Author Topic: Adware infection - svchost???  (Read 721 times)

Offline nunya53

  • Jr. Member
  • **
  • Posts: 50
  • Karma: +0/-0
    • View Profile
Adware infection - svchost???
« on: December 04, 2005, 10:02:29 AM »
Managed to pick up some new adware on the internet.  Looks like it might be associated with svchost?

In any case, I am getting pop-ups.  Any help is appreciated.

Here is the HiJackthis log....



Logfile of HijackThis v1.99.1
Scan saved at 8:54:59 AM, on 12/4/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\ACS.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
C:\Program Files\TOSHIBA\Power Management\CePMTray.exe
C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\Program Files\EzButton\EzButton.EXE
C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
C:\WINDOWS\SM1BG.EXE
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\USBToolbox\Res.EXE
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\PROGRA~1\Ahead\Ahead\data\Xtras\mssysmgr.exe
C:\Program Files\tunebite\tunebite.exe
C:\WINDOWS\system32\drivers\CDAC11BA.EXE
C:\Program Files\Toshiba\Power Management\CeEPwrSvc.exe
C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\WINDOWS\system32\DVDRAMSV.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
C:\WINDOWS\system32\svchost.exe
c:\Toshiba\Ivp\Swupdate\swupdtmr.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\WINDOWS\system32\wuauclt.exe
C:\DOCUME~1\user\LOCALS~1\Temp\Temporary Directory 6 for hijackthis.zip\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://toshibadirect.com/
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: ATLDistrib Object - {3FE36807-69ED-45D1-B9BE-85C0E3F75B6A} - C:\WINDOWS\system32\gebcc.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [CeEKEY] C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
O4 - HKLM\..\Run: [CeEPOWER] C:\Program Files\TOSHIBA\Power Management\CePMTray.exe
O4 - HKLM\..\Run: [TPNF] C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
O4 - HKLM\..\Run: [EzButton] C:\Program Files\EzButton\EzButton.EXE
O4 - HKLM\..\Run: [PadTouch] C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
O4 - HKLM\..\Run: [Notebook Maximizer] C:\Program Files\Notebook Maximizer\maximizer_startup.exe
O4 - HKLM\..\Run: [SM1BG] C:\WINDOWS\SM1BG.EXE
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [USB Storage Toolbox] C:\Program Files\USBToolbox\Res.EXE
O4 - HKLM\..\Run: [CloneCDElbyCDFL] "C:\Program Files\Elaborate Bytes\CloneCD\ElbyCheck.exe" /L ElbyCDFL
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
O4 - HKLM\..\Run: [masqform.exe] C:\Program Files\PureEdge\Viewer 6.0\masqform.exe -UpdateCurrentUser
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [PhotoShow Deluxe Media Manager] C:\PROGRA~1\Ahead\Ahead\data\Xtras\mssysmgr.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [tunebite.exe] C:\Program Files\tunebite\tunebite.exe
O4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_05\bin\npjpi142_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_05\bin\npjpi142_05.dll
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O14 - IERESET.INF: START_PAGE_URL=http://www.toshiba.com
O16 - DPF: {A93D84FD-641F-43AE-B963-E6FA84BE7FE7} (LinkSys Content Update) - http://www.linksysfix.com/check/netset/install/gtdownls.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMesse...pDownloader.cab
O16 - DPF: {DBA230D1-8467-4e69-987E-5FAE815A3B45} -
O20 - Winlogon Notify: gebcc - C:\WINDOWS\system32\gebcc.dll
O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\system32\ACS.exe
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: C-DillaCdaC11BA - C-Dilla Ltd - C:\WINDOWS\system32\drivers\CDAC11BA.EXE
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: CeEPwrSvc - COMPAL ELECTRONIC INC. - C:\Program Files\Toshiba\Power Management\CeEPwrSvc.exe
O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
O23 - Service: DVD-RAM_Service - Matsu[censored]a Electric Industrial Co., Ltd. - C:\WINDOWS\system32\DVDRAMSV.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: Norton AntiVirus Auto-Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: Norton AntiVirus Firewall Monitor Service (NPFMntor) - Symantec Corporation - C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Swupdtmr - Unknown owner - c:\Toshiba\Ivp\Swupdate\swupdtmr.exe
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe

Offline guestolo

  • Site Donator
  • Administrator
  • Hero Member
  • *****
  • Posts: 16034
  • Karma: +1/-0
    • View Profile
    • http://
Adware infection - svchost???
« Reply #1 on: December 04, 2005, 10:27:10 AM »
looks like you picked up a newer Vundo infection
We'll deal with it in a bit

Can you do the following for me please

==Download and save WinPFind.zip
UNZIP the contents to your desktop
Don't run it yet

RESTART your Computer in SAFE MODE
You can do this by tapping the F8 key as the system is restarting, just before Windows loads
Choose Safe mode from the startup menu

Open the WinPFind folder you extracted to desktop
Double click on WinPFind.exe
Click START SCAN
This could take some time as it will scan your drive
Close out after

Restart back to Normal mode
Post the results of the WindPFind.txt located in the WinPFind folder

Can you also redownload Hijackthis from my signature below and save it too a permanent folder on your harddrive
Only run Hijackthis from this new location
And then post a fresh log please

Could you also let me know if you still have Windows CleanUp! 4.0 installed
I don't want you too run it yet, just checking to see if you have it

Do you want to post your own logs from FRST?

Follow the instructions posted http://www.thetechguide.com/forum/index.php/topic/22942-please-read-how-to-post-logs-from-frst/\'>Click Here


Offline nunya53

  • Jr. Member
  • **
  • Posts: 50
  • Karma: +0/-0
    • View Profile
Adware infection - svchost???
« Reply #2 on: December 04, 2005, 11:15:38 AM »
Guestolo,

Thanks for your help...again.  Yes, I still have Windows Cleanup 4.0 installed.


Here is the WinPFind log:



WARNING: not all files found by this scanner are bad. Consult with a knowledgable person before proceeding.

If you see a message in the titlebar saying "Not responding..." you can ignore it. Windows somethimes displays this message due to the high volume of disk I/O. As long as the hard disk light is flashing, the program is still working properly.

»»»»»»»»»»»»»»»»» Windows OS and Versions »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
Product Name: Microsoft Windows XP    Current Build: Service Pack 2    Current Build Number: 2600
Internet Explorer Version: 6.0.2900.2180

»»»»»»»»»»»»»»»»» Checking Selected Standard Folders »»»»»»»»»»»»»»»»»»»»

Checking %SystemDrive% folder...

Checking %ProgramFilesDir% folder...

Checking %WinDir% folder...

Checking %System% folder...
PEC2                 8/4/2004 6:00:00 AM         41397      C:\WINDOWS\SYSTEM32\dfrg.msc
PTech                7/12/2005 5:04:22 PM        520456     C:\WINDOWS\SYSTEM32\LegitCheckControl.dll
PECompact2           11/1/2005 11:34:18 PM       2368864    C:\WINDOWS\SYSTEM32\MRT.exe
aspack               11/1/2005 11:34:18 PM       2368864    C:\WINDOWS\SYSTEM32\MRT.exe
PTech                10/18/2005 11:00:10 PM      932832     C:\WINDOWS\SYSTEM32\NewYcznrzu.xml
PTech                10/18/2005 11:00:14 PM      755734     C:\WINDOWS\SYSTEM32\NewYcznrzu1.xml
aspack               8/4/2004 6:00:00 AM         708096     C:\WINDOWS\SYSTEM32\ntdll.dll
Umonitor             8/4/2004 6:00:00 AM         657920     C:\WINDOWS\SYSTEM32\rasdlg.dll
winsync              8/4/2004 6:00:00 AM         1309184    C:\WINDOWS\SYSTEM32\wbdbase.deu

Checking %System%\Drivers folder and sub-folders...

Items found in C:\WINDOWS\SYSTEM32\drivers\etc\hosts


Checking the Windows folder and sub-folders for system and hidden files within the last 60 days...
                     12/4/2005 9:48:46 AM      S 2048       C:\WINDOWS\bootstat.dat
                     11/7/2005 6:53:58 PM     H  24         C:\WINDOWS\ptJtd
                     11/30/2005 10:23:38 AM   H  54156      C:\WINDOWS\QTFont.qfn
                     12/3/2005 10:47:42 PM    HS 298984     C:\WINDOWS\system32\ccbeg.bak2
                     12/4/2005 9:58:00 AM     HS 297688     C:\WINDOWS\system32\ccbeg.ini
                     12/3/2005 10:47:08 AM    HS 557108     C:\WINDOWS\system32\gebcc.dll
                     10/5/2005 8:33:38 PM      S 12849      C:\WINDOWS\system32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\KB896424.cat
                     12/4/2005 9:48:34 AM     H  8192       C:\WINDOWS\system32\config\default.LOG
                     12/4/2005 9:49:18 AM     H  1024       C:\WINDOWS\system32\config\SAM.LOG
                     12/4/2005 9:48:48 AM     H  16384      C:\WINDOWS\system32\config\SECURITY.LOG
                     12/4/2005 9:56:14 AM     H  1024       C:\WINDOWS\system32\config\software.LOG
                     12/4/2005 9:49:24 AM     H  1024       C:\WINDOWS\system32\config\system.LOG
                     11/10/2005 7:03:06 AM    H  1024       C:\WINDOWS\system32\config\systemprofile\NTUSER.DAT.LOG
                     12/3/2005 1:22:04 PM     HS 67         C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\01234567\desktop.ini
                     12/3/2005 1:22:04 PM     HS 67         C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\89ABCDEF\desktop.ini
                     12/3/2005 1:22:04 PM     HS 67         C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\M8F3IU58\desktop.ini
                     12/3/2005 1:22:04 PM     HS 67         C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\VPUW6QSV\desktop.ini
                     11/26/2005 8:25:30 AM    HS 388        C:\WINDOWS\system32\Microsoft\Protect\S-1-5-18\User\2d65c332-7cf6-4e8a-8635-669e65085ff6
                     11/26/2005 8:25:30 AM    HS 24         C:\WINDOWS\system32\Microsoft\Protect\S-1-5-18\User\Preferred
                     12/4/2005 9:47:00 AM     H  6          C:\WINDOWS\Tasks\SA.DAT

Checking for CPL files...
Microsoft Corporation          8/4/2004 6:00:00 AM         68608      C:\WINDOWS\SYSTEM32\access.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         549888     C:\WINDOWS\SYSTEM32\appwiz.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         110592     C:\WINDOWS\SYSTEM32\bthprops.cpl
COMPAL ELECTRONIC INC.         8/19/2004 7:46:34 PM        917504     C:\WINDOWS\SYSTEM32\CoPM.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         135168     C:\WINDOWS\SYSTEM32\desk.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         80384      C:\WINDOWS\SYSTEM32\firewall.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         155136     C:\WINDOWS\SYSTEM32\hdwwiz.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         358400     C:\WINDOWS\SYSTEM32\inetcpl.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         129536     C:\WINDOWS\SYSTEM32\intl.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         380416     C:\WINDOWS\SYSTEM32\irprops.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         68608      C:\WINDOWS\SYSTEM32\joy.cpl
Sun Microsystems               8/13/2004 11:54:10 AM       61555      C:\WINDOWS\SYSTEM32\jpicpl32.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         187904     C:\WINDOWS\SYSTEM32\main.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         618496     C:\WINDOWS\SYSTEM32\mmsys.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         35840      C:\WINDOWS\SYSTEM32\ncpa.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         25600      C:\WINDOWS\SYSTEM32\netsetup.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         257024     C:\WINDOWS\SYSTEM32\nusrmgr.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         32768      C:\WINDOWS\SYSTEM32\odbccp32.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         114688     C:\WINDOWS\SYSTEM32\powercfg.cpl
RealNetworks, Inc.             8/10/2004 3:42:28 PM        24576      C:\WINDOWS\SYSTEM32\prefscpl.cpl
Apple Computer, Inc.           1/6/2004 5:02:36 PM         323072     C:\WINDOWS\SYSTEM32\QuickTime.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         298496     C:\WINDOWS\SYSTEM32\sysdm.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         28160      C:\WINDOWS\SYSTEM32\telephon.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         94208      C:\WINDOWS\SYSTEM32\timedate.cpl
                               9/5/2003 2:36:40 PM         495616     C:\WINDOWS\SYSTEM32\TOSCDSPD.cpl
Microsoft Corporation          8/4/2004 6:00:00 AM         148480     C:\WINDOWS\SYSTEM32\wscui.cpl
Microsoft Corporation          5/26/2005 3:16:30 AM        174360     C:\WINDOWS\SYSTEM32\wuaucpl.cpl
Microsoft Corporation          5/26/2005 3:16:30 AM        174360     C:\WINDOWS\SYSTEM32\dllcache\wuaucpl.cpl

»»»»»»»»»»»»»»»»» Checking Selected Startup Folders »»»»»»»»»»»»»»»»»»»»»

Checking files in %ALLUSERSPROFILE%\Startup folder...
                     2/14/2005 11:19:00 AM       1824       C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Acrobat Assistant.lnk
                     11/25/2004 12:40:46 PM      986        C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Adobe Gamma Loader.lnk
                     8/9/2004 6:08:36 PM      HS 84         C:\Documents and Settings\All Users\Start Menu\Programs\Startup\desktop.ini
                     11/25/2004 11:59:32 AM      1730       C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Microsoft Office.lnk

Checking files in %ALLUSERSPROFILE%\Application Data folder...
                     8/9/2004 10:59:06 AM     HS 62         C:\Documents and Settings\All Users\Application Data\desktop.ini

Checking files in %USERPROFILE%\Startup folder...
                     8/9/2004 6:08:36 PM      HS 84         C:\Documents and Settings\user\Start Menu\Programs\Startup\desktop.ini

Checking files in %USERPROFILE%\Application Data folder...
                     8/9/2004 10:59:06 AM     HS 62         C:\Documents and Settings\user\Application Data\desktop.ini
                     11/25/2004 12:51:26 PM      0          C:\Documents and Settings\user\Application Data\dm.ini
                     3/20/2005 3:08:42 PM        32968      C:\Documents and Settings\user\Application Data\GDIPFONTCACHEV1.DAT

»»»»»»»»»»»»»»»»» Checking Selected Registry Keys »»»»»»»»»»»»»»»»»»»»»»»

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
   SV1    =

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]

[HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers]
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\Adobe.Acrobat.ContextMenu
   {D25B2CAB-8A9A-4517-A9B2-CB5F68A5A802}    = C:\Program Files\Adobe\Acrobat 6.0\Acrobat Elements\ContextMenu.dll
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\Offline Files
   {750fdf0e-2a26-11d1-a3ea-080036587f03}    = %SystemRoot%\System32\cscui.dll
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\Open With
   {09799AFB-AD67-11d1-ABCD-00C04FC30936}    = %SystemRoot%\system32\SHELL32.dll
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\Open With EncryptionMenu
   {A470F8CF-A1E8-4f65-8335-227475AA5C46}    = %SystemRoot%\system32\SHELL32.dll
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\Symantec.Norton.Antivirus.IEContextMenu
   {5345A4D5-41EB-4A2F-9616-CE1D4F6C35B2}    = C:\Program Files\Norton AntiVirus\NavShExt.dll
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\{8C504614-A455-4CBA-81B4-D279644B8A7D}
       = tfaxext.dll
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\{a2a9545d-a0c2-42b4-9708-a0b2badd77c8}
   Start Menu Pin    = %SystemRoot%\system32\SHELL32.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers]
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\Symantec.Norton.Antivirus.IEContextMenu
   {5345A4D5-41EB-4A2F-9616-CE1D4F6C35B2}    = C:\Program Files\Norton AntiVirus\NavShExt.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers]
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\EncryptionMenu
   {A470F8CF-A1E8-4f65-8335-227475AA5C46}    = %SystemRoot%\system32\SHELL32.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\Offline Files
   {750fdf0e-2a26-11d1-a3ea-080036587f03}    = %SystemRoot%\System32\cscui.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\Sharing
   {f81e9010-6ea4-11ce-a7ff-00aa003ca9f6}    = ntshrui.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\ColumnHandlers]
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\ColumnHandlers\{0D2E74C4-3C34-11d2-A27E-00C04FC30871}
    = %SystemRoot%\system32\SHELL32.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\ColumnHandlers\{24F14F01-7B1C-11d1-838f-0000F80461CF}
    = %SystemRoot%\system32\SHELL32.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\ColumnHandlers\{24F14F02-7B1C-11d1-838f-0000F80461CF}
    = %SystemRoot%\system32\SHELL32.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\ColumnHandlers\{66742402-F9B9-11D1-A202-0000F81FEDEE}
    = %SystemRoot%\system32\SHELL32.dll

[HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects]
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{06849E9F-C8D7-4D59-B87D-784B7D6BE0B3}
   AcroIEHlprObj Class = C:\Program Files\Adobe\Acrobat 6.0\Acrobat\ActiveX\AcroIEHelper.dll
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3FE36807-69ED-45D1-B9BE-85C0E3F75B6A}
   ATLDistrib Object = C:\WINDOWS\system32\gebcc.dll
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{53707962-6F74-2D53-2644-206D7942484F}
    = C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AE7CD045-E861-484f-8273-0445EE161910}
   AcroIEToolbarHelper Class = C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BDF3E430-B101-42AD-A544-FADC6B084872}
   CNavExtBho Class = C:\Program Files\Norton AntiVirus\NavShExt.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{182EC0BE-5110-49C8-A062-BEB1D02A220B}
   Adobe PDF = C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{4D5C8C25-D075-11d0-B416-00C04FB90376}
   &Tip of the Day = %SystemRoot%\system32\shdocvw.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{FE54FA40-D68C-11d2-98FA-00C0F0318AFE}
   Real.com = C:\WINDOWS\system32\Shdocvw.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ToolBar]
   {47833539-D0C5-4125-9FA8-0819E2EAAC93}    = Adobe PDF   : C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
   {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6}    = Norton AntiVirus   : C:\Program Files\Norton AntiVirus\NavShExt.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\CmdMapping
   MenuText    =    :
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{08B0E5C0-4FCB-11CF-AAA5-00401C608501}
   MenuText    = Sun Java Console   :
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{CD67F990-D8E9-11d2-98FE-00C0F0318AFE}
   ButtonText    = Real.com   :

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Explorer Bars]
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Explorer Bars\{EFA24E64-B078-11D0-89E4-00C04FC9E26E}
   Explorer Band = %SystemRoot%\system32\shdocvw.dll

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar]
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser
   {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} = Norton AntiVirus   : C:\Program Files\Norton AntiVirus\NavShExt.dll
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser
   {01E04581-4EEE-11D0-BFE9-00AA005B4383} = &Address   : %SystemRoot%\system32\browseui.dll
   {4982D40A-C53B-4615-B15B-B5B5E98D167C} =    :
   {0E5CBF21-D15F-11D0-8301-00AA005B4383} = &Links   : %SystemRoot%\system32\SHELL32.dll
   {47833539-D0C5-4125-9FA8-0819E2EAAC93} = Adobe PDF   : C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   CeEKEY   C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
   CeEPOWER   C:\Program Files\TOSHIBA\Power Management\CePMTray.exe
   TPNF   C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
   ATIPTA   C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
   Apoint   C:\Program Files\Apoint2K\Apoint.exe
   EzButton   C:\Program Files\EzButton\EzButton.EXE
   PadTouch   C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
   Notebook Maximizer   C:\Program Files\Notebook Maximizer\maximizer_startup.exe
   SM1BG   C:\WINDOWS\SM1BG.EXE
   QuickTime Task   "C:\Program Files\QuickTime\qttask.exe" -atboottime
   NeroFilterCheck   C:\WINDOWS\system32\NeroCheck.exe
   USB Storage Toolbox   C:\Program Files\USBToolbox\Res.EXE
   CloneCDElbyCDFL   "C:\Program Files\Elaborate Bytes\CloneCD\ElbyCheck.exe" /L ElbyCDFL
   ccApp   "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
   Symantec NetDriver Monitor   C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
   masqform.exe   C:\Program Files\PureEdge\Viewer 6.0\masqform.exe -UpdateCurrentUser

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents]
   IMAIL   Installed = 1
   MAPI   Installed = 1
   MSFS   Installed = 1

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   ctfmon.exe   C:\WINDOWS\system32\ctfmon.exe
   PhotoShow Deluxe Media Manager   C:\PROGRA~1\Ahead\Ahead\data\Xtras\mssysmgr.exe
   MsnMsgr   "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
   tunebite.exe   C:\Program Files\tunebite\tunebite.exe

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\load]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\run]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig]

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\services

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupfolder

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupreg

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\state
   system.ini   0
   win.ini   0
   bootini   0
   services   0
   startup   0


[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies]

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\NonEnum
   {BDEADF00-C265-11D0-BCED-00A0C90AB50F} = C:\PROGRA~1\COMMON~1\MICROS~1\WEBFOL~1\MSONSEXT.DLL
   {6DFD7C5C-2451-11d3-A299-00C04F8EF6AF} =
   {0DF44EAA-FF21-4412-828E-260A8728E7F1} =


HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Ratings

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system
   dontdisplaylastusername   0
   legalnoticecaption   
   legalnoticetext   
   shutdownwithoutlogon   1
   undockwithoutlogon   1


[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies]

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer
   NoDriveTypeAutoRun   ‘
   NoDriveAutoRun   -1

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad]
   PostBootReminder                  {7849596a-48ea-486e-8937-a2a3009f31a9} = %SystemRoot%\system32\SHELL32.dll
   CDBurn                            {fbeb8a05-beee-4442-804e-409d6c4515e9} = %SystemRoot%\system32\SHELL32.dll
   WebCheck                          {E6FB5E20-DE35-11CF-9C87-00AA005127ED} = %SystemRoot%\system32\webcheck.dll
   SysTray                           {35CEC8A3-2BE6-11D2-8773-92E220524153} = C:\WINDOWS\system32\stobject.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
   UserInit   = C:\WINDOWS\system32\userinit.exe,
   Shell      = Explorer.exe
   System      =

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt32chain
    =

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cryptnet
    =

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cscdll
    =

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\gebcc
    = C:\WINDOWS\system32\gebcc.dll

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ScCertProp
    =

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Schedule
    =

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\sclgntfy
    =

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SensLogn
    =

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\termsrv
    =

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlballoon
    =

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wzcnotif
    =

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Your Image File Name Here without a path
   Debugger = ntsd -d

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
   AppInit_DLLs   


»»»»»»»»»»»»»»»»»»»»»»»» Scan Complete »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
WinPFind v1.4.1   - Log file written to "WinPFind.Txt" in the WinPFind folder.
Scan completed on 12/4/2005 9:58:11 AM




And here is the new HiJackThis log:



Logfile of HijackThis v1.99.1
Scan saved at 10:10:37 AM, on 12/4/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\ACS.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
C:\Program Files\TOSHIBA\Power Management\CePMTray.exe
C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\Program Files\EzButton\EzButton.EXE
C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
C:\WINDOWS\SM1BG.EXE
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\USBToolbox\Res.EXE
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\PROGRA~1\Ahead\Ahead\data\Xtras\mssysmgr.exe
C:\Program Files\MSN Messenger\MsnMsgr.Exe
C:\Program Files\tunebite\tunebite.exe
C:\WINDOWS\system32\drivers\CDAC11BA.EXE
C:\Program Files\Toshiba\Power Management\CeEPwrSvc.exe
C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\WINDOWS\system32\DVDRAMSV.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
C:\WINDOWS\system32\svchost.exe
c:\Toshiba\Ivp\Swupdate\swupdtmr.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Documents and Settings\user\Desktop\Spyware Software\hijackthis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://toshibadirect.com/
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: ATLDistrib Object - {3FE36807-69ED-45D1-B9BE-85C0E3F75B6A} - C:\WINDOWS\system32\gebcc.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [CeEKEY] C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
O4 - HKLM\..\Run: [CeEPOWER] C:\Program Files\TOSHIBA\Power Management\CePMTray.exe
O4 - HKLM\..\Run: [TPNF] C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
O4 - HKLM\..\Run: [EzButton] C:\Program Files\EzButton\EzButton.EXE
O4 - HKLM\..\Run: [PadTouch] C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
O4 - HKLM\..\Run: [Notebook Maximizer] C:\Program Files\Notebook Maximizer\maximizer_startup.exe
O4 - HKLM\..\Run: [SM1BG] C:\WINDOWS\SM1BG.EXE
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [USB Storage Toolbox] C:\Program Files\USBToolbox\Res.EXE
O4 - HKLM\..\Run: [CloneCDElbyCDFL] "C:\Program Files\Elaborate Bytes\CloneCD\ElbyCheck.exe" /L ElbyCDFL
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
O4 - HKLM\..\Run: [masqform.exe] C:\Program Files\PureEdge\Viewer 6.0\masqform.exe -UpdateCurrentUser
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [PhotoShow Deluxe Media Manager] C:\PROGRA~1\Ahead\Ahead\data\Xtras\mssysmgr.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [tunebite.exe] C:\Program Files\tunebite\tunebite.exe
O4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_05\bin\npjpi142_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_05\bin\npjpi142_05.dll
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O14 - IERESET.INF: START_PAGE_URL=http://www.toshiba.com
O16 - DPF: {A93D84FD-641F-43AE-B963-E6FA84BE7FE7} (LinkSys Content Update) - http://www.linksysfix.com/check/netset/install/gtdownls.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMesse...pDownloader.cab
O16 - DPF: {DBA230D1-8467-4e69-987E-5FAE815A3B45} -
O20 - Winlogon Notify: gebcc - C:\WINDOWS\system32\gebcc.dll
O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\system32\ACS.exe
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: C-DillaCdaC11BA - C-Dilla Ltd - C:\WINDOWS\system32\drivers\CDAC11BA.EXE
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: CeEPwrSvc - COMPAL ELECTRONIC INC. - C:\Program Files\Toshiba\Power Management\CeEPwrSvc.exe
O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
O23 - Service: DVD-RAM_Service - Matsu[censored]a Electric Industrial Co., Ltd. - C:\WINDOWS\system32\DVDRAMSV.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: Norton AntiVirus Auto-Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: Norton AntiVirus Firewall Monitor Service (NPFMntor) - Symantec Corporation - C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Swupdtmr - Unknown owner - c:\Toshiba\Ivp\Swupdate\swupdtmr.exe
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe


Thanks....

Offline guestolo

  • Site Donator
  • Administrator
  • Hero Member
  • *****
  • Posts: 16034
  • Karma: +1/-0
    • View Profile
    • http://
Adware infection - svchost???
« Reply #3 on: December 04, 2005, 11:37:04 AM »
It's best to Print these instructions or save them too Notepad file for reference

Please download [color=\"red\"]VundoFix.exe[/color][/url] to your desktop.
    *Double-click
VundoFix.exe to extract the files
*This will create a VundoFix folder on your desktop.


RESTART your Computer in SAFE MODE
You can do this by tapping the F8 key as the system is restarting, just before Windows loads,
Select Safe mode from the startup menu

*Once in safe mode

Open the VundoFix folder and doubleclick on KillVundo.bat
*You will first be presented with a warning.
It should look like this
Quote
[color=\"blue\"]VundoFix V2.15 by Atri
By using VundoFix you agree that you are doing so at your own risk
Press enter to continue....
[/color]

* At this point press enter one time.

* Next you will see:
Quote
[color=\"blue\"]Please Type in the filepath as instructed by the forum staff
and then press enter:[/color]

*At this point please type the following file path (make sure to enter it exactly as below!):
    C:\WINDOWS\system32\gebcc.dll

    *Press [color=\"red\"]Enter[/color] to continue with the fix.

    *Next you will see:
    Quote
    [color=\"blue\"]Please type in the second filepath as instructed by the forum
    staff then press enter: [/color]
    *At this point please type the following file path (make sure to enter it exactly as below!):
    C:\WINDOWS\system32\ccbeg.*
    [/list]*Press [color=\"red\"]Enter[/color] to continue with the fix.
    [/list]*The fix will run then HijackThis will open, if it does not open automatically please open it manually.
    *In HiJackThis, please place a check next to the following items and click FIX CHECKED:
      O2 - BHO: ATLDistrib Object - {3FE36807-69ED-45D1-B9BE-85C0E3F75B6A} - C:\WINDOWS\system32\gebcc.dll

      O16 - DPF: {DBA230D1-8467-4e69-987E-5FAE815A3B45} -
      O20 - Winlogon Notify: gebcc - C:\WINDOWS\system32\gebcc.dll

      [/list]*After you have fixed these items, close Hijackthis.
      *Press enter to exit the program

      Find and delete the following files
      C:\WINDOWS\system32\ccbeg.bak2 <-file
      C:\WINDOWS\system32\ccbeg.ini
      Notice the backwards spelling of the filename from the one in your hijackthis log
      It justs has a different ext...
      If you see other files with ccbeg file names in the system32 folder, remove them too

      Reboot your computer back to Normal mode
      Back in Windows

      ==Open Cleanup! by double-clicking the icon on your desktop (or from the Start > All Programs menu).
      Set the program up as follows:
      Click "Options..."
      Move the arrow down to "Custom CleanUp!"
      Put a check next to the following (Make sure nothing else is checked!):

          * Empty Recycle Bins
          * Delete Cookies
          * Delete Prefetch files
          * Cleanup! All Users

      Click OK
      Press the CleanUp! button to start the program.
      When it's done, decline to log off or restart the computer

      From my signature below run an Online virus scan at Panda's
      It's safe to supply an email address
      You may want to disable Norton's autoprotect beforehand so it  won't  interfere
      Select to scan "Local Disks"
      After the scan is done, choose to See Report
      Save the report to desktop

      I need to see a few logs

      1. Post a fresh hijackthis log
      2. Post the whole report from Panda's
      3. Post vundofix.txt file from the vundofix folder into this topic
      « Last Edit: December 04, 2005, 11:49:12 AM by guestolo »

      Do you want to post your own logs from FRST?

      Follow the instructions posted http://www.thetechguide.com/forum/index.php/topic/22942-please-read-how-to-post-logs-from-frst/\'>Click Here


      Offline nunya53

      • Jr. Member
      • **
      • Posts: 50
      • Karma: +0/-0
        • View Profile
      Adware infection - svchost???
      « Reply #4 on: December 04, 2005, 12:44:20 PM »
      Guestolo,

      Here are the results of your instructions.  I had one glitch...after I ran VundoFix, it automatically opened hijackthis as it should, but when I exited, my screen was blank, therefore I was unable to search for the two files you had asked about (ccbeg.bak2, ccbeg.*).  I had to reboot back to normal mode to see anything, and which I did not find any files starting with ccbeg.

      Looking at the HijackThis log, I think the problem is still there, but then I may not know what I'm looking at.

      Also, should I be seeing Google ads in the thread?  I didn't see them last time I was here, but not sure if they are sponsoring the site.


      Here is the HijackThis log:



      Logfile of HijackThis v1.99.1
      Scan saved at 11:34:19 AM, on 12/4/2005
      Platform: Windows XP SP2 (WinNT 5.01.2600)
      MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

      Running processes:
      C:\WINDOWS\System32\smss.exe
      C:\WINDOWS\system32\winlogon.exe
      C:\WINDOWS\system32\services.exe
      C:\WINDOWS\system32\lsass.exe
      C:\WINDOWS\system32\Ati2evxx.exe
      C:\WINDOWS\system32\svchost.exe
      C:\WINDOWS\System32\svchost.exe
      C:\WINDOWS\system32\ACS.exe
      C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
      C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
      C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
      C:\WINDOWS\Explorer.EXE
      C:\WINDOWS\system32\spoolsv.exe
      C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
      C:\Program Files\TOSHIBA\Power Management\CePMTray.exe
      C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
      C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
      C:\Program Files\Apoint2K\Apoint.exe
      C:\Program Files\EzButton\EzButton.EXE
      C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
      C:\WINDOWS\SM1BG.EXE
      C:\Program Files\QuickTime\qttask.exe
      C:\Program Files\USBToolbox\Res.EXE
      C:\Program Files\Common Files\Symantec Shared\ccApp.exe
      C:\WINDOWS\system32\drivers\CDAC11BA.EXE
      C:\Program Files\Toshiba\Power Management\CeEPwrSvc.exe
      C:\WINDOWS\system32\ctfmon.exe
      C:\Program Files\Apoint2K\Apntex.exe
      C:\PROGRA~1\Ahead\Ahead\data\Xtras\mssysmgr.exe
      C:\Program Files\tunebite\tunebite.exe
      C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
      C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
      C:\WINDOWS\system32\DVDRAMSV.exe
      C:\Program Files\ewido\security suite\ewidoctrl.exe
      C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
      C:\Program Files\Norton AntiVirus\navapsvc.exe
      C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
      C:\WINDOWS\system32\svchost.exe
      c:\Toshiba\Ivp\Swupdate\swupdtmr.exe
      C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
      C:\Documents and Settings\user\Desktop\Spyware Software\hijackthis.exe

      R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://toshibadirect.com/
      O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\ActiveX\AcroIEHelper.dll
      O2 - BHO: ATLDistrib Object - {3FE36807-69ED-45D1-B9BE-85C0E3F75B6A} - C:\WINDOWS\system32\gebcc.dll
      O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
      O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
      O2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
      O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
      O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
      O4 - HKLM\..\Run: [CeEKEY] C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
      O4 - HKLM\..\Run: [CeEPOWER] C:\Program Files\TOSHIBA\Power Management\CePMTray.exe
      O4 - HKLM\..\Run: [TPNF] C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
      O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
      O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
      O4 - HKLM\..\Run: [EzButton] C:\Program Files\EzButton\EzButton.EXE
      O4 - HKLM\..\Run: [PadTouch] C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
      O4 - HKLM\..\Run: [Notebook Maximizer] C:\Program Files\Notebook Maximizer\maximizer_startup.exe
      O4 - HKLM\..\Run: [SM1BG] C:\WINDOWS\SM1BG.EXE
      O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
      O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
      O4 - HKLM\..\Run: [USB Storage Toolbox] C:\Program Files\USBToolbox\Res.EXE
      O4 - HKLM\..\Run: [CloneCDElbyCDFL] "C:\Program Files\Elaborate Bytes\CloneCD\ElbyCheck.exe" /L ElbyCDFL
      O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
      O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
      O4 - HKLM\..\Run: [masqform.exe] C:\Program Files\PureEdge\Viewer 6.0\masqform.exe -UpdateCurrentUser
      O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
      O4 - HKCU\..\Run: [PhotoShow Deluxe Media Manager] C:\PROGRA~1\Ahead\Ahead\data\Xtras\mssysmgr.exe
      O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
      O4 - HKCU\..\Run: [tunebite.exe] C:\Program Files\tunebite\tunebite.exe
      O4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
      O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
      O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
      O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
      O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_05\bin\npjpi142_05.dll
      O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_05\bin\npjpi142_05.dll
      O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
      O14 - IERESET.INF: START_PAGE_URL=http://www.toshiba.com
      O16 - DPF: {A93D84FD-641F-43AE-B963-E6FA84BE7FE7} (LinkSys Content Update) - http://www.linksysfix.com/check/netset/install/gtdownls.cab
      O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMesse...pDownloader.cab
      O16 - DPF: {DBA230D1-8467-4e69-987E-5FAE815A3B45} -
      O20 - Winlogon Notify: gebcc - C:\WINDOWS\system32\gebcc.dll
      O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\system32\ACS.exe
      O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
      O23 - Service: C-DillaCdaC11BA - C-Dilla Ltd - C:\WINDOWS\system32\drivers\CDAC11BA.EXE
      O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
      O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
      O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
      O23 - Service: CeEPwrSvc - COMPAL ELECTRONIC INC. - C:\Program Files\Toshiba\Power Management\CeEPwrSvc.exe
      O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
      O23 - Service: DVD-RAM_Service - Matsu[censored]a Electric Industrial Co., Ltd. - C:\WINDOWS\system32\DVDRAMSV.exe
      O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
      O23 - Service: Norton AntiVirus Auto-Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
      O23 - Service: Norton AntiVirus Firewall Monitor Service (NPFMntor) - Symantec Corporation - C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
      O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
      O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
      O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
      O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
      O23 - Service: Swupdtmr - Unknown owner - c:\Toshiba\Ivp\Swupdate\swupdtmr.exe
      O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
      O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe


      Here is the Panda's log:



      Incident                      Status                        Location                                                                                                                                                                                                                                                        

      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-1244768d-66725ed9.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-1592e607-4a1bfdd2.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-162216eb-7b5573cc.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-19e7a114-45a662d0.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-2529e086-66c73b98.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-273c7f1a-5bfa4783.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-2c15b565-3d7fbc00.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-3766928b-254322fc.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-386bdfcf-6b0416fc.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-3d8c9a75-76f68201.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-3ea962e3-6f4396d4.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-3ee72bec-11a9302c.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-43599f0-406da590.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-440ad255-30d5847c.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-4461f74a-5ecbc3de.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-4b12857c-65b23aac.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-4e981dd7-6a7cfbf0.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-4fe3f5dc-20d8b700.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-5767f3b6-486c1569.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-62aae482-3323e0ed.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-67e0e2ad-7ae7fe94.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-6a2b1ab8-60d6766e.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-6b43f869-5f10c2dc.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-6f4bf6e3-3492ba69.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-7124aa1-4bb5e8c1.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-71aa63c-217f4ea8.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-79749a05-12254abe.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive.jar-7e64f4a1-77f3c089.zip[Dummy.class]                                                                                                                        
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive1213.jar-1f7ea35f-44a4b592.zip[Dummy.class]                                                                                                                    
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\archive1213.jar-366118ff-23b7f35b.zip[Dummy.class]                                                                                                                    
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-1032651c-5884f8c8.zip[NewSecurityClassLoader.class]                                                                                                          
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-1032651c-5884f8c8.zip[NewURLClassLoader.class]                                                                                                              
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-5d76e5c1-75aaef2f.zip[NewSecurityClassLoader.class]                                                                                                          
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-5d76e5c1-75aaef2f.zip[NewURLClassLoader.class]                                                                                                              
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv147.jar-f154558-5a42e02f.zip[Dummy.class]                                                                                                                    
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv147.jar-f154558-5a42e02f.zip[Matrix.class]                                                                                                                  
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv428.jar-6a235d59-121ffd44.zip[Matrix.class]                                                                                                                  
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv428.jar-6a235d59-121ffd44.zip[Dummy.class]                                                                                                                  
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv539.jar-69ecf2f0-428db23b.zip[Dummy.class]                                                                                                                  
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv539.jar-69ecf2f0-428db23b.zip[Matrix.class]                                                                                                                  
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv599.jar-5dc51bcf-76e5cbba.zip[Matrix.class]                                                                                                                  
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv599.jar-5dc51bcf-76e5cbba.zip[Dummy.class]                                                                                                                  
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv612.jar-1b06d86c-16e74a19.zip[Dummy.class]                                                                                                                  
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv637.jar-4c4cc45e-1b760585.zip[Matrix.class]                                                                                                                  
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv637.jar-4c4cc45e-1b760585.zip[Dummy.class]                                                                                                                  
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv645.jar-78a941a3-12ed2142.zip[Matrix.class]                                                                                                                  
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv645.jar-78a941a3-12ed2142.zip[Dummy.class]                                                                                                                  
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv648.jar-1c39c06b-190b2519.zip[Dummy.class]                                                                                                                  
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\loaderadv648.jar-1c39c06b-190b2519.zip[Matrix.class]                                                                                                                  
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\menu.jr-5b275f4b-1d9035d5.zip[Dummy.class]                                                                                                                            
      Virus:Exploit/ByteVerify      Not disinfected               C:\Documents and Settings\user\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\menu.jr-5b275f4b-7e7fc80d.zip[Dummy.class]                                                                                                                            
      Adware:Adware/BrilliantDigitalNot disinfected               C:\stick stuff\Kazaa\bdcore.dll                                                                                                                                                                                                                                


      And here is the vundofix.txt file:



      VundoFix V2.15 by Atri
      --------------------------------------------------------------------------------------
       
      Listing files contained in the vundofix folder.
      --------------------------------------------------------------------------------------
       
      killvundo.bat
      process.exe
      ReadMe.txt
      vundo.reg
      vundofix.txt
       
      --------------------------------------------------------------------------------------
       
      Filepaths entered
      --------------------------------------------------------------------------------------
       
      The filepath entered was C:\windows\system\gebcc.dll
       
      The second filepath entered was C:\windows\system32\ccbeg.*
       
      --------------------------------------------------------------------------------------
       
      Log from Process
      --------------------------------------------------------------------------------------
       

      Killing PID 136 'smss.exe'

      Killing PID 764 'explorer.exe'
      Killing PID 764 'explorer.exe'
      Killing PID 764 'explorer.exe'
      Killing PID 764 'explorer.exe'


      Killing PID 216 'winlogon.exe'
      Killing PID 216 'winlogon.exe'
      --------------------------------------------------------------------------------------
       
      C:\windows\system\gebcc.dll Deleted sucessfully.
      C:\windows\system32\ccbeg.* Deleted sucessfully.
       
      Fixing Registry
      --------------------------------------------------------------------------------------

      Offline nunya53

      • Jr. Member
      • **
      • Posts: 50
      • Karma: +0/-0
        • View Profile
      Adware infection - svchost???
      « Reply #5 on: December 04, 2005, 02:51:53 PM »
      I ran the process again except Panda, and here is the most current HijackThis log.  At least line 020 is no longer there about gebcc.dll

      I will let you know how it operates.


      Logfile of HijackThis v1.99.1
      Scan saved at 1:48:56 PM, on 12/4/2005
      Platform: Windows XP SP2 (WinNT 5.01.2600)
      MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

      Running processes:
      C:\WINDOWS\System32\smss.exe
      C:\WINDOWS\system32\winlogon.exe
      C:\WINDOWS\system32\services.exe
      C:\WINDOWS\system32\lsass.exe
      C:\WINDOWS\system32\Ati2evxx.exe
      C:\WINDOWS\system32\svchost.exe
      C:\WINDOWS\System32\svchost.exe
      C:\WINDOWS\system32\ACS.exe
      C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
      C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
      C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
      C:\WINDOWS\Explorer.EXE
      C:\WINDOWS\system32\spoolsv.exe
      C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
      C:\Program Files\TOSHIBA\Power Management\CePMTray.exe
      C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
      C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
      C:\Program Files\Apoint2K\Apoint.exe
      C:\Program Files\EzButton\EzButton.EXE
      C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
      C:\WINDOWS\SM1BG.EXE
      C:\Program Files\QuickTime\qttask.exe
      C:\Program Files\USBToolbox\Res.EXE
      C:\Program Files\Common Files\Symantec Shared\ccApp.exe
      C:\WINDOWS\system32\ctfmon.exe
      C:\Program Files\Apoint2K\Apntex.exe
      C:\PROGRA~1\Ahead\Ahead\data\Xtras\mssysmgr.exe
      C:\Program Files\MSN Messenger\MsnMsgr.Exe
      C:\Program Files\tunebite\tunebite.exe
      C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
      C:\WINDOWS\system32\drivers\CDAC11BA.EXE
      C:\Program Files\Toshiba\Power Management\CeEPwrSvc.exe
      C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
      C:\WINDOWS\system32\DVDRAMSV.exe
      C:\Program Files\ewido\security suite\ewidoctrl.exe
      C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
      C:\Program Files\Norton AntiVirus\navapsvc.exe
      C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
      C:\WINDOWS\system32\svchost.exe
      c:\Toshiba\Ivp\Swupdate\swupdtmr.exe
      C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
      C:\WINDOWS\system32\wuauclt.exe
      C:\Program Files\Internet Explorer\IEXPLORE.EXE
      C:\Documents and Settings\user\Desktop\Spyware Software\hijackthis.exe

      R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://toshibadirect.com/
      O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program

      Files\Adobe\Acrobat 6.0\Acrobat\ActiveX\AcroIEHelper.dll
      O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search &

      Destroy\SDHelper.dll
      O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program

      Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
      O2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton

      AntiVirus\NavShExt.dll
      O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat

      6.0\Acrobat\AcroIEFavClient.dll
      O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton

      AntiVirus\NavShExt.dll
      O4 - HKLM\..\Run: [CeEKEY] C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
      O4 - HKLM\..\Run: [CeEPOWER] C:\Program Files\TOSHIBA\Power Management\CePMTray.exe
      O4 - HKLM\..\Run: [TPNF] C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
      O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
      O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
      O4 - HKLM\..\Run: [EzButton] C:\Program Files\EzButton\EzButton.EXE
      O4 - HKLM\..\Run: [PadTouch] C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
      O4 - HKLM\..\Run: [Notebook Maximizer] C:\Program Files\Notebook Maximizer\maximizer_startup.exe
      O4 - HKLM\..\Run: [SM1BG] C:\WINDOWS\SM1BG.EXE
      O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
      O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
      O4 - HKLM\..\Run: [USB Storage Toolbox] C:\Program Files\USBToolbox\Res.EXE
      O4 - HKLM\..\Run: [CloneCDElbyCDFL] "C:\Program Files\Elaborate Bytes\CloneCD\ElbyCheck.exe" /L

      ElbyCDFL
      O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
      O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
      O4 - HKLM\..\Run: [masqform.exe] C:\Program Files\PureEdge\Viewer 6.0\masqform.exe

      -UpdateCurrentUser
      O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
      O4 - HKCU\..\Run: [PhotoShow Deluxe Media Manager]

      C:\PROGRA~1\Ahead\Ahead\data\Xtras\mssysmgr.exe
      O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
      O4 - HKCU\..\Run: [tunebite.exe] C:\Program Files\tunebite\tunebite.exe
      O4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat

      6.0\Distillr\acrotray.exe
      O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common

      Files\Adobe\Calibration\Adobe Gamma Loader.exe
      O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
      O8 - Extra context menu item: E&xport to Microsoft Excel -

      res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
      O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program

      Files\Java\j2re1.4.2_05\bin\npjpi142_05.dll
      O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} -

      C:\Program Files\Java\j2re1.4.2_05\bin\npjpi142_05.dll
      O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} -

      C:\WINDOWS\system32\Shdocvw.dll
      O14 - IERESET.INF: START_PAGE_URL=http://www.toshiba.com
      O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) -

      http://go.microsoft.com/fwlink/?linkid=39204
      O16 - DPF: {A93D84FD-641F-43AE-B963-E6FA84BE7FE7} (LinkSys Content Update) -

      http://www.linksysfix.com/check/netset/install/gtdownls.cab
      O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) -

      http://messenger.msn.com/download/MsnMesse...pDownloader.cab
      O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\system32\ACS.exe
      O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
      O23 - Service: C-DillaCdaC11BA - C-Dilla Ltd - C:\WINDOWS\system32\drivers\CDAC11BA.EXE
      O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common

      Files\Symantec Shared\ccEvtMgr.exe
      O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program

      Files\Common Files\Symantec Shared\ccPwdSvc.exe
      O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program

      Files\Common Files\Symantec Shared\ccSetMgr.exe
      O23 - Service: CeEPwrSvc - COMPAL ELECTRONIC INC. - C:\Program Files\Toshiba\Power

      Management\CeEPwrSvc.exe
      O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program

      Files\TOSHIBA\ConfigFree\CFSvcs.exe
      O23 - Service: DVD-RAM_Service - Matsu[censored]a Electric Industrial Co., Ltd. -

      C:\WINDOWS\system32\DVDRAMSV.exe
      O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security

      suite\ewidoctrl.exe
      O23 - Service: Norton AntiVirus Auto-Protect Service (navapsvc) - Symantec Corporation -

      C:\Program Files\Norton AntiVirus\navapsvc.exe
      O23 - Service: Norton AntiVirus Firewall Monitor Service (NPFMntor) - Symantec Corporation -

      C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
      O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
      O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation -

      C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
      O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program

      Files\Common Files\Symantec Shared\SNDSrvc.exe
      O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common

      Files\Symantec Shared\SPBBC\SPBBCSvc.exe
      O23 - Service: Swupdtmr - Unknown owner - c:\Toshiba\Ivp\Swupdate\swupdtmr.exe
      O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec

      Shared\CCPD-LC\symlcsvc.exe
      O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common

      Files\Symantec Shared\Security Center\SymWSC.exe

      Offline guestolo

      • Site Donator
      • Administrator
      • Hero Member
      • *****
      • Posts: 16034
      • Karma: +1/-0
        • View Profile
        • http://
      Adware infection - svchost???
      « Reply #6 on: December 04, 2005, 03:02:16 PM »
      You typed in the first path to the file incorrectly
      It appears you typed in
      C:\windows\system\gebcc.dll
      Instead of
      C:\WINDOWS\system32\gebcc.dll

      Can you try this again please

      Print this all out

      RESTART your Computer in SAFE MODE
      You can do this by tapping the F8 key as the system is restarting, just before Windows loads,
      Select Safe mode from the startup menu

      *Once in safe mode
      Your screen may still be blank
      But do the following

      Open the VundoFix folder and doubleclick on KillVundo.bat

      If the screen is blank
      Code: [Select]
      Enter your task manager in safe mode
      by using (Ctrl+Alt+Del) buttons on the keyboard
      In taskmanager
      Click on FILE>>New Task(Run...)
      Use the Browse button and navigate to KillVundo.bat
      *You will first be presented with a warning.
      It should look like this
      Quote
      [color=\"blue\"]VundoFix V2.15 by Atri
      By using VundoFix you agree that you are doing so at your own risk
      Press enter to continue....
      [/color]

      * At this point press enter one time.

      * Next you will see:
      Quote
      [color=\"blue\"]Please Type in the filepath as instructed by the forum staff
      and then press enter:[/color]

      *At this point please type the following file path (make sure to enter it exactly as below!):
        C:\WINDOWS\system32\gebcc.dll

        *Press [color=\"red\"]Enter[/color] to continue with the fix.

        *Next you will see:
        Quote
        [color=\"blue\"]Please type in the second filepath as instructed by the forum
        staff then press enter: [/color]
        *At this point please type the following file path (make sure to enter it exactly as below!):
        C:\WINDOWS\system32\ccbeg.*
        [/list]*Press [color=\"red\"]Enter[/color] to continue with the fix.
        [/list]*The fix will run then HijackThis will open, if it does not open automatically please open it manually.
        *In HiJackThis, please place a check next to the following items and click FIX CHECKED:
          O2 - BHO: ATLDistrib Object - {3FE36807-69ED-45D1-B9BE-85C0E3F75B6A} - C:\WINDOWS\system32\gebcc.dll

          O16 - DPF: {DBA230D1-8467-4e69-987E-5FAE815A3B45} -
          O20 - Winlogon Notify: gebcc - C:\WINDOWS\system32\gebcc.dll

          [/list]*After you have fixed these items, close Hijackthis.
          *Press enter to exit the program

          Find and delete the following files
          Again use TaskManager>>>FILE>>New Task(Run...)>>Browse
          C:\WINDOWS\system32\ccbeg.bak2 <-file
          C:\WINDOWS\system32\ccbeg.ini
          Notice the backwards spelling of the filename from the one in your hijackthis log
          It justs has a different ext...
          If you see other files with ccbeg file names in the system32 folder, remove them too

          Reboot your computer back to Normal mode
          Back in Windows

          ==Open Cleanup! by double-clicking the icon on your desktop (or from the Start > All Programs menu).
          Set the program up as follows:
          Click "Options..."
          Move the arrow down to "Custom CleanUp!"
          Put a check next to the following (Make sure nothing else is checked!):

              * Empty Recycle Bins
              * Delete Cookies
              * Delete Prefetch files
              * Cleanup! All Users

          Click OK
          Press the CleanUp! button to start the program.
          When it's done, decline to log off or restart the computer


          1. Post a fresh hijackthis log
          2. Post vundofix.txt file from the vundofix folder into this topic



          I was posting as you were

          Could you access Windows Control panel and double click on the Java Icon
          Under the Cache tab>>Clear cache

          Can you also post
          vundofix.txt file from the vundofix folder into this topic

          EDIT>>>>I can't seem to make a New reply to this thread
          It appears when I try It shows as I edited my last reply
          « Last Edit: December 04, 2005, 03:00:37 PM by guestolo »

          Do you want to post your own logs from FRST?

          Follow the instructions posted http://www.thetechguide.com/forum/index.php/topic/22942-please-read-how-to-post-logs-from-frst/\'>Click Here


          Offline guestolo

          • Site Donator
          • Administrator
          • Hero Member
          • *****
          • Posts: 16034
          • Karma: +1/-0
            • View Profile
            • http://
          Adware infection - svchost???
          « Reply #7 on: December 04, 2005, 03:26:41 PM »
          I couldn't post a reply earlier for some reason
          It was just editing my last reply and wouldn't show as a new reply
          It's back working now

          Here's what I posted

          Quote
          I was posting as you were

          Could you access Windows Control panel and double click on the Java Icon
          Under the Cache tab>>Clear cache

          Can you also post
          vundofix.txt file from the vundofix folder into this topic

          I can't seem to make a New reply to this thread
          It appears when I try It shows as I edited my last reply
          « Last Edit: December 04, 2005, 03:38:36 PM by guestolo »

          Do you want to post your own logs from FRST?

          Follow the instructions posted http://www.thetechguide.com/forum/index.php/topic/22942-please-read-how-to-post-logs-from-frst/\'>Click Here


          Offline nunya53

          • Jr. Member
          • **
          • Posts: 50
          • Karma: +0/-0
            • View Profile
          Adware infection - svchost???
          « Reply #8 on: December 04, 2005, 03:54:09 PM »
          I will do this again shortly.  The problem I had earlier was that when I boot in SAFE mode, my keyboard number lock is diabled and I didn't notice.

          BTW, are the Google ads supposed to be in the threads?

          Thanks,

          Offline guestolo

          • Site Donator
          • Administrator
          • Hero Member
          • *****
          • Posts: 16034
          • Karma: +1/-0
            • View Profile
            • http://
          Adware infection - svchost???
          « Reply #9 on: December 04, 2005, 03:56:27 PM »
          Yes they are

          Do you want to post your own logs from FRST?

          Follow the instructions posted http://www.thetechguide.com/forum/index.php/topic/22942-please-read-how-to-post-logs-from-frst/\'>Click Here


          Offline nunya53

          • Jr. Member
          • **
          • Posts: 50
          • Karma: +0/-0
            • View Profile
          Adware infection - svchost???
          « Reply #10 on: December 04, 2005, 08:13:34 PM »
          Guestolo,

          The game is over and the Chiefs beat the Broncos...!!!

          I ran everything again, but as I suspected, I had previously cleaned it when I ran everything again.  I suppose I figured out I screwed up something because after I ran your instructions the first time, I still had the problem.  Anyway,  I ran everything you requested again, and am posting the logs.  Also, I did clear my Java cache as you requested.


          Here is the vundofix log:




          VundoFix V2.15 by Atri
          --------------------------------------------------------------------------------------
           
          Listing files contained in the vundofix folder.
          --------------------------------------------------------------------------------------
           
          killvundo.bat
          process.exe
          ReadMe.txt
          vundo.reg
          vundofix.txt
           
          --------------------------------------------------------------------------------------
           
          Filepaths entered
          --------------------------------------------------------------------------------------
           
          The filepath entered was c:\windows\system32\gebcc.dll
           
          The second filepath entered was c:\windows\system32\ccbeg.*
           
          --------------------------------------------------------------------------------------
           
          Log from Process
          --------------------------------------------------------------------------------------
           

          Killing PID 136 'smss.exe'

          Killing PID 744 'explorer.exe'
          Killing PID 744 'explorer.exe'


          Killing PID 212 'winlogon.exe'
          Killing PID 212 'winlogon.exe'
          Error 0x5 : Access is denied.

          --------------------------------------------------------------------------------------
           
          c:\windows\system32\gebcc.dll Deleted sucessfully.
          c:\windows\system32\ccbeg.* Deleted sucessfully.
           
          Fixing Registry
          --------------------------------------------------------------------------------------
           


          And here is the latest HijackThis log:




          Logfile of HijackThis v1.99.1
          Scan saved at 6:51:58 PM, on 12/4/2005
          Platform: Windows XP SP2 (WinNT 5.01.2600)
          MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

          Running processes:
          C:\WINDOWS\System32\smss.exe
          C:\WINDOWS\system32\winlogon.exe
          C:\WINDOWS\system32\services.exe
          C:\WINDOWS\system32\lsass.exe
          C:\WINDOWS\system32\Ati2evxx.exe
          C:\WINDOWS\system32\svchost.exe
          C:\WINDOWS\System32\svchost.exe
          C:\WINDOWS\system32\ACS.exe
          C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
          C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
          C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
          C:\WINDOWS\Explorer.EXE
          C:\WINDOWS\system32\spoolsv.exe
          C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
          C:\Program Files\TOSHIBA\Power Management\CePMTray.exe
          C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
          C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
          C:\Program Files\Apoint2K\Apoint.exe
          C:\Program Files\EzButton\EzButton.EXE
          C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
          C:\WINDOWS\SM1BG.EXE
          C:\Program Files\QuickTime\qttask.exe
          C:\Program Files\USBToolbox\Res.EXE
          C:\Program Files\Common Files\Symantec Shared\ccApp.exe
          C:\WINDOWS\system32\ctfmon.exe
          C:\PROGRA~1\Ahead\Ahead\data\Xtras\mssysmgr.exe
          C:\Program Files\MSN Messenger\MsnMsgr.Exe
          C:\Program Files\tunebite\tunebite.exe
          C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
          C:\Program Files\Apoint2K\Apntex.exe
          C:\WINDOWS\system32\drivers\CDAC11BA.EXE
          C:\Program Files\Toshiba\Power Management\CeEPwrSvc.exe
          C:\WINDOWS\system32\DVDRAMSV.exe
          C:\Program Files\ewido\security suite\ewidoctrl.exe
          C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
          C:\Program Files\Norton AntiVirus\navapsvc.exe
          C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
          C:\WINDOWS\system32\svchost.exe
          c:\Toshiba\Ivp\Swupdate\swupdtmr.exe
          C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
          C:\WINDOWS\system32\wuauclt.exe
          C:\Documents and Settings\user\Desktop\Spyware Software\hijackthis.exe

          R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://toshibadirect.com/
          O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\ActiveX\AcroIEHelper.dll
          O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
          O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
          O2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
          O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
          O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
          O4 - HKLM\..\Run: [CeEKEY] C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
          O4 - HKLM\..\Run: [CeEPOWER] C:\Program Files\TOSHIBA\Power Management\CePMTray.exe
          O4 - HKLM\..\Run: [TPNF] C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
          O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
          O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
          O4 - HKLM\..\Run: [EzButton] C:\Program Files\EzButton\EzButton.EXE
          O4 - HKLM\..\Run: [PadTouch] C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
          O4 - HKLM\..\Run: [SM1BG] C:\WINDOWS\SM1BG.EXE
          O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
          O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
          O4 - HKLM\..\Run: [USB Storage Toolbox] C:\Program Files\USBToolbox\Res.EXE
          O4 - HKLM\..\Run: [CloneCDElbyCDFL] "C:\Program Files\Elaborate Bytes\CloneCD\ElbyCheck.exe" /L ElbyCDFL
          O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
          O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
          O4 - HKLM\..\Run: [masqform.exe] C:\Program Files\PureEdge\Viewer 6.0\masqform.exe -UpdateCurrentUser
          O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
          O4 - HKCU\..\Run: [PhotoShow Deluxe Media Manager] C:\PROGRA~1\Ahead\Ahead\data\Xtras\mssysmgr.exe
          O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
          O4 - HKCU\..\Run: [tunebite.exe] C:\Program Files\tunebite\tunebite.exe
          O4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
          O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
          O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
          O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
          O14 - IERESET.INF: START_PAGE_URL=http://www.toshiba.com
          O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
          O16 - DPF: {A93D84FD-641F-43AE-B963-E6FA84BE7FE7} (LinkSys Content Update) - http://www.linksysfix.com/check/netset/install/gtdownls.cab
          O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMesse...pDownloader.cab
          O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\system32\ACS.exe
          O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
          O23 - Service: C-DillaCdaC11BA - C-Dilla Ltd - C:\WINDOWS\system32\drivers\CDAC11BA.EXE
          O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
          O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
          O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
          O23 - Service: CeEPwrSvc - COMPAL ELECTRONIC INC. - C:\Program Files\Toshiba\Power Management\CeEPwrSvc.exe
          O23 - Service: DVD-RAM_Service - Matsu[censored]a Electric Industrial Co., Ltd. - C:\WINDOWS\system32\DVDRAMSV.exe
          O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
          O23 - Service: Norton AntiVirus Auto-Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
          O23 - Service: Norton AntiVirus Firewall Monitor Service (NPFMntor) - Symantec Corporation - C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
          O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
          O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
          O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
          O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
          O23 - Service: Swupdtmr - Unknown owner - c:\Toshiba\Ivp\Swupdate\swupdtmr.exe
          O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
          O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe

          This should do it.  I thank you for all of your help.  Since this is the second time, I feel it is only appropriate to donate to your site...and there are a couple of "adult"  and gambling sites I need to stay away from  http://images.thetechguide.com/forum/public/style_emoticons/<#EMO_DIR#>/unsure.gif\' class=\'bbc_emoticon\' alt=\':unsure:\' />

          Let me know if there is anything else you would like me to do...

          Jerry
          « Last Edit: December 04, 2005, 09:16:31 PM by nunya53 »

          Offline guestolo

          • Site Donator
          • Administrator
          • Hero Member
          • *****
          • Posts: 16034
          • Karma: +1/-0
            • View Profile
            • http://
          Adware infection - svchost???
          « Reply #11 on: December 04, 2005, 11:06:39 PM »
          Can you do some checking for me please, since this is an updated Vundo infection

          Download:  Registry Search Tool from this link
          http://billsway.com/vbspage/

          Unzip and double-click "RegSrch.vbs"
          Note: if your Antivirus or another program prompts about running a ".vbs" file, allow the script to run

          In the open field copy and paste the below in bold then hit OK

          ATLDistrib

          Wait for the results and post them back here
          Could you do the same for the next one too

          3FE36807-69ED-45D1-B9BE-85C0E3F75B6A

          Also, I just want to check on the following
          Set Windows To Show Hidden Files and Folders
              * Click Start.
              * Open My Computer.
              * Select the Tools menu and click Folder Options.
              * Select the View Tab.
              * Under the Hidden files and folders heading select Show hidden files and folders.
              * Uncheck the Hide protected operating system files (recommended) option.
              * Uncheck the Hide Extensions for known file types
              * Click Yes to confirm.
              * Click OK.

          Can you go to this site
          Jotti's Online Malware scan
          Give this site time to load if busy

          Use the browse button and navigate to this file on your hard drive
           C:\WINDOWS\SYSTEM32\NewYcznrzu.xml <-this file

          Right click on it  and choose Select
          Then use the Submit button
          Let it finish scanning
          Could you post back the results of the scans back here please

          Could you do the same for this entry, it may have no ext. or an empty folder
          C:\WINDOWS\ptJtd

          Were you able to delete these 2 files?
          C:\WINDOWS\system32\ccbeg.bak2
          C:\WINDOWS\system32\ccbeg.ini
          If not, look again with Windows now set to show hidden files and folders

          By the way, I'm a 49'ers fan, yah I know, that sucks  http://images.thetechguide.com/forum/public/style_emoticons/<#EMO_DIR#>/biggrin.gif\' class=\'bbc_emoticon\' alt=\':D\' />
          But I live closer to the SeaHawks, so maybe I'll jump on the bandwagon
          « Last Edit: December 04, 2005, 11:08:07 PM by guestolo »

          Do you want to post your own logs from FRST?

          Follow the instructions posted http://www.thetechguide.com/forum/index.php/topic/22942-please-read-how-to-post-logs-from-frst/\'>Click Here


          Offline nunya53

          • Jr. Member
          • **
          • Posts: 50
          • Karma: +0/-0
            • View Profile
          Adware infection - svchost???
          « Reply #12 on: December 04, 2005, 11:54:31 PM »
          Guestolo,

          For the first time in my life, I was a Raiders fan...and they let me down.  Don't worry about jumping off of the 49ers wagon...that one sunk long ago.  If I were a betting man, I would say Colts and Seahawks in the Superbowl.

          I ran everything you asked.  Here is the first regsrch.vbs looking for atldistrib:


          REGEDIT4
          ; RegSrch.vbs © Bill James

          ; Registry search results for string "ATLDistrib" 12/4/2005 10:25:18 PM

          ; NOTE: This file will be deleted when you close WordPad.
          ; You must manually save this file to a new location if you want to refer to it again later.
          ; (If you save the file with a .reg extension, you can use it to restore any Registry changes you make to these values.)


          [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ATLDistrib.ATLDistrib]

          [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ATLDistrib.ATLDistrib]
          @="ATLDistrib Object"

          [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ATLDistrib.ATLDistrib\CLSID]

          [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ATLDistrib.ATLDistrib\CurVer]

          [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ATLDistrib.ATLDistrib\CurVer]
          @="ATLDistrib.ATLDistrib.1"

          [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ATLDistrib.ATLDistrib.1]

          [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ATLDistrib.ATLDistrib.1]
          @="ATLDistrib Object"

          [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ATLDistrib.ATLDistrib.1\CLSID]


          -------  and here is the one looking for 3FE3607-69ED-etc......----------------------------------



          REGEDIT4
          ; RegSrch.vbs © Bill James

          ; Registry search results for string "3FE36807-69ED-45D1-B9BE-85C0E3F75B6A" 12/4/2005 10:29:29 PM

          ; NOTE: This file will be deleted when you close WordPad.
          ; You must manually save this file to a new location if you want to refer to it again later.
          ; (If you save the file with a .reg extension, you can use it to restore any Registry changes you make to these values.)


          [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ATLDistrib.ATLDistrib\CLSID]
          @="{3FE36807-69ED-45D1-B9BE-85C0E3F75B6A}"

          [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ATLDistrib.ATLDistrib.1\CLSID]
          @="{3FE36807-69ED-45D1-B9BE-85C0E3F75B6A}"

          [HKEY_USERS\S-1-5-21-775847664-4091230895-862719317-1006\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{3FE36807-69ED-45D1-B9BE-85C0E3F75B6A}]

          [HKEY_USERS\S-1-5-21-775847664-4091230895-862719317-1006\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{3FE36807-69ED-45D1-B9BE-85C0E3F75B6A}\iexplore]



          I went to Jotti's online and ran the program.  It could not find any infections.  I had several NewYcznrzu*.xml, but chose the basic file...hopefully it took care of the *rzu1, *rzu2, etc...files

          I did not have a file named C:\windows\ptjtd


          I could not find any files named c:\windows\system32\ccbeg.*, even with windows set to show hidden files (I have it set that way as default anyway)

          In anycase, I think  I am better, but that may be temporary....at least the Seahawks are your problem now, not the AFC West's problem anymore.... http://images.thetechguide.com/forum/public/style_emoticons/<#EMO_DIR#>/biggrin.gif\' class=\'bbc_emoticon\' alt=\':D\' />
          « Last Edit: December 04, 2005, 11:58:43 PM by nunya53 »

          Offline guestolo

          • Site Donator
          • Administrator
          • Hero Member
          • *****
          • Posts: 16034
          • Karma: +1/-0
            • View Profile
            • http://
          Adware infection - svchost???
          « Reply #13 on: December 05, 2005, 11:42:32 PM »
          Sorry for the delay, watching Seahawks kick but on Philly  http://images.thetechguide.com/forum/public/style_emoticons/<#EMO_DIR#>/biggrin.gif\' class=\'bbc_emoticon\' alt=\':D\' />

          Can you do the following please

          Open Notepad (START>>>RUN>>>type in notepad)
          Hit OK
          Copy the contents of the CODE box to notepad, not including the word "code"
          In Notepad click FILE>>SAVE AS
          IMPORTANT>>>Change the Save as Type to All Files.
          Name the file as fix.reg
          Save it on the desktop

          Code: [Select]
          REGEDIT4

          [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ATLDistrib.ATLDistrib]

          [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ATLDistrib.ATLDistrib.1]

          [-HKEY_USERS\S-1-5-21-775847664-4091230895-862719317-1006\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{3FE36807-69ED-45D1-B9BE-85C0E3F75B6A}]

          [-HKEY_CLASSES_ROOT\CLSID\{3FE36807-69ED-45D1-B9BE-85C0E3F75B6A}]

          [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{3FE36807-69ED-45D1-B9BE-85C0E3F75B6A}]
          "Compatibility Flags"=dword:00000400


          Double click on fix.reg and allow to add or merge to the registry

          Reboot the computer

          Back in windows


          If everything is running better, please do the following
          You should disable system restore>>Reboot your computer>>and then reenable it
          This will clear all your restore points and ensure you don't restore any nasties
          How to Disable and Re-enable System Restore feature

          Once System Restore is reenabled

          You should have SpywareBlaster, but in case you don't
           install this free tool
          SpywareBlaster 3.4 by JavaCool
          *Will block bad ActiveX Controls
          *Block Malevolent cookies in Internet Explorer and Firefox
          *Restrict actions of potentially dangerous sites in Internet Explorer
          After installation, Check for updates and then click the "Enable all protection"

          Check for updates every couple of weeks
          after every update just simply click the "enable protection...."

          Stay safe  http://images.thetechguide.com/forum/public/style_emoticons/<#EMO_DIR#>/biggrin.gif\' class=\'bbc_emoticon\' alt=\':D\' />
          « Last Edit: December 05, 2005, 11:55:51 PM by guestolo »

          Do you want to post your own logs from FRST?

          Follow the instructions posted http://www.thetechguide.com/forum/index.php/topic/22942-please-read-how-to-post-logs-from-frst/\'>Click Here


          Offline nunya53

          • Jr. Member
          • **
          • Posts: 50
          • Karma: +0/-0
            • View Profile
          Adware infection - svchost???
          « Reply #14 on: December 06, 2005, 09:53:00 AM »
          Guestolo,

          No problems, I was watching the game too, until it became really pointless in the 3rd quarter.

          I did everything, and the system is running great.  Thanks for your expert help.

          Jerry

          Offline guestolo

          • Site Donator
          • Administrator
          • Hero Member
          • *****
          • Posts: 16034
          • Karma: +1/-0
            • View Profile
            • http://
          Adware infection - svchost???
          « Reply #15 on: December 07, 2005, 10:59:25 PM »
          Quote
          No problems, I was watching the game too, until it became really pointless in the 3rd quarter.

          I don't even think it took that long  http://images.thetechguide.com/forum/public/style_emoticons/<#EMO_DIR#>/biggrin.gif\' class=\'bbc_emoticon\' alt=\':D\' />

          Stay safe nunya53
          I'm locking this topic as your problems appear resolved, thanx for running RegSrch on your computer for me
          Great info

          Do you want to post your own logs from FRST?

          Follow the instructions posted http://www.thetechguide.com/forum/index.php/topic/22942-please-read-how-to-post-logs-from-frst/\'>Click Here