Hello,

I somehow acquired a new virus that I cannot get rid of at all. It causes popups to happen frequently, as soon as I turn my computer on; and causes my computer to run slower. I had a virus before, so I have some virus removal programs already installed: hijackthis, spybot, ad-aware, etc.
If anyone could help me fix my computer it will be greatly appreciated. Thank you.

-Derek

Recommended Answers

All 7 Replies

Post a log from hijackthis taken after a reboot. Make certain that hijackthis is in a permanent folder and that it is the latest (1.99.1) version.

Logfile of HijackThis v1.99.1
Scan saved at 10:29:19 AM, on 5/30/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\System32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\Program Files\Norton AntiVirus\SAVScan.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.exe
c:\windows\system32\grdoceu.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Java\j2re1.4.2_03\bin\jusched.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\Unload\hpqcmon.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Program Files\Roxio\Easy CD Creator 6\DragToDisc\DrgToDsc.exe
C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd.exe
C:\WINDOWS\System32\hphmon05.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\System32\winupdt.exe
C:\WINDOWS\System32\RUNDLL32.exe
C:\Documents and Settings\All Users\Application Data\msw\BMan1.exe
C:\WINDOWS\System32\safsrvps.exe
C:\Program Files\AutoUpdate\AutoUpdate.exe
C:\WINDOWS\System32\exp.exe
C:\WINDOWS\System32\wintask.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\System32\3fs3f365.exe
C:\WINDOWS\System32\rundll32.exe
C:\WINDOWS\System32\rundll32.exe
C:\WINDOWS\System32\rundll32.exe
C:\DOCUME~1\ALLUSE~1\APPLIC~1\msw\BMan.exe
C:\WINDOWS\System32\vvuppl.exe
C:\WINDOWS\System32\wmerrenu.exe
C:\WINDOWS\System32\rsveapir.exe
C:\Program Files\sf\sf.exe
C:\WINDOWS\sfita.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Messenger\msmsgs.exe
C:\New Folder\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = file://C:\WINDOWS\System32\Searchx.htm
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://websearch.drsnsrch.com/sidesearch.cgi?id=
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://websearch.drsnsrch.com/sidesearch.cgi?id=
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://websearch.drsnsrch.com/sidesearch.cgi?id=
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://websearch.drsnsrch.com/sidesearch.cgi?id=
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = http://websearch.drsnsrch.com/sidesearch.cgi?id=
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = websearch.drsnsrch.com/q.cgi?q=
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
F2 - REG:system.ini: Shell=Explorer.exe C:\WINDOWS\Nail.exe
O2 - BHO: CExtension Object - {0019C3E2-DD48-4A6D-ABCD-8D32436323D9} - C:\WINDOWS\cfgmgr52.dll
O2 - BHO: Band Class - {01F44A8A-8C97-4325-A378-76E68DC4AB2E} - C:\WINDOWS\systb.dll (file missing)
O2 - BHO: (no name) - {5437D1E0-FA38-41EF-816B-D9F299E767CA} - C:\WINDOWS\System32\dmcAE9E.dll
O3 - Toolbar: (no name) - {2CDE1A7D-A478-4291-BF31-E1B4C16F92EB} - (no file)
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe
O4 - HKLM\..\Run: [Cpqset] C:\Program Files\HPQ\Default Settings\cpqset.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_03\bin\jusched.exe
O4 - HKLM\..\Run: [CamMonitor] C:\Program Files\Hewlett-Packard\Digital Imaging\Unload\hpqcmon.exe
O4 - HKLM\..\Run: [RoxioEngineUtility] "C:\Program Files\Common Files\Roxio Shared\System\EngUtil.exe"
O4 - HKLM\..\Run: [RoxioDragToDisc] "C:\Program Files\Roxio\Easy CD Creator 6\DragToDisc\DrgToDsc.exe"
O4 - HKLM\..\Run: [HPHUPD05] C:\Program Files\Hewlett-Packard\{45B6180B-DCAB-4093-8EE8-6164457517F0}\hphupd05.exe
O4 - HKLM\..\Run: [HP Software Update] "C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd.exe"
O4 - HKLM\..\Run: [HPHmon05] C:\WINDOWS\System32\hphmon05.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [SSC_UserPrompt] C:\Program Files\Common Files\Symantec Shared\Security Center\UsrPrmpt.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [winupdtl] C:\WINDOWS\System32\winupdt.exe
O4 - HKLM\..\Run: [AUNPS2] RUNDLL32 AUNPS2.DLL,_Run@16
O4 - HKLM\..\Run: [BMan] C:\Documents and Settings\All Users\Application Data\msw\BMan1.exe
O4 - HKLM\..\Run: [cfgmgr52] RunDLL32.EXE C:\WINDOWS\cfgmgr52.dll,DllRun
O4 - HKLM\..\Run: [t8mW35V] safsrvps.exe
O4 - HKLM\..\Run: [AutoUpdater] "C:\Program Files\AutoUpdate\AutoUpdate.exe"
O4 - HKLM\..\Run: [exp.exe] C:\WINDOWS\System32\exp.exe
O4 - HKLM\..\Run: [WinTask driver] C:\WINDOWS\System32\wintask.exe
O4 - HKLM\..\Run: [eedefc519474] C:\WINDOWS\System32\3fs3f365.exe
O4 - HKLM\..\Run: [{12EE7A5E-0674-42f9-A76B-000000004D00}] rundll32.exe stlb2.dll,DllRunMain
O4 - HKLM\..\Run: [A70F6A1D-0195-42a2-934C-D8AC0F7C08EB] rundll32.exe E6F1873B.DLL,D9EBC318C
O4 - HKLM\..\Run: [98D0CE0C16B1] rundll32.exe D0CE0C16B1,D0CE0C16B1
O4 - HKLM\..\Run: [KavSvc] C:\WINDOWS\System32\vvuppl.exe reg_run
O4 - HKLM\..\Run: [irjvki] C:\WINDOWS\System32\irjvki.exe
O4 - HKLM\..\RunOnce: [SpybotSnD] "C:\Program Files\Spybot\SpybotSD.exe" /autocheck
O4 - HKCU\..\Run: [MoneyAgent] "c:\Program Files\Microsoft Money\System\mnyexpr.exe"
O4 - HKCU\..\Run: [wmerrenu] C:\WINDOWS\System32\wmerrenu.exe
O4 - HKCU\..\Run: [cz56RRZFj] rsveapir.exe
O4 - HKCU\..\Run: [sf] C:\Program Files\sf\sf.exe
O4 - HKCU\..\Run: [sfita] C:\WINDOWS\sfita.exe
O4 - Global Startup: Quicken Scheduled Updates.lnk = C:\Program Files\Quicken\bagent.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_03\bin\npjpi142_03.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_03\bin\npjpi142_03.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~4\OFFICE11\REFIEBAR.DLL
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O15 - Trusted Zone: http://www.neededware.com
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004061001/housecall.trendmicro.com/housecall/xscan53.cab
O20 - Winlogon Notify: iexplore - C:\WINDOWS\SYSTEM32\3fsff.dll
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: System Startup Service (SvcProc) - Unknown owner - C:\WINDOWS\svcproc.exe
O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe

Thank you.

Please download the trial version of Ewido Security Suite here:
http://www.ewido.net/en/download/
Install it, and update the definitions to the newest files. Do NOT run a scan yet.

Please download Nailfix from here:
http://www.noidea.us/easyfile/file.php?download=20050515010747824
Unzip it to the desktop but please do NOT run it yet.

Next, please reboot your computer in Safe Mode by doing the following:
1) Restart your computer
2) After hearing your computer beep once during startup, but before the Windows icon appears, press F8.
3) Instead of Windows loading as normal, a menu should appear
4) Select the first option, to run Windows in Safe Mode.

For additional help in booting into Safe Mode, see the following site:
http://www.pchell.com/support/safemode.shtml


Once in Safe Mode, please double-click on Nailfix.cmd. Your desktop and icons will disappear and reappear, and a window should open and close very quickly --- this is normal.

Then please run Ewido, and run a full scan. Save the logfile from the scan.

Next please run HijackThis, click Scan, and check:

F2 - REG:system.ini: Shell=Explorer.exe C:\WINDOWS\Nail.exe

Close all open windows except for HijackThis and click Fix Checked.

Restart your computer in normal mode and please post a new HijackThis log, as well as the log from the Ewido scan.

You may have the latest version of VX2. Download L2mfix from one of these two locations:

http://www.atribune.org/downloads/l2mfix.exe
http://www.downloads.subratam.org/l2mfix.exe

Save the file to your desktop and double click l2mfix.exe. Click the Install button to extract the files and follow the prompts, then open the newly added l2mfix folder on your desktop. Double click l2mfix.bat and select option #1 for Run Find Log by typing 1 and then pressing enter. This will scan your computer and it may appear nothing is happening, then, after a minute or 2, notepad will open with a log. Copy the contents of that log and paste it into this thread.

IMPORTANT: Do NOT run option #2 OR any other files in the l2mfix folder until you are asked to do so!

Hello,

The ewido scan was successful, however, about 90% through the scan twice in a row, the program had an error and needed to shut down. So the time it did fully scan, my computer was clean and nothing showed up on the logfile.

HijackThis log:


Logfile of HijackThis v1.99.1
Scan saved at 10:59:42 AM, on 6/12/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)


Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\PCHealth\HelpCtr\Binaries\HelpSvc.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\New Folder\HijackThis.exe


R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://websearch.drsnsrch.com/sidesearch.cgi?id=
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://websearch.drsnsrch.com/sidesearch.cgi?id=
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://websearch.drsnsrch.com/sidesearch.cgi?id=
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = websearch.drsnsrch.com/q.cgi?q=
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - URLSearchHook: (no name) - _{CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)
O2 - BHO: &EliteBar - {28CAEFF3-0F18-4036-B504-51D73BD81ABC} - C:\WINDOWS\EliteToolBar\EliteToolBar version 60.dll (file missing)
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe
O4 - HKLM\..\Run: [Cpqset] C:\Program Files\HPQ\Default Settings\cpqset.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_03\bin\jusched.exe
O4 - HKLM\..\Run: [CamMonitor] C:\Program Files\Hewlett-Packard\Digital Imaging\Unload\hpqcmon.exe
O4 - HKLM\..\Run: [RoxioEngineUtility] "C:\Program Files\Common Files\Roxio Shared\System\EngUtil.exe"
O4 - HKLM\..\Run: [RoxioDragToDisc] "C:\Program Files\Roxio\Easy CD Creator 6\DragToDisc\DrgToDsc.exe"
O4 - HKLM\..\Run: [HPHUPD05] C:\Program Files\Hewlett-Packard\{45B6180B-DCAB-4093-8EE8-6164457517F0}\hphupd05.exe
O4 - HKLM\..\Run: [HP Software Update] "C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd.exe"
O4 - HKLM\..\Run: [HPHmon05] C:\WINDOWS\System32\hphmon05.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [SSC_UserPrompt] C:\Program Files\Common Files\Symantec Shared\Security Center\UsrPrmpt.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe"  -osboot
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [98D0CE0C16B1] rundll32.exe D0CE0C16B1,D0CE0C16B1
O4 - HKLM\..\Run: [Internet Optimizer] "C:\Program Files\Internet Optimizer\optimize.exe"
O4 - HKLM\..\Run: [t8mW35V] ir4resizepx.exe
O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
O4 - HKCU\..\Run: [MoneyAgent] "c:\Program Files\Microsoft Money\System\mnyexpr.exe"
O4 - HKCU\..\Run: [wmerrenu] C:\WINDOWS\System32\wmerrenu.exe
O4 - HKCU\..\Run: [cz56RRZFj] inpint35.exe
O4 - HKCU\..\Run: [sf] C:\Program Files\sf\sf.exe
O4 - HKCU\..\Run: [sfita] C:\WINDOWS\sfita.exe
O4 - Global Startup: Quicken Scheduled Updates.lnk = C:\Program Files\Quicken\bagent.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_03\bin\npjpi142_03.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_03\bin\npjpi142_03.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~4\OFFICE11\REFIEBAR.DLL
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O15 - Trusted Zone: http://www.neededware.com
O15 - Trusted Zone: http://awbeta.net-nucleus.com (HKLM)
O16 - DPF: NDWCab - http://www.neededware.com/ndw2.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004061001/housecall.trendmicro.com/housecall/xscan53.cab
O20 - Winlogon Notify: iexplore - 3fsff.dll (file missing)
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido\security suite\ewidoguard.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Lexar JD31 (LxrJD31s) - Unknown owner - C:\WINDOWS\SYSTEM32\LxrJD31s.exe
O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe


The file F2-REG:system.ini... was not there, so I couldnt delete it.


In the VX2 scan, this window would pop up after I chose option #1:


C:WINDOWS\SYSTEM32\AUTOEXEC.NT. The system file is not suitable for running MS-DOS and Microsoft Window applications. Chose 'close' to terminate the application.


I chose Ignore instead of close, and the logfile poped up directly afterward.



L2MFIX find log 1.03
These are the registry keys present
**********************************************************************************
Winlogon/notify:
Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]


[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\AtiExtEvent]
"DLLName"="Ati2evxx.dll"
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000001
"Lock"="AtiLockEvent"
"Logoff"="AtiLogoffEvent"
"Logon"="AtiLogonEvent"
"Disconnect"="AtiDisConnectEvent"
"Reconnect"="AtiReConnectEvent"
"Safe"=dword:00000000
"Shutdown"="AtiShutdownEvent"
"StartScreenSaver"="AtiStartScreenSaverEvent"
"StartShell"="AtiStartShellEvent"
"Startup"="AtiStartupEvent"
"StopScreenSaver"="AtiStopScreenSaverEvent"
"Unlock"="AtiUnLockEvent"


[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt32chain]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,33,00,32,00,2e,00,64,00,6c,00,\
6c,00,00,00
"Logoff"="ChainWlxLogoffEvent"


[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cryptnet]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,6e,00,65,00,74,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Logoff"="CryptnetWlxLogoffEvent"


[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cscdll]
"DLLName"="cscdll.dll"
"Logon"="WinlogonLogonEvent"
"Logoff"="WinlogonLogoffEvent"
"ScreenSaver"="WinlogonScreenSaverEvent"
"Startup"="WinlogonStartupEvent"
"Shutdown"="WinlogonShutdownEvent"
"StartShell"="WinlogonStartShellEvent"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001


[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\iexplore]
"DllName"=hex(2):33,00,66,00,73,00,66,00,66,00,2e,00,64,00,6c,00,6c,00,00,00
"Startup"="expF4"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001
"MaxWait"=dword:00000001


[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ScCertProp]
"DLLName"="wlnotify.dll"
"Logon"="SCardStartCertProp"
"Logoff"="SCardStopCertProp"
"Lock"="SCardSuspendCertProp"
"Unlock"="SCardResumeCertProp"
"Enabled"=dword:00000001
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001


[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Schedule]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"StartShell"="SchedStartShell"
"Logoff"="SchedEventLogOff"


[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\sclgntfy]
"Logoff"="WLEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001
"DllName"=hex(2):73,00,63,00,6c,00,67,00,6e,00,74,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00


[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SensLogn]
"DLLName"="WlNotify.dll"
"Lock"="SensLockEvent"
"Logon"="SensLogonEvent"
"Logoff"="SensLogoffEvent"
"Safe"=dword:00000001
"MaxWait"=dword:00000258
"StartScreenSaver"="SensStartScreenSaverEvent"
"StopScreenSaver"="SensStopScreenSaverEvent"
"Startup"="SensStartupEvent"
"Shutdown"="SensShutdownEvent"
"StartShell"="SensStartShellEvent"
"PostShell"="SensPostShellEvent"
"Disconnect"="SensDisconnectEvent"
"Reconnect"="SensReconnectEvent"
"Unlock"="SensUnlockEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001


[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\termsrv]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"Logoff"="TSEventLogoff"
"Logon"="TSEventLogon"
"PostShell"="TSEventPostShell"
"Shutdown"="TSEventShutdown"
"StartShell"="TSEventStartShell"
"Startup"="TSEventStartup"
"MaxWait"=dword:00000258
"Reconnect"="TSEventReconnect"
"Disconnect"="TSEventDisconnect"


[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlballoon]
"DLLName"="wlnotify.dll"
"Logon"="RegisterTicketExpiredNotificationEvent"
"Logoff"="UnregisterTicketExpiredNotificationEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001


**********************************************************************************
useragent:
Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
"iebar"=""


**********************************************************************************
Shell Extension key:
Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]
"{00022613-0000-0000-C000-000000000046}"="Multimedia File Property Sheet"
"{176d6597-26d3-11d1-b350-080036a75b03}"="ICM Scanner Management"
"{1F2E5C40-9550-11CE-99D2-00AA006E086C}"="NTFS Security Page"
"{3EA48300-8CF6-101B-84FB-666CCB9BCD32}"="OLE Docfile Property Page"
"{40dd6e20-7c17-11ce-a804-00aa003ca9f6}"="Shell extensions for sharing"
"{41E300E0-78B6-11ce-849B-444553540000}"="PlusPack CPL Extension"
"{42071712-76d4-11d1-8b24-00a0c9068ff3}"="Display Adapter CPL Extension"
"{42071713-76d4-11d1-8b24-00a0c9068ff3}"="Display Monitor CPL Extension"
"{42071714-76d4-11d1-8b24-00a0c9068ff3}"="Display Panning CPL Extension"
"{4E40F770-369C-11d0-8922-00A024AB2DBB}"="DS Security Page"
"{513D916F-2A8E-4F51-AEAB-0CBC76FB1AF8}"="Compatibility Page"
"{56117100-C0CD-101B-81E2-00AA004AE837}"="Shell Scrap DataHandler"
"{59099400-57FF-11CE-BD94-0020AF85B590}"="Disk Copy Extension"
"{59be4990-f85c-11ce-aff7-00aa003ca9f6}"="Shell extensions for Microsoft Windows Network objects"
"{5DB2625A-54DF-11D0-B6C4-0800091AA605}"="ICM Monitor Management"
"{675F097E-4C4D-11D0-B6C1-0800091AA605}"="ICM Printer Management"
"{764BF0E1-F219-11ce-972D-00AA00A14F56}"="Shell extensions for file compression"
"{77597368-7b15-11d0-a0c2-080036af3f03}"="Web Printer Shell Extension"
"{7988B573-EC89-11cf-9C00-00AA00A14F56}"="Disk Quota UI"
"{853FE2B1-B769-11d0-9C4E-00C04FB6C6FA}"="Encryption Context Menu"
"{85BBD920-42A0-1069-A2E4-08002B30309D}"="Briefcase"
"{88895560-9AA2-1069-930E-00AA0030EBC8}"="HyperTerminal Icon Ext"
"{BD84B380-8CA2-1069-AB1D-08000948F534}"="Fonts"
"{DBCE2480-C732-101B-BE72-BA78E9AD5B27}"="ICC Profile"
"{F37C5810-4D3F-11d0-B4BF-00AA00BBB723}"="Printers Security Page"
"{f81e9010-6ea4-11ce-a7ff-00aa003ca9f6}"="Shell extensions for sharing"
"{f92e8c40-3d33-11d2-b1aa-080036a75b03}"="Display TroubleShoot CPL Extension"
"{7444C717-39BF-11D1-8CD9-00C04FC29D45}"="Crypto PKO Extension"
"{7444C719-39BF-11D1-8CD9-00C04FC29D45}"="Crypto Sign Extension"
"{7007ACC7-3202-11D1-AAD2-00805FC1270E}"="Network Connections"
"{992CFFA0-F557-101A-88EC-00DD010CCC48}"="Network Connections"
"{E211B736-43FD-11D1-9EFB-0000F8757FCD}"="Scanners & Cameras"
"{FB0C9C8A-6C50-11D1-9F1D-0000F8757FCD}"="Scanners & Cameras"
"{905667aa-acd6-11d2-8080-00805f6596d2}"="Scanners & Cameras"
"{3F953603-1008-4f6e-A73A-04AAC7A992F1}"="Scanners & Cameras"
"{83bbcbf3-b28a-4919-a5aa-73027445d672}"="Scanners & Cameras"
"{F0152790-D56E-4445-850E-4F3117DB740C}"="Remote Sessions CPL Extension"
"{5F327514-6C5E-4d60-8F16-D07FA08A78ED}"="Auto Update Property Sheet Extension"
"{60254CA5-953B-11CF-8C96-00AA00B8708C}"="Shell extensions for Windows Script Host"
"{2206CDB2-19C1-11D1-89E0-00C04FD7A829}"="Microsoft Data Link"
"{DD2110F0-9EEF-11cf-8D8E-00AA0060F5BF}"="Tasks Folder Icon Handler"
"{797F1E90-9EDD-11cf-8D8E-00AA0060F5BF}"="Tasks Folder Shell Extension"
"{D6277990-4C6A-11CF-8D87-00AA0060F5BF}"="Scheduled Tasks"
"{0DF44EAA-FF21-4412-828E-260A8728E7F1}"="Taskbar and Start Menu"
"{2559a1f0-21d7-11d4-bdaf-00c04f60b9f0}"="Search"
"{2559a1f1-21d7-11d4-bdaf-00c04f60b9f0}"="Help and Support"
"{2559a1f2-21d7-11d4-bdaf-00c04f60b9f0}"="Help and Support"
"{2559a1f3-21d7-11d4-bdaf-00c04f60b9f0}"="Run..."
"{2559a1f4-21d7-11d4-bdaf-00c04f60b9f0}"="Internet"
"{2559a1f5-21d7-11d4-bdaf-00c04f60b9f0}"="E-mail"
"{D20EA4E1-3957-11d2-A40B-0C5020524152}"="Fonts"
"{D20EA4E1-3957-11d2-A40B-0C5020524153}"="Administrative Tools"
"{875CB1A1-0F29-45de-A1AE-CFB4950D0B78}"="Audio Media Properties Handler"
"{40C3D757-D6E4-4b49-BB41-0E5BBEA28817}"="Video Media Properties Handler"
"{E4B29F9D-D390-480b-92FD-7DDB47101D71}"="Wav Properties Handler"
"{87D62D94-71B3-4b9a-9489-5FE6850DC73E}"="Avi Properties Handler"
"{A6FD9E45-6E44-43f9-8644-08598F5A74D9}"="Midi Properties Handler"
"{c5a40261-cd64-4ccf-84cb-c394da41d590}"="Video Thumbnail Extractor"
"{5E6AB780-7743-11CF-A12B-00AA004AE837}"="Microsoft Internet Toolbar"
"{22BF0C20-6DA7-11D0-B373-00A0C9034938}"="Download Status"
"{91EA3F8B-C99B-11d0-9815-00C04FD91972}"="Augmented Shell Folder"
"{6413BA2C-B461-11d1-A18A-080036B11A03}"="Augmented Shell Folder 2"
"{F61FFEC1-754F-11d0-80CA-00AA005B4383}"="BandProxy"
"{7BA4C742-9E81-11CF-99D3-00AA004AE837}"="Microsoft BrowserBand"
"{30D02401-6A81-11d0-8274-00C04FD5AE38}"="Search Band"
"{32683183-48a0-441b-a342-7c2a440a9478}"="Media Band"
"{169A0691-8DF9-11d1-A1C4-00C04FD75D13}"="In-pane search"
"{07798131-AF23-11d1-9111-00A0C98BA67D}"="Web Search"
"{AF4F6510-F982-11d0-8595-00AA004CD6D8}"="Registry Tree Options Utility"
"{01E04581-4EEE-11d0-BFE9-00AA005B4383}"="&Address"
"{A08C11D2-A228-11d0-825B-00AA005B4383}"="Address EditBox"
"{00BB2763-6A77-11D0-A535-00C04FD7D062}"="Microsoft AutoComplete"
"{7376D660-C583-11d0-A3A5-00C04FD706EC}"="TridentImageExtractor"
"{6756A641-DE71-11d0-831B-00AA005B4383}"="MRU AutoComplete List"
"{6935DB93-21E8-4ccc-BEB9-9FE3C77A297A}"="Custom MRU AutoCompleted List"
"{7e653215-fa25-46bd-a339-34a2790f3cb7}"="Accessible"
"{acf35015-526e-4230-9596-becbe19f0ac9}"="Track Popup Bar"
"{E0E11A09-5CB8-4B6C-8332-E00720A168F2}"="Address Bar Parser"
"{00BB2764-6A77-11D0-A535-00C04FD7D062}"="Microsoft History AutoComplete List"
"{03C036F1-A186-11D0-824A-00AA005B4383}"="Microsoft Shell Folder AutoComplete List"
"{00BB2765-6A77-11D0-A535-00C04FD7D062}"="Microsoft Multiple AutoComplete List Container"
"{ECD4FC4E-521C-11D0-B792-00A0C90312E1}"="Shell Band Site Menu"
"{3CCF8A41-5C85-11d0-9796-00AA00B90ADF}"="Shell DeskBarApp"
"{ECD4FC4C-521C-11D0-B792-00A0C90312E1}"="Shell DeskBar"
"{ECD4FC4D-521C-11D0-B792-00A0C90312E1}"="Shell Rebar BandSite"
"{DD313E04-FEFF-11d1-8ECD-0000F87A470C}"="User Assist"
"{EF8AD2D1-AE36-11D1-B2D2-006097DF8C11}"="Global Folder Settings"
"{EFA24E61-B078-11d0-89E4-00C04FC9E26E}"="Favorites Band"
"{0A89A860-D7B1-11CE-8350-444553540000}"="Shell Automation Inproc Service"
"{E7E4BC40-E76A-11CE-A9BB-00AA004AE837}"="Shell DocObject Viewer"
"{A5E46E3A-8849-11D1-9D8C-00C04FC99D61}"="Microsoft Browser Architecture"
"{FBF23B40-E3F0-101B-8488-00AA003E56F8}"="InternetShortcut"
"{3C374A40-BAE4-11CF-BF7D-00AA006946EE}"="Microsoft Url History Service"
"{FF393560-C2A7-11CF-BFF4-444553540000}"="History"
"{7BD29E00-76C1-11CF-9DD0-00A0C9034933}"="Temporary Internet Files"
"{7BD29E01-76C1-11CF-9DD0-00A0C9034933}"="Temporary Internet Files"
"{CFBFAE00-17A6-11D0-99CB-00C04FD64497}"="Microsoft Url Search Hook"
"{A2B0DD40-CC59-11d0-A3A5-00C04FD706EC}"="IE4 Suite Splash Screen"
"{67EA19A0-CCEF-11d0-8024-00C04FD75D13}"="CDF Extension Copy Hook"
"{131A6951-7F78-11D0-A979-00C04FD705A2}"="ISFBand OC"
"{9461b922-3c5a-11d2-bf8b-00c04fb93661}"="Search Assistant OC"
"{3DC7A020-0ACD-11CF-A9BB-00AA004AE837}"="The Internet"
"{871C5380-42A0-1069-A2EA-08002B30309D}"="Internet Name Space"
"{EFA24E64-B078-11d0-89E4-00C04FC9E26E}"="Explorer Band"
"{9E56BE60-C50F-11CF-9A2C-00A0C90A90CE}"="Sendmail service"
"{9E56BE61-C50F-11CF-9A2C-00A0C90A90CE}"="Sendmail service"
"{88C6C381-2E85-11D0-94DE-444553540000}"="ActiveX Cache Folder"
"{E6FB5E20-DE35-11CF-9C87-00AA005127ED}"="WebCheck"
"{ABBE31D0-6DAE-11D0-BECA-00C04FD940BE}"="Subscription Mgr"
"{F5175861-2688-11d0-9C5E-00AA00A45957}"="Subscription Folder"
"{08165EA0-E946-11CF-9C87-00AA005127ED}"="WebCheckWebCrawler"
"{E3A8BDE6-ABCE-11d0-BC4B-00C04FD929DB}"="WebCheckChannelAgent"
"{E8BB6DC0-6B4E-11d0-92DB-00A0C90C2BD7}"="TrayAgent"
"{7D559C10-9FE9-11d0-93F7-00AA0059CE02}"="Code Download Agent"
"{E6CC6978-6B6E-11D0-BECA-00C04FD940BE}"="ConnectionAgent"
"{D8BD2030-6FC9-11D0-864F-00AA006809D9}"="PostAgent"
"{7FC0B86E-5FA7-11d1-BC7C-00C04FD929DB}"="WebCheck SyncMgr Handler"
"{352EC2B7-8B9A-11D1-B8AE-006008059382}"="Shell Application Manager"
"{0B124F8F-91F0-11D1-B8B5-006008059382}"="Installed Apps Enumerator"
"{CFCCC7A0-A282-11D1-9082-006008059382}"="Darwin App Publisher"
"{e84fda7c-1d6a-45f6-b725-cb260c236066}"="Shell Image Verbs"
"{66e4e4fb-f385-4dd0-8d74-a2efd1bc6178}"="Shell Image Data Factory"
"{3F30C968-480A-4C6C-862D-EFC0897BB84B}"="GDI+ file thumbnail extractor"
"{9DBD2C50-62AD-11d0-B806-00C04FD706EC}"="Summary Info Thumbnail handler (DOCFILES)"
"{EAB841A0-9550-11cf-8C16-00805F1408F3}"="HTML Thumbnail Extractor"
"{eb9b1153-3b57-4e68-959a-a3266bc3d7fe}"="Shell Image Property Handler"
"{CC6EEFFB-43F6-46c5-9619-51D571967F7D}"="Web Publishing Wizard"
"{add36aa8-751a-4579-a266-d66f5202ccbb}"="Print Ordering via the Web"
"{6b33163c-76a5-4b6c-bf21-45de9cd503a1}"="Shell Publishing Wizard Object"
"{58f1f272-9240-4f51-b6d4-fd63d1618591}"="Get a Passport Wizard"
"{7A9D77BD-5403-11d2-8785-2E0420524153}"="User Accounts"
"{BD472F60-27FA-11cf-B8B4-444553540000}"="Compressed (zipped) Folder Right Drag Handler"
"{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}"="Compressed (zipped) Folder SendTo Target"
"{f39a0dc0-9cc8-11d0-a599-00c04fd64433}"="Channel File"
"{f3aa0dc0-9cc8-11d0-a599-00c04fd64434}"="Channel Shortcut"
"{f3ba0dc0-9cc8-11d0-a599-00c04fd64435}"="Channel Handler Object"
"{f3da0dc0-9cc8-11d0-a599-00c04fd64437}"="Channel Menu"
"{f3ea0dc0-9cc8-11d0-a599-00c04fd64438}"="Channel Properties"
"{63da6ec0-2e98-11cf-8d82-444553540000}"="FTP Folders Webview"
"{883373C3-BF89-11D1-BE35-080036B11A03}"="Microsoft DocProp Shell Ext"
"{A9CF0EAE-901A-4739-A481-E35B73E47F6D}"="Microsoft DocProp Inplace Edit Box Control"
"{8EE97210-FD1F-4B19-91DA-67914005F020}"="Microsoft DocProp Inplace ML Edit Box Control"
"{0EEA25CC-4362-4A12-850B-86EE61B0D3EB}"="Microsoft DocProp Inplace Droplist Combo Control"
"{6A205B57-2567-4A2C-B881-F787FAB579A3}"="Microsoft DocProp Inplace Calendar Control"
"{28F8A4AC-BBB3-4D9B-B177-82BFC914FA33}"="Microsoft DocProp Inplace Time Control"
"{8A23E65E-31C2-11d0-891C-00A024AB2DBB}"="Directory Query UI"
"{9E51E0D0-6E0F-11d2-9601-00C04FA31A86}"="Shell properties for a DS object"
"{163FDC20-2ABC-11d0-88F0-00A024AB2DBB}"="Directory Object Find"
"{F020E586-5264-11d1-A532-0000F8757D7E}"="Directory Start/Search Find"
"{0D45D530-764B-11d0-A1CA-00AA00C16E65}"="Directory Property UI"
"{62AE1F9A-126A-11D0-A14B-0800361B1103}"="Directory Context Menu Verbs"
"{ECF03A33-103D-11d2-854D-006008059367}"="MyDocs Copy Hook"
"{ECF03A32-103D-11d2-854D-006008059367}"="MyDocs Drop Target"
"{4a7ded0a-ad25-11d0-98a8-0800361b1103}"="MyDocs Properties"
"{750fdf0e-2a26-11d1-a3ea-080036587f03}"="Offline Files Menu"
"{10CFC467-4392-11d2-8DB4-00C04FA31A66}"="Offline Files Folder Options"
"{AFDB1F70-2A4C-11d2-9039-00C04F8EEB3E}"="Offline Files Folder"
"{143A62C8-C33B-11D1-84FE-00C04FA34A14}"="Microsoft Agent Character Property Sheet Handler"
"{ECCDF543-45CC-11CE-B9BF-0080C87CDBA6}"="DfsShell"
"{60fd46de-f830-4894-a628-6fa81bc0190d}"="%DESC_PublishDropTarget%"
"{7A80E4A8-8005-11D2-BCF8-00C04F72C717}"="MMC Icon Handler"
"{0CD7A5C0-9F37-11CE-AE65-08002B2E1262}"=".CAB file viewer"
"{32714800-2E5F-11d0-8B85-00AA0044F941}"="For &People..."
"{8DD448E6-C188-4aed-AF92-44956194EB1F}"="Windows Media Player Play as Playlist Context Menu Handler"
"{CE3FB1D1-02AE-4a5f-A6E9-D9F1B4073E6C}"="Windows Media Player Burn Audio CD Context Menu Handler"
"{F1B9284F-E9DC-4e68-9D7E-42362A59F0FD}"="Windows Media Player Add to Playlist Context Menu Handler"
"{1D2680C9-0E2A-469d-B787-065558BC7D43}"="Fusion Cache"
"{BDEADF00-C265-11D0-BCED-00A0C90AB50F}"="Web Folders"
"{00020D75-0000-0000-C000-000000000046}"="Microsoft Office Outlook Desktop Icon Handler"
"{0006F045-0000-0000-C000-000000000046}"="Microsoft Office Outlook Custom Icon Handler"
"{42042206-2D85-11D3-8CFF-005004838597}"="Microsoft Office HTML Icon Handler"
"{5E44E225-A408-11CF-B581-008029601108}"="Roxio DragToDisc Shell Extension"
"{F0CB00CD-5A07-4D91-97F5-A8C92CDA93E4}"="Shell Extensions for RealOne Player"
"{640167b4-59b0-47a6-b335-a6b3c0695aea}"="Portable Media Devices"
"{cc86590a-b60a-48e6-996b-41d25ed39a1e}"="Portable Media Devices Menu"
"{B9E1D2CB-CCFF-4AA6-9579-D7A4754030EF}"="iTunes"


**********************************************************************************
HKEY ROOT CLASSIDS:
**********************************************************************************
Files Found are not all bad files:
Locate .tmp files:
**********************************************************************************
Directory Listing of system files:
Volume in drive C has no label.
Volume Serial Number is 43D1-638C


Directory of C:\WINDOWS\System32


06/06/2005  11:24 PM    <DIR>          dllcache
12/31/2004  01:43 PM             7,305 loigp.log
12/23/2004  09:28 AM            55,808 qlyly.dll
12/17/2004  11:01 PM             7,305 bcsno.log
12/17/2004  10:08 AM            55,808 wolno.dll
12/16/2004  04:33 AM             3,347 hkmbv.dat
12/02/2004  03:55 PM            11,591 inufg.log
12/02/2004  12:36 AM            55,808 zupgl.dll
11/11/2004  03:37 AM            56,320 hharp.dll
02/12/2004  09:58 AM    <DIR>          Microsoft
8 File(s)        253,292 bytes
2 Dir(s)  21,740,195,840 bytes free

Thank you for all the help.

-Derek

You have some entries there that need removing.

===============

Go to Add/Remove programs and remove(uninstall) the following, if present:

Internet Optimizer

The above could appear anywhere within the entry. Be careful not to remove any personal or system software.

===============

Run HiJackThis, click "Scan", then check(tick) the following, if present:


R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://websearch.drsnsrch.com/sidesearch.cgi?id=
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://websearch.drsnsrch.com/sidesearch.cgi?id=
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://websearch.drsnsrch.com/sidesearch.cgi?id=
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = websearch.drsnsrch.com/q.cgi?q=
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =

R3 - URLSearchHook: (no name) - _{CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)

O2 - BHO: &EliteBar - {28CAEFF3-0F18-4036-B504-51D73BD81ABC} - C:\WINDOWS\EliteToolBar\EliteToolBar version 60.dll (file missing)

O4 - HKLM\..\Run: [98D0CE0C16B1] rundll32.exe D0CE0C16B1,D0CE0C16B1
O4 - HKLM\..\Run: [Internet Optimizer] "C:\Program Files\Internet Optimizer\optimize.exe"
O4 - HKLM\..\Run: [t8mW35V] ir4resizepx.exe
O4 - HKCU\..\Run: [wmerrenu] C:\WINDOWS\System32\wmerrenu.exe
O4 - HKCU\..\Run: [cz56RRZFj] inpint35.exe
O4 - HKCU\..\Run: [sf] C:\Program Files\sf\sf.exe
O4 - HKCU\..\Run: [sfita] C:\WINDOWS\sfita.exe

O15 - Trusted Zone: http://www.neededware.com

O16 - DPF: NDWCab - http://www.neededware.com/ndw2.cab

O20 - Winlogon Notify: iexplore - 3fsff.dll (file missing)


Now, with all windows closed (including Internet Explorer) except HiJackThis, click "Fix checked".

===============

Locate and delete the following item(s), if present. Make sure your able to view system and hidden files/ folders:

folders...

C:\Program Files\Internet Optimizer
C:\Program Files\sf

files...

C:\WINDOWS\System32\wmerrenu.exe
C:\WINDOWS\sfita.exe

Search for...

D0CE0C16B1
ir4resizepx.exe
inpint35.exe

...using "Start | Search...".

-

Note that some of these file(s)/folder(s) may or may not be present. If present, and cannot be deleted because they're 'in use', try deleting them in "Safe Mode".

-

Reboot.

===============

To help protect your system from hostile ActiveX content, or special 'downloadable' files:

Download, install and keep updated, SpywareBlaster. If you've installed it for the first time:

1) Check for any available updates; if present, they'll be automatically downloaded and installed.
2) Next, "Enable all protection".
3) Exit the program.

-

Note: Remember to regularly check for updates.

===============

After rebooting, rescan with hijackthis and post back a new log. Let me know how everything goes.

BTW, you can also copy paste this to your LMHOST.SAM file.
hosts that houses trojans and hosts that pay people to load popups deserve to be blocked.
:D
Also some of these just re-download if you delete them but waits till startup so blocking the hosts is a good option. I suggest running a windows 98 bootdisk instead and then running your AV software to clean it. Unless you're on NTFS.
Get a firewall also. AV softwares just wont do the job.

127.0.0.1  acestats.com

127.0.0.1  www.acestats.com

127.0.0.1  www.activesearch.com #[Adware.ActiveSearch]

127.0.0.1  actualnames.com #[Parasite.ActualNames][Spyware.ActualNames]

127.0.0.1  www.actualnames.com

127.0.0.1  ad-up.com

127.0.0.1  www.ad-up.com

127.0.0.1  adatom.com

127.0.0.1  aesp.adatom.com

127.0.0.1  adbest.com #[IE-SpyAd]

127.0.0.1  www.adcipta.net #[W32/Malware]

127.0.0.1  adserv.adbonus.com #[IE-SpyAd]

127.0.0.1  www.adbonus.com

127.0.0.1  media.adcentriconline.com #[IE-SpyAd]

127.0.0.1  ad2.adcept.net

127.0.0.1  ad3.adcept.net

127.0.0.1  www.adcept.net #[IE-SpyAd]

127.0.0.1  adcomplete.com #[IE-SpyAd]

127.0.0.1  www.adcomplete.com

127.0.0.1  www.adcopy.info

127.0.0.1  ads.adcorps.com

127.0.0.1  ads.addynamix.com #[IE-SpyAd]

127.0.0.1  pt.server1.adexit.com

127.0.0.1  www.adexit.com #[IE-SpyAd]

127.0.0.1  www.ad4ever.com #[IE-SpyAd]

127.0.0.1  ssl3.adhost.com #[IE-SpyAd]

127.0.0.1  www2.adhost.com

127.0.0.1  www.addme.com #[IE-SpyAd]

127.0.0.1  www.adinfinity.com #[IE-SpyAd]

127.0.0.1  adsvr.adknowledge.com #[IE-SpyAd]

127.0.0.1  web.adknowledge.com

127.0.0.1  te.adlandpro.com #[IE-SpyAd]

127.0.0.1  ad.adlegend.com #[blocks Amber Alert]

127.0.0.1  media.adlegend.com

127.0.0.1  classic.adlink.de #[IE-SpyAd]

127.0.0.1  regio.adlink.de

127.0.0.1  west.adlink.de

127.0.0.1  www.adminder.com #[IE-SpyAd]

127.0.0.1  adsfac.net #[IE-SpyAd]

127.0.0.1  www.adonweb.com

127.0.0.1  adserver.adreactor.com

127.0.0.1  www.adrelevance.com #[NetRatings][IE-SpyAd]

127.0.0.1  media.adrevolver.com #[IE-SpyAd]

127.0.0.1  serv.ad-rotator.com

127.0.0.1  serv2.ad-rotator.com

127.0.0.1  ad.ads.dk #[IE-SpyAd]

127.0.0.1  tdkads.ads.dk

127.0.0.1  ads.adsag.com

127.0.0.1  di.adsag.com

127.0.0.1  img.adsag.com

127.0.0.1  adserv.com

127.0.0.1  www.adserv.com

127.0.0.1  adsincontext.com #[Adware.ZioCom]

127.0.0.1  adserver.adsincontext.com

127.0.0.1  www.adsincontext.com #[eTrust.AdsInContext]

127.0.0.1  ads.adtomi.com #[IE-SpyAd]

127.0.0.1  www.adtomi.com #[Adware.Adtomi]

127.0.0.1  downldcl.adtoolsinc.com

127.0.0.1  www.adtoolsinc.com #[IE-SpyAd]

127.0.0.1  www.adtrader.com #[IE-SpyAd]

127.0.0.1  survey.advantageresearch.com #[IE-SpyAd]

127.0.0.1  ad.adver.com.tw

127.0.0.1  ads.advertise.net #[IE-SpyAd]

127.0.0.1  advertisingvision.com #[IE-SpyAd]

127.0.0.1  www.advertisingvision.com #[Adware.Advision]

127.0.0.1  adpowerzone.advertserve.com

127.0.0.1  adviva.com #[IE-SpyAd]

127.0.0.1  www.adviva.com

127.0.0.1  ads.adviva.net #[IE-SpyAd]

127.0.0.1  adstats.adviva.net

127.0.0.1  tracker.affistats.com #[IE-SpyAd][msvrl.dll]

127.0.0.1  banners.affiliatefuel.com

127.0.0.1  www.affiliatefuel.com #[IE-SpyAd]

127.0.0.1  affiliatetarget.com #[IE-SpyAd]

127.0.0.1  www.affiliatetarget.com

127.0.0.1  fcds.affiliatetracking.net

127.0.0.1  our.affiliatetracking.net

127.0.0.1  www.affiliatetracking.net #[IE-SpyAd]

127.0.0.1  www.affiliatetracking.com #[IE-SpyAd]

127.0.0.1  aams1.aim4media.com

127.0.0.1  adcodes.aim4media.com

127.0.0.1  adserver.aim4media.com

127.0.0.1  adtest.aim4media.com

127.0.0.1  artwork.aim4media.com

127.0.0.1  pops.aim4media.com

127.0.0.1  www.aim4media.com #[IE-SpyAd]

127.0.0.1  crs.akamai.com

127.0.0.1  soap.alexa.com #[Spyware.Alexa][Alexa Toolbar]

127.0.0.1  traffic.alexa.com

127.0.0.1  xsltcache.alexa.com

127.0.0.1  www.alexa.com #[IE-SpyAd]

127.0.0.1  www.allthatsearch.com #[IE-SpyAd]

127.0.0.1  v8.alwaysupdatednews.com #[Trojan.Alwayup]

127.0.0.1  www.alwaysupdatednews.com #[Trojan-Downloader.Win32.Small.akz]

127.0.0.1  ads.as4x.tmcs.akadns.net #[Ticketmaster][IE-SpyAd]

127.0.0.1  bantam.ai.net #[IE-SpyAd]

127.0.0.1  fiona.ai.net

127.0.0.1  www.amazingcounters.com

127.0.0.1  ads.amazingmedia.com #[IE-SpyAd]

127.0.0.1  adserver04.ancestry.com #[RealMedia]

127.0.0.1  search.antarasystems.com #[Spyware.SearchPounder]

127.0.0.1  www.antarasystems.com

127.0.0.1  ads.antionline.com

127.0.0.1  junior.apk.net

127.0.0.1  banner.arttoday.com

127.0.0.1  ads.aspalliance.com

127.0.0.1  associmg.com #[IE-SpyAd][amazon.com]

127.0.0.1  www.atlas-ia.com #[Adware.OfferAgent]

127.0.0.1  te.audiencematch.net

127.0.0.1  audiogalaxy.com

127.0.0.1  www.audiogalaxy.com

127.0.0.1  adserving.autotrader.com

127.0.0.1  www.avres.net #[IE-SpyAd]

127.0.0.1  cploving.awmhost.net #[TrojanClicker.Win32.Lopin]

# B

127.0.0.1  ad.backyardgardener.com

127.0.0.1  ad1.backyardgardener.com

127.0.0.1  ad2.backyardgardener.com

127.0.0.1  baidu.com #[IE-SpyAd]

127.0.0.1  bar.baidu.com #[Parasite.ClientMan][Adware/BDSToolbar]

127.0.0.1  mp3.baidu.com

127.0.0.1  p4p.baidu.com

127.0.0.1  top.baidu.com

127.0.0.1  www.baidu.com #[[Adware.Baidu]

127.0.0.1  www.banner-mania.com

127.0.0.1  www.bannerspace.com #[IE-SpyAd]

127.0.0.1  www2.bannerspace.com

127.0.0.1  www3.bannerspace.com

127.0.0.1  www5.bannerspace.com

127.0.0.1  www6.bannerspace.com

127.0.0.1  www7.bannerspace.com

127.0.0.1  bannerswap.com #[IE-SpyAd]

127.0.0.1  www.bannerswap.com

127.0.0.1  media.baventures.com

127.0.0.1  ads.betanews.com

127.0.0.1  ads.bidclix.com #[IE-SpyAd]

127.0.0.1  www.bidclix.com

127.0.0.1  bidclix.net #[IE-SpyAd]

127.0.0.1  www.bidclix.net

127.0.0.1  bigtracker.com

127.0.0.1  bighits.net #[IE-SpyAd]

127.0.0.1  bigticker.bighits.net

127.0.0.1  bounty.bighits.net

127.0.0.1  www.bighits.net

127.0.0.1  download.bigwebportal.com #[IE-SpyAd]

127.0.0.1  www.bigwebportal.com #[hotwebsearch.com]

127.0.0.1  counter.bizland.com

127.0.0.1  webads.bizservers.com

127.0.0.1  www.black-hole.co.uk #[Restricted Zone site]

127.0.0.1  www.blazehits.net #[gonnasearch.com]

127.0.0.1  cluster.blingblingcontent.com

127.0.0.1  gb.blingblingcontent.com

127.0.0.1  s7.blingblingcontent.com #[Easywebinstaller Control]

127.0.0.1  ads.bmais.net #[bluemountain]

127.0.0.1  bookedspace.com #[Parasite.BookedSpace]

127.0.0.1  www.bookedspace.com #[Adware.Bookedspace]

127.0.0.1  a.boom.ro

127.0.0.1  s.boom.ro #[IE-SpyAd]

127.0.0.1  bans.bride.ru #[IE-SpyAd]

127.0.0.1  citi.bridgetrack.com #[IE-SpyAd]

127.0.0.1  rccl.bridgetrack.com

127.0.0.1  www.browserplugin.com #[WebHlprObj Class]

127.0.0.1  install.browsertoolbar.com #[Backdoor.Autoupder][BrowserToolbar]

127.0.0.1  www2.browsertoolbar.com #[TROJ_SUA.A]

127.0.0.1  www.browsertoolbar.com #[Parasite.BrowserToolbar]

127.0.0.1  rsp.btthost.com #[Trojan.SpBot]

127.0.0.1  www.buildtraffic.com

127.0.0.1  www.buldog-search.com

127.0.0.1  www.buldog-stats.com #[MHTMLRedir.Exploit][server down?]

127.0.0.1  buy-traffic.net #[searchmeup.com]

# C

127.0.0.1  ads5.canoe.ca

127.0.0.1  www.cashventure.com

127.0.0.1  casino-on-net.com

127.0.0.1  java2.casino-on-net.com

127.0.0.1  www.casino-on-net.com

127.0.0.1  cc-dt.com

127.0.0.1  ads.cc-dt.com

127.0.0.1  clickserve.cc-dt.com

127.0.0.1  www.care2.com #[TopMoxie]

127.0.0.1  ads.cars.com

127.0.0.1  ads.cc214142.com

127.0.0.1  ads.cdfreaks.com #[Ads.cdfreaks]

127.0.0.1  cellaphone.net #[MHTMLRedir.Exploit]

127.0.0.1  www.celebritaspoglie.net #[IE-SpyAd]

127.0.0.1  mds.centrport.net #[IE-SpyAd]

127.0.0.1  abc.checkm8.com

127.0.0.1  web.checkm8.com

127.0.0.1  ad.cibleclick.com

127.0.0.1  www.cibleclick.com #[Ad-Aware.Tracking Cookie]

127.0.0.1  c.clickaire.com #[IE-SpyAd]

127.0.0.1  classifieds1000.com

127.0.0.1  www.classifieds1000.com

127.0.0.1  clearfind.com

127.0.0.1  www.clearfind.com #[IE-SpyAd]

127.0.0.1  hop.clickbank.net #[Adware.Clickbank]

127.0.0.1  zzz.clickbank.net

127.0.0.1  clickedyclick.com #[IE-SpyAd]

127.0.0.1  www.clickexchange.ru #[IE-SpyAd]

127.0.0.1  click2boost.com #[IE-SpyAd]

127.0.0.1  secure.click2boost.com

127.0.0.1  service.click2boost.com

127.0.0.1  www.click2boost.com

127.0.0.1  servedby.clickexperts.net #[server down?]

127.0.0.1  www.clicks2you.com #[IE-SpyAd]

127.0.0.1  stats.clicktracks.com

127.0.0.1  stats1.clicktracks.com # [eTrust.Tracking Cookie]

127.0.0.1  www.is1.clixgalore.com

127.0.0.1  www.clixgalore.com #[IE-SpyAd]

127.0.0.1  www1.click-fr.com #[server down?]

127.0.0.1  www2.click-fr.com

127.0.0.1  www3.click-fr.com

127.0.0.1  www4.click-fr.com

127.0.0.1  www.clickhouse.com #[IE-SpyAd]

127.0.0.1  www.clicks4u.com #[IE-SpyAd]

127.0.0.1  cfg.clipgenie.com

127.0.0.1  download.clipgenie.com

127.0.0.1  dldw.clipgenie.com

127.0.0.1  ss.clipgenie.com

127.0.0.1  www.clipgenie.com #[Adware.ClipGenie]

127.0.0.1  ads.cobrad.com

127.0.0.1  comclick.com #[IE-SpyAd]

127.0.0.1  ct2.comclick.com

127.0.0.1  fl01.ct2.comclick.com #[Ad-Aware.Tracking Cookie]

127.0.0.1  ihm01.ct2.comclick.com

127.0.0.1  www.comclick.com

127.0.0.1  www.comedy-planet.com #[Adware.ComedyPlanet]

127.0.0.1  www.thecoolbar.com #[Softomate Toolbar][The Coolbar]

127.0.0.1  www.compactbanner.com #[IE-SpyAd]

127.0.0.1  ads.console.net

127.0.0.1  www.contextuads.com #[IE-SpyAd]

127.0.0.1  www1.contextweb.com

127.0.0.1  coolshader.com

127.0.0.1  c.coolshader.com #[Win32.Harnig]

127.0.0.1  www.coolshader.com

127.0.0.1  counted.com #[IE-SpyAd]

127.0.0.1  bilbo.counted.com

127.0.0.1  www.counted.com

127.0.0.1  www.counter-gratis.com #[Ad-Aware.Tracking Cookie]

127.0.0.1  www.counterguide.com

127.0.0.1  counter4u.de #[IE-SpyAd]

127.0.0.1  connectionzone.com

127.0.0.1  count.casino-trade.com

127.0.0.1  www.couponsandoffers.com #[Adware.TopMoxie]

127.0.0.1  data.coremetrics.com #[IE-SpyAd]

127.0.0.1  twci.coremetrics.com #[Ad-Aware.Tracking Cookie]

127.0.0.1  www.creatrixads.com

127.0.0.1  ads.crosswinds.net

127.0.0.1  megabyte.crosswinds.net

127.0.0.1  cyberbounty.com #[IE-SpyAd]

127.0.0.1  js.cybermonitor.com

127.0.0.1  stat3.cybermonitor.com

127.0.0.1  cytron.com #[DailyWinner][Cytron]

127.0.0.1  www.cytron.com

# D

127.0.0.1  www.dash.com

127.0.0.1  ads.date.com #[IE-SpyAd]

127.0.0.1  banner.date.com

127.0.0.1  au.track.decideinteractive.com

127.0.0.1  au.link.decideinteractive.com

127.0.0.1  eu.link.decideinteractive.com

127.0.0.1  link.decideinteractive.com

127.0.0.1  www.decideinteractive.com

127.0.0.1  www.decideinteractive.co.uk

127.0.0.1  www.deepcom.com #[TrojanDropper.Win32.Small.gt]

127.0.0.1  collector.deepmetrix.com

127.0.0.1  geo.deepmetrix.com

127.0.0.1  www.deepmetrix.com #[Data Miner]

127.0.0.1  delta2378493.com #[Download.Sumina]

127.0.0.1  didtheyreadit.com #[IE-SpyAd]

127.0.0.1  www.didtheyreadit.com

127.0.0.1  comm1.digits.com

127.0.0.1  counter.digits.com #[IE-SpyAd]

127.0.0.1  stats.directnic.com

127.0.0.1  www.divago.com #[Adware.Surfairy]

127.0.0.1  ad.dmpi.net

127.0.0.1  ad2.dmpi.net

127.0.0.1  ad3.dmpi.net

127.0.0.1  ad4.dmpi.net

127.0.0.1  ubnm.dmpi.net

127.0.0.1  www.dnscaching.net #[stickypops.com]

127.0.0.1  www.domamil.cz #[Trojan.Beagooz]

127.0.0.1  downloadalot.com

127.0.0.1  get.downloadalot.com

127.0.0.1  www.downloadalot.com #[IE-SpyAd]

127.0.0.1  www.downseek.com #[DownSeek Search]

127.0.0.1  dqmedia.net #[spam]

127.0.0.1  drmx01.net #[spam]

127.0.0.1  www.claus.drehteile-rieche.de #[Win32.Formglieder.B]

127.0.0.1  www.duenow.com

127.0.0.1  dumpserv.com #[Trojan.Zhopa]

127.0.0.1  gfx.dvlabs.com #[IE-SpyAd]

127.0.0.1  klipads.dvlabs.com

# E

127.0.0.1  e2give.com #[Adware-E2Give][Spyware.e2give]

127.0.0.1  www.e2give.com

127.0.0.1  eaglehousing.com #[Trojan.Tabela.B]

127.0.0.1  www.eaglehousing.com #[Trojan.Eaghouse]

127.0.0.1  www.easywebsearch.nl #[Easywebinstaller Control][IE-SpyAd]

127.0.0.1  www.e-bannerx.com #[Ad-Aware.Tracking Cookie]

127.0.0.1  adv1.eblocs.com

127.0.0.1  adv2.eblocs.com #[Rogue/Suspect][IE-SpyAd]

127.0.0.1  www.easycounter.com #[IE-SpyAd]

127.0.0.1  banners.easydns.com

127.0.0.1  banner.easyspace.com #[IE-SpyAd]

127.0.0.1  adserv1.ebates.com #[WebSavings]

127.0.0.1  www.ebates.com #[Adware.MoeMoney]

127.0.0.1  www.efinder.cc #[StartPage-DA]

127.0.0.1  epeople.com

127.0.0.1  errorpage404.com #[JS_TRAFFICHBAR.A]

127.0.0.1  www.errorpage404.com #[Parasite.TinyBar]

127.0.0.1  vipuk.escritorioactivo.com #[123Messenger Hijacker]

127.0.0.1  www.escorcher.com #[IE-SpyAd]

127.0.0.1  www.eshopads2.com

127.0.0.1  estat.com #[IE-SpyAd]

127.0.0.1  perso.estat.com

127.0.0.1  prof.estat.com

127.0.0.1  www.estat.com

127.0.0.1  eu-adcenter.net

127.0.0.1  thinknyc.eu-adcenter.net

127.0.0.1  ugo.eu-adcenter.net #[evidence-eliminator.com]

127.0.0.1  www.euroklik.nl #[EasyBar][InstallerX Class]

127.0.0.1  euro-randomizer.com #[Trojan.dropper]

127.0.0.1  engage.everyone.net

127.0.0.1  static.everyone.net #[IE-SpyAd]

127.0.0.1  www.exchangead.com #[IE-SpyAd]

127.0.0.1  exit-ad.de #[Ad-Aware.Tracking Cookie]

127.0.0.1  exitexchange.com #[IE-SpyAd]

127.0.0.1  count.exitexchange.com

127.0.0.1  images.exitexchange.com

127.0.0.1  www.exitexchange.com #[Restricted Zone site]

127.0.0.1  www.exchangeexit.com #[Installer Class][Winupie]

127.0.0.1  www.exittraffic.net #[IE-SpyAd]

127.0.0.1  cdn.eyewonder.com #[IE-SpyAd]

127.0.0.1  ezcybersearch.com #[EZCyberSearch.Surebar]

127.0.0.1  ads.ezcybersearch.com #[Adware.EZSearch.B]

127.0.0.1  ezcybersearch.mail.everyone.net

127.0.0.1  www.ezcybersearch.com #[Parasite.ezCyberSearch]

127.0.0.1  www.evidence-eliminator.com

# F

127.0.0.1  ads.fairfax.com.au

127.0.0.1  images.ads.fairfax.com.au

127.0.0.1  redirect.fairfax.com.au

127.0.0.1  campaigns.f2.com.au

127.0.0.1  fast-web-search.com #[IE-SpyAd]

127.0.0.1  www.fast-web-search.com

127.0.0.1  www.fast2net.com

127.0.0.1  www.fastfind.org #[SubSearch][TROJ_STARTPAG.KF][Adware.Fastfind.B]

127.0.0.1  fasttrack.nu

127.0.0.1  www.fceboard.com #[Adware.EBoard]

127.0.0.1  www.fightpopups.net #[Adware.MessStopper]

127.0.0.1  filesharingaccess.com #[MHTMLRedir.Exploit]

127.0.0.1  adserver.filefront.com #[Ad-Aware.Tracking Cookie]

127.0.0.1  www.filemix.net #[Surf+][IE-SpyAd]

127.0.0.1  www.fineclicks.com #[IE-SpyAd]

127.0.0.1  firstname.com #[IE-SpyAd]

127.0.0.1  clicks.firstname.com

127.0.0.1  www.fizzlewizzle.com #[Fizzle Wizzle Searchbar]

127.0.0.1  flashtrack.net #[IE-SpyAd]

127.0.0.1  ads.flashtrack.net #[Adware.Flashtrack.B]

127.0.0.1  coreg.flashtrack.net

127.0.0.1  www.flashtrack.net #[Adware.FlashEnhancer][KB312429]

127.0.0.1  www.flyeagles.com #[Trojan.Drivus]

127.0.0.1  flyinads.com #[IE-SpyAd]

127.0.0.1  www.flyinads.com

127.0.0.1  ads.forbes.com #[IE-SpyAd]

127.0.0.1  klipmart.forbes.com

127.0.0.1  www.ampira.com #[Fortunecity]

127.0.0.1  ads.fortunecity.com

127.0.0.1  ads.v3.com #[Fortunecity]

127.0.0.1  www2.fortunecity.com

127.0.0.1  securinews.free.fr #[Trojan.Hexem]

127.0.0.1  www.freedom850.com #[Trojan.Drivus]

127.0.0.1  ad.freefind.com

127.0.0.1  www.freehistorycleaner.com #[Adware.Fapi][ADW_HISCLEAN.A]

127.0.0.1  adserver.freenet.de

127.0.0.1  free-stats.com

127.0.0.1  counters.freewebs.com

127.0.0.1  www.freewebsites.com

127.0.0.1  ads.free-windows-games.com #[server down?]

127.0.0.1  www.free-windows-games.com #[Parasite.GAMsys][GamHelper]

127.0.0.1  pops.freeze.com #[[GamHelper]

# G

127.0.0.1  ads.gamespy.com

127.0.0.1  adcontent.gamespy.com

127.0.0.1  ad1.gamezone.com #[RealMedia]

127.0.0.1  www.gebr-wachs.de #[Trojan.Mitglieder.C][Backdoor.Gaster]

127.0.0.1  gd.geobytes.com #[obtains users location]

127.0.0.1  www.getsmart.com

127.0.0.1  bp2.getredirect.com #[IE-SpyAd]

127.0.0.1  4.getredirect.com #[superlogy.com]

127.0.0.1  www.getredirect.com

127.0.0.1  getupdate.com

127.0.0.1  dlx.getupdate.com #[AdvWare.ToolBar.VB.b]

127.0.0.1  www.getupdate.com #[Adware.Getup]

127.0.0.1  gigex.com #[IE-SpyAd]

127.0.0.1  media.gigex.com #[SpeedDelivery]

127.0.0.1  oascentral.gigex.com #[RealMedia]

127.0.0.1  www.gigex.com #[download Class]

127.0.0.1  globesearch.com

127.0.0.1  www.globesearch.com #[IE-SpyAd][CWS]

127.0.0.1  banner.goldenpalace.com #[redirects]

127.0.0.1  www.goldenwebawards.com #[server down?]

127.0.0.1  goldstats.net #[IE-SpyAd]

127.0.0.1  www.goldstats.net

127.0.0.1  www.goggle.com #[IE-SpyAd][typo squatter]

127.0.0.1  adincl.gopher.com #[InfoSpace]

127.0.0.1  ads.gorillanation.com #[Restricted Zone site]

127.0.0.1  adserver.gorillanation.com

127.0.0.1  gostats.com #[IE-SpyAd]

127.0.0.1  as.gostats.com

127.0.0.1  c1.gostats.com

127.0.0.1  c2.gostats.com

127.0.0.1  c3.gostats.com

127.0.0.1  webcounter.goweb.de #[IE-SpyAd]

127.0.0.1  greatstartpage.com #[IE-SpyAd]

127.0.0.1  www.greatstartpage.com

127.0.0.1  grokster.com #[IE-SpyAd][P2P]

127.0.0.1  dl.grokster.com

127.0.0.1  www.grokster.com

127.0.0.1  ads.guardian.co.uk

127.0.0.1  ads.guardianunlimited.co.uk

127.0.0.1  www.g-wizzads.net

# H

127.0.0.1  www.halflemon.com #[SearchHook Class]

127.0.0.1  ad0.haynet.com

127.0.0.1  ads.hitcents.com #[IE-SpyAd]

127.0.0.1  hits-counter.com

127.0.0.1  hithopper.com #[Adware.Hithopper]

127.0.0.1  www.hithopper.com

127.0.0.1  www.hitlogger.com

127.0.0.1  hitmodel.net

127.0.0.1  hit-now.com

127.0.0.1  hit-parade.com

127.0.0.1  loga.hit-parade.com

127.0.0.1  hitstats.net

127.0.0.1  images.hitwise.co.uk

127.0.0.1  www.hiwire.com #[IE-SpyAd]

127.0.0.1  ads.home.net

127.0.0.1  anna.homeftp.net #[W32.Linkbot.A]

127.0.0.1  www.gontijoamaral.hpg.com.br #[Adware.Diginum]

127.0.0.1  counters.honesty.com

127.0.0.1  horse-active.net

127.0.0.1  horse-dns.net

127.0.0.1  horse-search.net

127.0.0.1  banners.hotlinks.net #[IE-SpyAd]

127.0.0.1  horseserver.net #[Troj/Haxdor-Fam][Trojan.Startpage.I]

127.0.0.1  www.horseserver.net #[Backdoor.Haxdoor.D]

127.0.0.1  hotsearch.com #[roar.com][IE-SpyAd]

127.0.0.1  www.hotsearch.com

127.0.0.1  www.10s.com.br #[Trojan.Cargao]

127.0.0.1  cgi.hotstat.nl #[IE-SpyAd]

127.0.0.1  viewstat.hotstat.nl

127.0.0.1  hc2.humanclick.com #[Ad-Aware.Tracking Cookie]

127.0.0.1  www.humanclick.com #[IE-SpyAd]

127.0.0.1  custom1.hurricanedigitalmedia.com

127.0.0.1  custom3.hurricanedigitalmedia.com

127.0.0.1  www.hypertracker.com #[IE-SpyAd]

# I

127.0.0.1  ads.iafrica.com

127.0.0.1  ads.iboost.com

127.0.0.1  www.i-clicks.net

127.0.0.1  hits.icdirect.com

127.0.0.1  hitctr01.icdirect.com

127.0.0.1  image-catcher.com

127.0.0.1  bar.iebar8.com #[Adware.Navihelper]

127.0.0.1  stats.surfaid.ihost.com #[IE-SpyAd]

127.0.0.1  ads.imdb.com #[amazon.com]

127.0.0.1  www.impregnable.net #[TrojanDownloader.Win32.VB.dw][Trojan.Win32.StartPage.kk]

127.0.0.1  stats.indextools.com #[IE-SpyAd]

127.0.0.1  adserver.indieclick.com

127.0.0.1  campaign.indieclick.com

127.0.0.1  adcenter.in2.com

127.0.0.1  ads.inet1.com

127.0.0.1  ads7.inet1.com

127.0.0.1  banners.inetfast.com

127.0.0.1  ads.infospace.com

127.0.0.1  bvads.infospace.com

127.0.0.1  dpxml.infospace.com

127.0.0.1  xads.infospace.com

127.0.0.1  www.infospider.com #[IE-SpyAd]

127.0.0.1  ads.intellicast.com

127.0.0.1  ads.intelihealth.com

127.0.0.1  ads.intermezzia.com #[IE-SpyAd]

127.0.0.1  indiads.com #[IE-SpyAd]

127.0.0.1  infostart.com #[IE-SpyAd]

127.0.0.1  popups.infostart.com

127.0.0.1  oc.inspectorclick.com

127.0.0.1  trax.inspectorclick.com #[IE-SpyAd]

127.0.0.1  v2.inspectorclick.com

127.0.0.1  v3.inspectorclick.com

127.0.0.1  instadia.net #[Ad-Aware.Tracking Cookie]

127.0.0.1  www.instadia.net

127.0.0.1  instantsearch.cc #[Adware/TheLocalSearch]

127.0.0.1  www.instantsearch.cc

127.0.0.1  www.intelli-tracker.com

127.0.0.1  inqwire.com #[IE-SpyAd]

127.0.0.1  www.inqwire.com

127.0.0.1  ads.ipowerweb.com

127.0.0.1  www.ipstat.com #[IE-SpyAd]

127.0.0.1  adzones.ircspy.com

127.0.0.1  adserver1.isohunt.com

127.0.0.1  istarthere.com #[Troj/IEStart-C]

127.0.0.1  directory.istarthere.com

127.0.0.1  moviesponsor.istarthere.com

127.0.0.1  partners.istarthere.com

127.0.0.1  www.istarthere.com #[VBS_IESTART.F]

127.0.0.1  ads.isoftmarketing.com

127.0.0.1  adcycle.isoftmarketing.com

127.0.0.1  jp00001.itbdns.com #[Backdoor.Ryejet.B]

127.0.0.1  www.itrafficstar.com #[IE-SpyAd]

# J

127.0.0.1  www.j4sb.com #[Trojan.Jasbom]

127.0.0.1  www.jcount.com #[IE-SpyAd]

127.0.0.1  affiliates.jeanharris.com

127.0.0.1  popup.jeanharris.com

127.0.0.1  www.jellycounter.com

127.0.0.1  jpedownload.joltid.com

127.0.0.1  www.joltid.com #[Adware.P2PNetworking]

# K

127.0.0.1  www.kazaalite.pl #[MHTMLRedir.Exploit]

127.0.0.1  www1.kliks.nl #[IE-SpyAd]

127.0.0.1  www2.kliks.nl

127.0.0.1  www.kliks.nl

127.0.0.1  kt3.kliptracker.com #[IE-SpyAd]

127.0.0.1  kt4.kliptracker.com

127.0.0.1  www.kliptracker.com

127.0.0.1  stats.klsoft.com #[IE-SpyAd]

127.0.0.1  www.kmindex.ru

127.0.0.1  ads.kmpads.com

127.0.0.1  dc.kontera.com

127.0.0.1  kona.kontera.com #[ezula.com]

127.0.0.1  te.kontera.com

127.0.0.1  www.koolbar.net #[IE-SpyAd]

127.0.0.1  kutsap.com #[Trojan.Anicmoo]

# L

127.0.0.1  ad.leadcrunch.com #[IE-SpyAd]

127.0.0.1  ts1.lexmark.com

127.0.0.1  linkbuddies.com #[IE-SpyAd]

127.0.0.1  banners.linkbuddies.com

127.0.0.1  www.linkbuddies.com

127.0.0.1  www.linkcounter.com

127.0.0.1  linkexchange.ru #[IE-SpyAd]

127.0.0.1  web.linkexchange.ru

127.0.0.1  www.linkexchange.ru

127.0.0.1  link4link.com #[IE-SpyAd]

127.0.0.1  plus.link4link.com

127.0.0.1  www.links4trade.com #[IE-SpyAd]

127.0.0.1  escati.linkopp.net #[IE-SpyAd]

127.0.0.1  www.linkopp.net

127.0.0.1  js.livehelper.com #[IE-SpyAd]

127.0.0.1  newbrowse.livehelper.com

127.0.0.1  www.liveperson.com

127.0.0.1  liveperson.net #[IE-SpyAd]

127.0.0.1  sales.liveperson.net

127.0.0.1  server.iad.liveperson.net #[Ad-Aware.Data Miner][HumanTag Monitor]

127.0.0.1  adserv.lwmn.net

127.0.0.1  locators.com #[Adware.Locator]

127.0.0.1  toolbar.locators.com #[Locators Toolbar]

127.0.0.1  www.locators.com

127.0.0.1  www.lookde5.com #[W32.Looked]

127.0.0.1  www.lords-of-havoc.de #[Trojan.Mitglieder.C][Backdoor.Gaster]

127.0.0.1  exploited.lsass.cc #[Backdoor.Win32.SdBot.gen]

127.0.0.1  luckyhomepage.com #[search.targetwords.com\1stblaze.com]

127.0.0.1  www.luckyhomepage.com #[IE-SpyAd]

127.0.0.1  www.lyricspy.com #[PluginAccess]

# M

127.0.0.1  www.madoogali.com #[Madoogali][IE-SpyAd]

127.0.0.1  go.mailbits.com

127.0.0.1  mair.net #[Realtracker]

127.0.0.1  image.masterstats.com #[IE-SpyAd]

127.0.0.1  link.masterstats.com

127.0.0.1  vw.masterstats.com

127.0.0.1  ads.affiliates.match.com

127.0.0.1  associmage.match.com #[IE-SpyAd]

127.0.0.1  adserver.matchcraft.com

127.0.0.1  maybeyes.biz #[Trojan.Ducky]

127.0.0.1  ads.mcafee.com

127.0.0.1  directads.mcafee.com

127.0.0.1  ads.mediaodyssey.com

127.0.0.1  acvs.mediaonenetwork.net

127.0.0.1  acvsrv.mediaonenetwork.net

127.0.0.1  ads.mediaturf.net

127.0.0.1  exit.megago.com

127.0.0.1  www.megago.com #[typo squatter][IE-SpyAd]

127.0.0.1  www.megaseek.net #[IE-SpyAd]

127.0.0.1  megatds.com #[Adware/Megatds]

127.0.0.1  admintds.megatds.com

127.0.0.1  tds.megatds.com

127.0.0.1  www.megatds.com

127.0.0.1  ads.metropol.dk

127.0.0.1  pubs.mgn.net #[Grolier Network]

127.0.0.1  www.mgshareware.com #[Adware Bundler][Parasite.MySearch]

127.0.0.1  micorsoft.com

127.0.0.1  www.micorsoft.com #[typo hijacker]

127.0.0.1  www.mini-player.com #[5MOF Mini-Player]

127.0.0.1  banner.missingkids.com

127.0.0.1  smile.modchipstore.com

127.0.0.1  ads.monster.com

127.0.0.1  adserver.monster.com

127.0.0.1  adserver.a.in.monster.com

127.0.0.1  ads.monstermoving.com

127.0.0.1  cookie.monster.com

127.0.0.1  mp3today.net

127.0.0.1  www.mp3yes.com #[C2Media\LOP][IE-SpyAd]

127.0.0.1  mpamexit.com

127.0.0.1  www.messagetag.com #[Email tracker][IE-SpyAd]

127.0.0.1  msgtag.com

127.0.0.1  img.msgtag.com #[IE-SpyAd]

127.0.0.1  www.msgtag.com

127.0.0.1  msxpsupport.com #[Adware.SearchMaid]

127.0.0.1  www.msxpsupport.com #[Trojan.Win32.Fakespy.a]

127.0.0.1  multi1.rmuk.co.uk #[RealMedia]

127.0.0.1  www.musicsonglyrics.com #[static.windupdates.com]

127.0.0.1  mvtracker.com #[IE-SpyAd]

127.0.0.1  www.mvtracker.com

127.0.0.1  mvr3d.net #[NavExcel\n-CASE]

127.0.0.1  mvr.us #[Parasite.NavExcel]

127.0.0.1  www.mvr.us

127.0.0.1  www.myaffiliateprogram.com #[IE-SpyAd]

127.0.0.1  www.myarmory.com #[Spyware.Bazookabar]

127.0.0.1  www.myemessenger.com

127.0.0.1  noe.myftp.biz #[Backdoor.Botnachala]

127.0.0.1  www.mylinker.net #[Adware.MyLinker]

127.0.0.1  rm.myoc.com

127.0.0.1  myhitlogger.com

127.0.0.1  liveupdate.myim.cn #[Adware.BeSys]

127.0.0.1  mypagefinder.com #[Parasite.MyPageFinder]

# N

127.0.0.1  hit.namimedia.com #[IE-SpyAd]

127.0.0.1  ads.nandomedia.com

By the way you can also update that hostfile by checking sites
that monitor malicious websites.

Be a part of the DaniWeb community

We're a friendly, industry-focused community of developers, IT pros, digital marketers, and technology enthusiasts meeting, networking, learning, and sharing knowledge.