Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

unknown trogan Icant get rid of [RESOLVED]


  • This topic is locked This topic is locked

#1
Timc07747

Timc07747

    Member

  • Member
  • PipPip
  • 11 posts
Hi
did an AVG check in safe mode and no help.

Here is what shows up on start up;

thanks for the help

Tim

"Silent Runners.vbs", revision 55, http://www.silentrunners.org/
Operating System: Windows XP SP2
Output limited to non-default values, except where indicated by "{++}"


Startup items buried in registry:
---------------------------------

HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ {++}
"ctfmon.exe" = "C:\WINDOWS\system32\ctfmon.exe" [MS]
"Aim6" = ""C:\Program Files\AIM6\aim6.exe" /d locale=en-US ee://aol/imApp" ["AOL LLC"]
"SpybotSD TeaTimer" = "C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe" ["Safer Networking Limited"]

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ {++}
"HostManager" = "C:\Program Files\Common Files\AOL\1154795777\ee\AOLSoftware.exe" ["America Online, Inc."]
"IPHSend" = "C:\Program Files\Common Files\AOL\IPHSend\IPHSend.exe" ["America Online, Inc."]
"Adobe Photo Downloader" = ""C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe"" ["Adobe Systems Incorporated"]
"Adobe Reader Speed Launcher" = ""C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"" ["Adobe Systems Incorporated"]
"TomTomHOME.exe" = ""C:\Program Files\TomTom HOME 2\HOMERunner.exe" -s" ["TomTom"]
"NvCplDaemon" = "RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup" [MS]
"QuickTime Task" = ""C:\Program Files\QuickTime\QTTask.exe" -atboottime" ["Apple Inc."]
"iTunesHelper" = ""C:\Program Files\iTunes\iTunesHelper.exe"" ["Apple Inc."]
"RegistryMechanic" = (empty string) [file not found]
"AVG7_CC" = "C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP" ["GRISOFT, s.r.o."]
"Windows Defender" = ""C:\Program Files\Windows Defender\MSASCui.exe" -hide" [MS]

HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\
>{22d6f312-b0f6-11d0-94ab-0080c74c7e95}\(Default) = "Windows Media Player"
\StubPath = "C:\WINDOWS\inf\unregmp2.exe /ShowWMP" [null data]

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
{06849E9F-C8D7-4D59-B87D-784B7D6BE0B3}\(Default) = (no title provided)
-> {HKLM...CLSID} = "Adobe PDF Reader Link Helper"
\InProcServer32\(Default) = "C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll" ["Adobe Systems Incorporated"]
{53707962-6F74-2D53-2644-206D7942484F}\(Default) = (no title provided)
-> {HKLM...CLSID} = "Spybot-S&D IE Protection"
\InProcServer32\(Default) = "C:\PROGRA~1\SPYBOT~1\SDHelper.dll" ["Safer Networking Limited"]
{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\(Default) = (no title provided)
-> {HKLM...CLSID} = "SSVHelper Class"
\InProcServer32\(Default) = "C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll" ["Sun Microsystems, Inc."]
{AAED19A0-D72D-4AD1-8F94-B53D36C835A7}\(Default) = (no title provided)
-> {HKLM...CLSID} = "Player"
\InProcServer32\(Default) = "C:\WINDOWS\orgnavi.dll" ["Asus"]

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\
"{00022613-0000-0000-C000-000000000046}" = "Multimedia File Property Sheet"
-> {HKLM...CLSID} = "Multimedia File Property Sheet"
\InProcServer32\(Default) = "mmsys.cpl" [MS]
"{176d6597-26d3-11d1-b350-080036a75b03}" = "ICM Scanner Management"
-> {HKLM...CLSID} = "ICM Scanner Management"
\InProcServer32\(Default) = "icmui.dll" [MS]
"{3EA48300-8CF6-101B-84FB-666CCB9BCD32}" = "OLE Docfile Property Page"
-> {HKLM...CLSID} = "OLE Docfile Property Page"
\InProcServer32\(Default) = "docprop.dll" [MS]
"{42071714-76d4-11d1-8b24-00a0c9068ff3}" = "Display Panning CPL Extension"
-> {HKLM...CLSID} = "Display Panning CPL Extension"
\InProcServer32\(Default) = "deskpan.dll" [file not found]
"{4E40F770-369C-11d0-8922-00A024AB2DBB}" = "DS Security Page"
-> {HKLM...CLSID} = "Security Shell Extension"
\InProcServer32\(Default) = "dssec.dll" [MS]
"{513D916F-2A8E-4F51-AEAB-0CBC76FB1AF8}" = "Compatibility Page"
-> {HKLM...CLSID} = "Compatibility Page"
\InProcServer32\(Default) = "SlayerXP.dll" [MS]
"{56117100-C0CD-101B-81E2-00AA004AE837}" = "Shell Scrap DataHandler"
-> {HKLM...CLSID} = "Shell Scrap DataHandler"
\InProcServer32\(Default) = "shscrap.dll" [MS]
"{59099400-57FF-11CE-BD94-0020AF85B590}" = "Disk Copy Extension"
-> {HKLM...CLSID} = "Disk Copy Extension"
\InProcServer32\(Default) = "diskcopy.dll" [MS]
"{7988B573-EC89-11cf-9C00-00AA00A14F56}" = "Disk Quota UI"
-> {HKLM...CLSID} = "Microsoft Disk Quota UI"
\InProcServer32\(Default) = "dskquoui.dll" [MS]
"{88895560-9AA2-1069-930E-00AA0030EBC8}" = "HyperTerminal Icon Ext"
-> {HKLM...CLSID} = "HyperTerminal Icon Ext"
\InProcServer32\(Default) = "C:\WINDOWS\System32\hticons.dll" ["Hilgraeve, Inc."]
"{f92e8c40-3d33-11d2-b1aa-080036a75b03}" = "Display TroubleShoot CPL Extension"
-> {HKLM...CLSID} = "Display TroubleShoot CPL Extension"
\InProcServer32\(Default) = "deskperf.dll" [MS]
"{7444C717-39BF-11D1-8CD9-00C04FC29D45}" = "Crypto PKO Extension"
-> {HKLM...CLSID} = "CryptPKO Class"
\InProcServer32\(Default) = "C:\WINDOWS\system32\cryptext.dll" [MS]
"{F0152790-D56E-4445-850E-4F3117DB740C}" = "Remote Sessions CPL Extension"
-> {HKLM...CLSID} = "Remote Sessions CPL Extension"
\InProcServer32\(Default) = "C:\WINDOWS\System32\remotepg.dll" [MS]
"{2206CDB2-19C1-11D1-89E0-00C04FD7A829}" = "Microsoft Data Link"
-> {HKLM...CLSID} = "Microsoft OLE DB Service Component Data Links"
\InProcServer32\(Default) = "C:\Program Files\Common Files\System\Ole DB\oledb32.dll" [MS]
"{88C6C381-2E85-11D0-94DE-444553540000}" = "ActiveX Cache Folder"
-> {HKLM...CLSID} = "ActiveX Cache Folder"
\InProcServer32\(Default) = "C:\WINDOWS\system32\occache.dll" [MS]
"{e84fda7c-1d6a-45f6-b725-cb260c236066}" = "Shell Image Verbs"
-> {HKLM...CLSID} = "Shell Image Verbs"
\InProcServer32\(Default) = "C:\WINDOWS\system32\shimgvw.dll" [MS]
"{CC6EEFFB-43F6-46c5-9619-51D571967F7D}" = "Web Publishing Wizard"
-> {HKLM...CLSID} = "Web Publishing Wizard"
\InProcServer32\(Default) = "C:\WINDOWS\System32\netplwiz.dll" [MS]
"{E88DCCE0-B7B3-11d1-A9F0-00AA0060FA31}" = "Compressed (zipped) Folder"
-> {HKLM...CLSID} = "CompressedFolder"
\InProcServer32\(Default) = "C:\WINDOWS\System32\zipfldr.dll" [MS]
"{63da6ec0-2e98-11cf-8d82-444553540000}" = "FTP Folders Webview"
-> {HKLM...CLSID} = "Microsoft FTP Folder"
\InProcServer32\(Default) = "C:\WINDOWS\System32\msieftp.dll" [MS]
"{8A23E65E-31C2-11d0-891C-00A024AB2DBB}" = "Directory Query UI"
-> {HKLM...CLSID} = (no title provided)
\InProcServer32\(Default) = "C:\WINDOWS\System32\dsquery.dll" [MS]
"{ECF03A33-103D-11d2-854D-006008059367}" = "MyDocs Copy Hook"
-> {HKLM...CLSID} = (no title provided)
\InProcServer32\(Default) = "C:\WINDOWS\System32\mydocs.dll" [MS]
"{143A62C8-C33B-11D1-84FE-00C04FA34A14}" = "Microsoft Agent Character Property Sheet Handler"
-> {HKLM...CLSID} = "Microsoft Agent Character Property Sheet Handler"
\InProcServer32\(Default) = "C:\WINDOWS\msagent\agentpsh.dll" [MS]
"{60fd46de-f830-4894-a628-6fa81bc0190d}" = "%DESC_PublishDropTarget%"
-> {HKLM...CLSID} = "DropTarget Object for Photo Printing Wizard"
\InProcServer32\(Default) = "C:\WINDOWS\System32\photowiz.dll" [MS]
"{7A80E4A8-8005-11D2-BCF8-00C04F72C717}" = "MMC Icon Handler"
-> {HKLM...CLSID} = "ExtractIcon Class"
\InProcServer32\(Default) = "C:\WINDOWS\System32\mmcshext.dll" [MS]
"{8DD448E6-C188-4aed-AF92-44956194EB1F}" = "Windows Media Player Play as Playlist Context Menu Handler"
-> {HKLM...CLSID} = "WMP Burn Audio CD Launcher"
\InProcServer32\(Default) = "C:\WINDOWS\system32\wmpshell.dll" [MS]
"{1CDB2949-8F65-4355-8456-263E7C208A5D}" = "Desktop Explorer"
-> {HKLM...CLSID} = "Desktop Explorer"
\InProcServer32\(Default) = "C:\WINDOWS\system32\nvshell.dll" ["NVIDIA Corporation"]
"{1E9B04FB-F9E5-4718-997B-B8DA88302A47}" = "Desktop Explorer Menu"
-> {HKLM...CLSID} = (no title provided)
\InProcServer32\(Default) = "C:\WINDOWS\system32\nvshell.dll" ["NVIDIA Corporation"]
"{BDEADF00-C265-11D0-BCED-00A0C90AB50F}" = "Web Folders"
-> {HKLM...CLSID} = "Web Folders"
\InProcServer32\(Default) = "C:\PROGRA~1\COMMON~1\MICROS~1\WEBFOL~1\MSONSEXT.DLL" [MS]
"{0006F045-0000-0000-C000-000000000046}" = "Microsoft Outlook Custom Icon Handler"
-> {HKLM...CLSID} = "Outlook File Icon Extension"
\InProcServer32\(Default) = "C:\Program Files\Microsoft Office\Office10\OLKFSTUB.DLL" [MS]
"{42042206-2D85-11D3-8CFF-005004838597}" = "Microsoft Office HTML Icon Handler"
-> {HKLM...CLSID} = (no title provided)
\InProcServer32\(Default) = "C:\Program Files\Microsoft Office\Office10\msohev.dll" [MS]
"{5F327514-6C5E-4d60-8F16-D07FA08A78ED}" = "Auto Update Property Sheet Extension"
-> {HKLM...CLSID} = "Auto Update Property Sheet Extension"
\InProcServer32\(Default) = "C:\WINDOWS\system32\wuaucpl.cpl" [MS]
"{F0CB00CD-5A07-4D91-97F5-A8C92CDA93E4}" = "Shell Extensions for RealOne Player"
-> {HKLM...CLSID} = "RealOne Player Context Menu Class"
\InProcServer32\(Default) = "C:\Program Files\Real\RealPlayer\rpshell.dll" ["RealNetworks, Inc."]
"{596AB062-B4D2-4215-9F74-E9109B0A8153}" = "Previous Versions Property Page"
-> {HKLM...CLSID} = "Previous Versions Property Page"
\InProcServer32\(Default) = "C:\WINDOWS\System32\twext.dll" [null data]
"{692F0339-CBAA-47e6-B5B5-3B84DB604E87}" = "Extensions Manager Folder"
-> {HKLM...CLSID} = "Extensions Manager Folder"
\InProcServer32\(Default) = "C:\WINDOWS\system32\extmgr.dll" [MS]
"{A70C977A-BF00-412C-90B7-034C51DA2439}" = "NvCpl DesktopContext Class"
-> {HKLM...CLSID} = "DesktopContext Class"
\InProcServer32\(Default) = "C:\WINDOWS\system32\nvcpl.dll" ["NVIDIA Corporation"]
"{1E9B04FB-F9E5-4718-997B-B8DA88302A48}" = "nView Desktop Context Menu"
-> {HKLM...CLSID} = "nView Desktop Context Menu"
\InProcServer32\(Default) = "C:\WINDOWS\system32\nvshell.dll" ["NVIDIA Corporation"]
"{B9E1D2CB-CCFF-4AA6-9579-D7A4754030EF}" = "iTunes"
-> {HKLM...CLSID} = "iTunes"
\InProcServer32\(Default) = "C:\Program Files\iTunes\iTunesMiniPlayer.dll" ["Apple Inc."]
"{9F97547E-4609-42C5-AE0C-81C61FFAEBC3}" = "AVG7 Shell Extension"
-> {HKLM...CLSID} = "AVG7 Shell Extension Class"
\InProcServer32\(Default) = "C:\Program Files\Grisoft\AVG7\avgse.dll" ["GRISOFT, s.r.o."]
"{9F97547E-460A-42C5-AE0C-81C61FFAEBC3}" = "AVG7 Find Extension"
-> {HKLM...CLSID} = "AVG7 Find Extension Class"
\InProcServer32\(Default) = "C:\Program Files\Grisoft\AVG7\avgse.dll" ["GRISOFT, s.r.o."]

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\
<<!>> "{091EB208-39DD-417D-A5DD-7E2C2D8FB9CB}" = "Microsoft AntiMalware ShellExecuteHook"
-> {HKLM...CLSID} = "Microsoft AntiMalware ShellExecuteHook"
\InProcServer32\(Default) = "C:\PROGRA~1\WINDOW~4\MpShHook.dll" [MS]

HKLM\SOFTWARE\Classes\Folder\shellex\ColumnHandlers\
{F9DB5320-233E-11D1-9F84-707F02C10627}\(Default) = "PDF Column Info"
-> {HKLM...CLSID} = "PDF Shell Extension"
\InProcServer32\(Default) = "C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\PDFShell.dll" ["Adobe Systems, Inc."]

HKLM\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\
AVG7 Shell Extension\(Default) = "{9F97547E-4609-42C5-AE0C-81C61FFAEBC3}"
-> {HKLM...CLSID} = "AVG7 Shell Extension Class"
\InProcServer32\(Default) = "C:\Program Files\Grisoft\AVG7\avgse.dll" ["GRISOFT, s.r.o."]

HKLM\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\
AVG7 Shell Extension\(Default) = "{9F97547E-4609-42C5-AE0C-81C61FFAEBC3}"
-> {HKLM...CLSID} = "AVG7 Shell Extension Class"
\InProcServer32\(Default) = "C:\Program Files\Grisoft\AVG7\avgse.dll" ["GRISOFT, s.r.o."]


Group Policies {policy setting}:
--------------------------------

Note: detected settings may not have any effect.

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\

"shutdownwithoutlogon" = (REG_DWORD) dword:0x00000001
{Shutdown: Allow system to be shut down without having to log on}

"undockwithoutlogon" = (REG_DWORD) dword:0x00000001
{Devices: Allow undock without having to log on}


Active Desktop and Wallpaper:
-----------------------------

Active Desktop may be disabled at this entry:
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellState

Displayed if Active Desktop enabled and wallpaper not set by Group Policy:
HKCU\Software\Microsoft\Internet Explorer\Desktop\General\
"Wallpaper" = "C:\WINDOWS\system32\config\systemprofile\Local Settings\Application Data\Microsoft\Wallpaper1.bmp"

Displayed if Active Desktop disabled and wallpaper not set by Group Policy:
HKCU\Control Panel\Desktop\
"Wallpaper" = "C:\Documents and Settings\Tim\Local Settings\Application Data\Microsoft\Wallpaper1.bmp"


Enabled Screen Saver:
---------------------

HKCU\Control Panel\Desktop\
"SCRNSAVE.EXE" = "C:\WINDOWS\System32\logon.scr" [null data]


Enabled Scheduled Tasks:
------------------------

"AdwareAlert Scheduled Scan" -> launches: "C:\Program Files\AdwareAlert\AdwareAlert.exe scheduled" [file not found]
"AppleSoftwareUpdate" -> launches: "C:\Program Files\Apple Software Update\SoftwareUpdate.exe -task" ["Apple Inc."]
"MP Scheduled Scan" -> launches: "C:\Program Files\Windows Defender\MpCmdRun.exe Scan -RestrictPrivileges" [null data]
"rpc" -> launches: "C:\Program Files\Winferno\RegistryPowerCleaner\RegPowerClean.exe /ac " [file not found]
"Spybot - Search & Destroy - Scheduled Task" -> launches: "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe /AUTOCHECK /AUTOFIX" ["Safer Networking Limited"]
"Symantec NetDetect" -> launches: "C:\Program Files\Symantec\LiveUpdate\NDETECT.EXE" [null data]
"User_Feed_Synchronization-{5DC36F48-2D9B-48AD-8433-C4F1F716DFCB}" -> launches: "C:\WINDOWS\system32\msfeedssync.exe sync" [MS]
"User_Feed_Synchronization-{FD7A0CC4-84AA-487B-8A0F-307465E64A32}" -> launches: "C:\WINDOWS\system32\msfeedssync.exe sync" [MS]


Winsock2 Service Provider DLLs:
-------------------------------

Namespace Service Providers

HKLM\SYSTEM\CurrentControlSet\Services\Winsock2\Parameters\NameSpace_Catalog5\Catalog_Entries\ {++}
000000000001\LibraryPath = "%SystemRoot%\System32\mswsock.dll" [MS]
000000000002\LibraryPath = "%SystemRoot%\System32\winrnr.dll" [MS]
000000000003\LibraryPath = "%SystemRoot%\System32\mswsock.dll" [MS]

Transport Service Providers

HKLM\SYSTEM\CurrentControlSet\Services\Winsock2\Parameters\Protocol_Catalog9\Catalog_Entries\ {++}
0000000000##\PackedCatalogItem (contains) DLL [Company Name], (at) ## range:
%SystemRoot%\system32\mswsock.dll [MS], 01 - 03, 06 - 13
%SystemRoot%\system32\rsvpsp.dll [MS], 04 - 05


Toolbars, Explorer Bars, Extensions:
------------------------------------

Extensions (Tools menu items, main toolbar menu buttons)

HKLM\SOFTWARE\Microsoft\Internet Explorer\Extensions\
{08B0E5C0-4FCB-11CF-AAA5-00401C608501}\
"MenuText" = "Sun Java Console"
"CLSIDExtension" = "{CAFEEFAC-0015-0000-0006-ABCDEFFEDCBC}"
-> {HKCU...CLSID} = "Java Plug-in"
\InProcServer32\(Default) = "C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll" ["Sun Microsystems, Inc."]
-> {HKLM...CLSID} = "Java Plug-in 1.5.0_06"
\InProcServer32\(Default) = "C:\Program Files\Java\jre1.5.0_06\bin\npjpi150_06.dll" [null data]

{DFB852A3-47F8-48C4-A200-58CAB36FD2A2}\
"MenuText" = "Spybot - Search & Destroy Configuration"
"CLSIDExtension" = "{53707962-6F74-2D53-2644-206D7942484F}"
-> {HKLM...CLSID} = "Spybot-S&D IE Protection"
\InProcServer32\(Default) = "C:\PROGRA~1\SPYBOT~1\SDHelper.dll" ["Safer Networking Limited"]

{E2E2DD38-D088-4134-82B7-F2BA38496583}\
"MenuText" = "@xpsp3res.dll,-20001"
"Exec" = "%windir%\Network Diagnostic\xpnetdiag.exe" [null data]

{F4430FE8-2638-42E5-B849-800749B94EED}\
"ButtonText" = "PartyPoker.net"
"MenuText" = "PartyPoker.net"

{FB5F1910-F110-11D2-BB9E-00C04F795683}\
"ButtonText" = "Messenger"
"MenuText" = "Windows Messenger"


Running Services (Display Name, Service Name, Path {Service DLL}):
------------------------------------------------------------------

Apple Mobile Device, Apple Mobile Device, ""C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe"" ["Apple, Inc."]
AVG7 Alert Manager Server, Avg7Alrt, "C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe" ["GRISOFT, s.r.o."]
AVG7 Update Service, Avg7UpdSvc, "C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe" ["GRISOFT, s.r.o."]
iPod Service, iPod Service, ""C:\Program Files\iPod\bin\iPodService.exe"" ["Apple Inc."]
Machine Debug Manager, MDM, ""C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe"" [MS]
NVIDIA Display Driver Service, NVSvc, "C:\WINDOWS\system32\nvsvc32.exe" ["NVIDIA Corporation"]
Pml Driver HPZ12, Pml Driver HPZ12, "C:\WINDOWS\system32\HPZipm12.exe" ["HP"]
Viewpoint Manager Service, Viewpoint Manager Service, ""C:\Program Files\Viewpoint\Common\ViewpointService.exe"" ["Viewpoint Corporation"]
Windows Defender, WinDefend, ""C:\Program Files\Windows Defender\MsMpEng.exe"" [MS]


Print Monitors:
---------------

HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors\
BJ Language Monitor2\Driver = "CNBJMON2.DLL" [MS]
HP Standard TCP/IP Port\Driver = "HpTcpMon.dll" ["Hewlett Packard"]
Language Monitor\Driver = "hpz3l054.dll" ["Hewlett-Packard Company"]


---------- (launch time: 2008-02-05 12:37:59)
<<!>>: Suspicious data at a malware launch point.

+ This report excludes default entries except where indicated.
+ To see *everywhere* the script checks and *everything* it finds,
launch it from a command prompt or a shortcut with the -all parameter.
+ To search all directories of local fixed drives for DESKTOP.INI
DLL launch points, use the -supp parameter or answer "No" at the
first message box and "Yes" at the second message box.
---------- (total run time: 253 seconds, including 18 seconds for message boxes)
  • 0

Advertisements


#2
Timc07747

Timc07747

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
I am still getting the message"computer is infected with unknown trojan"
Here are the results to the Superantispyware scan:


SUPERAntiSpyware Scan Log
Generated 02/05/2008 at 07:53 PM

Application Version : 3.6.1000

Core Rules Database Version : 3395
Trace Rules Database Version: 1387

Scan type : Complete Scan
Total Scan Time : 02:59:04

Memory items scanned : 434
Memory threats detected : 0
Registry items scanned : 5691
Registry threats detected : 28
File items scanned : 134000
File threats detected : 563

Browser Hijacker.Internet Explorer Zone Hijack
HKU\S-1-5-21-1292428093-1757981266-682003330-1004\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\iwon.com
HKU\S-1-5-21-1292428093-1757981266-682003330-1004\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\iwon.com#*
HKU\S-1-5-21-1292428093-1757981266-682003330-1004\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\iwon.com\cg
HKU\S-1-5-21-1292428093-1757981266-682003330-1004\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\iwon.com\cg#https
HKU\S-1-5-21-1292428093-1757981266-682003330-1004\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\iwon.com\cg#http

