exe
C:\Program Files\eBlocs\SpyBlocs\GLF343.exe
C:\Program Files\Spyware Doctor\swdoctor.exe
C:\Program Files\Common Files\Microsoft Shared\Works Shared\wkcalrem.exe
C:\Documents and Settings\Kurt\Desktop\LimeWire\LimeWire.exe
C:\Program Files\MSN Messenger\msnmsgr.exe
C:\Program Files\iTunes\iTunes.exe
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Ad-Aware.exe
C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe
C:\Documents and Settings\Kurt\Desktop\hijackthis_199\AboutBuster\AboutBuster\AboutBuster.exe
C:\Documents and Settings\Kurt\Desktop\hijackthis_199\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\odxyp.dll/sp.html#12345
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\odxyp.dll/sp.html#12345
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\odxyp.dll/sp.html#12345
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\odxyp.dll/sp.html#12345
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer
R3 - Default URLSearchHook is missing
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {2E2C234F-D7D0-9340-5DF8-E4C8C742A8DF} - C:\WINDOWS\mskj.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O4 - HKLM\..\Run: [RoxioEngineUtility] "C:\Program Files\Common Files\Roxio Shared\System\EngUtil.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [WorksFUD] C:\Program Files\Microsoft Works\wkfud.exe
O4 - HKLM\..\Run: [Microsoft Works Portfolio] C:\Program Files\Microsoft Works\WksSb.exe /AllUsers
O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
O4 - HKLM\..\Run: [AtiPTA] atiptaxx.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_06\bin\jusched.exe
O4 - HKLM\..\Run: [iTunesHelper] C:\Program Files\iTunes\iTunesHelper.exe
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [AVG7_EMC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
O4 - HKLM\..\Run: [Error Nuker] C:\Program Files\Error Nuker\bin\ErrorNuker.exe autostart
O4 - HKCU\..\Run: [SpyBlocs] C:\Program Files\eBlocs\SpyBlocs\GLF343.exe
O4 - HKCU\..\Run: [Spyware Doctor] "C:\Program Files\Spyware Doctor\swdoctor.exe" /Q
O4 - Startup: LimeWire On Startup.lnk = C:\Documents and Settings\Kurt\Desktop\LimeWire\LimeWire.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: Microsoft Works Calendar Reminders.lnk = ?
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: Backward &Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cac&hed Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Si&milar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_06\bin\npjpi142_06.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_06\bin\npjpi142_06.dll
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~2\tools\iesdpb.dll
O16 - DPF: {14B87622-7E19-4EA8-93B3-97215F77A6BC} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab30149.cab
O16 - DPF: {2917297F-F02B-4B9D-81DF-494B6333150B} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab31267.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.com/v5consumer/V5Controls/en/x86/client/wuweb_site.cab?1093135813508
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/binFramework/v10/ZIntro.cab32846.cab
O16 - DPF: {BD393C14-72AD-4790-A095-76522973D6B8} (CBreakshotControl Class) - http://messenger.zone.msn.com/binary/Bankshot.cab31267.cab
O16 - DPF: {DA758BB1-5F89-4465-975F-8D7179A4BCF3} (WheelofFortune Object) - http://messenger.zone.msn.com/binary/WoF.cab31267.cab
O16 - DPF: {E5D419D6-A846-4514-9FAD-97E826C84822} (HeartbeatCtl Class) - http://fdl.msn.com/zone/datafiles/heartbeat.cab
O16 - DPF: {F58E1CEF-A068-4C15-BA5E-587CAF3EE8C6} (MSN Chat Control 4.5) - http://chat.msn.com/bin/msnchat45.cab
O16 - DPF: {F6BF0D00-0B2A-4A75-BF7B-F385591623AF} (Solitaire Showdown Class) - http://messenger.zone.msn.com/binary/SolitaireShowdown.cab31267.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{F118DE87-6FA9-467C-B882-26E0D31C87C5}: NameServer = 142.161.130.155 142.161.2.155
O23 - Service: Network Security Service ( 11Fßä#·ºÄÖ`I) - Unknown owner - C:\WINDOWS\system32\javaoy.exe (file missing)
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: PPPoE Service (PPPoEService) - Unknown owner - C:\PROGRA~1\EFFICI~1\ENTERN~1\app\pppoeservice.exe

Comments

  • Buckeye_SamBuckeye_Sam Columbus, Ohio
    edited April 2005
    Please follow these steps to remove the HSA from your computer.

    Step 1
    Download cwsserviceremove.zip and extract it to your desktop:
    http://lineofire.geekstogo.com/cwsserviceremove.zip


    Step 2
    Download this tool called AboutBuster http://www.downloads.subratam.org/AboutBuster.zip
    Unzip it to your desktop but don't run it yet.


    Step 3
    Download Adaware SE Personal from http://www.lavasoft.de/english/default.shtml. Install and open Adaware and click on *Check for Updates Now* and then *Connect*. It will find a new reference-file. Click *ok* and let it download and install the updates by clicking on *Finish* .This will return you to the main screen. Exit Adaware.


    Step 4
    Print out these instructions so you have them handy as most of the steps need to be done in safe mode and you may not be able to go online.


    Step 5
    Make sure your PC is configured to show hidden files.
    Open Windows Explorer & Go to Tools > Folder Options. Click on the View tab and make sure that "Show hidden files and folders" is checked. Also uncheck "Hide protected operating system files" and untick "hide extensions for known file types" . Now click "Apply to all folders"
    Click "Apply" then "OK"


    Step 6
    Next, go to Start->Run and type "Services.msc" (without quotes) then hit Ok

    Scroll down and find the service called Network Security Service. When you find it, double-click on it. In the next window that opens, click the Stop button, then click on properties and under the General Tab, change the Startup Type to Disabled. Now hit Apply and then Ok and close any open windows.


    Step 7
    Reboot to Safe Mode
    Restart your computer and as soon as it starts booting up again continuously tap F8. A menu should come up where you will be given the option to enter Safe Mode. To get back to normal mode just restart the computer as you normally would.


    Step 8
    Scan with Hijack This and put checks next to all the following, then click "Fix Checked"


    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\odxyp.dll/sp.html#12345
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\odxyp.dll/sp.html#12345
    R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\odxyp.dll/sp.html#12345
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\odxyp.dll/sp.html#12345
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer
    R3 - Default URLSearchHook is missing
    O2 - BHO: (no name) - {2E2C234F-D7D0-9340-5DF8-E4C8C742A8DF} - C:\WINDOWS\mskj.dll
    O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O23 - Service: Network Security Service ( 11Fßä#·ºÄÖ`I) - Unknown owner - C:\WINDOWS\system32\javaoy.exe (file missing)


    and delete the following files if present(do not be concerned if some do not exist).


