Malwarebytes' Anti-Malware 1.46 www.malwarebytes.org Database version: 4052 Windows 5.1.2600 Service Pack 2 Internet Explorer 6.0.2900.2180 6/21/2010 2:14:32 AM mbam-log-2010-06-21 (02-14-32).txt Scan type: Full scan (C:\|D:\|) Objects scanned: 259995 Time elapsed: 2 hour(s), 4 minute(s), 6 second(s) Memory Processes Infected: 0 Memory Modules Infected: 0 Registry Keys Infected: 0 Registry Values Infected: 1 Registry Data Items Infected: 2 Folders Infected: 0 Files Infected: 6 Memory Processes Infected: (No malicious items detected) Memory Modules Infected: (No malicious items detected) Registry Keys Infected: (No malicious items detected) Registry Values Infected: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\appiozt_dlls (Spyware.Agent.H) -> Quarantined and deleted successfully. Registry Data Items Infected: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 93.188.162.167,93.188.166.198 -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{31442500-f300-4804-9603-16f5aae664dd}\NameServer (Trojan.DNSChanger) -> Data: 93.188.162.167,93.188.166.198 -> Quarantined and deleted successfully. Folders Infected: (No malicious items detected) Files Infected: C:\WINDOWS\system32\jbwonjm.dll (Malware.Packer.Gen) -> Delete on reboot. C:\WINDOWS\system64.exe (Trojan.Banker) -> Quarantined and deleted successfully. C:\WINDOWS\system32\cooper.mine (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\cookies.ini (Malware.Trace) -> Quarantined and deleted successfully. C:\WINDOWS\kernel32.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.