Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

Pop-ups from Zeno, IntelliTxt and possibly MORE spyware [RESOLVED


  • This topic is locked This topic is locked

#1
liannenc

liannenc

    New Member

  • Member
  • Pip
  • 5 posts
From the pop-ups and highlighted text I've been getting, it's obvious that I've picked up some nasty spyware. I've followed your instructions for running CleanUp, Ad-aware, CW Shredder, Spybot and I already have AVG installed (every so often I get a "Virus Detected!" message from AVG... I've selected "move to vault" but the stuff apparently keeps propagating elsewhere, because no matter how many times I've run scans, fixed the problems and rebooted, I'm still getting Zeno pop-ups, highlighted text from IntelliTxt, and popups from some other spyware that I can't identify. I did run Hijack This and here is my log:

Logfile of HijackThis v1.99.1
Scan saved at 11:05:57 PM, on 3/28/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\WINDOWS\system32\cisvc.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\System32\WLTRYSVC.EXE
C:\WINDOWS\System32\bcmwltry.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\pctspk.exe
C:\Program Files\Apoint\Apoint.exe
C:\WINDOWS\System32\DSentry.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe
C:\Program Files\BroadJump\Client Foundation\CFD.exe
C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
C:\WINDOWS\SM1BG.EXE
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\WINDOWS\system32\slk8x2peu.exe
C:\Program Files\FinePixViewer\QuickDCF.exe
C:\Program Files\Apoint\Apntex.exe
c:\windows\system32\dwdsregt.exe
C:\WINDOWS\system32\swinrraf.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS\system32\cidaemon.exe
C:\Documents and Settings\Lianne Meilhac\Desktop\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dellnet.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.belgacom.net
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.dellnet.com
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.dellnet.com/
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,uxumimf.exe
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: web compressor - {23FB5ADD-DA37-4a40-9FC0-B0E2384CDE92} - C:\WINDOWS\system32\nstE.dll
O2 - BHO: (no name) - {243B17DE-77C7-46BF-B94B-0B5F309A0E64} - C:\Program Files\Microsoft Money\System\mnyside.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~1\tools\iesdsg.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Yvakt Class - {98B9F201-C701-41F1-B338-7E5E0E6D768F} - C:\WINDOWS\system32\ejrwx8drl.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O2 - BHO: (no name) - {E5E2A3E7-00FE-4D31-A030-A10799DDCA66} - (no file)
O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O4 - HKLM\..\Run: [PCTVOICE] pctspk.exe
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe
O4 - HKLM\..\Run: [DVDSentry] C:\WINDOWS\System32\DSentry.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [AdaptecDirectCD] "C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe"
O4 - HKLM\..\Run: [DwlClient] C:\Program Files\Common Files\Dell\EUSW\Support.exe
O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
O4 - HKLM\..\Run: [sr1exe] "C:\Documents and Settings\All Users\Application Data\Dell\Alert\252\updtSup3.exe"
O4 - HKLM\..\Run: [REGSHAVE] C:\Program Files\REGSHAVE\REGSHAVE.EXE /AUTORUN
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
O4 - HKLM\..\Run: [LifeStart] C:\Program Files\LIFECountdownToTheWeekend\LifeStart.exe
O4 - HKLM\..\Run: [SM1BG] C:\WINDOWS\SM1BG.EXE
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet
O4 - HKLM\..\Run: [skbvwe] C:\WINDOWS\system32\sswexg.exe reg_run
O4 - HKLM\..\Run: [{24-47-73-3F-ZN}] c:\windows\system32\dwdsregt.exe FI002
O4 - HKLM\..\Run: [gjZC2XV] "C:\WINDOWS\system32\slk8x2peu.exe"
O4 - HKLM\..\Run: [BrowserUpdateSched] C:\WINDOWS\system32\swinrraf.exe FI002
O4 - HKCU\..\Run: [ohiwy] C:\WINDOWS\system32\sswexg.exe reg_run
O4 - Startup: Zeno.lnk = C:\WINDOWS\SYSTEM32\swinrraf.exe
O4 - Startup: Z_Start.lnk = C:\WINDOWS\SYSTEM32\qqdsregk.exe
O4 - Global Startup: Exif Launcher.lnk = C:\Program Files\FinePixViewer\QuickDCF.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar2.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar2.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar2.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar2.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O9 - Extra button: (no name) - {4ABF810A-F11D-4169-9D5F-7D274F2270A1} - C:\WINDOWS\system32\dmonwv.dll (file missing)
O9 - Extra 'Tools' menuitem: Java - {4ABF810A-F11D-4169-9D5F-7D274F2270A1} - C:\WINDOWS\system32\dmonwv.dll (file missing)
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - C:\Program Files\Microsoft Money\System\mnyside.dll
O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://www.belgacom.net
O15 - Trusted Zone: http://click.mirarsearch.com (HKLM)
O15 - Trusted Zone: http://redirect.mirarsearch.com (HKLM)
O15 - Trusted Zone: http://awbeta.net-nucleus.com (HKLM)
O16 - DPF: {072D3F2E-5FB6-11D3-B461-00C04FA35A21} (CFForm Runtime) - https://www.amgusa.c...sses/CFJava.cab
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akama...meInstaller.exe
O16 - DPF: {79B96C72-C0D0-4DC8-BC7E-9F314A918228} - http://ak.imgfarm.co...etup1.0.0.7.cab
O16 - DPF: {88D8E8B7-A33B-4417-A385-8373484D43ED} (InstallHelper Class) - file://C:\DOCUME~1\LIANNE~1\LOCALS~1\Temp\ThereInstallHelper.2.0.2106.0.dll
O16 - DPF: {B9191F79-5613-4C76-AA2A-398534BB8999} - http://us.dl1.yimg.c...utocomplete.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://download.game...aploader_v6.cab
O18 - Filter: text/html - {0FA7FD6B-47C3-425B-AE30-36383F1C4503} - C:\WINDOWS\system32\ejrwx8drl.dll
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: WLTRYSVC - Unknown owner - C:\WINDOWS\System32\WLTRYSVC.EXE


Thanks for any help you can provide... my husband is pretty ticked at me and I'm feeling pretty foolish to have picked this stuff up!
  • 0

Advertisements


#2
Buckeye_Sam

Buckeye_Sam

    Malware Expert

  • Member
  • PipPipPipPipPipPipPipPip
  • 10,019 posts
Hi and welcome to GeeksToGo! My name is Sam and I will be helping you. :whistling:

You have a few different infections that we will need to remove for you.

1. Please download Ewido Anti-Malware
  • Install ewido anti-malware
  • Launch ewido, there should be an icon on your desktop, double-click it.
  • The program will now open to the main screen.
  • When you run ewido for the first time, you may get a warning "Database could not be found!". Click OK. We will fix this in a moment.

    You will need to update ewido to the latest definition files.
    • On the left hand side of the main screen click update.
    • Then click on Start Update.
  • The update will start and a progress bar will show the updates being installed.
    (the status bar at the bottom will display ("Update successful")
  • Exit Ewido, do not run the scan yet!
If you are having problems with the updater, you can use this link to manually update ewido.
ewido manual updates

2. Please download Brute Force Uninstaller to your desktop.
  • Right click the BFU folder on your desktop, and choose Extract All
  • Click "Next"
  • In the box to choose where to extract the files to,
  • Click "Browse"
  • Click on the + sign next to "My Computer"
  • Click on "Local Disk (C:) or whatever your primary drive is
  • Click "Make New Folder"
  • Type in BFU
  • Click "Next", and Uncheck the "Show Extracted Files" box and then click "Finish".
3. RIGHT-CLICK HERE and choose "Save As" (in IE it's "Save Target As") in order to download Alcra PLUS Remover.
Save it in the same folder you made earlier (c:\BFU).

Do not do anything with these yet!

Reboot your computer into Safe Mode. You can do this by restarting your computer and continually tapping F8 until a menu appears. Highlight Safe Mode and hit enter.

4. Once in Safe Mode, Open Ewido:
  • Click on scanner
  • Click on Complete System Scan and the scan will begin.
  • You will be prompted to clean the first infection.
  • Select "Perform action on all infections", then proceed.
  • Once the scan has completed, there will be a button located on the bottom of the screen named Save report
  • Click Save report.
  • Save the report .txt file to your desktop or a location where you can find it easily.
Close ewido anti-malware.

5. Then, please go to Start > My Computer and navigate to the C:\BFU folder.
  • Start the Brute Force Uninstaller by doubleclicking BFU.exe
  • In the scriptline to execute field type or paste c:\bfu\alcanshorty.bfu
  • Press Execute and let it do it’s job. (You ought to see a progress bar if you did this correctly.)
  • Wait for the complete script execution box to pop up and press OK.
  • Press exit to terminate the BFU program.
Reboot into normal windows and post the contents of Ewido text report that you saved and a new HiJackThis log.
  • 0

#3
liannenc

liannenc

    New Member

  • Topic Starter
  • Member
  • Pip
  • 5 posts
Hi Sam :whistling:

I've done as you asked and have posted the Ewido and HJT logs below. Zeno is *still* on board because another window from them just popped up! Also just got another pop-up from qwicksearch.net. I know we still have some work to do, though and appreciate your help!

Quick question about Ewido... can I leave it up and running (in the tray it indicates "guard active") or will it conflict with the AVG I already have running?

Ewido report:
---------------------------------------------------------
ewido anti-malware - Scan report
---------------------------------------------------------

+ Created on: 1:03:10 AM, 3/31/2006
+ Report-Checksum: 13EA0169

+ Scan result:

HKU\S-1-5-21-2140333903-1466411808-3132236110-1007\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{01EB5130-FC0C-4D75-B9CE-4801B1B854F5} -> Adware.Begin2Search : Cleaned with backup
C:\Documents and Settings\Lianne Meilhac\Cookies\lianne [email protected][2].txt -> TrackingCookie.Yieldmanager : Cleaned with backup
C:\Documents and Settings\Lianne Meilhac\Cookies\lianne [email protected][2].txt -> TrackingCookie.Pointroll : Cleaned with backup
C:\Documents and Settings\Lianne Meilhac\Cookies\lianne [email protected][2].txt -> TrackingCookie.Goclick : Cleaned with backup
C:\Documents and Settings\Lianne Meilhac\Cookies\lianne meilhac@com[1].txt -> TrackingCookie.Com : Cleaned with backup
C:\Documents and Settings\Lianne Meilhac\Cookies\lianne meilhac@cpvfeed[2].txt -> TrackingCookie.Cpvfeed : Cleaned with backup
C:\Documents and Settings\Lianne Meilhac\Cookies\lianne [email protected][1].txt -> TrackingCookie.Ru4 : Cleaned with backup
C:\Documents and Settings\Lianne Meilhac\Cookies\lianne meilhac@overture[1].txt -> TrackingCookie.Overture : Cleaned with backup
C:\Documents and Settings\Lianne Meilhac\Cookies\lianne meilhac@pro-market[2].txt -> TrackingCookie.Pro-market : Cleaned with backup
C:\Documents and Settings\Lianne Meilhac\Cookies\lianne meilhac@questionmarket[1].txt -> TrackingCookie.Questionmarket : Cleaned with backup
C:\Documents and Settings\Lianne Meilhac\Cookies\lianne [email protected][2].txt -> TrackingCookie.Burstbeacon : Cleaned with backup
C:\Documents and Settings\Lianne Meilhac\Cookies\lianne [email protected][1].txt -> TrackingCookie.Click2begin : Cleaned with backup
C:\Documents and Settings\Lianne Meilhac\Cookies\lianne [email protected][1].txt -> TrackingCookie.Adserver : Cleaned with backup
:mozilla.15:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Pointroll : Cleaned with backup
:mozilla.18:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Pointroll : Cleaned with backup
:mozilla.19:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Pointroll : Cleaned with backup
:mozilla.20:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Pointroll : Cleaned with backup
:mozilla.21:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Pointroll : Cleaned with backup
:mozilla.22:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Pointroll : Cleaned with backup
:mozilla.23:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Pointroll : Cleaned with backup
:mozilla.24:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Doubleclick : Cleaned with backup
:mozilla.25:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Atdmt : Cleaned with backup
:mozilla.69:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Coremetrics : Cleaned with backup
:mozilla.76:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Myaffiliateprogram : Cleaned with backup
:mozilla.77:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Googleadservices : Cleaned with backup
:mozilla.82:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Adserver : Cleaned with backup
:mozilla.84:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Adserver : Cleaned with backup
:mozilla.85:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Adserver : Cleaned with backup
:mozilla.86:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Mediaplex : Cleaned with backup
:mozilla.87:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Mediaplex : Cleaned with backup
:mozilla.96:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Advertising : Cleaned with backup
:mozilla.97:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Advertising : Cleaned with backup
:mozilla.98:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Advertising : Cleaned with backup
:mozilla.99:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Advertising : Cleaned with backup
:mozilla.105:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Ru4 : Cleaned with backup
:mozilla.106:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Ru4 : Cleaned with backup
:mozilla.107:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Ru4 : Cleaned with backup
:mozilla.108:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Ru4 : Cleaned with backup
:mozilla.110:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.2o7 : Cleaned with backup
:mozilla.111:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.2o7 : Cleaned with backup
:mozilla.112:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.2o7 : Cleaned with backup
:mozilla.113:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.2o7 : Cleaned with backup
:mozilla.114:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.2o7 : Cleaned with backup
:mozilla.115:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.2o7 : Cleaned with backup
:mozilla.122:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned with backup
:mozilla.124:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned with backup
:mozilla.125:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned with backup
:mozilla.129:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Googleadservices : Cleaned with backup
:mozilla.130:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned with backup
:mozilla.141:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Serving-sys : Cleaned with backup
:mozilla.142:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Serving-sys : Cleaned with backup
:mozilla.143:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Serving-sys : Cleaned with backup
:mozilla.144:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Serving-sys : Cleaned with backup
:mozilla.145:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Serving-sys : Cleaned with backup
:mozilla.148:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Statcounter : Cleaned with backup
:mozilla.149:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Statcounter : Cleaned with backup
:mozilla.150:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Statcounter : Cleaned with backup
:mozilla.151:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Statcounter : Cleaned with backup
:mozilla.152:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Statcounter : Cleaned with backup
:mozilla.175:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Questionmarket : Cleaned with backup
:mozilla.183:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned with backup
:mozilla.185:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned with backup
:mozilla.186:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Fastclick : Cleaned with backup
:mozilla.187:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Fastclick : Cleaned with backup
:mozilla.188:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Fastclick : Cleaned with backup
:mozilla.195:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Overture : Cleaned with backup
:mozilla.199:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Realtracker : Cleaned with backup
:mozilla.200:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Realtracker : Cleaned with backup
:mozilla.213:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Webtrendslive : Cleaned with backup
:mozilla.214:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Webtrendslive : Cleaned with backup
:mozilla.233:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Hitslink : Cleaned with backup
:mozilla.234:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Hitslink : Cleaned with backup
:mozilla.235:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Hitslink : Cleaned with backup
:mozilla.236:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Hitslink : Cleaned with backup
:mozilla.240:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.2o7 : Cleaned with backup
:mozilla.241:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Zedo : Cleaned with backup
:mozilla.242:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Zedo : Cleaned with backup
:mozilla.243:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Zedo : Cleaned with backup
:mozilla.244:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Burstnet : Cleaned with backup
:mozilla.245:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Burstnet : Cleaned with backup
:mozilla.246:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Burstnet : Cleaned with backup
:mozilla.247:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Burstnet : Cleaned with backup
:mozilla.248:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Burstnet : Cleaned with backup
:mozilla.253:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Tacoda : Cleaned with backup
:mozilla.254:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Tacoda : Cleaned with backup
:mozilla.255:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Bluestreak : Cleaned with backup
:mozilla.266:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned with backup
:mozilla.267:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned with backup
:mozilla.269:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Casalemedia : Cleaned with backup
:mozilla.270:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Casalemedia : Cleaned with backup
:mozilla.271:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Casalemedia : Cleaned with backup
:mozilla.272:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Casalemedia : Cleaned with backup
:mozilla.273:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Casalemedia : Cleaned with backup
:mozilla.274:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Casalemedia : Cleaned with backup
:mozilla.278:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Burstbeacon : Cleaned with backup
:mozilla.283:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup
:mozilla.284:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup
:mozilla.285:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup
:mozilla.286:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup
:mozilla.294:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Trafficmp : Cleaned with backup
:mozilla.295:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Trafficmp : Cleaned with backup
:mozilla.296:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Trafficmp : Cleaned with backup
:mozilla.297:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Trafficmp : Cleaned with backup
:mozilla.298:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Trafficmp : Cleaned with backup
:mozilla.299:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Trafficmp : Cleaned with backup
:mozilla.300:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Trafficmp : Cleaned with backup
:mozilla.301:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Trafficmp : Cleaned with backup
:mozilla.302:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Targetnet : Cleaned with backup
:mozilla.303:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup
:mozilla.304:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup
:mozilla.305:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup
:mozilla.306:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup
:mozilla.307:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Yieldmanager : Cleaned with backup
:mozilla.308:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Yieldmanager : Cleaned with backup
:mozilla.309:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Yieldmanager : Cleaned with backup
:mozilla.310:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Qksrv : Cleaned with backup
:mozilla.311:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Qksrv : Cleaned with backup
:mozilla.316:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Tradedoubler : Cleaned with backup
:mozilla.328:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned with backup
:mozilla.338:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Liveperson : Cleaned with backup
:mozilla.339:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Liveperson : Cleaned with backup
:mozilla.340:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Liveperson : Cleaned with backup
:mozilla.361:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Bfast : Cleaned with backup
:mozilla.362:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Bfast : Cleaned with backup
:mozilla.378:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Googleadservices : Cleaned with backup
:mozilla.380:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Tribalfusion : Cleaned with backup
:mozilla.381:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Tribalfusion : Cleaned with backup
:mozilla.388:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Valueclick : Cleaned with backup
:mozilla.393:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned with backup
:mozilla.416:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Com : Cleaned with backup
:mozilla.417:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Com : Cleaned with backup
:mozilla.432:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.Sitestat : Cleaned with backup
:mozilla.448:C:\Documents and Settings\Thierry Wernaers\Application Data\Mozilla\Firefox\Profiles\ge7083ya.default\cookies.txt -> TrackingCookie.2o7 : Cleaned with backup
C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP280\A0060813.dll -> Adware.EZula : Cleaned with backup
C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP281\A0060833.dll -> Adware.Mirar : Cleaned with backup
C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP281\A0060834.exe -> Adware.ZenoSearch : Cleaned with backup
C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP281\A0060880.exe -> Downloader.Qoologic.bj : Cleaned with backup
C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP281\A0060881.exe -> Downloader.Qoologic.bj : Cleaned with backup
C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP281\A0060896.exe -> Adware.ZenoSearch : Cleaned with backup
C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP281\A0061085.dll -> Adware.Suggestor : Cleaned with backup
C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP281\A0061095.exe -> Adware.ZenoSearch : Cleaned with backup
C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP281\A0061128.exe -> Adware.ZenoSearch : Cleaned with backup
C:\WINDOWS\876057.exe -> Adware.Mirar : Cleaned with backup
C:\WINDOWS\Downloaded Program Files\popcaploader.dll -> Not-A-Virus.Downloader.Win32.PopCap.b : Cleaned with backup
C:\WINDOWS\JUSTIN2.exe -> Adware.EZula : Cleaned with backup
C:\WINDOWS\SYSTEM32\dwdsregt.exe -> Adware.ZenoSearch : Cleaned with backup
C:\WINDOWS\SYSTEM32\ejrwx8drl.dll -> Adware.Suggestor : Cleaned with backup
C:\WINDOWS\SYSTEM32\qkdsregk.exe -> Adware.ZenoSearch : Cleaned with backup
C:\WINDOWS\SYSTEM32\qqdsregk.exe -> Adware.ZenoSearch : Cleaned with backup
C:\WINDOWS\SYSTEM32\slk8x2peu.exe -> Adware.Suggestor : Cleaned with backup
C:\WINDOWS\SYSTEM32\yqmhj.dat -> Downloader.Qoologic.bj : Cleaned with backup
C:\WINDOWS\ZIFI002.exe -> Adware.ZenoSearch : Cleaned with backup


::Report End

HiJackThis log:
Logfile of HijackThis v1.99.1
Scan saved at 1:10:01 AM, on 3/31/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\WINDOWS\system32\cisvc.exe
C:\Program Files\ewido anti-malware\ewidoctrl.exe
C:\Program Files\ewido anti-malware\ewidoguard.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\System32\WLTRYSVC.EXE
C:\WINDOWS\System32\bcmwltry.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\pctspk.exe
C:\Program Files\Apoint\Apoint.exe
C:\WINDOWS\System32\DSentry.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe
C:\Program Files\Common Files\Dell\EUSW\Support.exe
C:\Program Files\Apoint\Apntex.exe
C:\Program Files\BroadJump\Client Foundation\CFD.exe
C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
C:\WINDOWS\SM1BG.EXE
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\WINDOWS\system32\swinrraf.exe
C:\Program Files\FinePixViewer\QuickDCF.exe
C:\WINDOWS\SYSTEM32\swinrraf.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Documents and Settings\Lianne Meilhac\Desktop\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dellnet.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.belgacom.net
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.dellnet.com
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.dellnet.com/
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,uxumimf.exe
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: web compressor - {23FB5ADD-DA37-4a40-9FC0-B0E2384CDE92} - C:\WINDOWS\system32\nsj4.dll
O2 - BHO: (no name) - {243B17DE-77C7-46BF-B94B-0B5F309A0E64} - C:\Program Files\Microsoft Money\System\mnyside.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~1\tools\iesdsg.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Yvakt Class - {98B9F201-C701-41F1-B338-7E5E0E6D768F} - C:\WINDOWS\system32\ejrwx8drl.dll (file missing)
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O2 - BHO: (no name) - {E5E2A3E7-00FE-4D31-A030-A10799DDCA66} - (no file)
O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O4 - HKLM\..\Run: [PCTVOICE] pctspk.exe
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe
O4 - HKLM\..\Run: [DVDSentry] C:\WINDOWS\System32\DSentry.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [AdaptecDirectCD] "C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe"
O4 - HKLM\..\Run: [DwlClient] C:\Program Files\Common Files\Dell\EUSW\Support.exe
O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
O4 - HKLM\..\Run: [sr1exe] "C:\Documents and Settings\All Users\Application Data\Dell\Alert\252\updtSup3.exe"
O4 - HKLM\..\Run: [REGSHAVE] C:\Program Files\REGSHAVE\REGSHAVE.EXE /AUTORUN
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
O4 - HKLM\..\Run: [LifeStart] C:\Program Files\LIFECountdownToTheWeekend\LifeStart.exe
O4 - HKLM\..\Run: [SM1BG] C:\WINDOWS\SM1BG.EXE
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet
O4 - HKLM\..\Run: [skbvwe] C:\WINDOWS\system32\sswexg.exe reg_run
O4 - HKLM\..\Run: [BrowserUpdateSched] C:\WINDOWS\system32\swinrraf.exe FI002
O4 - HKCU\..\Run: [ohiwy] C:\WINDOWS\system32\sswexg.exe reg_run
O4 - Startup: Zeno.lnk = C:\WINDOWS\SYSTEM32\swinrraf.exe
O4 - Startup: Z_Start.lnk = C:\WINDOWS\SYSTEM32\qqdsregk.exe
O4 - Global Startup: Exif Launcher.lnk = C:\Program Files\FinePixViewer\QuickDCF.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar2.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar2.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar2.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar2.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O9 - Extra button: (no name) - {4ABF810A-F11D-4169-9D5F-7D274F2270A1} - C:\WINDOWS\system32\dmonwv.dll (file missing)
O9 - Extra 'Tools' menuitem: Java - {4ABF810A-F11D-4169-9D5F-7D274F2270A1} - C:\WINDOWS\system32\dmonwv.dll (file missing)
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - C:\Program Files\Microsoft Money\System\mnyside.dll
O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://www.belgacom.net
O15 - Trusted Zone: http://click.mirarsearch.com (HKLM)
O15 - Trusted Zone: http://redirect.mirarsearch.com (HKLM)
O15 - Trusted Zone: http://awbeta.net-nucleus.com (HKLM)
O16 - DPF: {072D3F2E-5FB6-11D3-B461-00C04FA35A21} (CFForm Runtime) - https://www.amgusa.c...sses/CFJava.cab
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akama...meInstaller.exe
O16 - DPF: {79B96C72-C0D0-4DC8-BC7E-9F314A918228} - http://ak.imgfarm.co...etup1.0.0.7.cab
O16 - DPF: {88D8E8B7-A33B-4417-A385-8373484D43ED} (InstallHelper Class) - file://C:\DOCUME~1\LIANNE~1\LOCALS~1\Temp\ThereInstallHelper.2.0.2106.0.dll
O16 - DPF: {B9191F79-5613-4C76-AA2A-398534BB8999} - http://us.dl1.yimg.c...utocomplete.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://download.game...aploader_v6.cab
O18 - Filter: text/html - {0FA7FD6B-47C3-425B-AE30-36383F1C4503} - C:\WINDOWS\system32\ejrwx8drl.dll
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido anti-malware\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido anti-malware\ewidoguard.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: WLTRYSVC - Unknown owner - C:\WINDOWS\System32\WLTRYSVC.EXE
  • 0

#4
Buckeye_Sam

Buckeye_Sam

    Malware Expert

  • Member
  • PipPipPipPipPipPipPipPip
  • 10,019 posts
AVG and Ewido should get along just fine, but if you notice a problem then disable Ewido and keep AVG running. You have a qoologic infection. We need to get a look at a couple new logs.

Please download FindQool by LonnyRJones
  • Extract the files and place the FindQool folder in root. Usually C:\
  • Open the folder and run Qlocate.bat.
  • Post the contents of the txt.log which will open.
===============

Download F-Secure Blacklight(blbeta.exe) to your C:\ drive.
  • Open a command window. (Start>Run and type: cmd)
  • Copy paste or type the following in the command window:

    C:\blbeta.exe /expert

  • Accept the user agreement.
  • Click Scan.
  • After the scan finishes, click on Next, then Exit.
BlackLight will create a log in your C:\ drive with the name "fsbl-xxxxxxx.log". Please post that log.



And finally, please post a fresh hijackthis log.
  • 0

#5
liannenc

liannenc

    New Member

  • Topic Starter
  • Member
  • Pip
  • 5 posts
Sam,

Here's the FindQool report:

Fri 03/31/2006
Running from: C:\FindQool\FindQool
PLEASE NOTE: LEGIT FILES MIGHT BE LISTED. IF YOU ARE UNSURE OF WHAT IS LISTED LEAVE THEM ALONE.
Files found with locate com.

C:\WINDOWS\ROELO.DLL
C:\WINDOWS\UNWN.EXE
Re-check using dir /a:-d
C:\Documents and Settings\All Users\Start Menu\Programs\Startup
...

HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{4abf810a-f11d-4169-9d5f-7d274f2270a1}
HKEY_LOCAL_MACHINE\software\classes\folder\shellex\columnhandlers\{ce3a44d8-bc88-4d62-a890-42d96245f8d6}
[-HKEY_CLASSES_ROOT\CLSID\{incert HKCR\*\shellex csdl above here if present}]

...
Runs, Listed here as a Doublecheck for the locate com results
HKLM
"skbvwe"="C:\\WINDOWS\\system32\\sswexg.exe reg_run"
HKCU
"ohiwy"="C:\\WINDOWS\\system32\\sswexg.exe reg_run"
...

Files In Winlogon shell and userinit
Listed here as a Doublecheck for the locate com results
shell REG_SZ explorer.exe
userinit REG_SZ C:\WINDOWS\system32\userinit.exe,uxumimf.exe
...
SWReg utility
Written by Bobbi Flekman © 2005
Findqool edited 3/26/2006

And here is the Blacklight log (no hidden items found, btw):

03/31/06 17:25:53 [Info]: BlackLight Engine 1.0.33 initialized
03/31/06 17:25:53 [Info]: OS: 5.1 build 2600 (Service Pack 2)
03/31/06 17:25:54 [Note]: 7019 4
03/31/06 17:25:54 [Note]: 7005 0
03/31/06 17:26:05 [Note]: 7006 0
03/31/06 17:26:05 [Note]: 7022 0
03/31/06 17:26:05 [Note]: 7011 236
03/31/06 17:26:06 [Note]: FSRAW library version 1.7.1015
03/31/06 17:35:02 [Note]: 7007 0


And, finally, the most recent HiJackThis log:

Logfile of HijackThis v1.99.1
Scan saved at 5:35:23 PM, on 3/31/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\WINDOWS\system32\cisvc.exe
C:\Program Files\ewido anti-malware\ewidoctrl.exe
C:\Program Files\ewido anti-malware\ewidoguard.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\pctspk.exe
C:\Program Files\Apoint\Apoint.exe
C:\WINDOWS\System32\DSentry.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe
C:\Program Files\Common Files\Dell\EUSW\Support.exe
C:\Program Files\BroadJump\Client Foundation\CFD.exe
C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
C:\Program Files\Apoint\Apntex.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
C:\WINDOWS\SM1BG.EXE
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\WINDOWS\System32\WLTRYSVC.EXE
C:\Program Files\FinePixViewer\QuickDCF.exe
C:\WINDOWS\System32\bcmwltry.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\cidaemon.exe
C:\Documents and Settings\Lianne Meilhac\Desktop\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dellnet.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =

http://www.belgacom.net
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.dellnet.com
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.dellnet.com/
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,uxumimf.exe
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program

Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: web compressor - {23FB5ADD-DA37-4a40-9FC0-B0E2384CDE92} -

C:\WINDOWS\system32\nsj4.dll
O2 - BHO: (no name) - {243B17DE-77C7-46BF-B94B-0B5F309A0E64} - C:\Program Files\Microsoft

Money\System\mnyside.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} -

C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} -

C:\PROGRA~1\SPYWAR~1\tools\iesdsg.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program

Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Yvakt Class - {98B9F201-C701-41F1-B338-7E5E0E6D768F} -

C:\WINDOWS\system32\ejrwx8drl.dll (file missing)
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program

files\google\googletoolbar2.dll
O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} -

C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O2 - BHO: (no name) - {E5E2A3E7-00FE-4D31-A030-A10799DDCA66} - (no file)
O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program

files\google\googletoolbar2.dll
O4 - HKLM\..\Run: [PCTVOICE] pctspk.exe
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe
O4 - HKLM\..\Run: [DVDSentry] C:\WINDOWS\System32\DSentry.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe"

-osboot
O4 - HKLM\..\Run: [AdaptecDirectCD] "C:\Program Files\Roxio\Easy CD Creator

5\DirectCD\DirectCD.exe"
O4 - HKLM\..\Run: [DwlClient] C:\Program Files\Common Files\Dell\EUSW\Support.exe
O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Common Files\Microsoft

Shared\Works Shared\WkUFind.exe
O4 - HKLM\..\Run: [sr1exe] "C:\Documents and Settings\All Users\Application

Data\Dell\Alert\252\updtSup3.exe"
O4 - HKLM\..\Run: [REGSHAVE] C:\Program Files\REGSHAVE\REGSHAVE.EXE /AUTORUN
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
O4 - HKLM\..\Run: [LifeStart] C:\Program Files\LIFECountdownToTheWeekend\LifeStart.exe
O4 - HKLM\..\Run: [SM1BG] C:\WINDOWS\SM1BG.EXE
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet
O4 - HKLM\..\Run: [skbvwe] C:\WINDOWS\system32\sswexg.exe reg_run
O4 - HKLM\..\Run: [BrowserUpdateSched] C:\WINDOWS\system32\swinrraf.exe FI002
O4 - HKCU\..\Run: [ohiwy] C:\WINDOWS\system32\sswexg.exe reg_run
O4 - Startup: Zeno.lnk = C:\WINDOWS\SYSTEM32\swinrraf.exe
O4 - Startup: Z_Start.lnk = C:\WINDOWS\SYSTEM32\qqdsregk.exe
O4 - Global Startup: Exif Launcher.lnk = C:\Program Files\FinePixViewer\QuickDCF.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft

Office\Office10\OSA.EXE
O8 - Extra context menu item: &Google Search - res://c:\program

files\google\GoogleToolbar2.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program

files\google\GoogleToolbar2.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://c:\program

files\google\GoogleToolbar2.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program

files\google\GoogleToolbar2.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://c:\program

files\google\GoogleToolbar2.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program

files\google\GoogleToolbar2.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program

Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} -

C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} -

C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O9 - Extra button: (no name) - {4ABF810A-F11D-4169-9D5F-7D274F2270A1} -

C:\WINDOWS\system32\dmonwv.dll (file missing)
O9 - Extra 'Tools' menuitem: Java - {4ABF810A-F11D-4169-9D5F-7D274F2270A1} -

C:\WINDOWS\system32\dmonwv.dll (file missing)
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} -

C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - C:\Program

Files\Microsoft Money\System\mnyside.dll
O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} -

C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} -

C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program

Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} -

C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://www.belgacom.net
O15 - Trusted Zone: http://click.mirarsearch.com (HKLM)
O15 - Trusted Zone: http://redirect.mirarsearch.com (HKLM)
O15 - Trusted Zone: http://awbeta.net-nucleus.com (HKLM)
O16 - DPF: {072D3F2E-5FB6-11D3-B461-00C04FA35A21} (CFForm Runtime) -

https://www.amgusa.c...sses/CFJava.cab
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} -

http://a1540.g.akama...s/win/QuickTime

Installer.exe
O16 - DPF: {79B96C72-C0D0-4DC8-BC7E-9F314A918228} -

http://ak.imgfarm.co...etup1.0.0.7.cab
O16 - DPF: {88D8E8B7-A33B-4417-A385-8373484D43ED} (InstallHelper Class) -

file://C:\DOCUME~1\LIANNE~1\LOCALS~1\Temp\ThereInstallHelper.2.0.2106.0.dll
O16 - DPF: {B9191F79-5613-4C76-AA2A-398534BB8999} -

http://us.dl1.yimg.c...utocomplete.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) -

http://download.game...aploader_v6.cab
O18 - Filter: text/html - {0FA7FD6B-47C3-425B-AE30-36383F1C4503} -

C:\WINDOWS\system32\ejrwx8drl.dll
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. -

C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. -

C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido

anti-malware\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido

anti-malware\ewidoguard.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation -

C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: WLTRYSVC - Unknown owner - C:\WINDOWS\System32\WLTRYSVC.EXE
  • 0

#6
Buckeye_Sam

Buckeye_Sam

    Malware Expert

  • Member
  • PipPipPipPipPipPipPipPip
  • 10,019 posts
Please open Notepad, and copy/paste the code in the box below into a new text file. Save it as KillQoo.reg (set Filetype to "All Files") and save it on your Desktop.

REGEDIT4

[-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\ColumnHandlers\{ce3a44d8-bc88-4d62-a890-42d96245f8d6}]

[-HKEY_CLASSES_ROOT\CLSID\{ce3a44d8-bc88-4d62-a890-42d96245f8d6}]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"UserInit"="C:\\WINDOWS\\system32\\userinit.exe,"
"Shell"="Explorer.exe"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
"skbvwe"=-

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
"ohiwy"=-

Now Locate and DoubleClick KillQoo.reg-> Allow it to merge into the Registry!


==============


Run Hijackthis again, click scan, and Put a checkmark next to each of these. Then close all other windows--you should only see HijackThis on your Desktop--and click the Fix Checked button.

O2 - BHO: web compressor - {23FB5ADD-DA37-4a40-9FC0-B0E2384CDE92} - C:\WINDOWS\system32\nsj4.dll
O2 - BHO: Yvakt Class - {98B9F201-C701-41F1-B338-7E5E0E6D768F} -
C:\WINDOWS\system32\ejrwx8drl.dll (file missing)
O2 - BHO: (no name) - {E5E2A3E7-00FE-4D31-A030-A10799DDCA66} - (no file)
O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
O4 - HKLM\..\Run: [skbvwe] C:\WINDOWS\system32\sswexg.exe reg_run
O4 - HKLM\..\Run: [BrowserUpdateSched] C:\WINDOWS\system32\swinrraf.exe FI002
O4 - HKCU\..\Run: [ohiwy] C:\WINDOWS\system32\sswexg.exe reg_run
O4 - Startup: Zeno.lnk = C:\WINDOWS\SYSTEM32\swinrraf.exe
O4 - Startup: Z_Start.lnk = C:\WINDOWS\SYSTEM32\qqdsregk.exe
O9 - Extra button: (no name) - {4ABF810A-F11D-4169-9D5F-7D274F2270A1} -
C:\WINDOWS\system32\dmonwv.dll (file missing)
O9 - Extra 'Tools' menuitem: Java - {4ABF810A-F11D-4169-9D5F-7D274F2270A1} -
C:\WINDOWS\system32\dmonwv.dll (file missing)
O15 - Trusted Zone: http://click.mirarsearch.com (HKLM)
O15 - Trusted Zone: http://redirect.mirarsearch.com (HKLM)
O15 - Trusted Zone: http://awbeta.net-nucleus.com (HKLM)
O16 - DPF: {79B96C72-C0D0-4DC8-BC7E-9F314A918228} -
http://ak.imgfarm.co...etup1.0.0.7.cab
O16 - DPF: {88D8E8B7-A33B-4417-A385-8373484D43ED} (InstallHelper Class) -
file://C:\DOCUME~1\LIANNE~1\LOCALS~1\Temp\ThereInstallHelper.2.0.2106.0.dll
O18 - Filter: text/html - {0FA7FD6B-47C3-425B-AE30-36383F1C4503} -
C:\WINDOWS\system32\ejrwx8drl.dll



==========


Please download the Killbox by Option^Explicit.

Note: In the event you already have Killbox, this is a new version that I need you to download.
  • Save it to your desktop.
  • Please double-click Killbox.exe to run it.
  • Select:
    • Delete on Reboot
    • then Click on the All Files button.
  • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):



    C:\WINDOWS\ROELO.DLL
    C:\WINDOWS\UNWN.EXE
    C:\WINDOWS\system32\nsj4.dll
    C:\WINDOWS\system32\sswexg.exe
    C:\WINDOWS\system32\swinrraf.exe
    C:\WINDOWS\SYSTEM32\qqdsregk.exe
    C:\WINDOWS\system32\ejrwx8drl.dll



  • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
  • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt. Click OK at any PendingFileRenameOperations prompt (and please let me know if you receive this message!).
If your computer does not restart automatically, please restart it manually.

If you receive a message such as: "Component 'MsComCtl.ocx' or one of its dependencies not correctly registered: a file is missing or invalid." when trying to run Killbox, click here to download and run missingfilesetup.exe. Then try Killbox again.



===========


Please post a new hijackthis log.
  • 0

#7
liannenc

liannenc

    New Member

  • Topic Starter
  • Member
  • Pip
  • 5 posts
Sam,
There were two entries on Hijackthis I could not find:

O4 - HKLM\..\Run: [skbvwe] C:\WINDOWS\system32\sswexg.exe reg_run
O4 - HKCU\..\Run: [ohiwy] C:\WINDOWS\system32\sswexg.exe reg_run

I was able to find all of the others, however. I've pasted my new log below. I'm trying not to get too excited yet, but I surfed around a bit after running the last scan and (so far) no more pop-ups or highlighted text! (need a crossed-fingers smilie!)

Logfile of HijackThis v1.99.1
Scan saved at 7:34:48 PM, on 4/1/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\WINDOWS\system32\cisvc.exe
C:\Program Files\ewido anti-malware\ewidoctrl.exe
C:\Program Files\ewido anti-malware\ewidoguard.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\System32\WLTRYSVC.EXE
C:\WINDOWS\System32\bcmwltry.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\pctspk.exe
C:\Program Files\Apoint\Apoint.exe
C:\WINDOWS\System32\DSentry.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe
C:\Program Files\Common Files\Dell\EUSW\Support.exe
C:\Program Files\BroadJump\Client Foundation\CFD.exe
C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
C:\WINDOWS\SM1BG.EXE
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\Program Files\Apoint\Apntex.exe
C:\Program Files\FinePixViewer\QuickDCF.exe
C:\Documents and Settings\Lianne Meilhac\Desktop\HijackThis.exe
C:\WINDOWS\system32\wuauclt.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dellnet.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.belgacom.net
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.dellnet.com
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.dellnet.com/
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {243B17DE-77C7-46BF-B94B-0B5F309A0E64} - C:\Program Files\Microsoft Money\System\mnyside.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~1\tools\iesdsg.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O4 - HKLM\..\Run: [PCTVOICE] pctspk.exe
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe
O4 - HKLM\..\Run: [DVDSentry] C:\WINDOWS\System32\DSentry.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [AdaptecDirectCD] "C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe"
O4 - HKLM\..\Run: [DwlClient] C:\Program Files\Common Files\Dell\EUSW\Support.exe
O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
O4 - HKLM\..\Run: [sr1exe] "C:\Documents and Settings\All Users\Application Data\Dell\Alert\252\updtSup3.exe"
O4 - HKLM\..\Run: [REGSHAVE] C:\Program Files\REGSHAVE\REGSHAVE.EXE /AUTORUN
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
O4 - HKLM\..\Run: [LifeStart] C:\Program Files\LIFECountdownToTheWeekend\LifeStart.exe
O4 - HKLM\..\Run: [SM1BG] C:\WINDOWS\SM1BG.EXE
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet
O4 - Global Startup: Exif Launcher.lnk = C:\Program Files\FinePixViewer\QuickDCF.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar2.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar2.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar2.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar2.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - C:\Program Files\Microsoft Money\System\mnyside.dll
O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://www.belgacom.net
O16 - DPF: {072D3F2E-5FB6-11D3-B461-00C04FA35A21} (CFForm Runtime) - https://www.amgusa.c...sses/CFJava.cab
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akama...meInstaller.exe
O16 - DPF: {B9191F79-5613-4C76-AA2A-398534BB8999} - http://us.dl1.yimg.c...utocomplete.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://download.game...aploader_v6.cab
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido anti-malware\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido anti-malware\ewidoguard.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: WLTRYSVC - Unknown owner - C:\WINDOWS\System32\WLTRYSVC.EXE
  • 0

#8
Buckeye_Sam

Buckeye_Sam

    Malware Expert

  • Member
  • PipPipPipPipPipPipPipPip
  • 10,019 posts
Your log looks pretty good, but can you tell what this program is?

O4 - HKLM\..\Run: [LifeStart] C:\Program Files\LIFECountdownToTheWeekend\LifeStart.exe


Here are some optional fixes you can make with Hijackthis. They are not malware. These are programs that run automatically at startup. They are not necessary to be run at every startup and hog your computer's resources. Fixing these will only stop these programs from running automatically, which will improve boot up time and performance.

O4 - HKLM\..\Run: [DVDSentry] C:\WINDOWS\System32\DSentry.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [AdaptecDirectCD] "C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe"
O4 - HKLM\..\Run: [DwlClient] C:\Program Files\Common Files\Dell\EUSW\Support.exe
O4 - HKLM\..\Run: [BJCFD] C:\Program Files\BroadJump\Client Foundation\CFD.exe
O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
O4 - HKLM\..\Run: [sr1exe] "C:\Documents and Settings\All Users\Application Data\Dell\Alert\252\updtSup3.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE



Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  • Disable and Enable System Restore. - If you are using Windows ME or XP then you should disable and reenable system restore to make sure there are no infected files found in a restore point left over from what we have just cleaned.

    You can find instructions on how to enable and reenable system restore here:

    Managing Windows Millenium System Restore

    or

    Windows XP System Restore Guide

    Renable system restore with instructions from tutorial above

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    • From within Internet Explorer click on the Tools menu and then click on Options.
    • Click once on the Security tab
    • Click once on the Internet icon so it becomes highlighted.
    • Click once on the Custom Level button.
      • Change the Download signed ActiveX controls to Prompt
      • Change the Download unsigned ActiveX controls to Disable
      • Change the Initialize and script ActiveX controls not marked as safe to Disable
      • Change the Installation of desktop items to Prompt
      • Change the Launching programs and files in an IFRAME to Prompt
      • Change the Navigate sub-frames across different domains to Prompt
      • When all these settings have been made, click on the OK button.
      • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    • Next press the Apply button and then the OK to exit the Internet Properties page.
  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

    A tutorial on installing & using this product can be found here:

    Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  • Install Ad-Aware - Install and download Ad-Aware. ou should also scan your computer with program on a regular basis just as you would an antivirus software in conjunction with Spybot.

    A tutorial on installing & using this product can be found here:

    Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

:whistling: :blink:
  • 0

#9
liannenc

liannenc

    New Member

  • Topic Starter
  • Member
  • Pip
  • 5 posts
I do recognize that-- it's left over from a program I uninstalled a while back so I'm going to fix it, as well as implement the other fixes and taking some additional security measures. We already have some things on board but I'd rather be safe than sorry!

Thanks so much for all of your help and your patience... I really appreciate it!
Lianne
  • 0

#10
Buckeye_Sam

Buckeye_Sam

    Malware Expert

  • Member
  • PipPipPipPipPipPipPipPip
  • 10,019 posts
Since this issue appears to be resolved ... this Topic has been closed. Glad we could help. :whistling:

If you're the topic starter, and need this topic reopened, please contact a staff member with the address of the thread.

Everyone else please begin a New Topic.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP