Welcome guest. Before posting on our computer help forum, you must register. Click here it's easy and free.

Author Topic: Virus has my computer froze  (Read 15597 times)

0 Members and 1 Guest are viewing this topic.

ebrooks

    Topic Starter


    Greenhorn

    Virus has my computer froze
    « on: May 04, 2008, 01:33:13 PM »
    I have some type of trojan virus on my home computer that makes a bunch of pop ups come up and eventually freeze my computer. I have ran about 4 different types of antivirus and it finds the virus and says it removes it but when i reboot it comes back.

    Here is my log. Please help.
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 9:22:59 AM, on 5/3/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16640)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
    C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    C:\WINDOWS\system32\LEXBCES.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\LEXPPS.EXE
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\WINDOWS\system32\cisvc.exe
    C:\Program Files\Norton AntiVirus\navapsvc.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
    C:\WINDOWS\System32\alg.exe
    C:\Program Files\Norton AntiVirus\SAVScan.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\wbem\wmiprvse.exe
    C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\WINDOWS\zHotkey.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\WINDOWS\SOUNDMAN.EXE
    C:\WINDOWS\ALCWZRD.EXE
    C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
    C:\Program Files\Real\RealPlayer\RealPlay.exe
    C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Documents and Settings\Owner\svchost.exe
    C:\Program Files\Enigma Software Group\SpyHunter\SpyHunter3.exe
    C:\WINDOWS\system32\rundll32.exe
    C:\WINDOWS\system32\Rundll32.exe
    C:\WINDOWS\system32\scntqkdm.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
    C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
    C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Windows Internet Explorer provided by Yahoo!
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn2\yt.dll
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn2\yt.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
    O4 - HKLM\..\Run: [High Definition Audio Property Page Shortcut] HDAudPropShortcut.exe
    O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
    O4 - HKLM\..\Run: [CHotkey] zHotkey.exe
    O4 - HKLM\..\Run: [ShowWnd] ShowWnd.exe
    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [AlcWzrd] ALCWZRD.EXE
    O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
    O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
    O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
    O4 - HKLM\..\Run: [RealTray] C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER
    O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [Host Process] C:\Documents and Settings\Owner\svchost.exe
    O4 - HKLM\..\Run: [SpyHunter Security Suite] C:\Program Files\Enigma Software Group\SpyHunter\SpyHunter3.exe
    O4 - HKLM\..\Run: [5417482f] rundll32.exe "C:\WINDOWS\system32\dkrjtpkd.dll",b
    O4 - HKLM\..\Run: [ExploreUpdSched] C:\WINDOWS\system32\scntqkdm.exe DWram
    O4 - HKLM\..\Run: [BM57247bb3] Rundll32.exe "C:\WINDOWS\system32\klljsqvn.dll",s
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKUS\S-1-5-18\..\RunOnce: [RunNarrator] Narrator.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\RunOnce: [RunNarrator] Narrator.exe (User 'Default user')
    O4 - Startup: Deewoo.lnk = C:\WINDOWS\system32\scntqkdm.exe
    O4 - Startup: DW_Start.lnk = C:\WINDOWS\system32\jpwnw64o.exe
    O4 - Global Startup: Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
    O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
    O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
    O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: EmpirePoker - {77E68763-4284-41d6-B7E7-B6E1F053A9E7} - C:\Program Files\EmpirePokerMaster\EmpirePoker\RunEPoker.exe (file missing)
    O9 - Extra 'Tools' menuitem: EmpirePoker - {77E68763-4284-41d6-B7E7-B6E1F053A9E7} - C:\Program Files\EmpirePokerMaster\EmpirePoker\RunEPoker.exe (file missing)
    O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe (file missing)
    O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe (file missing)
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O14 - IERESET.INF: START_PAGE_URL=http://www.gateway.com
    O16 - DPF: {11260943-421B-11D0-8EAC-0000C07D88CF} (iPIX ActiveX Control) - http://www.ipix.com/download/ipixx.cab
    O16 - DPF: {2D8ED06D-3C30-438B-96AE-4D110FDC1FB8} (ActiveScan 2.0 Installer Class) - http://acs.pandasoftware.com/activescan/cabs/as2stubie.cab
    O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
    O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://www1.snapfish.com/SnapfishActivia.cab
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1191771137488
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://download.games.yahoo.com/games/web_games/popcap/bejeweled2/popcaploader_v6.cab
    O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~3\GOEC62~1.DLL
    O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
    O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
    O23 - Service: Command Service (cmdService) - Unknown owner - C:\WINDOWS\IA\command.exe (file missing)
    O23 - Service: GoogleDesktopManager - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
    O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
    O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
    O23 - Service: Network Monitor - Unknown owner - C:\Program Files\Network Monitor\netmon.exe (file missing)
    O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
    O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
    O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe

    --
    End of file - 10610 bytes

    Broni


      Mastermind
    • Kraków my love :)
    • Thanked: 614
      • Computer Help Forum
    • Computer: Specs
    • Experience: Experienced
    • OS: Windows 8
    Re: Virus has my computer froze
    « Reply #1 on: May 04, 2008, 01:49:17 PM »
    Print these instructions out.

    1. Download SUPERAntiSpyware Free for Home Users:
    http://www.superantispyware.com/

        * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
        * An icon will be created on your desktop. Double-click that icon to launch the program.
        * If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
        * Close SUPERAntiSpyware.