    C:\WINDOWS\mskj.dll
    C:\WINDOWS\odxyp.dll
    C:\WINDOWS\system32\javaoy.exe





    Step 9
    Double click AboutBuster.exe that you downloaded earlier. Click OK, click Start, then click OK. This will scan your computer for the bad files and delete them. Save the report(copy and paste into notepad or wordpad and save as a .txt file) and post a copy back here when you are done with all the steps.


    Step 10
    Scan with Adaware and let it remove any bad files found.


    Step 11
    Clean out temporary and TIF files. Go to Start > Run and type in the box: cleanmgr. Let it scan your system for files to remove. Make sure these 3 are checked and then press *ok* to remove:

    Temporary Files
    Temporary Internet Files
    Recycle Bin


    Step 12
    Find the cwsserviceremove.reg that you downloaded in Step one. Double click on the cwsserviceemove.reg Answer ‘Yes’ when asked to have its contents added to the Registry.


    Step 13
    Reboot to normal mode, scan again with Hijack This and post a new log here.


    Step 14
    Finally, do an online scan at one of the following sites. Let it remove any infected files found.
    http://housecall.antivirus.com
    or
    http://www.pandasoftware.com/activescan/com/activescan_principal.htm


    Post a fresh HijackThis log and the AboutBuster report back here please.
  • edited April 2005
    Here is the Hijack This log:

    C:\Program Files\eBlocs\SpyBlocs\GLF343.exe
    C:\Program Files\Spyware Doctor\swdoctor.exe
    C:\Program Files\Common Files\Microsoft Shared\Works Shared\wkcalrem.exe
    C:\Documents and Settings\Kurt\Desktop\LimeWire\LimeWire.exe
    C:\WINDOWS\System32\wuauclt.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\WINDOWS\System32\cleanmgr.exe
    C:\Documents and Settings\Kurt\Desktop\hijackthis_199\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\pbclk.dll/sp.html#12345
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\pbclk.dll/sp.html#12345
    R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system32\yyxee.dll/sp.html#12345
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer
    R3 - Default URLSearchHook is missing
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {5AEB849D-4598-A41E-DA9D-53D02A7363DF} - C:\WINDOWS\system32\syszf.dll
    O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~2\tools\iesdsg.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
    O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\PROGRA~1\SPYWAR~2\tools\iesdpb.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
    O4 - HKLM\..\Run: [RoxioEngineUtility] "C:\Program Files\Common Files\Roxio Shared\System\EngUtil.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [WorksFUD] C:\Program Files\Microsoft Works\wkfud.exe
    O4 - HKLM\..\Run: [Microsoft Works Portfolio] C:\Program Files\Microsoft Works\WksSb.exe /AllUsers
    O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
    O4 - HKLM\..\Run: [AtiPTA] atiptaxx.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_06\bin\jusched.exe
    O4 - HKLM\..\Run: [iTunesHelper] C:\Program Files\iTunes\iTunesHelper.exe
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
    O4 - HKLM\..\Run: [AVG7_EMC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    O4 - HKLM\..\Run: [Error Nuker] C:\Program Files\Error Nuker\bin\ErrorNuker.exe autostart
    O4 - HKLM\..\Run: [netkf32.exe] C:\WINDOWS\system32\netkf32.exe
    O4 - HKCU\..\Run: [SpyBlocs] C:\Program Files\eBlocs\SpyBlocs\GLF343.exe
    O4 - HKCU\..\Run: [Spyware Doctor] "C:\Program Files\Spyware Doctor\swdoctor.exe" /Q
    O4 - Startup: LimeWire On Startup.lnk = C:\Documents and Settings\Kurt\Desktop\LimeWire\LimeWire.exe
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O4 - Global Startup: Microsoft Works Calendar Reminders.lnk = ?
    O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
    O8 - Extra context menu item: Backward &Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
    O8 - Extra context menu item: Cac&hed Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
    O8 - Extra context menu item: Si&milar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
    O8 - Extra context menu item: Translate into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_06\bin\npjpi142_06.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_06\bin\npjpi142_06.dll
    O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~2\tools\iesdpb.dll
    O16 - DPF: {14B87622-7E19-4EA8-93B3-97215F77A6BC} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab30149.cab
    O16 - DPF: {2917297F-F02B-4B9D-81DF-494B6333150B} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab31267.cab
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.com/v5consumer/V5Controls/en/x86/client/wuweb_site.cab?1093135813508
    O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
    O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
    O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/binFramework/v10/ZIntro.cab32846.cab
    O16 - DPF: {BD393C14-72AD-4790-A095-76522973D6B8} (CBreakshotControl Class) - http://messenger.zone.msn.com/binary/Bankshot.cab31267.cab
    O16 - DPF: {DA758BB1-5F89-4465-975F-8D7179A4BCF3} (WheelofFortune Object) - http://messenger.zone.msn.com/binary/WoF.cab31267.cab
    O16 - DPF: {E5D419D6-A846-4514-9FAD-97E826C84822} (HeartbeatCtl Class) - http://fdl.msn.com/zone/datafiles/heartbeat.cab
    O16 - DPF: {F58E1CEF-A068-4C15-BA5E-587CAF3EE8C6} (MSN Chat Control 4.5) - http://chat.msn.com/bin/msnchat45.cab
    O16 - DPF: {F6BF0D00-0B2A-4A75-BF7B-F385591623AF} (Solitaire Showdown Class) - http://messenger.zone.msn.com/binary/SolitaireShowdown.cab31267.cab
    O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: PPPoE Service (PPPoEService) - Unknown owner - C:\PROGRA~1\EFFICI~1\ENTERN~1\app\pppoeservice.exe

    And the About Buster Log:

    Scanned at: 9:19:26 PM on: 4/14/2005


    -- Scan 1
    About:Buster Version 4.0
    Reference List : 26

    No ADS found on system
    Attempted Clean Of Temp folder.
    Removed Uninstall Key (HSA)
    Removed Uninstall Key (SE)
    Removed Uninstall Key (SW)
    Pages Reset... Done!

    -- Scan 2
    About:Buster Version 4.0
    Reference List : 26

    No ADS found on system
    Attempted Clean Of Temp folder.
    Removed Uninstall Key (HSA)
    Removed Uninstall Key (SE)
    Removed Uninstall Key (SW)
    Pages Reset... Done!

