Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Spy Sherriff Infection&Desktop Hijack [resolved]


  • This topic is locked This topic is locked

#1
jay540

jay540

    New Member

  • Member
  • Pip
  • 4 posts
I was infected by the Spy Sherriff, and my desktop was hijacked. THis happened due to a momentary lapse of better judgment on my part.

Anyway, you people are simply amazing. I have followed all steps that are listed here to remove malware and just wanted to post my HJT log to see if I missed anything. Your kindness is greatly appreciated. Keep up the good work.

Logfile of HijackThis v1.99.1
Scan saved at 11:28:53 AM, on 7/24/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\nvraidservice.exe
C:\Program Files\Creative\SBAudigy2ZS\Surround Mixer\CTSysVol.exe
C:\Program Files\Creative\SBAudigy2ZS\DVDAudio\CTDVDDET.EXE
C:\Program Files\Logitech\iTouch\iTouch.exe
C:\WINDOWS\system32\umonit.exe
C:\Program Files\Iomega\DriveIcons\ImgIcon.exe
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\Creative\MediaSource\RemoteControl\RCMan.EXE
C:\Program Files\ATI Multimedia\main\launchpd.exe
C:\Program Files\ATI Multimedia\main\ATIDtct.EXE
C:\Program Files\ATI Multimedia\RemCtrl\ATIRW.exe
C:\Program Files\ATI Technologies\ATI.ACE\CLI.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\CTsvcCDA.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\Program Files\ewido\security suite\ewidoguard.exe
C:\PROGRA~1\Iomega\System32\AppServices.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\WINDOWS\system32\wbem\unsecapp.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\PROGRA~1\SPYWAR~1\swdoctor.exe
C:\Utes\Antivirus\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~1\tools\iesdsg.dll
O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O4 - HKLM\..\Run: [CTHelper] CTHELPER.EXE
O4 - HKLM\..\Run: [AsioReg] REGSVR32.EXE /S CTASIO.DLL
O4 - HKLM\..\Run: [SBDrvDet] C:\Program Files\Creative\SB Drive Det\SBDrvDet.exe /r
O4 - HKLM\..\Run: [UpdReg] C:\WINDOWS\UpdReg.EXE
O4 - HKLM\..\Run: [DevconDefaultDB] C:\WINDOWS\READREG /PSCONV={NO}
O4 - HKLM\..\Run: [NVRaidService] C:\WINDOWS\system32\nvraidservice.exe
O4 - HKLM\..\Run: [NVMixerTray] "C:\Program Files\NVIDIA Corporation\NvMixer\NVMixerTray.exe"
O4 - HKLM\..\Run: [SmartGuardian] C:\Program Files\ITE\Smart Guardian\ITESmart.exe
O4 - HKLM\..\Run: [CTSysVol] C:\Program Files\Creative\SBAudigy2ZS\Surround Mixer\CTSysVol.exe /r
O4 - HKLM\..\Run: [CTDVDDET] C:\Program Files\Creative\SBAudigy2ZS\DVDAudio\CTDVDDET.EXE
O4 - HKLM\..\Run: [zBrowser Launcher] C:\Program Files\Logitech\iTouch\iTouch.exe
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [UMonit] C:\WINDOWS\system32\umonit.exe
O4 - HKLM\..\Run: [Iomega Drive Icons] C:\Program Files\Iomega\DriveIcons\ImgIcon.exe
O4 - HKLM\..\Run: [Deskup] C:\Program Files\Iomega\DriveIcons\deskup.exe /IMGSTART
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [NVIDIA nTune] "C:\Program Files\NVIDIA Corporation\nTune\\nTune.exe" clear
O4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\cli.exe" runtime
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKCU\..\Run: [SetDefaultMIDI] MIDIDef.exe
O4 - HKCU\..\Run: [RemoteCenter] C:\Program Files\Creative\MediaSource\RemoteControl\RCMan.EXE
O4 - HKCU\..\Run: [ATI Launchpad] "C:\Program Files\ATI Multimedia\main\launchpd.exe"
O4 - HKCU\..\Run: [ATI DeviceDetect] C:\Program Files\ATI Multimedia\main\ATIDtct.EXE
O4 - HKCU\..\Run: [ATI Remote Control] C:\Program Files\ATI Multimedia\RemCtrl\ATIRW.exe
O4 - HKCU\..\Run: [SNInstall] C:\winstall.exe
O4 - HKCU\..\Run: [Spyware Doctor] C:\PROGRA~1\SPYWAR~1\swdoctor.exe /Q
O4 - Global Startup: ATI CATALYST System Tray.lnk = C:\Program Files\ATI Technologies\ATI.ACE\CLI.exe
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O9 - Extra button: ATI TV - {44226DFF-747E-4edc-B30C-78752E50CD0C} - C:\Program Files\ATI Multimedia\tv\EXPLBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O15 - Trusted IP range: 67.19.178.84
O15 - Trusted IP range: 67.19.178.84 (HKLM)
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - Unknown owner - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: avast! Antivirus - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido\security suite\ewidoguard.exe
O23 - Service: Iomega App Services - Iomega Corporation - C:\PROGRA~1\Iomega\System32\AppServices.exe
O23 - Service: X10 Device Network Service (x10nets) - Unknown owner - C:\PROGRA~1\ATIMUL~1\RemCtrl\x10nets.exe (file missing)

jay
  • 0

Advertisements


#2
g2i2r4

g2i2r4

    retired HiJack Helper

  • Retired Staff
  • 5,080 posts
Welcome jay540 to Geeks to Go!

Please read these instructions carefully. You may want to print them. Copy the text to a Notepad file and save it to your desktop! We will need the file later.
Be sure to follow ALL instructions!



Download SmitRem to your desktop.
Right click on the file and extract it to it's own folder on the desktop.

***

Place a shortcut to Panda ActiveScan on your desktop.

***

Launch ewido, there should be an icon on your desktop double-click it.

The program will now go to the main screen
You will need to update ewido to the latest definition files.On the left hand side of the main screen click update
Click on Start
The update will start and a progress bar will show the updates being installed.
Once the updates are installed, close Ewido for now.

***

If you have not already installed Ad-Aware SE 1.06, please download and install AdAware SE 1.06.
Check Here on how setup and use it - please make sure you update it first.

***

Download: deldomains.
To use: right-click and select: Install (no need to restart)
Should the link above display the text instead of downloading the file, then copy & paste the text into notepad and save the file as DellDomains.inf
Note: This will remove all entries in the "Trusted Zone" and "Ranges" also.

***

Next, please reboot your computer in Safe Mode by doing the following:
1) Restart your computer
2) After hearing your computer beep once during startup, but before the Windows icon appears, press F8.
3) Instead of Windows loading as normal, a menu should appear
4) Select the first option, to run Windows in Safe Mode.

For additional help in booting into Safe Mode, see the following site:
http://www.pchell.co.../safemode.shtml

***

Open the smitRem folder, then double click the RunThis.bat file to start the tool. Follow the prompts on screen.
Wait for the tool to complete and disk cleanup to finish.
The tool will create a log named smitfiles.txt in the root of your drive, eg; Local Disk C: or partition where your operating system is installed.
Post me the contents of the smitfiles.txt log as you post back.

***

Open Ad-aware and do a full scan. Remove all it finds.

***

Now open Ewido Security Suite:* Click on scanner
* Click Complete System Scan and the scan will begin.
* During the scan it will prompt you to clean files, click OK
* When the scan is finished, look at the bottom of the screen and click the Save report button.
* Save the report to your desktop
Reboot your computer.

***

Next go to Control Panel click Display > Desktop > Customize Desktop > Web > Uncheck "Security Info" if present.

***

Reboot back into Windows and click the Panda ActiveScan shortcut, then do a full system scan. Make sure the autoclean box is checked!
Save the scan log and post it along with a new HijackThis Log, the contents of the smitfiles.txt log and the Ewido Log by using Add Reply.

Edited by g2i2r4, 24 July 2005 - 11:45 AM.

  • 0

#3
jay540

jay540

    New Member

  • Topic Starter
  • Member
  • Pip
  • 4 posts
Q2i2r4

Thanks very much for your assistance in this matter. It is greatly appreciated. I ran all the processes as you described.

Below are all the logs that you have requested. Please let me know if you need me to run any more processes: (Please note that the Panda report was a tiff file, therefore I had to get OCR text. As a result some text may be weird.)