    Restart computer in Safe Mode.
    To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

        * Open SUPERAntiSpyware.
        * Under "Configuration and Preferences", click the Preferences button.
        * Click the Scanning Control tab.
        * Under Scanner Options make sure the following are checked (leave all others unchecked):
              o Close browsers before scanning.
              o Scan for tracking cookies.
              o Terminate memory threats before quarantining.
        * Click the "Close" button to leave the control center screen.
        * Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
        * On the left, make sure you check C:\Fixed Drive.
        * On the right, under "Complete Scan", choose Perform Complete Scan.
        * Click "Next" to start the scan. Please be patient while it scans your computer.
        * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
        * Make sure everything has a checkmark next to it and click "Next".
        * A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
        * If asked if you want to reboot, click "Yes".
        * To retrieve the removal information after reboot, launch SUPERAntispyware again.
              o Click Preferences, then click the Statistics/Logs tab.
              o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
              o If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
              o Please copy and paste the Scan Log results in your next reply.
        * Click Close to exit the program.
    Post SUPERAntiSpyware log.

    RESTART COMPUTER!

    2. Download Malwarebytes' Anti-Malware: http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html to your desktop.

        * Double-click mbam-setup.exe and follow the prompts to install the program.
        * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
        * If an update is found, it will download and install the latest version.
        * Once the program has loaded, select Perform full scan, then click Scan.
        * When the scan is complete, click OK, then Show Results to view the results.
        * Be sure that everything is checked, and click Remove Selected.
        * When completed, a log will open in Notepad.
        * Post the log back here.

    The log can also be found here:
    C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
    Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

    RESTART COMPUTER!

    3. Post new HijackThis log.

    robbiej



      Newbie

      Re: Virus has my computer froze
      « Reply #2 on: May 04, 2008, 01:54:58 PM »
      hey try this..........spy bot  search and destroy

      Broni


        Mastermind
      • Kraków my love :)
      • Thanked: 614
        • Computer Help Forum
      • Computer: Specs
      • Experience: Experienced
      • OS: Windows 8
      Re: Virus has my computer froze
      « Reply #3 on: May 04, 2008, 02:02:41 PM »
      robbiej
      http://www.computerhope.com/forum/index.php/topic,46313.0.html
      Quote
      If you receive advice from someone other than the approved Malware Removal Specialists, you do so at your own risk.
      Not, that I don't recommend Spybot, but it's not sufficient tool to remove infections.

      robbiej



        Newbie

        Re: Virus has my computer froze
        « Reply #4 on: May 04, 2008, 02:31:48 PM »
         ;D Hi
        Hey broni  your right thanks for the input i just went to download the anti spy and it works alot better then the one i have.......By the way is there anyway you can delete cookies as soon as they enter your computer? without having to goto internet options?

        Broni


          Mastermind
        • Kraków my love :)
        • Thanked: 614
          • Computer Help Forum
        • Computer: Specs
        • Experience: Experienced
        • OS: Windows 8
        Re: Virus has my computer froze
        « Reply #5 on: May 04, 2008, 02:59:20 PM »
        In general, cookies are harmless. There are some privacy issue with "tracking cookie", but it's far from being any malware.

        ebrooks

          Topic Starter


          Greenhorn

          Re: Virus has my computer froze
          « Reply #6 on: May 05, 2008, 11:24:56 AM »
          It took forever for me to even get to the forum page but here is my log from superantispyware and now I going to try to download Malwarebytes but it is making it hard for me to even pull up the website.

          SUPERAntiSpyware Scan Log
          http://www.superantispyware.com
          Generated 05/05/2008 at 11:34 AM
          Application Version : 4.0.1154
          Core Rules Database Version : 3452
          Trace Rules Database Version: 1444
          Scan type       : Complete Scan
          Total Scan Time : 01:17:51
          Memory items scanned      : 163
          Memory threats detected   : 2
          Registry items scanned    : 4501
          Registry threats detected : 83
          File items scanned        : 83147
          File threats detected     : 177
          Trojan.Vundo-Variant/F
          C:\WINDOWS\SYSTEM32\VTUONGWX.DLL
          C:\WINDOWS\SYSTEM32\VTUONGWX.DLL
          HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BC7D8DE8-EF3D-4F44-8B54-03759FAC1367}
          HKCR\CLSID\{BC7D8DE8-EF3D-4F44-8B54-03759FAC1367}
          HKCR\CLSID\{BC7D8DE8-EF3D-4F44-8B54-03759FAC1367}\InprocServer32
          HKCR\CLSID\{BC7D8DE8-EF3D-4F44-8B54-03759FAC1367}\InprocServer32#ThreadingModel
          HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks#{BC7D8DE8-EF3D-4F44-8B54-03759FAC1367}
          Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\vtUoNGwX
          C:\WINDOWS\SYSTEM32\JCQDWRMQ.DLL
          Adware.Vundo Variant/Resident
          C:\WINDOWS\SYSTEM32\AWTSRIHG.DLL
          C:\WINDOWS\SYSTEM32\AWTSRIHG.DLL
          Trojan.Unclassified/SVCHost-Fake
          [Host Process] C:\DOCUMENTS AND SETTINGS\OWNER\SVCHOST.EXE
          C:\DOCUMENTS AND SETTINGS\OWNER\SVCHOST.EXE
          C:\WINDOWS\Prefetch\SVCHOST.EXE-0B78B776.pf
          Adware.Crystalys Media
          HKLM\Software\Classes\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}
          HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}
          HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}
          HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\Control
          HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\Implemented Categories
          HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\InprocServer32
          HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\InprocServer32#ThreadingModel
          HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\Insertable
          HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\MiscStatus
          HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\MiscStatus\1
          HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\ProgID
          HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\Programmable
          HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\ToolboxBitmap32
          HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\TypeLib
          HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\Version
          HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\VersionIndependentProgID
          C:\PROGRAM FILES\CRYSTALYS MEDIA\CM.DLL
          Adware.Vundo-Variant/M
          HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{55c6bfd1-79b6-4b67-b814-1573351cecbe}
          HKCR\CLSID\{55C6BFD1-79B6-4B67-B814-1573351CECBE}
          HKCR\CLSID\{55C6BFD1-79B6-4B67-B814-1573351CECBE}\InprocServer32
          HKCR\CLSID\{55C6BFD1-79B6-4B67-B814-1573351CECBE}\InprocServer32#ThreadingModel
          C:\WINDOWS\SYSTEM32\ITBHUFCM.DLL
          Adware.Vundo-Variant
          HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{984AF1DD-385F-40A6-A03F-6F92B787BAA8}
          HKCR\CLSID\{984AF1DD-385F-40A6-A03F-6F92B787BAA8}
          HKCR\CLSID\{984AF1DD-385F-40A6-A03F-6F92B787BAA8}\InprocServer32
          HKCR\CLSID\{984AF1DD-385F-40A6-A03F-6F92B787BAA8}\InprocServer32#ThreadingModel
          C:\DOCUMENTS AND SETTINGS\ERIC\LOCAL SETTINGS\TEMP\OPNNOPQG.DLL
          Rootkit.TNCore-Variant/A
          HKLM\System\ControlSet002\Services\serscann
          C:\WINDOWS\SYSTEM32\DRIVERS\SERSCANN.SYS
          HKLM\System\ControlSet002\Enum\Root\LEGACY_serscann
          HKLM\System\ControlSet003\Services\serscann
          HKLM\System\ControlSet003\Enum\Root\LEGACY_serscann
          HKLM\System\CurrentControlSet\Services\serscann
          HKLM\System\CurrentControlSet\Enum\Root\LEGACY_serscann
          Adware.Tracking Cookie
          C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
          C:\Documents and Settings\Owner\Cookies\owner@winanonymous[2].txt
          C:\Documents and Settings\Owner\Cookies\owner@advertising[2].txt
          C:\Documents and Settings\Owner\Cookies\owner@imrworldwide[2].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
          C:\Documents and Settings\Owner\Cookies\owner@azjmp[2].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
          C:\Documents and Settings\Owner\Cookies\owner@media6degrees[1].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
          C:\Documents and Settings\Owner\Cookies\owner@tacoda[2].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
          C:\Documents and Settings\Owner\Cookies\owner@tribalfusion[1].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
          C:\Documents and Settings\Owner\Cookies\owner@adportmedia[2].txt
          C:\Documents and Settings\Owner\Cookies\owner@statcounter[2].txt
          C:\Documents and Settings\Owner\Cookies\owner@clickbank[3].txt
          C:\Documents and Settings\Owner\Cookies\owner@2o7[1].txt
          C:\Documents and Settings\Owner\Cookies\owner@antispywaremaster[2].txt
          C:\Documents and Settings\Owner\Cookies\owner@specificclick[1].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
          C:\Documents and Settings\Owner\Cookies\owner@zedo[1].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
          C:\Documents and Settings\Owner\Cookies\owner@adlegend[2].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
          C:\Documents and Settings\Owner\Cookies\owner@atdmt[2].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
          C:\Documents and Settings\Owner\Cookies\owner@adnetserver[2].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
          C:\Documents and Settings\Owner\Cookies\owner@statsgod[1].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
          C:\Documents and Settings\Owner\Cookies\owner@burstnet[2].txt
          C:\Documents and Settings\Owner\Cookies\owner@trustedantivirus[1].txt
          C:\Documents and Settings\Owner\Cookies\owner@trafficmp[2].txt
          C:\Documents and Settings\Owner\Cookies\owner@precisionclick[1].txt
          C:\Documents and Settings\Owner\Cookies\owner@mediaplex[1].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
          C:\Documents and Settings\Owner\Cookies\owner@atwola[1].txt
          C:\Documents and Settings\Owner\Cookies\owner@doubleclick[1].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
          C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\eric@adbrite[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@adecn[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@adinterax[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@adlegend[1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\eric@adrevolver[1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\eric@adultadworld[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@adultdvdemart[2].txt
          C:\Documents and Settings\Eric\Cookies\eric@adultfriendfinder[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@advertising[2].txt
          C:\Documents and Settings\Eric\Cookies\eric@allaxxxesspass[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@ananovaxxx[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@atdmt[2].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\eric@casalemedia[2].txt
          C:\Documents and Settings\Eric\Cookies\eric@clickbank[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@clicksor[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@clicktorrent[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@collective-media[2].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\eric@doubleclick[1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\eric@eroticlick[2].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\eric@eyewonder[2].txt
          C:\Documents and Settings\Eric\Cookies\eric@freeadultmedia[2].txt
          C:\Documents and Settings\Eric\Cookies\eric@fuckaroo[2].txt
          C:\Documents and Settings\Eric\Cookies\eric@hardsextube[2].txt
          C:\Documents and Settings\Eric\Cookies\eric@hitbox[2].txt
          C:\Documents and Settings\Eric\Cookies\eric@hornyandhappy[4].txt
          C:\Documents and Settings\Eric\Cookies\eric@hornyandhappy[5].txt
          C:\Documents and Settings\Eric\Cookies\eric@hornymatches[1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\eric@insightexpressai[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@interclick[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@kinxxx[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@kinxxx[2].txt
          C:\Documents and Settings\Eric\Cookies\eric@kinxxx[3].txt
          C:\Documents and Settings\Eric\Cookies\eric@maxporn[1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][3].txt
          C:\Documents and Settings\Eric\Cookies\eric@mediaplex[2].txt
          C:\Documents and Settings\Eric\Cookies\eric@nakedonthestreets[2].txt
          C:\Documents and Settings\Eric\Cookies\eric@pimpsexposed[2].txt
          C:\Documents and Settings\Eric\Cookies\eric@pornhub[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@pornotube[2].txt
          C:\Documents and Settings\Eric\Cookies\eric@questionmarket[1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\eric@secretxxxvideo[2].txt
          C:\Documents and Settings\Eric\Cookies\eric@sexlist[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@sexure[1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\eric@sexyescortads[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@specificclick[2].txt
          C:\Documents and Settings\Eric\Cookies\eric@statcounter[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@tacoda[1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\eric@tribalfusion[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@vidisex[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@webpower[2].txt
          C:\Documents and Settings\Eric\Cookies\eric@wegcash[2].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][3].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][1].txt
          C:\Documents and Settings\Eric\Cookies\eric@xiti[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@xxxdump[2].txt
          C:\Documents and Settings\Eric\Cookies\eric@xxxstash[1].txt
          C:\Documents and Settings\Eric\Cookies\[email protected][2].txt
          C:\Documents and Settings\Eric\Cookies\eric@yadro[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@youporn[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@zedo[1].txt
          C:\Documents and Settings\Eric\Cookies\eric@ziporn[2].txt
          C:\Documents and Settings\Owner\Cookies\owner@adnetserver[1].txt
          C:\Documents and Settings\Owner\Cookies\owner@clickbank[1].txt
          Trojan.NetMon/DNSChange
          HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor
          HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor#Type
          HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor#Start
          HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor#ErrorControl
          HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor#ImagePath
          HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor#DisplayName
          HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor#ObjectName
          HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor\Security
          HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor\Security#Security
          HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor\Enum
          HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor\Enum#0
          HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor\Enum#Count
          HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor\Enum#NextInstance
          HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR
          HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR#NextInstance
          HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000
          HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Service
          HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Legacy
          HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ConfigFlags
          HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Class
          HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ClassGUID
          HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#DeviceDesc
          C:\Program Files\Network Monitor
          Trojan.cmdService
          HKLM\SYSTEM\CurrentControlSet\Services\cmdService
          HKLM\SYSTEM\CurrentControlSet\Services\cmdService#Type
          HKLM\SYSTEM\CurrentControlSet\Services\cmdService#Start
          HKLM\SYSTEM\CurrentControlSet\Services\cmdService#ErrorControl
          HKLM\SYSTEM\CurrentControlSet\Services\cmdService#ImagePath
          HKLM\SYSTEM\CurrentControlSet\Services\cmdService#DisplayName
          HKLM\SYSTEM\CurrentControlSet\Services\cmdService#ObjectName
          HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Security
          HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Security#Security
          HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Enum
          HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Enum#0
          HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Enum#Count
          HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Enum#NextInstance
          HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE
          HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE#NextInstance
          HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000
          HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Service
          HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Legacy
          HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ConfigFlags
          HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Class
          HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ClassGUID
          HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#DeviceDesc
          Trojan.ZenoSearch
          C:\WINDOWS\system32\msnav32.ax
          Trojan.PestTrap
          HKU\S-1-5-21-3706819324-1418787935-3679095545-1003\Software\SNO2
          Trojan.Media-Codec
          C:\Documents and Settings\Owner\Favorites\Online Security Test.url
          Adware.180solutions/Seekmo
          C:\Program Files\Seekmo Programs\Seekmo Toolbar
          C:\Program Files\Seekmo Programs
          Trojan.Media-Codec/V2
          C:\Program Files\Video AX Object
          HKU\S-1-5-21-3706819324-1418787935-3679095545-1003\Software\Protection Tools
          RootKit.TnCore/Trace
          C:\WINDOWS\system32\drivers\core.cache.dsk
          Trojan.Downloader-Gen/MROFIN
          C:\WINDOWS\MROFINU1000106.EXE
          C:\WINDOWS\MROFINU1188.EXE
          Rootkit.TNCore-Installer
          C:\WINDOWS\SYSTEM32\KN3\COMSDIRP3.EXE
          Adware.Vundo Variant/Rel
          C:\WINDOWS\SYSTEM32\MCRH.TMP
          Adware.DeeWoo/ThinkAdz
          C:\WINDOWS\SYSTEM32\SCNTQKDM.EXE
          C:\WINDOWS\Prefetch\SCNTQKDM.EXE-373E1EB7.pf
          Trojan.Unclassified/BrowserDriver
          C:\WINDOWS\SYSTEM32\SWTMP\HBNX12.EXE

          ebrooks

            Topic Starter


            Greenhorn

            Re: Virus has my computer froze
            « Reply #7 on: May 05, 2008, 11:50:22 AM »
            I dont think i will be able to load the malwarebytes from major geeks.  I cant get that far without it freezing up.  I think I can do another Hijack this if that will help.

            Thanks in advance

            ebrooks

              Topic Starter


              Greenhorn

              Re: Virus has my computer froze
              « Reply #8 on: May 05, 2008, 12:03:44 PM »
              Here is my latest Hijack this:

              Logfile of Trend Micro HijackThis v2.0.2
              Scan saved at 12:58:46 PM, on 5/5/2008
              Platform: Windows XP SP2 (WinNT 5.01.2600)
              MSIE: Internet Explorer v7.00 (7.00.6000.16640)
              Boot mode: Normal
              Running processes:
              C:\WINDOWS\System32\smss.exe
              C:\WINDOWS\system32\csrss.exe
              C:\WINDOWS\system32\winlogon.exe
              C:\WINDOWS\system32\services.exe
              C:\WINDOWS\system32\lsass.exe
              C:\WINDOWS\system32\svchost.exe
              C:\WINDOWS\system32\svchost.exe
              C:\WINDOWS\System32\svchost.exe
              C:\WINDOWS\system32\svchost.exe
              C:\WINDOWS\system32\svchost.exe
              C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
              C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
              C:\WINDOWS\system32\LEXBCES.EXE
              C:\WINDOWS\system32\spoolsv.exe
              C:\WINDOWS\system32\LEXPPS.EXE
              C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
              C:\WINDOWS\system32\cisvc.exe
              C:\Program Files\Norton AntiVirus\navapsvc.exe
              C:\WINDOWS\system32\svchost.exe
              C:\WINDOWS\Explorer.EXE
              C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
              C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
              C:\Program Files\Common Files\Symantec Shared\ccApp.exe
              C:\WINDOWS\zHotkey.exe
              C:\WINDOWS\SOUNDMAN.EXE
              C:\WINDOWS\ALCWZRD.EXE
              C:\Program Files\Real\RealPlayer\RealPlay.exe
              C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
              C:\Program Files\iTunes\iTunesHelper.exe
              C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
              C:\WINDOWS\system32\ctfmon.exe
              C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
              C:\Program Files\Norton AntiVirus\SAVScan.exe
              C:\WINDOWS\System32\alg.exe
              C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe
              C:\Program Files\Internet Explorer\IEXPLORE.EXE
              C:\Program Files\iPod\bin\iPodService.exe
              C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
              C:\WINDOWS\system32\csrss.exe
              C:\WINDOWS\system32\winlogon.exe
              C:\WINDOWS\Explorer.EXE
              C:\WINDOWS\system32\ctfmon.exe
              C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
              C:\Program Files\Common Files\Symantec Shared\ccApp.exe
              C:\WINDOWS\zHotkey.exe
              C:\WINDOWS\SOUNDMAN.EXE
              C:\WINDOWS\ALCWZRD.EXE
              C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
              C:\Program Files\Real\RealPlayer\RealPlay.exe
              C:\Program Files\iTunes\iTunesHelper.exe
              C:\WINDOWS\system32\Rundll32.exe
              C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
              C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
              C:\Program Files\Enigma Software Group\SpyHunter\SpyHunter3.exe
              C:\WINDOWS\system32\cidaemon.exe
              C:\Program Files\Messenger\msmsgs.exe
              C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
              C:\Program Files\Messenger\msmsgs.exe
              C:\WINDOWS\system32\wbem\wmiprvse.exe
              R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
              R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com
              R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
              R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
              R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
              R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com
              R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Windows Internet Explorer provided by Yahoo!
              R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn2\yt.dll
              O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn2\yt.dll
              O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
              O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
              O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
              O2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
              O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
              O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn2\yt.dll
              O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
              O4 - HKLM\..\Run: [High Definition Audio Property Page Shortcut] HDAudPropShortcut.exe
              O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
              O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
              O4 - HKLM\..\Run: [CHotkey] zHotkey.exe
              O4 - HKLM\..\Run: [ShowWnd] ShowWnd.exe
              O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
              O4 - HKLM\..\Run: [AlcWzrd] ALCWZRD.EXE
              O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
              O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
              O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
              O4 - HKLM\..\Run: [RealTray] C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER
              O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
              O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
              O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
              O4 - HKLM\..\Run: [SpyHunter Security Suite] C:\Program Files\Enigma Software Group\SpyHunter\SpyHunter3.exe
              O4 - HKLM\..\Run: [5417482f] rundll32.exe "C:\WINDOWS\system32\jcqdwrmq.dll",b
              O4 - HKLM\..\Run: [BM57247bb3] Rundll32.exe "C:\WINDOWS\system32\cwkgqigi.dll",s
              O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
              O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
              O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
              O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
              O4 - HKUS\S-1-5-21-3706819324-1418787935-3679095545-1006\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet (User 'Eric')
              O4 - HKUS\S-1-5-21-3706819324-1418787935-3679095545-1006\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'Eric')
              O4 - HKUS\S-1-5-21-3706819324-1418787935-3679095545-1006\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime (User 'Eric')
              O4 - HKUS\S-1-5-21-3706819324-1418787935-3679095545-1006\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" (User 'Eric')
              O4 - HKUS\S-1-5-18\..\RunOnce: [RunNarrator] Narrator.exe (User 'SYSTEM')
              O4 - HKUS\.DEFAULT\..\RunOnce: [RunNarrator] Narrator.exe (User 'Default user')
              O4 - Startup: Deewoo.lnk = C:\WINDOWS\system32\scntqkdm.exe
              O4 - Startup: DW_Start.lnk = C:\WINDOWS\system32\jpwnw64o.exe
              O4 - Global Startup: Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
              O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
              O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
              O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
              O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
              O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
              O9 - Extra button: EmpirePoker - {77E68763-4284-41d6-B7E7-B6E1F053A9E7} - C:\Program Files\EmpirePokerMaster\EmpirePoker\RunEPoker.exe (file missing)
              O9 - Extra 'Tools' menuitem: EmpirePoker - {77E68763-4284-41d6-B7E7-B6E1F053A9E7} - C:\Program Files\EmpirePokerMaster\EmpirePoker\RunEPoker.exe (file missing)
              O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe (file missing)
              O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe (file missing)
              O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
              O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
              O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
              O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
              O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
              O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
              O14 - IERESET.INF: START_PAGE_URL=http://www.gateway.com
              O16 - DPF: {11260943-421B-11D0-8EAC-0000C07D88CF} (iPIX ActiveX Control) - http://www.ipix.com/download/ipixx.cab
              O16 - DPF: {2D8ED06D-3C30-438B-96AE-4D110FDC1FB8} (ActiveScan 2.0 Installer Class) - http://acs.pandasoftware.com/activescan/cabs/as2stubie.cab
              O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
              O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://www1.snapfish.com/SnapfishActivia.cab
              O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1191771137488
              O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://download.games.yahoo.com/games/web_games/popcap/bejeweled2/popcaploader_v6.cab
              O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~3\GOEC62~1.DLL
              O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
              O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
              O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
              O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
              O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
              O23 - Service: GoogleDesktopManager - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
              O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
              O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
              O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
              O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
              O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
              O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
              O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
              O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
              O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
              O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
              --
              End of file - 12068 bytes


              evilfantasy

              • Malware Removal Specialist
              • Moderator


              • Genius
              • Calm like a bomb
              • Thanked: 493
              • Experience: Experienced
              • OS: Windows 11
              Re: Virus has my computer froze
              « Reply #9 on: May 05, 2008, 12:06:55 PM »
              Try this.

              Direct download link. http://www.besttechie.net/tools/mbam-setup.exe

              ebrooks

                Topic Starter


                Greenhorn

                Re: Virus has my computer froze
                « Reply #10 on: May 05, 2008, 04:25:41 PM »
                That link worked thanks.   Here is my log from Malware

                Malwarebytes' Anti-Malware 1.11
                Database version: 720

                Scan type: Full Scan (C:\|)
                Objects scanned: 128012
                Time elapsed: 4 hour(s), 4 minute(s), 17 second(s)

                Memory Processes Infected: 0
                Memory Modules Infected: 0
                Registry Keys Infected: 28
                Registry Values Infected: 2
                Registry Data Items Infected: 0
                Folders Infected: 4
                Files Infected: 30

                Memory Processes Infected:
                (No malicious items detected)

                Memory Modules Infected:
                (No malicious items detected)

                Registry Keys Infected:
                HKEY_CLASSES_ROOT\AppID\{8d71eeb8-a1a7-4733-8fa2-1cac015c967d} (Adware.BHO) -> Quarantined and deleted successfully.
                HKEY_CLASSES_ROOT\Interface\{1e404d48-670a-4085-a6a0-d195793ddd33} (Adware.BHO) -> Quarantined and deleted successfully.
                HKEY_CLASSES_ROOT\Interface\{9f593aac-ca4c-4a41-a7ff-a00812192d61} (Adware.BHO) -> Quarantined and deleted successfully.
                HKEY_CLASSES_ROOT\Typelib\{749ec66f-a838-4b38-b8e5-e65d905fff74} (Adware.BHO) -> Quarantined and deleted successfully.
                HKEY_CLASSES_ROOT\CLSID\{1e404d48-670a-4085-a6a0-d195793ddd33} (Adware.BHO) -> Quarantined and deleted successfully.
                HKEY_CLASSES_ROOT\CLSID\{ceb9c60d-f0ad-4b73-a3ab-4fc822e38d66} (Adware.BHO) -> Quarantined and deleted successfully.
                HKEY_CLASSES_ROOT\Interface\{ceb9c60d-f0ad-4b73-a3ab-4fc822e38d66} (Adware.BHO) -> Quarantined and deleted successfully.
                HKEY_CLASSES_ROOT\Interface\{1601d447-7424-4866-8dcc-acf98a2a41e1} (Adware.BHO) -> Quarantined and deleted successfully.
                HKEY_CLASSES_ROOT\Typelib\{c3c0ec2c-2c1c-495c-9ad0-1f0ef833d7b5} (Adware.BHO) -> Quarantined and deleted successfully.
                HKEY_CLASSES_ROOT\Interface\{e4e3e0f8-cd30-4380-8ce9-b96904bdefca} (Adware.PopCap) -> Quarantined and deleted successfully.
                HKEY_CLASSES_ROOT\Interface\{fe8a736f-4124-4d9c-b4b1-3b12381efabe} (Adware.PopCap) -> Quarantined and deleted successfully.
                HKEY_CLASSES_ROOT\Typelib\{c9c5deaf-0a1f-4660-8279-9edfad6fefe1} (Adware.PopCap) -> Quarantined and deleted successfully.
                HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2 (Adware.PopCap) -> Quarantined and deleted successfully.
                HKEY_CLASSES_ROOT\CLSID\{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
                HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
                HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2.1 (Adware.PopCap) -> Quarantined and deleted successfully.
                HKEY_CLASSES_ROOT\AppID\Sidebar.DLL (Adware.BHO) -> Quarantined and deleted successfully.
                HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Malware.Trace) -> Quarantined and deleted successfully.
                HKEY_CURRENT_USER\Software\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
                HKEY_CURRENT_USER\Software\Microsoft\affltid (Malware.Trace) -> Quarantined and deleted successfully.
                HKEY_CLASSES_ROOT\WR (Malware.Trace) -> Quarantined and deleted successfully.
                HKEY_CURRENT_USER\Software\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
                HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affltid (Malware.Trace) -> Quarantined and deleted successfully.
                HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
                HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
                HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
                HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
                HKEY_LOCAL_MACHINE\software\Seekmo Programs (Adware.Seekmo) -> Quarantined and deleted successfully.

                Registry Values Infected:
                HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5417482f (Trojan.Agent) -> Quarantined and deleted successfully.
                HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BM57247bb3 (Trojan.Agent) -> Delete on reboot.

                Registry Data Items Infected:
                (No malicious items detected)

                Folders Infected:
                C:\WINDOWS\system32\vb1 (Trojan.Agent) -> Quarantined and deleted successfully.
                C:\WINDOWS\system32\kn3 (Trojan.Agent) -> Quarantined and deleted successfully.
                C:\WINDOWS\system32\swTMP (Trojan.Agent) -> Quarantined and deleted successfully.
                C:\Documents and Settings\LocalService\Application Data\NetMon (Trojan.NetMon) -> Quarantined and deleted successfully.

                Files Infected:
                C:\WINDOWS\Downloaded Program Files\popcaploader.dll (Adware.PopCap) -> Quarantined and deleted successfully.
                C:\Documents and Settings\Owner\Local Settings\Temp\tmp5B.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
                C:\System Volume Information\_restore{C5941BA0-7954-431B-BB37-2E1ABEED1085}\RP847\A0041076.dll (Adware.TargetSaver) -> Quarantined and deleted successfully.
                C:\System Volume Information\_restore{C5941BA0-7954-431B-BB37-2E1ABEED1085}\RP847\A0041077.exe (Trojan.DNSChanger) -> Quarantined and deleted successfully.
                C:\System Volume Information\_restore{C5941BA0-7954-431B-BB37-2E1ABEED1085}\RP847\A0041078.vbs (Malware.Trace) -> Quarantined and deleted successfully.
                C:\System Volume Information\_restore{C5941BA0-7954-431B-BB37-2E1ABEED1085}\RP847\A0041101.exe (AdWare.CommAd) -> Quarantined and deleted successfully.
                C:\System Volume Information\_restore{C5941BA0-7954-431B-BB37-2E1ABEED1085}\RP847\A0041108.dll (AdWare.CommAd) -> Quarantined and deleted successfully.
                C:\System Volume Information\_restore{C5941BA0-7954-431B-BB37-2E1ABEED1085}\RP847\A0041109.dll (Adware.TargetSaver) -> Quarantined and deleted successfully.
                C:\System Volume Information\_restore{C5941BA0-7954-431B-BB37-2E1ABEED1085}\RP847\A0041110.exe (Adware.ZeroSearch) -> Quarantined and deleted successfully.
                C:\System Volume Information\_restore{C5941BA0-7954-431B-BB37-2E1ABEED1085}\RP847\A0041134.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
                C:\System Volume Information\_restore{C5941BA0-7954-431B-BB37-2E1ABEED1085}\RP847\A0041300.exe (Adware.BHO) -> Quarantined and deleted successfully.
                C:\System Volume Information\_restore{C5941BA0-7954-431B-BB37-2E1ABEED1085}\RP847\A0041301.dll (Adware.BHO) -> Quarantined and deleted successfully.
                C:\System Volume Information\_restore{C5941BA0-7954-431B-BB37-2E1ABEED1085}\RP847\A0041309.exe (Adware.Rotator) -> Quarantined and deleted successfully.
                C:\System Volume Information\_restore{C5941BA0-7954-431B-BB37-2E1ABEED1085}\RP849\A0041622.exe (Adware.ZeroSearch) -> Quarantined and deleted successfully.
                C:\System Volume Information\_restore{C5941BA0-7954-431B-BB37-2E1ABEED1085}\RP850\A0043375.sys (Trojan.Agent) -> Quarantined and deleted successfully.
                C:\System Volume Information\_restore{C5941BA0-7954-431B-BB37-2E1ABEED1085}\RP850\A0043378.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
                C:\System Volume Information\_restore{C5941BA0-7954-431B-BB37-2E1ABEED1085}\RP850\A0043379.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
                C:\System Volume Information\_restore{C5941BA0-7954-431B-BB37-2E1ABEED1085}\RP850\A0043380.exe (Trojan.Agent) -> Quarantined and deleted successfully.
                C:\System Volume Information\_restore{C5941BA0-7954-431B-BB37-2E1ABEED1085}\RP850\A0043382.exe (Adware.ZeroSearch) -> Quarantined and deleted successfully.
                C:\System Volume Information\_restore{C5941BA0-7954-431B-BB37-2E1ABEED1085}\RP850\A0043384.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
                C:\System Volume Information\_restore{C5941BA0-7954-431B-BB37-2E1ABEED1085}\RP850\A0044384.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
                C:\WINDOWS\system32\mysidesearch_sidebar_uninstall.exe (Adware.BHO) -> Quarantined and deleted successfully.
                C:\WINDOWS\system32\gx4\radodll23.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
                C:\Documents and Settings\LocalService\Application Data\NetMon\domains.txt (Trojan.NetMon) -> Quarantined and deleted successfully.
                C:\Documents and Settings\LocalService\Application Data\NetMon\log.txt (Trojan.NetMon) -> Quarantined and deleted successfully.
                C:\WINDOWS\system32\cwkgqigi.dll (Trojan.Agent) -> Delete on reboot.
                C:\WINDOWS\system32\pac.txt (Malware.Trace) -> Quarantined and deleted successfully.
                C:\WINDOWS\system32\zxdnt3d.cfg (Malware.Trace) -> Quarantined and deleted successfully.
                C:\Documents and Settings\Owner\Start Menu\Programs\Startup\Deewoo.lnk (Trojan.Agent) -> Quarantined and deleted successfully.
                C:\Documents and Settings\Owner\Start Menu\Programs\Startup\DW_Start.lnk (Trojan.Agent) -> Quarantined and deleted successfully.

                ebrooks

                  Topic Starter


                  Greenhorn

                  Re: Virus has my computer froze
                  « Reply #11 on: May 05, 2008, 04:30:18 PM »
                  Here is my new Hijack log:



                  Logfile of Trend Micro HijackThis v2.0.2
                  Scan saved at 5:29:19 PM, on 5/5/2008
                  Platform: Windows XP SP2 (WinNT 5.01.2600)
                  MSIE: Internet Explorer v7.00 (7.00.6000.16640)
                  Boot mode: Normal

                  Running processes:
                  C:\WINDOWS\System32\smss.exe
                  C:\WINDOWS\system32\csrss.exe
                  C:\WINDOWS\system32\winlogon.exe
                  C:\WINDOWS\system32\services.exe
                  C:\WINDOWS\system32\lsass.exe
                  C:\WINDOWS\system32\svchost.exe
                  C:\WINDOWS\system32\svchost.exe
                  C:\WINDOWS\System32\svchost.exe
                  C:\WINDOWS\system32\svchost.exe
                  C:\WINDOWS\system32\svchost.exe
                  C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
                  C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
                  C:\WINDOWS\system32\LEXBCES.EXE
                  C:\WINDOWS\system32\spoolsv.exe
                  C:\WINDOWS\system32\LEXPPS.EXE
                  C:\WINDOWS\Explorer.EXE
                  C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
                  C:\Program Files\Common Files\Symantec Shared\ccApp.exe
                  C:\WINDOWS\zHotkey.exe
                  C:\WINDOWS\SOUNDMAN.EXE
                  C:\WINDOWS\ALCWZRD.EXE
                  C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
                  C:\Program Files\Real\RealPlayer\RealPlay.exe
                  C:\Program Files\iTunes\iTunesHelper.exe
                  C:\WINDOWS\system32\Rundll32.exe
                  C:\WINDOWS\system32\ctfmon.exe
                  C:\Program Files\Messenger\msmsgs.exe
                  C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
                  C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
                  C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
                  C:\WINDOWS\system32\cisvc.exe
                  C:\Program Files\Norton AntiVirus\navapsvc.exe
                  C:\WINDOWS\system32\svchost.exe
                  C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
                  C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
                  C:\Program Files\Norton AntiVirus\SAVScan.exe
                  C:\WINDOWS\system32\wbem\wmiprvse.exe
                  C:\WINDOWS\System32\alg.exe
                  C:\Program Files\iPod\bin\iPodService.exe
                  C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
                  C:\WINDOWS\system32\wuauclt.exe

                  R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
                  R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com
                  R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
                  R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
                  R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
                  R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com
                  R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Windows Internet Explorer provided by Yahoo!
                  R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn2\yt.dll
                  O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn2\yt.dll
                  O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
                  O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
                  O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
                  O2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
                  O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
                  O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn2\yt.dll
                  O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
                  O4 - HKLM\..\Run: [High Definition Audio Property Page Shortcut] HDAudPropShortcut.exe
                  O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
                  O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
                  O4 - HKLM\..\Run: [CHotkey] zHotkey.exe
                  O4 - HKLM\..\Run: [ShowWnd] ShowWnd.exe
                  O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
                  O4 - HKLM\..\Run: [AlcWzrd] ALCWZRD.EXE
                  O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
                  O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
                  O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer
                  O4 - HKLM\..\Run: [RealTray] C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER
                  O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
                  O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
                  O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
                  O4 - HKLM\..\Run: [SpyHunter Security Suite] C:\Program Files\Enigma Software Group\SpyHunter\SpyHunter3.exe
                  O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
                  O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
                  O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
                  O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
                  O4 - HKUS\S-1-5-18\..\RunOnce: [RunNarrator] Narrator.exe (User 'SYSTEM')
                  O4 - HKUS\.DEFAULT\..\RunOnce: [RunNarrator] Narrator.exe (User 'Default user')
                  O4 - Global Startup: Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
                  O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
                  O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
                  O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
                  O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
                  O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
                  O9 - Extra button: EmpirePoker - {77E68763-4284-41d6-B7E7-B6E1F053A9E7} - C:\Program Files\EmpirePokerMaster\EmpirePoker\RunEPoker.exe (file missing)
                  O9 - Extra 'Tools' menuitem: EmpirePoker - {77E68763-4284-41d6-B7E7-B6E1F053A9E7} - C:\Program Files\EmpirePokerMaster\EmpirePoker\RunEPoker.exe (file missing)
                  O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe (file missing)
                  O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe (file missing)
                  O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
                  O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
                  O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
                  O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
                  O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
                  O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
                  O14 - IERESET.INF: START_PAGE_URL=http://www.gateway.com
                  O16 - DPF: {11260943-421B-11D0-8EAC-0000C07D88CF} (iPIX ActiveX Control) - http://www.ipix.com/download/ipixx.cab
                  O16 - DPF: {2D8ED06D-3C30-438B-96AE-4D110FDC1FB8} (ActiveScan 2.0 Installer Class) - http://acs.pandasoftware.com/activescan/cabs/as2stubie.cab
                  O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
                  O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://www1.snapfish.com/SnapfishActivia.cab
                  O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1191771137488
                  O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~3\GOEC62~1.DLL
                  O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
                  O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
                  O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
                  O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
                  O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
                  O23 - Service: GoogleDesktopManager - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
                  O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
                  O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
                  O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
                  O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
                  O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
                  O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
                  O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
                  O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
                  O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
                  O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe

                  --
                  End of file - 10302 bytes



                  ebrooks

                    Topic Starter


                    Greenhorn

                    Re: Virus has my computer froze
                    « Reply #12 on: May 05, 2008, 06:06:25 PM »
                    What do I do next?

                    Broni


                      Mastermind
                    • Kraków my love :)
                    • Thanked: 614
                      • Computer Help Forum
                    • Computer: Specs
                    • Experience: Experienced
                    • OS: Windows 8
                    Re: Virus has my computer froze
                    « Reply #13 on: May 05, 2008, 06:59:26 PM »
                    Just checking...

                    Broni


                      Mastermind
                    • Kraków my love :)
                    • Thanked: 614
                      • Computer Help Forum
                    • Computer: Specs
                    • Experience: Experienced
                    • OS: Windows 8
                    Re: Virus has my computer froze
                    « Reply #14 on: May 05, 2008, 07:11:12 PM »
                    *** Verify your Java version: http://www.java.com/en/download/installed.jsp
                    Update, if necessary, and uninstall older version(s) through Add\Remove)

                    1. Print this post out, since you won't have an access to it, at some point.

                    2. Close all windows, except for HijackThis.

                    3. Put a checkmark next to the following HijackThis entries (some entries will be checkmarked to disable unnecessary startups; in those cases (marked with *), no actual program will be removed):

                    - *O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
                    - *O4 - HKLM\..\Run: [RealTray] C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER
                    - *O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
                    - *O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
                    - *O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
                    - *O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
                    - *O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
                    - O9 - Extra button: EmpirePoker - {77E68763-4284-41d6-B7E7-B6E1F053A9E7} - C:\Program Files\EmpirePokerMaster\EmpirePoker\RunEPoker.exe (file missing)
                    - O9 - Extra 'Tools' menuitem: EmpirePoker - {77E68763-4284-41d6-B7E7-B6E1F053A9E7} - C:\Program Files\EmpirePokerMaster\EmpirePoker\RunEPoker.exe (file missing)
                    - O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe (file missing)
                    - O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe (file missing)

                    4. Click on Fix checked button.

                    5. Restart your computer.

                    6. Post new HijackThis log.