    -- Scan 3
    About:Buster Version 4.0
    Reference List : 26

    No ADS found on system
    Attempted Clean Of Temp folder.
    Removed Uninstall Key (HSA)
    Removed Uninstall Key (SE)
    Removed Uninstall Key (SW)
    Pages Reset... Done!

    And here is the Panda Scan Log:

    Incident Status Location

    Adware:Adware/SearchAid No disinfected C:\WINDOWS\system32\syszf.dll
    Adware:Adware/SaveNow No disinfected Windows Registry
    Spyware:Spyware/Petro-Line No disinfected C:\Documents and Settings\Kurt\Favorites\Sites about\Ab scissor.url
    Adware:Adware/CWS.Aboutblank No disinfected Windows Registry
    Adware:Adware/SearchAid No disinfected C:\Documents and Settings\Kurt\Desktop\hijackthis_199\backups\backup-20050414-183155-545.dll
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\2PMJS2AK\Propagandhi%20pictures[2].htm
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\CZVNY4P5\prompt[10].php
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\CZVNY4P5\prompt[11].php
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\CZVNY4P5\prompt[12].php
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\CZVNY4P5\prompt[13].php
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\CZVNY4P5\prompt[14].php
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\CZVNY4P5\prompt[15].php
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\CZVNY4P5\prompt[16].php
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\CZVNY4P5\prompt[17].php
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\CZVNY4P5\prompt[18].php
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\CZVNY4P5\prompt[1].php
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\CZVNY4P5\prompt[2].php
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\CZVNY4P5\prompt[3].php
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\CZVNY4P5\prompt[4].php
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\CZVNY4P5\prompt[5].php
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\CZVNY4P5\prompt[6].php
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\CZVNY4P5\prompt[7].php
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\CZVNY4P5\prompt[8].php
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\CZVNY4P5\prompt[9].php
    Virus:Exploit/Mhtredir.gen Disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\F8SRT1GP\CA2JOD2D.HTM
    Virus:Exploit/Mhtredir.gen Disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\F8SRT1GP\CAAVSHMB.HTM
    Adware:Adware/XPlugin No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\F8SRT1GP\e9xr2[1].chm
    Spyware:Spyware/Iehelp No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\F8SRT1GP\help[1].chm[ipreg32.cab][ipreg32.inf]
    Spyware:Spyware/Iehelp No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\F8SRT1GP\help[1].chm[ipreg32.cab][ipreg32.dll]
    Spyware:Spyware/Iehelp No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\F8SRT1GP\help[2].chm[ipreg32.cab][ipreg32.inf]
    Spyware:Spyware/Iehelp No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\F8SRT1GP\help[2].chm[ipreg32.cab][ipreg32.dll]
    Virus:Exploit/LoadImage Disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\F8SRT1GP\ifect[1].anr
    Spyware:Spyware/Iehelp No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\F8SRT1GP\ipreg32[2].cab
    Spyware:Spyware/Iehelp No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\F8SRT1GP\ipreg32[2].cab[ipreg32.inf]
    Virus:Trj/Downloader.BWD Disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\F8SRT1GP\start[1].exe
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\LK6H0CGC\prompt[1].php
    Adware:Adware/WUpd No disinfected C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\LK6H0CGC\prompt[2].php
    Virus:Trj/Downloader.BWD Disinfected C:\ml00!.exe
    Adware:Adware/SearchAid No disinfected C:\WINDOWS\apphj32.dll
    Adware:Adware/SearchAid No disinfected C:\WINDOWS\ipda32.dll
    Adware:Adware/SearchAid No disinfected C:\WINDOWS\syssl32.dll
    Adware:Adware/SearchAid No disinfected C:\WINDOWS\system32\addvy32.dll
    Adware:Adware/SearchAid No disinfected C:\WINDOWS\system32\d3wu32.dll
    Adware:Adware/SearchAid No disinfected C:\WINDOWS\system32\javage.dll
    Adware:Adware/SearchAid No disinfected C:\WINDOWS\system32\syszf.dll


    *After I ran through all the steps you gave me, both viruses and/or spyware still remained on the system. The viruses seem to be named "Startpage"
    and "Downloader.Agent". I ran a couple test with that panda scan, it found problems, but seemed like it did not remove them.
  • Buckeye_SamBuckeye_Sam Columbus, Ohio
    edited April 2005
    It is important that you perform this fix as soon as possible. Every time you reboot your computer or use IE the filenames may change. The longer you wait, the less likely it is to work.

    Please download CWShredder but don't run it yet.
    http://cwshredder.net/bin/CWSInstall.exe


    Download Ad-aware SE from: http://www.majorgeeks.com/download506.html

    Install the program and launch it. First, in the main window, look in the bottom right corner and click on Check for updates now and download the latest reference files. Exit Adaware for now.


    Make sure that you can view all hidden files. Instructions on how to do this can be found here:

    How to see hidden files in Windows

    Run Hijackthis again, click scan, and Put a checkmark next to each of these. Then close all other windows--you should only see HijackThis on your Desktop--and click the Fix Checked button.

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\pbclk.dll/sp.html#12345
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\pbclk.dll/sp.html#12345
    R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system32\yyxee.dll/sp.html#12345
    R3 - Default URLSearchHook is missing
    O2 - BHO: (no name) - {5AEB849D-4598-A41E-DA9D-53D02A7363DF} - C:\WINDOWS\system32\syszf.dll
    O4 - HKLM\..\Run: [netkf32.exe] C:\WINDOWS\system32\netkf32.exe


    Reboot your computer into Safe Mode


    Now run CWShredder, making sure to click "Fix".


    Then delete these files or directories (Do not be concerned if they do not exist)

    C:\WINDOWS\system32\netkf32.exe
    C:\WINDOWS\system32\syszf.dll
    C:\WINDOWS\pbclk.dll


    Run a full scan with Adaware.

    Reboot your computer to go back to normal mode and post a new log.
  • edited April 2005
    Here's the About Buster log:

    Scanned at: 1:28:18 AM on: 4/16/2005


    -- Scan 1
    About:Buster Version 4.0
    Reference List : 26

    No ADS found on system
    Removed! : C:\WINDOWS\arqyl.dat
    Attempted Clean Of Temp folder.
    Pages Reset... Done!

    -- Scan 2
    About:Buster Version 4.0
    Reference List : 26

    No ADS found on system
    Attempted Clean Of Temp folder.
    Pages Reset... Done!

    Here's the Hijack This Log:

    Logfile of HijackThis v1.99.1
    Scan saved at 1:21:59 AM, on 4/16/2005
    Platform: Windows XP (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 (6.00.2600.0000)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
    C:\WINDOWS\System32\atiptaxx.exe
    C:\Program Files\Java\j2re1.4.2_06\bin\jusched.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
    C:\WINDOWS\System32\devldr32.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    C:\Program Files\eBlocs\SpyBlocs\GLF343.exe
    C:\Program Files\Spyware Doctor\swdoctor.exe
    C:\Program Files\Common Files\Microsoft Shared\Works Shared\wkcalrem.exe
    C:\Documents and Settings\Kurt\Desktop\LimeWire\LimeWire.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    C:\PROGRA~1\EFFICI~1\ENTERN~1\app\pppoeservice.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\wuauclt.exe
    C:\Documents and Settings\Kurt\Desktop\hijackthis_199\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.msn.ca/
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~2\tools\iesdsg.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
    O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\PROGRA~1\SPYWAR~2\tools\iesdpb.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
    O4 - HKLM\..\Run: [RoxioEngineUtility] "C:\Program Files\Common Files\Roxio Shared\System\EngUtil.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [WorksFUD] C:\Program Files\Microsoft Works\wkfud.exe
    O4 - HKLM\..\Run: [Microsoft Works Portfolio] C:\Program Files\Microsoft Works\WksSb.exe /AllUsers
    O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
    O4 - HKLM\..\Run: [AtiPTA] atiptaxx.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_06\bin\jusched.exe
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
    O4 - HKLM\..\Run: [AVG7_EMC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    O4 - HKCU\..\Run: [SpyBlocs] C:\Program Files\eBlocs\SpyBlocs\GLF343.exe
    O4 - HKCU\..\Run: [Spyware Doctor] "C:\Program Files\Spyware Doctor\swdoctor.exe" /Q
    O4 - Startup: LimeWire On Startup.lnk = C:\Documents and Settings\Kurt\Desktop\LimeWire\LimeWire.exe
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O4 - Global Startup: Microsoft Works Calendar Reminders.lnk = ?
    O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
    O8 - Extra context menu item: Backward &Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
    O8 - Extra context menu item: Cac&hed Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
    O8 - Extra context menu item: Si&milar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
    O8 - Extra context menu item: Translate into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_06\bin\npjpi142_06.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_06\bin\npjpi142_06.dll
    O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~2\tools\iesdpb.dll
    O16 - DPF: {14B87622-7E19-4EA8-93B3-97215F77A6BC} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab30149.cab
    O16 - DPF: {2917297F-F02B-4B9D-81DF-494B6333150B} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab31267.cab
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.com/v5consumer/V5Controls/en/x86/client/wuweb_site.cab?1093135813508
    O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004061001/housecall.trendmicro.com/housecall/xscan53.cab
    O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
    O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.com/activescan/as5/asinst.cab
    O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
    O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/binFramework/v10/ZIntro.cab32846.cab
    O16 - DPF: {BD393C14-72AD-4790-A095-76522973D6B8} (CBreakshotControl Class) - http://messenger.zone.msn.com/binary/Bankshot.cab31267.cab
    O16 - DPF: {DA758BB1-5F89-4465-975F-8D7179A4BCF3} (WheelofFortune Object) - http://messenger.zone.msn.com/binary/WoF.cab31267.cab
    O16 - DPF: {E5D419D6-A846-4514-9FAD-97E826C84822} (HeartbeatCtl Class) - http://fdl.msn.com/zone/datafiles/heartbeat.cab
    O16 - DPF: {F58E1CEF-A068-4C15-BA5E-587CAF3EE8C6} (MSN Chat Control 4.5) - http://chat.msn.com/bin/msnchat45.cab
    O16 - DPF: {F6BF0D00-0B2A-4A75-BF7B-F385591623AF} (Solitaire Showdown Class) - http://messenger.zone.msn.com/binary/SolitaireShowdown.cab31267.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{F118DE87-6FA9-467C-B882-26E0D31C87C5}: NameServer = 142.161.130.155 142.161.2.155
    O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: PPPoE Service (PPPoEService) - Unknown owner - C:\PROGRA~1\EFFICI~1\ENTERN~1\app\pppoeservice.exe

    Here's the Ad-Aware Log:


    Ad-Aware SE Build 1.05
    Logfile Created on:Saturday, April 16, 2005 1:04:11 AM
    Created with Ad-Aware SE Personal, free for private use.
    Using definitions file:SE1R39 15.04.2005
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

    References detected during the scan:
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
    MRU List(TAC index:0):35 total references
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

    Ad-Aware SE Settings
    ===========================
    Set : Search for negligible risk entries
    Set : Safe mode (always request confirmation)
    Set : Scan active processes
    Set : Scan registry
    Set : Deep-scan registry
    Set : Scan my IE Favorites for banned URLs
    Set : Scan my Hosts file

    Extended Ad-Aware SE Settings
    ===========================
    Set : Unload recognized processes & modules during scan
    Set : Scan registry for all users instead of current user only
    Set : Always try to unload modules before deletion
    Set : During removal, unload Explorer and IE if necessary
    Set : Let Windows remove files in use at next reboot
    Set : Delete quarantined objects after restoring
    Set : Include basic Ad-Aware settings in log file
    Set : Include additional Ad-Aware settings in log file
    Set : Include reference summary in log file
    Set : Include alternate data stream details in log file
    Set : Play sound at scan completion if scan locates critical objects


    4/16/2005 1:04:11 AM - Scan started. (Full System Scan)

    MRU List Object Recognized!
    Location: : C:\Documents and Settings\Kurt\Application Data\microsoft\office\recent
    Description : list of recently opened documents using microsoft office


    MRU List Object Recognized!
    Location: : C:\Documents and Settings\Kurt\recent
    Description : list of recently opened documents


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\windows\currentversion\applets\wordpad\recent file list
    Description : list of recent files opened using wordpad



    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\windows\currentversion\applets\paint\recent file list
    Description : list of files recently opened using microsoft paint


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\search assistant\acmru
    Description : list of recent search terms used with the search assistant


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\windows\currentversion\explorer\comdlg32\opensavemru
    Description : list of recently saved files, stored according to file extension


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\windows\currentversion\explorer\comdlg32\lastvisitedmru
    Description : list of recent programs opened


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\windows\currentversion\explorer\recentdocs
    Description : list of recent documents opened


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\office\10.0\common\open find\microsoft word\settings\save as\file name mru
    Description : list of recent documents saved by microsoft word


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\mediaplayer\player\recentfilelist
    Description : list of recently used files in microsoft windows media player


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\internet explorer
    Description : last download directory used in microsoft internet explorer


    MRU List Object Recognized!
    Location: : software\microsoft\directdraw\mostrecentapplication
    Description : most recent application to use microsoft directdraw


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\microsoft management console\recent file list
    Description : list of recent snap-ins used in the microsoft management console


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\mediaplayer\player\settings
    Description : last save as directory used in jasc paint shop pro


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\google\navclient\1.1\history
    Description : list of recently used search terms in the google toolbar


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\mediaplayer\preferences
    Description : last cd record path used in microsoft windows media player


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\directinput\mostrecentapplication
    Description : most recent application to use microsoft directinput


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\mediaplayer\player\settings
    Description : last open directory used in jasc paint shop pro


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\direct3d\mostrecentapplication
    Description : most recent application to use microsoft direct3d


    MRU List Object Recognized!
    Location: : software\microsoft\direct3d\mostrecentapplication
    Description : most recent application to use microsoft direct3d


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\mediaplayer\preferences
    Description : last playlist index loaded in microsoft windows media player


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\windows\currentversion\applets\regedit
    Description : last key accessed using the microsoft registry editor


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\directinput\mostrecentapplication
    Description : most recent application to use microsoft directinput


    MRU List Object Recognized!
    Location: : .DEFAULT\software\microsoft\mediaplayer\preferences
    Description : last playlist loaded in microsoft windows media player


    MRU List Object Recognized!
    Location: : S-1-5-18\software\microsoft\mediaplayer\preferences
    Description : last playlist loaded in microsoft windows media player


    MRU List Object Recognized!
    Location: : S-1-5-19\software\microsoft\mediaplayer\preferences
    Description : last playlist loaded in microsoft windows media player


    MRU List Object Recognized!
    Location: : S-1-5-20\software\microsoft\mediaplayer\preferences
    Description : last playlist loaded in microsoft windows media player


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\mediaplayer\preferences
    Description : last playlist loaded in microsoft windows media player


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\mediaplayer\preferences
    Description : last search path used in microsoft windows media player


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\mediaplayer\medialibraryui
    Description : last selected node in the microsoft windows media player media library


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\direct3d\mostrecentapplication
    Description : most recent application to use microsoft direct X


    MRU List Object Recognized!
    Location: : software\microsoft\direct3d\mostrecentapplication
    Description : most recent application to use microsoft direct X


    MRU List Object Recognized!
    Location: : .DEFAULT\software\microsoft\windows media\wmsdk\general
    Description : windows media sdk


    MRU List Object Recognized!
    Location: : S-1-5-18\software\microsoft\windows media\wmsdk\general
    Description : windows media sdk


    MRU List Object Recognized!
    Location: : S-1-5-21-796845957-484763869-1343024091-1006\software\microsoft\windows media\wmsdk\general
    Description : windows media sdk


    Listing running processes
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

    #:1 [smss.exe]
    FilePath : \SystemRoot\System32\
    ProcessID : 548
    ThreadCreationTime : 4/16/2005 5:05:28 AM
    BasePriority : Normal


    #:2 [csrss.exe]
    FilePath : \??\C:\WINDOWS\system32\
    ProcessID : 612
    ThreadCreationTime : 4/16/2005 5:05:29 AM
    BasePriority : Normal


    #:3 [winlogon.exe]
    FilePath : \??\C:\WINDOWS\system32\
    ProcessID : 636
    ThreadCreationTime : 4/16/2005 5:05:32 AM
    BasePriority : High


    #:4 [services.exe]
    FilePath : C:\WINDOWS\system32\
    ProcessID : 680
    ThreadCreationTime : 4/16/2005 5:05:32 AM
    BasePriority : Normal
    FileVersion : 5.1.2600.0 (xpclient.010817-1148)
    ProductVersion : 5.1.2600.0
    ProductName : Microsoft® Windows® Operating System
    CompanyName : Microsoft Corporation
    FileDescription : Services and Controller app
    InternalName : services.exe
    LegalCopyright : © Microsoft Corporation. All rights reserved.
    OriginalFilename : services.exe

    #:5 [lsass.exe]
    FilePath : C:\WINDOWS\system32\
    ProcessID : 692
    ThreadCreationTime : 4/16/2005 5:05:32 AM
    BasePriority : Normal
    FileVersion : 5.1.2600.0 (xpclient.010817-1148)
    ProductVersion : 5.1.2600.0
    ProductName : Microsoft® Windows® Operating System
    CompanyName : Microsoft Corporation
    FileDescription : LSA Shell (Export Version)
    InternalName : lsass.exe
    LegalCopyright : © Microsoft Corporation. All rights reserved.
    OriginalFilename : lsass.exe

    #:6 [svchost.exe]
    FilePath : C:\WINDOWS\system32\
    ProcessID : 844
    ThreadCreationTime : 4/16/2005 5:05:33 AM
    BasePriority : Normal
    FileVersion : 5.1.2600.0 (xpclient.010817-1148)
    ProductVersion : 5.1.2600.0
    ProductName : Microsoft® Windows® Operating System
    CompanyName : Microsoft Corporation
    FileDescription : Generic Host Process for Win32 Services
    InternalName : svchost.exe
    LegalCopyright : © Microsoft Corporation. All rights reserved.
    OriginalFilename : svchost.exe

    #:7 [svchost.exe]
    FilePath : C:\WINDOWS\system32\
    ProcessID : 960
    ThreadCreationTime : 4/16/2005 5:06:55 AM
    BasePriority : Normal
    FileVersion : 5.1.2600.0 (xpclient.010817-1148)
    ProductVersion : 5.1.2600.0
    ProductName : Microsoft® Windows® Operating System
    CompanyName : Microsoft Corporation
    FileDescription : Generic Host Process for Win32 Services
    InternalName : svchost.exe
    LegalCopyright : © Microsoft Corporation. All rights reserved.
    OriginalFilename : svchost.exe

    #:8 [svchost.exe]
    FilePath : C:\WINDOWS\System32\
    ProcessID : 1068
    ThreadCreationTime : 4/16/2005 5:06:55 AM
    BasePriority : Normal
    FileVersion : 5.1.2600.0 (xpclient.010817-1148)
    ProductVersion : 5.1.2600.0
    ProductName : Microsoft® Windows® Operating System
    CompanyName : Microsoft Corporation
    FileDescription : Generic Host Process for Win32 Services
    InternalName : svchost.exe
    LegalCopyright : © Microsoft Corporation. All rights reserved.
    OriginalFilename : svchost.exe

    #:9 [svchost.exe]
    FilePath : C:\WINDOWS\System32\
    ProcessID : 1232
    ThreadCreationTime : 4/16/2005 5:06:57 AM
    BasePriority : Normal
    FileVersion : 5.1.2600.0 (xpclient.010817-1148)
    ProductVersion : 5.1.2600.0
    ProductName : Microsoft® Windows® Operating System
    CompanyName : Microsoft Corporation
    FileDescription : Generic Host Process for Win32 Services
    InternalName : svchost.exe
    LegalCopyright : © Microsoft Corporation. All rights reserved.
    OriginalFilename : svchost.exe

    #:10 [svchost.exe]
    FilePath : C:\WINDOWS\System32\
    ProcessID : 1244
    ThreadCreationTime : 4/16/2005 5:06:58 AM
    BasePriority : Normal
    FileVersion : 5.1.2600.0 (xpclient.010817-1148)
    ProductVersion : 5.1.2600.0
    ProductName : Microsoft® Windows® Operating System
    CompanyName : Microsoft Corporation
    FileDescription : Generic Host Process for Win32 Services
    InternalName : svchost.exe
    LegalCopyright : © Microsoft Corporation. All rights reserved.
    OriginalFilename : svchost.exe

    #:11 [spoolsv.exe]
    FilePath : C:\WINDOWS\system32\
    ProcessID : 1368
    ThreadCreationTime : 4/16/2005 5:06:58 AM
    BasePriority : Normal
    FileVersion : 5.1.2600.0 (XPClient.010817-1148)
    ProductVersion : 5.1.2600.0
    ProductName : Microsoft® Windows® Operating System
    CompanyName : Microsoft Corporation
    FileDescription : Spooler SubSystem App
    InternalName : spoolsv.exe
    LegalCopyright : © Microsoft Corporation. All rights reserved.
    OriginalFilename : spoolsv.exe

    #:12 [explorer.exe]
    FilePath : C:\WINDOWS\
    ProcessID : 1604
    ThreadCreationTime : 4/16/2005 5:07:03 AM
    BasePriority : Normal
    FileVersion : 6.00.2600.0000 (xpclient.010817-1148)
    ProductVersion : 6.00.2600.0000
    ProductName : Microsoft® Windows® Operating System
    CompanyName : Microsoft Corporation
    FileDescription : Windows Explorer
    InternalName : explorer
    LegalCopyright : © Microsoft Corporation. All rights reserved.
    OriginalFilename : EXPLORER.EXE

    #:13 [qttask.exe]
    FilePath : C:\Program Files\QuickTime\
    ProcessID : 2028
    ThreadCreationTime : 4/16/2005 5:07:08 AM
    BasePriority : Normal
    FileVersion : 6.5.1
    ProductVersion : QuickTime 6.5.1
    ProductName : QuickTime
    CompanyName : Apple Computer, Inc.
    InternalName : QuickTime Task
    LegalCopyright : © Apple Computer, Inc. 2001-2004
    OriginalFilename : QTTask.exe

    #:14 [wkufind.exe]
    FilePath : C:\Program Files\Common Files\Microsoft Shared\Works Shared\
    ProcessID : 156
    ThreadCreationTime : 4/16/2005 5:07:09 AM
    BasePriority : Normal
    FileVersion : 6.00.3215.0
    ProductVersion : 6.00.3215.0
    ProductName : Microsoft® Works 6.0
    CompanyName : Microsoft® Corporation
    FileDescription : Microsoft® Works Update Detection
    InternalName : WkUFind
    LegalCopyright : Copyright © Microsoft Corporation 1987-2001. All rights reserved.
    OriginalFilename : WkUFind.exe

    #:15 [atiptaxx.exe]
    FilePath : C:\WINDOWS\System32\
    ProcessID : 176
    ThreadCreationTime : 4/16/2005 5:07:09 AM
    BasePriority : Normal
    FileVersion : 6.13.2519
    ProductVersion : 6.13.2519
    ProductName : ATI Desktop Component
    CompanyName : ATI Technologies, Inc.
    FileDescription : ATI Desktop Control Panel
    InternalName : Atiptaxx.exe
    LegalCopyright : Copyright (C) 1998-2001 ATI Technologies Inc.
    OriginalFilename : Atiptaxx.exe

    #:16 [jusched.exe]
    FilePath : C:\Program Files\Java\j2re1.4.2_06\bin\
    ProcessID : 208
    ThreadCreationTime : 4/16/2005 5:07:12 AM
    BasePriority : Normal


    #:17 [avgcc.exe]
    FilePath : C:\PROGRA~1\Grisoft\AVGFRE~1\
    ProcessID : 216
    ThreadCreationTime : 4/16/2005 5:07:13 AM
    BasePriority : Normal
    FileVersion : 7,1,0,307
    ProductVersion : 7.1.0.307
    ProductName : AVG Anti-Virus System
    CompanyName : GRISOFT, s.r.o.
    FileDescription : AVG Control Center
    InternalName : AvgCC
    LegalCopyright : Copyright © 2005, GRISOFT, s.r.o.
    OriginalFilename : AvgCC.EXE

    #:18 [devldr32.exe]
    FilePath : C:\WINDOWS\System32\
    ProcessID : 224
    ThreadCreationTime : 4/16/2005 5:07:13 AM
    BasePriority : Normal
    FileVersion : 1, 0, 0, 17
    ProductVersion : 1, 0, 0, 17
    ProductName : Creative Ring3 NT Inteface
    CompanyName : Creative Technology Ltd.
    FileDescription : DevLdr32
    InternalName : DevLdr
    LegalCopyright : Copyright (C) Creative Technology Ltd. 1998-2001
    OriginalFilename : DevLdr32.exe

    #:19 [avgemc.exe]
    FilePath : C:\PROGRA~1\Grisoft\AVGFRE~1\
    ProcessID : 256
    ThreadCreationTime : 4/16/2005 5:07:13 AM
    BasePriority : Normal
    FileVersion : 7,1,0,307
    ProductVersion : 7.1.0.307
    ProductName : AVG Anti-Virus System
    CompanyName : GRISOFT, s.r.o.
    FileDescription : AVG E-Mail Scanner
    InternalName : avgemc
    LegalCopyright : Copyright © 2005, GRISOFT, s.r.o.
    OriginalFilename : avgemc.exe

    #:20 [glf343.exe]
    FilePath : C:\Program Files\eBlocs\SpyBlocs\
    ProcessID : 264
    ThreadCreationTime : 4/16/2005 5:07:14 AM
    BasePriority : Normal
    FileVersion : 6, 40, 6, 0
    ProductVersion : 6, 40, 6, 0
    ProductName : SpyBlocs Application
    CompanyName : www.eblocs.com
    FileDescription : SpyBlocs MFC Application
    InternalName : SpyBlocs
    LegalCopyright : Copyright (C) 2005, www.eblocs.com
    OriginalFilename : SpyBlocs.EXE

    #:21 [swdoctor.exe]
    FilePath : C:\Program Files\Spyware Doctor\
    ProcessID : 272
    ThreadCreationTime : 4/16/2005 5:07:15 AM
    BasePriority : Normal
    FileVersion : 3.2.0.342
    ProductVersion : 3.1
    ProductName : Spyware Doctor
    CompanyName : PCTools
    FileDescription : Spyware Doctor
    InternalName : Spyware Doctor
    LegalCopyright : Copyright (c) 2004. Distributed by PC Tools Pty Ltd
    OriginalFilename : swdr.exe

    #:22 [wkcalrem.exe]
    FilePath : C:\Program Files\Common Files\Microsoft Shared\Works Shared\
    ProcessID : 300
    ThreadCreationTime : 4/16/2005 5:07:19 AM
    BasePriority : Normal
    FileVersion : 6.00.1911.0
    ProductVersion : 6.00.1911.0
    ProductName : Microsoft® Works 6.0
    CompanyName : Microsoft® Corporation
    FileDescription : Microsoft® Works Calendar Reminder Service
    InternalName : WkCalRem
    LegalCopyright : Copyright © Microsoft Corporation 1987-2000. All rights reserved.
    OriginalFilename : WKCALREM.EXE

    #:23 [limewire.exe]
    FilePath : C:\Documents and Settings\Kurt\Desktop\LimeWire\
    ProcessID : 388
    ThreadCreationTime : 4/16/2005 5:07:21 AM
    BasePriority : Normal
    FileVersion : 1, 0, 0, 2
    ProductVersion : 1, 0, 0, 2
    ProductName : LimeWire
    CompanyName : Lime Wire, LLC
    FileDescription : LimeWire
    InternalName : LimeWire
    LegalCopyright : Copyright (C) 2004
    OriginalFilename : LimeWire.exe
    Comments : The most advanced file sharing program on the planet.

    #:24 [avgamsvr.exe]
    FilePath : C:\PROGRA~1\Grisoft\AVGFRE~1\
    ProcessID : 1172
    ThreadCreationTime : 4/16/2005 5:08:11 AM
    BasePriority : Normal
    FileVersion : 7,1,0,307
    ProductVersion : 7.1.0.307
    ProductName : AVG Anti-Virus System
    CompanyName : GRISOFT, s.r.o.
    FileDescription : AVG Alert Manager
    InternalName : avgamsvr
    LegalCopyright : Copyright © 2005, GRISOFT, s.r.o.
    OriginalFilename : avgamsvr.EXE

    #:25 [avgupsvc.exe]
    FilePath : C:\PROGRA~1\Grisoft\AVGFRE~1\
    ProcessID : 1184
    ThreadCreationTime : 4/16/2005 5:08:15 AM
    BasePriority : Normal
    FileVersion : 7,1,0,285
    ProductVersion : 7.1.0.285
    ProductName : AVG 7.0 Anti-Virus System
    CompanyName : GRISOFT, s.r.o.
    FileDescription : AVG Update Service
    InternalName : avgupsvc
    LegalCopyright : Copyright © 2004, GRISOFT, s.r.o.
    OriginalFilename : avgupdsvc.EXE

    #:26 [pppoeservice.exe]
    FilePath : C:\PROGRA~1\EFFICI~1\ENTERN~1\app\
    ProcessID : 1276
    ThreadCreationTime : 4/16/2005 5:08:16 AM
    BasePriority : Normal


    #:27 [svchost.exe]
    FilePath : C:\WINDOWS\System32\
    ProcessID : 1452
    ThreadCreationTime : 4/16/2005 5:08:18 AM
    BasePriority : Normal
    FileVersion : 5.1.2600.0 (xpclient.010817-1148)
    ProductVersion : 5.1.2600.0
    ProductName : Microsoft® Windows® Operating System
    CompanyName : Microsoft Corporation
    FileDescription : Generic Host Process for Win32 Services
    InternalName : svchost.exe
    LegalCopyright : © Microsoft Corporation. All rights reserved.
    OriginalFilename : svchost.exe

    #:28 [wuauclt.exe]
    FilePath : C:\WINDOWS\System32\
    ProcessID : 476
    ThreadCreationTime : 4/16/2005 5:10:07 AM
    BasePriority : Normal
    FileVersion : 5.4.3790.2182 built by: srv03_rtm(ntvbl04)
    ProductVersion : 5.4.3790.2182
    ProductName : Microsoft® Windows® Operating System
    CompanyName : Microsoft Corporation
    FileDescription : Automatic Updates
    InternalName : wuauclt.exe
    LegalCopyright : © Microsoft Corporation. All rights reserved.
    OriginalFilename : wuauclt.exe

    #:29 [ad-aware.exe]
    FilePath : C:\Program Files\Lavasoft\Ad-Aware SE Personal\
    ProcessID : 1784
    ThreadCreationTime : 4/16/2005 5:23:43 AM
    BasePriority : Normal
    FileVersion : 6.2.0.206
    ProductVersion : VI.Second Edition
    ProductName : Lavasoft Ad-Aware SE
    CompanyName : Lavasoft Sweden
    FileDescription : Ad-Aware SE Core application
    InternalName : Ad-Aware.exe
    LegalCopyright : Copyright © Lavasoft Sweden
    OriginalFilename : Ad-Aware.exe
    Comments : All Rights Reserved

    Memory scan result:
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
    New critical objects: 0
    Objects found so far: 35


    Started registry scan
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

    Registry Scan result:
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
    New critical objects: 0
    Objects found so far: 35


    Started deep registry scan
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

    Deep registry scan result:
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
    New critical objects: 0
    Objects found so far: 35


    Started Tracking Cookie scan
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»


    Tracking cookie scan result:
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
    New critical objects: 0
    Objects found so far: 35



    Deep scanning and examining files (C:)
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

    Disk Scan Result for C:\
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
    New critical objects: 0
    Objects found so far: 35


    Performing conditional scans...
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

    Conditional scan result:
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
    New critical objects: 0
    Objects found so far: 35

    1:18:26 AM Scan Complete

    Summary Of This Scan
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
    Total scanning time:00:14:14.859
    Objects scanned:124029
    Objects identified:0
    Objects ignored:0
    New critical objects:0


    *After I completed the steps you gave me once again, Internet Explorer seems to be working. I have not yet done an AVG or Panda scan, I will do both scans, and post again once they are done in a few hours.
  • Buckeye_SamBuckeye_Sam Columbus, Ohio
    edited April 2005
    Your log looks clean to me. I would manually delete any of these files that Panda id'd which are still on your system.

    C:\WINDOWS\apphj32.dll
    C:\WINDOWS\ipda32.dll
    C:\WINDOWS\syssl32.dll
    C:\WINDOWS\system32\addvy32.dll
    C:\WINDOWS\system32\d3wu32.dll
    C:\WINDOWS\system32\javage.dll
    C:\WINDOWS\system32\syszf.dll



    Next I would uninstall Spyblocs. It's considered a rogue/suspect program.


    OPTIONAL FIXES
    You can have Hijackthis fix these lines as well. None of these lines are malware, but just unnecessary programs that load up at startup and hog your computer's resources. This will make your computer load faster and run better, but if you notice something listed that you use often and want to load do not fix it with Hijackthis.

    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [WorksFUD] C:\Program Files\Microsoft Works\wkfud.exe
    O4 - HKLM\..\Run: [Microsoft Works Portfolio] C:\Program Files\Microsoft Works\WksSb.exe /AllUsers
    O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_06\bin\jusched.exe
    O4 - HKCU\..\Run: [SpyBlocs] C:\Program Files\eBlocs\SpyBlocs\GLF343.exe
    O4 - Startup: LimeWire On Startup.lnk = C:\Documents and Settings\Kurt\Desktop\LimeWire\LimeWire.exe
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O4 - Global Startup: Microsoft Works Calendar Reminders.lnk = ?
    O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present


    Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
    1. Disable and Enable System Restore. - If you are using Windows ME or XP then you should disable and reenable system restore to make sure there are no infected files found in a restore point left over from what we have just cleaned.

      You can find instructions on how to enable and reenable system restore here:

      Managing Windows Millenium System Restore

      or

      Windows XP System Restore Guide

      Renable system restore with instructions from tutorial above

    2. Make your Internet Explorer more secure - This can be done by following these simple instructions:
      1. From within Internet Explorer click on the Tools menu and then click on Options.
      2. Click once on the Security tab
      3. Click once on the Internet icon so it becomes highlighted.
      4. Click once on the Custom Level button.
        1. Change the Download signed ActiveX controls to Prompt
        2. Change the Download unsigned ActiveX controls to Disable
        3. Change the Initialize and script ActiveX controls not marked as safe to Disable
        4. Change the Installation of desktop items to Prompt
        5. Change the Launching programs and files in an IFRAME to Prompt
        6. Change the Navigate sub-frames across different domains to Prompt
        7. When all these settings have been made, click on the OK button.
        8. If it prompts you as to whether or not you want to save the settings, press the Yes button.
      5. Next press the Apply button and then the OK to exit the Internet Properties page.

    3. Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

      See this link for a listing of some online & their stand-alone antivirus programs:

      Virus, Spyware, and Malware Protection and Removal Resources

    4. Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

    5. Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

      For a tutorial on Firewalls and a listing of some available ones see the link below:

      Understanding and Using Firewalls

    6. Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

    7. Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

      A tutorial on installing & using this product can be found here:

      Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

    8. Install Ad-Aware - Install and download Ad-Aware. ou should also scan your computer with program on a regular basis just as you would an antivirus software in conjunction with Spybot.

      A tutorial on installing & using this product can be found here:

      Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer

    9. Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

      A tutorial on installing & using this product can be found here:

      Using SpywareBlaster to protect your computer from Spyware and Malware

    10. Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
    Follow this list and your potential for being infected again will reduce dramatically.
  • edited April 2005
    Everything seems to be running good...except there always seems to be a folder in favorites titled "links" in internet explorer, it doesnt seem to be doing anything, but its just annoying because it shouldn't be there.
  • Buckeye_SamBuckeye_Sam Columbus, Ohio
    edited April 2005
    Actually it should be there, by default. If you delete it, it will just come back. The trick is to make it invisible. Go here.

    C:\Documents and Settings\Kurt\Favorites

    Find the folder named "Links". Right click on it, select Properties, put a check mark next to Hidden.

    Now it will still be there, but you won't see it in your browser's Favorites.
  • edited April 2005
    I scanned with Panda and this is what came up:


    Incident Status Location

    Adware:Adware/SearchAid No disinfected C:\Documents and Settings\Kurt\Desktop\hijackthis_199\backups\backup-20050414-183155-545.dll
    Adware:Adware/SearchAid No disinfected C:\Documents and Settings\Kurt\Desktop\hijackthis_199\backups\backup-20050415-232026-423.dll
    Adware:Adware/SearchAid No disinfected C:\Documents and Settings\Kurt\Desktop\hijackthis_199\backups\backup-20050415-232125-371.dll
    Virus:VBS/Psyme.C Renamed C:\Documents and Settings\Kurt\Local Settings\Temporary Internet Files\Content.IE5\EHQBSHM3\EXPLOIT[1]_CHM.vir

    The first 3 are probabaly ok, but I'm not sure what this third one is. If it is renamed then how can I find it? Also, my monitor has been acting strangley(which was awhile ago) where when i turn on my computer it goes black, then have to keep shutting it off and on until it works. It cuts out with certain games, and I'm not sure if it is the monitor itself that's broken, or soemthing else thats caused the problem in the past. Thanks for the help by the way, it's greatly appreciated.
  • Buckeye_SamBuckeye_Sam Columbus, Ohio
    edited April 2005
    Please download, install, and run CCleaner.
    http://www.ccleaner.com/ccdownload.php

    It should clean out all of your temp files, including any malware.

    The issue with your monitor is probably not malware related. I would try reloading the driver for your monitor and graphics card.
  • edited April 2005
    How would I reload the driver?
  • Buckeye_SamBuckeye_Sam Columbus, Ohio
    edited April 2005
    Click Start -> Control Panel -> System. Click on the Hardware tab then click Device Manager. Look for a device with a yellow or red mark next to it, which would indicate a problem. If you don't see any yellow or red marks, just find Monitors and click on it until you can see your monitor listed. Now right click on it and select Properties. Now click the Driver tab and then the Update Driver button. If you have a disc that came with this monitor now would be the time to pop it in. Windows will search for an updated driver and hopefully reload it for you.

    If that doesn't work, you can try the same thing for Display Adapter.

    Good luck! :)
  • edited April 2005
    Well, thanks for all the help. It really helped me out a lot.
  • Buckeye_SamBuckeye_Sam Columbus, Ohio
    edited April 2005
    Glad to do it! :)
This discussion has been closed.