
* Added 'Action taken' info to 'More info on this item' dialog.

* Added O23 method: NT Services, which lists all (non-disabled, non-Microsoft) services, like Msconfig. It does not target specific programs/URLs, just the methods used by hijackers to force you onto their sites. It is continually updated to detect and remove new hijacks. StartList scans the system for all objects that are in all startup sections of the registry. It scans for all objects which may be affiliated with Web Browser activity. R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\PCHealth\HelpCtr\System\panels\blank.HijackThis is a general homepage hijackers detector and remover. R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = MSIE: Internet Explorer v6.00 SP2 (.2180)Ĭ:\Program Files\Common Files\Symantec Shared\ccSetMgr.exeĬ:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exeĬ:\Program Files\Common Files\Symantec Shared\SNDSrvc.exeĬ:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exeĬ:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exeĬ:\Program Files\eFax Messenger 4.1\J2GDllCmd.exeĬ:\Program Files\Common Files\Symantec Shared\ccApp.exeĬ:\Program Files\Adobe\Acrobat 7.0\Distillr\Acrotray.exeĬ:\Program Files\Spybot - Search & Destroy\TeaTimer.exeĬ:\Program Files\eFax Messenger 4.1\J2GTray.exeĬ:\Program Files\Norton SystemWorks\Norton GoBack\GBTray.exeĬ:\Program Files\PC Magazine Utilities\StartupCop Pro\scp.exeĬ:\Program Files\Adobe\Photoshop Elements 4.0\PhotoshopElementsFileAgent.exeĬ:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exeĬ:\Program Files\Norton SystemWorks\Norton GoBack\GBPoll.exeĬ:\PROGRA~1\Iomega\System32\AppServices.exeĬ:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXEĬ:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exeĬ:\Program Files\Norton SystemWorks\Norton AntiVirus\IWP\NPFMntor.exeĬ:\PROGRA~1\NORTON~1\NORTON~3\SPEEDD~1\NOPDB.EXEĬ:\Program Files\Common Files\Symantec Shared\Security Console\NSCSRVCE.EXEĬ:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXEĬ:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXEį:\NEW DOWNLOADS\Hijackthis 1.99 (2-23-06)\HijackThis.exe

I have a log from Hijackthis 1.99 scan and would like some help with reading it and next steps.
