1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Please help - Another victim of ULWindowSeek and UL WindowURL

Discussion in 'Windows - Virus and spyware problems' started by Stan64, Jun 11, 2006.

  1. Stan64

    Stan64 Member

    Joined:
    Jun 11, 2006
    Messages:
    4
    Likes Received:
    0
    Trophy Points:
    11
    I tried the Hijackthis instructions, but I don't quite understand. can someone please analyze my hijackthis log and tell me how to get rid of these 2 annoying windows that pop up - they are called ULWindowSeek and ULWindowURL. Thanks in advance! :D
     
  2. Stan64

    Stan64 Member

    Joined:
    Jun 11, 2006
    Messages:
    4
    Likes Received:
    0
    Trophy Points:
    11
    I couldn't post the log cause it only lets me post once every 3 minutes and I forgot. so here it is. :)

    Logfile of HijackThis v1.99.1
    Scan saved at 3:53:15 PM, on 6/11/2006
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.5346.0005)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    C:\Program Files\Norton Internet Security\NISUM.EXE
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\WINDOWS\system32\ezSP_Px.exe
    C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
    C:\PROGRA~1\NETSCAPE\COMMUN~1\PROGRAM\AIM\aim.exe
    C:\Program Files\MSN Messenger\msnmsgr.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Common Files\Microsoft Shared\Works Shared\wkcalrem.exe
    C:\Program Files\WinZip\WZQKPICK.EXE
    C:\Program Files\Norton Internet Security\ccPxySvc.exe
    C:\Program Files\Norton AntiVirus\navapsvc.exe
    C:\WINDOWS\system32\pctspk.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Google\Google Desktop Search\GoogleDesktopIndex.exe
    C:\Program Files\Google\Google Desktop Search\GoogleDesktopCrawl.exe
    C:\Documents and Settings\Default\Desktop\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.2020search.com/search/9884/search.html
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=54729
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=55245&clcid={SUB_CLCID}
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://www.2020search.com/search/9884/search.html
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O2 - BHO: Windows Resources - {2D38A51A-23C9-48a1-A33C-48675AA2B494} - C:\WINDOWS\winres.dll
    O2 - BHO: (no name) - {60D3AAEB-AA39-4AE0-B2F9-E4AF0613A2A3} - C:\PROGRA~1\SPYWAR~1\POPUPA~1\ABG_PL~1.DLL
    O2 - BHO: IeCatch2 Class - {A5366673-E8CA-11D3-9CD9-0090271D075B} - C:\PROGRA~1\FLASHGET\jccatch.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
    O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
    O3 - Toolbar: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\fgiebar.dll
    O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
    O4 - HKLM\..\Run: [CPQEASYACC] C:\Program Files\Compaq\Easy Access Button Support\cpqeadm.exe
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
    O4 - HKLM\..\Run: [ccRegVfy] "C:\Program Files\Common Files\Symantec Shared\ccRegVfy.exe"
    O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
    O4 - HKLM\..\Run: [EPSON Stylus CX4600 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATI9AA.EXE /P26 "EPSON Stylus CX4600 Series" /O6 "USB001" /M "Stylus CX4600"
    O4 - HKLM\..\Run: [WinampAgent] C:\Program Files\Winamp\winampa.exe
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [ImageShackUtil] C:\Program Files\ImageShack\QuickShot\QuickShot.exe
    O4 - HKLM\..\Run: [ezShieldProtector for Px] C:\WINDOWS\system32\ezSP_Px.exe
    O4 - HKCU\..\Run: [MoneyAgent] "C:\Program Files\Microsoft Money\System\Money Express.exe"
    O4 - HKCU\..\Run: [MSMSGS] C:\Program Files\Messenger\msmsgs.exe /background
    O4 - HKCU\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
    O4 - HKCU\..\Run: [AIM] C:\PROGRA~1\NETSCAPE\COMMUN~1\PROGRAM\AIM\aim.exe -cnetwait.odl
    O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Microsoft Works Calendar Reminders.lnk = C:\Program Files\Common Files\Microsoft Shared\Works Shared\wkcalrem.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
    O4 - Global Startup: WinZip Quick Pick.lnk = C:\Program Files\WinZip\WZQKPICK.EXE
    O9 - Extra button: (no name) - {06FE5D02-8F11-11d2-804F-00105A133818} - http://search.presario.net/scripts/redirectors/presario/srchredir.dll?s=avlinksearch&c=2c00&LC=0409 (file missing)
    O9 - Extra 'Tools' menuitem: &Find Pages Linking to this URL - {06FE5D02-8F11-11d2-804F-00105A133818} - http://search.presario.net/scripts/redirectors/presario/srchredir.dll?s=avlinksearch&c=2c00&LC=0409 (file missing)
    O9 - Extra button: (no name) - {06FE5D03-8F11-11d2-804F-00105A133818} - http://search.presario.net/scripts/redirectors/presario/srchredir.dll?s=avhostsearch&c=2c00&LC=0409 (file missing)
    O9 - Extra 'Tools' menuitem: Find Other Pages on this &Host - {06FE5D03-8F11-11d2-804F-00105A133818} - http://search.presario.net/scripts/redirectors/presario/srchredir.dll?s=avhostsearch&c=2c00&LC=0409 (file missing)
    O9 - Extra button: (no name) - {06FE5D04-8F11-11d2-804F-00105A133818} - http://jump.altavista.com/avie5/home (file missing)
    O9 - Extra 'Tools' menuitem: AV Home - {06FE5D04-8F11-11d2-804F-00105A133818} - http://jump.altavista.com/avie5/home (file missing)
    O9 - Extra button: Translate - {06FE5D05-8F11-11d2-804F-00105A133818} - http://search.presario.net/scripts/redirectors/presario/srchredir.dll?s=avbabelfish&c=2c00&LC=0409 (file missing)
    O9 - Extra 'Tools' menuitem: AV &Translate - {06FE5D05-8F11-11d2-804F-00105A133818} - http://search.presario.net/scripts/redirectors/presario/srchredir.dll?s=avbabelfish&c=2c00&LC=0409 (file missing)
    O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\PROGRA~1\NETSCAPE\COMMUN~1\PROGRAM\AIM\aim.exe
    O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
    O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O11 - Options group: [INTERNATIONAL] International*
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
    O20 - Winlogon Notify: wintss32 - C:\WINDOWS\SYSTEM32\wintss32.dll
    O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    O23 - Service: Symantec Password Validation Service (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
    O23 - Service: Symantec Proxy Service (ccPxySvc) - Symantec Corporation - C:\Program Files\Norton Internet Security\ccPxySvc.exe
    O23 - Service: Imapi Helper - Alex Feinman - C:\Program Files\Alex Feinman\ISO Recorder\ImapiHelper.exe
    O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
    O23 - Service: Norton Internet Security Accounts Manager (NISUM) - Symantec Corporation - C:\Program Files\Norton Internet Security\NISUM.EXE
    O23 - Service: PCTEL Speaker Phone (Pctspk) - PCtel, Inc. - C:\WINDOWS\system32\pctspk.exe
    O23 - Service: Sandra Data Service (SandraDataSrv) - SiSoftware - C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2005.SR3\RpcDataSrv.exe
    O23 - Service: Sandra Service (SandraTheSrv) - SiSoftware - C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2005.SR3\RpcSandraSrv.exe
    O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
    O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\PROGRA~1\COMMON~1\SONYSH~1\AVLib\Sptisrv.exe
    O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe

     
  3. tapiiri

    tapiiri Regular member

    Joined:
    Jun 11, 2005
    Messages:
    1,142
    Likes Received:
    0
    Trophy Points:
    46
    Hi Stan64

    Please download ewido anti malware it is a free version of the program -> http://www.ewido.net/en/download/

    1. Install ewido security suite
    2. When installing, under "Additional Options" uncheck..
    * Install background guard
    * Install scan via context menu
    3. Launch ewido, there should be an icon on your desktop, double-click it.
    4. The program will now open to the main screen.
    5. When you run ewido for the first time, you may get a warning "Database could not be found!". Click OK. We will fix this in a moment.
    6. You will need to update ewido to the latest definition files.
    * On the left hand side of the main screen click update.
    * Then click on Start Update.
    7. The update will start and a progress bar will show the updates being installed.
    (the status bar at the bottom will display ("Update successful")

    If you are having problems with the updater, you can use this link to manually update ewido.
    ewido manual updates -> http://www.ewido.net/en/download/updates/

    Once the updates are installed do the following:


    Download Killbox to your desktop -> http://www.downloads.subratam.org/KillBox.zip
    Unzip it to your desktop.

    Run Killbox.exe
    -> Choose Delete on Reboot
    -> Click All Files option.

    Copy the following lines to your clipboard (choose text with your mouse, press CTRL+C or copy)

    C:\WINDOWS\winres.dll
    C:\WINDOWS\SYSTEM32\wintss32.dll

    Then go back to Killbox
    -> go to File
    -> choose Paste from Clipboard
    -> Click the red-white Delete File option.
    -> Click Yes to Delete on Reboot question
    -> Click OK to any PendingFileRenameOperations requests (and tell me if you get any of these!)
    -> Restart your computer if Killbox won't do it.

    (If you get this error when running Killbox: "Component 'MsComCtl.ocx' or one of its dependencies not correctly registered: a file is missing or invalid.", download Missingfilessetup.exe form here to your desktop and run the file, then try running killbox -> http://www.eudaemonia.me.uk/downloads/Files/missingfilesetup.exe)


    When comp is running after removin, Scan hijack this and check

    O2 - BHO: Windows Resources - {2D38A51A-23C9-48a1-A33C-48675AA2B494} - C:\WINDOWS\winres.dll
    O20 - Winlogon Notify: wintss32 - C:\WINDOWS\SYSTEM32\wintss32.dll

    Close all programs exept hijackthis and click Fix Checked


    Reboot your computer in SafeMode by doing the following:

    1. Restart your computer
    2. After hearing your computer beep once during startup, but before the Windows icon appears, press F8.
    3. Instead of Windows loading as normal, a menu should appear
    4. Select the first option, to run Windows in Safe Mode.

    Launch ewido:

    * Click on scanner
    * Click on Complete System Scan and the scan will begin.
    * You will be prompted to clean the first infection.
    * Select "Perform action on all infections", then proceed.
    * Once the scan has completed, there will be a button located on the bottom of the screen named Save report
    * Click Save report.
    * Save the report .txt file to your desktop or a location where you can find it easily.

    Close ewido security suite.

    Reboot back to normal mode

    Send a fresh HjT log and ewido report.
     
  4. Stan64

    Stan64 Member

    Joined:
    Jun 11, 2006
    Messages:
    4
    Likes Received:
    0
    Trophy Points:
    11
    ok, took forever but I did it. Here's the logs.

    HjT:

    Logfile of HijackThis v1.99.1
    Scan saved at 7:25:21 PM, on 6/11/2006
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.5346.0005)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    C:\Program Files\Norton Internet Security\NISUM.EXE
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\WINDOWS\system32\ezSP_Px.exe
    C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
    C:\PROGRA~1\NETSCAPE\COMMUN~1\PROGRAM\AIM\aim.exe
    C:\Program Files\Norton Internet Security\ccPxySvc.exe
    C:\Program Files\Norton AntiVirus\navapsvc.exe
    C:\Program Files\MSN Messenger\msnmsgr.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\WINDOWS\system32\pctspk.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Common Files\Microsoft Shared\Works Shared\wkcalrem.exe
    C:\Program Files\WinZip\WZQKPICK.EXE
    C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
    C:\Program Files\Google\Google Desktop Search\GoogleDesktopIndex.exe
    C:\Program Files\Google\Google Desktop Search\GoogleDesktopCrawl.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\mIRC\mirc.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Documents and Settings\Default\Desktop\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.2020search.com/search/9884/search.html
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=54729
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=55245&clcid={SUB_CLCID}
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://www.2020search.com/search/9884/search.html
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O2 - BHO: (no name) - {60D3AAEB-AA39-4AE0-B2F9-E4AF0613A2A3} - C:\PROGRA~1\SPYWAR~1\POPUPA~1\ABG_PL~1.DLL
    O2 - BHO: IeCatch2 Class - {A5366673-E8CA-11D3-9CD9-0090271D075B} - C:\PROGRA~1\FLASHGET\jccatch.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
    O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
    O3 - Toolbar: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\fgiebar.dll
    O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
    O4 - HKLM\..\Run: [CPQEASYACC] C:\Program Files\Compaq\Easy Access Button Support\cpqeadm.exe
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
    O4 - HKLM\..\Run: [ccRegVfy] "C:\Program Files\Common Files\Symantec Shared\ccRegVfy.exe"
    O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
    O4 - HKLM\..\Run: [EPSON Stylus CX4600 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATI9AA.EXE /P26 "EPSON Stylus CX4600 Series" /O6 "USB001" /M "Stylus CX4600"
    O4 - HKLM\..\Run: [WinampAgent] C:\Program Files\Winamp\winampa.exe
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [ImageShackUtil] C:\Program Files\ImageShack\QuickShot\QuickShot.exe
    O4 - HKLM\..\Run: [ezShieldProtector for Px] C:\WINDOWS\system32\ezSP_Px.exe
    O4 - HKCU\..\Run: [MoneyAgent] "C:\Program Files\Microsoft Money\System\Money Express.exe"
    O4 - HKCU\..\Run: [MSMSGS] C:\Program Files\Messenger\msmsgs.exe /background
    O4 - HKCU\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
    O4 - HKCU\..\Run: [AIM] C:\PROGRA~1\NETSCAPE\COMMUN~1\PROGRAM\AIM\aim.exe -cnetwait.odl
    O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Microsoft Works Calendar Reminders.lnk = C:\Program Files\Common Files\Microsoft Shared\Works Shared\wkcalrem.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
    O4 - Global Startup: WinZip Quick Pick.lnk = C:\Program Files\WinZip\WZQKPICK.EXE
    O9 - Extra button: (no name) - {06FE5D02-8F11-11d2-804F-00105A133818} - http://search.presario.net/scripts/redirectors/presario/srchredir.dll?s=avlinksearch&c=2c00&LC=0409 (file missing)
    O9 - Extra 'Tools' menuitem: &Find Pages Linking to this URL - {06FE5D02-8F11-11d2-804F-00105A133818} - http://search.presario.net/scripts/redirectors/presario/srchredir.dll?s=avlinksearch&c=2c00&LC=0409 (file missing)
    O9 - Extra button: (no name) - {06FE5D03-8F11-11d2-804F-00105A133818} - http://search.presario.net/scripts/redirectors/presario/srchredir.dll?s=avhostsearch&c=2c00&LC=0409 (file missing)
    O9 - Extra 'Tools' menuitem: Find Other Pages on this &Host - {06FE5D03-8F11-11d2-804F-00105A133818} - http://search.presario.net/scripts/redirectors/presario/srchredir.dll?s=avhostsearch&c=2c00&LC=0409 (file missing)
    O9 - Extra button: (no name) - {06FE5D04-8F11-11d2-804F-00105A133818} - http://jump.altavista.com/avie5/home (file missing)
    O9 - Extra 'Tools' menuitem: AV Home - {06FE5D04-8F11-11d2-804F-00105A133818} - http://jump.altavista.com/avie5/home (file missing)
    O9 - Extra button: Translate - {06FE5D05-8F11-11d2-804F-00105A133818} - http://search.presario.net/scripts/redirectors/presario/srchredir.dll?s=avbabelfish&c=2c00&LC=0409 (file missing)
    O9 - Extra 'Tools' menuitem: AV &Translate - {06FE5D05-8F11-11d2-804F-00105A133818} - http://search.presario.net/scripts/redirectors/presario/srchredir.dll?s=avbabelfish&c=2c00&LC=0409 (file missing)
    O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\PROGRA~1\NETSCAPE\COMMUN~1\PROGRAM\AIM\aim.exe
    O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
    O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O11 - Options group: [INTERNATIONAL] International*
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
    O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    O23 - Service: Symantec Password Validation Service (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
    O23 - Service: Symantec Proxy Service (ccPxySvc) - Symantec Corporation - C:\Program Files\Norton Internet Security\ccPxySvc.exe
    O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido anti-malware\ewidoctrl.exe
    O23 - Service: Imapi Helper - Alex Feinman - C:\Program Files\Alex Feinman\ISO Recorder\ImapiHelper.exe
    O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
    O23 - Service: Norton Internet Security Accounts Manager (NISUM) - Symantec Corporation - C:\Program Files\Norton Internet Security\NISUM.EXE
    O23 - Service: PCTEL Speaker Phone (Pctspk) - PCtel, Inc. - C:\WINDOWS\system32\pctspk.exe
    O23 - Service: Sandra Data Service (SandraDataSrv) - SiSoftware - C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2005.SR3\RpcDataSrv.exe
    O23 - Service: Sandra Service (SandraTheSrv) - SiSoftware - C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2005.SR3\RpcSandraSrv.exe
    O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
    O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\PROGRA~1\COMMON~1\SONYSH~1\AVLib\Sptisrv.exe
    O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe

    ===============================

    Ewido Report:

    ---------------------------------------------------------
    ewido anti-malware - Scan report
    ---------------------------------------------------------

    + Created on: 7:00:30 PM, 6/11/2006
    + Report-Checksum: E7933504

    + Scan result:

    HKLM\SOFTWARE\Classes\WinRes.WindowsResources -> Adware.CoolWebSearch : Cleaned with backup
    HKLM\SOFTWARE\Classes\WinRes.WindowsResources\CLSID -> Adware.CoolWebSearch : Cleaned with backup
    HKLM\SOFTWARE\Classes\WinRes.WindowsResources\CurVer -> Adware.CoolWebSearch : Cleaned with backup
    HKLM\SOFTWARE\Classes\WinRes.WindowsResources.1 -> Adware.CoolWebSearch : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024 -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldA763.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld677C.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld26C3.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldCEFE.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld9207.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld5194.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldF943.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldB8BC.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld7C29.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld2175.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldE120.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldA053.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld4423.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld37E.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldC2B1.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld6569.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld2492.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldE3C5.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld8962.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld4999.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld99E.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldAED7.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldBA52.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld83BA.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld2C78.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldEEB8.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldB0C6.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld5BBF.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld1EDB.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldE631.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld99F7.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld5998.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld1907.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldD97A.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld9C0A.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld6201.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld9BB.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldC93E.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld8871.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld7CB8.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld4866.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldE67.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldB685.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld75D6.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld34FF.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld12D1.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldD77D.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld9700.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld46AB.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld931.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldC8E6.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld7A49.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld3C7F.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld1FE.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld55F1.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld1600.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldE67D.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld8234.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld5976.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld1E0F.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldC6A5.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld9D14.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld6384.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ld1216.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldD275.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\SYSTEM32\1024\ldAEFF.tmp -> Trojan.Small : Cleaned with backup
    C:\WINDOWS\TEMP\win17.tmp.exe -> Trojan.Dialer.oy : Cleaned with backup
    C:\WINDOWS\TEMP\win36.tmp.exe -> Trojan.Dialer.oy : Cleaned with backup
    C:\WINDOWS\TEMP\win3B.tmp.exe -> Trojan.Dialer.oy : Cleaned with backup
    C:\WINDOWS\TEMP\win44.tmp.exe -> Trojan.Dialer.oy : Cleaned with backup
    C:\WINDOWS\TEMP\winC5.tmp.exe -> Trojan.Dialer.oy : Cleaned with backup
    C:\WINDOWS\tsad.dll -> Adware.TimeSink : Cleaned with backup
    C:\!KillBox\wintss32.dll -> Trojan.Agent.vg : Cleaned with backup
    C:\!KillBox\winres.dll -> Downloader.IstBar.ff : Cleaned with backup
    C:\!KillBox\wintss32.dll( 1) -> Trojan.Agent.vg : Cleaned with backup
    C:\!KillBox\winres.dll( 2) -> Downloader.IstBar.ff : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\cliA.tmp -> Trojan.Agent.vg : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\Temporary Internet Files\Content.IE5\SLU3W92Z\srvjrs[1].exe -> Trojan.Dialer.oy : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\Cookies\default@questionmarket[1].txt -> TrackingCookie.Questionmarket : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\Cookies\default@tribalfusion[2].txt -> TrackingCookie.Tribalfusion : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\Cookies\default@edge.ru4[1].txt -> TrackingCookie.Ru4 : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\Cookies\default@advertising[2].txt -> TrackingCookie.Advertising : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\Cookies\default@com[1].txt -> TrackingCookie.Com : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\Cookies\default@fastclick[1].txt -> TrackingCookie.Fastclick : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\Cookies\default@as.casalemedia[1].txt -> TrackingCookie.Casalemedia : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\Cookies\default@entrepreneur.122.2o7[1].txt -> TrackingCookie.2o7 : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\Cookies\default@247realmedia[1].txt -> TrackingCookie.247realmedia : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\Cookies\default@perf.overture[1].txt -> TrackingCookie.Overture : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\Cookies\default@doubleclick[1].txt -> TrackingCookie.Doubleclick : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\Cookies\default@tacoda[2].txt -> TrackingCookie.Tacoda : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\Cookies\default@chrobinsonworldwide.122.2o7[1].txt -> TrackingCookie.2o7 : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\Cookies\default@casalemedia[2].txt -> TrackingCookie.Casalemedia : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\Cookies\default@ad.yieldmanager[1].txt -> TrackingCookie.Yieldmanager : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\Cookies\default@ads.pointroll[2].txt -> TrackingCookie.Pointroll : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\Cookies\default@atdmt[2].txt -> TrackingCookie.Atdmt : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\winE.tmp.exe -> Hijacker.Small : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\win14.tmp.exe -> Downloader.IstBar.eq : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\win18.tmp.exe -> Trojan.Dialer.oy : Cleaned with backup
    C:\Documents and Settings\Default\Local Settings\Temp\OA.exe -> Downloader.PurityScan.cq : Cleaned with backup
    C:\Documents and Settings\Default\Cookies\default@microsofteup.112.2o7[2].txt -> TrackingCookie.2o7 : Cleaned with backup
    C:\Documents and Settings\Default\Cookies\default@2o7[1].txt -> TrackingCookie.2o7 : Cleaned with backup
    C:\Documents and Settings\Default\Cookies\default@atdmt[2].txt -> TrackingCookie.Atdmt : Cleaned with backup
    C:\Documents and Settings\Default\Cookies\default@tribalfusion[2].txt -> TrackingCookie.Tribalfusion : Cleaned with backup
    C:\Documents and Settings\Default\Cookies\default@doubleclick[1].txt -> TrackingCookie.Doubleclick : Cleaned with backup
    C:\Documents and Settings\Default\Cookies\default@adtech[2].txt -> TrackingCookie.Adtech : Cleaned with backup
    C:\System Volume Information\_restore{2CA91544-95A7-46A5-85A6-02A1D9C3E6B2}\RP95\A0124681.exe -> Hijacker.Small : Cleaned with backup
    C:\System Volume Information\_restore{2CA91544-95A7-46A5-85A6-02A1D9C3E6B2}\RP95\A0124682.exe -> Trojan.Dialer.oy : Cleaned with backup
    C:\System Volume Information\_restore{2CA91544-95A7-46A5-85A6-02A1D9C3E6B2}\RP95\A0124690.exe -> Hijacker.Small.kx : Cleaned with backup
    C:\System Volume Information\_restore{2CA91544-95A7-46A5-85A6-02A1D9C3E6B2}\RP95\A0124694.exe -> Downloader.IstBar.eq : Cleaned with backup
    C:\System Volume Information\_restore{2CA91544-95A7-46A5-85A6-02A1D9C3E6B2}\RP95\A0124721.exe -> Trojan.Dialer.oy : Cleaned with backup
    C:\System Volume Information\_restore{2CA91544-95A7-46A5-85A6-02A1D9C3E6B2}\RP95\A0124722.exe -> Trojan.Dialer.oy : Cleaned with backup
    C:\System Volume Information\_restore{2CA91544-95A7-46A5-85A6-02A1D9C3E6B2}\RP95\A0124730.exe -> Trojan.Dialer.oy : Cleaned with backup
    C:\System Volume Information\_restore{2CA91544-95A7-46A5-85A6-02A1D9C3E6B2}\RP95\A0124732.exe -> Trojan.Dialer.oy : Cleaned with backup
    C:\System Volume Information\_restore{2CA91544-95A7-46A5-85A6-02A1D9C3E6B2}\RP95\A0124738.exe -> Downloader.PurityScan.cq : Cleaned with backup
    C:\System Volume Information\_restore{2CA91544-95A7-46A5-85A6-02A1D9C3E6B2}\RP95\A0124752.dll -> Downloader.IstBar.ff : Cleaned with backup
    C:\System Volume Information\_restore{2CA91544-95A7-46A5-85A6-02A1D9C3E6B2}\RP95\A0124753.dll -> Trojan.Agent.vg : Cleaned with backup
    D:\Documents and Settings\Chozo\Desktop\My Documents\CDraw_v2[1].1.1_PalmOS_Cracked_by_BLZPDA.zip/crack.exe/ist1.exe -> Downloader.IstBar.is : Cleaned with backup
    :mozilla.18:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Tribalfusion : Cleaned with backup
    :mozilla.19:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Tribalfusion : Cleaned with backup
    :mozilla.20:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Tribalfusion : Cleaned with backup
    :mozilla.21:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Atdmt : Cleaned with backup
    :mozilla.22:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Com : Cleaned with backup
    :mozilla.23:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Com : Cleaned with backup
    :mozilla.24:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Doubleclick : Cleaned with backup
    :mozilla.25:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Advertising : Cleaned with backup
    :mozilla.26:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Advertising : Cleaned with backup
    :mozilla.27:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Advertising : Cleaned with backup
    :mozilla.28:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Advertising : Cleaned with backup
    :mozilla.29:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Advertising : Cleaned with backup
    :mozilla.30:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.2o7 : Cleaned with backup
    :mozilla.31:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.2o7 : Cleaned with backup
    :mozilla.34:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Burstbeacon : Cleaned with backup
    :mozilla.35:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Burstnet : Cleaned with backup
    :mozilla.36:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Burstnet : Cleaned with backup
    :mozilla.39:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Yieldmanager : Cleaned with backup
    :mozilla.40:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Yieldmanager : Cleaned with backup
    :mozilla.43:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Adserver : Cleaned with backup
    :mozilla.44:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Adserver : Cleaned with backup
    :mozilla.50:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Falkag : Cleaned with backup
    :mozilla.53:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned with backup
    :mozilla.54:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned with backup
    :mozilla.55:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned with backup
    :mozilla.56:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned with backup
    :mozilla.57:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.fusk-access : Cleaned with backup
    :mozilla.58:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Spylog : Cleaned with backup
    :mozilla.59:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Xxxtoolbar : Cleaned with backup
    :mozilla.65:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Adtech : Cleaned with backup
    :mozilla.67:D:\Documents and Settings\Chozo\Application Data\Mozilla\Firefox\Profiles\lrb70vv5.default\cookies.txt -> TrackingCookie.Adtech : Cleaned with backup


    ::Report End

    ...I think I got it all :D. I haven't seen those pesky windows anymore, at least. My PC also sped up considerably after removal of the infected items. Thank you for your help and speedy reply.
     
  5. tapiiri

    tapiiri Regular member

    Joined:
    Jun 11, 2005
    Messages:
    1,142
    Likes Received:
    0
    Trophy Points:
    46
    Hi,

    Not yet, there'll be smitfraud too

    Download SmitfraudFix.zip to your desktop -> http://siri.urz.free.fr/Fix/SmitfraudFix.zip

    Unzip it (folder named SmitFraudFix) to your desktop:

    Open the folder SmitfraudFix and doubleclick smitfraudfix.cmd
    Choose option #1 - Search by typing 1 and pressing "Enter"; a textfile opens and lists the infected files (if those exist)

    Post the contents of this textfile to here.
    Post a fresh HijackThis log too,


    (Some antiviruses recognises process.exe as a malware. It is not malware, it is a program that stops processes)
     
  6. Stan64

    Stan64 Member

    Joined:
    Jun 11, 2006
    Messages:
    4
    Likes Received:
    0
    Trophy Points:
    11
    Got it.

    SmitFraudFix:
    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Default\Application Data


    »»»»»»»»»»»»»»»»»»»»»»»» Start Menu


    »»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\DEFAULT\FAVORI~1


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files


    »»»»»»»»»»»»»»»»»»»»»»»» Corrupted keys


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop Components

    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
    "Source"="About:Home"
    "SubscribedURL"="About:Home"
    "FriendlyName"="My Current Home Page"


    »»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    »»»»»»»»»»»»»»»»»»»»»»»» Scanning wininet.dll infection


    »»»»»»»»»»»»»»»»»»»»»»»» End

    and HjT:

    Logfile of HijackThis v1.99.1
    Scan saved at 10:33:27 PM, on 6/12/2006
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.5346.0005)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Norton Internet Security\NISUM.EXE
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\WINDOWS\system32\ezSP_Px.exe
    C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
    C:\PROGRA~1\NETSCAPE\COMMUN~1\PROGRAM\AIM\aim.exe
    C:\Program Files\MSN Messenger\msnmsgr.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Norton Internet Security\ccPxySvc.exe
    C:\Program Files\Norton AntiVirus\navapsvc.exe
    C:\Program Files\Common Files\Microsoft Shared\Works Shared\wkcalrem.exe
    C:\Program Files\WinZip\WZQKPICK.EXE
    C:\WINDOWS\system32\pctspk.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Google\Google Desktop Search\GoogleDesktopIndex.exe
    C:\Program Files\Google\Google Desktop Search\GoogleDesktopCrawl.exe
    C:\Program Files\mIRC\mirc.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\PROGRA~1\MOZILL~2\FIREFOX.EXE
    C:\Documents and Settings\Default\Desktop\Desktop\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.2020search.com/search/9884/search.html
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=54729
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=55245&clcid={SUB_CLCID}
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://www.2020search.com/search/9884/search.html
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O2 - BHO: (no name) - {60D3AAEB-AA39-4AE0-B2F9-E4AF0613A2A3} - C:\PROGRA~1\SPYWAR~1\POPUPA~1\ABG_PL~1.DLL
    O2 - BHO: IeCatch2 Class - {A5366673-E8CA-11D3-9CD9-0090271D075B} - C:\PROGRA~1\FLASHGET\jccatch.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
    O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
    O3 - Toolbar: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\fgiebar.dll
    O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
    O4 - HKLM\..\Run: [CPQEASYACC] C:\Program Files\Compaq\Easy Access Button Support\cpqeadm.exe
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
    O4 - HKLM\..\Run: [ccRegVfy] "C:\Program Files\Common Files\Symantec Shared\ccRegVfy.exe"
    O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
    O4 - HKLM\..\Run: [EPSON Stylus CX4600 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATI9AA.EXE /P26 "EPSON Stylus CX4600 Series" /O6 "USB001" /M "Stylus CX4600"
    O4 - HKLM\..\Run: [WinampAgent] C:\Program Files\Winamp\winampa.exe
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [ImageShackUtil] C:\Program Files\ImageShack\QuickShot\QuickShot.exe
    O4 - HKLM\..\Run: [ezShieldProtector for Px] C:\WINDOWS\system32\ezSP_Px.exe
    O4 - HKCU\..\Run: [MoneyAgent] "C:\Program Files\Microsoft Money\System\Money Express.exe"
    O4 - HKCU\..\Run: [MSMSGS] C:\Program Files\Messenger\msmsgs.exe /background
    O4 - HKCU\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
    O4 - HKCU\..\Run: [AIM] C:\PROGRA~1\NETSCAPE\COMMUN~1\PROGRAM\AIM\aim.exe -cnetwait.odl
    O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Microsoft Works Calendar Reminders.lnk = C:\Program Files\Common Files\Microsoft Shared\Works Shared\wkcalrem.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
    O4 - Global Startup: WinZip Quick Pick.lnk = C:\Program Files\WinZip\WZQKPICK.EXE
    O9 - Extra button: (no name) - {06FE5D02-8F11-11d2-804F-00105A133818} - http://search.presario.net/scripts/redirectors/presario/srchredir.dll?s=avlinksearch&c=2c00&LC=0409 (file missing)
    O9 - Extra 'Tools' menuitem: &Find Pages Linking to this URL - {06FE5D02-8F11-11d2-804F-00105A133818} - http://search.presario.net/scripts/redirectors/presario/srchredir.dll?s=avlinksearch&c=2c00&LC=0409 (file missing)
    O9 - Extra button: (no name) - {06FE5D03-8F11-11d2-804F-00105A133818} - http://search.presario.net/scripts/redirectors/presario/srchredir.dll?s=avhostsearch&c=2c00&LC=0409 (file missing)
    O9 - Extra 'Tools' menuitem: Find Other Pages on this &Host - {06FE5D03-8F11-11d2-804F-00105A133818} - http://search.presario.net/scripts/redirectors/presario/srchredir.dll?s=avhostsearch&c=2c00&LC=0409 (file missing)
    O9 - Extra button: (no name) - {06FE5D04-8F11-11d2-804F-00105A133818} - http://jump.altavista.com/avie5/home (file missing)
    O9 - Extra 'Tools' menuitem: AV Home - {06FE5D04-8F11-11d2-804F-00105A133818} - http://jump.altavista.com/avie5/home (file missing)
    O9 - Extra button: Translate - {06FE5D05-8F11-11d2-804F-00105A133818} - http://search.presario.net/scripts/redirectors/presario/srchredir.dll?s=avbabelfish&c=2c00&LC=0409 (file missing)
    O9 - Extra 'Tools' menuitem: AV &Translate - {06FE5D05-8F11-11d2-804F-00105A133818} - http://search.presario.net/scripts/redirectors/presario/srchredir.dll?s=avbabelfish&c=2c00&LC=0409 (file missing)
    O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\PROGRA~1\NETSCAPE\COMMUN~1\PROGRAM\AIM\aim.exe
    O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
    O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O11 - Options group: [INTERNATIONAL] International*
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
    O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    O23 - Service: Symantec Password Validation Service (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
    O23 - Service: Symantec Proxy Service (ccPxySvc) - Symantec Corporation - C:\Program Files\Norton Internet Security\ccPxySvc.exe
    O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido anti-malware\ewidoctrl.exe
    O23 - Service: Imapi Helper - Alex Feinman - C:\Program Files\Alex Feinman\ISO Recorder\ImapiHelper.exe
    O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
    O23 - Service: Norton Internet Security Accounts Manager (NISUM) - Symantec Corporation - C:\Program Files\Norton Internet Security\NISUM.EXE
    O23 - Service: PCTEL Speaker Phone (Pctspk) - PCtel, Inc. - C:\WINDOWS\system32\pctspk.exe
    O23 - Service: Sandra Data Service (SandraDataSrv) - SiSoftware - C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2005.SR3\RpcDataSrv.exe
    O23 - Service: Sandra Service (SandraTheSrv) - SiSoftware - C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2005.SR3\RpcSandraSrv.exe
    O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
    O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\PROGRA~1\COMMON~1\SONYSH~1\AVLib\Sptisrv.exe
    O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe

     
  7. tapiiri

    tapiiri Regular member

    Joined:
    Jun 11, 2005
    Messages:
    1,142
    Likes Received:
    0
    Trophy Points:
    46

Share This Page