more spyware.
please help.
below are the spyxposer report and
hijack this report.
here is the panda spyxposer report:
Incident Status Location
Adware:adware/sbsoft Reported Windows Registry
Spyware:Cookie/2o7.net Reported c:\windows\cookies\monkeyboyblues@2o7[1].txt
Spyware:Cookie/Advertising Reported c:\windows\cookies\monkeyboyblues@advertising[2].txt
Spyware:Cookie/Advertising Reported c:\windows\cookies\[email protected][1].txt
Spyware:Cookie/Doubleclick Reported c:\windows\cookies\monkeyboyblues@doubleclick[1].txt
Spyware:Cookie/Advertising Reported c:\windows\cookies\[email protected][2].txt
Spyware:Cookie/Atlas DMT Reported c:\windows\cookies\monkeyboyblues@atdmt[1].txt
Spyware:Cookie/Advertising Reported c:\windows\cookies\monkeyboyblues@advertising[3].txt
Virus:Trj/Troiram.A Reported C:\WINDOWS\SYSTEM\dmfvb.exe
Virus:Trj/DelCache.A Reported C:\WINDOWS\SYSTEM\csrbs.exe
Virus:Trj/DelCache.A Reported C:\WINDOWS\SYSTEM\csyfj.exe
Spyware:Cookie/2o7.net Reported C:\WINDOWS\Cookies\monkeyboyblues@2o7[1].txt
Spyware:Cookie/Advertising Reported C:\WINDOWS\Cookies\monkeyboyblues@advertising[2].txt
Spyware:Cookie/Advertising Reported C:\WINDOWS\Cookies\[email protected][1].txt
Spyware:Cookie/Doubleclick Reported C:\WINDOWS\Cookies\monkeyboyblues@doubleclick[1].txt
Spyware:Cookie/Advertising Reported C:\WINDOWS\Cookies\[email protected][2].txt
Spyware:Cookie/Atlas DMT Reported C:\WINDOWS\Cookies\monkeyboyblues@atdmt[1].txt
Spyware:Cookie/Advertising Reported C:\WINDOWS\Cookies\monkeyboyblues@advertising[3].txt
Spyware:Cookie/Doubleclick Reported C:\WINDOWS\Application Data\Earthlink\6.0\[email protected]\Cookies\monkeyboyblues@doubleclick[1].txt
Spyware:Cookie/bravenetA Reported C:\WINDOWS\Application Data\Earthlink\6.0\[email protected]\Cookies\monkeyboyblues@bravenet[1].txt
Spyware:Cookie/Mediaplex Reported C:\WINDOWS\Application Data\Earthlink\6.0\[email protected]\Cookies\monkeyboyblues@mediaplex[1].txt
Spyware:Cookie/QkSrv Reported C:\WINDOWS\Application Data\Earthlink\6.0\[email protected]\Cookies\monkeyboyblues@qksrv[1].txt
Spyware:Cookie/GoClick Reported C:\WINDOWS\Application Data\Earthlink\6.0\[email protected]\Cookies\[email protected][2].txt
Spyware:Cookie/Apmebf Reported C:\WINDOWS\Application Data\Earthlink\6.0\[email protected]\Cookies\monkeyboyblues@apmebf[1].txt
Spyware:Cookie/Overture Reported C:\WINDOWS\Application Data\Earthlink\6.0\[email protected]\Cookies\monkeyboyblues@overture[1].txt
Spyware:Cookie/Overture Reported C:\WINDOWS\Application Data\Earthlink\6.0\[email protected]\Cookies\[email protected][1].txt
Spyware:Cookie/2o7.net Reported C:\WINDOWS\Application Data\Earthlink\6.0\[email protected]\Cookies\monkeyboyblues@2o7[1].txt
Spyware:Cookie/Advertising Reported C:\WINDOWS\Application Data\Earthlink\6.0\[email protected]\Cookies\monkeyboyblues@advertising[1].txt
Spyware:Cookie/Atlas DMT Reported C:\WINDOWS\Application Data\Earthlink\6.0\[email protected]\Cookies\monkeyboyblues@atdmt[2].txt
Spyware:Cookie/Advertising Reported C:\WINDOWS\Application Data\Earthlink\6.0\[email protected]\Cookies\[email protected][1].txt
Spyware:Cookie/Belnk Reported C:\WINDOWS\Application Data\Earthlink\6.0\[email protected]\Cookies\[email protected][1].txt
Spyware:Cookie/Belnk Reported C:\WINDOWS\Application Data\Earthlink\6.0\[email protected]\Cookies\[email protected][1].txt
Spyware:Cookie/Belnk Reported C:\WINDOWS\Application Data\Earthlink\6.0\[email protected]\Cookies\monkeyboyblues@belnk[2].txt
Virus:Exploit/ByteVerify Reported C:\WINDOWS\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-54980b39-1713f479.zip[GetAccess.class]
Virus:Exploit/ByteVerify Reported C:\WINDOWS\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-54980b39-1713f479.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Reported C:\WINDOWS\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-54980b39-1713f479.zip[Dummy.class]
Virus:Exploit/ByteVerify Reported C:\WINDOWS\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-54980b39-1713f479.zip[Installer.class]
Virus:Trj/Aplugin.A Reported C:\lo-641629750.exe
hijakcthis report:
Logfile of HijackThis v1.99.1
Scan saved at 5:40:55 PM, on 11/10/05
Platform: Windows 98 SE (Win9x 4.10.2222A)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\PROGRAM FILES\TREND MICRO\INTERNET SECURITY 2005\PCCTLCOM.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\WINDOWS\EXPLORER.EXE
C:\PROGRAM FILES\TREND MICRO\INTERNET SECURITY 2005\PCCIOMON.EXE
C:\PROGRAM FILES\TREND MICRO\INTERNET SECURITY 2005\TMPFW.EXE
C:\WINDOWS\SYSTEM\WBEM\WINMGMT.EXE
C:\PROGRAM FILES\TREND MICRO\INTERNET SECURITY 2005\TMPROXY.EXE
C:\WINDOWS\STARTER.EXE
C:\PROGRAM FILES\TREND MICRO\INTERNET SECURITY 2005\PCCGUIDE.EXE
C:\WINDOWS\SYSTEM\QTTASK.EXE
C:\WINDOWS\TASKMON.EXE
C:\WINDOWS\SYSTEM\SYSTRAY.EXE
C:\PROGRAM FILES\TROJANHUNTER 4.2\THGUARD.EXE
C:\PROGRAM FILES\WINZIP\WZQKPICK.EXE
C:\WINDOWS\SYSTEM\WMIEXE.EXE
C:\WINDOWS\SYSTEM\DDHELP.EXE
C:\PROGRAM FILES\MOZILLA FIREFOX\FIREFOX.EXE
C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
C:\PROGRAM FILES\COMMON FILES\REAL\UPDATE_OB\REALSCHED.EXE
C:\WINDOWS\SYSTEM\RNAAPP.EXE
C:\WINDOWS\SYSTEM\TAPISRV.EXE
C:\WINDOWS\DESKTOP\HIJACKTHIS.EXE
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://start.earthlink.net
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://www.earthlink...ton/search.html
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://start.earthlink.net/
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [EnsoniqMixer] starter.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\WINDOWS\SYSTEM\QTTASK.EXE" -atboottime
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [TaskMonitor] C:\WINDOWS\taskmon.exe
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [THGuard] "C:\PROGRAM FILES\TROJANHUNTER 4.2\THGUARD.EXE"
O4 - HKLM\..\Run: [pccguide.exe] "C:\Program Files\Trend Micro\Internet Security 2005\pccguide.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [SchedulingAgent] mstask.exe
O4 - HKLM\..\RunServices: [PcCtlCom] C:\PROGRAM FILES\TREND MICRO\INTERNET SECURITY 2005\PCCTLCOM.EXE
O4 - HKCU\..\Run: [E6TaskPanel] "C:\PROGRAM FILES\EARTHLINK TOTALACCESS\TASKPANL.EXE" -noauth
O4 - Startup: WinZip Quick Pick.lnk = C:\Program Files\WinZip\WZQKPICK.EXE
O8 - Extra context menu item: &Google Search - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmwordtrans.html
O8 - Extra context menu item: Cached Snapshot of Page - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmcache.html
O8 - Extra context menu item: Similar Pages - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmsimilar.html
O8 - Extra context menu item: Backward Links - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmbacklinks.html
O8 - Extra context menu item: Translate Page into English - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmtrans.html
O9 - Extra button: Panda spyXposer - {EE657293-B4C4-4752-B035-DCBBC2D04008} - http://www.pandasoft...r_principal.htm (file missing)
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O16 - DPF: {CC05BC12-2AA2-4AC7-AC81-0E40F83B1ADF} (Live365Player Class) - http://www.live365.c...ers/play365.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoft...free/asinst.cab