Welcome guest. Before posting on our computer help forum, you must register. Click here it's easy and free.

Author Topic: Page not found!  (Read 16602 times)

0 Members and 1 Guest are viewing this topic.

3-piece

    Topic Starter


    Rookie

    Page not found!
    « on: July 13, 2008, 11:36:00 AM »
    Hi, I'm running windows XP and IE6 on my Toshiba Satellite Pro laptop. Whenever I click a link to a page (from any search engine) it sends me to a completely unrelated page. I removed IE7 incase it was that that was the problem, but it didnt solve it, so I tried to install IE7 back on but it keeps saying "page not found". I downloaded Mozilla to try downloading IE7 from there but the fault is the same on that too. Leading me to think its not a browser fault, but a computer fault. I was using Norton Anti-virus but it expired so now have Avast. Avast found a few trojans etc, but I cant find anything else wrong now. I have also tried a system restore but that hasnt fixed it either. I've cleared all temp files, cookies, history, ran a disc clean up and a defrag. Can anyone suggest what may be wrong and how can I fix it? Many thanks.

    Broni


      Mastermind
    • Kraków my love :)
    • Thanked: 614
      • Computer Help Forum
    • Computer: Specs
    • Experience: Experienced
    • OS: Windows 8
    Re: Page not found!
    « Reply #1 on: July 13, 2008, 11:47:17 AM »
    Quote
    Whenever I click a link to a page
    Does search engine, itself, open with the results, or you can't access any site?

    3-piece

      Topic Starter


      Rookie

      Re: Page not found!
      « Reply #2 on: July 13, 2008, 12:04:03 PM »
      If I do a google search it gives me the correct search results, but when I click on a link from the results page it redirects me to somewhere completely non related.
      « Last Edit: July 13, 2008, 12:18:52 PM by 3-piece »

      Broni


        Mastermind
      • Kraków my love :)
      • Thanked: 614
        • Computer Help Forum
      • Computer: Specs
      • Experience: Experienced
      • OS: Windows 8
      Re: Page not found!
      « Reply #3 on: July 13, 2008, 12:09:12 PM »
      Print these instructions out.

      1. Download SUPERAntiSpyware Free for Home Users:
      http://www.superantispyware.com/

          * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
          * An icon will be created on your desktop. Double-click that icon to launch the program.
          * If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
          * Close SUPERAntiSpyware.

      PHYSICALLY DISCONNECT  FROM THE INTERNET

      Restart computer in Safe Mode.
      To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

          * Open SUPERAntiSpyware.
          * Under "Configuration and Preferences", click the Preferences button.
          * Click the Scanning Control tab.
          * Under Scanner Options make sure the following are checked (leave all others unchecked):
                o Close browsers before scanning.
                o Scan for tracking cookies.
                o Terminate memory threats before quarantining.
          * Click the "Close" button to leave the control center screen.
          * Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
          * On the left, make sure you check C:\Fixed Drive.
          * On the right, under "Complete Scan", choose Perform Complete Scan.
          * Click "Next" to start the scan. Please be patient while it scans your computer.
          * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
          * Make sure everything has a checkmark next to it and click "Next".
          * A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
          * If asked if you want to reboot, click "Yes".
          * To retrieve the removal information after reboot, launch SUPERAntispyware again.
                o Click Preferences, then click the Statistics/Logs tab.
                o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
                o If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
                o Please copy and paste the Scan Log results in your next reply.
          * Click Close to exit the program.
      Post SUPERAntiSpyware log.

      RECONNECT TO THE INTERNET

      RESTART COMPUTER!

      2. Download Malwarebytes' Anti-Malware: http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html to your desktop.

          * Double-click mbam-setup.exe and follow the prompts to install the program.
          * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
          * If an update is found, it will download and install the latest version.
          * Once the program has loaded, select Perform full scan, then click Scan.
          * When the scan is complete, click OK, then Show Results to view the results.
          * Be sure that everything is checked, and click Remove Selected.
          * When completed, a log will open in Notepad.
          * Post the log back here.

      The log can also be found here:
      C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
      Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

      RESTART COMPUTER!

      3. Download HijackThis:
      http://www.snapfiles.com/get/hijackthis.html
      Post HijackThis log.

      3-piece

        Topic Starter


        Rookie

        Re: Page not found!
        « Reply #4 on: July 13, 2008, 12:53:09 PM »
        I tried to download the superantispyware but it just sends me to "page not found" So I cant  :(
        « Last Edit: July 13, 2008, 01:42:06 PM by 3-piece »

        Broni


          Mastermind
        • Kraków my love :)
        • Thanked: 614
          • Computer Help Forum
        • Computer: Specs
        • Experience: Experienced
        • OS: Windows 8
        Re: Page not found!
        « Reply #5 on: July 13, 2008, 01:39:36 PM »
        Download it from another computer, burn it to CD, memory stick, flash drive, and run it on bad computer.

        3-piece

          Topic Starter


          Rookie

          Re: Page not found!
          « Reply #6 on: July 13, 2008, 01:42:59 PM »
          Ok thanks for your help so far. I'll give it a go tomorrow. Thanks again.

          I'll be back!

          Broni


            Mastermind
          • Kraków my love :)
          • Thanked: 614
            • Computer Help Forum
          • Computer: Specs
          • Experience: Experienced
          • OS: Windows 8
          Re: Page not found!
          « Reply #7 on: July 13, 2008, 01:55:10 PM »
          We'll be here :)

          3-piece

            Topic Starter


            Rookie

            Re: Page not found!
            « Reply #8 on: July 15, 2008, 08:11:33 AM »
            Here are the logs requested:


            SUPERAntiSpyware Scan Log
            http://www.superantispyware.com

            Generated 07/15/2008 at 00:16 AM

            Application Version : 4.15.1000

            Core Rules Database Version : 3469
            Trace Rules Database Version: 1460

            Scan type       : Complete Scan
            Total Scan Time : 09:54:50

            Memory items scanned      : 156
            Memory threats detected   : 0
            Registry items scanned    : 5854
            Registry threats detected : 2
            File items scanned        : 66140
            File threats detected     : 25

            Adware.Tracking Cookie
               C:\Documents and Settings\Ali\Cookies\ali@burstnet[2].txt
               C:\Documents and Settings\Ali\Cookies\ali@advertising[2].txt
               C:\Documents and Settings\Ali\Cookies\ali@casalemedia[1].txt
               C:\Documents and Settings\Ali\Cookies\ali@adbrite[1].txt
               C:\Documents and Settings\Ali\Cookies\ali@AdRotator[2].txt
               C:\Documents and Settings\Ali\Cookies\ali@adserver[1].txt
               C:\Documents and Settings\Ali\Cookies\ali@apmebf[1].txt
               C:\Documents and Settings\Ali\Cookies\[email protected][2].txt
               C:\Documents and Settings\Ali\Cookies\ali@tribalfusion[1].txt
               C:\Documents and Settings\Ali\Cookies\ali@zedo[1].txt
               C:\Documents and Settings\Ali\Cookies\ali@revenue[1].txt
               C:\Documents and Settings\Ali\Cookies\ali@tacoda[1].txt
               C:\Documents and Settings\Ali\Cookies\ali@fastclick[1].txt
               C:\Documents and Settings\Ali\Cookies\[email protected][1].txt
               C:\Documents and Settings\Ali\Cookies\ali@serving-sys[1].txt
               C:\Documents and Settings\Ali\Cookies\ali@atdmt[2].txt
               C:\Documents and Settings\Ali\Cookies\[email protected][2].txt
               C:\Documents and Settings\Ali\Cookies\[email protected][1].txt
               C:\Documents and Settings\Ali\Cookies\[email protected][1].txt
               C:\Documents and Settings\Ali\Cookies\ali@doubleclick[1].txt
               C:\Documents and Settings\Ali\Cookies\ali@realmedia[2].txt
               C:\Documents and Settings\Ali\Cookies\ali@adrevolver[2].txt
               .adbrite.com [ C:\Documents and Settings\Ali\Application Data\Mozilla\Firefox\Profiles\3dx7lgf8.default\cookies.txt ]
               .adbrite.com [ C:\Documents and Settings\Ali\Application Data\Mozilla\Firefox\Profiles\3dx7lgf8.default\cookies.txt ]
               .adbrite.com [ C:\Documents and Settings\Ali\Application Data\Mozilla\Firefox\Profiles\3dx7lgf8.default\cookies.txt ]
               .adbrite.com [ C:\Documents and Settings\Ali\Application Data\Mozilla\Firefox\Profiles\3dx7lgf8.default\cookies.txt ]

            Trojan.WinFixer 2006
               HKCR\UWFX6PCheck.UWFX6PCheck.1
               HKCR\UWFX6PCheck.UWFX6PCheck.1\CLSID
               C:\Program Files\Common Files\WinFixer 2006
               C:\WINDOWS\system32\drivers\d_kmd.sys

            Rogue.AntiVirusProtection
               C:\WINDOWS\SYSTEM32\FILEKILLER.DLL



            3-piece

              Topic Starter


              Rookie

              Re: Page not found!
              « Reply #9 on: July 15, 2008, 08:13:04 AM »
              Malwarebytes' Anti-Malware 1.20
              Database version: 951
              Windows 5.1.2600 Service Pack 2

              14:51:25 15/07/2008
              mbam-log-7-15-2008 (14-51-25).txt

              Scan type: Full Scan (C:\|)
              Objects scanned: 109128
              Time elapsed: 37 minute(s), 3 second(s)

              Memory Processes Infected: 0
              Memory Modules Infected: 0
              Registry Keys Infected: 11
              Registry Values Infected: 2
              Registry Data Items Infected: 33
              Folders Infected: 0
              Files Infected: 0

              Memory Processes Infected:
              (No malicious items detected)

              Memory Modules Infected:
              (No malicious items detected)

              Registry Keys Infected:
              HKEY_CLASSES_ROOT\CLSID\{147a976f-eee1-4377-8ea7-4716e4cdd239} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
              HKEY_CLASSES_ROOT\mywebsearch.pseudotransparentplugin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
              HKEY_CLASSES_ROOT\mywebsearch.pseudotransparentplugin.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
              HKEY_CLASSES_ROOT\CLSID\{84da4fdf-a1cf-4195-8688-3e961f505983} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
              HKEY_CLASSES_ROOT\Interface\{2e9937fc-cf2f-4f56-af54-5a6a3dd375cc} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
              HKEY_CLASSES_ROOT\Interface\{741de825-a6f0-4497-9aa6-8023cf9b0fff} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SOFTWARE\Telecom Advance (Rogue.Multiple) -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SOFTWARE\Screensavers.com (Adware.Comet) -> Quarantined and deleted successfully.

              Registry Values Infected:
              HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\p2p networking (Backdoor.Bot) -> Quarantined and deleted successfully.
              HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\MenuExt\&Search\ (Adware.Hotbar) -> Quarantined and deleted successfully.

              Registry Data Items Infected:
              HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60 85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{20d39e9d-71b2-4af6-a6ad-e5e2fe17ebb6}\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{411892cf-2a04-4b07-8c97-ca00a4850bc5}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{411892cf-2a04-4b07-8c97-ca00a4850bc5}\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{44383e55-3948-4a31-99d4-874c275eb33b}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{44383e55-3948-4a31-99d4-874c275eb33b}\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{76c14582-ae56-4b5b-9540-4f92fb781138}\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{98454c81-5abb-41df-9fa5-812e6783d434}\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{bc7ffa95-1ba6-4d32-9d04-66cf380b6e0d}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{bc7ffa95-1ba6-4d32-9d04-66cf380b6e0d}\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{dfbc6323-e575-4617-aec0-605d0603dce4}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60 85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{20d39e9d-71b2-4af6-a6ad-e5e2fe17ebb6}\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{411892cf-2a04-4b07-8c97-ca00a4850bc5}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{411892cf-2a04-4b07-8c97-ca00a4850bc5}\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{44383e55-3948-4a31-99d4-874c275eb33b}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{44383e55-3948-4a31-99d4-874c275eb33b}\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{76c14582-ae56-4b5b-9540-4f92fb781138}\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{98454c81-5abb-41df-9fa5-812e6783d434}\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{bc7ffa95-1ba6-4d32-9d04-66cf380b6e0d}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{bc7ffa95-1ba6-4d32-9d04-66cf380b6e0d}\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{dfbc6323-e575-4617-aec0-605d0603dce4}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60 85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{20d39e9d-71b2-4af6-a6ad-e5e2fe17ebb6}\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{411892cf-2a04-4b07-8c97-ca00a4850bc5}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{411892cf-2a04-4b07-8c97-ca00a4850bc5}\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{44383e55-3948-4a31-99d4-874c275eb33b}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{44383e55-3948-4a31-99d4-874c275eb33b}\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{76c14582-ae56-4b5b-9540-4f92fb781138}\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{98454c81-5abb-41df-9fa5-812e6783d434}\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{bc7ffa95-1ba6-4d32-9d04-66cf380b6e0d}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{bc7ffa95-1ba6-4d32-9d04-66cf380b6e0d}\NameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.
              HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{dfbc6323-e575-4617-aec0-605d0603dce4}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.116.60,85.255.112.86 -> Quarantined and deleted successfully.

              Folders Infected:
              (No malicious items detected)

              Files Infected:
              (No malicious items detected)





              3-piece

                Topic Starter


                Rookie

                Re: Page not found!
                « Reply #10 on: July 15, 2008, 08:15:30 AM »
                Logfile of Trend Micro HijackThis v2.0.2
                Scan saved at 09:41:03, on 15/07/2008
                Platform: Windows XP SP2 (WinNT 5.01.2600)
                MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
                Boot mode: Normal

                Running processes:
                C:\WINDOWS\System32\smss.exe
                C:\WINDOWS\system32\winlogon.exe
                C:\WINDOWS\system32\services.exe
                C:\WINDOWS\system32\lsass.exe
                C:\WINDOWS\system32\Ati2evxx.exe
                C:\WINDOWS\system32\svchost.exe
                C:\WINDOWS\System32\svchost.exe
                C:\WINDOWS\system32\ACS.exe
                C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
                C:\Program Files\Alwil Software\Avast4\ashServ.exe
                C:\WINDOWS\system32\Ati2evxx.exe
                C:\WINDOWS\Explorer.EXE
                C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
                C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
                C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
                C:\WINDOWS\AGRSMMSG.exe
                C:\Program Files\Toshiba\Toshiba Applet\thotkey.exe
                C:\Program Files\TOSHIBA\Tvs\TvsTray.exe
                C:\WINDOWS\system32\TPSMain.exe
                C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
                C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
                C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
                C:\WINDOWS\system32\dla\tfswctrl.exe
                C:\PROGRA~1\Yahoo!\browser\ybrwicon.exe
                C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
                C:\Program Files\D-Tools\daemon.exe
                C:\WINDOWS\system32\TPSBattM.exe
                C:\Program Files\Lexmark 1200 Series\lxczbmgr.exe
                C:\Program Files\Lexmark 1200 Series\lxczbmon.exe
                C:\PROGRA~1\Yahoo!\browser\ycommon.exe
                C:\PROGRA~1\BTBROA~1\Help\SMARTB~1\BTHelpNotifier.exe
                C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe
                C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe
                C:\Program Files\Logitech\QuickCam\Quickcam.exe
                C:\Program Files\Common Files\Real\Update_OB\realsched.exe
                C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
                C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe
                C:\WINDOWS\system32\LEXBCES.EXE
                C:\WINDOWS\system32\ctfmon.exe
                C:\WINDOWS\system32\spoolsv.exe
                C:\WINDOWS\system32\LEXPPS.EXE
                C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
                C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe
                C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
                C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
                C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe
                C:\WINDOWS\system32\svchost.exe
                C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe
                C:\Program Files\BT Broadband 2091\Help\bin\mpbtn.exe
                C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
                C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe
                C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
                C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe
                C:\WINDOWS\system32\wscntfy.exe
                C:\WINDOWS\system32\notepad.exe
                C:\Program Files\Internet Explorer\iexplore.exe
                C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
                C:\PROGRA~1\Motive\ASSTCO~1\MOTIVE~1.EXE
                C:\Program Files\BT Broadband 2091\Help\bin\BTHelp.exe
                C:\WINDOWS\System32\svchost.exe
                C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

                R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/
                R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/su/*http://uk.search.yahoo.com/
                R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/sb/*http://uk.docs.yahoo.com/info/bt_side.html
                R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/sp/*http://uk.search.yahoo.com/
                R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
                R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/su/*http://uk.search.yahoo.com/
                R3 - URLSearchHook: {1A03F196-9617-4CA0-842B-A83CEECB022B} -  - (no file)
                R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn2\yt.dll
                O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
                O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
                O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
                O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
                O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
                O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
                O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
                O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.1.1119.1736\swg.dll
                O2 - BHO: SidebarAutoLaunch Class - {F2AA9440-6328-4933-B7C9-A6CCDF9CBF6D} - C:\Program Files\Yahoo!\browser\YSidebarIEBHO.dll
                O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn2\yt.dll
                O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
                O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
                O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
                O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
                O4 - HKLM\..\Run: [THotkey] C:\Program Files\Toshiba\Toshiba Applet\thotkey.exe
                O4 - HKLM\..\Run: [Tvs] C:\Program Files\TOSHIBA\Tvs\TvsTray.exe
                O4 - HKLM\..\Run: [TPSMain] TPSMain.exe
                O4 - HKLM\..\Run: [NDSTray.exe] NDSTray.exe
                O4 - HKLM\..\Run: [SmoothView] C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
                O4 - HKLM\..\Run: [PadTouch] C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
                O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
                O4 - HKLM\..\Run: [YBrowser] C:\PROGRA~1\Yahoo!\browser\ybrwicon.exe
                O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
                O4 - HKLM\..\Run: [DAEMON Tools-1033] "C:\Program Files\D-Tools\daemon.exe"  -lang 1033
                O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
                O4 - HKLM\..\Run: [Lexmark 1200 Series] "C:\Program Files\Lexmark 1200 Series\lxczbmgr.exe"
                O4 - HKLM\..\Run: [CmSkype] "C:\Program Files\USBPhone\USBPhone.exe" RUNSTART
                O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\BTBROA~1\Help\SMARTB~1\BTHelpNotifier.exe
                O4 - HKLM\..\Run: [P2P Networking] C:\WINDOWS\system32\P2P Networking\P2P Networking.exe /AUTOSTART
                O4 - HKLM\..\Run: [Sony Ericsson PC Suite] "C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" /startoptions
                O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe"
                O4 - HKLM\..\Run: [LogitechCommunicationsManager] "C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe"
                O4 - HKLM\..\Run: [LogitechQuickCamRibbon] "C:\Program Files\Logitech\QuickCam\Quickcam.exe" /hide
                O4 - HKLM\..\Run: [e] C:\WINDOWS\system32\e.exe
                O4 - HKLM\..\Run: [ztbrvp] C:\WINDOWS\system32\ztbrvp.exe
                O4 - HKLM\..\Run: [Super System Helper] C:\Program Files\igoodsoft\Super System Helper\SystemTool /1
                O4 - HKLM\..\Run: [NBKeyScan] "C:\Program Files\Nero\Nero8\Nero BackItUp\NBKeyScan.exe"
                O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
                O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe"  -osboot
                O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
                O4 - HKCU\..\Run: [TOSCDSPD] C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe
                O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\lib\NMBgMonitor.exe"
                O4 - HKCU\..\Run: [WinFixer2006] "C:\Program Files\WinFixer_2006\UWFX6.exe" /scan
                O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
                O4 - HKCU\..\Run: [Disk Cleaner] "C:\Program Files\Disk Cleaner\DiskCleaner.Exe" /boot
                O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
                O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
                O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
                O4 - Startup: Microsoft Office OneNote 2003 Quick Launch.lnk = C:\Program Files\Microsoft Office\OFFICE11\ONENOTEM.EXE
                O4 - Global Startup: Broadband Desktop Help.lnk = C:\Program Files\BT Broadband 2091\Help\bin\matcli.exe
                O8 - Extra context menu item: &Search - http://edits.mywebsearch.com/toolbaredits/menusearch.jhtml?p=ZNxuk101YYGB
                O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
                O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
                O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
                O9 - Extra button: BT Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
                O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
                O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
                O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
                O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
                O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
                O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} (QuickTime Object) - http://a1540.g.akamai.net/7/1540/52/20061205/qtinstall.info.apple.com/qtactivex/qtplugin.cab
                O16 - DPF: {070CA17A-4BD2-4612-83B4-32B1B9159B47} (ULiveCtrl Control) - http://uc.sina.com.cn/download/live/weblive2.4.0.0.cab
                O16 - DPF: {1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB} - http://ak.exe.imgfarm.com/images/nocache/funwebproducts/ei/SmileyCentralFWBInitialSetup1.0.0.15.cab
                O16 - DPF: {1D6711C8-7154-40BB-8380-3DEA45B69CBF} (Web P2P Installer) -
                O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\common\yinsthelper.dll
                O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://totalikinki69.spaces.msn.com//PhotoUpload/MsnPUpld.cab
                O16 - DPF: {71057C18-0507-4747-86BC-E11CE7512C5F} (mailhelper Class) - https://register.btinternet.com/templates/btmailcontrol013.cab
                O16 - DPF: {A18962F6-E6ED-40B1-97C9-1FB36F38BFA8} (Aurigma Image Uploader 3.5 Control) - http://www.filelodge.com/ImageUploader3.cab
                O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
                O16 - DPF: {D821DC4A-0814-435E-9820-661C543A4679} (CRLDownloadWrapper Class) - http://drmlicense.one.microsoft.com/crlupdate/en/crlocx.ocx
                O16 - DPF: {EC5A4E7B-02EB-451D-B310-D5F2E0A4D8C3} (webhelper Class) - https://register.btinternet.com/templates/btwebcontrol028.cab
                O17 - HKLM\System\CCS\Services\Tcpip\..\{20D39E9D-71B2-4AF6-A6AD-E5E2FE17EBB6}: NameServer = 85.255.116.60,85.255.112.86
                O17 - HKLM\System\CCS\Services\Tcpip\..\{411892CF-2A04-4B07-8C97-CA00A4850BC5}: NameServer = 85.255.116.60,85.255.112.86
                O17 - HKLM\System\CCS\Services\Tcpip\..\{44383E55-3948-4A31-99D4-874C275EB33B}: NameServer = 85.255.116.60,85.255.112.86
                O17 - HKLM\System\CCS\Services\Tcpip\..\{76C14582-AE56-4B5B-9540-4F92FB781138}: NameServer = 85.255.116.60,85.255.112.86
                O17 - HKLM\System\CCS\Services\Tcpip\..\{98454C81-5ABB-41DF-9FA5-812E6783D434}: NameServer = 85.255.116.60,85.255.112.86
                O17 - HKLM\System\CCS\Services\Tcpip\..\{BC7FFA95-1BA6-4D32-9D04-66CF380B6E0D}: NameServer = 85.255.116.60,85.255.112.86
                O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 85.255.116.60 85.255.112.86
                O17 - HKLM\System\CS1\Services\Tcpip\..\{20D39E9D-71B2-4AF6-A6AD-E5E2FE17EBB6}: NameServer = 85.255.116.60,85.255.112.86
                O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.116.60 85.255.112.86
                O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
                O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\system32\ACS.exe
                O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
                O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
                O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
                O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
                O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
                O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
                O23 - Service: Print Spooler Service (dorairtoe) - Unknown owner - C:\WINDOWS\system32\e.exe
                O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
                O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe
                O23 - Service: Imapi Helper - Alex Feinman - C:\Program Files\Alex Feinman\ISO Recorder\ImapiHelper.exe
                O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
                O23 - Service: LVCOMSer - Logitech Inc. - C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe
                O23 - Service: Process Monitor (LVPrcSrv) - Logitech Inc. - C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe
                O23 - Service: LVSrvLauncher - Logitech Inc. - C:\Program Files\Common Files\LogiShrd\SrvLnch\SrvLnch.exe
                O23 - Service: TOSHIBA Application Service (TAPPSRV) - TOSHIBA Corp. - C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe
                O23 - Service: YPCService - Yahoo! Inc. - C:\WINDOWS\system32\YPCSER~1.EXE

                --
                End of file - 14608 bytes

                3-piece

                  Topic Starter


                  Rookie

                  Re: Page not found!
                  « Reply #11 on: July 15, 2008, 09:48:47 AM »
                  So far so good! Its let me install IE7 again and it goes directly to any links that I click. So thankyou very very much for your help. Is there anything else I need to do? Many thanks again for returning my laptop to a useable state again!!!!  ;D

                  SuperDave

                  • Malware Removal Specialist
                  • Moderator


                  • Genius
                  • Thanked: 1020
                  • Certifications: List
                  • Experience: Expert
                  • OS: Windows 10
                  Re: Page not found!
                  « Reply #12 on: July 15, 2008, 10:08:42 AM »
                  There are some issues that need to be fixed. Just hang tight until Broni gets back to you.
                  Windows 8 and Windows 10 dual boot with two SSD's

                  Broni


                    Mastermind
                  • Kraków my love :)
                  • Thanked: 614
                    • Computer Help Forum
                  • Computer: Specs
                  • Experience: Experienced
                  • OS: Windows 8
                  Re: Page not found!
                  « Reply #13 on: July 15, 2008, 05:06:50 PM »
                  As SuperDave said...

                  DO NOT make any changes to your computer (like installing programs, using another cleaning tools, etc.), until it's officially declared clean!!!

                  Broni


                    Mastermind
                  • Kraków my love :)
                  • Thanked: 614
                    • Computer Help Forum
                  • Computer: Specs
                  • Experience: Experienced
                  • OS: Windows 8
                  Re: Page not found!
                  « Reply #14 on: July 15, 2008, 05:35:42 PM »
                  *** Did you  buy $368.00 worth Super System Helper by Igoodsoft, or is it bootleg? If bootleg, please, uninstall - it might have been infected download. Let me know.

                  *** Go Start>Control Panel>Add\Remove, and uninstall (if present):
                  - WinFixer_2006

                  *** You need to update Java:
                  http://java.sun.com/javase/downloads/index.jsp
                  Java Runtime Environment (JRE) 6 Update 7
                  Uninstall all previous versions of Java through Add\Remove.

                  *** Download, and run  CTFMON-Remover: http://www.gerhard-schlager.at/en/projects/ctfmonremover/
                  The CTFMON-Remover helps you removing the annoying CTFMON.EXE from your Windows operating system. The program is easy to use and displays whether the CTFMON.EXE is installed and running or not. If it was found then you can remove it within seconds. Just in case that you need the CTFMON sometime in the future there is also an option to restore the original one.
                  Note:The CTFMON.EXE is among other things responsible for changing the language schema of your keyboard (e.g. for switching between the German and English keyboard layout). So in case you are using this feature you shouldn't remove or disable the CTFMON.EXE!

                  *** Download, and run QuickTime Killer: http://www.softpedia.com/get/System/Launchers-Shutdown-Tools/QuickTime-Killer.shtml
                  QuickTime Killer will remove QuickTime from start up and kill any running QuickTime processes. This application runs silently at start up and closes itself as soon as it takes care of QuickTime

                  1. Print this post out, since you won't have an access to it, at some point.

                  2. Close all windows, except for HijackThis.

                  3. Put a checkmark next to the following HijackThis entries (some entries will be checkmarked to disable unnecessary startups; in those cases [marked with *], no actual program will be removed):

                  - R3 - URLSearchHook: {1A03F196-9617-4CA0-842B-A83CEECB022B} - - (no file)
                  - O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
                  - *O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
                  - *O4 - HKLM\..\Run: [Lexmark 1200 Series] "C:\Program Files\Lexmark 1200 Series\lxczbmgr.exe"
                  - *O4 - HKLM\..\Run: [Motive SmartBridge] C:\PROGRA~1\BTBROA~1\Help\SMARTB~1\BTHelpNotifier.exe
                  - O4 - HKLM\..\Run: [P2P Networking] C:\WINDOWS\system32\P2P Networking\P2P Networking.exe /AUTOSTART
                  - O4 - HKLM\..\Run: [e] C:\WINDOWS\system32\e.exe
                  - O4 - HKLM\..\Run: [ztbrvp] C:\WINDOWS\system32\ztbrvp.exe
                  - *O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
                  - O4 - HKCU\..\Run: [WinFixer2006] "C:\Program Files\WinFixer_2006\UWFX6.exe" /scan
                  - *O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
                  - *O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
                  - *O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
                  - *O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
                  - *O4 - Global Startup: Broadband Desktop Help.lnk = C:\Program Files\BT Broadband 2091\Help\bin\matcli.exe
                  - O8 - Extra context menu item: &Search - http://edits.mywebsearch.com/toolbaredits/menusearch.jhtml?p=ZNxuk101YYGB
                  - O16 - DPF: {1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB} - http://ak.exe.imgfarm.com/images/nocache/funwebproducts/ei/SmileyCentralFWBIniti alSetup1.0.0.15.cab
                  - O16 - DPF: {1D6711C8-7154-40BB-8380-3DEA45B69CBF} (Web P2P Installer) -
                  - if UkrTeleGroup is NOT your ISP, checkmark ALL O17 entries
                  - *O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
                  - O23 - Service: Print Spooler Service (dorairtoe) - Unknown owner - C:\WINDOWS\system32\e.exe


                  4. Click on Fix checked button.

                  5. Restart computer in Safe Mode (keep tapping F8 key, when your computer starts, until menu appears)

                  6. Open Windows Explorer. Go Tools>Folder Options>View tab, put a checkmark next to Show hidden files, and folders.

                  7. Delete following files/folders (if present):

                  - P2P Networking folder from C:\WINDOWS\system32
                  - e.exe, ztbrvp.exe files from C:\WINDOWS\system32
                  - WinFixer_2006 folder from C:\Program Files

                  8. Restart in Normal Mode.

                  9. Post new HijackThis log.