Logfile of HijackThis v1.99.1
Scan saved at 8:43:16 PM, on 7/25/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Panda Software\Panda Titanium Antivirus 2005\PavProt.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\CTsvcCDA.exe
C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
C:\WINDOWS\system32\nvraidservice.exe
C:\Program Files\Executive Software\Diskeeper\DkService.exe
C:\Program Files\Creative\SBAudigy2ZS\Surround Mixer\CTSysVol.exe
C:\Program Files\Creative\SBAudigy2ZS\DVDAudio\CTDVDDET.EXE
C:\Program Files\Logitech\iTouch\iTouch.exe
C:\WINDOWS\system32\umonit.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\PROGRA~1\McAfee.com\PERSON~1\MpfTray.exe
C:\PROGRA~1\mcafee.com\vso\mcvsshld.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\Program Files\Iomega\AutoDisk\ADUserMon.exe
C:\Program Files\Iomega\DriveIcons\ImgIcon.exe
c:\progra~1\mcafee.com\vso\mcvsescn.exe
C:\Program Files\ewido\security suite\ewidoguard.exe
C:\WINDOWS\TPPALDR.EXE
C:\Program Files\Panda Software\Panda Titanium Antivirus 2005\APVXDWIN.EXE
C:\Program Files\Creative\MediaSource\RemoteControl\RCMan.EXE
C:\Program Files\ATI Multimedia\main\launchpd.exe
C:\PROGRA~1\McAfee.com\PERSON~1\MpfAgent.exe
C:\PROGRA~1\Iomega\System32\AppServices.exe
C:\Program Files\ATI Multimedia\main\ATIDtct.EXE
c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
C:\Program Files\ATI Multimedia\RemCtrl\ATIRW.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\PROGRA~1\McAfee.com\PERSON~1\MPFSERVICE.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Panda Software\Panda Titanium Antivirus 2005\PavFnSvr.exe
C:\Program Files\ATI Technologies\ATI.ACE\CLI.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Panda Software\Panda Titanium Antivirus 2005\Pavkre.exe
C:\Program Files\Common Files\Panda Software\PavShld\pavprsrv.exe
C:\Program Files\Panda Software\Panda Titanium Antivirus 2005\pavsrv51.exe
C:\Program Files\Panda Software\Panda Titanium Antivirus 2005\AVENGINE.EXE
C:\Program Files\Panda Software\Panda Titanium Antivirus 2005\prevsrv.exe
C:\Program Files\Panda Software\Panda Titanium Antivirus 2005\PsImSvc.exe
C:\Program Files\Iomega\AutoDisk\ADService.exe
C:\Program Files\Panda Software\Panda Titanium Antivirus 2005\WebProxy.exe
c:\PROGRA~1\mcafee.com\vso\mcshield.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\Panda Software\Panda Titanium Antivirus 2005\AvltMain.exe
C:\WINDOWS\system32\WISPTIS.EXE
C:\Program Files\Internet Explorer\iexplore.exe
L:\Utes\Antivirus\HiJackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - F:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~1\tools\iesdsg.dll
O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O3 - Toolbar: McAfee VirusScan - {BA52B914-B692-46c4-B683-905236F6F655} - c:\progra~1\mcafee.com\vso\mcvsshl.dll
O4 - HKLM\..\Run: [CTHelper] CTHELPER.EXE
O4 - HKLM\..\Run: [AsioReg] REGSVR32.EXE /S CTASIO.DLL
O4 - HKLM\..\Run: [SBDrvDet] C:\Program Files\Creative\SB Drive Det\SBDrvDet.exe /r
O4 - HKLM\..\Run: [UpdReg] C:\WINDOWS\UpdReg.EXE
O4 - HKLM\..\Run: [DevconDefaultDB] C:\WINDOWS\READREG /PSCONV={NO}
O4 - HKLM\..\Run: [NVRaidService] C:\WINDOWS\system32\nvraidservice.exe
O4 - HKLM\..\Run: [NVMixerTray] "C:\Program Files\NVIDIA Corporation\NvMixer\NVMixerTray.exe"
O4 - HKLM\..\Run: [SmartGuardian] C:\Program Files\ITE\Smart Guardian\ITESmart.exe
O4 - HKLM\..\Run: [CTSysVol] C:\Program Files\Creative\SBAudigy2ZS\Surround Mixer\CTSysVol.exe /r
O4 - HKLM\..\Run: [CTDVDDET] C:\Program Files\Creative\SBAudigy2ZS\DVDAudio\CTDVDDET.EXE
O4 - HKLM\..\Run: [zBrowser Launcher] C:\Program Files\Logitech\iTouch\iTouch.exe
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [UMonit] C:\WINDOWS\system32\umonit.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [NVIDIA nTune] "C:\Program Files\NVIDIA Corporation\nTune\\nTune.exe" clear
O4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\cli.exe" runtime
O4 - HKLM\..\Run: [MCAgentExe] c:\PROGRA~1\mcafee.com\agent\mcagent.exe
O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\mcafee.com\agent\mcupdate.exe
O4 - HKLM\..\Run: [MPFExe] C:\PROGRA~1\McAfee.com\PERSON~1\MpfTray.exe
O4 - HKLM\..\Run: [VSOCheckTask] "c:\PROGRA~1\mcafee.com\vso\mcmnhdlr.exe" /checktask
O4 - HKLM\..\Run: [VirusScan Online] "c:\PROGRA~1\mcafee.com\vso\mcvsshld.exe"
O4 - HKLM\..\Run: [ADUserMon] C:\Program Files\Iomega\AutoDisk\ADUserMon.exe
O4 - HKLM\..\Run: [Iomega Drive Icons] C:\Program Files\Iomega\DriveIcons\ImgIcon.exe
O4 - HKLM\..\Run: [Deskup] C:\Program Files\Iomega\DriveIcons\deskup.exe /IMGSTART
O4 - HKLM\..\Run: [TPP Auto Loader] C:\WINDOWS\TPPALDR.EXE
O4 - HKLM\..\Run: [DiskeeperSystray] "C:\Program Files\Executive Software\Diskeeper\DkIcon.exe"
O4 - HKLM\..\Run: [APVXDWIN] "C:\Program Files\Panda Software\Panda Titanium Antivirus 2005\APVXDWIN.EXE" /s
O4 - HKCU\..\Run: [SetDefaultMIDI] MIDIDef.exe
O4 - HKCU\..\Run: [RemoteCenter] C:\Program Files\Creative\MediaSource\RemoteControl\RCMan.EXE
O4 - HKCU\..\Run: [ATI Launchpad] "C:\Program Files\ATI Multimedia\main\launchpd.exe"
O4 - HKCU\..\Run: [ATI DeviceDetect] C:\Program Files\ATI Multimedia\main\ATIDtct.EXE
O4 - HKCU\..\Run: [ATI Remote Control] C:\Program Files\ATI Multimedia\RemCtrl\ATIRW.exe
O4 - HKCU\..\Run: [SNInstall] C:\winstall.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Global Startup: ATI CATALYST System Tray.lnk = C:\Program Files\ATI Technologies\ATI.ACE\CLI.exe
O4 - Global Startup: VPN Client.lnk = ?
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O9 - Extra button: ATI TV - {44226DFF-747E-4edc-B30C-78752E50CD0C} - C:\Program Files\ATI Multimedia\tv\EXPLBAR.DLL
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O15 - Trusted IP range: 67.19.178.84
O15 - Trusted IP range: 67.19.178.84 (HKLM)
O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcaf...83/mcinsctl.cab
O20 - Winlogon Notify: PCANotify - C:\WINDOWS\SYSTEM32\PCANotify.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.exe
O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
O23 - Service: Diskeeper - Executive Software International, Inc. - C:\Program Files\Executive Software\Diskeeper\DkService.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido\security suite\ewidoguard.exe
O23 - Service: Iomega App Services - Iomega Corporation - C:\PROGRA~1\Iomega\System32\AppServices.exe
O23 - Service: McAfee.com McShield (McShield) - Unknown owner - c:\PROGRA~1\mcafee.com\vso\mcshield.exe
O23 - Service: McAfee SecurityCenter Update Manager (mcupdmgr.exe) - McAfee, Inc - C:\PROGRA~1\McAfee.com\Agent\mcupdmgr.exe
O23 - Service: McAfee.com VirusScan Online Realtime Engine (MCVSRte) - Networks Associates Technology, Inc - c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee Corporation - C:\PROGRA~1\McAfee.com\PERSON~1\MPFSERVICE.exe
O23 - Service: Panda Function Service (PAVFNSVR) - Panda Software - C:\Program Files\Panda Software\Panda Titanium Antivirus 2005\PavFnSvr.exe
O23 - Service: Panda Pavkre (Pavkre) - Panda Software - C:\Program Files\Panda Software\Panda Titanium Antivirus 2005\Pavkre.exe
O23 - Service: Panda PavProt (PavProt) - Panda Software - C:\Program Files\Panda Software\Panda Titanium Antivirus 2005\PavProt.exe
O23 - Service: Panda Process Protection Service (PavPrSrv) - Panda Software - C:\Program Files\Common Files\Panda Software\PavShld\pavprsrv.exe
O23 - Service: Panda anti-virus service (PAVSRV) - Panda Software - C:\Program Files\Panda Software\Panda Titanium Antivirus 2005\pavsrv51.exe
O23 - Service: Panda Preventium+ Service (PREVSRV) - Panda Software - C:\Program Files\Panda Software\Panda Titanium Antivirus 2005\prevsrv.exe
O23 - Service: Panda IManager Service (PSIMSVC) - Panda Software Internacional - C:\Program Files\Panda Software\Panda Titanium Antivirus 2005\PsImSvc.exe
O23 - Service: X10 Device Network Service (x10nets) - Unknown owner - C:\PROGRA~1\ATIMUL~1\RemCtrl\x10nets.exe (file missing)
O23 - Service: Iomega Active Disk (_IOMEGA_ACTIVE_DISK_SERVICE_) - Iomega Corporation - C:\Program Files\Iomega\AutoDisk\ADService.exe

---------------------------------------------------------
ewido security suite - Scan report
---------------------------------------------------------

+ Created on: 9:35:38 AM, 7/25/2005
+ Report-Checksum: 37C1B778

+ Scan result:

:mozilla.12:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Questionmarket : Cleaned with backup
:mozilla.21:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Googleadservices : Cleaned with backup
:mozilla.22:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Doubleclick : Cleaned with backup
:mozilla.25:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Atdmt : Cleaned with backup
:mozilla.32:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Mediaplex : Cleaned with backup
:mozilla.33:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Hitbox : Cleaned with backup
:mozilla.34:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Hitbox : Cleaned with backup
:mozilla.35:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Hitbox : Cleaned with backup
:mozilla.42:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Valueclick : Cleaned with backup
:mozilla.56:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.57:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.72:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
:mozilla.73:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Fastclick : Cleaned with backup
:mozilla.74:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Fastclick : Cleaned with backup
:mozilla.75:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
:mozilla.76:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
:mozilla.90:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Overture : Cleaned with backup
:mozilla.91:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Overture : Cleaned with backup
:mozilla.94:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.95:F:\Documents and Settings\user\Application Data\Mozilla\Firefox\Profiles\default.09d\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
F:\Program Files\iPass\iPassConnect Corporate\idialer.exe -> Heuristic.Win32.Dialer : Cleaned with backup
:mozilla.6:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Atdmt : Cleaned with backup
:mozilla.10:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
:mozilla.11:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
:mozilla.12:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
:mozilla.13:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
:mozilla.14:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.15:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.16:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.21:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.22:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.23:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.24:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.26:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.27:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.28:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.29:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.2o7 : Cleaned with backup
:mozilla.48:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Mediaplex : Cleaned with backup
:mozilla.49:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Mediaplex : Cleaned with backup
:mozilla.56:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Pointroll : Cleaned with backup
:mozilla.57:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Pointroll : Cleaned with backup
:mozilla.58:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Pointroll : Cleaned with backup
:mozilla.59:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Pointroll : Cleaned with backup
:mozilla.60:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Doubleclick : Cleaned with backup
:mozilla.69:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Addynamix : Cleaned with backup
:mozilla.70:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Questionmarket : Cleaned with backup
:mozilla.71:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.72:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.73:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.74:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.75:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.76:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.77:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.78:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.79:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.80:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.81:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.82:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.83:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.84:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.85:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.86:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.87:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.88:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.89:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.90:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.91:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.92:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.93:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.94:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.95:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.96:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.97:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.98:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.99:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.100:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.101:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.102:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.103:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.104:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.105:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.106:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.107:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.108:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.109:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.110:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.111:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.112:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Centrport : Cleaned with backup
:mozilla.116:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Hitbox : Cleaned with backup
:mozilla.117:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Hitbox : Cleaned with backup
:mozilla.118:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Hitbox : Cleaned with backup
:mozilla.131:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Falkag : Cleaned with backup
:mozilla.132:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Falkag : Cleaned with backup
:mozilla.133:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Falkag : Cleaned with backup
:mozilla.134:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Falkag : Cleaned with backup
:mozilla.135:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Falkag : Cleaned with backup
:mozilla.138:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Hitbox : Cleaned with backup
:mozilla.147:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Hitbox : Cleaned with backup
:mozilla.152:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Googleadservices : Cleaned with backup
:mozilla.158:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Commission-junction : Cleaned with backup
:mozilla.159:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Commission-junction : Cleaned with backup
:mozilla.173:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Liveperson : Cleaned with backup
:mozilla.174:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Liveperson : Cleaned with backup
:mozilla.175:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Liveperson : Cleaned with backup
:mozilla.176:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Liveperson : Cleaned with backup
:mozilla.204:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Fastclick : Cleaned with backup
:mozilla.221:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Hitbox : Cleaned with backup
:mozilla.227:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Falkag : Cleaned with backup
:mozilla.229:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Falkag : Cleaned with backup
:mozilla.230:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Falkag : Cleaned with backup
:mozilla.231:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Falkag : Cleaned with backup
:mozilla.235:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Falkag : Cleaned with backup
:mozilla.236:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.241:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Webtrendslive : Cleaned with backup
:mozilla.244:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Bluestreak : Cleaned with backup
:mozilla.245:G:\Documents and Settings\Jay\Application Data\Mozilla\Firefox\Profiles\vhudvizl.default\cookies.txt -> Spyware.Cookie.Burstnet : Cleaned with backup
G:\Documents and Settings\KJ\Cookies\kj@2o7[1].txt -> Spyware.Cookie.2o7 : Cleaned with backup
G:\Documents and Settings\KJ\Cookies\kj@ads.pointroll[1].txt -> Spyware.Cookie.Pointroll : Cleaned with backup
G:\Documents and Settings\KJ\Cookies\kj@as-us.falkag[2].txt -> Spyware.Cookie.Falkag : Cleaned with backup
G:\Documents and Settings\KJ\Cookies\kj@bluestreak[1].txt -> Spyware.Cookie.Bluestreak : Cleaned with backup
G:\Documents and Settings\KJ\Cookies\kj@bs.serving-sys[1].txt -> Spyware.Cookie.Serving-sys : Cleaned with backup
G:\Documents and Settings\KJ\Cookies\kj@burstnet[2].txt -> Spyware.Cookie.Burstnet : Cleaned with backup
G:\Documents and Settings\KJ\Cookies\kj@casalemedia[2].txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
G:\Documents and Settings\KJ\Cookies\kj@server.iad.liveperson[1].txt -> Spyware.Cookie.Liveperson : Cleaned with backup
G:\Documents and Settings\KJ\Cookies\kj@serving-sys[2].txt -> Spyware.Cookie.Serving-sys : Cleaned with backup
G:\Documents and Settings\KJ\Cookies\kj@spylog[2].txt -> Spyware.Cookie.Spylog : Cleaned with backup
G:\Documents and Settings\KJ\Cookies\kj@trafficmp[2].txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
G:\Documents and Settings\KJ\Cookies\kj@tribalfusion[1].txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
G:\Documents and Settings\KJ\Cookies\kj@z1.adserver[1].txt -> Spyware.Cookie.Adserver : Cleaned with backup
G:\Program Files\WildTangent\Components\SystemConfig0100.dll -> Spyware.WinAD : Cleaned with backup
G:\WINDOWS\wt\wtupdates\wtwebdriver\files\3.3.1.001\npwthost.dll -> Spyware.WildTangent : Cleaned with backup


::Report End




smitRem log file
version 2.2

by noahdfear

The current date is: Mon 07/25/2005
The current time is: 7:38:29.04

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Pre-run Files Present


~~~ Program Files ~~~



~~~ Shortcuts ~~~

Install.dat


~~~ Favorites ~~~



~~~ system32 folder ~~~



~~~ Windows directory ~~~



~~~ Drive root ~~~

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Post-run Files Present


~~~ Program Files ~~~



~~~ Shortcuts ~~~



~~~ Favorites ~~~



~~~ system32 folder ~~~



~~~ Windows directory ~~~



~~~ Drive root ~~~



~~~ Wininet.dll ~~~

CLEAN!


Panda Antivirus: Incident repert.
EVENT
Adware detected: Adware/Ademart
ADDITIONAL INFORMATION
Adware detected: Adware/AzeSearch Lecatien:
Adware detected: Adware/CWS .Searchmeuptecatien:
Adware detected: Adware/ExactSearch Lecatien:
Adware detected: Adware/ILeekup Lecatien:
Scan cempieted Scan: All
Scan etarted Scan: All
Spyware detected: Cnekie/Neink Lecatien:
Spyware detected: Ceekie/Neink Lecatien:
Spyware detected: Cnekie/Cem.cem Lecatien:
Spyware detected: Cnekie/Imrwnridwide Lecatien:
Spyware detected: Ceekie/Zede Lncatinn:
Virns detected: Trj/Cryptic.A Lncatinn:
Virns detected: Trj/Onwnleader.DLN Lncatinn:
C:\WINOOWS\eyetem32\$$$ .lng C: \WINOOWS\eyetem32\abirvaig.dli
DATE-TIME EESOLTS
Lncatinn: C: \WINOOWS\eyetem32\vx.tll
C:\Oncnmente and
C:\Oncnmente and
Windewe Eegietry
C:\Oncnmente and
My Cnmpnter
My Cnmpnter
G:\Oncnmente and
G:\Oncnmente and
G:\Oncnmente and
G:\Oncnmente and
G:\Oncnmente and
Settinge\JE\Favn. . . \Anime eito7/25/05
Settinge\Aii. . . \Spyware Eemnro7/25/05
07 /25/05
Settinge\JE\Favnritee\Gambiiro7/25/05
07 /25/05
07/25/05
Settinge\KJ\Cnnkies\kj @beink [07/25/05
Settinge\KJ. . . \kj@diet.beink[07/25/05
Settinge\KJ\Cnnkies\kj@cnm[2]07/25/05
Settinge\KJ\Cn. . . \kj @cgi—bin [07/25/05
Settinge\EJ\Cnnkies\kj@zedn [207/25/05
07/25/05 09:43:’Eiiminated
09:43: dEilminated
09:43: Eliminated
09:43: Eliminated
09:43: Eiiminated
20:33:24
09:42:55
10:27: Eiiminated
10:27 :Tiiminated
10:27 :Tiiminated
10:27: Eiiminated
10:27 :Tiiminated
07/25/05 09:43:dOieinfected
07/25/05 09:43:!Oieinfected
  • 0

#4
g2i2r4

g2i2r4

    retired HiJack Helper

  • Retired Staff
  • 5,080 posts
Download the Killbox.
Unzip it to the desktop

Double-click Killbox.exe to run it.

Select "Delete on Reboot".
Place the following line (complete path) in bold in the "Full Path of File to Delete" box in Killbox:
C:\winstall.exe
Put a mark next to "Delete on Reboot"
Click the red-and-white "Delete File" button. Click "Yes" at the Delete on Reboot prompt. Click "No" at the Pending Operations prompt.
If your computer does not restart automatically, please restart it manually.

***

reboot to safe mode.

***

Open HijackThis
Place a check against each of the following, making sure you get them all and not any others by mistake:

O4 - HKCU\..\Run: [SNInstall] C:\winstall.exe
O15 - Trusted IP range: 67.19.178.84
O15 - Trusted IP range: 67.19.178.84 (HKLM)

Close all programs leaving only HijackThis running.
Click on Fix Checked when finished and exit HijackThis.

***

Reboot back to normal mode. Post me a fresh log using HijackThis to check if it's all gone.

Is the computer running ok now?
  • 0

#5
jay540

jay540

    New Member

  • Topic Starter
  • Member
  • Pip
  • 4 posts
q2,

once again, your assistance is greatly appreciated. I am posting my hijack this log after running the last process as per your suggestion. Hopefully this has cleaned everything.

I am currently running McAfee firewall + Antivirus. Do you think I need any other program to be running? I bought spy doctor but I don't want to slow my comp down. I will probably run it every week.

Logfile of HijackThis v1.99.1
Scan saved at 9:30:17 PM, on 7/26/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\SYSTEM32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\CTsvcCDA.exe
C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
C:\Program Files\Executive Software\Diskeeper\DkService.exe
C:\PROGRA~1\Iomega\System32\AppServices.exe
c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\PROGRA~1\McAfee.com\PERSON~1\MPFSERVICE.exe
C:\Program Files\Iomega\AutoDisk\ADService.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\SYSTEM32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\WINDOWS\system32\nvraidservice.exe
C:\Program Files\Creative\SBAudigy2ZS\Surround Mixer\CTSysVol.exe
C:\Program Files\Creative\SBAudigy2ZS\DVDAudio\CTDVDDET.EXE
C:\Program Files\Logitech\iTouch\iTouch.exe
C:\WINDOWS\system32\umonit.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\PROGRA~1\McAfee.com\PERSON~1\MpfTray.exe
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\PROGRA~1\mcafee.com\vso\mcvsshld.exe
C:\Program Files\Iomega\AutoDisk\ADUserMon.exe
c:\progra~1\mcafee.com\vso\mcvsescn.exe
C:\Program Files\Iomega\DriveIcons\ImgIcon.exe
C:\WINDOWS\TPPALDR.EXE
C:\Program Files\Creative\MediaSource\RemoteControl\RCMan.EXE
C:\Program Files\ATI Multimedia\main\launchpd.exe
C:\Program Files\ATI Multimedia\main\ATIDtct.EXE
C:\Program Files\ATI Multimedia\RemCtrl\ATIRW.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\ATI Technologies\ATI.ACE\CLI.exe
c:\PROGRA~1\mcafee.com\vso\mcshield.exe
C:\WINDOWS\system32\rundll32.exe
C:\PROGRA~1\McAfee.com\PERSON~1\MpfAgent.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
L:\Utes\Antivirus\HiJackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - F:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~1\tools\iesdsg.dll
O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O3 - Toolbar: McAfee VirusScan - {BA52B914-B692-46c4-B683-905236F6F655} - c:\progra~1\mcafee.com\vso\mcvsshl.dll
O4 - HKLM\..\Run: [CTHelper] CTHELPER.EXE
O4 - HKLM\..\Run: [AsioReg] REGSVR32.EXE /S CTASIO.DLL
O4 - HKLM\..\Run: [SBDrvDet] C:\Program Files\Creative\SB Drive Det\SBDrvDet.exe /r
O4 - HKLM\..\Run: [UpdReg] C:\WINDOWS\UpdReg.EXE
O4 - HKLM\..\Run: [DevconDefaultDB] C:\WINDOWS\READREG /PSCONV={NO}
O4 - HKLM\..\Run: [NVRaidService] C:\WINDOWS\system32\nvraidservice.exe
O4 - HKLM\..\Run: [NVMixerTray] "C:\Program Files\NVIDIA Corporation\NvMixer\NVMixerTray.exe"
O4 - HKLM\..\Run: [SmartGuardian] C:\Program Files\ITE\Smart Guardian\ITESmart.exe
O4 - HKLM\..\Run: [CTSysVol] C:\Program Files\Creative\SBAudigy2ZS\Surround Mixer\CTSysVol.exe /r
O4 - HKLM\..\Run: [CTDVDDET] C:\Program Files\Creative\SBAudigy2ZS\DVDAudio\CTDVDDET.EXE
O4 - HKLM\..\Run: [zBrowser Launcher] C:\Program Files\Logitech\iTouch\iTouch.exe
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [UMonit] C:\WINDOWS\system32\umonit.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [NVIDIA nTune] "C:\Program Files\NVIDIA Corporation\nTune\\nTune.exe" clear
O4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\cli.exe" runtime
O4 - HKLM\..\Run: [MCAgentExe] c:\PROGRA~1\mcafee.com\agent\mcagent.exe
O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\mcafee.com\agent\mcupdate.exe
O4 - HKLM\..\Run: [MPFExe] C:\PROGRA~1\McAfee.com\PERSON~1\MpfTray.exe
O4 - HKLM\..\Run: [VSOCheckTask] "c:\PROGRA~1\mcafee.com\vso\mcmnhdlr.exe" /checktask
O4 - HKLM\..\Run: [VirusScan Online] "c:\PROGRA~1\mcafee.com\vso\mcvsshld.exe"
O4 - HKLM\..\Run: [ADUserMon] C:\Program Files\Iomega\AutoDisk\ADUserMon.exe
O4 - HKLM\..\Run: [Iomega Drive Icons] C:\Program Files\Iomega\DriveIcons\ImgIcon.exe
O4 - HKLM\..\Run: [Deskup] C:\Program Files\Iomega\DriveIcons\deskup.exe /IMGSTART
O4 - HKLM\..\Run: [TPP Auto Loader] C:\WINDOWS\TPPALDR.EXE
O4 - HKLM\..\Run: [DiskeeperSystray] "C:\Program Files\Executive Software\Diskeeper\DkIcon.exe"
O4 - HKCU\..\Run: [SetDefaultMIDI] MIDIDef.exe
O4 - HKCU\..\Run: [RemoteCenter] C:\Program Files\Creative\MediaSource\RemoteControl\RCMan.EXE
O4 - HKCU\..\Run: [ATI Launchpad] "C:\Program Files\ATI Multimedia\main\launchpd.exe"
O4 - HKCU\..\Run: [ATI DeviceDetect] C:\Program Files\ATI Multimedia\main\ATIDtct.EXE
O4 - HKCU\..\Run: [ATI Remote Control] C:\Program Files\ATI Multimedia\RemCtrl\ATIRW.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Global Startup: ATI CATALYST System Tray.lnk = C:\Program Files\ATI Technologies\ATI.ACE\CLI.exe
O4 - Global Startup: VPN Client.lnk = ?
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O9 - Extra button: ATI TV - {44226DFF-747E-4edc-B30C-78752E50CD0C} - C:\Program Files\ATI Multimedia\tv\EXPLBAR.DLL
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O15 - Trusted IP range: 67.19.178.84
O15 - Trusted IP range: 67.19.178.84 (HKLM)
O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcaf...83/mcinsctl.cab
O20 - Winlogon Notify: PCANotify - C:\WINDOWS\SYSTEM32\PCANotify.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.exe
O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
O23 - Service: Diskeeper - Executive Software International, Inc. - C:\Program Files\Executive Software\Diskeeper\DkService.exe
O23 - Service: Iomega App Services - Iomega Corporation - C:\PROGRA~1\Iomega\System32\AppServices.exe
O23 - Service: McAfee.com McShield (McShield) - Unknown owner - c:\PROGRA~1\mcafee.com\vso\mcshield.exe
O23 - Service: McAfee SecurityCenter Update Manager (mcupdmgr.exe) - McAfee, Inc - C:\PROGRA~1\McAfee.com\Agent\mcupdmgr.exe
O23 - Service: McAfee.com VirusScan Online Realtime Engine (MCVSRte) - Networks Associates Technology, Inc - c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee Corporation - C:\PROGRA~1\McAfee.com\PERSON~1\MPFSERVICE.exe
O23 - Service: X10 Device Network Service (x10nets) - Unknown owner - C:\PROGRA~1\ATIMUL~1\RemCtrl\x10nets.exe (file missing)
O23 - Service: Iomega Active Disk (_IOMEGA_ACTIVE_DISK_SERVICE_) - Iomega Corporation - C:\Program Files\Iomega\AutoDisk\ADService.exe



Thanks bro,

jay
  • 0

#6
g2i2r4

g2i2r4

    retired HiJack Helper

  • Retired Staff
  • 5,080 posts
I still see two things I would like to get ride of.

Please disable SpybotSD’s protection, as it may hinder the removal of the infection. You can enable it after you're clean.

Open Spybot and click on Mode and check Advanced Mode
Check yes to next window.
Click on Tools in bottom left hand corner.
Click on Resident icon.
Uncheck Teatimer box and/or Uncheck Resident.
Click Allow Change box.

***

Download: deldomains.
To use: right-click and select: Install (no need to restart)
Should the link above display the text instead of downloading the file, then copy & paste the text into notepad and save the file as DellDomains.inf
Note: This will remove all entries in the "Trusted Zone" and "Ranges" also.

I'll post you some tips for the future as soon as the log is clean. Can you reboot and post me another log to check?
  • 0

#7
jay540

jay540

    New Member

  • Topic Starter
  • Member
  • Pip
  • 4 posts
My computer is much better now. Thanks to your kindness and help. This is a great service that you are providing.

Here is my HiJack THis log after installing delldomains:

Logfile of HijackThis v1.99.1
Scan saved at 10:26:25 PM, on 7/27/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\SYSTEM32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\SYSTEM32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\nvraidservice.exe
C:\Program Files\Creative\SBAudigy2ZS\Surround Mixer\CTSysVol.exe
C:\Program Files\Creative\SBAudigy2ZS\DVDAudio\CTDVDDET.EXE
C:\WINDOWS\system32\umonit.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\PROGRA~1\McAfee.com\PERSON~1\MpfTray.exe
C:\Program Files\Logitech\MouseWare\system\em_exec.exe
C:\PROGRA~1\mcafee.com\vso\mcvsshld.exe
c:\progra~1\mcafee.com\vso\mcvsescn.exe
C:\Program Files\Iomega\AutoDisk\ADUserMon.exe
C:\WINDOWS\system32\CTsvcCDA.exe
C:\Program Files\Iomega\DriveIcons\ImgIcon.exe
C:\WINDOWS\TPPALDR.EXE
C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
C:\PROGRA~1\Iomega\System32\AppServices.exe
c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\PROGRA~1\McAfee.com\PERSON~1\MPFSERVICE.exe
C:\Program Files\Creative\MediaSource\RemoteControl\RCMan.EXE
C:\PROGRA~1\McAfee.com\PERSON~1\MpfAgent.exe
C:\Program Files\ATI Multimedia\main\ATIDtct.EXE
C:\Program Files\Iomega\AutoDisk\ADService.exe
C:\Program Files\ATI Multimedia\RemCtrl\ATIRW.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\ATI Technologies\ATI.ACE\CLI.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
c:\PROGRA~1\mcafee.com\vso\mcshield.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
L:\Utes\Antivirus\HiJackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~1\tools\iesdsg.dll
O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O3 - Toolbar: McAfee VirusScan - {BA52B914-B692-46c4-B683-905236F6F655} - c:\progra~1\mcafee.com\vso\mcvsshl.dll
O4 - HKLM\..\Run: [CTHelper] CTHELPER.EXE
O4 - HKLM\..\Run: [AsioReg] REGSVR32.EXE /S CTASIO.DLL
O4 - HKLM\..\Run: [SBDrvDet] C:\Program Files\Creative\SB Drive Det\SBDrvDet.exe /r
O4 - HKLM\..\Run: [UpdReg] C:\WINDOWS\UpdReg.EXE
O4 - HKLM\..\Run: [DevconDefaultDB] C:\WINDOWS\READREG /PSCONV={NO}
O4 - HKLM\..\Run: [NVRaidService] C:\WINDOWS\system32\nvraidservice.exe
O4 - HKLM\..\Run: [NVMixerTray] "C:\Program Files\NVIDIA Corporation\NvMixer\NVMixerTray.exe"
O4 - HKLM\..\Run: [SmartGuardian] C:\Program Files\ITE\Smart Guardian\ITESmart.exe
O4 - HKLM\..\Run: [CTSysVol] C:\Program Files\Creative\SBAudigy2ZS\Surround Mixer\CTSysVol.exe /r
O4 - HKLM\..\Run: [CTDVDDET] C:\Program Files\Creative\SBAudigy2ZS\DVDAudio\CTDVDDET.EXE
O4 - HKLM\..\Run: [zBrowser Launcher] C:\Program Files\Logitech\iTouch\iTouch.exe
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [UMonit] C:\WINDOWS\system32\umonit.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [NVIDIA nTune] "C:\Program Files\NVIDIA Corporation\nTune\\nTune.exe" clear
O4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\cli.exe" runtime
O4 - HKLM\..\Run: [MCAgentExe] c:\PROGRA~1\mcafee.com\agent\mcagent.exe
O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\mcafee.com\agent\mcupdate.exe
O4 - HKLM\..\Run: [MPFExe] C:\PROGRA~1\McAfee.com\PERSON~1\MpfTray.exe
O4 - HKLM\..\Run: [VSOCheckTask] "c:\PROGRA~1\mcafee.com\vso\mcmnhdlr.exe" /checktask
O4 - HKLM\..\Run: [VirusScan Online] "c:\PROGRA~1\mcafee.com\vso\mcvsshld.exe"
O4 - HKLM\..\Run: [ADUserMon] C:\Program Files\Iomega\AutoDisk\ADUserMon.exe
O4 - HKLM\..\Run: [Iomega Drive Icons] C:\Program Files\Iomega\DriveIcons\ImgIcon.exe
O4 - HKLM\..\Run: [Deskup] C:\Program Files\Iomega\DriveIcons\deskup.exe /IMGSTART
O4 - HKLM\..\Run: [TPP Auto Loader] C:\WINDOWS\TPPALDR.EXE
O4 - HKLM\..\Run: [DiskeeperSystray] "C:\Program Files\Executive Software\Diskeeper\DkIcon.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKCU\..\Run: [SetDefaultMIDI] MIDIDef.exe
O4 - HKCU\..\Run: [RemoteCenter] C:\Program Files\Creative\MediaSource\RemoteControl\RCMan.EXE
O4 - HKCU\..\Run: [ATI Launchpad] "C:\Program Files\ATI Multimedia\main\launchpd.exe"
O4 - HKCU\..\Run: [ATI DeviceDetect] C:\Program Files\ATI Multimedia\main\ATIDtct.EXE
O4 - HKCU\..\Run: [ATI Remote Control] C:\Program Files\ATI Multimedia\RemCtrl\ATIRW.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Global Startup: ATI CATALYST System Tray.lnk = C:\Program Files\ATI Technologies\ATI.ACE\CLI.exe
O4 - Global Startup: VPN Client.lnk = ?
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O9 - Extra button: ATI TV - {44226DFF-747E-4edc-B30C-78752E50CD0C} - C:\Program Files\ATI Multimedia\tv\EXPLBAR.DLL
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcaf...83/mcinsctl.cab
O20 - Winlogon Notify: PCANotify - C:\WINDOWS\SYSTEM32\PCANotify.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.exe
O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
O23 - Service: Diskeeper - Executive Software International, Inc. - C:\Program Files\Executive Software\Diskeeper\DkService.exe
O23 - Service: Iomega App Services - Iomega Corporation - C:\PROGRA~1\Iomega\System32\AppServices.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: McAfee.com McShield (McShield) - Unknown owner - c:\PROGRA~1\mcafee.com\vso\mcshield.exe
O23 - Service: McAfee SecurityCenter Update Manager (mcupdmgr.exe) - McAfee, Inc - C:\PROGRA~1\McAfee.com\Agent\mcupdmgr.exe
O23 - Service: McAfee.com VirusScan Online Realtime Engine (MCVSRte) - Networks Associates Technology, Inc - c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee Corporation - C:\PROGRA~1\McAfee.com\PERSON~1\MPFSERVICE.exe
O23 - Service: X10 Device Network Service (x10nets) - Unknown owner - C:\PROGRA~1\ATIMUL~1\RemCtrl\x10nets.exe (file missing)
O23 - Service: Iomega Active Disk (_IOMEGA_ACTIVE_DISK_SERVICE_) - Iomega Corporation - C:\Program Files\Iomega\AutoDisk\ADService.exe
  • 0

#8
g2i2r4

g2i2r4

    retired HiJack Helper

  • Retired Staff
  • 5,080 posts
Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  • Disable and Enable System Restore. - If you are using Windows ME or XP then you should disable and reenable system restore to make sure there are no infected files found in a restore point.

    You can find instructions on how to enable and reenable system restore here:

    Managing Windows Millenium System Restore

    or

    Windows XP System Restore Guide

    Renable system restore with instructions from tutorial above

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    • From within Internet Explorer click on the Tools menu and then click on Options.
    • Click once on the Security tab
    • Click once on the Internet icon so it becomes highlighted.
    • Click once on the Custom Level button.
      • Change the Download signed ActiveX controls to Prompt
      • Change the Download unsigned ActiveX controls to Disable
      • Change the Initialize and script ActiveX controls not marked as safe to Disable
      • Change the Installation of desktop items to Prompt
      • Change the Launching programs and files in an IFRAME to Prompt
      • Change the Navigate sub-frames across different domains to Prompt
      • When all these settings have been made, click on the OK button.
      • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    • Next press the Apply button and then the OK to exit the Internet Properties page.
  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

    A tutorial on installing & using this product can be found here:

    Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  • Install Ad-Aware - Install and download Ad-Aware. ou should also scan your computer with program on a regular basis just as you would an antivirus software in conjunction with Spybot.

    A tutorial on installing & using this product can be found here:

    Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

Glad I was able to help.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP