Since Monday a virus has disabled task bar, screen display settings, there is no control panel, windows updates are turned off and cant be turned back on plus numerous pop ups are telling me I have a virus and pointing me to a web site to solve it.
Hijack this log shows
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 18:19: VIRUS ALERT!, on 18/06/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16674)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Virgin Broadband\PCguard\Fws.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
C:\Program Files\CA\PPRT\bin\ITMRTSVC.exe
C:\Program Files\LogMeIn\x86\RaMaint.exe
C:\Program Files\LogMeIn\x86\LogMeIn.exe
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\Program Files\Dell\Media Experience\PCMService.exe
C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\vsnpstd2.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Raxco\PerfectDisk\PDAgent.exe
C:\Program Files\LogMeIn\x86\LogMeInSystray.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Virgin Broadband\advisor\Broadbandadvisor.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Virgin Broadband\PCguard\RPS.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\GSEC1\XGate2\bin\XGSensorDownloader.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\Google\Google Updater\GoogleUpdater.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Virgin Broadband\PCguard\rpsupdaterR.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Common Files\Authentium\AntiVirus\dvpapi.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = The Bartles Internet Explorer
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
R3 - URLSearchHook: SweetIM For Internet Explorer - {BC4FFE41-DE9F-46fa-B455-AAD49B9F9938} - C:\Program Files\Macrogaming\SweetIMBarForIE\toolbar.dll (file missing)
O3 - Toolbar: (no name) - {0BF43445-2F28-4351-9252-17FE6E806AA0} - (no file)
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar3.dll
O3 - Toolbar: SweetIM For Internet Explorer - {BC4FFE41-DE9F-46fa-B455-AAD49B9F9938} - C:\Program Files\Macrogaming\SweetIMBarForIE\toolbar.dll (file missing)
O3 - Toolbar: XG Secure Banking - {9A01D559-EE43-4819-940A-F179D25A25A5} - C:\PROGRA~1\GSEC1\XGate2\bin\XGSECB~1.DLL
O3 - Toolbar: vrmdtneg - {373E0CCD-9986-41D9-B3E7-5D3D89C1D400} - C:\WINDOWS\vrmdtneg.dll (file missing)
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\Core\smax4pnp.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Dell\Media Experience\PCMService.exe"
O4 - HKLM\..\Run: [DVDLauncher] "C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe"
O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
O4 - HKLM\..\Run: [UpdateManager] "C:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe" /r
O4 - HKLM\..\Run: [SNPSTD2] C:\WINDOWS\vsnpstd2.exe
O4 - HKLM\..\Run: [EPSON Stylus DX4800 Series (Copy 1)] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIADE.EXE /P35 "EPSON Stylus DX4800 Series (Copy 1)" /O6 "USB002" /M "Stylus DX4800"
O4 - HKLM\..\Run: [Auto EPSON Stylus DX4800 Series on DELLALAPTOP] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIADE.EXE /P46 "Auto EPSON Stylus DX4800 Series on DELLALAPTOP" /O22 "\\DELLALAPTOP\Printer2" /M "Stylus DX4800"
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [igfxpers] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [igfxtray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [LogMeIn GUI] "C:\Program Files\LogMeIn\x86\LogMeInSystray.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [CRS-Start] C:\WINDOWS\system32\crs-ustart.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [Broadbandadvisor.exe] "C:\Program Files\Virgin Broadband\advisor\Broadbandadvisor.exe" /AUTORUN
O4 - HKLM\..\Run: [-FreedomNeedsReboot] "C:\Program Files\Virgin Broadband\PCguard\ZkRunOnceR.exe"
O4 - HKLM\..\Run: [XGSensor] C:\Program Files\GSEC1\XGate2\bin\XGSensor.exe
O4 - HKLM\..\Run: [XGDMonitor] C:\Program Files\GSEC1\XGate2\bin\XGDMonitor.exe
O4 - HKLM\..\Run: [XGCCTVServer] C:\Program Files\GSEC1\XGate2\bin\CCTvServer.exe
O4 - HKLM\..\Run: [PCguard] C:\Program Files\Virgin Broadband\PCguard\RPS.exe
O4 - HKLM\..\Run: [DelayLoad] C:\DOCUME~1\PAULBA~1\LOCALS~1\Temp\atmadm.exe
O4 - HKLM\..\Run: [3c0e31d3] rundll32.exe "C:\WINDOWS\system32\yqqtblej.dll",b
O4 - HKLM\..\Run: [XGUpdateClient] "C:\Program Files\GSEC1\XGate2\\bin\XGUpdaterClient.exe" S
O4 - HKLM\..\RunOnce: [IndexCleaner] "C:\Program Files\Virgin Broadband\PCguard\IdxClnR.exe"
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [InstallProgram] C:\DOCUME~1\PAULBA~1\LOCALS~1\Temp\stdlan.exe
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Digital Line Detect.lnk = ?
O4 - Global Startup: Google Updater.lnk = C:\Program Files\Google\Google Updater\GoogleUpdater.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O7 - HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar2.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar2.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar2.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar2.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: Blog This - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra 'Tools' menuitem: &Blog This in Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O12 - Plugin for .UVR: C:\Program Files\Internet Explorer\Plugins\NPUPano.dll
O14 - IERESET.INF: START_PAGE_URL=http://www.tiscali.co.uk/
O16 - DPF: GIC - https://www.ib.albb..../ie/classes.cab
O16 - DPF: RaptisoftGameLoader - http://www.miniclip....tgameloader.cab
O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zon...kr.cab31267.cab
O16 - DPF: {01A88BB1-1174-41EC-ACCB-963509EAE56B} (SysProWmi Class) - http://support.euro....iler/SysPro.CAB
O16 - DPF: {0E5F0222-96B9-11D3-8997-00104BD12D94} (PCPitstop Utility) - http://pcpitstop.com...p/PCPitStop.CAB
O16 - DPF: {14B87622-7E19-4EA8-93B3-97215F77A6BC} (MessengerStatsClient Class) - http://messenger.zon...nt.cab31267.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=39204
O16 - DPF: {1754A1BA-A1DF-4F10-B199-AA55AA1A120F} (InstallerBehaviorFactory Class) - https://signup.msn.c...es/MsnInstC.cab
O16 - DPF: {193C772A-87BE-4B19-A7BB-445B226FE9A1} (ewidoOnlineScan Control) - http://downloads.ewi...oOnlineScan.cab
O16 - DPF: {20A60F0D-9AFA-4515-A0FD-83BD84642501} (Checkers Class) - http://messenger.zon...kr.cab56986.cab
O16 - DPF: {2250C29C-C5E9-4F55-BE4E-01E45A40FCF1} (CMediaMix Object) - http://musicmix.mess.../Medialogic.CAB
O16 - DPF: {288C5F13-7E52-4ADA-A32E-F5BF9D125F99} - http://www.miniclip....pGameLoader.dll
O16 - DPF: {2917297F-F02B-4B9D-81DF-494B6333150B} (Minesweeper Flags Class) - http://messenger.zon...er.cab31267.cab
O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} - http://download.mcaf...01/mcinsctl.cab
O16 - DPF: {5C051655-FCD5-4969-9182-770EA5AA5565} (Solitaire Showdown Class) - http://messenger.zon...wn.cab56986.cab
O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zon...1/GAME_UNO1.cab
O16 - DPF: {5F0C30E4-1E72-4DCC-85E5-57810F1CA97B} (McUpdatePortalFactory Class) - http://amiuptodate.m...pdatePortal.cab
O16 - DPF: {630F2610-7654-11D1-83E3-0080C71A8794} (Interconnect Resources) - https://www.ib.albb..../ebs/ie/gic.cab
O16 - DPF: {639658F3-B141-4D6B-B936-226F75A5EAC3} (CPlayFirstDinerDash2Control Object) - http://zone.msn.com/...h2.1.0.0.55.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.micros...b?1120168604453
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.mi...b?1187890063312
O16 - DPF: {6E5A37BF-FD42-463A-877C-4EB7002E68AE} (Housecall ActiveX 6.5) - http://housecall65.t...ivex/hcImpl.cab
O16 - DPF: {7584C670-2274-4EFB-B00B-D6AABA6D3850} (Microsoft RDP Client Control (redist)) - https://owa.boltonar...emote/msrdp.cab
O16 - DPF: {78AEEDE8-7345-4FB5-A8FE-4BFF16EF25FC} (McAfee Virtual Technician Control Class) - http://us-download.m...ted/mvt/mvt.cab
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zon...nt.cab31267.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn...pDownloader.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://messenger.zon...ro.cab47946.cab
O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} - http://download.mcaf...,26/mcgdmgr.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zon...nt.cab56907.cab
O16 - DPF: {CE3409C4-9E26-4F8E-83E4-778498F9E7B4} (PB_Uploader Class) - http://static.photob...on/uploader.cab
O16 - DPF: {DC75FEF6-165D-4D25-A518-C8C4BDA7BAA6} (CPlayFirstDinerDashControl Object) - http://zone.msn.com/...sh.1.0.0.89.cab
O16 - DPF: {F5A7706B-B9C0-4C89-A715-7A0C6B05DD48} (Minesweeper Flags Class) - http://messenger.zon...er.cab56986.cab
O16 - DPF: {F6BF0D00-0B2A-4A75-BF7B-F385591623AF} (Solitaire Showdown Class) - http://messenger.zon...wn.cab31267.cab
O20 - AppInit_DLLs: crs-runasuinit.dll,crs-runasuinit.dll,crs-runasuinit.dll,crs-runasuinit.dll
O23 - Service: crs-control - Raytown Corporation LLC. All rights reserved. - C:\WINDOWS\system32\crs-control.exe
O23 - Service: DvpApi (dvpapi) - Authentium, Inc. - C:\Program Files\Common Files\Authentium\AntiVirus\dvpapi.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: CA Pest Patrol Realtime Protection Service (ITMRTSVC) - CA, Inc. - C:\Program Files\CA\PPRT\bin\ITMRTSVC.exe
O23 - Service: LogMeIn Maintenance Service (LMIMaint) - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\RaMaint.exe
O23 - Service: LogMeIn - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\LogMeIn.exe
O23 - Service: Intel NCS NetService (NetSvc) - Intel® Corporation - C:\Program Files\Intel\PROSetWired\NCS\Sync\NetSvc.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: PDAgent - Raxco Software, Inc. - C:\Program Files\Raxco\PerfectDisk\PDAgent.exe
O23 - Service: PDEngine - Raxco Software, Inc. - C:\Program Files\Raxco\PerfectDisk\PDEngine.exe
O23 - Service: Virgin Broadband PCguard Update Service (RPSUpdaterR) - Radialpoint Inc. - C:\Program Files\Virgin Broadband\PCguard\rpsupdaterR.exe
O23 - Service: PCguard Firewall (RP_FWS) - Virgin Media - C:\Program Files\Virgin Broadband\PCguard\Fws.exe
O23 - Service: XGDMonitorService - Gsec1 - C:\Program Files\GSEC1\XGate2\bin\XGDMonitorSvr.exe
O23 - Service: XGate Restart Updater (XGRestartUpdater) - Gsec1 - C:\Program Files\GSEC1\XGate2\bin\XGRestartUpdater.exe
O23 - Service: XGSensorDownloader - Unknown owner - C:\Program Files\GSEC1\XGate2\bin\XGSensorDownloader.exe
O23 - Service: XGate Signature Updater (XGSignatureUpdater) - Gsec1 - C:\Program Files\GSEC1\XGate2\bin\XGSignatureUpdater.exe
O23 - Service: XGate Syslog Server (XGSyslogServer) - Gsec1 - C:\Program Files\GSEC1\XGate2\bin\XGSyslogServer.exe
--
End of file - 15338 bytes
Hello again
Since first post I have run mbam
here is log
Malwarebytes' Anti-Malware 1.17
Database version: 869
22:03:05 18/06/2008
mbam-log-6-18-2008 (22-03-05).txt
Scan type: Quick Scan
Objects scanned: 66798
Time elapsed: 25 minute(s), 34 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 5
Registry Keys Infected: 34
Registry Values Infected: 9
Registry Data Items Infected: 17
Folders Infected: 5
Files Infected: 33
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
C:\WINDOWS\SYSTEM32\nnnOeDUM.dll (Trojan.Vundo) -> Unloaded module successfully.
C:\WINDOWS\SYSTEM32\iifEWNGv.dll (Trojan.Vundo) -> Unloaded module successfully.
C:\WINDOWS\ksendlbtgbk.dll (Trojan.FakeAlert) -> Unloaded module successfully.
C:\WINDOWS\SYSTEM32\yqqtblej.dll (Trojan.Vundo) -> Unloaded module successfully.
C:\WINDOWS\SYSTEM32\pupdfo.dll (Trojan.FakeAlert) -> Unloaded module successfully.
Registry Keys Infected:
HKEY_CLASSES_ROOT\vrmdtneg.toolbar.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\iifewngv (Trojan.Vundo) -> Delete on reboot.
HKEY_CLASSES_ROOT\Interface\{fe8a736f-4124-4d9c-b4b1-3b12381efabe} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Adsl Software Limited (Rogue.MalWarrior) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Screensavers.com (Adware.Comet) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{e4e3e0f8-cd30-4380-8ce9-b96904bdefca} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{45d06dd4-7b73-4ce0-bf56-b3b2142e93fa} (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\vrmdtneg.bepm (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{caf9d798-c659-4b9b-8e19-ee27c3d04ee7} (Rogue.PestPatrol) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\bhonew.bhoapp.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{bbeebe4f-3eda-40f4-a0ab-87593ee49c56} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{373e0ccd-9986-41d9-b3e7-5d3d89c1d400} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6c952086-3ec4-46d0-8d4f-9826be178922} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{55882c5f-1f51-4c8b-9a92-d56a050dff54} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{9ff5bc03-dae4-48d9-a163-c2d102a2e5f8} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{c9c5deaf-0a1f-4660-8279-9edfad6fefe1} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\bhonew.bhoapp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{4c9daa96-6f06-46ec-890f-eb2f65641594} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{288c5f13-7e52-4ada-a32e-f5bf9d125f99} (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{450b9e4d-4014-4de3-b34e-014a81468293} (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{c7f00a9a-f1bc-436e-82c7-e8cae6fd67f7} (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{6c952086-3ec4-46d0-8d4f-9826be178922} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{bbeebe4f-3eda-40f4-a0ab-87593ee49c56} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6e3a76ec-4fda-4351-a5e7-c3cd8953fee3} (Trojan.Vundo) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{6e3a76ec-4fda-4351-a5e7-c3cd8953fee3} (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{078137b4-5cc7-4bde-872b-350ecb2e14ee} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{842e17dc-7e29-4543-ba38-15c060dacc68} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{45d06dd4-7b73-4ce0-bf56-b3b2142e93fa} (Trojan.Vundo) -> Delete on reboot.
Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3c0e31d3 (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\run\DelayLoad (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\InstallProgram (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\bf (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\bk (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\iu (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\mu (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{373e0ccd-9986-41d9-b3e7-5d3d89c1d400} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{45d06dd4-7b73-4ce0-bf56-b3b2142e93fa} (Trojan.Vundo) -> Delete on reboot.
Registry Data Items Infected:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyDocs (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Control Panel\International\sTimeFormat (Trojan.FakeAlert) -> Bad: (HH:mm: VIRUS ALERT!) Good: (HH:mm:ss) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowControlPanel (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowHelp (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\NoDispCPL (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives (Hijack.Drives) -> Bad: (12) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\nnnoedum -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\nnnoedum -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowSearch (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowRun (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetFolders (Hijack.Explorer) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoToolbarCustomize (Hijack.Explorer) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\StartMenuLogOff (Hijack.StartMenu) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyComputer (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductId (Trojan.FakeAlert) -> Bad: (VIRUS ALERT!) Good: (76477-OEM-0011903-00102) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoStartMenuMorePrograms (Hijack.StartMenu) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Folders Infected:
C:\Documents and Settings\All Users\Application Data\Adsl Software Limited (Rogue.MalWarrior) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Adsl Software Limited\WinSpywareProtect\LOG (Rogue.MalWarrior) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Adsl Software Limited\WinSpywareProtect (Rogue.MalWarrior) -> Quarantined and deleted successfully.
C:\WINDOWS\privacy_danger\images (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\privacy_danger (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Files Infected:
C:\WINDOWS\SYSTEM32\nnnOeDUM.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\MUDeOnnn.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\MUDeOnnn.ini2 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul Bartle\Local Settings\Temporary Internet Files\Content.IE5\G6RKXJ5Y\css4[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\yqqtblej.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\jelbtqqy.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul Bartle\Local Settings\Temporary Internet Files\Content.IE5\DZTTABNF\c-setup[1].exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\privacy_danger\images\capt.gif (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul Bartle\Local Settings\Temporary Internet Files\Content.IE5\V7CTIT3Z\c-setup[1].exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\neltabxw.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul Bartle\Favorites\Error Cleaner.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\Della Bartle\Desktop\Error Cleaner.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\iifEWNGv.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\privacy_danger\images\down.gif (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\privacy_danger\images\spacer.gif (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\pupdfo.dll (Trojan.FakeAlert) -> Delete on reboot.
C:\WINDOWS\ksendlbtgbk.dll (Trojan.FakeAlert) -> Delete on reboot.
C:\Documents and Settings\Della Bartle\Favorites\Error Cleaner.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Adsl Software Limited\WinSpywareProtect\WinSpywareProtect.exe (Rogue.MalWarrior) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul Bartle\Favorites\Privacy Protector.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\Paul Bartle\Favorites\Spyware&Malware Protection.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\WINDOWS\cookies.ini (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\Della Bartle\Favorites\Privacy Protector.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\clkcnt.txt (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\papdfan.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\nvs2.inf (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Documents and Settings\Della Bartle\Desktop\Spyware&Malware Protection.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\WINDOWS\privacy_danger\images\danger.jpg (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\xvorfwbd.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Adsl Software Limited\WinSpywareProtect\LOG\20080617093722375.log (Rogue.MalWarrior) -> Quarantined and deleted successfully.
C:\Documents and Settings\Della Bartle\Desktop\Privacy Protector.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\Della Bartle\Favorites\Spyware&Malware Protection.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\WINDOWS\evsm.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
I have also run superantispyware
here is log
SUPERAntiSpyware Scan Log
Generated 06/19/2008 at 10:36 AM
Application Version : 3.6.1000
Core Rules Database Version : 3484
Trace Rules Database Version: 1475
Scan type : Complete Scan
Total Scan Time : 03:07:27
Memory items scanned : 511
Memory threats detected : 0
Registry items scanned : 7182
Registry threats detected : 0
File items scanned : 159048
File threats detected : 176
Adware.Tracking Cookie
C:\Documents and Settings\Della Bartle\Cookies\della_bartle@2adultflashgames[1].txt
C:\Documents and Settings\Della Bartle\Cookies\della_bartle@2adultflashgames[2].txt
C:\Documents and Settings\Della Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Della Bartle\Cookies\della_bartle@adult3dcomics[2].txt
C:\Documents and Settings\Della Bartle\Cookies\della_bartle@hentaicounter[2].txt
C:\Documents and Settings\Della Bartle\Cookies\della_bartle@hentaisexsites[1].txt
C:\Documents and Settings\Della Bartle\Cookies\della_bartle@incestsexcomics[1].txt
C:\Documents and Settings\Della Bartle\Cookies\della_bartle@incestsexcomics[2].txt
C:\Documents and Settings\Della Bartle\Cookies\della_bartle@incestsextoons[2].txt
C:\Documents and Settings\Della Bartle\Cookies\della_bartle@incestsextoons[3].txt
C:\Documents and Settings\Della Bartle\Cookies\della_bartle@sexintheuk[2].txt
C:\Documents and Settings\Della Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Della Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Della Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Della Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Della Bartle\Cookies\[email protected][3].txt
C:\Documents and Settings\Della Bartle\Cookies\[email protected][4].txt
C:\Documents and Settings\Della Bartle\Cookies\[email protected][5].txt
C:\Documents and Settings\Della Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Della Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Della Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Della Bartle\Cookies\della_bartle@yadro[2].txt
C:\Documents and Settings\Kate Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Kate Bartle\Cookies\kate_bartle@inteletrack[2].txt
C:\Documents and Settings\Kate Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Kate Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@2adultflashgames[1].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@2adultflashgames[3].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@2o7[2].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@2o7[3].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@2o7[4].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@2o7[5].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@2o7[6].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@2o7[7].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@3dsexdream[2].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@77tracking[2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][3].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][4].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][5].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][6].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@adnetserver[1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][3].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@adult-empire[1].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@adultfriendfinder[2].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@adultfriendfinder[3].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@adultfriendfinder[4].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@amateurporntv[1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][3].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][4].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][3].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][4].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][4].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@click-fr[1].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@click-fr[2].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@clickpass[2].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@clicksor[1].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@collective-media[2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@directtrack[2].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@directtrack[3].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@fishadultgames[1].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@fishsexgames[2].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@focalex[1].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@hentaicounter[1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@kontera[1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][3].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][4].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@myroitracking[2].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@myroitracking[3].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@overture[1].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@overture[3].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@pornhub[1].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@[bleep]-shack[2].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@precisionclick[2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][3].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][3].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@sexy-toons[2].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@sexy-toons[3].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@socialmedia[2].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@socialmedia[3].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][3].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@teensforcash[1].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@teensforcash[2].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@tns-counter[1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][3].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][4].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][5].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][3].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][3].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][4].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][5].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][6].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][7].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@virginmedia[1].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@virginmedia[3].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][3].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][4].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][6].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][7].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][3].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][4].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][5].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][6].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][7].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][3].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][4].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][5].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][3].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Paul Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Paul Bartle\Cookies\paul_bartle@yadro[1].txt
C:\Documents and Settings\Ross Bartle\Cookies\ross_bartle@2adultflashgames[2].txt
C:\Documents and Settings\Ross Bartle\Cookies\[email protected][1].txt
C:\Documents and Settings\Ross Bartle\Cookies\ross_bartle@ero-advertising[1].txt
C:\Documents and Settings\Ross Bartle\Cookies\ross_bartle@huge[bleep]abletits[1].txt
C:\Documents and Settings\Ross Bartle\Cookies\ross_bartle@www.[bleep]ingtitvideosvod4free[2].txt
C:\Documents and Settings\Ross Bartle\Cookies\[email protected][bleep]abletits[2].txt
C:\Documents and Settings\Ross Bartle\Cookies\[email protected][2].txt
C:\Documents and Settings\Ross Bartle\Cookies\ross_bartle@xxxblackbook[2].txt
Desktop Hijacker.AboutYourPrivacy
C:\DOCUMENTS AND SETTINGS\DELLA BARTLE\LOCAL SETTINGS\TEMP\PRIVACY_DANGER\IMAGES\CAPT.GIF
C:\DOCUMENTS AND SETTINGS\DELLA BARTLE\LOCAL SETTINGS\TEMP\PRIVACY_DANGER\IMAGES\DOWN.GIF
Adware.Vundo Variant
C:\WINDOWS\SYSTEM32\CHSBRK.DLL
Adware.Vundo Variant/Rel
C:\WINDOWS\SYSTEM32\MCRH.TMP
This seems to have corrected most of problems but I am still getting numerous pop ups and web redirects.
here is new hijack this log
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 13:19:45, on 19/06/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16674)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Virgin Broadband\PCguard\Fws.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
C:\Program Files\CA\PPRT\bin\ITMRTSVC.exe
C:\Program Files\LogMeIn\x86\RaMaint.exe
C:\Program Files\LogMeIn\x86\LogMeIn.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Raxco\PerfectDisk\PDAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\GSEC1\XGate2\bin\XGDMonitorSvr.exe
C:\Program Files\GSEC1\XGate2\bin\XGSensorDownloader.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\GSEC1\XGate2\bin\XGSignatureUpdater.exe
C:\Program Files\GSEC1\XGate2\bin\XGSyslogServer.exe
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\Program Files\Dell\Media Experience\PCMService.exe
C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\WINDOWS\vsnpstd2.exe
C:\Program Files\LogMeIn\x86\LogMeInSystray.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Virgin Broadband\advisor\Broadbandadvisor.exe
C:\Program Files\GSEC1\XGate2\bin\XGSensor.exe
C:\Program Files\GSEC1\XGate2\bin\XGDMonitor.exe
C:\Program Files\GSEC1\XGate2\bin\CCTvServer.exe
C:\Program Files\Virgin Broadband\PCguard\RPS.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\Google\Google Updater\GoogleUpdater.exe
C:\Program Files\Virgin Broadband\PCguard\rpsupdaterR.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS\system32\notepad.exe
C:\Program Files\Common Files\Authentium\AntiVirus\dvpapi.exe
C:\WINDOWS\system32\notepad.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = The Bartles Internet Explorer
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
R3 - URLSearchHook: SweetIM For Internet Explorer - {BC4FFE41-DE9F-46fa-B455-AAD49B9F9938} - C:\Program Files\Macrogaming\SweetIMBarForIE\toolbar.dll (file missing)
O2 - BHO: (no name) - {174CA04F-6379-48FE-B065-3CA6CE72E748} - C:\WINDOWS\system32\chsbrk.dll (file missing)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: {8d27e6ad-f447-7369-2d94-59927862b467} - {764b2687-2995-49d2-9637-744fda6e72d8} - C:\WINDOWS\system32\yortgiyl.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (file missing)
O2 - BHO: (no name) - {A66E89B5-8078-45CC-8911-2DA4047CDF3E} - C:\WINDOWS\system32\chsbrk.dll (file missing)
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar3.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.0.301.7164\swg.dll (file missing)
O3 - Toolbar: (no name) - {0BF43445-2F28-4351-9252-17FE6E806AA0} - (no file)
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar3.dll
O3 - Toolbar: SweetIM For Internet Explorer - {BC4FFE41-DE9F-46fa-B455-AAD49B9F9938} - C:\Program Files\Macrogaming\SweetIMBarForIE\toolbar.dll (file missing)
O3 - Toolbar: XG Secure Banking - {9A01D559-EE43-4819-940A-F179D25A25A5} - C:\PROGRA~1\GSEC1\XGate2\bin\XGSECB~1.DLL
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\Core\smax4pnp.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Dell\Media Experience\PCMService.exe"
O4 - HKLM\..\
Edited by PBartle, 19 June 2008 - 06:21 AM.