Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Fake "Registry cleaner" popups


  • Please log in to reply

#1
Belariad

Belariad

    New Member

  • Member
  • Pip
  • 2 posts
After following a lot of helpful info from these forums i got rid of a whole bunch of spyware problems i was having problems with. but now there is just one thing left that keeps popping up from time to time telling me i have registry problems and i need a registry cleaner. whenever i close it another window pops up verifying if i really dont want to download and install this "Great!" registry cleaner. i have tried windows defender, ewidos, spybot, lavasoft, and cleanup! (that exclamation is part of the name, not my excitement hehehe)

And not that this next one is a huge deal... but ever since i did a bunch of stuff to get rid of all that other spyware, i can no longer pick new files to set as my desktop pictures in the "Display Properties > Dekstop". I can use ones i used to have there from before, but cannot successfully choose a new one, and even the old ones that are still there all look like files that have no associations (like a file with no extension). i know it's not really a spyware problem, but thought, hey, maybe it's a common thing after getting rid of some spyware?

anyways, the first issue is my main and real issue and i have a HiJackThis log if that helps, here it is:

Logfile of HijackThis v1.99.1
Scan saved at 12:32:46 AM, on 3/20/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Daemon Tools\daemon.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
C:\Program Files\Windows Media Connect 2\WMCCFG.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktopIndex.exe
C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\ewido anti-malware\ewidoctrl.exe
C:\Program Files\Google\Google Talk\googletalk.exe
C:\Documents and Settings\Delbert\Application Data\?ymantec\logonui.exe
C:\PROGRA~1\COMMON~1\YMBOLS~1\ati2evxx.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\ewido anti-malware\ewidoguard.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktopDisplay.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktopCrawl.exe
C:\Program Files\Google\Web Accelerator\GoogleWebAccWarden.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Google\Web Accelerator\googlewebaccclient.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Winamp\Winamp.exe
C:\Program Files\MSN Messenger\msnmsgr.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Hijackthis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://localhost:9100/proxy.pac
O3 - Toolbar: Google Web Accelerator - {DB87BFA2-A2E3-451E-8E5A-C89982D87CBF} - C:\Program Files\Google\Web Accelerator\GoogleWebAccToolbar.dll (file missing)
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll (file missing)
O4 - HKLM\..\Run: [DAEMON Tools-1033] "C:\Program Files\Daemon Tools\daemon.exe" -lang 1033
O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
O4 - HKLM\..\Run: [x3watch] C:\Program Files\X3watch\x3watch.exe
O4 - HKLM\..\Run: [Windows Media Connect 2] "C:\Program Files\Windows Media Connect 2\WMCCFG.exe" /StartQuiet
O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\System32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [googletalk] "C:\Program Files\Google\Google Talk\googletalk.exe" /autostart
O4 - HKCU\..\Run: [Vaewgiz] C:\Documents and Settings\Delbert\Application Data\?ymantec\logonui.exe
O4 - HKCU\..\Run: [Thre] "C:\PROGRA~1\COMMON~1\YMBOLS~1\ati2evxx.exe" -vt ndrv
O4 - Startup: MSNP13 Downgrader.lnk = ?
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: AutoCAD Startup Accelerator.lnk = C:\Program Files\Common Files\Autodesk Shared\acstart16.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: Run Google Web Accelerator.lnk = C:\Program Files\Google\Web Accelerator\GoogleWebAccWarden.exe
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar2.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar2.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar2.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar2.dll/cmtrans.html
O16 - DPF: {0D41B8C5-2599-4893-8183-00195EC8D5F9} (asusTek_sysctrl Class) - http://support.asus....ek_sys_ctrl.cab
O16 - DPF: {13EC55CF-D993-475B-9ACA-F4A384957956} - https://www.windowso...nSSWebAgent.CAB
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=39204
O16 - DPF: {6E5A37BF-FD42-463A-877C-4EB7002E68AE} (Housecall ActiveX 6.5) - http://housecall65.t...ivex/hcImpl.cab
O16 - DPF: {74CD40EA-EF77-4BAD-808A-B5982DA73F20} - http://yax-download.....cab?refid=1123
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zon...nt.cab31267.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoft...free/asinst.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn...pDownloader.cab
O16 - DPF: {F6BF0D00-0B2A-4A75-BF7B-F385591623AF} (Solitaire Showdown Class) - http://messenger.zon...wn.cab31267.cab
O16 - DPF: {FE0BD779-44EE-4A4B-AA2E-743C63F2E5E6} (IWinAmpActiveX Class) - http://pdl.stream.ao.../ampx_en_dl.cab
O18 - Protocol: livecall - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
O18 - Protocol: talkto - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~1\GOEC62~1.DLL
O20 - Winlogon Notify: wineil32 - wineil32.dll (file missing)
O20 - Winlogon Notify: WRNotifier - WRLogonNTF.dll (file missing)
O23 - Service: Adobe LM Service - Unknown owner - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Autodesk Licensing Service - Autodesk - C:\Program Files\Common Files\Autodesk Shared\Service\AdskScSrv.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido anti-malware\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido anti-malware\ewidoguard.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
  • 0

Advertisements


#2
didom

didom

    Member 1K

  • Member
  • PipPipPipPip
  • 1,919 posts
Download smitRem.exe ©noahdfear, and save the file to your desktop.
Double click on the file to extract it to it's own folder on the desktop.

Place a shortcut to Panda ActiveScan on your desktop (in Internet Explorer, right click on Panda ActiveScan link select "Copy Shortcut" then right click on your desktop and select "Paste Shortcut" or in FireFox right-click the link and select "Save Link As" and save it to your desktop).

Please download the trial version of ewido anti-malware here:
http://www.ewido.net/en/download/

Please read Ewido Setup Instructions
Install it, and update the definitions to the newest files. Do NOT run a scan yet.

If you have not already installed Ad-Aware SE 1.06, follow these download and setup instructions, otherwise, check for updates:
Ad-Aware SE Setup
Don't run it yet!

Download FixSF.reg to your desktop by right clicking on the following link and then selecting Save Link As or Save File as, depending on your browser. Now double click on the FixSF.reg file. When it asks if you would like to merge the information, press the Yes button and then the OK button.

Next, please reboot your computer in SafeMode by doing the following:
  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, press F8.
  • Instead of Windows loading as normal, a menu should appear
  • Select the first option, to run Windows in Safe Mode.
Go to add/remove programs in your control panel and uninstall(if there):

SpyFalcon

***if the computer asks for you to let it reboot DO NOT allow it.


Navigate to the following files/folders and delete these(if there):
C :\Windows\System32\ginuerep.dll
C :\Windows\System32\dxmpp.dll
C:\Program Files\SpyFalcon

Open the smitRem folder, then double click the RunThis.bat file to start the tool. Follow the prompts on screen.
Wait for the tool to complete and disk cleanup to finish.

The tool will create a log named smitfiles.txt in the root of your drive, eg; Local Disk C: or partition where your operating system is installed. Please post that log along with all others requested in your next reply.

Now open Ad-aware and do a full scan. Remove all it finds.

Run Ewido:
  • Click on scanner
  • Click on Complete System Scan and the scan will begin.
  • While the scan is in progress you will be prompted to clean files, click OK
  • When it asks if you want to clean the first file, put a check in the lower left corner of the box that says "Perform action on all infections" then choose clean and click OK.
  • Once the scan has completed, there will be a button located on the bottom of the screen named Save report
  • Click Save report.
  • Save the report .txt file to your desktop.
Close ewido anti-malware.

Next go to Control Panel click Display > Desktop > Customize Desktop > Web > Uncheck "Security Info" if present.

Reboot back into Windows and click the Panda ActiveScan shortcut.
  • Once you are on the Panda site click the Scan your PC button.
  • A new window will open...click the Check Now button.
    • Enter your Country
    • Enter your State/Province
    • Enter your e-mail address and click send
    • Select either Home User or Company
    • Click the big Scan Now button
  • If it wants to install an ActiveX component allow it
  • It will start downloading the files it requires for the scan (Note: It may take a couple of minutes)
  • When the download is complete, click on My Computer to start the scan
  • When the scan completes, if anything malicious is detected, click the See Report button, then Save Report and save it to a convenient location.
Post the contents of the Panda scan report, along with a new HijackThis Log, the contents of smitfiles.txt and the Ewido Log by using Add Reply.
Let us know if any problems persist.
  • 0

#3
Belariad

Belariad

    New Member

  • Topic Starter
  • Member
  • Pip
  • 2 posts
Hey, ok I did what you asked in the following order. First I ran FixSF.reg, then I re-started in safe mode and opened the SmitRem folder and ran the RunThis.bat. I then ran Adaware (after having updated it already) but it wouldn't run Ewidos properly. I then restarted in normal mode, ran the Panda Activescan online and installed Ewidos properly. I then restarted in safe mode and ran Ewidos. So from all of that, here are the reports you wanted (in the order completed them)

SmitRem log file (I deleted some blank spaces just for posting length):


smitRem © log file
version 2.8

by noahdfear


Microsoft Windows XP [Version 5.1.2600]
The current date is: Wed 03/22/2006
The current time is: 0:35:30.10

Running from
C:\Documents and Settings\Delbert\Desktop\smitRem

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Pre-run SharedTask Export

(GetSTS.exe) SharedTaskScheduler exporter by Lawrence Abrams (Grinler)
Copyright© 2006 BleepingComputer.com

Registry Pseudo-Format Mode (Not a valid reg file):

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
"{438755C2-A8BA-11D1-B96B-00A0C90312E1}"="Browseui preloader"
"{8C7461EF-2B13-11d2-BE35-3078302C2030}"="Component Categories cache daemon"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{438755C2-A8BA-11D1-B96B-00A0C90312E1}\InProcServer32]
@="%SystemRoot%\System32\browseui.dll"


[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8C7461EF-2B13-11d2-BE35-3078302C2030}\InProcServer32]
@="%SystemRoot%\System32\browseui.dll"


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

checking for ShudderLTD key

ShudderLTD key not present!

checking for PSGuard.com key


PSGuard.com key not present!


checking for WinHound.com key


WinHound.com key not present!

spyaxe uninstaller NOT present
Winhound uninstaller NOT present
SpywareStrike uninstaller NOT present

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Existing Pre-run Files

~~~ Program Files ~~~
~~~ Shortcuts ~~~
~~~ Favorites ~~~
~~~ system32 folder ~~~
~~~ Icons in System32 ~~~
~~~ Windows directory ~~~
~~~ Drive root ~~~
~~~ Miscellaneous Files/folders ~~~

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 [email protected]
Killing PID 828 'explorer.exe'
Killing PID 828 'explorer.exe'

Starting registry repairs

Registry repairs complete

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

SharedTask Export after registry fix

(GetSTS.exe) SharedTaskScheduler exporter by Lawrence Abrams (Grinler)
Copyright© 2006 BleepingComputer.com

Registry Pseudo-Format Mode (Not a valid reg file):

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
"{438755C2-A8BA-11D1-B96B-00A0C90312E1}"="Browseui preloader"
"{8C7461EF-2B13-11d2-BE35-3078302C2030}"="Component Categories cache daemon"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{438755C2-A8BA-11D1-B96B-00A0C90312E1}\InProcServer32]
@="%SystemRoot%\System32\browseui.dll"


[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8C7461EF-2B13-11d2-BE35-3078302C2030}\InProcServer32]
@="%SystemRoot%\System32\browseui.dll"


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Deleting files

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Remaining Post-run Files

~~~ Program Files ~~~
~~~ Shortcuts ~~~
~~~ Favorites ~~~
~~~ system32 folder ~~~
~~~ Icons in System32 ~~~
~~~ Windows directory ~~~
~~~ Drive root ~~~
~~~ Miscellaneous Files/folders ~~~
~~~ Wininet.dll ~~~

CLEAN! :whistling:

Next came Activescan report:


Incident Status Location

Adware:Adware/PurityScan Not disinfected C:\PROGRA~1\COMMON~1\YMBOLS~1\ATI2EVXX.EXE
Adware:Adware/PurityScan Not disinfected C:\PROGRA~1\COMMON~1\YMBOLS~1\ati2evxx.exe
Spyware:Cookie/Hbmediapro Not disinfected C:\Documents and Settings\Delbert\Cookies\[email protected][2].txt
Spyware:Cookie/Apmebf Not disinfected C:\Documents and Settings\Delbert\Cookies\[email protected][2].txt
Spyware:Cookie/Adserver Not disinfected C:\Documents and Settings\Delbert\Cookies\[email protected][1].txt
Spyware:Cookie/Com.com Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[.com.com/]
Spyware:Cookie/Atlas DMT Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[.atdmt.com/]
Spyware:Cookie/Falkag Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[.as-us.falkag.net/]
Spyware:Cookie/Doubleclick Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[.doubleclick.net/]
Spyware:Cookie/BurstBeacon Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[www.burstbeacon.com/]
Spyware:Cookie/Serving-sys Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[.serving-sys.com/]
Spyware:Cookie/Atwola Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[.atwola.com/]
Spyware:Cookie/Tribalfusion Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[.tribalfusion.com/]
Spyware:Cookie/Valueclick Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[.valueclick.com/]
Spyware:Cookie/Casalemedia Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[.casalemedia.com/]
Spyware:Cookie/Advertising Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[.advertising.com/]
Spyware:Cookie/RealMedia Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[.realmedia.com/]
Spyware:Cookie/YieldManager Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[ad.yieldmanager.com/]
Spyware:Cookie/Adrevolver Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[.adrevolver.com/]
Spyware:Cookie/Toplist Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[.toplist.cz/]
Spyware:Cookie/Statcounter Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[.statcounter.com/]
Spyware:Cookie/Zedo Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[.zedo.com/]
Spyware:Cookie/2o7 Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[.2o7.net/]
Spyware:Cookie/PointRoll Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[.ads.pointroll.com/]
Spyware:Cookie/Mediaplex Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[.mediaplex.com/]
Spyware:Cookie/QuestionMarket Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[.questionmarket.com/]
Spyware:Cookie/Com.com Not disinfected C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt[]
Adware:Adware/PurityScan Not disinfected C:\Documents and Settings\Delbert\Application Data\?ymantec\logonui.exe
Spyware:Cookie/Hbmediapro Not disinfected C:\Documents and Settings\Delbert\Cookies\[email protected][2].txt
Spyware:Cookie/Apmebf Not disinfected C:\Documents and Settings\Delbert\Cookies\[email protected][2].txt
Spyware:Cookie/Adserver Not disinfected C:\Documents and Settings\Delbert\Cookies\[email protected][1].txt
Potentially unwanted tool:Application/Processor Not disinfected C:\Documents and Settings\Delbert\Desktop\smitRem\Process.exe
Potentially unwanted tool:Application/Processor Not disinfected C:\Documents and Settings\Delbert\Desktop\smitRem.exe[Process.exe]

Then followed by Ewidos scan report:

---------------------------------------------------------
ewido anti-malware - Scan report
---------------------------------------------------------

+ Created on: 12:07:56 AM, 3/23/2006
+ Report-Checksum: 29DC11A6

+ Scan result:

:mozilla.9:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Yieldmanager : Cleaned without backup
:mozilla.10:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Yieldmanager : Cleaned without backup
:mozilla.28:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Com : Cleaned without backup
:mozilla.32:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Com : Cleaned without backup
:mozilla.33:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Com : Cleaned without backup
:mozilla.36:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Atdmt : Cleaned without backup
:mozilla.44:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Falkag : Cleaned without backup
:mozilla.45:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Falkag : Cleaned without backup
:mozilla.46:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Tacoda : Cleaned without backup
:mozilla.47:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Tacoda : Cleaned without backup
:mozilla.48:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Tacoda : Cleaned without backup
:mozilla.49:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Falkag : Cleaned without backup
:mozilla.50:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Falkag : Cleaned without backup
:mozilla.51:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Falkag : Cleaned without backup
:mozilla.52:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Tacoda : Cleaned without backup
:mozilla.53:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Doubleclick : Cleaned without backup
:mozilla.55:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Burstbeacon : Cleaned without backup
:mozilla.63:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Serving-sys : Cleaned without backup
:mozilla.64:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Serving-sys : Cleaned without backup
:mozilla.65:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Serving-sys : Cleaned without backup
:mozilla.66:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Serving-sys : Cleaned without backup
:mozilla.68:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Tribalfusion : Cleaned without backup
:mozilla.69:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Tribalfusion : Cleaned without backup
:mozilla.80:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Valueclick : Cleaned without backup
:mozilla.81:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Valueclick : Cleaned without backup
:mozilla.82:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Casalemedia : Cleaned without backup
:mozilla.83:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Casalemedia : Cleaned without backup
:mozilla.84:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Advertising : Cleaned without backup
:mozilla.85:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Advertising : Cleaned without backup
:mozilla.86:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Advertising : Cleaned without backup
:mozilla.89:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Adrevolver : Cleaned without backup
:mozilla.90:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Adrevolver : Cleaned without backup
:mozilla.91:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Adrevolver : Cleaned without backup
:mozilla.92:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Adrevolver : Cleaned without backup
:mozilla.93:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Adrevolver : Cleaned without backup
:mozilla.101:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Bridgetrack : Cleaned without backup
:mozilla.102:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Bridgetrack : Cleaned without backup
:mozilla.103:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Bridgetrack : Cleaned without backup
:mozilla.104:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Bridgetrack : Cleaned without backup
:mozilla.105:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Bridgetrack : Cleaned without backup
:mozilla.106:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Bridgetrack : Cleaned without backup
:mozilla.109:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Statcounter : Cleaned without backup
:mozilla.110:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Statcounter : Cleaned without backup
:mozilla.114:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Zedo : Cleaned without backup
:mozilla.115:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Zedo : Cleaned without backup
:mozilla.116:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Zedo : Cleaned without backup
:mozilla.117:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Zedo : Cleaned without backup
:mozilla.118:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Zedo : Cleaned without backup
:mozilla.120:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Com : Cleaned without backup
:mozilla.121:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.2o7 : Cleaned without backup
:mozilla.124:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Pointroll : Cleaned without backup
:mozilla.125:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Pointroll : Cleaned without backup
:mozilla.126:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Pointroll : Cleaned without backup
:mozilla.127:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Pointroll : Cleaned without backup
:mozilla.128:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Mediaplex : Cleaned without backup
:mozilla.129:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Questionmarket : Cleaned without backup
:mozilla.136:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.Masterstats : Cleaned without backup
:mozilla.140:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.2o7 : Cleaned without backup
:mozilla.143:C:\Documents and Settings\Delbert\Application Data\Mozilla\Firefox\Profiles\pfps1gce.default\cookies.txt -> TrackingCookie.2o7 : Cleaned without backup
C:\Documents and Settings\Delbert\Application Data\Ѕymantec\logonui.exe -> Adware.PurityScan : Cleaned without backup
C:\Documents and Settings\Delbert\Cookies\[email protected][1].txt -> TrackingCookie.Adserver : Cleaned without backup
C:\Program Files\Common Files\ѕymbols\ati2evxx.exe -> Downloader.PurityScan.cc : Cleaned without backup


::Report End

...and lastly, a new HiJackThis report:

Logfile of HijackThis v1.99.1
Scan saved at 12:29:08 AM, on 3/23/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktopIndex.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\MSN Messenger\MsnMsgr.Exe
C:\Program Files\Google\Google Talk\googletalk.exe
C:\Program Files\Google\Web Accelerator\GoogleWebAccWarden.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktopDisplay.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktopCrawl.exe
C:\PROGRA~1\MOZILL~1\FIREFOX.EXE
C:\Program Files\ewido anti-malware\ewidoctrl.exe
C:\Program Files\ewido anti-malware\ewidoguard.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Google\Web Accelerator\googlewebaccclient.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Hijackthis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://localhost:9100/proxy.pac
O3 - Toolbar: Google Web Accelerator - {DB87BFA2-A2E3-451E-8E5A-C89982D87CBF} - C:\Program Files\Google\Web Accelerator\GoogleWebAccToolbar.dll (file missing)
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll (file missing)
O4 - HKLM\..\Run: [DAEMON Tools-1033] "C:\Program Files\Daemon Tools\daemon.exe" -lang 1033
O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
O4 - HKLM\..\Run: [x3watch] C:\Program Files\X3watch\x3watch.exe
O4 - HKLM\..\Run: [Windows Media Connect 2] "C:\Program Files\Windows Media Connect 2\WMCCFG.exe" /StartQuiet
O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\System32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [googletalk] "C:\Program Files\Google\Google Talk\googletalk.exe" /autostart
O4 - HKCU\..\Run: [Vaewgiz] C:\Documents and Settings\Delbert\Application Data\?ymantec\logonui.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Run Google Web Accelerator.lnk = C:\Program Files\Google\Web Accelerator\GoogleWebAccWarden.exe
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar2.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar2.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar2.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar2.dll/cmtrans.html
O16 - DPF: {0D41B8C5-2599-4893-8183-00195EC8D5F9} (asusTek_sysctrl Class) - http://support.asus....ek_sys_ctrl.cab
O16 - DPF: {13EC55CF-D993-475B-9ACA-F4A384957956} - https://www.windowso...nSSWebAgent.CAB
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=39204
O16 - DPF: {6E5A37BF-FD42-463A-877C-4EB7002E68AE} (Housecall ActiveX 6.5) - http://housecall65.t...ivex/hcImpl.cab
O16 - DPF: {74CD40EA-EF77-4BAD-808A-B5982DA73F20} - http://yax-download.....cab?refid=1123
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zon...nt.cab31267.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoft...free/asinst.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn...pDownloader.cab
O16 - DPF: {F6BF0D00-0B2A-4A75-BF7B-F385591623AF} (Solitaire Showdown Class) - http://messenger.zon...wn.cab31267.cab
O16 - DPF: {FE0BD779-44EE-4A4B-AA2E-743C63F2E5E6} (IWinAmpActiveX Class) - http://pdl.stream.ao.../ampx_en_dl.cab
O18 - Protocol: livecall - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
O18 - Protocol: talkto - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~1\GOEC62~1.DLL
O20 - Winlogon Notify: wineil32 - wineil32.dll (file missing)
O20 - Winlogon Notify: WRNotifier - WRLogonNTF.dll (file missing)
O23 - Service: Adobe LM Service - Unknown owner - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Autodesk Licensing Service - Autodesk - C:\Program Files\Common Files\Autodesk Shared\Service\AdskScSrv.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido anti-malware\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido anti-malware\ewidoguard.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPodService - Unknown owner - C:\Program Files\iPod\bin\iPodService.exe (file missing)
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe

Please let me know what else I can do (if it's not already gone that is). Thanks for your help!
  • 0

#4
didom

didom

    Member 1K

  • Member
  • PipPipPipPip
  • 1,919 posts
Please print out or copy this page to Notepad. Make sure to work through the fixes in the exact order in which they are mentioned below. If there's anything that you don't understand, ask your question(s) before proceeding with the fixes.

Step #1

Scan again with HijackThis and check the following items:
O3 - Toolbar: Google Web Accelerator - {DB87BFA2-A2E3-451E-8E5A-C89982D87CBF} - C:\Program Files\Google\Web Accelerator\GoogleWebAccToolbar.dll (file missing)
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll (file missing)

O4 - HKCU\..\Run: [Vaewgiz] C:\Documents and Settings\Delbert\Application Data\?ymantec\logonui.exe

O20 - Winlogon Notify: wineil32 - wineil32.dll (file missing)
O20 - Winlogon Notify: WRNotifier - WRLogonNTF.dll (file missing)

After checking these items, close all browser windows except HijackThis and click "Fix checked".

Step #2

Download CCleaner and install it. (Please do not run the CCleaner utility yet.)

Step #3

We need to make sure all hidden files are showing so please:
  • Click Start.
  • Open My Computer.
  • Select the Tools menu and click Folder Options.
  • Select the View tab.
  • Under the Hidden files and folders heading select Show hidden files and folders.
  • Uncheck the Hide file extensions for known types option.
  • Uncheck the Hide protected operating system files (recommended) option.
  • Click Yes to confirm.
  • Click OK.
Step #4

Reboot Your System in Safe Mode:
  • Restart the computer.
  • As soon as BIOS is loaded begin tapping the F8 key until the Advanced Options menu appears.
  • Use the arrow keys to select the Safe Mode menu item.
  • Press the Enter key.
Step #4

Find and delete these files and folders (if they are still there):
C:\Program Files\Common Files\Ñ•ymbols <= this folder
C:\Documents and Settings\Delbert\Application Data\Ð…ymantec <= this folder



Step #5

While still in safe mode Start Ccleaner. click "Options", click the "Advanced" tab
Uncheck: "Only delete files older than 48 hrs.", click Ok
Click "Cleaner" and click Run Cleaner (bottom right).

Reboot your computer normally.

Step #6

Please go HERE to run Panda's ActiveScan
  • Once you are on the Panda site click the Scan your PC button
  • A new window will open...click the Check Now button
  • Enter your Country
  • Enter your State/Province
  • Enter your e-mail address and click send
  • Select either Home User or Company
  • Click the big Scan Now button
  • If it wants to install an ActiveX component allow it
  • It will start downloading the files it requires for the scan (Note: It may take a couple of minutes)
  • When download is complete, click on My Computer to start the scan
  • When the scan completes, if anything malicious is detected, click the See Report button, then Save Report and save it to a convenient location. Post the contents of the ActiveScan report
Start HijackThis, perform a new scan and save the log file.

Use the Add Reply button to post your new logs back here along with details of any problems you encountered performing the above steps and I will review it when it comes in.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP