Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

Pop Ups Problem


  • Please log in to reply

#1
Amuro Ray

Amuro Ray

    New Member

  • Member
  • Pip
  • 4 posts
First of all, all these pop ups keep coming up even though I Yahoo Pop Up Blocker. My desktop's background froze and it stayed at a screen showing my computer has been infected by spyware. Then, some program tries to install itself. I think it's called Spy Sheriff. I used Ad Aware to fix that. I run that but the pop ups keep coming up. So here I am now.

Here's the Log:

Logfile of HijackThis v1.99.1
Scan saved at 8:05:38 PM, on 12/25/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\drivers\dcfssvc.exe
c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
C:\WINDOWS\system32\r_server.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Tablet.exe
C:\WINDOWS\System32\wltrysvc.exe
C:\WINDOWS\System32\bcmwltry.exe
C:\PROGRA~1\COMMON~1\Stardock\SDMCP.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Stardock\Object Desktop\WindowBlinds\wbload.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
c:\PROGRA~1\mcafee.com\vso\mcshield.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\WINDOWS\system32\pctspk.exe
C:\Program Files\McAfee.com\Agent\mcagent.exe
C:\program files\mcafee.com\vso\mcvsshld.exe
C:\WINDOWS\System32\rmctrl.exe
C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr_.exe
C:\Program Files\Adaptec\Easy CD Creator 5\DirectCD\DirectCD.exe
C:\WINDOWS\system32\ezSP_Px.exe
C:\Program Files\D-Tools\daemon.exe
C:\Program Files\Saitek\Software\Profiler.exe
C:\Program Files\Saitek\Software\SaiSmart.exe
C:\WINDOWS\system32\WLTRAY.exe
C:\WINDOWS\system32\Drivers\XWMSAPI.EXE
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe
C:\WINDOWS\system32\igps.exe
C:\WINDOWS\system32\??plorer.exe
C:\WINDOWS\system32\pgws.exe
C:\WINDOWS\system32\WTablet\TabUserW.exe
C:\Program Files\Stardock\ObjectDock\ObjectDock.exe
C:\Program Files\TortoiseSVN\bin\TSVNCache.exe
I:\utorrent.exe
C:\Program Files\Lavasoft\Ad-Aware SE Personal\Ad-Aware.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Randolph\Desktop\hijackthis\HijackThis.exe
C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = c:\secure32.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = c:\secure32.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = c:\secure32.html
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = c:\secure32.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = c:\secure32.html
R3 - URLSearchHook: (no name) - {02EE5B04-F144-47BB-83FB-A60BD91B74A9} - (no file)
R3 - URLSearchHook: (no name) - {DE3780F2-674E-4195-69B4-16F3B6426EC8} - C:\WINDOWS\system32\cemlkbf.dll
O2 - BHO: LinkTracker Class - {8B6DA27E-7F64-4694-8F8F-DC87AB8C6B22} - C:\Program Files\QL\qlink32.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn3\yt.dll
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [PCTVOICE] pctspk.exe
O4 - HKLM\..\Run: [MCAgentExe] C:\Program Files\McAfee.com\Agent\mcagent.exe
O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\McAfee.com\Agent\McUpdate.exe
O4 - HKLM\..\Run: [VirusScan Online] c:\program files\mcafee.com\vso\mcvsshld.exe
O4 - HKLM\..\Run: [RemoteControl] C:\WINDOWS\System32\rmctrl.exe
O4 - HKLM\..\Run: [ViewMgr] C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr_.exe
O4 - HKLM\..\Run: [AdaptecDirectCD] C:\Program Files\Adaptec\Easy CD Creator 5\DirectCD\DirectCD.exe
O4 - HKLM\..\Run: [ezShieldProtector for Px] C:\WINDOWS\system32\ezSP_Px.exe
O4 - HKLM\..\Run: [DAEMON Tools-1033] "C:\Program Files\D-Tools\daemon.exe" -lang 1033
O4 - HKLM\..\Run: [Profiler] C:\Program Files\Saitek\Software\Profiler.exe
O4 - HKLM\..\Run: [SaiSmart] C:\Program Files\Saitek\Software\SaiSmart.exe
O4 - HKLM\..\Run: [Dell Wireless Manager UI] C:\WINDOWS\system32\WLTRAY
O4 - HKLM\..\Run: [XWMSUSBAPI] C:\WINDOWS\system32\Drivers\XWMSAPI.EXE
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [BootSkin Startup Jobs] "C:\Program Files\Stardock\WinCustomize\BootSkin\BootSkin.exe" /StartupJobs
O4 - HKLM\..\Run: [AltTabWinGlance] C:\Program Files\WinGlance\WinGlance.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe
O4 - HKLM\..\Run: [lspins] "C:\WINDOWS\system32\igps.exe"
O4 - HKLM\..\RunServices: [Configuration Loader] cvcd.exe
O4 - HKCU\..\Run: [Shell] "C:\Program Files\Common Files\Microsoft Shared\Web Folders\ibm00001.exe"
O4 - HKCU\..\Run: [aupd] C:\WINDOWS\system32\sywsvcs.exe
O4 - HKCU\..\Run: [CU1] C:\Program Files\Common Files\VCClient\VCClient.exe
O4 - HKCU\..\Run: [CU2] C:\Program Files\Common Files\VCClient\VCMain.exe
O4 - HKCU\..\Run: [owmo] C:\PROGRA~1\COMMON~1\owmo\owmom.exe
O4 - HKCU\..\Run: [Gltjzf] C:\WINDOWS\system32\??plorer.exe
O4 - HKCU\..\Run: [SpySheriff] C:\Program Files\SpySheriff\SpySheriff.exe
O4 - HKCU\..\Run: [Aida] "C:\Program Files\rdso\eetu.exe" -vt ndrv
O4 - Startup: Stardock ObjectDock.lnk = C:\Program Files\Stardock\ObjectDock\ObjectDock.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: RadioTime Player.lnk = C:\Program Files\radiotime\mrt.exe
O4 - Global Startup: TabUserW.exe.lnk = C:\WINDOWS\system32\WTablet\TabUserW.exe
O8 - Extra context menu item: Add to EverNote - res://C:\Program Files\EverNote\EverNote\enbar.dll/2000
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Add to EverNote - {A5ABA0BB-F195-40d8-A5E9-0801153E6597} - C:\Program Files\EverNote\EverNote\enbar.dll
O9 - Extra 'Tools' menuitem: Add to EverNote - {A5ABA0BB-F195-40d8-A5E9-0801153E6597} - C:\Program Files\EverNote\EverNote\enbar.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: Yahoo! Graffiti - http://download.game...ts/y/grt5_x.cab
O16 - DPF: Yahoo! NFL GameChannel StatTracker - http://aud12.sports....lgcst1016_x.cab
O16 - DPF: Yahoo! Pool 2 - http://download.game...ts/y/pote_x.cab
O16 - DPF: {01A88BB1-1174-41EC-ACCB-963509EAE56B} (SysProWmi Class) - http://support.dell....iler/SysPro.CAB
O16 - DPF: {1239CC52-59EF-4DFA-8C61-90FFA846DF7E} (Musicnotes Viewer) - http://www.musicnote...ad/mnviewer.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=39204
O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - http://us.dl1.yimg.c...s/yinst0401.cab
O16 - DPF: {3A7FE611-1994-4EF1-A09F-99456752289D} (WildTangent Active Launcher) - http://install.wildt...iveLauncher.cab
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://by13fd.bay13....es/MsnPUpld.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: {80DD2229-B8E4-4C77-B72F-F22972D723EA} (AvxScanOnline Control) - http://www.bitdefend...bitdefender.cab
O16 - DPF: {AB29A544-D6B4-4E36-A1F8-D3E34FC7B00A} (WTHoster Class) - http://install.wildt...lim/install.cab
O16 - DPF: {AE1C01E3-0283-11D3-9B3F-00C04F8EF466} (HeartbeatCtl Class) - http://fdl.msn.com/z...s/heartbeat.cab
O16 - DPF: {F04A8AE2-A59D-11D2-8792-00C04F8EF29D} (Hotmail Attachments Control) - http://by13fd.bay13....ex/HMAtchmt.ocx
O16 - DPF: {F229AB32-7BF9-4225-B78F-B4680AE6FC23} (Snapfish File Upload ActiveX Control) - http://www.snapfish....pfishUpload.cab
O18 - Filter: text/html - {3551784B-E99A-474f-B782-3EC814442918} - C:\Program Files\QL\qlink32.dll
O20 - Winlogon Notify: Control Panel - C:\WINDOWS\system32\lv2409fqe.dll
O20 - Winlogon Notify: MCPClient - C:\PROGRA~1\COMMON~1\Stardock\mcpstub.dll
O20 - Winlogon Notify: msupdate - C:\WINDOWS\SYSTEM32\msupdate32.dll
O20 - Winlogon Notify: ssldr - C:\WINDOWS\SYSTEM32\ssldr32.dll
O20 - Winlogon Notify: WB - C:\PROGRA~1\Stardock\OBJECT~2\WINDOW~1\fastload.dll
O21 - SSODL: IconPackager Repair - {1799460C-0BC8-4865-B9DF-4A36CD703FF0} - C:\WINDOWS\system32\iprepair.dll
O23 - Service: Configuration Loader (a3) - Unknown owner - C:\WINDOWS\System32\cvcd.exe" -service (file missing)
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Dcfssvc - Eastman Kodak Company - C:\WINDOWS\system32\drivers\dcfssvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Macromedia Licensing Service - Macromedia - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe
O23 - Service: McAfee.com McShield (McShield) - Unknown owner - c:\PROGRA~1\mcafee.com\vso\mcshield.exe
O23 - Service: McAfee.com VirusScan Online Realtime Engine (MCVSRte) - Mcafee.com Corporation - c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
O23 - Service: PACSPTISVR - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exe
O23 - Service: Remote Administrator Service (r_server) - Unknown owner - C:\WINDOWS\system32\r_server.exe" /service (file missing)
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: TabletService - Wacom Technology, Corp. - C:\WINDOWS\system32\Tablet.exe
O23 - Service: WLTRYSVC - Unknown owner - C:\WINDOWS\System32\wltrysvc.exe
  • 0

Advertisements


#2
don77

don77

    Malware Expert

  • Retired Staff
  • 18,526 posts
Hi and welcome Amuro Ray
You have quite a few nasties running here, This will take a bit of work but we can get you sorted out,

You have the latest version of VX2. Download L2mfix from one of these two locations:

http://www.atribune....oads/l2mfix.exe
http://www.downloads....org/l2mfix.exe

Save the file to your desktop and double click l2mfix.exe. Click the Install button to extract the files and follow the prompts, then open the newly added l2mfix folder on your desktop. Double click l2mfix.bat and select option #1 for Run Find Log by typing 1 and then pressing enter. This will scan your computer and it may appear nothing is happening, then, after a minute or 2, notepad will open with a log. Copy the contents of that log and paste it into this thread.

IMPORTANT: Do NOT run option #2 OR any other files in the l2mfix folder until you are asked to do so!

if you receive, while running option #1, an error similar like: ''C:\windows\system32\cmd.exe,
C:\windows\system32\autoexec.nt the system file is not suitable for running ms-dos and microsoft windows applications. choose close to terminate the application.."...then please use option 5 or the web page link in the l2mfix folder to solve this error condition. do not run the fix portion without fixing this first.
  • 0

#3
Amuro Ray

Amuro Ray

    New Member

  • Topic Starter
  • Member
  • Pip
  • 4 posts
Here's the next log:


L2MFIX find log 121605
These are the registry keys present
**********************************************************************************
Winlogon/notify:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\AtiExtEvent]
"DLLName"="Ati2evxx.dll"
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000001
"Lock"="AtiLockEvent"
"Logoff"="AtiLogoffEvent"
"Logon"="AtiLogonEvent"
"Disconnect"="AtiDisConnectEvent"
"Reconnect"="AtiReConnectEvent"
"Safe"=dword:00000000
"Shutdown"="AtiShutdownEvent"
"StartScreenSaver"="AtiStartScreenSaverEvent"
"StartShell"="AtiStartShellEvent"
"Startup"="AtiStartupEvent"
"StopScreenSaver"="AtiStopScreenSaverEvent"
"Unlock"="AtiUnLockEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Control Panel]
"Asynchronous"=dword:00000000
"DllName"="C:\\WINDOWS\\system32\\lv2409fqe.dll"
"Impersonate"=dword:00000000
"Logon"="WinLogon"
"Logoff"="WinLogoff"
"Shutdown"="WinShutdown"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt32chain]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,33,00,32,00,2e,00,64,00,6c,00,\
6c,00,00,00
"Logoff"="ChainWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cryptnet]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,6e,00,65,00,74,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Logoff"="CryptnetWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cscdll]
"DLLName"="cscdll.dll"
"Logon"="WinlogonLogonEvent"
"Logoff"="WinlogonLogoffEvent"
"ScreenSaver"="WinlogonScreenSaverEvent"
"Startup"="WinlogonStartupEvent"
"Shutdown"="WinlogonShutdownEvent"
"StartShell"="WinlogonStartShellEvent"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\MCPClient]
"Asynchronous"=dword:00000000
"DllName"="C:\\PROGRA~1\\COMMON~1\\Stardock\\mcpstub.dll"
"Startup"="MCPSystemStartup"
"Logon"="MCPLogonStartup"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\msupdate]
"DllName"="msupdate32.dll"
"Startup"="WinlogonStartupEvent"
"Asynchronous"=dword:00000001
"Impersonate"=dword:00000000

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ScCertProp]
"DLLName"="wlnotify.dll"
"Logon"="SCardStartCertProp"
"Logoff"="SCardStopCertProp"
"Lock"="SCardSuspendCertProp"
"Unlock"="SCardResumeCertProp"
"Enabled"=dword:00000001
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Schedule]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"StartShell"="SchedStartShell"
"Logoff"="SchedEventLogOff"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\sclgntfy]
"Logoff"="WLEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001
"DllName"=hex(2):73,00,63,00,6c,00,67,00,6e,00,74,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SensLogn]
"DLLName"="WlNotify.dll"
"Lock"="SensLockEvent"
"Logon"="SensLogonEvent"
"Logoff"="SensLogoffEvent"
"Safe"=dword:00000001
"MaxWait"=dword:00000258
"StartScreenSaver"="SensStartScreenSaverEvent"
"StopScreenSaver"="SensStopScreenSaverEvent"
"Startup"="SensStartupEvent"
"Shutdown"="SensShutdownEvent"
"StartShell"="SensStartShellEvent"
"PostShell"="SensPostShellEvent"
"Disconnect"="SensDisconnectEvent"
"Reconnect"="SensReconnectEvent"
"Unlock"="SensUnlockEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ssldr]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DLLName"="ssldr32.dll"
"Logon"="StartProcessAtWinLogon"
"Logoff"="StopProcessAtWinLogoff"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\termsrv]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"Logoff"="TSEventLogoff"
"Logon"="TSEventLogon"
"PostShell"="TSEventPostShell"
"Shutdown"="TSEventShutdown"
"StartShell"="TSEventStartShell"
"Startup"="TSEventStartup"
"MaxWait"=dword:00000258
"Reconnect"="TSEventReconnect"
"Disconnect"="TSEventDisconnect"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\WB]
"Asynchronous"=dword:00000000
"DllName"="C:\\PROGRA~1\\Stardock\\OBJECT~2\\WINDOW~1\\fastload.dll"
"Startup"="StartSys"
"Logon"="StartWB"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlballoon]
"DLLName"="wlnotify.dll"
"Logon"="RegisterTicketExpiredNotificationEvent"
"Logoff"="UnregisterTicketExpiredNotificationEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

**********************************************************************************
useragent:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
"{01B4E37C-BF48-7E79-983F-814A3BF011F5}"=""

**********************************************************************************
Shell Extension key:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]
"{00022613-0000-0000-C000-000000000046}"="Multimedia File Property Sheet"
"{176d6597-26d3-11d1-b350-080036a75b03}"="ICM Scanner Management"
"{1F2E5C40-9550-11CE-99D2-00AA006E086C}"="NTFS Security Page"
"{3EA48300-8CF6-101B-84FB-666CCB9BCD32}"="OLE Docfile Property Page"
"{40dd6e20-7c17-11ce-a804-00aa003ca9f6}"="Shell extensions for sharing"
"{41E300E0-78B6-11ce-849B-444553540000}"="PlusPack CPL Extension"
"{42071712-76d4-11d1-8b24-00a0c9068ff3}"="Display Adapter CPL Extension"
"{42071713-76d4-11d1-8b24-00a0c9068ff3}"="Display Monitor CPL Extension"
"{42071714-76d4-11d1-8b24-00a0c9068ff3}"="Display Panning CPL Extension"
"{4E40F770-369C-11d0-8922-00A024AB2DBB}"="DS Security Page"
"{513D916F-2A8E-4F51-AEAB-0CBC76FB1AF8}"="Compatibility Page"
"{56117100-C0CD-101B-81E2-00AA004AE837}"="Shell Scrap DataHandler"
"{59099400-57FF-11CE-BD94-0020AF85B590}"="Disk Copy Extension"
"{59be4990-f85c-11ce-aff7-00aa003ca9f6}"="Shell extensions for Microsoft Windows Network objects"
"{5DB2625A-54DF-11D0-B6C4-0800091AA605}"="ICM Monitor Management"
"{675F097E-4C4D-11D0-B6C1-0800091AA605}"="ICM Printer Management"
"{764BF0E1-F219-11ce-972D-00AA00A14F56}"="Shell extensions for file compression"
"{77597368-7b15-11d0-a0c2-080036af3f03}"="Web Printer Shell Extension"
"{7988B573-EC89-11cf-9C00-00AA00A14F56}"="Disk Quota UI"
"{853FE2B1-B769-11d0-9C4E-00C04FB6C6FA}"="Encryption Context Menu"
"{85BBD920-42A0-1069-A2E4-08002B30309D}"="Briefcase"
"{88895560-9AA2-1069-930E-00AA0030EBC8}"="HyperTerminal Icon Ext"
"{BD84B380-8CA2-1069-AB1D-08000948F534}"="Fonts"
"{DBCE2480-C732-101B-BE72-BA78E9AD5B27}"="ICC Profile"
"{F37C5810-4D3F-11d0-B4BF-00AA00BBB723}"="Printers Security Page"
"{f81e9010-6ea4-11ce-a7ff-00aa003ca9f6}"="Shell extensions for sharing"
"{f92e8c40-3d33-11d2-b1aa-080036a75b03}"="Display TroubleShoot CPL Extension"
"{7444C717-39BF-11D1-8CD9-00C04FC29D45}"="Crypto PKO Extension"
"{7444C719-39BF-11D1-8CD9-00C04FC29D45}"="Crypto Sign Extension"
"{7007ACC7-3202-11D1-AAD2-00805FC1270E}"="Network Connections"
"{992CFFA0-F557-101A-88EC-00DD010CCC48}"="Network Connections"
"{E211B736-43FD-11D1-9EFB-0000F8757FCD}"="Scanners & Cameras"
"{FB0C9C8A-6C50-11D1-9F1D-0000F8757FCD}"="Scanners & Cameras"
"{905667aa-acd6-11d2-8080-00805f6596d2}"="Scanners & Cameras"
"{3F953603-1008-4f6e-A73A-04AAC7A992F1}"="Scanners & Cameras"
"{83bbcbf3-b28a-4919-a5aa-73027445d672}"="Scanners & Cameras"
"{F0152790-D56E-4445-850E-4F3117DB740C}"="Remote Sessions CPL Extension"
"{60254CA5-953B-11CF-8C96-00AA00B8708C}"="Shell extensions for Windows Script Host"
"{2206CDB2-19C1-11D1-89E0-00C04FD7A829}"="Microsoft Data Link"
"{DD2110F0-9EEF-11cf-8D8E-00AA0060F5BF}"="Tasks Folder Icon Handler"
"{797F1E90-9EDD-11cf-8D8E-00AA0060F5BF}"="Tasks Folder Shell Extension"
"{D6277990-4C6A-11CF-8D87-00AA0060F5BF}"="Scheduled Tasks"
"{0DF44EAA-FF21-4412-828E-260A8728E7F1}"="Taskbar and Start Menu"
"{2559a1f0-21d7-11d4-bdaf-00c04f60b9f0}"="Search"
"{2559a1f1-21d7-11d4-bdaf-00c04f60b9f0}"="Help and Support"
"{2559a1f2-21d7-11d4-bdaf-00c04f60b9f0}"="Help and Support"
"{2559a1f3-21d7-11d4-bdaf-00c04f60b9f0}"="Run..."
"{2559a1f4-21d7-11d4-bdaf-00c04f60b9f0}"="Internet"
"{2559a1f5-21d7-11d4-bdaf-00c04f60b9f0}"="E-mail"
"{D20EA4E1-3957-11d2-A40B-0C5020524152}"="Fonts"
"{D20EA4E1-3957-11d2-A40B-0C5020524153}"="Administrative Tools"
"{875CB1A1-0F29-45de-A1AE-CFB4950D0B78}"="Audio Media Properties Handler"
"{40C3D757-D6E4-4b49-BB41-0E5BBEA28817}"="Video Media Properties Handler"
"{E4B29F9D-D390-480b-92FD-7DDB47101D71}"="Wav Properties Handler"
"{87D62D94-71B3-4b9a-9489-5FE6850DC73E}"="Avi Properties Handler"
"{A6FD9E45-6E44-43f9-8644-08598F5A74D9}"="Midi Properties Handler"
"{c5a40261-cd64-4ccf-84cb-c394da41d590}"="Video Thumbnail Extractor"
"{5E6AB780-7743-11CF-A12B-00AA004AE837}"="Microsoft Internet Toolbar"
"{22BF0C20-6DA7-11D0-B373-00A0C9034938}"="Download Status"
"{91EA3F8B-C99B-11d0-9815-00C04FD91972}"="Augmented Shell Folder"
"{6413BA2C-B461-11d1-A18A-080036B11A03}"="Augmented Shell Folder 2"
"{F61FFEC1-754F-11d0-80CA-00AA005B4383}"="BandProxy"
"{7BA4C742-9E81-11CF-99D3-00AA004AE837}"="Microsoft BrowserBand"
"{30D02401-6A81-11d0-8274-00C04FD5AE38}"="Search Band"
"{32683183-48a0-441b-a342-7c2a440a9478}"="Media Band"
"{169A0691-8DF9-11d1-A1C4-00C04FD75D13}"="In-pane search"
"{07798131-AF23-11d1-9111-00A0C98BA67D}"="Web Search"
"{AF4F6510-F982-11d0-8595-00AA004CD6D8}"="Registry Tree Options Utility"
"{01E04581-4EEE-11d0-BFE9-00AA005B4383}"="&Address"
"{A08C11D2-A228-11d0-825B-00AA005B4383}"="Address EditBox"
"{00BB2763-6A77-11D0-A535-00C04FD7D062}"="Microsoft AutoComplete"
"{7376D660-C583-11d0-A3A5-00C04FD706EC}"="TridentImageExtractor"
"{6756A641-DE71-11d0-831B-00AA005B4383}"="MRU AutoComplete List"
"{6935DB93-21E8-4ccc-BEB9-9FE3C77A297A}"="Custom MRU AutoCompleted List"
"{7e653215-fa25-46bd-a339-34a2790f3cb7}"="Accessible"
"{acf35015-526e-4230-9596-becbe19f0ac9}"="Track Popup Bar"
"{E0E11A09-5CB8-4B6C-8332-E00720A168F2}"="Address Bar Parser"
"{00BB2764-6A77-11D0-A535-00C04FD7D062}"="Microsoft History AutoComplete List"
"{03C036F1-A186-11D0-824A-00AA005B4383}"="Microsoft Shell Folder AutoComplete List"
"{00BB2765-6A77-11D0-A535-00C04FD7D062}"="Microsoft Multiple AutoComplete List Container"
"{ECD4FC4E-521C-11D0-B792-00A0C90312E1}"="Shell Band Site Menu"
"{3CCF8A41-5C85-11d0-9796-00AA00B90ADF}"="Shell DeskBarApp"
"{ECD4FC4C-521C-11D0-B792-00A0C90312E1}"="Shell DeskBar"
"{ECD4FC4D-521C-11D0-B792-00A0C90312E1}"="Shell Rebar BandSite"
"{DD313E04-FEFF-11d1-8ECD-0000F87A470C}"="User Assist"
"{EF8AD2D1-AE36-11D1-B2D2-006097DF8C11}"="Global Folder Settings"
"{EFA24E61-B078-11d0-89E4-00C04FC9E26E}"="Favorites Band"
"{0A89A860-D7B1-11CE-8350-444553540000}"="Shell Automation Inproc Service"
"{E7E4BC40-E76A-11CE-A9BB-00AA004AE837}"="Shell DocObject Viewer"
"{A5E46E3A-8849-11D1-9D8C-00C04FC99D61}"="Microsoft Browser Architecture"
"{FBF23B40-E3F0-101B-8488-00AA003E56F8}"="InternetShortcut"
"{3C374A40-BAE4-11CF-BF7D-00AA006946EE}"="Microsoft Url History Service"
"{FF393560-C2A7-11CF-BFF4-444553540000}"="History"
"{7BD29E00-76C1-11CF-9DD0-00A0C9034933}"="Temporary Internet Files"
"{7BD29E01-76C1-11CF-9DD0-00A0C9034933}"="Temporary Internet Files"
"{CFBFAE00-17A6-11D0-99CB-00C04FD64497}"="Microsoft Url Search Hook"
"{A2B0DD40-CC59-11d0-A3A5-00C04FD706EC}"="IE4 Suite Splash Screen"
"{67EA19A0-CCEF-11d0-8024-00C04FD75D13}"="CDF Extension Copy Hook"
"{131A6951-7F78-11D0-A979-00C04FD705A2}"="ISFBand OC"
"{9461b922-3c5a-11d2-bf8b-00c04fb93661}"="Search Assistant OC"
"{3DC7A020-0ACD-11CF-A9BB-00AA004AE837}"="The Internet"
"{871C5380-42A0-1069-A2EA-08002B30309D}"="Internet Name Space"
"{EFA24E64-B078-11d0-89E4-00C04FC9E26E}"="Explorer Band"
"{9E56BE60-C50F-11CF-9A2C-00A0C90A90CE}"="Sendmail service"
"{9E56BE61-C50F-11CF-9A2C-00A0C90A90CE}"="Sendmail service"
"{88C6C381-2E85-11D0-94DE-444553540000}"="ActiveX Cache Folder"
"{E6FB5E20-DE35-11CF-9C87-00AA005127ED}"="WebCheck"
"{ABBE31D0-6DAE-11D0-BECA-00C04FD940BE}"="Subscription Mgr"
"{F5175861-2688-11d0-9C5E-00AA00A45957}"="Subscription Folder"
"{08165EA0-E946-11CF-9C87-00AA005127ED}"="WebCheckWebCrawler"
"{E3A8BDE6-ABCE-11d0-BC4B-00C04FD929DB}"="WebCheckChannelAgent"
"{E8BB6DC0-6B4E-11d0-92DB-00A0C90C2BD7}"="TrayAgent"
"{7D559C10-9FE9-11d0-93F7-00AA0059CE02}"="Code Download Agent"
"{E6CC6978-6B6E-11D0-BECA-00C04FD940BE}"="ConnectionAgent"
"{D8BD2030-6FC9-11D0-864F-00AA006809D9}"="PostAgent"
"{7FC0B86E-5FA7-11d1-BC7C-00C04FD929DB}"="WebCheck SyncMgr Handler"
"{352EC2B7-8B9A-11D1-B8AE-006008059382}"="Shell Application Manager"
"{0B124F8F-91F0-11D1-B8B5-006008059382}"="Installed Apps Enumerator"
"{CFCCC7A0-A282-11D1-9082-006008059382}"="Darwin App Publisher"
"{e84fda7c-1d6a-45f6-b725-cb260c236066}"="Shell Image Verbs"
"{66e4e4fb-f385-4dd0-8d74-a2efd1bc6178}"="Shell Image Data Factory"
"{3F30C968-480A-4C6C-862D-EFC0897BB84B}"="GDI+ file thumbnail extractor"
"{9DBD2C50-62AD-11d0-B806-00C04FD706EC}"="Summary Info Thumbnail handler (DOCFILES)"
"{EAB841A0-9550-11cf-8C16-00805F1408F3}"="HTML Thumbnail Extractor"
"{eb9b1153-3b57-4e68-959a-a3266bc3d7fe}"="Shell Image Property Handler"
"{CC6EEFFB-43F6-46c5-9619-51D571967F7D}"="Web Publishing Wizard"
"{add36aa8-751a-4579-a266-d66f5202ccbb}"="Print Ordering via the Web"
"{6b33163c-76a5-4b6c-bf21-45de9cd503a1}"="Shell Publishing Wizard Object"
"{58f1f272-9240-4f51-b6d4-fd63d1618591}"="Get a Passport Wizard"
"{7A9D77BD-5403-11d2-8785-2E0420524153}"="User Accounts"
"{BD472F60-27FA-11cf-B8B4-444553540000}"="Compressed (zipped) Folder Right Drag Handler"
"{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}"="Compressed (zipped) Folder SendTo Target"
"{f39a0dc0-9cc8-11d0-a599-00c04fd64433}"="Channel File"
"{f3aa0dc0-9cc8-11d0-a599-00c04fd64434}"="Channel Shortcut"
"{f3ba0dc0-9cc8-11d0-a599-00c04fd64435}"="Channel Handler Object"
"{f3da0dc0-9cc8-11d0-a599-00c04fd64437}"="Channel Menu"
"{f3ea0dc0-9cc8-11d0-a599-00c04fd64438}"="Channel Properties"
"{63da6ec0-2e98-11cf-8d82-444553540000}"="FTP Folders Webview"
"{883373C3-BF89-11D1-BE35-080036B11A03}"="Microsoft DocProp Shell Ext"
"{A9CF0EAE-901A-4739-A481-E35B73E47F6D}"="Microsoft DocProp Inplace Edit Box Control"
"{8EE97210-FD1F-4B19-91DA-67914005F020}"="Microsoft DocProp Inplace ML Edit Box Control"
"{0EEA25CC-4362-4A12-850B-86EE61B0D3EB}"="Microsoft DocProp Inplace Droplist Combo Control"
"{6A205B57-2567-4A2C-B881-F787FAB579A3}"="Microsoft DocProp Inplace Calendar Control"
"{28F8A4AC-BBB3-4D9B-B177-82BFC914FA33}"="Microsoft DocProp Inplace Time Control"
"{8A23E65E-31C2-11d0-891C-00A024AB2DBB}"="Directory Query UI"
"{9E51E0D0-6E0F-11d2-9601-00C04FA31A86}"="Shell properties for a DS object"
"{163FDC20-2ABC-11d0-88F0-00A024AB2DBB}"="Directory Object Find"
"{F020E586-5264-11d1-A532-0000F8757D7E}"="Directory Start/Search Find"
"{0D45D530-764B-11d0-A1CA-00AA00C16E65}"="Directory Property UI"
"{62AE1F9A-126A-11D0-A14B-0800361B1103}"="Directory Context Menu Verbs"
"{ECF03A33-103D-11d2-854D-006008059367}"="MyDocs Copy Hook"
"{ECF03A32-103D-11d2-854D-006008059367}"="MyDocs Drop Target"
"{4a7ded0a-ad25-11d0-98a8-0800361b1103}"="MyDocs Properties"
"{750fdf0e-2a26-11d1-a3ea-080036587f03}"="Offline Files Menu"
"{10CFC467-4392-11d2-8DB4-00C04FA31A66}"="Offline Files Folder Options"
"{AFDB1F70-2A4C-11d2-9039-00C04F8EEB3E}"="Offline Files Folder"
"{143A62C8-C33B-11D1-84FE-00C04FA34A14}"="Microsoft Agent Character Property Sheet Handler"
"{ECCDF543-45CC-11CE-B9BF-0080C87CDBA6}"="DfsShell"
"{60fd46de-f830-4894-a628-6fa81bc0190d}"="%DESC_PublishDropTarget%"
"{7A80E4A8-8005-11D2-BCF8-00C04F72C717}"="MMC Icon Handler"
"{0CD7A5C0-9F37-11CE-AE65-08002B2E1262}"=".CAB file viewer"
"{32714800-2E5F-11d0-8B85-00AA0044F941}"="For &People..."
"{8DD448E6-C188-4aed-AF92-44956194EB1F}"="Windows Media Player Play as Playlist Context Menu Handler"
"{CE3FB1D1-02AE-4a5f-A6E9-D9F1B4073E6C}"="Windows Media Player Burn Audio CD Context Menu Handler"
"{F1B9284F-E9DC-4e68-9D7E-42362A59F0FD}"="Windows Media Player Add to Playlist Context Menu Handler"
"{5F327514-6C5E-4d60-8F16-D07FA08A78ED}"="Auto Update Property Sheet Extension"
"{F0CB00CD-5A07-4D91-97F5-A8C92CDA93E4}"="Shell Extensions for RealOne Player"
"{BDEADF00-C265-11D0-BCED-00A0C90AB50F}"="Web Folders"
"{0006F045-0000-0000-C000-000000000046}"="Microsoft Outlook Custom Icon Handler"
"{42042206-2D85-11D3-8CFF-005004838597}"="Microsoft Office HTML Icon Handler"
"{8FF88D21-7BD0-11D1-BFB7-00AA00262A11}"="WinAce Archiver 2.5 Context Menu Shell Extension"
"{8FF88D25-7BD0-11D1-BFB7-00AA00262A11}"="WinAce Archiver 2.5 DragDrop Shell Extension"
"{8FF88D27-7BD0-11D1-BFB7-00AA00262A11}"="WinAce Archiver 2.5 Context Menu Shell Extension"
"{8FF88D23-7BD0-11D1-BFB7-00AA00262A11}"="WinAce Archiver 2.5 Property Sheet Shell Extension"
"{acb4a560-3606-11d3-aef4-00104bd0f92d}"="KodakShellExtension"
"{5E44E225-A408-11CF-B581-008029601108}"="Adaptec DirectCD Shell Extension"
"{B41DB860-8EE4-11D2-9906-E49FADC173CA}"="WinRAR shell extension"
"{2559a1f7-21d7-11d4-bdaf-00c04f60b9f0}"="Set Program Access and Defaults"
"{596AB062-B4D2-4215-9F74-E9109B0A8153}"="Previous Versions Property Page"
"{9DB7A13C-F208-4981-8353-73CC61AE2783}"="Previous Versions"
"{692F0339-CBAA-47e6-B5B5-3B84DB604E87}"="Extensions Manager Folder"
"{640167b4-59b0-47a6-b335-a6b3c0695aea}"="Portable Media Devices"
"{cc86590a-b60a-48e6-996b-41d25ed39a1e}"="Portable Media Devices Menu"
"{FED7043D-346A-414D-ACD7-550D052499A7}"="dBpowerAMP Music Converter 1"
"{2C49B5D0-ACE7-4D17-9DF0-A254A6C5A0C5}"="dBpowerAMP Music Converter"
"{00E7B358-F65B-4dcf-83DF-CD026B94BFD4}"="Autoplay for SlideShow"
"{445a3440-27e6-11d3-80fa-00805f479683}"="X940 Shell Extension"
"{2F5AC606-70CF-461C-BFE1-734234536262}"="WindowBlinds CPL Extension"
"{611AD258-4138-4348-A534-9856FA6BA398}"="IconPackager Icon Handler"
"{B9E1D2CB-CCFF-4AA6-9579-D7A4754030EF}"="iTunes"
"{1D2680C9-0E2A-469d-B787-065558BC7D43}"="Fusion Cache"
"{30351348-7B7D-4FCC-81B4-1E394CA267EB}"="TortoiseSVN"
"{30351347-7B7D-4FCC-81B4-1E394CA267EB}"="TortoiseSVN"
"{3035134A-7B7D-4FCC-81B4-1E394CA267EB}"="TortoiseSVN"
"{3035134C-7B7D-4FCC-81B4-1E394CA267EB}"="TortoiseSVN"
"{30351346-7B7D-4FCC-81B4-1E394CA267EB}"="TortoiseSVN"
"{30351349-7B7D-4FCC-81B4-1E394CA267EB}"="TortoiseSVN"
"{3035134B-7B7D-4FCC-81B4-1E394CA267EB}"="TortoiseSVN"
"{3035134D-7B7D-4FCC-81B4-1E394CA267EB}"="TortoiseSVN"
"{3035134E-7B7D-4FCC-81B4-1E394CA267EB}"="TortoiseSVN"
"{21569614-B795-46b1-85F4-E737A8DC09AD}"="Shell Search Band"
"{E134AB4F-555A-4D5A-9819-F1DB891DA10E}"=""
"{10B0B732-9276-4C71-A689-11FBC38E43A5}"=""
"{2768A42B-8AE8-4E6E-ABB1-197450349286}"=""
"{BDD34F0D-88CD-4258-BA22-DD86095AD903}"=""
"{86EB6A51-3157-459A-AB92-5E8ACD45C820}"=""
"{60903FA8-CD46-4BE7-B93A-3B645A114E80}"=""

**********************************************************************************
HKEY ROOT CLASSIDS:
Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{E134AB4F-555A-4D5A-9819-F1DB891DA10E}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{E134AB4F-555A-4D5A-9819-F1DB891DA10E}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\CLSID\{E134AB4F-555A-4D5A-9819-F1DB891DA10E}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{E134AB4F-555A-4D5A-9819-F1DB891DA10E}\InprocServer32]
@="C:\\WINDOWS\\system32\\antodisc.dll"
"ThreadingModel"="Apartment"

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{86EB6A51-3157-459A-AB92-5E8ACD45C820}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{86EB6A51-3157-459A-AB92-5E8ACD45C820}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\CLSID\{86EB6A51-3157-459A-AB92-5E8ACD45C820}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{86EB6A51-3157-459A-AB92-5E8ACD45C820}\InprocServer32]
@="C:\\WINDOWS\\system32\\XQMSA32.dll"
"ThreadingModel"="Apartment"

**********************************************************************************
Files Found are not all bad files:

C:\WINDOWS\SYSTEM32\
antodisc.dll Sun Dec 25 2005 7:55:10p ..... 234,272 228.78 K
browseui.dll Wed Nov 23 2005 8:06:34p A.... 1,022,464 998.50 K
cdfview.dll Thu Oct 20 2005 10:39:26p A.... 151,040 147.50 K
cemlkbf.dll Fri Dec 23 2005 8:14:10a A.... 139,264 136.00 K
cmdlin~1.dll Sat Oct 22 2005 11:35:58a A.... 98,304 96.00 K
d4j0le~1.dll Sun Dec 25 2005 3:53:52p ..S.R 235,286 229.77 K
danim.dll Fri Nov 4 2005 10:16:24p A.... 1,054,208 1.00 M
dpwtdaxp.dll Fri Oct 21 2005 6:06:02p ..SH. 23 0.02 K
dpwtpaxp.dll Fri Oct 21 2005 6:06:02p ..SH. 14 0.01 K
dpwttaxp.dll Fri Oct 21 2005 6:07:20p ..SH. 23 0.02 K
dxtrans.dll Thu Oct 20 2005 10:39:28p A.... 205,312 200.50 K
esent.dll Thu Oct 20 2005 5:20:04p A.... 1,082,368 1.03 M
extmgr.dll Thu Oct 20 2005 10:39:28p ..... 55,808 54.50 K
f8l00i~1.dll Sun Dec 25 2005 7:53:04p ..S.R 234,400 228.91 K
gdi32.dll Wed Oct 5 2005 10:09:36p A.... 280,064 273.50 K
iepeers.dll Thu Oct 20 2005 10:39:28p A.... 251,392 245.50 K
inseng.dll Thu Oct 20 2005 10:39:28p A.... 96,256 94.00 K
ir64l5~1.dll Sun Dec 25 2005 3:41:02p ..S.R 235,737 230.21 K
lv2409~1.dll Sun Dec 25 2005 7:01:24p ..S.R 234,272 228.78 K
mshtml.dll Wed Nov 23 2005 8:06:34p A.... 3,015,680 2.88 M
mshtmled.dll Thu Oct 20 2005 10:39:30p A.... 448,512 438.00 K
msrating.dll Thu Oct 20 2005 10:39:30p A.... 146,432 143.00 K
mstime.dll Thu Oct 20 2005 10:39:30p A.... 530,944 518.50 K
msupda~1.dll Sun Dec 25 2005 3:22:20p A.... 36,864 36.00 K
mswtpaxp.dll Fri Oct 21 2005 6:07:20p ..SH. 14 0.01 K
pngfilt.dll Thu Oct 20 2005 10:39:30p A.... 39,424 38.50 K
shdocvw.dll Wed Nov 30 2005 10:59:30p A.... 1,492,480 1.42 M
shlwapi.dll Thu Oct 20 2005 10:39:30p A.... 473,600 462.50 K
spmsg.dll Wed Oct 12 2005 6:12:26p ..... 14,048 13.72 K
spwtpaxp.dll Fri Oct 21 2005 6:05:56p ..SH. 12 0.01 K
ssldr32.dll Sun Dec 25 2005 3:22:30p A.... 10,240 10.00 K
urlmon.dll Fri Nov 4 2005 10:16:28p A.... 609,280 595.00 K
verwttxp.dll Fri Oct 21 2005 6:11:32p ..SH. 2 0.00 K
wep.dll Sat Oct 1 2005 12:32:46p A.... 75,264 73.50 K
wininet.dll Thu Oct 20 2005 10:39:30p A.... 658,432 643.00 K
winphk.dll Sat Oct 1 2005 12:31:10p A.... 11,776 11.50 K
xqmsa32.dll Sun Dec 25 2005 5:36:02p ..S.R 234,400 228.91 K

37 items found: 37 files (11 H/S), 0 directories.
Total of file sizes: 13,407,911 bytes 12.79 M
Locate .tmp files:

C:\WINDOWS\SYSTEM32\
atmtdd~1.tmp Sun Dec 25 2005 5:23:24p A.... 0 0.00 K

1 item found: 1 file, 0 directories.
Total of file sizes: 0 bytes 0.00 K
**********************************************************************************
Directory Listing of system files:
Volume in drive C has no label.
Volume Serial Number is 5C89-7895

Directory of C:\WINDOWS\System32

12/25/2005 07:53 PM 234,400 f8l00i3me8.dll
12/25/2005 07:01 PM 234,272 lv2409fqe.dll
12/25/2005 05:36 PM 234,400 XQMSA32.dll
12/25/2005 03:53 PM 235,286 d4j0le1m1h.dll
12/25/2005 03:41 PM 235,737 ir64l5jq1.dll
12/23/2005 08:14 AM 405,504 ??plorer.exe
10/24/2005 10:43 PM <DIR> dllcache
10/21/2005 06:11 PM 2 verwttxp.dll
10/21/2005 06:07 PM 23 dpwttaxp.dll
10/21/2005 06:07 PM 14 mswtpaxp.dll
10/21/2005 06:06 PM 23 dpwtdaxp.dll
10/21/2005 06:06 PM 14 dpwtpaxp.dll
10/21/2005 06:05 PM 12 spwtpaxp.dll
02/22/2000 11:05 AM <DIR> Microsoft
12 File(s) 1,579,687 bytes
2 Dir(s) 734,875,648 bytes free
  • 0

#4
don77

don77

    Malware Expert

  • Retired Staff
  • 18,526 posts
Close any programs you have open since this step requires a reboot.

From the l2mfix folder on your desktop, double click l2mfix.bat and select option #2 for Run Fix by typing 2 and then pressing enter. It will process then start. Your desktop and icons will disappear (this is normal). L2mfix will continue to scan your computer and when it's finished, it will be ready for a reboot. Press any key to reboot. After the reboot notepad will open with a log. Copy the contents of that log and paste it back into this thread, along with a new hijackthis log.

IMPORTANT: Do NOT run any other files in the l2mfix folder unless you are asked to do so!
If after the reboot the log does not open double click on it in the l2mfix folder.
  • 0

#5
Amuro Ray

Amuro Ray

    New Member

  • Topic Starter
  • Member
  • Pip
  • 4 posts
l2mfix log:

L2mfix Beta 121605
Creating Account.
The command completed successfully.

Adding Administrative privleges.
The command completed successfully.

Checking for L2MFix account(0=no 1=yes):
1
Granting SeDebugPrivilege to L2MFIX ... successful

Running From:
C:\WINDOWS\system32

Killing Processes!

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 [email protected]
Killing PID 872 'smss.exe'
Killing PID 872 'smss.exe'

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 [email protected]
Killing PID 944 'winlogon.exe'
Killing PID 944 'winlogon.exe'
Killing PID 944 'winlogon.exe'
Killing PID 944 'winlogon.exe'
Killing PID 944 'winlogon.exe'
Killing PID 944 'winlogon.exe'
Killing PID 944 'winlogon.exe'
Killing PID 944 'winlogon.exe'

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 [email protected]
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'
Killing PID 488 'explorer.exe'

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 [email protected]
Error, Cannot find a process with an image name of rundll32.exe
Restoring Sedebugprivilege:
Granting SeDebugPrivilege to Administrators ... successful
Granting SeDebugPrivilege to Administrateurs ... failed (GetAccountSid(Administrateurs)=1332
Granting SeDebugPrivilege to Administrat÷rer ... failed (GetAccountSid(Administrat÷rer)=1332
Granting SeDebugPrivilege to Administradores ... failed (GetAccountSid(Administradores)=1332
Granting SeDebugPrivilege to Amministratore ... failed (GetAccountSid(Amministratore)=1332
Granting SeDebugPrivilege to Administratoren ... failed (GetAccountSid(Administratoren)=1332

Scanning First Pass. Please Wait!

First Pass Completed

Second Pass Scanning

Second pass Completed!
moving: C:\WINDOWS\system32\antodisc.dll
Successfully Moved: C:\WINDOWS\system32\antodisc.dll
moving: C:\WINDOWS\system32\d4j0le1m1h.dll
Successfully Moved: C:\WINDOWS\system32\d4j0le1m1h.dll
moving: C:\WINDOWS\system32\ir64l5jq1.dll
Successfully Moved: C:\WINDOWS\system32\ir64l5jq1.dll
moving: C:\WINDOWS\system32\XQMSA32.dll
Successfully Moved: C:\WINDOWS\system32\XQMSA32.dll




Restoring Windows Update Certificates.:

The following Is the Current Export of the Winlogon notify key:
****************************************************************************
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\AtiExtEvent]
"DLLName"="Ati2evxx.dll"
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000001
"Lock"="AtiLockEvent"
"Logoff"="AtiLogoffEvent"
"Logon"="AtiLogonEvent"
"Disconnect"="AtiDisConnectEvent"
"Reconnect"="AtiReConnectEvent"
"Safe"=dword:00000000
"Shutdown"="AtiShutdownEvent"
"StartScreenSaver"="AtiStartScreenSaverEvent"
"StartShell"="AtiStartShellEvent"
"Startup"="AtiStartupEvent"
"StopScreenSaver"="AtiStopScreenSaverEvent"
"Unlock"="AtiUnLockEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Control Panel]
"Asynchronous"=dword:00000000
"DllName"="C:\\WINDOWS\\system32\\lv2409fqe.dll"
"Impersonate"=dword:00000000
"Logon"="WinLogon"
"Logoff"="WinLogoff"
"Shutdown"="WinShutdown"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt32chain]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,33,00,32,00,2e,00,64,00,6c,00,\
6c,00,00,00
"Logoff"="ChainWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cryptnet]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,6e,00,65,00,74,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Logoff"="CryptnetWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cscdll]
"DLLName"="cscdll.dll"
"Logon"="WinlogonLogonEvent"
"Logoff"="WinlogonLogoffEvent"
"ScreenSaver"="WinlogonScreenSaverEvent"
"Startup"="WinlogonStartupEvent"
"Shutdown"="WinlogonShutdownEvent"
"StartShell"="WinlogonStartShellEvent"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\MCPClient]
"Asynchronous"=dword:00000000
"DllName"="C:\\PROGRA~1\\COMMON~1\\Stardock\\mcpstub.dll"
"Startup"="MCPSystemStartup"
"Logon"="MCPLogonStartup"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\msupdate]
"DllName"="msupdate32.dll"
"Startup"="WinlogonStartupEvent"
"Asynchronous"=dword:00000001
"Impersonate"=dword:00000000

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ScCertProp]
"DLLName"="wlnotify.dll"
"Logon"="SCardStartCertProp"
"Logoff"="SCardStopCertProp"
"Lock"="SCardSuspendCertProp"
"Unlock"="SCardResumeCertProp"
"Enabled"=dword:00000001
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Schedule]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"StartShell"="SchedStartShell"
"Logoff"="SchedEventLogOff"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\sclgntfy]
"Logoff"="WLEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001
"DllName"=hex(2):73,00,63,00,6c,00,67,00,6e,00,74,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SensLogn]
"DLLName"="WlNotify.dll"
"Lock"="SensLockEvent"
"Logon"="SensLogonEvent"
"Logoff"="SensLogoffEvent"
"Safe"=dword:00000001
"MaxWait"=dword:00000258
"StartScreenSaver"="SensStartScreenSaverEvent"
"StopScreenSaver"="SensStopScreenSaverEvent"
"Startup"="SensStartupEvent"
"Shutdown"="SensShutdownEvent"
"StartShell"="SensStartShellEvent"
"PostShell"="SensPostShellEvent"
"Disconnect"="SensDisconnectEvent"
"Reconnect"="SensReconnectEvent"
"Unlock"="SensUnlockEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ssldr]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DLLName"="ssldr32.dll"
"Logon"="StartProcessAtWinLogon"
"Logoff"="StopProcessAtWinLogoff"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\termsrv]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"Logoff"="TSEventLogoff"
"Logon"="TSEventLogon"
"PostShell"="TSEventPostShell"
"Shutdown"="TSEventShutdown"
"StartShell"="TSEventStartShell"
"Startup"="TSEventStartup"
"MaxWait"=dword:00000258
"Reconnect"="TSEventReconnect"
"Disconnect"="TSEventDisconnect"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\WB]
"Asynchronous"=dword:00000000
"DllName"="C:\\PROGRA~1\\Stardock\\OBJECT~2\\WINDOW~1\\fastload.dll"
"Startup"="StartSys"
"Logon"="StartWB"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlballoon]
"DLLName"="wlnotify.dll"
"Logon"="RegisterTicketExpiredNotificationEvent"
"Logoff"="UnregisterTicketExpiredNotificationEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001


The following are the files found:
****************************************************************************
C:\WINDOWS\system32\antodisc.dll
C:\WINDOWS\system32\d4j0le1m1h.dll
C:\WINDOWS\system32\ir64l5jq1.dll
C:\WINDOWS\system32\XQMSA32.dll

Registry Entries that were Deleted:
Please verify that the listing looks ok.
If there was something deleted wrongly there are backups in the backreg folder.
****************************************************************************
Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{E134AB4F-555A-4D5A-9819-F1DB891DA10E}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{E134AB4F-555A-4D5A-9819-F1DB891DA10E}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\CLSID\{E134AB4F-555A-4D5A-9819-F1DB891DA10E}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{E134AB4F-555A-4D5A-9819-F1DB891DA10E}\InprocServer32]
@="C:\\WINDOWS\\system32\\antodisc.dll"
"ThreadingModel"="Apartment"

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{86EB6A51-3157-459A-AB92-5E8ACD45C820}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{86EB6A51-3157-459A-AB92-5E8ACD45C820}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\CLSID\{86EB6A51-3157-459A-AB92-5E8ACD45C820}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{86EB6A51-3157-459A-AB92-5E8ACD45C820}\InprocServer32]
@="C:\\WINDOWS\\system32\\XQMSA32.dll"
"ThreadingModel"="Apartment"

REGEDIT4

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]
"{E134AB4F-555A-4D5A-9819-F1DB891DA10E}"=-
"{10B0B732-9276-4C71-A689-11FBC38E43A5}"=-
"{2768A42B-8AE8-4E6E-ABB1-197450349286}"=-
"{BDD34F0D-88CD-4258-BA22-DD86095AD903}"=-
"{86EB6A51-3157-459A-AB92-5E8ACD45C820}"=-
"{60903FA8-CD46-4BE7-B93A-3B645A114E80}"=-
[-HKEY_CLASSES_ROOT\CLSID\{E134AB4F-555A-4D5A-9819-F1DB891DA10E}]
[-HKEY_CLASSES_ROOT\CLSID\{10B0B732-9276-4C71-A689-11FBC38E43A5}]
[-HKEY_CLASSES_ROOT\CLSID\{2768A42B-8AE8-4E6E-ABB1-197450349286}]
[-HKEY_CLASSES_ROOT\CLSID\{BDD34F0D-88CD-4258-BA22-DD86095AD903}]
[-HKEY_CLASSES_ROOT\CLSID\{86EB6A51-3157-459A-AB92-5E8ACD45C820}]
[-HKEY_CLASSES_ROOT\CLSID\{60903FA8-CD46-4BE7-B93A-3B645A114E80}]
REGEDIT4

[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
"SV1"=""
****************************************************************************
Desktop.ini Contents:
****************************************************************************

****************************************************************************
Checking for L2MFix account(0=no 1=yes):
0
adding: dlls/antodisc.dll (124 bytes security) (deflated 4%)
adding: dlls/d4j0le1m1h.dll (124 bytes security) (deflated 5%)
adding: dlls/ir64l5jq1.dll (124 bytes security) (deflated 5%)
adding: dlls/XQMSA32.dll (124 bytes security) (deflated 4%)
adding: backregs/86EB6A51-3157-459A-AB92-5E8ACD45C820.reg (188 bytes security) (deflated 70%)
adding: backregs/E134AB4F-555A-4D5A-9819-F1DB891DA10E.reg (188 bytes security) (deflated 70%)
adding: backregs/notibac.reg (164 bytes security) (deflated 88%)
adding: backregs/shell.reg (164 bytes security) (deflated 74%)


hijackthis log:

Logfile of HijackThis v1.99.1
Scan saved at 9:05:31 PM, on 12/25/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\drivers\dcfssvc.exe
c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
C:\PROGRA~1\COMMON~1\Stardock\SDMCP.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Stardock\Object Desktop\WindowBlinds\wbload.exe
C:\WINDOWS\system32\r_server.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Tablet.exe
C:\WINDOWS\System32\wltrysvc.exe
C:\WINDOWS\System32\bcmwltry.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
c:\PROGRA~1\mcafee.com\vso\mcshield.exe
C:\WINDOWS\system32\notepad.exe
C:\Program Files\TortoiseSVN\bin\TSVNCache.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\WINDOWS\system32\pctspk.exe
C:\Program Files\McAfee.com\Agent\mcagent.exe
C:\program files\mcafee.com\vso\mcvsshld.exe
C:\WINDOWS\System32\rmctrl.exe
C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr_.exe
C:\Program Files\Adaptec\Easy CD Creator 5\DirectCD\DirectCD.exe
C:\WINDOWS\system32\ezSP_Px.exe
C:\Program Files\D-Tools\daemon.exe
C:\Program Files\Saitek\Software\Profiler.exe
C:\Program Files\Saitek\Software\SaiSmart.exe
C:\WINDOWS\system32\WLTRAY.exe
C:\WINDOWS\system32\Drivers\XWMSAPI.EXE
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\WinGlance\WinGlance.exe
C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe
C:\WINDOWS\system32\igps.exe
C:\WINDOWS\system32\pgws.exe
C:\WINDOWS\system32\??plorer.exe
C:\Program Files\rdso\eetu.exe
C:\Program Files\radiotime\mrt.exe
C:\WINDOWS\system32\WTablet\TabUserW.exe
C:\Program Files\Stardock\ObjectDock\ObjectDock.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
I:\utorrent.exe
C:\Documents and Settings\Randolph\Desktop\hijackthis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = c:\secure32.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = c:\secure32.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = c:\secure32.html
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = c:\secure32.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = c:\secure32.html
R3 - URLSearchHook: (no name) - {02EE5B04-F144-47BB-83FB-A60BD91B74A9} - (no file)
R3 - URLSearchHook: (no name) - {DE3780F2-674E-4195-69B4-16F3B6426EC8} - C:\WINDOWS\system32\cemlkbf.dll
O2 - BHO: LinkTracker Class - {8B6DA27E-7F64-4694-8F8F-DC87AB8C6B22} - C:\Program Files\QL\qlink32.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn3\yt.dll
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [PCTVOICE] pctspk.exe
O4 - HKLM\..\Run: [MCAgentExe] C:\Program Files\McAfee.com\Agent\mcagent.exe
O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\McAfee.com\Agent\McUpdate.exe
O4 - HKLM\..\Run: [VirusScan Online] c:\program files\mcafee.com\vso\mcvsshld.exe
O4 - HKLM\..\Run: [RemoteControl] C:\WINDOWS\System32\rmctrl.exe
O4 - HKLM\..\Run: [ViewMgr] C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr_.exe
O4 - HKLM\..\Run: [AdaptecDirectCD] C:\Program Files\Adaptec\Easy CD Creator 5\DirectCD\DirectCD.exe
O4 - HKLM\..\Run: [ezShieldProtector for Px] C:\WINDOWS\system32\ezSP_Px.exe
O4 - HKLM\..\Run: [DAEMON Tools-1033] "C:\Program Files\D-Tools\daemon.exe" -lang 1033
O4 - HKLM\..\Run: [Profiler] C:\Program Files\Saitek\Software\Profiler.exe
O4 - HKLM\..\Run: [SaiSmart] C:\Program Files\Saitek\Software\SaiSmart.exe
O4 - HKLM\..\Run: [Dell Wireless Manager UI] C:\WINDOWS\system32\WLTRAY
O4 - HKLM\..\Run: [XWMSUSBAPI] C:\WINDOWS\system32\Drivers\XWMSAPI.EXE
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [BootSkin Startup Jobs] "C:\Program Files\Stardock\WinCustomize\BootSkin\BootSkin.exe" /StartupJobs
O4 - HKLM\..\Run: [AltTabWinGlance] C:\Program Files\WinGlance\WinGlance.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe
O4 - HKLM\..\Run: [lspins] "C:\WINDOWS\system32\igps.exe"
O4 - HKLM\..\RunServices: [Configuration Loader] cvcd.exe
O4 - HKCU\..\Run: [Shell] "C:\Program Files\Common Files\Microsoft Shared\Web Folders\ibm00001.exe"
O4 - HKCU\..\Run: [aupd] C:\WINDOWS\system32\sywsvcs.exe
O4 - HKCU\..\Run: [CU1] C:\Program Files\Common Files\VCClient\VCClient.exe
O4 - HKCU\..\Run: [CU2] C:\Program Files\Common Files\VCClient\VCMain.exe
O4 - HKCU\..\Run: [owmo] C:\PROGRA~1\COMMON~1\owmo\owmom.exe
O4 - HKCU\..\Run: [Gltjzf] C:\WINDOWS\system32\??plorer.exe
O4 - HKCU\..\Run: [SpySheriff] C:\Program Files\SpySheriff\SpySheriff.exe
O4 - HKCU\..\Run: [Aida] "C:\Program Files\rdso\eetu.exe" -vt ndrv
O4 - Startup: Stardock ObjectDock.lnk = C:\Program Files\Stardock\ObjectDock\ObjectDock.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: RadioTime Player.lnk = C:\Program Files\radiotime\mrt.exe
O4 - Global Startup: TabUserW.exe.lnk = C:\WINDOWS\system32\WTablet\TabUserW.exe
O8 - Extra context menu item: Add to EverNote - res://C:\Program Files\EverNote\EverNote\enbar.dll/2000
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Add to EverNote - {A5ABA0BB-F195-40d8-A5E9-0801153E6597} - C:\Program Files\EverNote\EverNote\enbar.dll
O9 - Extra 'Tools' menuitem: Add to EverNote - {A5ABA0BB-F195-40d8-A5E9-0801153E6597} - C:\Program Files\EverNote\EverNote\enbar.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: Yahoo! Graffiti - http://download.game...ts/y/grt5_x.cab
O16 - DPF: Yahoo! NFL GameChannel StatTracker - http://aud12.sports....lgcst1016_x.cab
O16 - DPF: Yahoo! Pool 2 - http://download.game...ts/y/pote_x.cab
O16 - DPF: {01A88BB1-1174-41EC-ACCB-963509EAE56B} (SysProWmi Class) - http://support.dell....iler/SysPro.CAB
O16 - DPF: {1239CC52-59EF-4DFA-8C61-90FFA846DF7E} (Musicnotes Viewer) - http://www.musicnote...ad/mnviewer.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=39204
O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - http://us.dl1.yimg.c...s/yinst0401.cab
O16 - DPF: {3A7FE611-1994-4EF1-A09F-99456752289D} (WildTangent Active Launcher) - http://install.wildt...iveLauncher.cab
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://by13fd.bay13....es/MsnPUpld.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: {80DD2229-B8E4-4C77-B72F-F22972D723EA} (AvxScanOnline Control) - http://www.bitdefend...bitdefender.cab
O16 - DPF: {AB29A544-D6B4-4E36-A1F8-D3E34FC7B00A} (WTHoster Class) - http://install.wildt...lim/install.cab
O16 - DPF: {AE1C01E3-0283-11D3-9B3F-00C04F8EF466} (HeartbeatCtl Class) - http://fdl.msn.com/z...s/heartbeat.cab
O16 - DPF: {F04A8AE2-A59D-11D2-8792-00C04F8EF29D} (Hotmail Attachments Control) - http://by13fd.bay13....ex/HMAtchmt.ocx
O16 - DPF: {F229AB32-7BF9-4225-B78F-B4680AE6FC23} (Snapfish File Upload ActiveX Control) - http://www.snapfish....pfishUpload.cab
O18 - Filter: text/html - {3551784B-E99A-474f-B782-3EC814442918} - C:\Program Files\QL\qlink32.dll
O20 - Winlogon Notify: MCPClient - C:\PROGRA~1\COMMON~1\Stardock\mcpstub.dll
O20 - Winlogon Notify: msupdate - C:\WINDOWS\SYSTEM32\msupdate32.dll
O20 - Winlogon Notify: ssldr - C:\WINDOWS\SYSTEM32\ssldr32.dll
O20 - Winlogon Notify: ThemeManager - C:\WINDOWS\system32\lv2409fqe.dll
O20 - Winlogon Notify: WB - C:\PROGRA~1\Stardock\OBJECT~2\WINDOW~1\fastload.dll
O21 - SSODL: IconPackager Repair - {1799460C-0BC8-4865-B9DF-4A36CD703FF0} - C:\WINDOWS\system32\iprepair.dll
O23 - Service: Configuration Loader (a3) - Unknown owner - C:\WINDOWS\System32\cvcd.exe" -service (file missing)
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Dcfssvc - Eastman Kodak Company - C:\WINDOWS\system32\drivers\dcfssvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Macromedia Licensing Service - Macromedia - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe
O23 - Service: McAfee.com McShield (McShield) - Unknown owner - c:\PROGRA~1\mcafee.com\vso\mcshield.exe
O23 - Service: McAfee.com VirusScan Online Realtime Engine (MCVSRte) - Mcafee.com Corporation - c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
O23 - Service: PACSPTISVR - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exe
O23 - Service: Remote Administrator Service (r_server) - Unknown owner - C:\WINDOWS\system32\r_server.exe" /service (file missing)
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: TabletService - Wacom Technology, Corp. - C:\WINDOWS\system32\Tablet.exe
O23 - Service: WLTRYSVC - Unknown owner - C:\WINDOWS\System32\wltrysvc.exe
  • 0

#6
don77

don77

    Malware Expert

  • Retired Staff
  • 18,526 posts
Didn't quite do what we wanted it to do,

Lets see if cleaning up a good bit of this helps

Download smitRem.exe (Developed by noahdfear ) and save the file to your desktop.
Double click on the file to extract it to it's own folder on the desktop.

Place a shortcut to Panda ActiveScan on your desktop.

Please download the trial version of Ewido Security Suite here:
http://www.ewido.net/en/download/

Please read Ewido Setup Instructions
Install it, and update the definitions to the newest files. Do NOT run a scan yet.

If you have not already installed Ad-Aware SE 1.06, follow these download and setup instructions, otherwise, check for updates:
Ad-Aware SE Setup
Don't run it yet!

Next, please reboot your computer in SafeMode by doing the following:
  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, press F8.
  • Instead of Windows loading as normal, a menu should appear
  • Select the first option, to run Windows in Safe Mode.
Now scan with HJT and place a checkmark next to each of the following items:
===================================================
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = c:\secure32.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = c:\secure32.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = c:\secure32.html
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = c:\secure32.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = c:\secure32.html
R3 - URLSearchHook: (no name) - {02EE5B04-F144-47BB-83FB-A60BD91B74A9} - (no file)
R3 - URLSearchHook: (no name) - {DE3780F2-674E-4195-69B4-16F3B6426EC8} - C:\WINDOWS\system32\cemlkbf.dll
O2 - BHO: LinkTracker Class - {8B6DA27E-7F64-4694-8F8F-DC87AB8C6B22} - C:\Program Files\QL\qlink32.dll
O4 - HKLM\..\Run: [lspins] "C:\WINDOWS\system32\igps.exe"
O4 - HKLM\..\RunServices: [Configuration Loader] cvcd.exe
O4 - HKCU\..\Run: [aupd] C:\WINDOWS\system32\sywsvcs.exe
O4 - HKCU\..\Run: [CU1] C:\Program Files\Common Files\VCClient\VCClient.exe
O4 - HKCU\..\Run: [CU2] C:\Program Files\Common Files\VCClient\VCMain.exe
O4 - HKCU\..\Run: [owmo] C:\PROGRA~1\COMMON~1\owmo\owmom.exe
O4 - HKCU\..\Run: [Gltjzf] C:\WINDOWS\system32\??plorer.exe
O4 - HKCU\..\Run: [SpySheriff] C:\Program Files\SpySheriff\SpySheriff.exe
O4 - HKCU\..\Run: [Aida] "C:\Program Files\rdso\eetu.exe" -vt ndrv
O18 - Filter: text/html - {3551784B-E99A-474f-B782-3EC814442918} - C:\Program Files\QL\qlink32.dll
O20 - Winlogon Notify: msupdate - C:\WINDOWS\SYSTEM32\msupdate32.dll
O20 - Winlogon Notify: ssldr - C:\WINDOWS\SYSTEM32\ssldr32.dll
.

===================================================
Make sure all open windows are closed and click on " Fix Checked"


Search for and delete the Folders highlighted in Blue Files highlighted in BOLD

C:\WINDOWS\system32\igps.exe
cvcd.exe

C:\WINDOWS\system32\sywsvcs.exe
C:\Program Files\Common Files\VCClient\
C:\PROGRA~1\COMMON~1\owmo\
C:\WINDOWS\system32\??plorer.exe make sure you delete the right one,just the one with the ??
C:\Program Files\SpySheriff\
C:\Program Files\rdso\
C:\Program Files\QL\
C:\WINDOWS\SYSTEM32\msupdate32.dll
C:\WINDOWS\SYSTEM32\ssldr32.dll

Next,
Open the smitRem folder, then double click the RunThis.bat file to start the tool. Follow the prompts on screen.
Wait for the tool to complete and disk cleanup to finish.

The tool will create a log named smitfiles.txt in the root of your drive, eg; Local Disk C: or partition where your operating system is installed. Please post that log along with all others requested in your next reply.


Open Ad-aware and do a full scan. Remove all it finds.


Run Ewido:
  • Click on scanner
  • Click on Complete System Scan and the scan will begin.
  • NOTE: During some scans with ewido it is finding cases of false positives.
  • You will need to step through the process of cleaning files one-by-one.
  • If ewido detects a file you KNOW to be legitimate, select none as the action.
  • DO NOT select "Perform action on all infections"
  • If you are unsure of any entry found select none for now.
  • When the scan is finished, click the Save report button at the bottom of the screen.
  • Save the report to your desktop
Close Ewido

Next go to Control Panel click Display > Desktop > Customize Desktop > Web > Uncheck "Security Info" if present.

Reboot back into Windows and click the Panda ActiveScan shortcut, then do a full system scan. Make sure the autoclean box is checked!
Save the scan log and post it along with a new HijackThis Log, the contents of the smitfiles.txt log and the Ewido Log by using Add Reply.
Let us know if any problems persist.
  • 0

#7
Amuro Ray

Amuro Ray

    New Member

  • Topic Starter
  • Member
  • Pip
  • 4 posts
First of all, the Panda Scan for some reason doesn't seem to work. It keeps saying error on page. Also, I still get the pop ups. Also, when I look at the HiJackThis logs, it says that the items that I deleted from before are still there. They just keep coming back by themselves.

Here are the logs:

Logfile of HijackThis v1.99.1
Scan saved at 1:31:42 AM, on 12/26/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\drivers\dcfssvc.exe
C:\Program Files\ewido anti-malware\ewidoctrl.exe
C:\Program Files\ewido anti-malware\ewidoguard.exe
c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
C:\WINDOWS\system32\r_server.exe
C:\PROGRA~1\COMMON~1\Stardock\SDMCP.exe
C:\Program Files\Stardock\Object Desktop\WindowBlinds\wbload.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Tablet.exe
C:\WINDOWS\System32\wltrysvc.exe
C:\WINDOWS\System32\bcmwltry.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
c:\PROGRA~1\mcafee.com\vso\mcshield.exe
C:\Program Files\TortoiseSVN\bin\TSVNCache.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\WINDOWS\system32\pctspk.exe
C:\Program Files\McAfee.com\Agent\mcagent.exe
C:\program files\mcafee.com\vso\mcvsshld.exe
C:\WINDOWS\System32\rmctrl.exe
C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr_.exe
C:\Program Files\Adaptec\Easy CD Creator 5\DirectCD\DirectCD.exe
C:\WINDOWS\system32\ezSP_Px.exe
C:\Program Files\D-Tools\daemon.exe
C:\Program Files\Saitek\Software\Profiler.exe
C:\Program Files\Saitek\Software\SaiSmart.exe
C:\WINDOWS\system32\WLTRAY.exe
C:\WINDOWS\system32\Drivers\XWMSAPI.EXE
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe
C:\WINDOWS\system32\??plorer.exe
C:\Program Files\rdso\eetu.exe
C:\WINDOWS\system32\WTablet\TabUserW.exe
C:\Program Files\Stardock\ObjectDock\ObjectDock.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\rundll32.exe
C:\Documents and Settings\Randolph\Desktop\hijackthis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = c:\secure32.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = c:\secure32.html
R3 - URLSearchHook: (no name) - {02EE5B04-F144-47BB-83FB-A60BD91B74A9} - (no file)
R3 - URLSearchHook: (no name) - {DE3780F2-674E-4195-69B4-16F3B6426EC8} - C:\WINDOWS\system32\cemlkbf.dll
O2 - BHO: (no name) - {DE3780F2-674E-4195-69B4-16F3B6426EC8} - C:\WINDOWS\system32\cemlkbf.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn3\yt.dll
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [PCTVOICE] pctspk.exe
O4 - HKLM\..\Run: [MCAgentExe] C:\Program Files\McAfee.com\Agent\mcagent.exe
O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\McAfee.com\Agent\mcupdate.exe
O4 - HKLM\..\Run: [VirusScan Online] c:\program files\mcafee.com\vso\mcvsshld.exe
O4 - HKLM\..\Run: [RemoteControl] C:\WINDOWS\System32\rmctrl.exe
O4 - HKLM\..\Run: [ViewMgr] C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr_.exe
O4 - HKLM\..\Run: [AdaptecDirectCD] C:\Program Files\Adaptec\Easy CD Creator 5\DirectCD\DirectCD.exe
O4 - HKLM\..\Run: [ezShieldProtector for Px] C:\WINDOWS\system32\ezSP_Px.exe
O4 - HKLM\..\Run: [DAEMON Tools-1033] "C:\Program Files\D-Tools\daemon.exe" -lang 1033
O4 - HKLM\..\Run: [Profiler] C:\Program Files\Saitek\Software\Profiler.exe
O4 - HKLM\..\Run: [SaiSmart] C:\Program Files\Saitek\Software\SaiSmart.exe
O4 - HKLM\..\Run: [Dell Wireless Manager UI] C:\WINDOWS\system32\WLTRAY
O4 - HKLM\..\Run: [XWMSUSBAPI] C:\WINDOWS\system32\Drivers\XWMSAPI.EXE
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [BootSkin Startup Jobs] "C:\Program Files\Stardock\WinCustomize\BootSkin\BootSkin.exe" /StartupJobs
O4 - HKLM\..\Run: [AltTabWinGlance] C:\Program Files\WinGlance\WinGlance.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe
O4 - HKCU\..\Run: [Shell] "C:\Program Files\Common Files\Microsoft Shared\Web Folders\ibm00001.exe"
O4 - HKCU\..\Run: [aupd] C:\WINDOWS\system32\sywsvcs.exe
O4 - HKCU\..\Run: [CU1] C:\Program Files\Common Files\VCClient\VCClient.exe
O4 - HKCU\..\Run: [CU2] C:\Program Files\Common Files\VCClient\VCMain.exe
O4 - HKCU\..\Run: [owmo] C:\PROGRA~1\COMMON~1\owmo\owmom.exe
O4 - HKCU\..\Run: [Gltjzf] C:\WINDOWS\system32\??plorer.exe
O4 - HKCU\..\Run: [SpySheriff] C:\Program Files\SpySheriff\SpySheriff.exe
O4 - HKCU\..\Run: [Aida] "C:\Program Files\rdso\eetu.exe" -vt ndrv
O4 - Startup: Stardock ObjectDock.lnk = C:\Program Files\Stardock\ObjectDock\ObjectDock.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: RadioTime Player.lnk = C:\Program Files\radiotime\mrt.exe
O4 - Global Startup: TabUserW.exe.lnk = C:\WINDOWS\system32\WTablet\TabUserW.exe
O8 - Extra context menu item: Add to EverNote - res://C:\Program Files\EverNote\EverNote\enbar.dll/2000
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Add to EverNote - {A5ABA0BB-F195-40d8-A5E9-0801153E6597} - C:\Program Files\EverNote\EverNote\enbar.dll
O9 - Extra 'Tools' menuitem: Add to EverNote - {A5ABA0BB-F195-40d8-A5E9-0801153E6597} - C:\Program Files\EverNote\EverNote\enbar.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRA~1\Yahoo!\MESSEN~1\YPager.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: Yahoo! Graffiti - http://download.game...ts/y/grt5_x.cab
O16 - DPF: Yahoo! NFL GameChannel StatTracker - http://aud12.sports....lgcst1016_x.cab
O16 - DPF: Yahoo! Pool 2 - http://download.game...ts/y/pote_x.cab
O16 - DPF: {01A88BB1-1174-41EC-ACCB-963509EAE56B} (SysProWmi Class) - http://support.dell....iler/SysPro.CAB
O16 - DPF: {1239CC52-59EF-4DFA-8C61-90FFA846DF7E} (Musicnotes Viewer) - http://www.musicnote...ad/mnviewer.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=39204
O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - http://us.dl1.yimg.c...s/yinst0401.cab
O16 - DPF: {3A7FE611-1994-4EF1-A09F-99456752289D} (WildTangent Active Launcher) - http://install.wildt...iveLauncher.cab
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://by13fd.bay13....es/MsnPUpld.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: {80DD2229-B8E4-4C77-B72F-F22972D723EA} (AvxScanOnline Control) - http://www.bitdefend...bitdefender.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoft...free/asinst.cab
O16 - DPF: {AB29A544-D6B4-4E36-A1F8-D3E34FC7B00A} (WTHoster Class) - http://install.wildt...lim/install.cab
O16 - DPF: {AE1C01E3-0283-11D3-9B3F-00C04F8EF466} (HeartbeatCtl Class) - http://fdl.msn.com/z...s/heartbeat.cab
O16 - DPF: {F04A8AE2-A59D-11D2-8792-00C04F8EF29D} (Hotmail Attachments Control) - http://by13fd.bay13....ex/HMAtchmt.ocx
O16 - DPF: {F229AB32-7BF9-4225-B78F-B4680AE6FC23} (Snapfish File Upload ActiveX Control) - http://www.snapfish....pfishUpload.cab
O20 - Winlogon Notify: MCPClient - C:\PROGRA~1\COMMON~1\Stardock\mcpstub.dll
O20 - Winlogon Notify: RunOnce - C:\WINDOWS\system32\o4pq0e75eh.dll
O20 - Winlogon Notify: WB - C:\PROGRA~1\Stardock\OBJECT~2\WINDOW~1\fastload.dll
O21 - SSODL: IconPackager Repair - {1799460C-0BC8-4865-B9DF-4A36CD703FF0} - C:\WINDOWS\system32\iprepair.dll
O23 - Service: Configuration Loader (a3) - Unknown owner - C:\WINDOWS\System32\cvcd.exe" -service (file missing)
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Dcfssvc - Eastman Kodak Company - C:\WINDOWS\system32\drivers\dcfssvc.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido anti-malware\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido anti-malware\ewidoguard.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Macromedia Licensing Service - Macromedia - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe
O23 - Service: McAfee.com McShield (McShield) - Unknown owner - c:\PROGRA~1\mcafee.com\vso\mcshield.exe
O23 - Service: McAfee.com VirusScan Online Realtime Engine (MCVSRte) - Mcafee.com Corporation - c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe
O23 - Service: PACSPTISVR - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exe
O23 - Service: Remote Administrator Service (r_server) - Unknown owner - C:\WINDOWS\system32\r_server.exe" /service (file missing)
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: TabletService - Wacom Technology, Corp. - C:\WINDOWS\system32\Tablet.exe
O23 - Service: WLTRYSVC - Unknown owner - C:\WINDOWS\System32\wltrysvc.exe


smitRem © log file
version 2.8

by noahdfear


Microsoft Windows XP [Version 5.1.2600]
The current date is: Sun 12/25/2005
The current time is: 22:10:50.75

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

checking for ShudderLTD key

ShudderLTD key not present!

checking for PSGuard.com key


PSGuard.com key not present!

spyaxe uninstaller NOT present
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Existing Pre-run Files


~~~ Program Files ~~~



~~~ Shortcuts ~~~



~~~ Favorites ~~~



~~~ system32 folder ~~~



~~~ Icons in System32 ~~~



~~~ Windows directory ~~~



~~~ Drive root ~~~


~~~ Miscellaneous Files/folders ~~~




~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 [email protected]
Killing PID 968 'explorer.exe'
Killing PID 968 'explorer.exe'

Starting registry repairs

Deleting files


Remaining Post-run Files


~~~ Program Files ~~~



~~~ Shortcuts ~~~



~~~ Favorites ~~~



~~~ system32 folder ~~~



~~~ Icons in System32 ~~~



~~~ Windows directory ~~~



~~~ Drive root ~~~



~~~ Miscellaneous Files/folders ~~~




~~~ Wininet.dll ~~~

CLEAN! :tazz:


---------------------------------------------------------
ewido anti-malware - Scan report
---------------------------------------------------------

+ Created on: 12:51:47 AM, 12/26/2005
+ Report-Checksum: 54F31BC2

+ Scan result:

HKLM\SOFTWARE\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C} -> Spyware.MiniBug : Cleaned with backup
[816] C:\WINDOWS\system32\guard.tmp -> Spyware.Look2Me : Cleaned with backup
C:\Documents and Settings\Administrator\Cookies\[email protected][1].txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
C:\Documents and Settings\Administrator\Cookies\administrator@burstnet[1].txt -> Spyware.Cookie.Burstnet : Cleaned with backup
C:\Documents and Settings\Administrator\Cookies\administrator@com[2].txt -> Spyware.Cookie.Com : Cleaned with backup
C:\Documents and Settings\Administrator\Cookies\administrator@yieldmanager[2].txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
:mozilla.18:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.19:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.20:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.21:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.24:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.25:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.30:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.31:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.32:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.33:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.34:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.35:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.36:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.37:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.38:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.39:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.40:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.41:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.42:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.571:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Burstbeacon : Cleaned with backup
:mozilla.578:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Bluemountain : Cleaned with backup
:mozilla.707:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Clickzs : Cleaned with backup
:mozilla.714:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Hitbox : Cleaned with backup
:mozilla.715:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Hitbox : Cleaned with backup
:mozilla.728:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Weborama : Cleaned with backup
:mozilla.748:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Valueclick : Cleaned with backup
:mozilla.749:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Valueclick : Cleaned with backup
:mozilla.775:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Tradedoubler : Cleaned with backup
:mozilla.776:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
:mozilla.797:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.798:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.799:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.800:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.801:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.802:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.803:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.806:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.812:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.814:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.824:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.839:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Valueclick : Cleaned with backup
:mozilla.859:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Valuead : Cleaned with backup
:mozilla.860:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Valuead : Cleaned with backup
:mozilla.867:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Valuead : Cleaned with backup
:mozilla.868:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Valuead : Cleaned with backup
:mozilla.869:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Trafic : Cleaned with backup
:mozilla.872:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
:mozilla.873:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
:mozilla.876:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
:mozilla.881:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Coremetrics : Cleaned with backup
:mozilla.883:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
:mozilla.888:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Onestat : Cleaned with backup
:mozilla.892:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Spylog : Cleaned with backup
:mozilla.906:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.907:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.908:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.909:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.910:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.914:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.915:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.916:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.917:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.918:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.920:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.921:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.922:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.926:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.928:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.929:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.930:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.931:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.943:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Onestat : Cleaned with backup
:mozilla.952:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Onestat : Cleaned with backup
:mozilla.956:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Specificclick : Cleaned with backup
:mozilla.963:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Onestat : Cleaned with backup
:mozilla.964:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Onestat : Cleaned with backup
:mozilla.978:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Onestat : Cleaned with backup
:mozilla.980:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Specificpop : Cleaned with backup
:mozilla.985:C:\Documents and Settings\Randolph\Application Data\Mozilla\Firefox\Profiles\fjca5v8l.default\cookies.txt -> Spyware.Cookie.Onestat : Cleaned with backup
C:\Documents and Settings\Randolph\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\Dummy.class-1a7fa491-61a30c1e.class -> Trojan.ClassLoader.Dummy.d : Cleaned with backup
C:\Documents and Settings\Randolph\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\Dummy.class-44eba5ec-560d72b7.class -> Trojan.ClassLoader.Dummy.d : Cleaned with backup
C:\Documents and Settings\Randolph\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\VerifierBug.class-3cfa0102-1cefba1e.class -> Trojan.Byteverify : Cleaned with backup
C:\Documents and Settings\Randolph\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\VerifierBug.class-5f7bafe7-49c1cc7e.class -> Trojan.Byteverify : Cleaned with backup
C:\Documents and Settings\Randolph\Cookies\[email protected][2].txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
C:\Documents and Settings\Randolph\Cookies\[email protected][2].txt -> Spyware.Cookie.Specificclick : Cleaned with backup
C:\Documents and Settings\Randolph\Cookies\randolph@burstnet[2].txt -> Spyware.Cookie.Burstnet : Cleaned with backup
C:\Documents and Settings\Randolph\Cookies\[email protected][1].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Documents and Settings\Randolph\Cookies\randolph@yieldmanager[1].txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
C:\Documents and Settings\Randolph\Desktop\l2mfix\dlls\d4j0le1m1h.dll -> Spyware.Look2Me : Cleaned with backup
C:\Documents and Settings\Randolph\Desktop\l2mfix\dlls\ir64l5jq1.dll -> Spyware.Look2Me : Cleaned with backup
C:\Documents and Settings\Randolph\Desktop\l2mfix\dlls\XQMSA32.dll -> Spyware.Look2Me : Cleaned with backup
C:\Documents and Settings\Randolph\Local Settings\Application Data\Wildtangent\Cdacache\00\00\0C.dat/files\wtvh.dll -> Spyware.WildTangent : Cleaned with backup
C:\Documents and Settings\Randolph\Local Settings\Temp\61.tmp -> Downloader.CWS.r : Cleaned with backup
C:\Documents and Settings\Randolph\Local Settings\Temp\62.tmp -> Proxy.Agent.hs : Cleaned with backup
C:\Documents and Settings\Randolph\Local Settings\Temp\63.tmp -> Dropper.Small.ahg : Cleaned with backup
C:\Documents and Settings\Randolph\Local Settings\Temp\bb.exe -> Spyware.BargainBuddy.l : Cleaned with backup
C:\Documents and Settings\Randolph\Local Settings\Temp\Cookies\randolph@com[1].txt -> Spyware.Cookie.Com : Cleaned with backup
C:\Documents and Settings\Randolph\Local Settings\Temp\Cookies\[email protected][2].txt -> Spyware.Cookie.Com : Cleaned with backup
C:\Documents and Settings\Randolph\Local Settings\Temp\Cookies\[email protected][2].txt -> Spyware.Cookie.Hitbox : Cleaned with backup
C:\Documents and Settings\Randolph\Local Settings\Temp\i69.tmp -> Adware.SurfSide : Cleaned with backup
C:\Documents and Settings\Randolph\Local Settings\Temp\pony41.exe -> Downloader.Agent.fk : Cleaned with backup
C:\Documents and Settings\Randolph\Local Settings\Temp\sysgxnt.exe -> Downloader.IstBar : Cleaned with backup
C:\Documents and Settings\Randolph\Local Settings\Temp\Temporary Directory 2 for CRACK[1].CD-Scrabble_Deluxe_v1.0.45.zip\oqe.exe -> Downloader.INService.i : Cleaned with backup
C:\Program Files\AWS\WeatherBug\MiniBugTransporter.dll -> Spyware.Wheaterbug : Cleaned with backup
C:\Program Files\filesubmit\The Matrix Reloaded 3D Screensaver\nnezt388.exe -> Spyware.NewDotNet : Cleaned with backup
C:\Program Files\Yahoo!\YPSR\Quarantine\ppq64.tmp -> Spyware.ISTBar : Cleaned with backup
C:\Program Files\Yahoo!\YPSR\Quarantine\ppq66.tmp -> Spyware.SideFind : Cleaned with backup
C:\Program Files\Yahoo!\YPSR\Quarantine\ppq67.tmp -> Spyware.SideFind : Cleaned with backup
C:\Program Files\Yahoo!\YPSR\Quarantine\ppq8A.tmp\sfexd001 -> Spyware.SideFind : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP641\A0104038.exe -> Logger.Agent.ig : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP641\A0104040.exe -> Worm.Delf.i : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP641\A0104052.exe -> Logger.Agent.ig : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP641\A0104054.exe -> Worm.Delf.i : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP641\A0105050.dll -> Downloader.Qoologic.az : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP641\A0105051.exe -> Downloader.Qoologic.at : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP641\A0105052.exe -> Trojan.Pakes : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP641\A0105053.dll -> Downloader.Small : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP641\A0105054.exe -> Downloader.Qoologic.at : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP641\A0105060.exe -> Downloader.Adload.j : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP641\A0105061.exe -> Trojan.Small : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP641\A0105062.exe -> Downloader.Small.bwr : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP641\A0105063.exe -> Dropper.Agent.abu : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP641\A0105064.exe -> Trojan.Small : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP641\A0105071.dll -> Downloader.Small.bug : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105090.dll -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105130.exe -> Worm.Delf.i : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105132.exe -> Logger.Agent.ig : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105134.dll -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105145.exe -> Logger.Agent.ig : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105146.exe -> Worm.Delf.i : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105160.dll -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105177.exe -> Downloader.Adload.l : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105181.exe -> Trojan.Small : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105184.exe -> Trojan.Inject.i : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105185.exe -> Proxy.Lager.f : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105187.cpl -> Downloader.Qoologic.at : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105195.exe -> Downloader.Small.bke : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105198.exe -> Adware.Suggestor : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105201.exe -> Dropper.Small.qn : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105215.exe -> Worm.Delf.i : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105217.exe -> Logger.Agent.ig : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105218.exe -> Downloader.CWS.r : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105232.DLL -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105236.dll -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105253.dll -> Downloader.Qoologic.at : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105262.dll -> Adware.SpySheriff : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105264.dll -> Spyware.SpywareNo : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105265.dll -> Adware.SpySheriff : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105267.exe -> Adware.SpySheriff : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105284.dll -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105288.Dll -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105352.dll -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0105533.dll -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0106537.exe -> Adware.Suggestor : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0106538.exe -> Adware.Suggestor : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0106540.dll -> Proxy.Agent.hs : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0106544.dll -> Spyware.Look2Me : Cleaned with backup
C:\System Volume Information\_restore{657D04F8-B22A-46A4-8AC7-233EBB1A3F0A}\RP642\A0106545.dll -> Spyware.Look2Me : Cleaned with backup
C:\WINDOWS\DH.dll -> Hijacker.Small.jf : Cleaned with backup
C:\WINDOWS\icont.exe -> Spyware.AdURL : Cleaned with backup
C:\WINDOWS\system32\f8l00i3me8.dll -> Spyware.Look2Me : Cleaned with backup
C:\WINDOWS\system32\guard.tmp -> Spyware.Look2Me : Cleaned with backup
C:\WINDOWS\system32\pgws.exe -> Trojan.Runner.h : Cleaned with backup
C:\WINDOWS\system32\wcnbrand.dll -> Spyware.Look2Me : Cleaned with backup
C:\WINDOWS\system32\WINPHK.DLL -> Trojan.Hooker.t : Cleaned with backup
C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\wtvh.dll -> Spyware.WildTangent : Cleaned with backup
C:\WINDOWS\wt\wtvh.dll -> Spyware.WildTangent : Cleaned with backup


::Report End
  • 0

#8
don77

don77

    Malware Expert

  • Retired Staff
  • 18,526 posts
Thats odd usually would find a protection program preventing changes with HJT,

Could you post a uninstall list for me please
  • Start HijackThis
  • Click on the Config button
  • Click on the Misc Tools button
  • Click on the Open Uninstall Manager button.
  • You can click on the Save list... button and specify where you would like to save this file. When you press Save button a notepad will open with the contents of that file. Simply copy and paste the contents of that notepad into this topic please,

  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP