Another Smitfraud-C 888 Toolbar Problem

-------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER REPORT
Sunday, May 13, 2007 2:06:49 PM
Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.93.0
Kaspersky Anti-Virus database last update: 13/05/2007
Kaspersky Anti-Virus database records: 318360
-------------------------------------------------------------------------------

Scan Settings:
Scan using the following antivirus database: extended
Scan Archives: true
Scan Mail Bases: true

Scan Target - My Computer:
A:\
C:\
D:\
E:\
F:\
G:\
H:\

Scan Statistics:
Total number of scanned objects: 261418
Number of viruses found: 44
Number of infected objects: 87
Number of suspicious objects: 2
Duration of the scan process: 02:28:09

Infected Object Name / Virus Name / Last Action
C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051065.ocx Infected: Trojan-Downloader.Win32.Agent.ex skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051066.ocx Infected: Trojan-Downloader.Win32.Agent.ex skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051067.exe Infected: Trojan-Downloader.Win32.Delf.cb skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051068.EXE Infected: Trojan-Dropper.Win32.SurfSide.a skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051069.dll Infected: Trojan-Downloader.Win32.Agent.bt skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051070.dll Infected: Trojan-Downloader.Win32.Agent.bt skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051071.dll Infected: Trojan-Downloader.Win32.Agent.br skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051072.dll Infected: Trojan-Downloader.Win32.Agent.br skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051073.sys Infected: Trojan.Win32.Delprot.a skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051074.exe Infected: Backdoor.Win32.CommInet.s skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051075.dll Infected: Trojan-Downloader.Win32.Agent.kf skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051086.exe Infected: not-a-virus:AdWare.Win32.ISearch.d skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051087.exe/clientax.dll Infected: not-a-virus:AdWare.Win32.180Solutions.g skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051087.exe CAB: infected - 1 skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051088.exe Infected: not-a-virus:AdWare.Win32.MDH.e skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051089.exe Infected: not-a-virus:AdWare.Win32.WinAD.at skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051090.EXE/WISE0001.BIN Infected: not-a-virus:AdWare.Win32.VirtualBouncer.j skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051090.EXE WiseSFX: infected - 1 skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051090.EXE WiseSFX Dropper: infected - 1 skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051091.exe Infected: not-a-virus:AdWare.Win32.BetterInternet skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051092.exe Infected: not-a-virus:AdWare.Win32.Apropos.b skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051093.dll Infected: not-a-virus:AdWare.Win32.Gator.1101 skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051094.dll Infected: not-a-virus:AdWare.Win32.Coreak skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051095.dll Infected: not-a-virus:AdWare.Win32.Coreak skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051096.dll Infected: not-a-virus:AdWare.Win32.Couponage.a skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051097.dll Infected: not-a-virus:AdWare.Win32.Couponage.a skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051098.exe Infected: not-a-virus:AdWare.Win32.PurityScan.be skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051106.exe Infected: not-a-virus:Downloader.Win32.Awmcash.a skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP274\A0061514.exe/InpB/SskBho.dll Infected: not-a-virus:AdWare.Win32.TotalVelocity.v skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP274\A0061514.exe/InpB/SskCore.dll Infected: not-a-virus:AdWare.Win32.TotalVelocity.aj skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP274\A0061514.exe/InpB/Ssk.exe Infected: not-a-virus:AdWare.Win32.TotalVelocity.aj skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP274\A0061514.exe/InpB Infected: not-a-virus:AdWare.Win32.TotalVelocity.aj skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP274\A0061514.exe CAB: infected - 4 skipped
C:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP275\change.log Object is locked skipped
F:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
F:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
F:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
F:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
F:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
F:\Documents and Settings\LocalService\ntuser.dat Object is locked skipped
F:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
F:\Documents and Settings\Manimillion\Application Data\Lavasoft\Ad-Aware\Logs\AWEVLOG.txt Object is locked skipped
F:\Documents and Settings\Manimillion\Cookies\index.dat Object is locked skipped
F:\Documents and Settings\Manimillion\Desktop\siyavesh\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\ActiveXComponent.class-2cd8806b-26526179.class Infected: Trojan.Win32.Diamin.js skipped
F:\Documents and Settings\Manimillion\Desktop\siyavesh\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\arr3.jar-44f46a26-4870c121.zip/Counter.class Infected: Trojan.Java.ClassLoader.i skipped
F:\Documents and Settings\Manimillion\Desktop\siyavesh\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\arr3.jar-44f46a26-4870c121.zip/VerifierBug.class Infected: Trojan.Java.ClassLoader.k skipped
F:\Documents and Settings\Manimillion\Desktop\siyavesh\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\arr3.jar-44f46a26-4870c121.zip/Beyond.class Infected: Trojan.Java.ClassLoader.k skipped
F:\Documents and Settings\Manimillion\Desktop\siyavesh\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\arr3.jar-44f46a26-4870c121.zip ZIP: infected - 3 skipped
F:\Documents and Settings\Manimillion\Desktop\siyavesh\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\arr3.jar-44f46a27-241dc523.zip/Counter.class Infected: Trojan.Java.ClassLoader.i skipped
F:\Documents and Settings\Manimillion\Desktop\siyavesh\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\arr3.jar-44f46a27-241dc523.zip/VerifierBug.class Infected: Trojan.Java.ClassLoader.k skipped
F:\Documents and Settings\Manimillion\Desktop\siyavesh\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\arr3.jar-44f46a27-241dc523.zip/Beyond.class Infected: Trojan.Java.ClassLoader.k skipped
F:\Documents and Settings\Manimillion\Desktop\siyavesh\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\arr3.jar-44f46a27-241dc523.zip ZIP: infected - 3 skipped
F:\Documents and Settings\Manimillion\Desktop\siyavesh\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-367f7d2e-146d9b28.zip/BlackBox.class Infected: Exploit.Java.ByteVerify skipped
F:\Documents and Settings\Manimillion\Desktop\siyavesh\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-367f7d2e-146d9b28.zip/VerifierBug.class Infected: Exploit.Java.ByteVerify skipped
F:\Documents and Settings\Manimillion\Desktop\siyavesh\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-367f7d2e-146d9b28.zip/Beyond.class Infected: Trojan-Downloader.Java.OpenConnection.aa skipped
F:\Documents and Settings\Manimillion\Desktop\siyavesh\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-367f7d2e-146d9b28.zip ZIP: infected - 3 skipped
F:\Documents and Settings\Manimillion\Desktop\SmitfraudFix\Reboot.exe Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped
F:\Documents and Settings\Manimillion\Desktop\SmitfraudFix\SmitfraudFix.zip/SmitfraudFix/Reboot.exe Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped
F:\Documents and Settings\Manimillion\Desktop\SmitfraudFix\SmitfraudFix.zip ZIP: infected - 1 skipped
F:\Documents and Settings\Manimillion\Desktop\SmitfraudFix.exe/data.rar/SmitfraudFix/Reboot.exe Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped
F:\Documents and Settings\Manimillion\Desktop\SmitfraudFix.exe/data.rar Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped
F:\Documents and Settings\Manimillion\Desktop\SmitfraudFix.exe RarSFX: infected - 2 skipped
F:\Documents and Settings\Manimillion\Local Settings\Application Data\ApplicationHistory\cli.exe.76111974.ini.inuse Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\Application Data\Microsoft\Messenger\manimillion@hotmail.com\SharingMetadata\Logs\Dfsr00005.log Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\Application Data\Microsoft\Messenger\manimillion@hotmail.com\SharingMetadata\pending.dat Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\Application Data\Microsoft\Messenger\manimillion@hotmail.com\SharingMetadata\Working\database_B840_CFF9_40CF_BBFE\dfsr.db Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\Application Data\Microsoft\Messenger\manimillion@hotmail.com\SharingMetadata\Working\database_B840_CFF9_40CF_BBFE\fsr.log Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\Application Data\Microsoft\Messenger\manimillion@hotmail.com\SharingMetadata\Working\database_B840_CFF9_40CF_BBFE\fsrtmp.log Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\Application Data\Microsoft\Messenger\manimillion@hotmail.com\SharingMetadata\Working\database_B840_CFF9_40CF_BBFE\tmp.edb Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\Application Data\Microsoft\Windows Live Contacts\manimillion@hotmail.com\real\members.stg Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\Application Data\Microsoft\Windows Live Contacts\manimillion@hotmail.com\shadow\members.stg Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\History\History.IE5\index.dat Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\History\History.IE5\MSHist012007051320070514\index.dat Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\Temp\Perflib_Perfdata_230.dat Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\Temp\Perflib_Perfdata_af4.dat Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\Temp\Perflib_Perfdata_b14.dat Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\Temp\~DFD08E.tmp Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\Temp\~DFD0B1.tmp Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\Temp\~DFDC8E.tmp Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\Temp\~DFDD70.tmp Object is locked skipped
F:\Documents and Settings\Manimillion\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
F:\Documents and Settings\Manimillion\ntuser.dat Object is locked skipped
F:\Documents and Settings\Manimillion\ntuser.dat.LOG Object is locked skipped
F:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
F:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
F:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
F:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
F:\Nima\Documents and Settings\Nima .NIMA\Desktop\SmitfraudFix\Reboot.exe Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped
F:\Nima\Documents and Settings\Nima .NIMA\Desktop\SmitfraudFix.exe/data.rar/SmitfraudFix/Reboot.exe Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped
F:\Nima\Documents and Settings\Nima .NIMA\Desktop\SmitfraudFix.exe/data.rar Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped
F:\Nima\Documents and Settings\Nima .NIMA\Desktop\SmitfraudFix.exe RarSFX: infected - 2 skipped
F:\Nima\Documents and Settings\Nima .NIMA\Desktop\SmitfraudFix.exe PE_Patch.UPX: infected - 2 skipped
F:\Nima\Program Files\Mozilla Firefox\SmitfraudFix\Reboot.exe Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped
F:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP264\A0050729.exe Infected: not-a-virus:RiskTool.Win32.Reboot.f skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0050941.dll Suspicious: Packed.Win32.Morphine.a skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0050948.dll Suspicious: Packed.Win32.Morphine.a skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051056.dll Infected: Trojan.Win32.Agent.qt skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051076.exe Infected: Trojan-PSW.Win32.Small.bs skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051077.exe/data0002 Infected: Trojan.Win32.BHO.ab skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051077.exe/data0004 Infected: not-a-virus:AdWare.Win32.BookedSpace.h skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051077.exe NSIS: infected - 2 skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051078.dll Infected: Trojan.Win32.BHO.ab skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051081.exe Infected: Trojan-Downloader.Win32.Agent.awf skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051082.exe Infected: Trojan-Downloader.Win32.Agent.awf skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051083.exe Infected: Trojan-Dropper.Win32.Agent.bfr skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051084.exe Infected: Trojan-Downloader.Win32.Alphabet.gen skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051099.dll Infected: not-a-virus:AdWare.Win32.PurityScan.ak skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051100.exe Infected: not-a-virus:AdWare.Win32.NewDotNet skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051102.old/EXE-file Infected: not-a-virus:AdWare.Win32.BHO.by skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051102.old Embedded EXE: infected - 1 skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051103.dll Infected: not-a-virus:AdWare.Win32.BHO.by skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051104.exe Infected: not-a-virus:AdWare.Win32.BookedSpace.h skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP267\A0051105.exe Infected: not-a-virus:AdWare.Win32.BookedSpace.h skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP274\A0054486.exe Infected: Trojan.Win32.Agent.xk skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP274\A0054540.sys Infected: Backdoor.Win32.Haxdoor.ii skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP274\A0054541.sys Infected: Backdoor.Win32.Haxdoor.ii skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP274\A0061515.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.hb skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP274\A0061516.dll Infected: Trojan.Win32.Agent.qt skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP275\A0062446.exe Infected: Trojan-Clicker.Win32.Small.cf skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP275\A0062447.exe Infected: Trojan-Downloader.Win32.Agent.bnn skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP275\A0062448.exe Infected: not-a-virus:AdWare.Win32.NewDotNet skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP275\A0062457.exe Infected: Trojan-Clicker.Win32.Small.cf skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP275\A0062458.exe Infected: Trojan-Downloader.Win32.Agent.bnn skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP275\A0062459.exe Infected: not-a-virus:AdWare.Win32.NewDotNet skipped
F:\System Volume Information\_restore{795D6D6C-833B-4800-8438-A57CF080AC85}\RP275\change.log Object is locked skipped
 
F:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
F:\WINDOWS\SchedLgU.Txt Object is locked skipped
F:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
F:\WINDOWS\Sti_Trace.log Object is locked skipped
F:\WINDOWS\system32\CatRoot2\edb.log Object is locked skipped
F:\WINDOWS\system32\CatRoot2\tmp.edb Object is locked skipped
F:\WINDOWS\system32\config\ACEEvent.evt Object is locked skipped
F:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
F:\WINDOWS\system32\config\default Object is locked skipped
F:\WINDOWS\system32\config\default.LOG Object is locked skipped
F:\WINDOWS\system32\config\SAM Object is locked skipped
F:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
F:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
F:\WINDOWS\system32\config\SECURITY Object is locked skipped
F:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
F:\WINDOWS\system32\config\software Object is locked skipped
F:\WINDOWS\system32\config\software.LOG Object is locked skipped
F:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
F:\WINDOWS\system32\config\system Object is locked skipped
F:\WINDOWS\system32\config\system.LOG Object is locked skipped
F:\WINDOWS\system32\h323log.txt Object is locked skipped
F:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
F:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped
F:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped
F:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped
F:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped
F:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
F:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped
F:\WINDOWS\Temp\Perflib_Perfdata_7cc.dat Object is locked skipped
F:\WINDOWS\wiadebug.log Object is locked skipped
F:\WINDOWS\wiaservc.log Object is locked skipped
F:\WINDOWS\WindowsUpdate.log Object is locked skipped

Scan process completed.
 
Hi

Empty this folder:

F:\Documents and Settings\Manimillion\Desktop\siyavesh\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache

Empty Recycle Bin

Otherwise looking good :)

Still problems?
 
Hi

Empty this folder:

F:\Documents and Settings\Manimillion\Desktop\siyavesh\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache

Empty Recycle Bin

Otherwise looking good :)

Still problems?

Thanks for your help. It is much better, and doesn't seem to be infected with Smitfraud anymore. But I realised that when ever I use www.google.com, the searches return the same links.

Links like :

http://shopperssavingcenter.net
http://consumerincentives.net
http://www.bigvideosonline.com
http://www.TheCanadianMeds.com

and etc...

:red:
 
Hi

Let's see if wareout is present:

Please download FixWareout from one of these sites:
http://downloads.subratam.org/Fixwareout.exe
http://www.bleepingcomputer.com/files/lonny/Fixwareout.exe

  • Save it to your desktop and run it. Click Next, then Install, make sure Run fixit is checked and click Finish.
  • The fix will begin; follow the prompts.
  • You will be asked to reboot your computer; please do so.
  • Your system may take longer than usual to load; this is normal.
  • Once the desktop loads, post the text that will open (report.txt) and a new Hijackthis log in the forum please.
 
Fixwareout Last edited 4/5/2007
Post this report in the forums please
...
»»»»»Prerun check

»»»»» System restarted

»»»»» Postrun check
....
....
»»»»» Misc files.
....
»»»»» Checking for older varients.
....

Search five digit cs, dm, kd, jb, other, files.
The following files NEED TO BE SUBMITTED to one of the following URL'S for further inspection.



Click browse, find the file then click submit.
http://www.virustotal.com/flash/index_en.html
Or http://virusscan.jotti.org/

»»»»» Other



»»»»» Current runs
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"="F:\\Program Files\\Java\\jre1.5.0_06\\bin\\jusched.exe"
"QuickTime Task"="\"F:\\Program Files\\QuickTime\\qttask.exe\" -atboottime"
"Jet Detection"="\"F:\\Program Files\\Creative\\SBLive\\PROGRAM\\ADGJDet.exe\""
"ATICCC"="\"F:\\Program Files\\ATI Technologies\\ATI.ACE\\cli.exe\" runtime -Delay"
"WINDVDPatch"="CTHELPER.EXE"
"UpdReg"="F:\\WINDOWS\\UpdReg.EXE"
"Ptipbmf"="rundll32.exe ptipbmf.dll,SetWriteCacheMode"
"NeroFilterCheck"="F:\\WINDOWS\\system32\\NeroCheck.exe"

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AWMON"="\"F:\\Program Files\\Lavasoft\\Ad-Aware SE Professional\\Ad-Watch.exe\""
....
Hosts file was reset, If you use a custom hosts file please replace it
»»»»» End report »»»»»




Logfile of HijackThis v1.99.1
Scan saved at 3:21:47 PM, on 5/14/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
F:\WINDOWS\System32\smss.exe
F:\WINDOWS\system32\winlogon.exe
F:\WINDOWS\system32\services.exe
F:\WINDOWS\system32\lsass.exe
F:\WINDOWS\system32\Ati2evxx.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\System32\svchost.exe
F:\WINDOWS\system32\Ati2evxx.exe
F:\WINDOWS\system32\spoolsv.exe
F:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
F:\Program Files\Diskeeper Corporation\Diskeeper\DkService.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\Explorer.EXE
F:\WINDOWS\system32\wscntfy.exe
F:\WINDOWS\system32\wuauclt.exe
F:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
F:\Program Files\ATI Technologies\ATI.ACE\cli.exe
F:\WINDOWS\system32\CTHELPER.EXE
F:\Program Files\Lavasoft\Ad-Aware SE Professional\Ad-Watch.exe
F:\WINDOWS\system32\devldr32.exe
F:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
F:\Program Files\ATI Technologies\ATI.ACE\cli.exe
F:\Program Files\ATI Technologies\ATI.ACE\cli.exe
F:\HJT\HijackThis.exe

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - F:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - F:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [SunJavaUpdateSched] F:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
O4 - HKLM\..\Run: [QuickTime Task] "F:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [Jet Detection] "F:\Program Files\Creative\SBLive\PROGRAM\ADGJDet.exe"
O4 - HKLM\..\Run: [ATICCC] "F:\Program Files\ATI Technologies\ATI.ACE\cli.exe" runtime -Delay
O4 - HKLM\..\Run: [WINDVDPatch] CTHELPER.EXE
O4 - HKLM\..\Run: [UpdReg] F:\WINDOWS\UpdReg.EXE
O4 - HKLM\..\Run: [Ptipbmf] rundll32.exe ptipbmf.dll,SetWriteCacheMode
O4 - HKLM\..\Run: [NeroFilterCheck] F:\WINDOWS\system32\NeroCheck.exe
O4 - HKCU\..\Run: [AWMON] "F:\Program Files\Lavasoft\Ad-Aware SE Professional\Ad-Watch.exe"
O4 - Startup: Adobe Gamma.lnk = F:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = F:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} (Facebook Photo Uploader Control) - http://upload.facebook.com/controls/FacebookPhotoUploader.cab
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{38758BC7-03BB-4FC5-9C39-491B9F333F11}: NameServer = 194.54.90.226
O17 - HKLM\System\CCS\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: NameServer = 194.54.90.226
O17 - HKLM\System\CCS\Services\Tcpip\..\{9691CF80-9A9E-45E9-9E4A-B666AF7DFDC9}: NameServer = 194.54.90.226
O17 - HKLM\System\CCS\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: NameServer = 194.54.90.226
O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - F:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
O23 - Service: Adobe LM Service - Adobe Systems - F:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - F:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - F:\WINDOWS\system32\ati2sgag.exe
O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - F:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: .NET Runtime Optimization Service v2.0.50727_X86 (clr_optimization_v2.0.50727_32) - Unknown owner - F:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe (file missing)
O23 - Service: Diskeeper - Diskeeper Corporation - F:\Program Files\Diskeeper Corporation\Diskeeper\DkService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - F:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe
O23 - Service: MSCSPTISRV - Sony Corporation - F:\Program Files\Common Files\Sony Shared\AVLib\MSCSPTISRV.exe
O23 - Service: PACSPTISVR - Sony Corporation - F:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - F:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: SonicStage SCSI Service (SSScsiSV) - Sony Corporation - F:\Program Files\Common Files\Sony Shared\AVLib\SSScsiSV.exe
 
Hi

Download F-Secure Blacklight and save it to your desktop -> https://europe.f-secure.com/blacklight/try.shtml

Doubleclick fsbl.exe, accept the agreement, click Scan, then click Next

You'll see a list what have been found. A log will appear to your desktop, it is named fsbl.xxxxxxx.log (xxxxxxx will be random numbers).

DON'T choose Rename if something was found!

Post the contents of fsbl.xxxx.log to here (xxxx= random numbers,blacklight log from your desktop)
 
05/15/07 10:10:22 [Info]: BlackLight Engine 1.0.61 initialized
05/15/07 10:10:22 [Info]: OS: 5.1 build 2600 (Service Pack 2)
05/15/07 10:10:22 [Note]: 7019 4
05/15/07 10:10:22 [Note]: 7005 0
05/15/07 10:10:23 [Note]: 7006 0
05/15/07 10:10:23 [Note]: 7011 1896
05/15/07 10:10:23 [Note]: 7026 0
05/15/07 10:10:23 [Note]: 7026 0
05/15/07 10:10:26 [Note]: FSRAW library version 1.7.1021
05/15/07 10:12:43 [Note]: 2000 1012
05/15/07 10:12:43 [Note]: 7007 0
 
Hi

Next I have to ask if you live in Ukraine?

Because your internet seems to come from Ukraine.
 
Hi

Then we do this:

Please download SmitfraudFix (by S!Ri)

Double-click SmitfraudFix.exe.
Select option #5 - Search and clean DNS hijack by typing 5 and press "Enter"; a text file will appear, which lists infected files (if present).
Please copy/paste the content of that report into your next reply.

**If the tool fails to launch from the Desktop, please move SmitfraudFix.exe directly to the root of the system drive (usually C:), and launch from there.

Note : process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.

Post:

- a fresh HijackThis log
- smitfraudfix report
http://www.beyondlogic.org/consulting/proc...processutil.htm
 
SmitFraudFix v2.176

Scan done at 9:27:38.59, Wed 05/16/2007
Run from F:\Documents and Settings\Manimillion\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in normal mode

»»»»»»»»»»»»»»»»»»»»»»»» DNS Before Fix

Description: Marvell Yukon Gigabit Ethernet 10/100/1000Base-T Adapter, Copper RJ-45 #2 - Packet Scheduler Miniport
DNS Server Search Order: 194.54.90.226

Description: Marvell Yukon Gigabit Ethernet 10/100/1000Base-T Adapter, Copper RJ-45 #2 - Packet Scheduler Miniport
DNS Server Search Order: 194.54.90.226

HKLM\SYSTEM\CCS\Services\Tcpip\..\{38758BC7-03BB-4FC5-9C39-491B9F333F11}: NameServer=194.54.90.226
HKLM\SYSTEM\CCS\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CCS\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: NameServer=194.54.90.226
HKLM\SYSTEM\CCS\Services\Tcpip\..\{9691CF80-9A9E-45E9-9E4A-B666AF7DFDC9}: NameServer=194.54.90.226
HKLM\SYSTEM\CCS\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CCS\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: NameServer=194.54.90.226
HKLM\SYSTEM\CS1\Services\Tcpip\..\{38758BC7-03BB-4FC5-9C39-491B9F333F11}: NameServer=194.54.90.226
HKLM\SYSTEM\CS1\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS1\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: NameServer=194.54.90.226
HKLM\SYSTEM\CS1\Services\Tcpip\..\{9691CF80-9A9E-45E9-9E4A-B666AF7DFDC9}: NameServer=194.54.90.226
HKLM\SYSTEM\CS1\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS1\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: NameServer=194.54.90.226
HKLM\SYSTEM\CS2\Services\Tcpip\..\{38758BC7-03BB-4FC5-9C39-491B9F333F11}: NameServer=194.54.90.226
HKLM\SYSTEM\CS2\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS2\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: NameServer=194.54.90.226
HKLM\SYSTEM\CS2\Services\Tcpip\..\{9691CF80-9A9E-45E9-9E4A-B666AF7DFDC9}: NameServer=194.54.90.226
HKLM\SYSTEM\CS2\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS2\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: NameServer=194.54.90.226
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=67.69.184.7 67.69.184.135

»»»»»»»»»»»»»»»»»»»»»»»» DNS After Fix

Description: Marvell Yukon Gigabit Ethernet 10/100/1000Base-T Adapter, Copper RJ-45 #2 - Packet Scheduler Miniport
DNS Server Search Order: 194.54.90.226

Description: Marvell Yukon Gigabit Ethernet 10/100/1000Base-T Adapter, Copper RJ-45 #2 - Packet Scheduler Miniport
DNS Server Search Order: 194.54.90.226

HKLM\SYSTEM\CCS\Services\Tcpip\..\{38758BC7-03BB-4FC5-9C39-491B9F333F11}: NameServer=194.54.90.226
HKLM\SYSTEM\CCS\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CCS\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: NameServer=194.54.90.226
HKLM\SYSTEM\CCS\Services\Tcpip\..\{9691CF80-9A9E-45E9-9E4A-B666AF7DFDC9}: NameServer=194.54.90.226
HKLM\SYSTEM\CCS\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CCS\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: NameServer=194.54.90.226
HKLM\SYSTEM\CS1\Services\Tcpip\..\{38758BC7-03BB-4FC5-9C39-491B9F333F11}: NameServer=194.54.90.226
HKLM\SYSTEM\CS1\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS1\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: NameServer=194.54.90.226
HKLM\SYSTEM\CS1\Services\Tcpip\..\{9691CF80-9A9E-45E9-9E4A-B666AF7DFDC9}: NameServer=194.54.90.226
HKLM\SYSTEM\CS1\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS1\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: NameServer=194.54.90.226
HKLM\SYSTEM\CS2\Services\Tcpip\..\{38758BC7-03BB-4FC5-9C39-491B9F333F11}: NameServer=194.54.90.226
HKLM\SYSTEM\CS2\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS2\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: NameServer=194.54.90.226
HKLM\SYSTEM\CS2\Services\Tcpip\..\{9691CF80-9A9E-45E9-9E4A-B666AF7DFDC9}: NameServer=194.54.90.226
HKLM\SYSTEM\CS2\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS2\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: NameServer=194.54.90.226
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=67.69.184.7 67.69.184.135
 
Logfile of HijackThis v1.99.1
Scan saved at 9:28:29 AM, on 5/16/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
F:\WINDOWS\System32\smss.exe
F:\WINDOWS\system32\winlogon.exe
F:\WINDOWS\system32\services.exe
F:\WINDOWS\system32\lsass.exe
F:\WINDOWS\system32\Ati2evxx.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\System32\svchost.exe
F:\WINDOWS\system32\Ati2evxx.exe
F:\WINDOWS\system32\spoolsv.exe
F:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
F:\Program Files\Diskeeper Corporation\Diskeeper\DkService.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\Explorer.EXE
F:\WINDOWS\system32\wscntfy.exe
F:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
F:\Program Files\ATI Technologies\ATI.ACE\cli.exe
F:\WINDOWS\system32\CTHELPER.EXE
F:\Program Files\Lavasoft\Ad-Aware SE Professional\Ad-Watch.exe
F:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
F:\WINDOWS\system32\devldr32.exe
F:\Program Files\Internet Explorer\IEXPLORE.EXE
F:\Program Files\ATI Technologies\ATI.ACE\cli.exe
F:\Program Files\ATI Technologies\ATI.ACE\cli.exe
F:\WINDOWS\system32\wuauclt.exe
F:\HJT\HijackThis.exe

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - F:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - F:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [SunJavaUpdateSched] F:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
O4 - HKLM\..\Run: [QuickTime Task] "F:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [Jet Detection] "F:\Program Files\Creative\SBLive\PROGRAM\ADGJDet.exe"
O4 - HKLM\..\Run: [ATICCC] "F:\Program Files\ATI Technologies\ATI.ACE\cli.exe" runtime -Delay
O4 - HKLM\..\Run: [WINDVDPatch] CTHELPER.EXE
O4 - HKLM\..\Run: [UpdReg] F:\WINDOWS\UpdReg.EXE
O4 - HKLM\..\Run: [Ptipbmf] rundll32.exe ptipbmf.dll,SetWriteCacheMode
O4 - HKLM\..\Run: [NeroFilterCheck] F:\WINDOWS\system32\NeroCheck.exe
O4 - HKCU\..\Run: [AWMON] "F:\Program Files\Lavasoft\Ad-Aware SE Professional\Ad-Watch.exe"
O4 - Startup: Adobe Gamma.lnk = F:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = F:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} (Facebook Photo Uploader Control) - http://upload.facebook.com/controls/FacebookPhotoUploader.cab
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{38758BC7-03BB-4FC5-9C39-491B9F333F11}: NameServer = 194.54.90.226
O17 - HKLM\System\CCS\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: NameServer = 194.54.90.226
O17 - HKLM\System\CCS\Services\Tcpip\..\{9691CF80-9A9E-45E9-9E4A-B666AF7DFDC9}: NameServer = 194.54.90.226
O17 - HKLM\System\CCS\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: NameServer = 194.54.90.226
O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - F:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
O23 - Service: Adobe LM Service - Adobe Systems - F:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - F:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - F:\WINDOWS\system32\ati2sgag.exe
O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - F:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: .NET Runtime Optimization Service v2.0.50727_X86 (clr_optimization_v2.0.50727_32) - Unknown owner - F:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe (file missing)
O23 - Service: Diskeeper - Diskeeper Corporation - F:\Program Files\Diskeeper Corporation\Diskeeper\DkService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - F:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe
O23 - Service: MSCSPTISRV - Sony Corporation - F:\Program Files\Common Files\Sony Shared\AVLib\MSCSPTISRV.exe
O23 - Service: PACSPTISVR - Sony Corporation - F:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - F:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: SonicStage SCSI Service (SSScsiSV) - Sony Corporation - F:\Program Files\Common Files\Sony Shared\AVLib\SSScsiSV.exe
 
Hi

That didn't work at all

Open HijackThis, click do a system scan only and checkmark these:

O17 - HKLM\System\CCS\Services\Tcpip\..\{38758BC7-03BB-4FC5-9C39-491B9F333F11}: NameServer = 194.54.90.226
O17 - HKLM\System\CCS\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: NameServer = 194.54.90.226
O17 - HKLM\System\CCS\Services\Tcpip\..\{9691CF80-9A9E-45E9-9E4A-B666AF7DFDC9}: NameServer = 194.54.90.226
O17 - HKLM\System\CCS\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: NameServer = 194.54.90.226


Close all windows including browser and press fix checked.

Reboot

Re-run smitfraudfix with option 5

Post:

- a fresh HijackThis log
- smitfraudfix report
 
SmitFraudFix v2.176

Scan done at 12:18:17.73, Wed 05/16/2007
Run from F:\Documents and Settings\Manimillion\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in normal mode

»»»»»»»»»»»»»»»»»»»»»»»» DNS Before Fix

Description: Marvell Yukon Gigabit Ethernet 10/100/1000Base-T Adapter, Copper RJ-45 #2 - Packet Scheduler Miniport
DNS Server Search Order: 67.69.184.7
DNS Server Search Order: 67.69.184.135

Description: Marvell Yukon Gigabit Ethernet 10/100/1000Base-T Adapter, Copper RJ-45 #2 - Packet Scheduler Miniport
DNS Server Search Order: 67.69.184.7
DNS Server Search Order: 67.69.184.135

HKLM\SYSTEM\CCS\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CCS\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS1\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS1\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS2\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS2\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=67.69.184.7 67.69.184.135

»»»»»»»»»»»»»»»»»»»»»»»» DNS After Fix

Description: Marvell Yukon Gigabit Ethernet 10/100/1000Base-T Adapter, Copper RJ-45 #2 - Packet Scheduler Miniport
DNS Server Search Order: 67.69.184.7
DNS Server Search Order: 67.69.184.135

Description: Marvell Yukon Gigabit Ethernet 10/100/1000Base-T Adapter, Copper RJ-45 #2 - Packet Scheduler Miniport
DNS Server Search Order: 67.69.184.7
DNS Server Search Order: 67.69.184.135

HKLM\SYSTEM\CCS\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CCS\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS1\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS1\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS2\Services\Tcpip\..\{6997802A-5F40-4112-87D9-EAAE31AE4577}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS2\Services\Tcpip\..\{B7CDEE57-8186-4157-9013-77B7208A9F4D}: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=67.69.184.7 67.69.184.135
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=67.69.184.7 67.69.184.135
 
Logfile of HijackThis v1.99.1
Scan saved at 12:19:53 PM, on 5/16/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
F:\WINDOWS\System32\smss.exe
F:\WINDOWS\system32\winlogon.exe
F:\WINDOWS\system32\services.exe
F:\WINDOWS\system32\lsass.exe
F:\WINDOWS\system32\Ati2evxx.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\System32\svchost.exe
F:\WINDOWS\system32\Ati2evxx.exe
F:\WINDOWS\system32\spoolsv.exe
F:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
F:\Program Files\Diskeeper Corporation\Diskeeper\DkService.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\system32\wuauclt.exe
F:\WINDOWS\system32\wscntfy.exe
F:\WINDOWS\Explorer.EXE
F:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
F:\Program Files\ATI Technologies\ATI.ACE\cli.exe
F:\WINDOWS\system32\CTHELPER.EXE
F:\Program Files\Lavasoft\Ad-Aware SE Professional\Ad-Watch.exe
F:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
F:\WINDOWS\system32\devldr32.exe
F:\Program Files\ATI Technologies\ATI.ACE\cli.exe
F:\Program Files\ATI Technologies\ATI.ACE\cli.exe
F:\Program Files\Internet Explorer\IEXPLORE.EXE
F:\HJT\HijackThis.exe

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - F:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - F:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [SunJavaUpdateSched] F:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
O4 - HKLM\..\Run: [QuickTime Task] "F:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [Jet Detection] "F:\Program Files\Creative\SBLive\PROGRAM\ADGJDet.exe"
O4 - HKLM\..\Run: [ATICCC] "F:\Program Files\ATI Technologies\ATI.ACE\cli.exe" runtime -Delay
O4 - HKLM\..\Run: [WINDVDPatch] CTHELPER.EXE
O4 - HKLM\..\Run: [UpdReg] F:\WINDOWS\UpdReg.EXE
O4 - HKLM\..\Run: [Ptipbmf] rundll32.exe ptipbmf.dll,SetWriteCacheMode
O4 - HKLM\..\Run: [NeroFilterCheck] F:\WINDOWS\system32\NeroCheck.exe
O4 - HKCU\..\Run: [AWMON] "F:\Program Files\Lavasoft\Ad-Aware SE Professional\Ad-Watch.exe"
O4 - Startup: Adobe Gamma.lnk = F:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = F:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} (Facebook Photo Uploader Control) - http://upload.facebook.com/controls/FacebookPhotoUploader.cab
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - F:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
O23 - Service: Adobe LM Service - Adobe Systems - F:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - F:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - F:\WINDOWS\system32\ati2sgag.exe
O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - F:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: .NET Runtime Optimization Service v2.0.50727_X86 (clr_optimization_v2.0.50727_32) - Unknown owner - F:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe (file missing)
O23 - Service: Diskeeper - Diskeeper Corporation - F:\Program Files\Diskeeper Corporation\Diskeeper\DkService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - F:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe
O23 - Service: MSCSPTISRV - Sony Corporation - F:\Program Files\Common Files\Sony Shared\AVLib\MSCSPTISRV.exe
O23 - Service: PACSPTISVR - Sony Corporation - F:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - F:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: SonicStage SCSI Service (SSScsiSV) - Sony Corporation - F:\Program Files\Common Files\Sony Shared\AVLib\SSScsiSV.exe
 
Everything seems great!

Thanks for your help!

What is a good anti virus to run to prevent these from happening?

I've got AdWatch right now.
 
Hi

Then you're clean!

As for good antiviruses/firewalls, see below

Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:

Looking over your log, it seems you don't have any evidence of an anti-virus software.

Anti-virus software are programs that detect, cleanse, and erase harmful virus files on a computer, Web server, or network. Unchecked, virus files can unintentionally be forwarded to others, including trading partners and thereby spreading infection. Because new viruses regularly emerge, anti-virus software should be updated frequently. Anti-virus software can scan the computer memory and disk drives for malicious code. They can alert the user if a virus is present, and will clean, delete (or quarantine) infected files or directories. Please download a free anti-virus software from one these excellent vendors NOW:

1) Antivir PersonalEdition Classic - Free anti-virus software for Windows. Detects and removes more than 50,000 viruses. Free support.
2) avast! 4 Home Edition - Anti-virus program for Windows. The home edition is freeware for noncommercial users.
3) AVG Anti-Virus Free Edition - Free edition of the AVG anti-virus program for Windows.

It is strongly recommended that you run only one antivirus program at a time. Having more than one antivirus program active in memory uses additional resources and can result in program conflicts and false virus alerts. If you choose to install more than one antivirus program on your computer, then only one of them should be active in memory at a time.

Looking over your log, it seems you don't have any evidence of a third party firewall.

As the term conveys, a firewall is an extra layer of security installed onto computers, which restricts access to systems from the outside world. Firewalls protect against hackers and malicious intruders. I want you to download a free firewall NOW from one of these excellent vendors:

1) ZoneAlarm
2) Agnitum
3) Sunbelt/Kerio
4) Comodo

If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.

Looking over your log, it seems you don't have any evidence of a third party firewall.

As the term conveys, a firewall is an extra layer of security installed onto computers, which restricts access to systems from the outside world. Firewalls protect against hackers and malicious intruders. I want you to download a free firewall NOW from one of these excellent vendors:

1) ZoneAlarm
2) Agnitum
3) Sunbelt/Kerio
4) Comodo

If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time. Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system. A malicious site could render Java content under older, vulnerable versions of Sun's software if the user has not removed them. Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) 6 Update 1 and save it to your desktop.
  • Scroll down to where it says "Java Runtime Environment (JRE) 6u1...allows end-users to run Java applications".
  • Click the "Download" button to the right.
  • Read the License Agreement and then check the box that says: "Accept License Agreement".
  • The page will refresh.
  • Click on the link to download Windows Offline Installation and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
  • Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u1-windows-i586-p.exe to install the newest version.

  • Disable and Enable System Restore. - If you are using Window XP then you should disable and re-enable system restore to make sure there are no infected files found in a restore point.

    You can find instructions on how to enable and reenable system restore here:

    Windows XP System Restore Guide

Reenable system restore with instructions from tutorial above

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
  • From within Internet Explorer click on the Tools menu and then click on Options.
  • Click once on the Security tab
  • Click once on the Internet icon so it becomes highlighted.
  • Click once on the Custom Level button.
  • Change the Download signed ActiveX controls to Prompt
  • Change the Download unsigned ActiveX controls to Disable
  • Change the Initialize and script ActiveX controls not marked as safe to Disable
  • Change the Installation of desktop items to Prompt
  • Change the Launching programs and files in an IFRAME to Prompt
  • Change the Navigate sub-frames across different domains to Prompt
  • When all these settings have been made, click on the OK button.
  • If it prompts you as to whether or not you want to save the settings, press the Yes button.
  • Next press the Apply button and then the OK to exit the Internet Properties page.
  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

See this link for a listing of some online & their stand-alone antivirus programs:

Virus, Spyware, and Malware Protection and Removal Resources


  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Ad-Aware - Install and download Ad-Aware. ou should also scan your computer with program on a regular basis just as you would an antivirus software in conjunction with Spybot.

    A tutorial on installing & using this product can be found here:

    Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option.

    This will provide real-time spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an anti virus software. A tutorial on installing & using this product can be found here:

    Instructions for - Spybot S & D and Ad-aware

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

Here are some additional utilities that will enhance your safety

  • IE/Spyad <= IE/Spyad places over 4000 websites and domains in the IE Restricted list which will severely impair attempts to infect your system. It basically prevents any downloads (Cookies etc) from the sites listed, although you will still be able to connect to the sites.
  • MVPS Hosts file <= The MVPS Hosts file replaces your current HOSTS file with one containing well know ad sites etc. Basically, this prevents your coputer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer
  • Google Toolbar <= Get the free google toolbar to help stop pop up windows.
  • Winpatrol <= Download and install the free version of Winpatrol. a tutorial for this product is located here:
    Using Winpatrol to protect your computer from malicious software

Stand Up and Be Counted ---> Malware Complaints <--- where you can make difference!

The site offers people who have been (or are) victims of malware the opportunity to document their story and, in that way, launch a complaint against the malware and the makers of the malware.

Also, please read this great article by Tony Klein So How Did I Get Infected In First Place

Happy surfing and stay clean!
 
Since this issue appears resolved ... this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team
a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.
 
Back
Top