XP Pro, SP2. Cable modem.
AVG, which I believe is the root issue, with Spybot as an on-demand, MS Anti-Spyware (NOT AV) AdAware on-demand, AdWatch running all the time, Privacy Guardian on-demand, Spyware Doctor monitoring.
An AVG Update occurred (once we were up again and could access Outlook Express, we could see there were no e-mails), and the system lunched upon completion.
I had an MS Certified Software Engineer and Certified Trainer here. He'd never seen anything like it.
ALL files were changed from an .exe to a .lnk file.
You could access some stuff, but not Command Prompt, Add/Subtract, regedit was dead, the list goes on.
Apparently, final decision was to "accept" all there "registry modifications" that are NOT noted as being AVG (everything else I get is) and see what happened.
I had done 2 System Restores, and he did one.
So, we "accepted" all these, problem gone.
NO idea what it all is about.
I am a little afraid to re-load AVG.
Could not laod and execute any programs. Tried.
I have MS XP Firewall only, configured to allow AVG as they directed.
When done, ran all scans, clean, ran CWShredder, clean. Ran HiJackThis, clean (compared to saved logfiles).
What do you think?
Ad-Watch Logfile, exported on 12/19/2005
Total number of events:40
===============================================
12/19/2005 2:31:38 PM - Definitions file SE1R81 16.12.2005 loaded successfully.
BuildE1R81 16.12.2005
Total Signatures :45642
Target Families :797
Target Categories :6
CSI data Size :82552
File Size :1693319
===============================================
12/19/2005 2:31:38 PM - Internal Error : User Preference file corrupted!
To correct this error, close and relaunch Ad-Watch.
Default settings have been applied.
(All Blocking Features are active)
12/19/2005 2:31:38 PMInitialization Error (3)
===============================================
12/19/2005 2:31:38 PM - Sites file loaded.
Sites file loaded successfully.
C:\Program Files\Lavasoft\Ad-Aware SE Plus\sites.txt
Total entries : 3230
===============================================
12/19/2005 2:32:04 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
KeyOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
Value:AppInit_DLLs
Data:
New Data:
===============================================
12/19/2005 2:33:15 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
KeyOFTWARE\Classes\regfile\shell\open\command
Value:
Data:
New Data:regedit.exe "%1"
===============================================
12/19/2005 2:34:25 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
KeyOFTWARE\Classes\lnkfile\CLSID
Value:
Data:
New Data:{00021401-0000-0000-C000-000000000046}
===============================================
12/19/2005 2:35:24 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
KeyOFTWARE\Classes\exefile\shell\open\command
Value:
Data:
New Data:"%1" %*
===============================================
12/19/2005 2:35:51 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
Keyoftware\Classes\.com
Value:
Data:
New Data:comfile
===============================================
12/19/2005 2:36:10 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
Keyoftware\Classes\.scr
Value:
Data:
New Data:scrfile
===============================================
12/19/2005 2:36:31 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
Keyoftware\Classes\.bat
Value:
Data:
New Data:batfile
===============================================
12/19/2005 2:36:58 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
Keyoftware\Classes\.pif
Value:
Data:
New Data:piffile
===============================================
12/19/2005 2:37:18 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
Keyoftware\Classes\.reg
Value:
Data:
New Data:regfile
===============================================
12/19/2005 2:37:41 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
Keyoftware\Classes\.lnk
Value:
Data:
New Data:lnkfile
===============================================
12/19/2005 2:37:43 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
Keyoftware\Classes\.exe
Value:
Data:
New Data:exefile
===============================================
12/19/2005 2:37:43 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
Keyoftware\Microsoft\Windows\CurrentVersion\Run
Value:AWMON
Data:
New Data:"C:\Program Files\Lavasoft\Ad-Aware SE Plus\Ad-Watch.exe"
===============================================
12/19/2005 2:37:43 PM - Registry modification detected
Root:HKEY_CURRENT_USER
Keyoftware\Microsoft\Windows\CurrentVersion\Run
Valuepyware Doctor
Data:
New Data:"C:\Program Files\Spyware Doctor\swdoctor.exe" /Q
===============================================
12/19/2005 2:37:44 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
Keyoftware\Microsoft\Internet Explorer\SearchUrl
Value:
Data:
New Data:
===============================================
12/19/2005 2:37:48 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
Keyoftware\Microsoft\Internet Explorer\Search
ValueearchAssistant
Data:
New Data
www.google.com]
===============================================
12/19/2005 2:37:48 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
Keyoftware\Microsoft\Internet Explorer\Main
Valueefault_Page_URL
Data:
New Data
www.microsoft.com]
===============================================
12/19/2005 2:37:50 PM - Registry modification detected
Root:HKEY_CURRENT_USER
Keyoftware\Microsoft\Internet Explorer\Toolbar\Webbrowser
Value:{01E04581-4EEE-11D0-BFE9-00AA005B4383}
Data:
New Data:
===============================================
12/19/2005 2:37:51 PM - Registry modification detected
Root:HKEY_CURRENT_USER
Keyoftware\Microsoft\Internet Explorer\SearchUrl
Value:provider
Data:
New Data:gogl
===============================================
12/19/2005 2:37:52 PM - Registry modification detected
Root:HKEY_CURRENT_USER
Keyoftware\Microsoft\Internet Explorer\Search
Valueefault_Search_URL
Data:
New Data
www.google.com]
===============================================
12/19/2005 2:37:52 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
Keyoftware\Classes\.exe
Value:Content Type
Data:
New Data:application/x-msdownload
===============================================
12/19/2005 2:37:53 PM - Tracking cookie blocked.
Name: Cookie:dave@ads.pointroll.com/
Size: 493 Bytes.
Hits: 7
UseCount: 0
Expires: 12/31/2009 4:00:00 PM
Last Sync Time: 12/19/2005 1:43:18 PM
===============================================
12/19/2005 2:37:53 PM - Tracking cookie blocked.
Name: Cookie:dave@edge.ru4.com/
Size: 714 Bytes.
Hits: 3
UseCount: 0
Expires: 12/12/2035 1:43:02 PM
Last Sync Time: 12/19/2005 1:43:12 PM
===============================================
12/19/2005 2:37:53 PM - Tracking cookie blocked.
Name: Cookie:dave@questionmarket.com/
Size: 223 Bytes.
Hits: 2
UseCount: 0
Expires: 2/9/2007 5:43:10 AM
Last Sync Time: 12/19/2005 1:43:20 PM
===============================================
12/19/2005 2:37:53 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
Keyoftware\Microsoft\Windows\CurrentVersion\Run
Value:gcasServ
Data:
New Data:"C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
===============================================
12/19/2005 2:37:53 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
Keyoftware\Microsoft\Internet Explorer\Search
Value:CustomizeSearch
Data:
New Data:[ie.search.msn.com]{SUB_RFC1766}/srchasst/srchcust.htm
===============================================
12/19/2005 2:37:54 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
Keyoftware\Microsoft\Internet Explorer\Main
Value:Local Page
Data:
New Data:C:\WINDOWS\SYSTEM32\blank.htm
===============================================
12/19/2005 2:37:54 PM - Registry modification detected
Root:HKEY_CURRENT_USER
Keyoftware\Microsoft\Internet Explorer\Toolbar\Webbrowser
Value:{0E5CBF21-D15F-11D0-8301-00AA005B4383}
Data:
New Data:
===============================================
12/19/2005 2:37:55 PM - Registry modification detected
Root:HKEY_CURRENT_USER
Keyoftware\Microsoft\Internet Explorer\SearchUrl
Value:
Data:
New Data
www.google.com]
===============================================
12/19/2005 2:37:55 PM - Registry modification detected
Root:HKEY_CURRENT_USER
Keyoftware\Microsoft\Internet Explorer\Toolbar\Webbrowser
Value:{2318C2B1-4965-11D4-9B18-009027A5CD4F}
Data:
New Data:
===============================================
12/19/2005 2:37:56 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
Keyoftware\Microsoft\Internet Explorer\Main
Valuetart Page
Data:
New Data
www.msn.com]
===============================================
12/19/2005 2:37:56 PM - Registry modification detected
Root:HKEY_LOCAL_MACHINE
Keyoftware\Microsoft\Windows\CurrentVersion\Run
Value:AVG7_CC
Data:
New Data:C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
===============================================
12/19/2005 2:37:57 PM - Registry modification detected
Root:HKEY_CURRENT_USER
Keyoftware\Microsoft\Internet Explorer\Toolbar\Webbrowser
Value:{42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6}
Data:
New Data:
===============================================
12/19/2005 2:37:57 PM - Registry modification detected
Root:HKEY_CURRENT_USER
Keyoftware\Microsoft\Internet Explorer\Toolbar\Webbrowser
Value:ITBarLayout
Data:
New Data:
===============================================
12/19/2005 2:37:58 PM - Registry modification detected
Root:HKEY_CURRENT_USER
Keyoftware\Microsoft\Internet Explorer\Toolbar\Webbrowser
Value:{C4069E3A-68F1-403E-B40E-20066696354B}
Data:
New Data:
===============================================
12/19/2005 2:37:59 PM - Registry modification detected
Root:HKEY_CURRENT_USER
Keyoftware\Microsoft\Internet Explorer\Main
Value:Local Page
Data:
New Data:C:\WINDOWS\system32\blank.htm
===============================================
12/19/2005 2:37:59 PM - Registry modification detected
Root:HKEY_CURRENT_USER
Keyoftware\Microsoft\Internet Explorer\Main
Valuetart Page
Data:
New Data
www.bachmanntrains.com]
===============================================
12/19/2005 2:38:00 PM - Registry modification detected
Root:HKEY_CURRENT_USER
Keyoftware\Microsoft\Internet Explorer\Main
Valueearch Page
Data:
New Data
www.google.com]
===============================================
Please note, at no point does any of this say it's from "AVG", so Registry Modifications are blocked BY ME.
I ran a Spyware Doctor scan, clean.
Ran an AVG scan, clean, but computer for all intents and purposes is inop.