Here is my hijack this log. I am posting my Hijack This log so that I can resolve an Ad-Aware SE scan. Here is the Ad-Awre SE scan:
2007/12/01 09:25:57:703: Switching to service version.
2007/12/01 09:25:59:890: OnitDialog...
2007/12/01 09:26:00:984: \\.\pipe\AdwareAlert.service.communication is the named pipe
2007/12/01 09:26:01:734: Contacting scanning service.
2007/12/01 09:26:01:921: Aquired scanning engine.
2007/12/01 09:26:01:921: Load Program Settings
2007/12/01 09:26:58:343: Found Item:
Type: trojan
SubType: dialer
Location: hkey_current_user\software\microsoft\windows\currentversion\internet settings\zonemap\domains\realarea.biz (value: *)
2007/12/01 09:26:58:343: Found Item:
Type: trojan
SubType: dialer
Location: hkey_current_user\software\microsoft\windows\currentversion\internet settings\zonemap\domains\realarea.biz
2007/12/01 09:26:58:375: Found Item:
Type: trojan-clicker
SubType: agent
Location: hkey_current_user\software\microsoft\windows\currentversion\internet settings\zonemap\domains\analcord.com\www (value: *)
2007/12/01 09:26:58:375: Found Item:
Type: trojan-clicker
SubType: agent
Location: hkey_current_user\software\microsoft\windows\currentversion\internet settings\zonemap\domains\analcord.com\www
2007/12/01 09:26:58:375: Found Item:
Type: trojan-clicker
SubType: agent
Location: hkey_current_user\software\microsoft\windows\currentversion\internet settings\zonemap\domains\analcord.com (value: *)
2007/12/01 09:26:58:375: Found Item:
Type: trojan-clicker
SubType: agent
Location: hkey_current_user\software\microsoft\windows\currentversion\internet settings\zonemap\domains\analcord.com
2007/12/01 09:26:58:375: Found Item:
Type: trojan-clicker
SubType: agent
Location: hkey_current_user\software\microsoft\windows\currentversion\internet settings\zonemap\domains\gooogle.bz\www (value: *)
2007/12/01 09:26:58:375: Found Item:
Type: trojan-clicker
SubType: agent
Location: hkey_current_user\software\microsoft\windows\currentversion\internet settings\zonemap\domains\gooogle.bz\www
2007/12/01 09:26:58:375: Found Item:
Type: trojan-clicker
SubType: agent
Location: hkey_current_user\software\microsoft\windows\currentversion\internet settings\zonemap\domains\gooogle.bz (value: *)
2007/12/01 09:26:58:375: Found Item:
Type: trojan-clicker
SubType: agent
Location: hkey_current_user\software\microsoft\windows\currentversion\internet settings\zonemap\domains\gooogle.bz
2007/12/01 09:26:58:375: Found Item:
Type: spyware
SubType: netbus pro
Location: d:\utilites\hlp_printer\hlp2text\setup.exe
2007/12/01 09:26:58:578: Setting Timer to Hide Splash
2007/12/01 09:26:59:093: Hiding Splash
WHAT I NEED TO RESOLVE:
1. Look at the last item in the above scan:
2007/12/01 09:26:58:375: Found Item:
Type: spyware
SubType: netbus pro
Location: d:\utilites\hlp_printer\hlp2text\setup.exe
This is a printer utility (allows hlp files to be printed as text files) that I have used many times. I am very sure it is not spyware!
Ad-Ware SE tek support says to do a remove all-- "If Ad-Ware detected it; it needs to be removed" is there attitude.
2. I asked Ad-Ware to remove a couple of the other items:
2007/12/01 09:26:58:375: Found Item:
Type: trojan-clicker
SubType: agent
Location: hkey_current_user\software\microsoft\windows\currentversion\internet settings\zonemap\domains\gooogle.bz\www (value: *)
2007/12/01 09:26:58:375: Found Item:
Type: trojan-clicker
SubType: agent
Location: hkey_current_user\software\microsoft\windows\currentversion\internet settings\zonemap\domains\gooogle.bz\www
Ad-Ware says they are removed, but a re-scan produces the same list. The items that were supposed to be removed are still there.
How do I remove permanently? Ad-Ware support did not know why they re-appeared.
3 Does the Hijack This log show the same items as the Ad-Ware SE scan?
HIJACK THIS LOG:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 2:14:50 PM, on 12/1/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16544)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\Program Files\AdwareAlert\AdwareAlertSrv.srv.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\hkcmd.exe
C:\WINDOWS\System32\igfxpers.exe
D:\UTILITES\Acronis_True_Image_9b36779(070907)\TimounterMonitor.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\Program Files\Analog Devices\SoundMAX\Smax4.exe
D:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
D:\UTILITES\SpySweeperFull\Spysweeper5_5_1b3356(062307)\INSTALL_5_5_1b3356(071507)\Spy Sweeper\SpySweeperUI.exe
F:\Ashampoo_2002_2003\UIWatcher.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
D:\Sea_Monkey_1_1_2(070407)\SeaMonkey.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\System32\svchost.exe
D:\UTILITES\SpySweeperFull\Spysweeper5_5_1b3356(062307)\INSTALL_5_5_1b3356(071507)\Spy Sweeper\SpySweeper.exe
C:\Program Files\AdwareAlert\AdwareAlert.exe
E:\NikonPictureProject175\NkbMonitor.exe
F:\ExplorerPlus_6_2_0(090107)\Nxdlghlp.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe
D:\UTILITES\SpySweeperFull\Spysweeper5_5_1b3356(062307)\INSTALL_5_5_1b3356(071507)\Spy Sweeper\SSU.EXE
F:\ExplorerPlus_6_2_0(090107)\NxExplo.exe
D:\UTILITES\HIjack_this\Hijack_This_Program_V202(120107)\HiJackThis.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft....k/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\System32\igfxpers.exe
O4 - HKLM\..\Run: [JMB36X IDE Setup] C:\WINDOWS\JM\JMInsIDE.exe
O4 - HKLM\..\Run: [36X Raid Configurer] "C:\WINDOWS\system32\JMRaidSetup.exe" boot
O4 - HKLM\..\Run: [AcronisTimounterMonitor] D:\UTILITES\Acronis_True_Image_9b36779(070907)\TimounterMonitor.exe
O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
O4 - HKLM\..\Run: [SoundMAXPnP] "C:\Program Files\Analog Devices\Core\smax4pnp.exe"
O4 - HKLM\..\Run: [SoundMAX] "C:\Program Files\Analog Devices\SoundMAX\Smax4.exe" /tray
O4 - HKLM\..\Run: [ZoneAlarm Client] "D:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
O4 - HKLM\..\Run: [SpySweeper] "D:\UTILITES\SpySweeperFull\Spysweeper5_5_1b3356(062307)\INSTALL_5_5_1b3356(071507)\Spy Sweeper\SpySweeperUI.exe" /startintray
O4 - HKCU\..\Run: [UIWatcher] F:\Ashampoo_2002_2003\UIWatcher.exe
O4 - HKCU\..\Run: [SeaMonkey Quick Launch] "d:\Sea_Monkey_1_1_2(070407)\SeaMonkey.exe" -turbo
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [AdwareAlert] "C:\Program Files\AdwareAlert\AdwareAlert.exe" -boot
O4 - Startup: Dialog Tracker.lnk = F:\ExplorerPlus_6_2_0(090107)\Nxdlghlp.exe
O4 - Global Startup: NkbMonitor.exe.lnk = E:\NikonPictureProject175\NkbMonitor.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://F:\OFFICE~1\MICROS~1\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - F:\OFFICE~1\MICROS~1\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.mi...b?1184199298234
O23 - Service: AdwareAlert Scanning Engine (AdwareAlertSrv) - Unknown owner - C:\Program Files\AdwareAlert\AdwareAlertSrv.srv.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\SYSTEM32\ZONELABS\vsmon.exe
O23 - Service: Webroot Spy Sweeper Engine (WebrootSpySweeperService) - Webroot Software, Inc. - D:\UTILITES\SpySweeperFull\Spysweeper5_5_1b3356(062307)\INSTALL_5_5_1b3356(071507)\Spy Sweeper\SpySweeper.exe
--
End of file - 5605 bytes
THANKS, krazykat