Adware.Tracking Cookie
C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
C:\Documents and Settings\Tim\Cookies\[email protected][3].txt
C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
C:\Documents and Settings\Tim\Cookies\[email protected][1].txt
C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
C:\Documents and Settings\Tim\Cookies\[email protected][1].txt
C:\Documents and Settings\Tim\Cookies\[email protected][1].txt
C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
C:\Documents and Settings\Tim\Cookies\tim@findarticles[2].txt
C:\Documents and Settings\Tim\Cookies\tim@adlegend[2].txt
C:\Documents and Settings\Tim\Cookies\tim@revsci[2].txt
C:\Documents and Settings\Tim\Cookies\[email protected][1].txt
C:\Documents and Settings\Tim\Cookies\[email protected][1].txt
C:\Documents and Settings\Tim\Cookies\tim@findlaw[1].txt
C:\Documents and Settings\Tim\Cookies\[email protected][1].txt
C:\Documents and Settings\Tim\Cookies\[email protected][1].txt
C:\Documents and Settings\Tim\Cookies\[email protected][3].txt
C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
C:\Documents and Settings\Tim\Cookies\tim@indexstats[2].txt
C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
C:\Documents and Settings\Tim\Cookies\tim@eyewonder[2].txt
C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
C:\Documents and Settings\Tim\Cookies\tim@collective-media[1].txt
C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
C:\Documents and Settings\Tim\Cookies\tim@atwola[2].txt
C:\Documents and Settings\Tim\Cookies\[email protected][1].txt
C:\Documents and Settings\Tim\Cookies\tim@adinterax[1].txt
C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
C:\Documents and Settings\Tim\Cookies\tim@tacoda[2].txt
C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
C:\Documents and Settings\Tim\Cookies\tim@realmedia[1].txt
C:\Documents and Settings\Tim\Cookies\tim@interclick[2].txt
C:\Documents and Settings\Tim\Cookies\tim@superstats[1].txt
C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
C:\Documents and Settings\Tim\Cookies\tim@mediabistro[1].txt
C:\Documents and Settings\fish boy\Cookies\fish [email protected][1].txt
C:\Documents and Settings\fish boy\Cookies\fish [email protected][1].txt
C:\Documents and Settings\fish boy\Cookies\fish [email protected][1].txt
C:\Documents and Settings\fish boy\Cookies\fish [email protected][2].txt
C:\Documents and Settings\fish boy\Cookies\fish boy@partner2profit[2].txt
C:\Documents and Settings\fish boy\Cookies\fish [email protected][2].txt
C:\Documents and Settings\fish boy\Cookies\fish_boy@adlegend[1].txt
C:\Documents and Settings\fish boy\Cookies\[email protected][2].txt
C:\Documents and Settings\fish boy\Cookies\[email protected][1].txt
C:\Documents and Settings\fish boy\Cookies\[email protected][2].txt
C:\Documents and Settings\fish boy\Cookies\[email protected][1].txt
C:\Documents and Settings\fish boy\Cookies\[email protected][1].txt
C:\Documents and Settings\fish boy\Cookies\fish_boy@apmebf[1].txt
C:\Documents and Settings\fish boy\Cookies\fish_boy@atwola[1].txt
C:\Documents and Settings\fish boy\Cookies\[email protected][1].txt
C:\Documents and Settings\fish boy\Cookies\fish_boy@kanoodle[1].txt
C:\Documents and Settings\fish boy\Cookies\[email protected][2].txt
C:\Documents and Settings\fish boy\Cookies\fish_boy@specificclick[2].txt
C:\Documents and Settings\fish boy\Cookies\[email protected][1].txt
C:\Documents and Settings\fish boy\Cookies\fish_boy@xiti[1].txt
C:\Documents and Settings\Guest\Cookies\guest@adlegend[1].txt
C:\Documents and Settings\Guest\Cookies\[email protected][1].txt
C:\Documents and Settings\Guest\Cookies\[email protected][2].txt
C:\Documents and Settings\Guest\Cookies\[email protected][1].txt
C:\Documents and Settings\Guest\Cookies\[email protected][1].txt
C:\Documents and Settings\Guest\Cookies\[email protected][2].txt
C:\Documents and Settings\Guest\Cookies\guest@atwola[1].txt
C:\Documents and Settings\Julia\Cookies\julia@2o7[1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][1].txt
C:\Documents and Settings\Julia\Cookies\julia@adlegend[1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][2].txt
C:\Documents and Settings\Julia\Cookies\[email protected][2].txt
C:\Documents and Settings\Julia\Cookies\julia@adrevolver[1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][2].txt
C:\Documents and Settings\Julia\Cookies\[email protected][1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][1].txt
C:\Documents and Settings\Julia\Cookies\julia@advertising[2].txt
C:\Documents and Settings\Julia\Cookies\[email protected][1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][1].txt
C:\Documents and Settings\Julia\Cookies\julia@apmebf[2].txt
C:\Documents and Settings\Julia\Cookies\[email protected][2].txt
C:\Documents and Settings\Julia\Cookies\julia@atdmt[2].txt
C:\Documents and Settings\Julia\Cookies\julia@atwola[1].txt
C:\Documents and Settings\Julia\Cookies\julia@bannerspace[1].txt
C:\Documents and Settings\Julia\Cookies\julia@bluestreak[2].txt
C:\Documents and Settings\Julia\Cookies\[email protected][1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][2].txt
C:\Documents and Settings\Julia\Cookies\julia@burstnet[1].txt
C:\Documents and Settings\Julia\Cookies\julia@casalemedia[1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][2].txt
C:\Documents and Settings\Julia\Cookies\julia@collective-media[2].txt
C:\Documents and Settings\Julia\Cookies\[email protected][2].txt
C:\Documents and Settings\Julia\Cookies\[email protected][1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][2].txt
C:\Documents and Settings\Julia\Cookies\[email protected][2].txt
C:\Documents and Settings\Julia\Cookies\julia@gogurtmonstertracker[2].txt
C:\Documents and Settings\Julia\Cookies\julia@kanoodle[2].txt
C:\Documents and Settings\Julia\Cookies\[email protected][2].txt
C:\Documents and Settings\Julia\Cookies\[email protected][2].txt
C:\Documents and Settings\Julia\Cookies\julia@mediaplex[1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][1].txt
C:\Documents and Settings\Julia\Cookies\julia@mywebsearch[1].txt
C:\Documents and Settings\Julia\Cookies\julia@nextag[2].txt
C:\Documents and Settings\Julia\Cookies\julia@overture[1].txt
C:\Documents and Settings\Julia\Cookies\julia@partner2profit[1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][1].txt
C:\Documents and Settings\Julia\Cookies\julia@popularscreensavers[2].txt
C:\Documents and Settings\Julia\Cookies\julia@qksrv[2].txt
C:\Documents and Settings\Julia\Cookies\julia@questionmarket[2].txt
C:\Documents and Settings\Julia\Cookies\julia@revenue[1].txt
C:\Documents and Settings\Julia\Cookies\julia@revsci[2].txt
C:\Documents and Settings\Julia\Cookies\julia@rightmedia[1].txt
C:\Documents and Settings\Julia\Cookies\julia@roiservice[1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][2].txt
C:\Documents and Settings\Julia\Cookies\[email protected][2].txt
C:\Documents and Settings\Julia\Cookies\julia@serving-sys[2].txt
C:\Documents and Settings\Julia\Cookies\julia@specificclick[2].txt
C:\Documents and Settings\Julia\Cookies\[email protected][1].txt
C:\Documents and Settings\Julia\Cookies\julia@tacoda[1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][1].txt
C:\Documents and Settings\Julia\Cookies\julia@tradedoubler[2].txt
C:\Documents and Settings\Julia\Cookies\julia@tribalfusion[2].txt
C:\Documents and Settings\Julia\Cookies\julia@valueclick[2].txt
C:\Documents and Settings\Julia\Cookies\julia@webstats4u[1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][1].txt
C:\Documents and Settings\Julia\Cookies\[email protected][2].txt
C:\Documents and Settings\Julia\Cookies\[email protected][1].txt
C:\Documents and Settings\Julia\Cookies\julia@zedo[2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@2o7[2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@adbrite[1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@adinterax[1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@adknowledge[2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@adlegend[2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@adrevolver[2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][3].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@apmebf[1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@atwola[2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@azjmp[1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@bannerspace[2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@belnk[2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@bizrate[2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@bluestreak[2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@burstnet[2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@casalemedia[2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@clicksor[1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@consumergain[1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@emarketmakers[1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@exitexchange[2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@eyewonder[1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@focalex[2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@kanoodle[2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@keywordmax[1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@maxserving[1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][3].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@nextag[2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@oddcast[1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@onlinerewardcenter[1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@partner2profit[1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@partypoker[1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@precisionclick[1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@pro-market[1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@qnsr[1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@questionmarket[1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@realmedia[2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@regalinteractive[1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@revsci[2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@rightmedia[2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@roiservice[2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@screensavers[2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@smileycentral[2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@spamblockerutility[1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@specificclick[2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@superstats[1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@tacoda[2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@teenwitch[1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@tribalfusion[2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@tripod[1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\maggie@windowsmedia[1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][3].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][4].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][2].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\[email protected][1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@xiti[1].txt
C:\Documents and Settings\Maggie\Cookies\maggie@zedo[1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@adbrite[2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@adecn[1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@adinterax[2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@adknowledge[2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@adlegend[1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@adrevolver[1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@agoramedia[2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@apmebf[1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@atwola[1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@banner[2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@belnk[1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@bizrate[2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@burstnet[1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@centralmediaserver[2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@clickauditor[1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@collective-media[2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@coolsavings[1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@crackle[2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@dealtime[1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@directtrack[1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@drivecleaner[1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@focalex[2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@furniturefind[1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][3].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@indexstats[2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@indextools[2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@interclick[1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@kanoodle[2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@keywordmax[1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@maxserving[1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@media-partners[1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@medianewsgroup[2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@mywebsearch[1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@nextag[2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@onlinerewardcenter[2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@optimost[2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@partner2profit[2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@pathfinder[1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@pbteen[1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@poolclick[1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@pro-market[2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@realmedia[1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@revsci[1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@rightmedia[1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@roiservice[2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][3].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][4].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][5].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][3].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][4].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][5].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][6].txt
C:\Documents and Settings\Mommy\Cookies\mommy@serving-sys[2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@specificclick[1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@statcounter[2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@superstats[1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@tacoda[1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@toseeka[1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@tracking[1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@trafficdashboard[2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@tripod[2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\mommy@warlog[1].txt
C:\Documents and Settings\Mommy\Cookies\mommy@windowsmedia[2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][10].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][3].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][1].txt
C:\Documents and Settings\Mommy\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@19searchfeed[2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@2o7[1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@adecn[2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@adinterax[1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@adlegend[1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@adrevolver[2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@adserver[1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@apmebf[1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@atwola[2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@bannerspace[2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@belnk[1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@bizrate[1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@bluestreak[1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@buzztracker[2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@casalemedia[2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@clicksor[1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@collective-media[1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@counterbank[2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@counter[1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@emarketmakers[1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@enhance[1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@entrepreneur[1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@exitexchange[1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@eyewonder[1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@focalex[2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@funwebproducts[1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@goclick[2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@gostats[2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@honoluluadvertiser[2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@indextools[1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@interclick[1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@kanoodle[2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@keywordmax[1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@maxserving[1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][3].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@mediaonenetwork[1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@mywebsearch[1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@nextag[1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@onlinerewardcenter[2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@optimost[2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@overture[1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@partner2profit[2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@pbteen[2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@petfinder[2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@popularscreensavers[1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@qnsr[1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@questionmarket[2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@realmedia[2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@redorbit[1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@revsci[2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@rightmedia[2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][3].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][4].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][5].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][3].txt
C:\Documents and Settings\Taylor\Cookies\taylor@serving-sys[2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@smileycentral[1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@specificclick[1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@statcounter[1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@superstats[2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@tacoda[1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@trafficmp[2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@tribalfusion[1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@tripod[2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][3].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\taylor@windowsmedia[1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][2].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][1].txt
C:\Documents and Settings\Taylor\Cookies\[email protected][3].txt
C:\Documents and Settings\Taylor\Cookies\taylor@xiti[1].txt
C:\Documents and Settings\Taylor\Cookies\taylor@zedo[1].txt
C:\Documents and Settings\Tim\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\Tim\Local Settings\Temp\Cookies\tim@atwola[1].txt
C:\Documents and Settings\Tim\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\Tim\Local Settings\Temp\Cookies\tim@partner2profit[1].txt
C:\Documents and Settings\Tim\Local Settings\Temp\Cookies\tim@realmedia[2].txt
C:\Documents and Settings\Tim\Local Settings\Temp\Cookies\tim@tripod[1].txt

Adware.OneStepSearch
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ONESTEP_SEARCH_SERVICE
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ONESTEP_SEARCH_SERVICE#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ONESTEP_SEARCH_SERVICE\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ONESTEP_SEARCH_SERVICE\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ONESTEP_SEARCH_SERVICE\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ONESTEP_SEARCH_SERVICE\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ONESTEP_SEARCH_SERVICE\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ONESTEP_SEARCH_SERVICE\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ONESTEP_SEARCH_SERVICE\0000#DeviceDesc
HKLM\SYSTEM\CurrentControlSet\Services\OneStep Search Service
HKLM\SYSTEM\CurrentControlSet\Services\OneStep Search Service#Type
HKLM\SYSTEM\CurrentControlSet\Services\OneStep Search Service#Start
HKLM\SYSTEM\CurrentControlSet\Services\OneStep Search Service#ErrorControl
HKLM\SYSTEM\CurrentControlSet\Services\OneStep Search Service#ImagePath
HKLM\SYSTEM\CurrentControlSet\Services\OneStep Search Service#DisplayName
HKLM\SYSTEM\CurrentControlSet\Services\OneStep Search Service#ObjectName
HKLM\SYSTEM\CurrentControlSet\Services\OneStep Search Service#Description
HKLM\SYSTEM\CurrentControlSet\Services\OneStep Search Service\Security
HKLM\SYSTEM\CurrentControlSet\Services\OneStep Search Service\Security#Security
HKLM\SYSTEM\CurrentControlSet\Services\OneStep Search Service\Enum
HKLM\SYSTEM\CurrentControlSet\Services\OneStep Search Service\Enum#0
HKLM\SYSTEM\CurrentControlSet\Services\OneStep Search Service\Enum#Count
HKLM\SYSTEM\CurrentControlSet\Services\OneStep Search Service\Enum#NextInstance
C:\Program Files\OneStepSearch\onestep.dll
C:\Program Files\OneStepSearch
  • 0

#3
Timc07747

Timc07747

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
as per instructions, hack this log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 8:35:42 AM, on 2/6/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16574)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\Program Files\Common Files\AOL\1154795777\ee\AOLSoftware.exe
C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe
C:\Program Files\TomTom HOME 2\HOMERunner.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\AIM6\aolsoftware.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\PROGRA~1\Grisoft\AVG7\avgw.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.yahoo.com/search/ie.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.yahoo.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = www.nj.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapp...rch/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft....k/?LinkId=69157
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Player - {AAED19A0-D72D-4AD1-8F94-B53D36C835A7} - C:\WINDOWS\orgnavi.dll
O4 - HKLM\..\Run: [HostManager] C:\Program Files\Common Files\AOL\1154795777\ee\AOLSoftware.exe
O4 - HKLM\..\Run: [IPHSend] C:\Program Files\Common Files\AOL\IPHSend\IPHSend.exe
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [TomTomHOME.exe] "C:\Program Files\TomTom HOME 2\HOMERunner.exe" -s
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Aim6] "C:\Program Files\AIM6\aim6.exe" /d locale=en-US ee://aol/imApp
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - C:\WINDOWS\System32\shdocvw.dll
O9 - Extra 'Tools' menuitem: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - C:\WINDOWS\System32\shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\WINDOWS\System32\shdocvw.dll
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\WINDOWS\System32\shdocvw.dll
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=39204
O16 - DPF: {238F6F83-B8B4-11CF-8771-00A024541EE3} (Citrix ICA Client) - http://www.marsd.k12...lient/wfica.cab
O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
O16 - DPF: {31E68DE2-5548-4B23-88F0-C51E6A0F695E} (Microsoft PID Sniffer) - https://support.micr...ActiveX/odc.cab
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.mi...b?1202298179250
O16 - DPF: {6F750202-1362-4815-A476-88533DE61D0C} (Kodak Gallery Easy Upload Manager Class) - http://www.kodakgall..._2/axofupld.cab
O16 - DPF: {9600F64D-755F-11D4-A47F-0001023E6D5A} (Shutterfly Picture Upload Plugin) - http://web1.shutterf...ds/Uploader.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoft...free/asinst.cab
O16 - DPF: {B1E2B96C-12FE-45E2-BEF1-44A219113CDD} (SABScanProcesses Class) - http://www.superadbl...ivex/sabspx.cab
O16 - DPF: {EF791A6B-FC12-4C68-99EF-FB9E207A39E6} (McFreeScan Class) - http://download.mcaf...635/mcfscan.cab
O16 - DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} (Performance Viewer Activex Control) - https://secure.logme...trl.cab?lmi=100
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe

--
End of file - 8577 bytes
  • 0

#4
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
Hello

Before we begin, you should save these instructions in Notepad to your desktop, or print them, for easy reference. Much of our fix will be done in Safe mode, and you will be unable to access this thread at that time. If you have questions at any point, or are unsure of the instructions, feel free to post here and ask for clarification before proceeding.


Please download SmitfraudFix (by S!Ri) to your Desktop.

Next, please reboot your computer in Safe Mode by doing the following :
  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
  • Instead of Windows loading as normal, a menu with options should appear;
  • Select the first option, to run Windows in Safe Mode, then press "Enter".
  • Choose your usual account.
Once in Safe Mode, double-click on SmitfraudFix.exe
Select option #2 - Clean by typing 2 and press "Enter" to delete infected files.

You will be prompted : "Registry cleaning - Do you want to clean the registry ?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.

The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".

The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart it into Normal Windows.
A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply.
The report can also be found at the root of the system drive, usually at C:\rapport.txt

Warning : running option #2 on a non infected computer will remove your Desktop background.




Please download Deckard's System Scanner (DSS) and save it to your Desktop.
  • Close all other windows before proceeding.
  • Double-click on dss.exe and follow the prompts.
  • If your anti-virus or firewall complains, please allow this script to run as it is not malicious.
  • When it has finished, dss will open two Notepads main.txt and extra.txt -- please copy (CTRL+A and then CTRL+C) and paste (CTRL+V) the contents of main.txt and extra.txt in your next reply.

Edited by Rorschach112, 12 February 2008 - 07:22 AM.

  • 0

#5
Timc07747

Timc07747

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
here's the result of the first diagnostic tool.

Thanks for your help.


SmitFraudFix v2.288

Scan done at 20:56:24.95, Tue 02/12/2008
Run from C:\Documents and Settings\Tim\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in safe mode

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» Killing process


»»»»»»»»»»»»»»»»»»»»»»»» hosts

127.0.0.1 localhost

»»»»»»»»»»»»»»»»»»»»»»»» VACFix

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix

S!Ri's WS2Fix: LSP not Found.


»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

GenericRenosFix by S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files


»»»»»»»»»»»»»»»»»»»»»»»» IEDFix

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» DNS

HKLM\SYSTEM\CCS\Services\Tcpip\..\{1CB58D8D-05D2-4A29-BF8B-62C6EB76A55F}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{1CB58D8D-05D2-4A29-BF8B-62C6EB76A55F}: DhcpNameServer=167.206.3.245 167.206.3.246 167.206.3.179
HKLM\SYSTEM\CS2\Services\Tcpip\..\{1CB58D8D-05D2-4A29-BF8B-62C6EB76A55F}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS3\Services\Tcpip\..\{1CB58D8D-05D2-4A29-BF8B-62C6EB76A55F}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=167.206.3.245 167.206.3.246 167.206.3.179
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1


»»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]


»»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

Registry Cleaning done.

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


»»»»»»»»»»»»»»»»»»»»»»»» End
  • 0

#6
Timc07747

Timc07747

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
Here's the Deckards results;

Thanks again....



Deckard's System Scanner v20071014.68
Run by Tim on 2008-02-12 21:12:27
Computer is in Normal Mode.
--------------------------------------------------------------------------------

-- System Restore --------------------------------------------------------------

System Restore is disabled; attempting to re-enable...success.


-- Last 1 Restore Point(s) --
1: 2008-02-13 02:12:39 UTC - RP1 - System Checkpoint


Backed up registry hives.
Performed disk cleanup.

Total Physical Memory: 256 MiB (512 MiB recommended).


-- HijackThis (run as Tim.exe) -------------------------------------------------

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 9:16:17 PM, on 2/12/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16574)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\AOL\1154795777\ee\AOLSoftware.exe
C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe
C:\Program Files\TomTom HOME 2\HOMERunner.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\NI0UNM9K\dss[1].exe
C:\WINDOWS\system32\dumprep.exe
C:\WINDOWS\system32\dumprep.exe
C:\WINDOWS\system32\dwwin.exe
C:\WINDOWS\system32\dwwin.exe
C:\PROGRA~1\TRENDM~1\HIJACK~1\Tim.exe

R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O4 - HKLM\..\Run: [HostManager] C:\Program Files\Common Files\AOL\1154795777\ee\AOLSoftware.exe
O4 - HKLM\..\Run: [IPHSend] C:\Program Files\Common Files\AOL\IPHSend\IPHSend.exe
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [TomTomHOME.exe] "C:\Program Files\TomTom HOME 2\HOMERunner.exe" -s
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Aim6] "C:\Program Files\AIM6\aim6.exe" /d locale=en-US ee://aol/imApp
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - C:\WINDOWS\System32\shdocvw.dll
O9 - Extra 'Tools' menuitem: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - C:\WINDOWS\System32\shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\WINDOWS\System32\shdocvw.dll
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\WINDOWS\System32\shdocvw.dll
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=39204
O16 - DPF: {238F6F83-B8B4-11CF-8771-00A024541EE3} (Citrix ICA Client) - http://www.marsd.k12...lient/wfica.cab
O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
O16 - DPF: {31E68DE2-5548-4B23-88F0-C51E6A0F695E} (Microsoft PID Sniffer) - https://support.micr...ActiveX/odc.cab
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.mi...b?1202298179250
O16 - DPF: {6F750202-1362-4815-A476-88533DE61D0C} (Kodak Gallery Easy Upload Manager Class) - http://www.kodakgall..._2/axofupld.cab
O16 - DPF: {9600F64D-755F-11D4-A47F-0001023E6D5A} (Shutterfly Picture Upload Plugin) - http://web1.shutterf...ds/Uploader.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoft...free/asinst.cab
O16 - DPF: {B1E2B96C-12FE-45E2-BEF1-44A219113CDD} (SABScanProcesses Class) - http://www.superadbl...ivex/sabspx.cab
O16 - DPF: {EF791A6B-FC12-4C68-99EF-FB9E207A39E6} (McFreeScan Class) - http://download.mcaf...635/mcfscan.cab
O16 - DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} (Performance Viewer Activex Control) - https://secure.logme...trl.cab?lmi=100
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe

--
End of file - 7621 bytes

-- File Associations -----------------------------------------------------------

All associations okay.


-- Drivers: 0-Boot, 1-System, 2-Auto, 3-Demand, 4-Disabled ---------------------

R1 SASDIFSV - c:\program files\superantispyware\sasdifsv.sys
R1 SASKUTIL - c:\program files\superantispyware\saskutil.sys
R2 MASPINT - c:\windows\system32\drivers\maspint.sys <Not Verified; MicroStaff Co.,Ltd.; Aspi32 Driver for WinNT>
R2 MCSTRM - c:\windows\system32\drivers\mcstrm.sys <Not Verified; RealNetworks, Inc.; RealNetworks Virtual Path Manager® (32-bit)>
R3 SASENUM - c:\program files\superantispyware\sasenum.sys <Not Verified; SuperAdBlocker, Inc.; SuperAntiSpyware>

S3 SABProcEnum - c:\program files\internet explorer\sabprocenum.sys (file missing)
S3 SDTHOOK - c:\windows\system32\drivers\sdthook.sys <Not Verified; Panda Software; Panda® Antivirus>


-- Services: 0-Boot, 1-System, 2-Auto, 3-Demand, 4-Disabled --------------------

R2 Apple Mobile Device - "c:\program files\common files\apple\mobile device support\bin\applemobiledeviceservice.exe" <Not Verified; Apple, Inc.; Apple Mobile Device Service>
R2 Viewpoint Manager Service - "c:\program files\viewpoint\common\viewpointservice.exe" <Not Verified; Viewpoint Corporation; Viewpoint Manager>


-- Device Manager: Disabled ----------------------------------------------------

No disabled devices found.


-- Scheduled Tasks -------------------------------------------------------------

2008-02-12 21:04:44 330 --ah----- C:\WINDOWS\Tasks\MP Scheduled Scan.job
2008-02-12 21:03:07 408 --a------ C:\WINDOWS\Tasks\Symantec NetDetect.job
2008-02-12 20:03:22 418 --ah----- C:\WINDOWS\Tasks\User_Feed_Synchronization-{5DC36F48-2D9B-48AD-8433-C4F1F716DFCB}.job
2008-02-12 15:55:05 424 --ah----- C:\WINDOWS\Tasks\User_Feed_Synchronization-{FD7A0CC4-84AA-487B-8A0F-307465E64A32}.job
2008-02-12 11:55:33 284 --a------ C:\WINDOWS\Tasks\AppleSoftwareUpdate.job
2008-02-12 03:00:00 492 --a------ C:\WINDOWS\Tasks\AdwareAlert Scheduled Scan.job
2008-02-10 01:00:00 302 --a------ C:\WINDOWS\Tasks\Spybot - Search & Destroy - Scheduled Task.job
2008-02-08 09:00:09 386 --a------ C:\WINDOWS\Tasks\rpc.job


-- Files created between 2008-01-12 and 2008-02-12 -----------------------------

2008-02-12 20:30:18 2796 --a------ C:\WINDOWS\system32\tmp.reg
2008-02-10 06:43:02 0 d-------- C:\Documents and Settings\Guest\Application Data\Adobe
2008-02-09 23:16:49 0 d-------- C:\Documents and Settings\Guest\Application Data\SUPERAntiSpyware.com
2008-02-09 23:16:14 0 d-------- C:\Documents and Settings\Guest\Application Data\AVG7
2008-02-09 16:41:31 0 d-------- C:\Documents and Settings\fish boy\Application Data\Adobe
2008-02-09 09:32:35 0 dr-h----- C:\$VAULT$.AVG
2008-02-06 07:25:52 0 d-------- C:\Program Files\Microsoft CAPICOM 2.1.0.2
2008-02-06 06:48:26 0 d-------- C:\Program Files\Trend Micro
2008-02-05 21:11:53 44928 --a------ C:\WINDOWS\system32\drivers\SDTHOOK.SYS <Not Verified; Panda Software; Panda® Antivirus>
2008-02-05 21:10:10 8576 --a------ C:\WINDOWS\system32\drivers\rorjqgbfvqbf.sys <Not Verified; Panda Software International; RKPavProc Driver>
2008-02-05 20:46:26 0 d-------- C:\WINDOWS\system32\ActiveScan
2008-02-05 16:50:16 0 d-------- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
2008-02-05 16:49:16 0 d-------- C:\Program Files\SUPERAntiSpyware
2008-02-05 16:49:15 0 d-------- C:\Documents and Settings\Tim\Application Data\SUPERAntiSpyware.com
2008-02-05 16:48:27 0 d-------- C:\Program Files\Common Files\Wise Installation Wizard
2008-02-05 13:16:09 0 d-------- C:\Documents and Settings\Administrator\Application Data\AVG7
2008-02-05 13:15:40 0 d--h----- C:\Documents and Settings\Administrator\Templates
2008-02-05 13:15:40 0 dr------- C:\Documents and Settings\Administrator\Start Menu
2008-02-05 13:15:40 0 dr-h----- C:\Documents and Settings\Administrator\SendTo
2008-02-05 13:15:40 0 d--h----- C:\Documents and Settings\Administrator\Recent
2008-02-05 13:15:40 0 d--h----- C:\Documents and Settings\Administrator\PrintHood
2008-02-05 13:15:40 524288 --ah----- C:\Documents and Settings\Administrator\NTUSER.DAT
2008-02-05 13:15:40 0 d--h----- C:\Documents and Settings\Administrator\NetHood
2008-02-05 13:15:40 0 d-------- C:\Documents and Settings\Administrator\My Documents
2008-02-05 13:15:40 0 d--h----- C:\Documents and Settings\Administrator\Local Settings
2008-02-05 13:15:40 0 d-------- C:\Documents and Settings\Administrator\Favorites
2008-02-05 13:15:40 0 d-------- C:\Documents and Settings\Administrator\Desktop
2008-02-05 13:15:40 0 d--hs---- C:\Documents and Settings\Administrator\Cookies
2008-02-05 13:15:40 0 dr-h----- C:\Documents and Settings\Administrator\Application Data
2008-02-05 13:15:40 0 d---s---- C:\Documents and Settings\Administrator\Application Data\Microsoft
2008-02-05 11:56:16 0 d-------- C:\Program Files\Windows Defender
2008-02-05 11:40:05 0 d-------- C:\Program Files\Microsoft Silverlight
2008-02-01 22:12:47 0 d-------- C:\Documents and Settings\fish boy\Application Data\AVG7
2008-02-01 20:30:26 0 d-------- C:\Documents and Settings\Tim\Application Data\AVG7
2008-02-01 20:30:14 0 d-------- C:\Documents and Settings\LocalService\Application Data\AVG7
2008-02-01 20:29:42 0 d-------- C:\Documents and Settings\All Users\Application Data\Grisoft
2008-01-30 19:22:44 0 d-------- C:\Program Files\AdwareAlert
2008-01-30 19:17:19 0 d-------- C:\Documents and Settings\All Users\Application Data\Avg7
2008-01-28 19:34:13 47 --a------ C:\tmp.bat


-- Find3M Report ---------------------------------------------------------------

2008-02-09 17:01:03 0 d-------- C:\Documents and Settings\Tim\Application Data\Adobe
2008-02-06 01:31:04 0 d-------- C:\Program Files\TomTom HOME 2
2008-02-06 01:20:33 0 d-------- C:\Program Files\iTunes
2008-02-05 16:48:27 0 d-------- C:\Program Files\Common Files
2008-02-05 09:23:58 0 d-------- C:\Program Files\PassAlong
2008-02-04 20:38:10 0 d-------- C:\Program Files\AIMTunes
2008-02-02 19:44:21 0 d-------- C:\Program Files\Snood
2008-01-26 21:06:28 0 d-------- C:\Program Files\iPod
2008-01-26 21:04:14 0 d-------- C:\Program Files\QuickTime
2008-01-16 17:07:22 0 d-------- C:\Documents and Settings\Tim\Application Data\Viewpoint
2007-12-25 09:52:41 0 d-------- C:\Program Files\Apple Software Update
2007-12-21 19:16:06 0 d-------- C:\Program Files\ESPN
2007-12-13 20:06:18 0 d-------- C:\Program Files\Common Files\AOL
2007-12-12 07:59:05 0 d-------- C:\Program Files\STOPzilla!


-- Registry Dump ---------------------------------------------------------------

*Note* empty entries & legit default entries are not shown


[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"HostManager"="C:\Program Files\Common Files\AOL\1154795777\ee\AOLSoftware.exe" [05/09/2006 07:24 PM]
"IPHSend"="C:\Program Files\Common Files\AOL\IPHSend\IPHSend.exe" [02/17/2006 11:59 AM]
"Adobe Photo Downloader"="C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe" [03/09/2007 10:09 AM]
"Adobe Reader Speed Launcher"="C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [10/10/2007 06:51 PM]
"TomTomHOME.exe"="C:\Program Files\TomTom HOME 2\HOMERunner.exe" [10/31/2007 09:19 AM]
"NvCplDaemon"="C:\WINDOWS\system32\NvCpl.dll" [10/06/2003 02:16 PM]
"QuickTime Task"="C:\Program Files\QuickTime\QTTask.exe" [01/10/2008 03:27 PM]
"iTunesHelper"="C:\Program Files\iTunes\iTunesHelper.exe" [01/15/2008 03:22 AM]
"RegistryMechanic"="" []
"AVG7_CC"="C:\PROGRA~1\Grisoft\AVG7\avgcc.exe" [02/01/2008 08:31 PM]
"Windows Defender"="C:\Program Files\Windows Defender\MSASCui.exe" [11/03/2006 07:20 PM]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [08/04/2004 02:56 AM]
"Aim6"="C:\Program Files\AIM6\aim6.exe" [09/29/2007 03:22 PM]
"SpybotSD TeaTimer"="C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe" [01/28/2008 11:43 AM]
"SUPERAntiSpyware"="C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [02/27/2007 11:39 AM]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= C:\Program Files\SUPERAntiSpyware\SASSEH.DLL [12/20/2006 12:55 PM 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
C:\Program Files\SUPERAntiSpyware\SASWINLO.dll 02/27/2007 11:39 AM 282624 C:\Program Files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\ckpNotify]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\vds]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{533C5B84-EC70-11D2-9505-00C04F79DEAF}]
@="Volume shadow copy"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
backup=C:\WINDOWS\pss\Adobe Reader Speed Launch.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
backup=C:\WINDOWS\pss\HP Digital Imaging Monitor.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Photosmart Premier Fast Start.lnk]
backup=C:\WINDOWS\pss\HP Photosmart Premier Fast Start.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Office.lnk]
backup=C:\WINDOWS\pss\Microsoft Office.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AIM]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Aim6]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AVG7_CC]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BCMSMMSG]
BCMSMMSG.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
C:\WINDOWS\system32\ctfmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\diagent]
"C:\Program Files\Creative\SBLive\Diagnostics\diagent.exe" startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HostManager]
C:\Program Files\Common Files\AOL\1154795777\ee\AOLSoftware.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Software Update]
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IPHSend]
C:\Program Files\Common Files\AOL\IPHSend\IPHSend.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
"C:\Program Files\iTunes\iTunesHelper.exe"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvCplDaemon]
RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvMediaCenter]
RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\nwiz]
nwiz.exe /install

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PlaxoUpdate]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
"C:\Program Files\QuickTime\qttask.exe" -atboottime

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RegistryMechanic]


[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UpdReg]
C:\WINDOWS\UpdReg.EXE

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Windows Defender]
"C:\Program Files\Windows Defender\MSASCui.exe" -hide

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\WMC_AutoUpdate]



[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{09908f2f-8348-11dc-9e37-00c0a88bbf00}]
AutoRun\command- F:\InstallTomTomHOME.exe




-- End of Deckard's System Scanner: finished at 2008-02-12 21:17:15 ------------
  • 0

#7
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
Hello

1. Please re-open HiJackThis and choose do a system scan only. Check the boxes next to ONLY the entries listed below(if present):

R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)

2. Now close all windows other than HiJackThis, including browsers, so that nothing other than HijackThis is open, then click Fix Checked. A box will pop up asking you if you wish to fix the selected items. Please choose YES. Once it has fixed them, please exit/close HijackThis.



Delete this file in bold

C:\tmp.bat




Please download Malwarebytes' Anti-Malware from Here or Here

Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.
Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

Reboot and post a new DSS log and tell me how your PC is running
  • 0

#8
Timc07747

Timc07747

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
heres the result of the latest scan
will reboot and let you know
thanks a million for your awesome help!!!!!

Malwarebytes' Anti-Malware 1.03
Database version: 357

Scan type: Quick Scan
Objects scanned: 71267
Time elapsed: 23 minute(s), 20 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 12
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 2
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{5b4c3b43-49b6-42a7-a602-f7acdca0d409} (Adware.OneStepSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{5b4c3b43-49b6-42a7-a602-f7acdca0d409} (Adware.OneStepSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{48d78be5-cfb9-4b66-9ac4-96d4cf21de06} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{74d46bba-5638-473a-83b6-97e7804a7411} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\orgnavi.video (Trojan.Fakealert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{aaed19a0-d72d-4ad1-8f94-b53d36c835a7} (Trojan.Fakealert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\{aaed19a0-d72d-4ad1-8f94-b53d36c835a7} (Trojan.Fakealert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{9afb8248-617f-460d-9366-d71cdeda3179} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\orgnavi.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\orgnavi.Video (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\The Weather Channel (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\AdwareAlert (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Program Files\The Weather Channel FW (Adware.Hotbar) -> Quarantined and deleted successfully.

Files Infected:
C:\Documents and Settings\Mommy\Local Settings\Temp\G10B-tmp_.exe (Trojan.Fakealert) -> Quarantined and deleted successfully.
  • 0

#9
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
Post a new DSS log and tell me how your PC is running
  • 0

#10
Timc07747

Timc07747

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
Computer is generally slow at start up......
But, much better than before.

here's the latest DSS, if thats what you call it.

Thanks

Malwarebytes' Anti-Malware 1.03
Database version: 357

Scan type: Quick Scan
Objects scanned: 70998
Time elapsed: 27 minute(s), 0 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)
  • 0

Advertisements


#11
Timc07747

Timc07747

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
I,m also getting a message" low virtual memory available" ????
  • 0

#12
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
That is MBAM

DSS is what you ran in Post #4

Can you post a new log from it
  • 0

#13
Timc07747

Timc07747

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
Here it is, thanks

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 5:33:56 PM, on 2/15/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16608)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\AOL\1154795777\ee\AOLSoftware.exe
C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe
C:\Program Files\TomTom HOME 2\HOMERunner.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Microsoft Office\Office10\OUTLOOK.EXE
C:\Program Files\Microsoft Office\Office10\WINWORD.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Tim\Desktop\dss.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O4 - HKLM\..\Run: [HostManager] C:\Program Files\Common Files\AOL\1154795777\ee\AOLSoftware.exe
O4 - HKLM\..\Run: [IPHSend] C:\Program Files\Common Files\AOL\IPHSend\IPHSend.exe
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [TomTomHOME.exe] "C:\Program Files\TomTom HOME 2\HOMERunner.exe" -s
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Aim6] "C:\Program Files\AIM6\aim6.exe" /d locale=en-US ee://aol/imApp
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - C:\WINDOWS\System32\shdocvw.dll
O9 - Extra 'Tools' menuitem: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - C:\WINDOWS\System32\shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\WINDOWS\System32\shdocvw.dll
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\WINDOWS\System32\shdocvw.dll
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=39204
O16 - DPF: {238F6F83-B8B4-11CF-8771-00A024541EE3} (Citrix ICA Client) - http://www.marsd.k12...lient/wfica.cab
O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
O16 - DPF: {31E68DE2-5548-4B23-88F0-C51E6A0F695E} (Microsoft PID Sniffer) - https://support.micr...ActiveX/odc.cab
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.mi...b?1202298179250
O16 - DPF: {6F750202-1362-4815-A476-88533DE61D0C} (Kodak Gallery Easy Upload Manager Class) - http://www.kodakgall..._2/axofupld.cab
O16 - DPF: {9600F64D-755F-11D4-A47F-0001023E6D5A} (Shutterfly Picture Upload Plugin) - http://web1.shutterf...ds/Uploader.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoft...free/asinst.cab
O16 - DPF: {B1E2B96C-12FE-45E2-BEF1-44A219113CDD} (SABScanProcesses Class) - http://www.superadbl...ivex/sabspx.cab
O16 - DPF: {EF791A6B-FC12-4C68-99EF-FB9E207A39E6} (McFreeScan Class) - http://download.mcaf...635/mcfscan.cab
O16 - DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} (Performance Viewer Activex Control) - https://secure.logme...trl.cab?lmi=100
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe

--
End of file - 7639 bytes
  • 0

#14
Timc07747

Timc07747

    Member

  • Topic Starter
  • Member
  • PipPip
  • 11 posts
computer is still very slow at start up or log on/off.

Thanks
  • 0

#15
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
Your logs are clean ! We need to do a few things

You can delete the tools that we used


Now we need to create a new System Restore point.

Click Start Menu > Run > type (or copy and paste)

%SystemRoot%\System32\restore\rstrui.exe

Press OK. Choose Create a Restore Point then click Next. Name it and click Create, when the confirmation screen shows the restore point has been created click Close.

Next goto Start Menu > Run > type

cleanmgr

Click OK, Disk Cleanup will open and start calculating the amount of space that can be freed, Once thats finished it will open the Disk Cleanup options screen, click the More Options tab then click Clean up on the system restore area and choose Yes at the confirmation window which will remove all the restore points except the one we just created.

To close Disk Cleanup and remove the Temporary Internet Files detected in the initial scan click OK then choose Yes on the confirmation window.



You now need to update your Java and remove your older versions.

Please follow these steps to remove older version Java components.

* Click Start > Control Panel.
* Click Add/Remove Programs.
* Check any item with Java Runtime Environment (JRE) in the name.
* Click the Remove or Change/Remove button.

Download the latest version of Java Runtime Environment (JRE), and install it to your computer from
here



Below I have included a number of recommendations for how to protect your computer against malware infections.

* Keep Windows updated by regularly checking their website at :
http://windowsupdate.microsoft.com/
This will ensure your computer has always the latest security updates available installed on your computer.

* To reduce re-infection for malware in the future, I strongly recommend installing these free programs:
SpywareBlaster protects against bad ActiveX
IE-SPYAD puts over 5000 sites in your restricted zone so you'll be protected when you visit innocent-looking sites that aren't actually innocent at all
Have a look at this tutorial for IE-Spyad here

* SpywareGuard offers realtime protection from spyware installation attempts.

Make Internet Explorer more secure
  • Click Start > Run
  • Type Inetcpl.cpl & click OK
  • Click on the Security tab
  • Click Reset all zones to default level
  • Make sure the Internet Zone is selected & Click Custom level
  • In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to "Prompt", and ("Initialize and Script ActiveX controls not marked as safe") to "Disable".
  • Next Click OK, then Apply button and then OK to exit the Internet Properties page.

* MVPS Hosts file replaces your current HOSTS file with one containing well known ad sites and other bad sites. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer, meaning it will be difficult to infect yourself in the future.

* Please consider using an alternate browser. Mozilla's Firefox browser is fantastic; it is much more
secure than Internet Explorer, immune to almost all known browser hijackers, and also has the best built-in pop up
blocker (as an added benefit!) that I have ever seen. If you are interested, Firefox may be downloaded from
Here

* Take a good look at the following suggestions for malware prevention by reading Tony Klein’s article 'How Did I Get Infected In The First Place'
Here

Thank you for your patience, and performing all of the procedures requested.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP