Welcome to MalwareRemoval.com,
What if we told you that you could get malware removal help from experts, and that it was 100% free? MalwareRemoval.com provides free support for people with infected computers. Our help, and the tools we use are always 100% free. No hidden catch. We simply enjoy helping others. You enjoy a clean, safe computer.

Malware Removal Instructions

Please help remove spyware from Suzi

MalwareRemoval.com provides free support for people with infected computers. Using plain language that anyone can understand, our community of volunteer experts will walk you through each step.

Please help remove spyware from Suzi

Unread postby suzi5316 » June 20th, 2005, 8:20 pm

Logfile of HijackThis v1.99.1
Scan saved at 5:16:07 PM, on 6/20/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\BroadJump\Client Foundation\CFD.exe
C:\Program Files\2Wire\Gateway\2PortalMon.exe
C:\Program Files\Common Files\Real\Update_OB\evntsvc.exe
C:\Program Files\Visual Networks\Visual IP InSight\SBC\IPClient.exe
C:\Program Files\Visual Networks\Visual IP InSight\SBC\IPMon32.exe
C:\WINDOWS\System32\vidctrl\vidctrl.exe
C:\PROGRA~1\Yahoo!\YOP\yop.exe
C:\PROGRA~1\Yahoo!\browser\ycommon.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\WINDOWS\Plaxo\2.1.0.80\InstallStub.exe
C:\Program Files\ipee\othb.exe
C:\WINDOWS\System32\??sks\nslookup.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
C:\PROGRA~1\Yahoo!\browser\ybrowser.exe
C:\Program Files\Yahoo!\browser\ybrwicon.exe
C:\Program Files\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://yahoo.sbc.com/dsl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://yahoo.sbc.com/dsl
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://yahoo.sbc.com/dsl
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://red.clientapps.yahoo.com/customi ... .yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://red.clientapps.yahoo.com/customi ... .yahoo.com
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by Compaq
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [NAV Agent] C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe
O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
O4 - HKLM\..\Run: [2wSysTray] C:\Program Files\2Wire\Gateway\2PortalMon.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [TkBellExe] C:\Program Files\Common Files\Real\Update_OB\evntsvc.exe -osboot
O4 - HKLM\..\Run: [YBrowser] C:\Program Files\Yahoo!\browser\ybrwicon.exe
O4 - HKLM\..\Run: [IPInSightLAN 02] "C:\Program Files\Visual Networks\Visual IP InSight\SBC\IPClient.exe" -l
O4 - HKLM\..\Run: [IPInSightMonitor 02] "C:\Program Files\Visual Networks\Visual IP InSight\SBC\IPMon32.exe"
O4 - HKLM\..\Run: [vidctrl] C:\WINDOWS\System32\vidctrl\vidctrl.exe
O4 - HKLM\..\Run: [YOP] C:\PROGRA~1\Yahoo!\YOP\yop.exe /autostart
O4 - HKLM\..\Run: [Zone Labs Client] C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKLM\..\Run: [checkrun] C:\windows\system32\eliteyfu32.exe
O4 - HKCU\..\Run: [Microsoft Works Update Detection] c:\Program Files\Microsoft Works\WkDetect.exe
O4 - HKCU\..\Run: [PlaxoUpdate] C:\WINDOWS\Plaxo\2.1.0.80\InstallStub.exe -a
O4 - HKCU\..\Run: [Aaou] C:\Program Files\ipee\othb.exe
O4 - HKCU\..\Run: [Hxjmsdu] C:\WINDOWS\System32\??sks\nslookup.exe
O4 - Startup: Norton Disk Doctor.LNK = C:\Program Files\Norton SystemWorks\Norton Utilities\NDD32.EXE
O4 - Global Startup: Wireless-B PCI Adapter Utility.lnk = C:\Program Files\Linksys\WMP11 Config Utility\WMP11Cfg.exe
O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
O9 - Extra button: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
O9 - Extra 'Tools' menuitem: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - c:\Program Files\Microsoft Money\System\mnyviewer.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://store.presario.net/scripts/redirectors/presario/storeredir2.dll?s=consumerfav&c=2c02&lc=0409
O16 - DPF: Yahoo! Spades - http://download.games.yahoo.com/games/c ... /st2_x.cab
O16 - DPF: {08BEF711-06DA-48B2-9534-802ECAA2E4F9} (PlxInstall Class) - http://down.plaxo.com/down/release/PlaxoInstall.cab
O16 - DPF: {15589FA1-C456-11CE-BF01-000000000000} - http://www.errornuker.com/products/errn ... taller.exe
O16 - DPF: {23B2247F-DB22-11D3-80F6-00C04F603C43} (WinPointInterface.WinPointImport) - https://www.adin.net/os/Controls/WinPointImport.CAB
O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - http://us.dl1.yimg.com/download.yahoo.c ... st0401.cab
O16 - DPF: {4F4D2E63-0377-4188-8B70-52934FA8A101} (First American File Control) - http://www.leadstoloans.com/activex/fafile.dll
O16 - DPF: {4F4D2E63-0377-4188-8B70-52934FA8A201} (First American Print Control) - http://www.leadstoloans.com/activex/faprint.dll
O16 - DPF: {4F4D2E63-0377-4188-8B70-52934FA8A301} (First American Grid Control) - http://www.leadstoloans.com/activex/fagrid.dll
O16 - DPF: {640B39C1-D713-464F-92C3-75BD972B95EE} - http://www.sidestep.com/get/k42037/sb02a.cab
O16 - DPF: {8569D715-FF88-44BA-8D1D-AD3E59543DDE} (ActiveReports Viewer2) - http://ml.sitexdata.com/mortgageleads/arview2.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.com/activescan/as5/asinst.cab
O16 - DPF: {D18F962A-3722-4B59-B08D-28BB9EB2281E} (PhotosCtrl Class) - http://photos.yahoo.com/ocx/us/yexplorer1_9us.cab
O16 - DPF: {DC187740-46A9-11D5-A815-00B0D0428C0C} - http://ds1.downloadtech.net/cn1060/pcpowerscan.cab
O16 - DPF: {DF05D910-DC8E-403A-93B0-5C866F3200D1} (PtClickLoan Control) - https://www.clickloan.com/CAB/PtClickLo ... ckLoan.cab
O16 - DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} (GpcContainer Class) - https://chlwholesaletraining.webex.com/ ... eatgpc.cab
O16 - DPF: {EB387D2F-E27B-4D36-979E-847D1036C65D} (QDiagHUpdateObj Class) - http://h30043.www3.hp.com/aio/en/check/qdiagh.cab?319
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
O20 - Winlogon Notify: IPConfTSP - C:\WINDOWS\system32\m0460ahsed460.dll
O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
O23 - Service: NICSer_WMP11 - Unknown owner - C:\Program Files\Linksys\WMP11 Config Utility\NICServ.exe
O23 - Service: Norton Unerase Protection (NProtectService) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Speed Disk service - Symantec Corporation - C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe
O23 - Service: YPCService - Yahoo! Inc. - C:\WINDOWS\system32\YPCSER~1.EXE
suzi5316
Active Member
 
Posts: 8
Joined: June 20th, 2005, 1:52 am
Advertisement
Register to Remove

Unread postby LDTate » June 20th, 2005, 8:40 pm

Hello suzi5316, Welcome to the forum.

This is what I suggest you do.


Go here and run at least one of the online scans, allow them to delete whatever they find:

TrendMicro HouseCall
eTrust AntiVirus Web Scanner
Panda ActiveScan
Note any thing that can't be fixed
Reboot when done.

Next:

Even if you've already run these, make SURE they're up-to-date and run per instructions.

Make sure you have the up-to-date versions of Spybot V 1.4 and Ad-aware SE Build 1.06 . All are free and available below.

Download Spybot, install and update. Then download Ad-aware, install, and update.

Spybot:

Install the program and launch it.

Go to Start > Programs >Spybot > Search & Destroy and choose Spybot S&D

Close ALL windows except Spybot S&D
Click the button to "Search for Updates" and download and install the Updates.
Next click the button "Check for Problems"
When Spybot is complete, it will be showing "RED" (RED) entries "BLACK" entries and "GREEN" (GREEN) entries in the window
Put a check mark beside the RED (RED) entries ONLY.
Choose "Fix Selected Problems" and allow Spybot to fix the RED (RED) entries.

Ad-Aware FULL SCAN:

Install the program and launch it.

First in the main window look in the bottom right corner and click on Check for updates now then click Connect and download the latest reference files.

From main window :Click Start then under Select a scan Mode check Perform full system scan.
Next deselect Search for negligible risk entries.
Now to scan just click the Next button.

When the scan is finished mark everything for removal and get rid of it.(Right-click the window and choose select all from the drop down menu and click Next)

Empty Recycle Bin

Reboot and "copy/paste" a new log file into this thread.
Also please describe how your computer behaves at the moment.
User avatar
LDTate
WTT Teacher
WTT Teacher
 
Posts: 3920
Joined: February 18th, 2005, 8:38 pm
Location: Missouri, USA

Ok thanks. I did all that but I will do it again. Thank you

Unread postby suzi5316 » June 20th, 2005, 8:51 pm

Ok thanks. I did all that but I will do it again. Thank you
suzi5316
Active Member
 
Posts: 8
Joined: June 20th, 2005, 1:52 am

Unread postby LDTate » June 20th, 2005, 8:54 pm

I don't see any indication of Ad-Aware or SpyBot running in your log.
User avatar
LDTate
WTT Teacher
WTT Teacher
 
Posts: 3920
Joined: February 18th, 2005, 8:38 pm
Location: Missouri, USA

Panda scan. No viruses just lots of spyware.

Unread postby suzi5316 » June 20th, 2005, 10:46 pm

Ran Panda Active Scan. No viruses found but lots of spyware that it couldn't delete. See below. I'm going to reboot now and complete the rest of the instructions. Thank you.

Adware:Adware/DelFinMedia No disinfected C:\WINDOWS\System32\vidctrl\vidctrl.exe
Adware:Adware/PurityScan No disinfected C:\Program Files\ipee\othb.exe
Adware:Adware/Look2Me No disinfected C:\WINDOWS\system32\guard.tmp
Adware:Adware/DelFinMedia No disinfected C:\WINDOWS\System32\vidctrl\vidctrl.exe
Adware:Adware/PurityScan No disinfected C:\PROGRA~1\ipee\othb.exe
Adware:Adware/SaveNow No disinfected Windows Registry
Adware:Adware/Gator No disinfected C:\DOCUME~1\SUZI'S~1\LOCALS~1\Temp\bundle.inf
Adware:Adware/MyWay No disinfected C:\WINDOWS\system32\Xcite.dll
Adware:Adware/nCase No disinfected C:\WINDOWS\system32\FLEOK
Adware:Adware/PurityScan No disinfected C:\DOCUME~1\SUZI'S~1\LOCALS~1\Temp\!update.exe
Adware:Adware/PowerScan No disinfected C:\Program Files\Intrigue Learning
Adware:Adware/SAHAgent No disinfected Windows Registry
Adware:Adware/Look2Me No disinfected C:\WINDOWS\system32\guard.tmp
Adware:Adware/SideStep No disinfected Windows Registry
Spyware:Spyware/Virtumonde No disinfected C:\DOCUME~1\SUZI'S~1\LOCALS~1\Temp\bw2.com
Spyware:Spyware/Whazit No disinfected C:\WINDOWS\system32\fiz1
Adware:Adware/PurityScan No disinfected C:\Documents and Settings\Suzi's Love Slave2\Local Settings\Temp\!update.exe
Adware:Adware/Look2Me No disinfected C:\Documents and Settings\Suzi's Love Slave2\Local Settings\Temp\upd204.exe
Adware:Adware/nCase No disinfected C:\Documents and Settings\Suzi's Love Slave2\Local Settings\Temporary Internet Files\Content.IE5\4XYVCP6N\AppWrap[1].exe
Adware:Adware/nCase No disinfected C:\Documents and Settings\Suzi's Love Slave2\Local Settings\Temporary Internet Files\Content.IE5\4XYVCP6N\AppWrap[2].exe
Adware:Adware/PurityScan No disinfected C:\Documents and Settings\Suzi's Love Slave2\Local Settings\Temporary Internet Files\Content.IE5\C56FKXMR\!update-1964[1].0000
Spyware:Spyware/BargainBuddy No disinfected C:\Documents and Settings\Suzi's Love Slave2\Local Settings\Temporary Internet Files\Content.IE5\C56FKXMR\dating[1].bmp
Adware:Adware/Look2Me No disinfected C:\Documents and Settings\Suzi's Love Slave2\Local Settings\Temporary Internet Files\Content.IE5\G9QB4TU7\AppWrap[2].exe
Spyware:Spyware/BargainBuddy No disinfected C:\Documents and Settings\Suzi's Love Slave2\Local Settings\Temporary Internet Files\Content.IE5\SHYJKLQ7\fav[1].bmp
Adware:Adware/Look2Me No disinfected C:\Documents and Settings\Suzi's Love Slave2\Local Settings\Temporary Internet Files\Content.IE5\SHYJKLQ7\upd204[1].exe
Spyware:Spyware/BargainBuddy No disinfected C:\Documents and Settings\Suzi's Love Slave2\Local Settings\Temporary Internet Files\Content.IE5\U7OB9INA\drugs[1].bmp
Adware:Adware/EliteBar No disinfected C:\Documents and Settings\Suzi's Love Slave2\Local Settings\Temporary Internet Files\Content.IE5\U7OB9INA\kwlist3[1].exe
Spyware:Spyware/BargainBuddy No disinfected C:\Documents and Settings\Suzi's Love Slave2\Local Settings\Temporary Internet Files\Content.IE5\W9E70L2F\casino[1].bmp
Adware:Adware/DelFinMedia No disinfected C:\Program Files\Common Files\Uninstall Information\RemoveDisplayUtility.exe
Adware:Adware/PurityScan No disinfected C:\Program Files\ipee\othb.exe
Spyware:Spyware/BargainBuddy No disinfected C:\Program Files\Microsoft AntiSpyware\Quarantine\AD0E92F2-022F-4CF4-B338-BE7441\1B4E4188-A759-4D8F-9168-0B07EB
Spyware:Spyware/BargainBuddy No disinfected C:\Program Files\Microsoft AntiSpyware\Quarantine\AD0E92F2-022F-4CF4-B338-BE7441\B963A9EF-8F31-48FC-9D75-30611C
Spyware:Spyware/BargainBuddy No disinfected C:\Program Files\Microsoft AntiSpyware\Quarantine\AD0E92F2-022F-4CF4-B338-BE7441\DCC82727-EA74-4988-8ABF-D0BB63
Adware:Adware/EliteBar No disinfected C:\Program Files\Microsoft AntiSpyware\Quarantine\AD0E92F2-022F-4CF4-B338-BE7441\DD6C2F70-C423-439C-8D56-01B7D2
Spyware:Spyware/BargainBuddy No disinfected C:\Program Files\Microsoft AntiSpyware\Quarantine\AD0E92F2-022F-4CF4-B338-BE7441\EB83C13F-495D-41E9-889F-B732A1
Spyware:Spyware/BargainBuddy No disinfected C:\Program Files\Microsoft AntiSpyware\Quarantine\AD0E92F2-022F-4CF4-B338-BE7441\EE682F14-025F-4C1E-ADD1-DD6104
Adware:Adware/BroadcastPC No disinfected C:\Program Files\tvs\tvs_clean.exe
Adware:Adware/BroadcastPC No disinfected C:\Program Files\tvs\tvs_re_inst.exe
Adware:Adware/Apropos No disinfected C:\Program Files\Yahoo!\YPSR\Quarantine\ppq1C4.tmp
Adware:Adware/Apropos No disinfected C:\Program Files\Yahoo!\YPSR\Quarantine\ppq1C5.tmp
Adware:Adware/Apropos No disinfected C:\Program Files\Yahoo!\YPSR\Quarantine\ppq1C6.tmp
Adware:Adware/Apropos No disinfected C:\Program Files\Yahoo!\YPSR\Quarantine\ppq1C9.tmp
Adware:Adware/IPInsight No disinfected C:\Program Files\Yahoo!\YPSR\Quarantine\ppq272.tmp
Adware:Adware/AdDestroyer No disinfected C:\Program Files\Yahoo!\YPSR\Quarantine\ppq6C.tmp
Adware:Adware/VirtualBouncer No disinfected C:\Program Files\Yahoo!\YPSR\Quarantine\ppq6F.tmp
Adware:Adware/AdDestroyer No disinfected C:\Program Files\Yahoo!\YPSR\Quarantine\ppq70.tmp
Adware:Adware/AdDestroyer No disinfected C:\Program Files\Yahoo!\YPSR\Quarantine\ppq72.tmp
Adware:Adware/AdDestroyer No disinfected C:\Program Files\Yahoo!\YPSR\Quarantine\ppq73.tmp
Adware:Adware/AdDestroyer No disinfected C:\Program Files\Yahoo!\YPSR\Quarantine\ppq75.tmp
Adware:Adware/nCase No disinfected C:\Temp\salmau.dat
Adware:Adware/nCase No disinfected C:\Temp\salm_gdf.dat
Adware:Adware Program No disinfected C:\WINDOWS\Downloaded Program Files\ieatgpc.inf
Adware:Adware/PowerScan No disinfected C:\WINDOWS\Downloaded Program Files\pcpowerscan.EXE
Adware:Adware/SAHAgent No disinfected C:\WINDOWS\inf\bi6.inf
Adware:Adware/Look2Me No disinfected C:\WINDOWS\system\UpdInst.exe
Adware:Adware/NetPals No disinfected C:\WINDOWS\system32\aess4.dll
Spyware:Spyware/Whazit No disinfected C:\WINDOWS\system32\fiz1
Adware:Adware/Look2Me No disinfected C:\WINDOWS\system32\guard.tmp
Adware:Adware/Look2Me No disinfected C:\WINDOWS\system32\ktdhela2.dll
Spyware:Spyware/Whazit No disinfected C:\WINDOWS\system32\kyf.dat
Adware:Adware/PurityScan No disinfected C:\WINDOWS\system32\Shex.exe
Adware:Adware/DelFinMedia No disinfected C:\WINDOWS\system32\vidctrl\vidctrl.exe
Adware:Adware/MyWay No disinfected C:\WINDOWS\system32Xcite.dll
Adware:Adware/MyWay No disinfected C:\WINDOWS\system32\Xcite2.exe
suzi5316
Active Member
 
Posts: 8
Joined: June 20th, 2005, 1:52 am

New hijack this log Thank you

Unread postby suzi5316 » June 21st, 2005, 1:10 am

Completed instructions. I have installed a firewall which monitors outgoing requests for internet access. I am still getting:

Real Networks Dynamic App Launcher is trying to access the internet. rndal.exe

AND

Generic Host Process trying to act as server
From Port 135. The advice from my firewall is that Port 135 indicates spyware.

Also, I receive this error message upon startup:

Exception while trying to run
"C:\\Windows\System32\mpwstr10.dll",DllGetVersion"

Here is Log:

Logfile of HijackThis v1.99.1
Scan saved at 10:04:38 PM, on 6/20/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\BroadJump\Client Foundation\CFD.exe
C:\Program Files\2Wire\Gateway\2PortalMon.exe
C:\Program Files\Common Files\Real\Update_OB\evntsvc.exe
C:\Program Files\Yahoo!\browser\ybrwicon.exe
C:\Program Files\Visual Networks\Visual IP InSight\SBC\IPClient.exe
C:\Program Files\Visual Networks\Visual IP InSight\SBC\IPMon32.exe
C:\PROGRA~1\Yahoo!\browser\ycommon.exe
C:\WINDOWS\System32\vidctrl\vidctrl.exe
C:\PROGRA~1\Yahoo!\YOP\yop.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\WINDOWS\Plaxo\2.1.0.80\InstallStub.exe
C:\Program Files\ipee\othb.exe
C:\WINDOWS\System32\??sks\nslookup.exe
C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe
C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
C:\PROGRA~1\Yahoo!\browser\ybrowser.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL = http://searchmiracle.com/sp.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://searchmiracle.com/sp.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://searchmiracle.com/sp.php
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://yahoo.sbc.com/dsl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://yahoo.sbc.com/dsl
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://yahoo.sbc.com/dsl
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://searchmiracle.com/sp.php
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://red.clientapps.yahoo.com/customi ... .yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://red.clientapps.yahoo.com/customi ... .yahoo.com
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by Compaq
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [NAV Agent] C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe
O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
O4 - HKLM\..\Run: [2wSysTray] C:\Program Files\2Wire\Gateway\2PortalMon.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [TkBellExe] C:\Program Files\Common Files\Real\Update_OB\evntsvc.exe -osboot
O4 - HKLM\..\Run: [YBrowser] C:\Program Files\Yahoo!\browser\ybrwicon.exe
O4 - HKLM\..\Run: [IPInSightLAN 02] "C:\Program Files\Visual Networks\Visual IP InSight\SBC\IPClient.exe" -l
O4 - HKLM\..\Run: [IPInSightMonitor 02] "C:\Program Files\Visual Networks\Visual IP InSight\SBC\IPMon32.exe"
O4 - HKLM\..\Run: [vidctrl] C:\WINDOWS\System32\vidctrl\vidctrl.exe
O4 - HKLM\..\Run: [YOP] C:\PROGRA~1\Yahoo!\YOP\yop.exe /autostart
O4 - HKLM\..\Run: [Zone Labs Client] C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKCU\..\Run: [Microsoft Works Update Detection] c:\Program Files\Microsoft Works\WkDetect.exe
O4 - HKCU\..\Run: [PlaxoUpdate] C:\WINDOWS\Plaxo\2.1.0.80\InstallStub.exe -a
O4 - HKCU\..\Run: [Aaou] C:\Program Files\ipee\othb.exe
O4 - HKCU\..\Run: [Hxjmsdu] C:\WINDOWS\System32\??sks\nslookup.exe
O4 - Startup: Norton Disk Doctor.LNK = C:\Program Files\Norton SystemWorks\Norton Utilities\NDD32.EXE
O4 - Global Startup: Wireless-B PCI Adapter Utility.lnk = C:\Program Files\Linksys\WMP11 Config Utility\WMP11Cfg.exe
O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
O9 - Extra button: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
O9 - Extra 'Tools' menuitem: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - c:\Program Files\Microsoft Money\System\mnyviewer.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://store.presario.net/scripts/redirectors/presario/storeredir2.dll?s=consumerfav&c=2c02&lc=0409
O16 - DPF: Yahoo! Spades - http://download.games.yahoo.com/games/c ... /st2_x.cab
O16 - DPF: {08BEF711-06DA-48B2-9534-802ECAA2E4F9} (PlxInstall Class) - http://down.plaxo.com/down/release/PlaxoInstall.cab
O16 - DPF: {15589FA1-C456-11CE-BF01-000000000000} - http://www.errornuker.com/products/errn ... taller.exe
O16 - DPF: {23B2247F-DB22-11D3-80F6-00C04F603C43} (WinPointInterface.WinPointImport) - https://www.adin.net/os/Controls/WinPointImport.CAB
O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - http://us.dl1.yimg.com/download.yahoo.c ... st0401.cab
O16 - DPF: {4F4D2E63-0377-4188-8B70-52934FA8A101} (First American File Control) - http://www.leadstoloans.com/activex/fafile.dll
O16 - DPF: {4F4D2E63-0377-4188-8B70-52934FA8A201} (First American Print Control) - http://www.leadstoloans.com/activex/faprint.dll
O16 - DPF: {4F4D2E63-0377-4188-8B70-52934FA8A301} (First American Grid Control) - http://www.leadstoloans.com/activex/fagrid.dll
O16 - DPF: {640B39C1-D713-464F-92C3-75BD972B95EE} - http://www.sidestep.com/get/k42037/sb02a.cab
O16 - DPF: {8569D715-FF88-44BA-8D1D-AD3E59543DDE} (ActiveReports Viewer2) - http://ml.sitexdata.com/mortgageleads/arview2.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.com/activescan/as5/asinst.cab
O16 - DPF: {D18F962A-3722-4B59-B08D-28BB9EB2281E} (PhotosCtrl Class) - http://photos.yahoo.com/ocx/us/yexplorer1_9us.cab
O16 - DPF: {DC187740-46A9-11D5-A815-00B0D0428C0C} - http://ds1.downloadtech.net/cn1060/pcpowerscan.cab
O16 - DPF: {DF05D910-DC8E-403A-93B0-5C866F3200D1} (PtClickLoan Control) - https://www.clickloan.com/CAB/PtClickLo ... ckLoan.cab
O16 - DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} (GpcContainer Class) - https://chlwholesaletraining.webex.com/ ... eatgpc.cab
O16 - DPF: {EB387D2F-E27B-4D36-979E-847D1036C65D} (QDiagHUpdateObj Class) - http://h30043.www3.hp.com/aio/en/check/qdiagh.cab?319
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
O20 - Winlogon Notify: ShellCompatibility - C:\WINDOWS\system32\c8002idmg80a2.dll
O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
O23 - Service: NICSer_WMP11 - Unknown owner - C:\Program Files\Linksys\WMP11 Config Utility\NICServ.exe
O23 - Service: Norton Unerase Protection (NProtectService) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Speed Disk service - Symantec Corporation - C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe
O23 - Service: YPCService - Yahoo! Inc. - C:\WINDOWS\system32\YPCSER~1.EXE
suzi5316
Active Member
 
Posts: 8
Joined: June 20th, 2005, 1:52 am

Unread postby LDTate » June 21st, 2005, 4:29 pm

Download L2mfix from one of these two locations:

http://www.atribune.org/downloads/l2mfix.exe
http://www.downloads.subratam.org/l2mfix.exe

Save the file to your desktop and double click l2mfix.exe. Click the Install button to extract the files and follow the prompts, then open the newly added l2mfix folder on your desktop. Double click l2mfix.bat and select option #1 for Run Find Log by typing 1 and then pressing enter. This will scan your computer and it may appear nothing is happening, then, after a minute or 2, notepad will open with a log. Copy the contents of that log and paste it into this thread.

IMPORTANT: Do NOT run option #2 OR any other files in the l2mfix folder until you are asked to do so!
User avatar
LDTate
WTT Teacher
WTT Teacher
 
Posts: 3920
Joined: February 18th, 2005, 8:38 pm
Location: Missouri, USA

l2mfix log

Unread postby suzi5316 » June 22nd, 2005, 3:31 am

L2MFIX find log 1.03
These are the registry keys present
**********************************************************************************
Winlogon/notify:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\App Paths]
Asynchronous=dword:00000000
DllName="C:\\WINDOWS\\system32\\gp88l3lu1.dll"
Impersonate=dword:00000000
Logon="WinLogon"
Logoff="WinLogoff"
Shutdown="WinShutdown"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt32chain]
Asynchronous=dword:00000000
Impersonate=dword:00000000
DllName=hex(2):63,00,72,00,79,00,70,00,74,00,33,00,32,00,2e,00,64,00,6c,00,\
6c,00,00,00
Logoff="ChainWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cryptnet]
Asynchronous=dword:00000000
Impersonate=dword:00000000
DllName=hex(2):63,00,72,00,79,00,70,00,74,00,6e,00,65,00,74,00,2e,00,64,00,\
6c,00,6c,00,00,00
Logoff="CryptnetWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cscdll]
DLLName="cscdll.dll"
Logon="WinlogonLogonEvent"
Logoff="WinlogonLogoffEvent"
ScreenSaver="WinlogonScreenSaverEvent"
Startup="WinlogonStartupEvent"
Shutdown="WinlogonShutdownEvent"
StartShell="WinlogonStartShellEvent"
Impersonate=dword:00000000
Asynchronous=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\igfxcui]
@=""
DLLName="igfxsrvc.dll"
Asynchronous=dword:00000001
Impersonate=dword:00000001
Unlock="WinlogonUnlockEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ScCertProp]
DLLName="wlnotify.dll"
Logon="SCardStartCertProp"
Logoff="SCardStopCertProp"
Lock="SCardSuspendCertProp"
Unlock="SCardResumeCertProp"
Enabled=dword:00000001
Impersonate=dword:00000001
Asynchronous=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Schedule]
Asynchronous=dword:00000000
DllName=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
Impersonate=dword:00000000
StartShell="SchedStartShell"
Logoff="SchedEventLogOff"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\sclgntfy]
Logoff="WLEventLogoff"
Impersonate=dword:00000000
Asynchronous=dword:00000001
DllName=hex(2):73,00,63,00,6c,00,67,00,6e,00,74,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SensLogn]
DLLName="WlNotify.dll"
Lock="SensLockEvent"
Logon="SensLogonEvent"
Logoff="SensLogoffEvent"
Safe=dword:00000001
MaxWait=dword:00000258
StartScreenSaver="SensStartScreenSaverEvent"
StopScreenSaver="SensStopScreenSaverEvent"
Startup="SensStartupEvent"
Shutdown="SensShutdownEvent"
StartShell="SensStartShellEvent"
PostShell="SensPostShellEvent"
Disconnect="SensDisconnectEvent"
Reconnect="SensReconnectEvent"
Unlock="SensUnlockEvent"
Impersonate=dword:00000001
Asynchronous=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\termsrv]
Asynchronous=dword:00000000
DllName=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
Impersonate=dword:00000000
Logoff="TSEventLogoff"
Logon="TSEventLogon"
PostShell="TSEventPostShell"
Shutdown="TSEventShutdown"
StartShell="TSEventStartShell"
Startup="TSEventStartup"
MaxWait=dword:00000258
Reconnect="TSEventReconnect"
Disconnect="TSEventDisconnect"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlballoon]
DLLName="wlnotify.dll"
Logon="RegisterTicketExpiredNotificationEvent"
Logoff="UnregisterTicketExpiredNotificationEvent"
Impersonate=dword:00000001
Asynchronous=dword:00000001

**********************************************************************************
useragent:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
{E2ECFB96-CF9A-067C-7E13-5840BE366CBA}=""

**********************************************************************************
Shell Extension key:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]
{00022613-0000-0000-C000-000000000046}="Multimedia File Property Sheet"
{176d6597-26d3-11d1-b350-080036a75b03}="ICM Scanner Management"
{1F2E5C40-9550-11CE-99D2-00AA006E086C}="NTFS Security Page"
{3EA48300-8CF6-101B-84FB-666CCB9BCD32}="OLE Docfile Property Page"
{40dd6e20-7c17-11ce-a804-00aa003ca9f6}="Shell extensions for sharing"
{41E300E0-78B6-11ce-849B-444553540000}="PlusPack CPL Extension"
{42071712-76d4-11d1-8b24-00a0c9068ff3}="Display Adapter CPL Extension"
{42071713-76d4-11d1-8b24-00a0c9068ff3}="Display Monitor CPL Extension"
{42071714-76d4-11d1-8b24-00a0c9068ff3}="Display Panning CPL Extension"
{4E40F770-369C-11d0-8922-00A024AB2DBB}="DS Security Page"
{513D916F-2A8E-4F51-AEAB-0CBC76FB1AF8}="Compatibility Page"
{56117100-C0CD-101B-81E2-00AA004AE837}="Shell Scrap DataHandler"
{59099400-57FF-11CE-BD94-0020AF85B590}="Disk Copy Extension"
{59be4990-f85c-11ce-aff7-00aa003ca9f6}="Shell extensions for Microsoft Windows Network objects"
{5DB2625A-54DF-11D0-B6C4-0800091AA605}="ICM Monitor Management"
{675F097E-4C4D-11D0-B6C1-0800091AA605}="ICM Printer Management"
{764BF0E1-F219-11ce-972D-00AA00A14F56}="Shell extensions for file compression"
{77597368-7b15-11d0-a0c2-080036af3f03}="Web Printer Shell Extension"
{7988B573-EC89-11cf-9C00-00AA00A14F56}="Disk Quota UI"
{853FE2B1-B769-11d0-9C4E-00C04FB6C6FA}="Encryption Context Menu"
{85BBD920-42A0-1069-A2E4-08002B30309D}="Briefcase"
{88895560-9AA2-1069-930E-00AA0030EBC8}="HyperTerminal Icon Ext"
{BD84B380-8CA2-1069-AB1D-08000948F534}="Fonts"
{DBCE2480-C732-101B-BE72-BA78E9AD5B27}="ICC Profile"
{F37C5810-4D3F-11d0-B4BF-00AA00BBB723}="Printers Security Page"
{f81e9010-6ea4-11ce-a7ff-00aa003ca9f6}="Shell extensions for sharing"
{f92e8c40-3d33-11d2-b1aa-080036a75b03}="Display TroubleShoot CPL Extension"
{7444C717-39BF-11D1-8CD9-00C04FC29D45}="Crypto PKO Extension"
{7444C719-39BF-11D1-8CD9-00C04FC29D45}="Crypto Sign Extension"
{7007ACC7-3202-11D1-AAD2-00805FC1270E}="Network Connections"
{992CFFA0-F557-101A-88EC-00DD010CCC48}="Network Connections"
{E211B736-43FD-11D1-9EFB-0000F8757FCD}="Scanners & Cameras"
{FB0C9C8A-6C50-11D1-9F1D-0000F8757FCD}="Scanners & Cameras"
{905667aa-acd6-11d2-8080-00805f6596d2}="Scanners & Cameras"
{3F953603-1008-4f6e-A73A-04AAC7A992F1}="Scanners & Cameras"
{83bbcbf3-b28a-4919-a5aa-73027445d672}="Scanners & Cameras"
{F0152790-D56E-4445-850E-4F3117DB740C}="Remote Sessions CPL Extension"
{60254CA5-953B-11CF-8C96-00AA00B8708C}="Shell extensions for Windows Script Host"
{2206CDB2-19C1-11D1-89E0-00C04FD7A829}="Microsoft Data Link"
{DD2110F0-9EEF-11cf-8D8E-00AA0060F5BF}="Tasks Folder Icon Handler"
{797F1E90-9EDD-11cf-8D8E-00AA0060F5BF}="Tasks Folder Shell Extension"
{D6277990-4C6A-11CF-8D87-00AA0060F5BF}="Scheduled Tasks"
{0DF44EAA-FF21-4412-828E-260A8728E7F1}="Taskbar and Start Menu"
{2559a1f0-21d7-11d4-bdaf-00c04f60b9f0}="Search"
{2559a1f1-21d7-11d4-bdaf-00c04f60b9f0}="Help and Support"
{2559a1f2-21d7-11d4-bdaf-00c04f60b9f0}="Help and Support"
{2559a1f3-21d7-11d4-bdaf-00c04f60b9f0}="Run..."
{2559a1f4-21d7-11d4-bdaf-00c04f60b9f0}="Internet"
{2559a1f5-21d7-11d4-bdaf-00c04f60b9f0}="E-mail"
{D20EA4E1-3957-11d2-A40B-0C5020524152}="Fonts"
{D20EA4E1-3957-11d2-A40B-0C5020524153}="Administrative Tools"
{875CB1A1-0F29-45de-A1AE-CFB4950D0B78}="Audio Media Properties Handler"
{40C3D757-D6E4-4b49-BB41-0E5BBEA28817}="Video Media Properties Handler"
{E4B29F9D-D390-480b-92FD-7DDB47101D71}="Wav Properties Handler"
{87D62D94-71B3-4b9a-9489-5FE6850DC73E}="Avi Properties Handler"
{A6FD9E45-6E44-43f9-8644-08598F5A74D9}="Midi Properties Handler"
{c5a40261-cd64-4ccf-84cb-c394da41d590}="Video Thumbnail Extractor"
{5E6AB780-7743-11CF-A12B-00AA004AE837}="Microsoft Internet Toolbar"
{22BF0C20-6DA7-11D0-B373-00A0C9034938}="Download Status"
{91EA3F8B-C99B-11d0-9815-00C04FD91972}="Augmented Shell Folder"
{6413BA2C-B461-11d1-A18A-080036B11A03}="Augmented Shell Folder 2"
{F61FFEC1-754F-11d0-80CA-00AA005B4383}="BandProxy"
{7BA4C742-9E81-11CF-99D3-00AA004AE837}="Microsoft BrowserBand"
{30D02401-6A81-11d0-8274-00C04FD5AE38}="Search Band"
{32683183-48a0-441b-a342-7c2a440a9478}="Media Band"
{169A0691-8DF9-11d1-A1C4-00C04FD75D13}="In-pane search"
{07798131-AF23-11d1-9111-00A0C98BA67D}="Web Search"
{AF4F6510-F982-11d0-8595-00AA004CD6D8}="Registry Tree Options Utility"
{01E04581-4EEE-11d0-BFE9-00AA005B4383}="&Address"
{A08C11D2-A228-11d0-825B-00AA005B4383}="Address EditBox"
{00BB2763-6A77-11D0-A535-00C04FD7D062}="Microsoft AutoComplete"
{7376D660-C583-11d0-A3A5-00C04FD706EC}="TridentImageExtractor"
{6756A641-DE71-11d0-831B-00AA005B4383}="MRU AutoComplete List"
{6935DB93-21E8-4ccc-BEB9-9FE3C77A297A}="Custom MRU AutoCompleted List"
{7e653215-fa25-46bd-a339-34a2790f3cb7}="Accessible"
{acf35015-526e-4230-9596-becbe19f0ac9}="Track Popup Bar"
{E0E11A09-5CB8-4B6C-8332-E00720A168F2}="Address Bar Parser"
{00BB2764-6A77-11D0-A535-00C04FD7D062}="Microsoft History AutoComplete List"
{03C036F1-A186-11D0-824A-00AA005B4383}="Microsoft Shell Folder AutoComplete List"
{00BB2765-6A77-11D0-A535-00C04FD7D062}="Microsoft Multiple AutoComplete List Container"
{ECD4FC4E-521C-11D0-B792-00A0C90312E1}="Shell Band Site Menu"
{3CCF8A41-5C85-11d0-9796-00AA00B90ADF}="Shell DeskBarApp"
{ECD4FC4C-521C-11D0-B792-00A0C90312E1}="Shell DeskBar"
{ECD4FC4D-521C-11D0-B792-00A0C90312E1}="Shell Rebar BandSite"
{DD313E04-FEFF-11d1-8ECD-0000F87A470C}="User Assist"
{EF8AD2D1-AE36-11D1-B2D2-006097DF8C11}="Global Folder Settings"
{EFA24E61-B078-11d0-89E4-00C04FC9E26E}="Favorites Band"
{0A89A860-D7B1-11CE-8350-444553540000}="Shell Automation Inproc Service"
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837}="Shell DocObject Viewer"
{A5E46E3A-8849-11D1-9D8C-00C04FC99D61}="Microsoft Browser Architecture"
{FBF23B40-E3F0-101B-8488-00AA003E56F8}="InternetShortcut"
{3C374A40-BAE4-11CF-BF7D-00AA006946EE}="Microsoft Url History Service"
{FF393560-C2A7-11CF-BFF4-444553540000}="History"
{7BD29E00-76C1-11CF-9DD0-00A0C9034933}="Temporary Internet Files"
{7BD29E01-76C1-11CF-9DD0-00A0C9034933}="Temporary Internet Files"
{CFBFAE00-17A6-11D0-99CB-00C04FD64497}="Microsoft Url Search Hook"
{A2B0DD40-CC59-11d0-A3A5-00C04FD706EC}="IE4 Suite Splash Screen"
{67EA19A0-CCEF-11d0-8024-00C04FD75D13}="CDF Extension Copy Hook"
{131A6951-7F78-11D0-A979-00C04FD705A2}="ISFBand OC"
{9461b922-3c5a-11d2-bf8b-00c04fb93661}="Search Assistant OC"
{3DC7A020-0ACD-11CF-A9BB-00AA004AE837}="The Internet"
{871C5380-42A0-1069-A2EA-08002B30309D}="Internet Name Space"
{EFA24E64-B078-11d0-89E4-00C04FC9E26E}="Explorer Band"
{9E56BE60-C50F-11CF-9A2C-00A0C90A90CE}="Sendmail service"
{9E56BE61-C50F-11CF-9A2C-00A0C90A90CE}="Sendmail service"
{88C6C381-2E85-11D0-94DE-444553540000}="ActiveX Cache Folder"
{E6FB5E20-DE35-11CF-9C87-00AA005127ED}="WebCheck"
{ABBE31D0-6DAE-11D0-BECA-00C04FD940BE}="Subscription Mgr"
{F5175861-2688-11d0-9C5E-00AA00A45957}="Subscription Folder"
{08165EA0-E946-11CF-9C87-00AA005127ED}="WebCheckWebCrawler"
{E3A8BDE6-ABCE-11d0-BC4B-00C04FD929DB}="WebCheckChannelAgent"
{E8BB6DC0-6B4E-11d0-92DB-00A0C90C2BD7}="TrayAgent"
{7D559C10-9FE9-11d0-93F7-00AA0059CE02}="Code Download Agent"
{E6CC6978-6B6E-11D0-BECA-00C04FD940BE}="ConnectionAgent"
{D8BD2030-6FC9-11D0-864F-00AA006809D9}="PostAgent"
{7FC0B86E-5FA7-11d1-BC7C-00C04FD929DB}="WebCheck SyncMgr Handler"
{352EC2B7-8B9A-11D1-B8AE-006008059382}="Shell Application Manager"
{0B124F8F-91F0-11D1-B8B5-006008059382}="Installed Apps Enumerator"
{CFCCC7A0-A282-11D1-9082-006008059382}="Darwin App Publisher"
{e84fda7c-1d6a-45f6-b725-cb260c236066}="Shell Image Verbs"
{66e4e4fb-f385-4dd0-8d74-a2efd1bc6178}="Shell Image Data Factory"
{3F30C968-480A-4C6C-862D-EFC0897BB84B}="GDI+ file thumbnail extractor"
{9DBD2C50-62AD-11d0-B806-00C04FD706EC}="Summary Info Thumbnail handler (DOCFILES)"
{EAB841A0-9550-11cf-8C16-00805F1408F3}="HTML Thumbnail Extractor"
{eb9b1153-3b57-4e68-959a-a3266bc3d7fe}="Shell Image Property Handler"
{CC6EEFFB-43F6-46c5-9619-51D571967F7D}="Web Publishing Wizard"
{add36aa8-751a-4579-a266-d66f5202ccbb}="Print Ordering via the Web"
{6b33163c-76a5-4b6c-bf21-45de9cd503a1}="Shell Publishing Wizard Object"
{58f1f272-9240-4f51-b6d4-fd63d1618591}="Get a Passport Wizard"
{7A9D77BD-5403-11d2-8785-2E0420524153}="User Accounts"
{BD472F60-27FA-11cf-B8B4-444553540000}="Compressed (zipped) Folder Right Drag Handler"
{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}="Compressed (zipped) Folder SendTo Target"
{f39a0dc0-9cc8-11d0-a599-00c04fd64433}="Channel File"
{f3aa0dc0-9cc8-11d0-a599-00c04fd64434}="Channel Shortcut"
{f3ba0dc0-9cc8-11d0-a599-00c04fd64435}="Channel Handler Object"
{f3da0dc0-9cc8-11d0-a599-00c04fd64437}="Channel Menu"
{f3ea0dc0-9cc8-11d0-a599-00c04fd64438}="Channel Properties"
{63da6ec0-2e98-11cf-8d82-444553540000}="FTP Folders Webview"
{883373C3-BF89-11D1-BE35-080036B11A03}="Microsoft DocProp Shell Ext"
{A9CF0EAE-901A-4739-A481-E35B73E47F6D}="Microsoft DocProp Inplace Edit Box Control"
{8EE97210-FD1F-4B19-91DA-67914005F020}="Microsoft DocProp Inplace ML Edit Box Control"
{0EEA25CC-4362-4A12-850B-86EE61B0D3EB}="Microsoft DocProp Inplace Droplist Combo Control"
{6A205B57-2567-4A2C-B881-F787FAB579A3}="Microsoft DocProp Inplace Calendar Control"
{28F8A4AC-BBB3-4D9B-B177-82BFC914FA33}="Microsoft DocProp Inplace Time Control"
{8A23E65E-31C2-11d0-891C-00A024AB2DBB}="Directory Query UI"
{9E51E0D0-6E0F-11d2-9601-00C04FA31A86}="Shell properties for a DS object"
{163FDC20-2ABC-11d0-88F0-00A024AB2DBB}="Directory Object Find"
{F020E586-5264-11d1-A532-0000F8757D7E}="Directory Start/Search Find"
{0D45D530-764B-11d0-A1CA-00AA00C16E65}="Directory Property UI"
{62AE1F9A-126A-11D0-A14B-0800361B1103}="Directory Context Menu Verbs"
{ECF03A33-103D-11d2-854D-006008059367}="MyDocs Copy Hook"
{ECF03A32-103D-11d2-854D-006008059367}="MyDocs Drop Target"
{4a7ded0a-ad25-11d0-98a8-0800361b1103}="MyDocs Properties"
{750fdf0e-2a26-11d1-a3ea-080036587f03}="Offline Files Menu"
{10CFC467-4392-11d2-8DB4-00C04FA31A66}="Offline Files Folder Options"
{AFDB1F70-2A4C-11d2-9039-00C04F8EEB3E}="Offline Files Folder"
{143A62C8-C33B-11D1-84FE-00C04FA34A14}="Microsoft Agent Character Property Sheet Handler"
{ECCDF543-45CC-11CE-B9BF-0080C87CDBA6}="DfsShell"
{60fd46de-f830-4894-a628-6fa81bc0190d}="%DESC_PublishDropTarget%"
{7A80E4A8-8005-11D2-BCF8-00C04F72C717}="MMC Icon Handler"
{0CD7A5C0-9F37-11CE-AE65-08002B2E1262}=".CAB file viewer"
{32714800-2E5F-11d0-8B85-00AA0044F941}="For &People..."
{8DD448E6-C188-4aed-AF92-44956194EB1F}="Windows Media Player Play as Playlist Context Menu Handler"
{CE3FB1D1-02AE-4a5f-A6E9-D9F1B4073E6C}="Windows Media Player Burn Audio CD Context Menu Handler"
{F1B9284F-E9DC-4e68-9D7E-42362A59F0FD}="Windows Media Player Add to Playlist Context Menu Handler"
{5CA3D70E-1895-11CF-8E15-001234567890}="DriveLetterAccess"
{F0CB00CD-5A07-4D91-97F5-A8C92CDA93E4}="Shell Extensions for RealOne Player"
{5464D816-CF16-4784-B9F3-75C0DB52B499}="Yahoo! Mail"
{45994ec6-2fe3-11d4-aace-00c04f9908b1}="Lexmark X125"
{0006F045-0000-0000-C000-000000000046}="Microsoft Outlook Custom Icon Handler"
{02040CD1-EF11-11D5-BC3F-0003473F5BF0}="HotShell Shell Extension"
{5F327514-6C5E-4d60-8F16-D07FA08A78ED}="Auto Update Property Sheet Extension"
{6ec2e0e3-1116-4d47-b0c2-5bdaf4e4c308}="eFax Messenger Plus - Shell Extension"
{C4310306-6AB1-4BA7-B0B6-AB6873CFF4A6}=""
{2559a1f7-21d7-11d4-bdaf-00c04f60b9f0}="Set Program Access and Defaults"
{596AB062-B4D2-4215-9F74-E9109B0A8153}="Previous Versions Property Page"
{9DB7A13C-F208-4981-8353-73CC61AE2783}="Previous Versions"
{692F0339-CBAA-47e6-B5B5-3B84DB604E87}="Extensions Manager Folder"
{AB77609F-2178-4E6F-9C4B-44AC179D937A}="aý Context Menu Shell Extension"

**********************************************************************************
HKEY ROOT CLASSIDS:
Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{C4310306-6AB1-4BA7-B0B6-AB6873CFF4A6}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{C4310306-6AB1-4BA7-B0B6-AB6873CFF4A6}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\CLSID\{C4310306-6AB1-4BA7-B0B6-AB6873CFF4A6}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{C4310306-6AB1-4BA7-B0B6-AB6873CFF4A6}\InprocServer32]
@="C:\\WINDOWS\\system32\\guard.tmp"
ThreadingModel="Apartment"

**********************************************************************************
Files Found are not all bad files:
suzi5316
Active Member
 
Posts: 8
Joined: June 20th, 2005, 1:52 am

Unread postby LDTate » June 22nd, 2005, 7:53 am

Close any programs you have open since this step requires a reboot.

From the l2mfix folder on your desktop, double click l2mfix.bat and select option #2 for Run Fix by typing 2 and then pressing enter, then press any key to reboot your computer. After a reboot, your desktop and icons will appear, then disappear (this is normal). L2mfix will continue to scan your computer and when it's finished, notepad will open with a log. Copy the contents of that log and paste it back into this thread, along with a new hijackthis log.

IMPORTANT: Do NOT run any other files in the l2mfix folder unless you are asked to do so!
User avatar
LDTate
WTT Teacher
WTT Teacher
 
Posts: 3920
Joined: February 18th, 2005, 8:38 pm
Location: Missouri, USA

l2mfix. bat option 2 Thank you

Unread postby suzi5316 » June 22nd, 2005, 6:34 pm

L2Mfix 1.03

Running From:
C:\Documents and Settings\Suzi's Love Slave2\Desktop\l2mfix



RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright (c) 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!

Access Control List for Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify:
(ID-NI) ALLOW Read BUILTIN\Users
(ID-IO) ALLOW Read BUILTIN\Users
(ID-NI) ALLOW Full access BUILTIN\Administrators
(ID-IO) ALLOW Full access BUILTIN\Administrators
(ID-NI) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access CREATOR OWNER



Setting registry permissions:


RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright (c) 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!


Denying C(CI) access for predefined group "Administrators"
- adding new ACCESS DENY entry


Registry Permissions set too:

RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright (c) 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!

Access Control List for Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify:
(CI) DENY --C------- BUILTIN\Administrators
(ID-NI) ALLOW Read BUILTIN\Users
(ID-IO) ALLOW Read BUILTIN\Users
(ID-NI) ALLOW Full access BUILTIN\Administrators
(ID-IO) ALLOW Full access BUILTIN\Administrators
(ID-NI) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access CREATOR OWNER



Setting up for Reboot


Starting Reboot!

C:\Documents and Settings\Suzi's Love Slave2\Desktop\l2mfix
System Rebooted!

Running From:
C:\Documents and Settings\Suzi's Love Slave2\Desktop\l2mfix

killing explorer and rundll32.exe

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright(C) 2002-2003 Craig.Peacock@beyondlogic.org
Killing PID 432 'explorer.exe'

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright(C) 2002-2003 Craig.Peacock@beyondlogic.org
Error, Cannot find a process with an image name of rundll32.exe

Scanning First Pass. Please Wait!

First Pass Completed

Second Pass Scanning

Second pass Completed!
Backing Up: C:\WINDOWS\system32\dn6s01j7e.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\enpol1731.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\gp88l3lu1.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\ktdhela2.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mvp4l97q1.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\guard.tmp
1 file(s) copied.
deleting: C:\WINDOWS\system32\dn6s01j7e.dll
Successfully Deleted: C:\WINDOWS\system32\dn6s01j7e.dll
deleting: C:\WINDOWS\system32\enpol1731.dll
Successfully Deleted: C:\WINDOWS\system32\enpol1731.dll
deleting: C:\WINDOWS\system32\gp88l3lu1.dll
Successfully Deleted: C:\WINDOWS\system32\gp88l3lu1.dll
deleting: C:\WINDOWS\system32\ktdhela2.dll
Successfully Deleted: C:\WINDOWS\system32\ktdhela2.dll
deleting: C:\WINDOWS\system32\mvp4l97q1.dll
Successfully Deleted: C:\WINDOWS\system32\mvp4l97q1.dll
deleting: C:\WINDOWS\system32\guard.tmp
Successfully Deleted: C:\WINDOWS\system32\guard.tmp


Zipping up files for submission:
adding: dn6s01j7e.dll (164 bytes security) (deflated 5%)
adding: enpol1731.dll (164 bytes security) (deflated 4%)
adding: gp88l3lu1.dll (164 bytes security) (deflated 5%)
adding: ktdhela2.dll (164 bytes security) (deflated 4%)
adding: mvp4l97q1.dll (164 bytes security) (deflated 5%)
adding: guard.tmp (164 bytes security) (deflated 5%)
adding: clear.reg (164 bytes security) (deflated 23%)
adding: echo.reg (164 bytes security) (deflated 9%)
adding: direct.txt (164 bytes security) (stored 0%)
adding: lo2.txt (164 bytes security) (deflated 75%)
adding: readme.txt (164 bytes security) (deflated 49%)
adding: report.txt (164 bytes security) (deflated 64%)
adding: test.txt (164 bytes security) (deflated 63%)
adding: test2.txt (164 bytes security) (stored 0%)
adding: test3.txt (164 bytes security) (stored 0%)
adding: test5.txt (164 bytes security) (stored 0%)
adding: xfind.txt (164 bytes security) (deflated 56%)
adding: backregs/C4310306-6AB1-4BA7-B0B6-AB6873CFF4A6.reg (164 bytes security) (deflated 70%)
adding: backregs/shell.reg (164 bytes security) (deflated 73%)

Restoring Registry Permissions:


RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright (c) 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!


Revoking access for predefined group "Administrators"
Inherited ACE can not be revoked here!
Inherited ACE can not be revoked here!


Registry permissions set too:

RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright (c) 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!

Access Control List for Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify:
(ID-NI) ALLOW Read BUILTIN\Users
(ID-IO) ALLOW Read BUILTIN\Users
(ID-NI) ALLOW Full access BUILTIN\Administrators
(ID-IO) ALLOW Full access BUILTIN\Administrators
(ID-NI) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access CREATOR OWNER


Restoring Sedebugprivilege:

Granting SeDebugPrivilege to Administrators ... successful

deleting local copy: dn6s01j7e.dll
deleting local copy: enpol1731.dll
deleting local copy: gp88l3lu1.dll
deleting local copy: ktdhela2.dll
deleting local copy: mvp4l97q1.dll
deleting local copy: guard.tmp

The following Is the Current Export of the Winlogon notify key:
****************************************************************************
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]
Asynchronous=dword:00000000
DllName=""
Impersonate=dword:00000000
Logon="WinLogon"
Logoff="WinLogoff"
Shutdown="WinShutdown"


The following are the files found:
****************************************************************************
C:\WINDOWS\system32\dn6s01j7e.dll
C:\WINDOWS\system32\enpol1731.dll
C:\WINDOWS\system32\gp88l3lu1.dll
C:\WINDOWS\system32\ktdhela2.dll
C:\WINDOWS\system32\mvp4l97q1.dll
C:\WINDOWS\system32\guard.tmp

Registry Entries that were Deleted:
Please verify that the listing looks ok.
If there was something deleted wrongly there are backups in the backreg folder.
****************************************************************************
REGEDIT4

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]
{C4310306-6AB1-4BA7-B0B6-AB6873CFF4A6}=-
[-HKEY_CLASSES_ROOT\CLSID\{C4310306-6AB1-4BA7-B0B6-AB6873CFF4A6}]
REGEDIT4

[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
SV1=""
****************************************************************************
Desktop.ini Contents:
****************************************************************************
****************************************************************************

suzi5316
Active Member
 
Posts: 8
Joined: June 20th, 2005, 1:52 am

Unread postby LDTate » June 22nd, 2005, 6:54 pm

Post a new hijackthis log please.
User avatar
LDTate
WTT Teacher
WTT Teacher
 
Posts: 3920
Joined: February 18th, 2005, 8:38 pm
Location: Missouri, USA

New Hijack This log. Thank you

Unread postby suzi5316 » June 22nd, 2005, 7:22 pm

Logfile of HijackThis v1.99.1
Scan saved at 4:23:51 PM, on 6/22/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\BroadJump\Client Foundation\CFD.exe
C:\Program Files\2Wire\Gateway\2PortalMon.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Common Files\Real\Update_OB\evntsvc.exe
C:\Program Files\Yahoo!\browser\ybrwicon.exe
C:\Program Files\Visual Networks\Visual IP InSight\SBC\IPClient.exe
C:\Program Files\Visual Networks\Visual IP InSight\SBC\IPMon32.exe
C:\WINDOWS\System32\vidctrl\vidctrl.exe
C:\PROGRA~1\Yahoo!\YOP\yop.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\PROGRA~1\Yahoo!\browser\ycommon.exe
C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe
C:\WINDOWS\Plaxo\2.1.0.80\InstallStub.exe
C:\WINDOWS\System32\??sks\nslookup.exe
C:\Program Files\ipee\othb.exe
C:\Program Files\Linksys\WMP11 Config Utility\WMP11Cfg.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
C:\PROGRA~1\Yahoo!\browser\ybrowser.exe
C:\Program Files\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL = http://searchmiracle.com/sp.php
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://yahoo.sbc.com/dsl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://yahoo.sbc.com/dsl
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://yahoo.sbc.com/dsl
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://red.clientapps.yahoo.com/customi ... .yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://red.clientapps.yahoo.com/customi ... .yahoo.com
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by Compaq
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [NAV Agent] C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe
O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
O4 - HKLM\..\Run: [2wSysTray] C:\Program Files\2Wire\Gateway\2PortalMon.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [TkBellExe] C:\Program Files\Common Files\Real\Update_OB\evntsvc.exe -osboot
O4 - HKLM\..\Run: [YBrowser] C:\Program Files\Yahoo!\browser\ybrwicon.exe
O4 - HKLM\..\Run: [IPInSightLAN 02] "C:\Program Files\Visual Networks\Visual IP InSight\SBC\IPClient.exe" -l
O4 - HKLM\..\Run: [IPInSightMonitor 02] "C:\Program Files\Visual Networks\Visual IP InSight\SBC\IPMon32.exe"
O4 - HKLM\..\Run: [vidctrl] C:\WINDOWS\System32\vidctrl\vidctrl.exe
O4 - HKLM\..\Run: [YOP] C:\PROGRA~1\Yahoo!\YOP\yop.exe /autostart
O4 - HKLM\..\Run: [Zone Labs Client] C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKCU\..\Run: [Microsoft Works Update Detection] c:\Program Files\Microsoft Works\WkDetect.exe
O4 - HKCU\..\Run: [PlaxoUpdate] C:\WINDOWS\Plaxo\2.1.0.80\InstallStub.exe -a
O4 - HKCU\..\Run: [Hxjmsdu] C:\WINDOWS\System32\??sks\nslookup.exe
O4 - HKCU\..\Run: [Aaou] C:\Program Files\ipee\othb.exe
O4 - Global Startup: Wireless-B PCI Adapter Utility.lnk = C:\Program Files\Linksys\WMP11 Config Utility\WMP11Cfg.exe
O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
O9 - Extra button: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
O9 - Extra 'Tools' menuitem: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - c:\Program Files\Microsoft Money\System\mnyviewer.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://store.presario.net/scripts/redirectors/presario/storeredir2.dll?s=consumerfav&c=2c02&lc=0409
O16 - DPF: Yahoo! Spades - http://download.games.yahoo.com/games/c ... /st2_x.cab
O16 - DPF: {08BEF711-06DA-48B2-9534-802ECAA2E4F9} (PlxInstall Class) - http://down.plaxo.com/down/release/PlaxoInstall.cab
O16 - DPF: {15589FA1-C456-11CE-BF01-000000000000} - http://www.errornuker.com/products/errn ... taller.exe
O16 - DPF: {23B2247F-DB22-11D3-80F6-00C04F603C43} (WinPointInterface.WinPointImport) - https://www.adin.net/os/Controls/WinPointImport.CAB
O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - http://us.dl1.yimg.com/download.yahoo.c ... st0401.cab
O16 - DPF: {4F4D2E63-0377-4188-8B70-52934FA8A101} (First American File Control) - http://www.leadstoloans.com/activex/fafile.dll
O16 - DPF: {4F4D2E63-0377-4188-8B70-52934FA8A201} (First American Print Control) - http://www.leadstoloans.com/activex/faprint.dll
O16 - DPF: {4F4D2E63-0377-4188-8B70-52934FA8A301} (First American Grid Control) - http://www.leadstoloans.com/activex/fagrid.dll
O16 - DPF: {640B39C1-D713-464F-92C3-75BD972B95EE} - http://www.sidestep.com/get/k42037/sb02a.cab
O16 - DPF: {8569D715-FF88-44BA-8D1D-AD3E59543DDE} (ActiveReports Viewer2) - http://ml.sitexdata.com/mortgageleads/arview2.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.com/activescan/as5/asinst.cab
O16 - DPF: {D18F962A-3722-4B59-B08D-28BB9EB2281E} (PhotosCtrl Class) - http://photos.yahoo.com/ocx/us/yexplorer1_9us.cab
O16 - DPF: {DC187740-46A9-11D5-A815-00B0D0428C0C} - http://ds1.downloadtech.net/cn1060/pcpowerscan.cab
O16 - DPF: {DF05D910-DC8E-403A-93B0-5C866F3200D1} (PtClickLoan Control) - https://www.clickloan.com/CAB/PtClickLo ... ckLoan.cab
O16 - DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} (GpcContainer Class) - https://chlwholesaletraining.webex.com/ ... eatgpc.cab
O16 - DPF: {EB387D2F-E27B-4D36-979E-847D1036C65D} (QDiagHUpdateObj Class) - http://h30043.www3.hp.com/aio/en/check/qdiagh.cab?319
O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
O23 - Service: NICSer_WMP11 - Unknown owner - C:\Program Files\Linksys\WMP11 Config Utility\NICServ.exe
O23 - Service: Norton Unerase Protection (NProtectService) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Speed Disk service - Symantec Corporation - C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe
O23 - Service: YPCService - Yahoo! Inc. - C:\WINDOWS\system32\YPCSER~1.EXE
suzi5316
Active Member
 
Posts: 8
Joined: June 20th, 2005, 1:52 am

Unread postby LDTate » June 22nd, 2005, 7:56 pm

I suggest you do this:


We need to disable your Microsoft AntiSpyware Real-time Protection as it may interfere with the fixes that we need to make.

Open Microsoft AntiSpyware.
Click on Tools, Settings.
In the left pane, click on Real-time Protection.
Under Startup Options uncheck Enable the Microsoft AntiSpyware Security Agents on startup (recommended).
Under Real-time spyware threat protection uncheck Enable real-time spyware threat protection (recommended).
After you uncheck these, click on the Save button and close Microsoft AntiSpyware.
Right click on the Microsoft AntiSpyware icon on the taskbar and select Shutdown Microsoft AntiSpyware.

After all of the fixes are complete it is very important that you enable Real-time Protection again.






Run hijackthis. Hit None of the above, Click Do a System Scan Only. Put a Check in the box on the left side on these:

R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL = http://searchmiracle.com/sp.php

R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://red.clientapps.yahoo.com/customi ... .yahoo.com

R1 - HKLM\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://red.clientapps.yahoo.com/customi ... .yahoo.com

O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime

O4 - HKLM\..\Run: [TkBellExe] C:\Program Files\Common Files\Real\Update_OB\evntsvc.exe -osboot

O4 - HKLM\..\Run: [vidctrl] C:\WINDOWS\System32\vidctrl\vidctrl.exe

O4 - HKCU\..\Run: [Microsoft Works Update Detection] c:\Program Files\Microsoft Works\WkDetect.exe

O4 - HKCU\..\Run: [Hxjmsdu] C:\WINDOWS\System32\??sks\nslookup.exe

O4 - HKCU\..\Run: [Aaou] C:\Program Files\ipee\othb.exe

O16 - DPF: {15589FA1-C456-11CE-BF01-000000000000} - http://www.errornuker.com/products/errn ... taller.exe

O16 - DPF: {4F4D2E63-0377-4188-8B70-52934FA8A101} (First American File Control) - http://www.leadstoloans.com/activex/fafile.dll

O16 - DPF: {4F4D2E63-0377-4188-8B70-52934FA8A201} (First American Print Control) - http://www.leadstoloans.com/activex/faprint.dll

O16 - DPF: {4F4D2E63-0377-4188-8B70-52934FA8A301} (First American Grid Control) - http://www.leadstoloans.com/activex/fagrid.dll

O16 - DPF: {640B39C1-D713-464F-92C3-75BD972B95EE} - http://www.sidestep.com/get/k42037/sb02a.cab

O16 - DPF: {8569D715-FF88-44BA-8D1D-AD3E59543DDE} (ActiveReports Viewer2) - http://ml.sitexdata.com/mortgageleads/arview2.cab

O16 - DPF: {DC187740-46A9-11D5-A815-00B0D0428C0C} - http://ds1.downloadtech.net/cn1060/pcpowerscan.cab

O16 - DPF: {DF05D910-DC8E-403A-93B0-5C866F3200D1} (PtClickLoan Control) - https://www.clickloan.com/CAB/PtClickLo ... ckLoan.cab

O16 - DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} (GpcContainer Class) - https://chlwholesaletraining.webex.com/ ... eatgpc.cab


Close ALL windows and browsers except HijackThis and click "Fix checked"




Restart in Safe Mode:
Restart your computer.

Press F8 after the Power-On Self Test (POST) is done. If the Windows Advanced Options Menu does not appear, try restarting and then pressing F8 several times after the POST screen.
Choose the Safe Mode option from the Windows Advanced Options Menu then press Enter.


Double-click My Computer.
Click the Tools menu, and then click Folder Options.
Click the View tab.
Clear "Hide file extensions for known file types."
Under the "Hidden files" folder, select "Show hidden files and folders."
Clear "Hide protected operating system files."
Click Apply, and then click OK.





Search for and delete these folders if listed:
C:\WINDOWS\System32\vidctrl
C:\Program Files\ipee
C:\WINDOWS\System32\??sks




Open C:\Windows\Prefetch\ Delete ALL files in this folder.




Do this also if these Temp Folders are part of your OS.

Also in safe mode navigate to the C:\Windows\Temp folder. Open the Temp folder and go to Edit > Select All then Edit > Delete to delete the entire contents of the Temp folder.


Next navigate to the C:\Documents and Settings\(EVERY LISTED USER)\Local Settings\Temp folder. Open the Temp folder and go to Edit > Select All then Edit > Delete to delete the entire contents of the Temp folder.

Finally go to Control Panel > Internet Options. On the General tab under "Temporary Internet Files" Click "Delete Files". Put a check by "Delete Offline Content" and click OK. Click on the Programs tab then click the "Reset Web Settings" button. Click Apply then OK.


Empty the Recycle Bin

Reboot and "copy/paste" a new HijackThis log file into this thread.

Also please describe how your computer behaves at the moment.
User avatar
LDTate
WTT Teacher
WTT Teacher
 
Posts: 3920
Joined: February 18th, 2005, 8:38 pm
Location: Missouri, USA

Latest hijack this log. Thank you.

Unread postby suzi5316 » June 23rd, 2005, 12:20 am

Computer acting fine now. No pop ups. No strange .exe's trying to access the Internet thru the firewall. Thank you! Thank you! My husband couldn't believe that you guys do this for free. What effort and dedication-thank you so much. Suzi

Logfile of HijackThis v1.99.1
Scan saved at 9:14:09 PM, on 6/22/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\2Wire\Gateway\2PortalMon.exe
C:\Program Files\Yahoo!\browser\ybrwicon.exe
C:\Program Files\Visual Networks\Visual IP InSight\SBC\IPClient.exe
C:\PROGRA~1\Yahoo!\browser\ycommon.exe
C:\Program Files\Visual Networks\Visual IP InSight\SBC\IPMon32.exe
C:\PROGRA~1\Yahoo!\YOP\yop.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\Program Files\Microsoft AntiSpyware\gcasServ.exe
C:\WINDOWS\Plaxo\2.1.0.80\InstallStub.exe
C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://yahoo.sbc.com/dsl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://yahoo.sbc.com/dsl
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://yahoo.sbc.com/dsl
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by Compaq
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [NAV Agent] C:\PROGRA~1\NORTON~1\NORTON~1\navapw32.exe
O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
O4 - HKLM\..\Run: [2wSysTray] C:\Program Files\2Wire\Gateway\2PortalMon.exe
O4 - HKLM\..\Run: [YBrowser] C:\Program Files\Yahoo!\browser\ybrwicon.exe
O4 - HKLM\..\Run: [IPInSightLAN 02] "C:\Program Files\Visual Networks\Visual IP InSight\SBC\IPClient.exe" -l
O4 - HKLM\..\Run: [IPInSightMonitor 02] "C:\Program Files\Visual Networks\Visual IP InSight\SBC\IPMon32.exe"
O4 - HKLM\..\Run: [YOP] C:\PROGRA~1\Yahoo!\YOP\yop.exe /autostart
O4 - HKLM\..\Run: [Zone Labs Client] C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKCU\..\Run: [PlaxoUpdate] C:\WINDOWS\Plaxo\2.1.0.80\InstallStub.exe -a
O4 - Global Startup: Wireless-B PCI Adapter Utility.lnk = C:\Program Files\Linksys\WMP11 Config Utility\WMP11Cfg.exe
O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
O9 - Extra button: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
O9 - Extra 'Tools' menuitem: Yahoo! Login - {2499216C-4BA5-11D5-BD9C-000103C116D5} - C:\Program Files\Yahoo!\Common\ylogin.dll
O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes.dll
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - c:\Program Files\Microsoft Money\System\mnyviewer.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://store.presario.net/scripts/redirectors/presario/storeredir2.dll?s=consumerfav&c=2c02&lc=0409
O16 - DPF: Yahoo! Spades - http://download.games.yahoo.com/games/c ... /st2_x.cab
O16 - DPF: {08BEF711-06DA-48B2-9534-802ECAA2E4F9} (PlxInstall Class) - http://down.plaxo.com/down/release/PlaxoInstall.cab
O16 - DPF: {23B2247F-DB22-11D3-80F6-00C04F603C43} (WinPointInterface.WinPointImport) - https://www.adin.net/os/Controls/WinPointImport.CAB
O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - http://us.dl1.yimg.com/download.yahoo.c ... st0401.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.com/activescan/as5/asinst.cab
O16 - DPF: {D18F962A-3722-4B59-B08D-28BB9EB2281E} (PhotosCtrl Class) - http://photos.yahoo.com/ocx/us/yexplorer1_9us.cab
O16 - DPF: {EB387D2F-E27B-4D36-979E-847D1036C65D} (QDiagHUpdateObj Class) - http://h30043.www3.hp.com/aio/en/check/qdiagh.cab?319
O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
O23 - Service: NICSer_WMP11 - Unknown owner - C:\Program Files\Linksys\WMP11 Config Utility\NICServ.exe
O23 - Service: Norton Unerase Protection (NProtectService) - Symantec Corporation - C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Speed Disk service - Symantec Corporation - C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe
O23 - Service: YPCService - Yahoo! Inc. - C:\WINDOWS\system32\YPCSER~1.EXE
suzi5316
Active Member
 
Posts: 8
Joined: June 20th, 2005, 1:52 am

Unread postby LDTate » June 23rd, 2005, 7:47 am

Open Microsoft AntiSpyware.
Click on Tools, Settings.
In the left pane, click on Real-time Protection.
Under Startup Options check Enable the Microsoft AntiSpyware Security Agents on startup (recommended).
Under Real-time spyware threat protection check Enable real-time spyware threat protection (recommended).
After you uncheck these, click on the Save button and close Microsoft AntiSpyware.

After all of the fixes are complete it is very important that you enable Real-time Protection again.


Thank you! Thank you! My husband couldn't believe that you guys do this for free. What effort and dedication-thank you so much. Suzi
Just spread the word about our web site :D


Good Job ;)


Log looks good :D How is it running any issues?

Note: This will remove all previous Restore Points

Turn off System Restore:

On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
Check Turn off System Restore.
Click Apply, and then click OK.

Restart your computer, turn it back on.

On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
Remove the Check Turn off System Restore.
Click Apply, and then click OK.

Click Start> My Computer, select the Tools menu and then Folder Options, after the new window appears select the View tab…]
This time select the: Restore Defaults
Select: Apply, and click OK




If you dont have these three programs I would recommend that you get them. [color=red]Spywareblaster[/color], [color=red]Spywareguard[/color] and [color=red]IESPY AD[/color]. They will add 1000's of sites to your resticted zone and block some hijacks from happening. I also have a FREE FIREWALL and FREE ANTI VIRUS if you need one.

It is critical to have both a firewall and anti virus to protect your system.

Keep your system up to date and run Adaware & Spybot, once a week works, and hopefully you will be ok from here on. Both are available below.

Safe Surfing. :D
User avatar
LDTate
WTT Teacher
WTT Teacher
 
Posts: 3920
Joined: February 18th, 2005, 8:38 pm
Location: Missouri, USA
Advertisement
Register to Remove

Next

  • Similar Topics
    Replies
    Views
    Last post

Return to Infected? Virus, malware, adware, ransomware, oh my!



Who is online

Users browsing this forum: No registered users and 26 guests

Contact us:

Advertisements do not imply our endorsement of that product or service. Register to remove all ads. The forum is run by volunteers who donate their time and expertise. We make every attempt to ensure that the help and advice posted is accurate and will not cause harm to your computer. However, we do not guarantee that they are accurate and they are to be used at your own risk. All trademarks are the property of their respective owners.

Member site: UNITE Against Malware