First of all, thank you SO MUCH for helping me out. There's no way I would've been able to do this on my own. Now, here's all the information you asked for:
----------
Logfile of HijackThis v1.99.1
Scan saved at 12:13:27 AM, on 4/28/2005
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 (6.00.2600.0000)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Sygate\SPF\smc.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\Program Files\Ahead\InCD\InCDsrv.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\Program Files\Java\j2re1.4.2_05\bin\jusched.exe
C:\PROGRA~1\AWS\WEATHE~1\WEATHER.EXE
C:\PROGRA~1\PANICW~1\POP-UP~1\PSFREE.EXE
C:\WINDOWS\System32\wuauclt.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Documents and Settings\User1\Desktop\HijackThis.exe
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [MS Updates] C:\Documents and Settings\User1\Local Settings\Temporary Internet Files\Content.IE5\OB9FUMRT\mscache[1].exe
O4 - HKLM\..\Run: [SmcService] C:\PROGRA~1\Sygate\SPF\smc.exe -startgui
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_05\bin\jusched.exe
O4 - HKCU\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe
O4 - HKCU\..\Run: [Weather] C:\PROGRA~1\AWS\WEATHE~1\WEATHER.EXE 1
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [PopUpStopperFreeEdition] "C:\PROGRA~1\PANICW~1\POP-UP~1\PSFREE.EXE"
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: WeatherBug - {AF6CABAB-61F9-4f12-A198-B7D41EF1CB52} - C:\PROGRA~1\AWS\WEATHE~1\Weather.exe (HKCU)
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} -
http://a1408.g.akamai.net/7/1408/9955/2003...iTunesSetup.exeO16 - DPF: {917623D1-D8E5-11D2-BE8B-00104B06BDE3} (CamImage Class) -
http://67.89.107.171/activex/AxisCamControl.ocxO23 - Service: AVP Control Centre Service (AVPCC) - Unknown owner - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus\avpcc.exe" /Service (file missing)
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: InCD File System Service (InCDsrv) - AHEAD Software - C:\Program Files\Ahead\InCD\InCDsrv.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Sygate Personal Firewall Pro (SmcService) - Sygate Technologies, Inc. - C:\Program Files\Sygate\SPF\smc.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
----------
Scanned at: 9:56:06 PM on: 4/27/2005
-- Scan 1 ---------------------------
About:Buster Version 4.0
Reference List : 26
ADS not scanned System(FAT)
Removed 4 Random Key Entries
Removed! : C:\WINDOWS\System32\clijj.dat
Attempted Clean Of Temp folder.
Removed Uninstall Key (HSA)
Removed Uninstall Key (SE)
Removed Uninstall Key (SW)
Pages Reset... Done!
-- Scan 2 ---------------------------
About:Buster Version 4.0
Reference List : 26
ADS not scanned System(FAT)
Attempted Clean Of Temp folder.
Removed Uninstall Key (HSA)
Removed Uninstall Key (SE)
Removed Uninstall Key (SW)
Pages Reset... Done!
-- Scan 3 ---------------------------
About:Buster Version 4.0
Reference List : 26
ADS not scanned System(FAT)
Attempted Clean Of Temp folder.
Removed Uninstall Key (HSA)
Removed Uninstall Key (SE)
Removed Uninstall Key (SW)
Pages Reset... Done!
----------
---------------------------------------------------------
ewido security suite - Scan report
---------------------------------------------------------
+ Created on: 12:01:03 AM, 4/28/2005
+ Report-Checksum: E84FD2C7
+ Date of database: 4/28/2005
+ Version of scan engine: v3.0
+ Duration: 91 min
+ Scanned Files: 77587
+ Speed: 14.19 Files/Second
+ Infected files: 57
+ Removed files: 57
+ Files put in quarantine: 57
+ Files that could not be opened: 0
+ Files that could not be cleaned: 0
+ Binder: Yes
+ Crypter: Yes
+ Archives: Yes
+ Scanned items:
C:\
+ Scan result:
C:\WINDOWS\system32\rtneg.dll -> Spyware.HotSearchBar.d -> Cleaned with backup
C:\WINDOWS\system32\epedach.exe -> Trojan.Agent.cp -> Cleaned with backup
C:\WINDOWS\system32\pfwjg.dll -> Spyware.Hijacker.Generic -> Cleaned with backup
C:\WINDOWS\system32\elugw.dll -> Spyware.Hijacker.Generic -> Cleaned with backup
C:\WINDOWS\system32\msyh.exe -> Trojan.Agent.bi -> Cleaned with backup
C:\WINDOWS\system32\d3qd32.exe -> Trojan.Agent.bi -> Cleaned with backup
C:\WINDOWS\system32\crye.exe -> Trojan.Agent.bi -> Cleaned with backup
C:\WINDOWS\system32\mspl.exe -> TrojanDownloader.Agent.bq -> Cleaned with backup
C:\WINDOWS\system32\sdkqi.exe -> Trojan.Agent.bi -> Cleaned with backup
C:\WINDOWS\system32\sysms32.exe -> Trojan.Agent.bi -> Cleaned with backup
C:\WINDOWS\system32\crom32.exe -> TrojanDownloader.Agent.bq -> Cleaned with backup
C:\WINDOWS\system32\flswm.dll -> Spyware.Hijacker.Generic -> Cleaned with backup
C:\WINDOWS\chqwfz.dat -> TrojanDownloader.Agent.bq -> Cleaned with backup
C:\WINDOWS\wzgjat.dat -> Trojan.Agent.bi -> Cleaned with backup
C:\WINDOWS\iopgzt.exe -> Spyware.BetterInternet -> Cleaned with backup
C:\WINDOWS\dcolcv.txt -> TrojanDownloader.Agent.bq -> Cleaned with backup
C:\WINDOWS\msmsgrxp.exe -> TrojanDownloader.Small.ahg -> Cleaned with backup
C:\WINDOWS\Bolger.dll -> Spyware.BetterInternet -> Cleaned with backup
C:\WINDOWS\yngzrjb.exe -> Spyware.BetterInternet -> Cleaned with backup
C:\WINDOWS\siqbqf.exe -> Spyware.BetterInternet -> Cleaned with backup
C:\WINDOWS\utfkzaq.exe -> Spyware.BetterInternet -> Cleaned with backup
C:\WINDOWS\vlyiwo.log -> Trojan.Agent.bi -> Cleaned with backup
C:\WINDOWS\lmfeqe.dat -> Trojan.Agent.bi -> Cleaned with backup
C:\WINDOWS\coanzb.dat -> TrojanDownloader.Agent.bq -> Cleaned with backup
C:\WINDOWS\mdpxmy.dat -> Trojan.Agent.bi -> Cleaned with backup
C:\WINDOWS\eeicgi.txt -> TrojanDownloader.Agent.bq -> Cleaned with backup
C:\WINDOWS\dazyvd.log -> Spyware.Hijacker.Generic -> Cleaned with backup
C:\WINDOWS\whbbxr.txt -> Trojan.Agent.bi -> Cleaned with backup
C:\WINDOWS\oitgrb.txt -> TrojanDownloader.Agent.bq -> Cleaned with backup
C:\WINDOWS\zadxde.txt -> Spyware.Hijacker.Generic -> Cleaned with backup
C:\WINDOWS\okdgta.txt -> Spyware.Hijacker.Generic -> Cleaned with backup
C:\WINDOWS\atlxg.exe -> Trojan.Agent.bi -> Cleaned with backup
C:\Documents and Settings\User1\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\Dummy.class-4f7a6e50-446f20e3.class -> Trojan.ClassLoader.Dummy.d -> Cleaned with backup
C:\Documents and Settings\User1\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\SecurityClassLoader.class-7c728-3213fa52.class -> TrojanDownloader.Small.WV -> Cleaned with backup
C:\Documents and Settings\User1\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\Dummy.class-28c909f1-20215239.class -> Trojan.Nocheat -> Cleaned with backup
C:\Documents and Settings\User1\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\ok.class-377e0ae3-39577079.class -> Trojan.Nocheat -> Cleaned with backup
C:\Documents and Settings\User1\Application Data\Mercora\MercoraClient\Data\MyPictures.dat -> Spyware.Grokster -> Cleaned with backup
C:\ntdetect.hta -> TrojanDropper.Inor.cj -> Cleaned with backup
C:\System Volume Information\_restore{9DA66DEB-9002-4693-9976-C5F2190E5587}\RP568\snapshot\MFEX-1.DAT -> Spyware.HotSearchBar.d -> Cleaned with backup
C:\System Volume Information\_restore{9DA66DEB-9002-4693-9976-C5F2190E5587}\RP568\snapshot\MFEX-2.DAT -> Spyware.HotSearchBar.d -> Cleaned with backup
C:\System Volume Information\_restore{9DA66DEB-9002-4693-9976-C5F2190E5587}\RP568\A0363593.dll -> Spyware.HotSearchBar.d -> Cleaned with backup
C:\System Volume Information\_restore{9DA66DEB-9002-4693-9976-C5F2190E5587}\RP568\A0363597.exe -> Trojan.Agent.cp -> Cleaned with backup
C:\System Volume Information\_restore{9DA66DEB-9002-4693-9976-C5F2190E5587}\RP568\A0363638.exe -> Trojan.Agent.cp -> Cleaned with backup
C:\System Volume Information\_restore{9DA66DEB-9002-4693-9976-C5F2190E5587}\RP568\A0363647.exe -> Trojan.Stervis.b -> Cleaned with backup
C:\System Volume Information\_restore{9DA66DEB-9002-4693-9976-C5F2190E5587}\RP568\A0363648.DLL -> Spyware.HotSearchBar.d -> Cleaned with backup
C:\System Volume Information\_restore{9DA66DEB-9002-4693-9976-C5F2190E5587}\RP569\snapshot\MFEX-1.DAT -> Spyware.HotSearchBar.d -> Cleaned with backup
C:\System Volume Information\_restore{9DA66DEB-9002-4693-9976-C5F2190E5587}\RP579\A0366301.exe -> Trojan.Agent.bi -> Cleaned with backup
C:\System Volume Information\_restore{9DA66DEB-9002-4693-9976-C5F2190E5587}\RP579\A0366302.exe -> Trojan.Nail -> Cleaned with backup
C:\System Volume Information\_restore{9DA66DEB-9002-4693-9976-C5F2190E5587}\RP579\A0366305.exe -> TrojanDownloader.Agent.bq -> Cleaned with backup
C:\System Volume Information\_restore{9DA66DEB-9002-4693-9976-C5F2190E5587}\RP579\A0366308.exe -> TrojanDownloader.Agent.bq -> Cleaned with backup
C:\System Volume Information\_restore{9DA66DEB-9002-4693-9976-C5F2190E5587}\RP579\A0366310.exe -> TrojanDownloader.Agent.bq -> Cleaned with backup
C:\System Volume Information\_restore{9DA66DEB-9002-4693-9976-C5F2190E5587}\RP579\A0366311.exe -> TrojanDownloader.Agent.bq -> Cleaned with backup
C:\System Volume Information\_restore{9DA66DEB-9002-4693-9976-C5F2190E5587}\RP579\A0366312.dll -> Spyware.Hijacker.Generic -> Cleaned with backup
C:\System Volume Information\_restore{9DA66DEB-9002-4693-9976-C5F2190E5587}\RP579\A0366315.dll -> Trojan.Agent.db -> Cleaned with backup
C:\System Volume Information\_restore{9DA66DEB-9002-4693-9976-C5F2190E5587}\RP579\A0366320.exe -> Trojan.Feat.2 -> Cleaned with backup
C:\System Volume Information\_restore{9DA66DEB-9002-4693-9976-C5F2190E5587}\RP580\A0366352.exe -> Trojan.Stervis.b -> Cleaned with backup
C:\System Volume Information\_restore{9DA66DEB-9002-4693-9976-C5F2190E5587}\RP580\A0366533.exe -> TrojanDownloader.Agent.bq -> Cleaned with backup
::Report End
----------
# Copyright © 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
127.0.0.1 localhost
----------
Microsoft Windows XP [Version 5.1.2600]
The current date is: Thu 04/28/2005
PLEASE NOTE THAT ALL FILES FOUND BY THIS METHOD ARE NOT BAD FILES, THERE MIGHT BE LEGIT FILES LISTED AND PLEASE BE CAREFUL WHILE FIXING. IF YOU ARE UNSURE OF WHAT IT IS LEAVE THEM ALONE.
»»»»»»»»»»»»»»»»»»»»»»»» Todo Files found »»»»»»»»»»»»»»»»»»»»»»»»»»»»»
»»»»»»»»»»»»»»»»»»»»»»»» aurora Files found »»»»»»»»»»»»»»»»»»»»»»»»»»»
»»»»»»»»»»»»»»»»»»»»»»»» Suspect's »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
Dont delete file's in the section without guidance
If any doubt back them up first
»»»»» lagitamate file's can/will show in this section.
»»»»»»»»»»»»»»»»»»»»»»»» Buddy file's »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
»»»»»»»»»»»»»»»»»»»»»»»» SAHAgent Files found »»»»»»»»»»»»»»»»»»»»»»»»»
»»»»»»»»»»»»»»»»»»»»»»»» Misc checks »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
»»»»» Checking Windir\svcproc.exe and nail.exe.
»»»»» Checking for System32\DrPMon.dll.
»»»»» Check for Windows\SYSTEM32\cache32_rtneg* folder.
Volume in drive C is HP_PAVILION
Volume Serial Number is 3226-1CD8
Directory of C:\WINDOWS\SYSTEM32
04/13/2005 10:24 PM <DIR> cache32_rtneg
0 File(s) 0 bytes
1 Dir(s) 6,712,721,408 bytes free
»»»»» Checking for SAHAgent ico files.
Volume in drive C is HP_PAVILION
Volume Serial Number is 3226-1CD8
Directory of C:\WINDOWS\system32
04/14/2005 12:30 AM 4,286 greenmovie2313asaadsasfad112341231adsfa.ico
04/14/2005 12:30 AM 4,286 mp3red51aads.ico
04/14/2005 12:30 AM 3,262 bingo_big2.ico
04/14/2005 12:30 AM 3,262 popupkiller2asdf1.ico
04/14/2005 12:30 AM 3,262 kas pink1233aadsfa12.ico
5 File(s) 18,358 bytes
0 Dir(s) 6,712,721,408 bytes free
»»»»»»»»»»»»»»»»»»»»»»»».
! REG.EXE VERSION 3.0
HKEY_CURRENT_USER\Software\Bolger
! REG.EXE VERSION 3.0
HKEY_CLASSES_ROOT\BolgerDll.BolgerDllObj
<NO NAME> REG_SZ Bolger Functional Class
! REG.EXE VERSION 3.0
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\Monitors\ZepMon
Driver REG_SZ DrPMon.dll
! REG.EXE VERSION 3.0
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\ZepMon
Driver REG_SZ DrPMon.dll
----------
Here's to hoping that I'm all clean. Thanks again for all your help! Oh, and no, I don't have Spybot 1.3 installed. Should I?