Specific911 and other problems

Hi,
Id like to have someone look at my HJTlog file to see what is wrong with my computer. My main problem is that a bunch of mozilla exporer windows pop up every time i start up my computer. Im pretty sure they are searching for this specific911 thing. If you guys could provide me with any info on this it would be greatly appreciated. Thank you very much.

HJT log:

Logfile of HijackThis v1.99.1
Scan saved at 6:22:17 PM, on 5/3/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\SYSTEM32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\AIM\aim.exe
C:\WINDOWS\system32\drivers\KodakCCS.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\HJT\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = www.google.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.bestbuy.msn.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.bestbuy.msn.com
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http=http://127.0.0.1:8080
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - Default URLSearchHook is missing
O4 - HKLM\..\Run: [*msvcdb] C:\WINDOWS\Config\msvcdb.exe
O4 - HKLM\..\Run: [*tcpmc] C:\WINDOWS\AppPatch\tcpmc.exe
O4 - HKLM\..\Run: [*syshard] C:\WINDOWS\msagent\chars\syshard.exe
O4 - HKLM\..\Run: [*hardbak] C:\WINDOWS\msagent\hardbak.exe
O4 - HKLM\..\Run: [*acrun] C:\WINDOWS\system32\DirectX\acrun.exe
O4 - HKLM\..\Run: [*mp3xml] C:\WINDOWS\java\mp3xml.exe
O4 - HKLM\..\Run: [*svcdvd] C:\WINDOWS\ServicePackFiles\svcdvd.exe
O4 - HKLM\..\Run: [*expwin] C:\WINDOWS\Cursors\expwin.exe
O4 - HKLM\..\Run: [*odbcnut] C:\WINDOWS\system\odbcnut.exe
O4 - HKLM\..\Run: [*tcplib] C:\WINDOWS\Config\tcplib.exe
O4 - HKLM\..\Run: [*msvcad] C:\WINDOWS\Config\msvcad.exe
O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\WINDOWS\System32\shdocvw.dll
O9 - Extra button: Corel Network monitor worker - {896DC91E-63B1-47A2-86E3-EE817401D8D8} - C:\WINDOWS\System32\intlmain.dll
O9 - Extra 'Tools' menuitem: Corel Network monitor worker - {896DC91E-63B1-47A2-86E3-EE817401D8D8} - C:\WINDOWS\System32\intlmain.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Corel Network monitor worker - {896DC91E-63B1-47A2-86E3-EE817401D8D8} - C:\WINDOWS\System32\intlmain.dll (HKCU)
O9 - Extra 'Tools' menuitem: Corel Network monitor worker - {896DC91E-63B1-47A2-86E3-EE817401D8D8} - C:\WINDOWS\System32\intlmain.dll (HKCU)
O14 - IERESET.INF: START_PAGE_URL=http://www.bestbuy.msn.com
O16 - DPF: Yahoo! Euchre - http://download.games.yahoo.com/games/clients/y/et1_x.cab
O16 - DPF: Yahoo! Pyramids - http://download.games.yahoo.com/games/clients/y/pyt1_x.cab
O16 - DPF: Yahoo! Towers 2.0 - http://download.games.yahoo.com/games/clients/y/ywt0_x.cab
O16 - DPF: {15AD6789-CDB4-47E1-A9DA-992EE8E6BAD6} - http://static.windupdates.com/cab/6247971CanadaInc/ie/bridge-c24.cab
O16 - DPF: {22A88341-AFCB-45F0-A856-C2BAE74F878E} - http://www.20x2p.com/8056ab0e/enter.cab
O16 - DPF: {41B23C28-488E-4E5C-ACE2-BB0BBABE99E8} (HHCtrl Object) - http://67.15.94.29/~popular/load/1495/hhctrl.ocx
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akamai.net/7/1540/52/20021205/qtinstall.info.apple.com/borris/us/win/QuickTimeInstaller.exe
O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} (RdxIE Class) - http://software-dl.real.com/274686ded72bbd882b18/netzip/RdxIE601.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.com/v5consumer/V5Controls/en/x86/client/wuweb_site.cab?1094650698828
O16 - DPF: {70BA88C8-DAE8-4CE9-92BB-979C4A75F53B} (GSDACtl Class) - http://launch.gamespyarcade.com/software/launch/alaunch.cab
O16 - DPF: {8C875948-9C60-4381-9248-0DF180542D53} (SbInstObj) - http://installs.spamblockerutility.com/installs/spamblockerutility/programs/spamblockerutility.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.com/activescan/as5/asinst.cab
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
O23 - Service: Intel(R) NMS (NMSSvc) - Intel Corporation - C:\WINDOWS\System32\NMSSvc.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe

Comments

  • Buckeye_SamBuckeye_Sam Columbus, Ohio
    edited May 2005
    Make sure that you can VIEW ALL HIDDEN FILES.

    Place a checkmark next to these entries, close all browsers and windows, and have HijackThis fix them by clicking Fix Checked:

    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    R3 - Default URLSearchHook is missing
    O4 - HKLM\..\Run: [*msvcdb] C:\WINDOWS\Config\msvcdb.exe
    O4 - HKLM\..\Run: [*tcpmc] C:\WINDOWS\AppPatch\tcpmc.exe
    O4 - HKLM\..\Run: [*syshard] C:\WINDOWS\msagent\chars\syshard.exe
    O4 - HKLM\..\Run: [*hardbak] C:\WINDOWS\msagent\hardbak.exe
    O4 - HKLM\..\Run: [*acrun] C:\WINDOWS\system32\DirectX\acrun.exe
    O4 - HKLM\..\Run: [*mp3xml] C:\WINDOWS\java\mp3xml.exe
    O4 - HKLM\..\Run: [*svcdvd] C:\WINDOWS\ServicePackFiles\svcdvd.exe
    O4 - HKLM\..\Run: [*expwin] C:\WINDOWS\Cursors\expwin.exe
    O4 - HKLM\..\Run: [*odbcnut] C:\WINDOWS\system\odbcnut.exe
    O4 - HKLM\..\Run: [*tcplib] C:\WINDOWS\Config\tcplib.exe
    O4 - HKLM\..\Run: [*msvcad] C:\WINDOWS\Config\msvcad.exe
    O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
    O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions present
    O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O9 - Extra button: Corel Network monitor worker - {896DC91E-63B1-47A2-86E3-EE817401D8D8} - C:\WINDOWS\System32\intlmain.dll
    O9 - Extra 'Tools' menuitem: Corel Network monitor worker - {896DC91E-63B1-47A2-86E3-EE817401D8D8} - C:\WINDOWS\System32\intlmain.dll
    O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
    O9 - Extra button: Corel Network monitor worker - {896DC91E-63B1-47A2-86E3-EE817401D8D8} - C:\WINDOWS\System32\intlmain.dll (HKCU)
    O9 - Extra 'Tools' menuitem: Corel Network monitor worker - {896DC91E-63B1-47A2-86E3-EE817401D8D8} - C:\WINDOWS\System32\intlmain.dll (HKCU)
    O16 - DPF: {15AD6789-CDB4-47E1-A9DA-992EE8E6BAD6} - http://static.windupdates.com/cab/6.../bridge-c24.cab
    O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} (RdxIE Class) - http://software-dl.real.com/274686d...ip/RdxIE601.cab



    Reboot your computer into SAFE MODE

    Then delete these files or directories (Do not be concerned if they do not exist):

    C:\WINDOWS\Config\msvcdb.exe
    C:\WINDOWS\AppPatch\tcpmc.exe
    C:\WINDOWS\msagent\chars\syshard.exe
    C:\WINDOWS\msagent\hardbak.exe
    C:\WINDOWS\system32\DirectX\acrun.exe
    C:\WINDOWS\java\mp3xml.exe
    C:\WINDOWS\ServicePackFiles\svcdvd.exe
    C:\WINDOWS\Cursors\expwin.exe
    C:\WINDOWS\system\odbcnut.exe
    C:\WINDOWS\Config\tcplib.exe
    C:\WINDOWS\Config\msvcad.exe
    C:\WINDOWS\System32\intlmain.dll


    Delete temp files

    Navigate to the C:\Windows\Temp folder. Open the Temp folder and go to Edit > Select All then Edit > Delete to delete the entire contents of the Temp folder.

    Navigate to the C:\Windows\Prefetch folder. Open the Prefetch folder and go to Edit > Select All then Edit > Delete to delete the entire contents of the Prefetch folder.

    Go to Start > Run and type %temp% in the Run box. The Temp folder will open. Click Edit > Select All then Edit > Delete to delete the entire contents of the Temp folder.

    Finally go to Control Panel > Internet Options. On the General tab under "Temporary Internet Files" Click "Delete Files". Put a check by "Delete Offline Content" and click OK. Click on the Programs tab then click the "Reset Web Settings" button. Click Apply then OK.

    Empty the Recycle Bin.


    Reboot your computer to go back to normal mode.



    Please run at least two of these online scans.
    Make sure they are set to clean automatically:

    http://www.pandasoftware.com/activescan/com/activescan_principal.htm

    http://www.bitdefender.com/scan/licence.php

    http://housecall.trendmicro.com/housecall/start_corp.asp

    There will be files that these scans will not remove. Please include that information in your next post.


    Reboot and post a new hijackthis log.
  • edited May 2005
    Thanks a lot for the help!

    I completed all the tasks. I cannot thank you enough for the help. I appreciate it.


    New HJT log:

    Logfile of HijackThis v1.99.1
    Scan saved at 8:07:07 PM, on 5/4/2005
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\SYSTEM32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\AIM\aim.exe
    C:\WINDOWS\system32\drivers\KodakCCS.exe
    C:\WINDOWS\System32\nvsvc32.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\WINDOWS\System32\wuauclt.exe
    C:\HJT\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = www.google.com
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.bestbuy.msn.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.bestbuy.msn.com
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http=http://127.0.0.1:8080
    O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
    O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
    O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\WINDOWS\System32\shdocvw.dll
    O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
    O14 - IERESET.INF: START_PAGE_URL=http://www.bestbuy.msn.com
    O16 - DPF: Yahoo! Euchre - http://download.games.yahoo.com/games/clients/y/et1_x.cab
    O16 - DPF: Yahoo! Pyramids - http://download.games.yahoo.com/games/clients/y/pyt1_x.cab
    O16 - DPF: Yahoo! Towers 2.0 - http://download.games.yahoo.com/games/clients/y/ywt0_x.cab
    O16 - DPF: {22A88341-AFCB-45F0-A856-C2BAE74F878E} - http://www.20x2p.com/8056ab0e/enter.cab
    O16 - DPF: {41B23C28-488E-4E5C-ACE2-BB0BBABE99E8} (HHCtrl Object) - http://67.15.94.29/~popular/load/1495/hhctrl.ocx
    O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akamai.net/7/1540/52/20021205/qtinstall.info.apple.com/borris/us/win/QuickTimeInstaller.exe
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.com/v5consumer/V5Controls/en/x86/client/wuweb_site.cab?1094650698828
    O16 - DPF: {70BA88C8-DAE8-4CE9-92BB-979C4A75F53B} (GSDACtl Class) - http://launch.gamespyarcade.com/software/launch/alaunch.cab
    O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004061001/housecall.trendmicro.com/housecall/xscan53.cab
    O16 - DPF: {80DD2229-B8E4-4C77-B72F-F22972D723EA} (AvxScanOnline Control) - http://www.bitdefender.com/scan/Msie/bitdefender.cab
    O16 - DPF: {8C875948-9C60-4381-9248-0DF180542D53} (SbInstObj) - http://installs.spamblockerutility.com/installs/spamblockerutility/programs/spamblockerutility.cab
    O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.com/activescan/as5/asinst.cab
    O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
    O23 - Service: Intel(R) NMS (NMSSvc) - Intel Corporation - C:\WINDOWS\System32\NMSSvc.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe

    ++++++++++++++++++++++++++++++++++++++++++++++++++++

    Information recieved from the online scans:

    Bitdevender failed cleaning:
    (There were a bunch of spybot SD things that mentioned password protected as well)

    C:\Documents and Settings\Home\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\Dummy.class-a0624da-2bdd6fc2.class: infected with Trojan.Java.ClassLoader.Dummy.A
    C:\Documents and Settings\Home\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\Dummy.class-a0624da-2bdd6fc2.class: disinfection failed
    C:\Documents and Settings\Home\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\GetAccess.class-44b5a8c-27680711.class: infected with Java.Trojan.Exploit.Bytverify
    C:\Documents and Settings\Home\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\GetAccess.class-44b5a8c-27680711.class: disinfection failed
    C:\Documents and Settings\Home\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\InsecureClassLoader.class-73a35661-650f6094.class: infected with Java.Trojan.Exploit.Bytverify
    C:\Documents and Settings\Home\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\InsecureClassLoader.class-73a35661-650f6094.class: disinfection failed
    C:\gyyzoigq.exe: suspect BehavesLike:Trojan.Downloader
    C:\gyyzoigq.exe: disinfection failed
    C:\HJT\backups\backup-20050226-192129-548.dll: infected with Trojan.Downloader.Agent.JB
    C:\HJT\backups\backup-20050226-192129-548.dll: disinfection failed
    C:\HJT\backups\backup-20050317-142223-935.dll: infected with Trojan.Downloader.Agent.AN
    C:\HJT\backups\backup-20050317-142223-935.dll: disinfection failed
    C:\Program Files\AWS\WeatherBug\MiniBugTransporter.dll: infected with Adware.Wheaterbug.A
    C:\Program Files\AWS\WeatherBug\MiniBugTransporter.dll: disinfection failed
    C:\Quarantine\winyj32.xxx: infected with Trojan.Downloader.Agent.BQ
    C:\Quarantine\winyj32.xxx: disinfection failed
    C:\WINDOWS\csrss.dll: suspect BehavesLike:Trojan.StartPage
    C:\WINDOWS\csrss.dll: disinfection failed
    C:\WINDOWS\Downloaded Program Files\rdgUS871.exe: infected with Trojan.Dialer.HT
    C:\WINDOWS\Downloaded Program Files\rdgUS871.exe: disinfection failed
    C:\WINDOWS\fxiegwfr.exe: infected with Dropped:BAT.AutoDelete.A
    C:\WINDOWS\fxiegwfr.exe: disinfection failed
    C:\WINDOWS\iau.exe: suspect BehavesLike:Win32.Backdoor
    C:\WINDOWS\iau.exe: disinfection failed
    C:\WINDOWS\INF\utilinet.exe: infected with Trojan.Spy.Agent.L
    C:\WINDOWS\INF\utilinet.exe: disinfection failed
    C:\WINDOWS\lssas.exe: suspect BehavesLike:Trojan.StartPage
    C:\WINDOWS\lssas.exe: disinfection failed
    C:\WINDOWS\mservice.exe: suspect BehavesLike:Trojan.StartPage
    C:\WINDOWS\mservice.exe: disinfection failed
    C:\WINDOWS\msiau.dll: suspect BehavesLike:Win32.Backdoor
    C:\WINDOWS\msiau.dll: disinfection failed
    C:\WINDOWS\msqdevl.exe: suspect BehavesLike:Trojan.StartPage
    C:\WINDOWS\msqdevl.exe: disinfection failed
    C:\WINDOWS\Registration\vgatask.exe: infected with Trojan.Spy.Agent.L
    C:\WINDOWS\Registration\vgatask.exe: disinfection failed
    C:\WINDOWS\smssa.dll: suspect BehavesLike:Trojan.StartPage
    C:\WINDOWS\smssa.dll: disinfection failed
    C:\WINDOWS\stisvsq.exe: suspect BehavesLike:Trojan.StartPage
    C:\WINDOWS\stisvsq.exe: disinfection failed
    C:\WINDOWS\svshost.exe: suspect BehavesLike:Trojan.StartPage
    C:\WINDOWS\svshost.exe: disinfection failed
    C:\WINDOWS\SYSTEM\Loader.dll: infected with Trojan.Downloader.Agent.LI
    C:\WINDOWS\SYSTEM\Loader.dll: disinfection failed
    C:\WINDOWS\taskmgr.dll: suspect BehavesLike:Trojan.StartPage
    C:\WINDOWS\taskmgr.dll: disinfection failed
    C:\WINDOWS\uvchost.dll: suspect BehavesLike:Trojan.StartPage
    C:\WINDOWS\uvchost.dll: disinfection failed
    C:\WINDOWS\winlogon.dll: suspect BehavesLike:Trojan.StartPage
    C:\WINDOWS\winlogon.dll: disinfection failed
    C:\WINDOWS\wsem303.dll: infected with Trojan.Downloader.Dyfuca.DT
    C:\WINDOWS\wsem303.dll: disinfection failed
    C:\x.bat: infected with Trojan.WinREG.LowZones.F
    C:\x.bat: disinfection failed
    C:\xkppfypi.exe: suspect BehavesLike:Trojan.Downloader
    C:\xkppfypi.exe: disinfection failed
    C:\zlyieico.exe: suspect BehavesLike:Trojan.Downloader
    C:\zlyieico.exe: disinfection failed



    Could not access on the housecall scan:

    JAVA BYTEVER A
    JAVA BYTEVER B
    JAVA BYTEVER C
  • Buckeye_SamBuckeye_Sam Columbus, Ohio
    edited May 2005
    Your hijackthis log is clean. I would go in and manually delete these files from the virus scan. Don't worry about the ones from Spybot's quarantine.

    C:\gyyzoigq.exe
    C:\WINDOWS\csrss.dll
    C:\WINDOWS\Downloaded Program Files\rdgUS871.exe
    C:\WINDOWS\fxiegwfr.exe
    C:\WINDOWS\iau.exe
    C:\WINDOWS\INF\utilinet.exe
    C:\WINDOWS\lssas.exe
    C:\WINDOWS\mservice.exe
    C:\WINDOWS\msiau.dll
    C:\WINDOWS\msqdevl.exe
    C:\WINDOWS\Registration\vgatask.exe
    C:\WINDOWS\smssa.dll
    C:\WINDOWS\stisvsq.exe
    C:\WINDOWS\svshost.exe
    C:\WINDOWS\SYSTEM\Loader.dll
    C:\WINDOWS\taskmgr.dll
    C:\WINDOWS\uvchost.dll
    C:\WINDOWS\winlogon.dll
    C:\WINDOWS\wsem303.dll
    C:\x.bat
    C:\xkppfypi.exe
    C:\zlyieico.exe


    Many of these files are purposely named very similiar to legit system files. For example: svshost.exe is bad, but svchost.exe is good. Take your time and be very careful that you have the right file before deleting it.


    Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
    1. Disable and Enable System Restore. - If you are using Windows ME or XP then you should disable and reenable system restore to make sure there are no infected files found in a restore point left over from what we have just cleaned.

      You can find instructions on how to enable and reenable system restore here:

      Managing Windows Millenium System Restore

      or

      Windows XP System Restore Guide

      Renable system restore with instructions from tutorial above

    2. Make your Internet Explorer more secure - This can be done by following these simple instructions:
      1. From within Internet Explorer click on the Tools menu and then click on Options.
      2. Click once on the Security tab
      3. Click once on the Internet icon so it becomes highlighted.
      4. Click once on the Custom Level button.
        1. Change the Download signed ActiveX controls to Prompt
        2. Change the Download unsigned ActiveX controls to Disable
        3. Change the Initialize and script ActiveX controls not marked as safe to Disable
        4. Change the Installation of desktop items to Prompt
        5. Change the Launching programs and files in an IFRAME to Prompt
        6. Change the Navigate sub-frames across different domains to Prompt
        7. When all these settings have been made, click on the OK button.
        8. If it prompts you as to whether or not you want to save the settings, press the Yes button.
      5. Next press the Apply button and then the OK to exit the Internet Properties page.

    3. Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

      See this link for a listing of some online & their stand-alone antivirus programs:

      Virus, Spyware, and Malware Protection and Removal Resources

    4. Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

    5. Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

      For a tutorial on Firewalls and a listing of some available ones see the link below:

      Understanding and Using Firewalls

    6. Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

    7. Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

      A tutorial on installing & using this product can be found here:

      Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

    8. Install Ad-Aware - Install and download Ad-Aware. ou should also scan your computer with program on a regular basis just as you would an antivirus software in conjunction with Spybot.

      A tutorial on installing & using this product can be found here:

      Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer

    9. Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

      A tutorial on installing & using this product can be found here:

      Using SpywareBlaster to protect your computer from Spyware and Malware

    10. Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
    Follow this list and your potential for being infected again will reduce dramatically.
  • edited May 2005
    Thanks again,
    Everything seems to be working much better now. You have been a huge help.
This discussion has been closed.