Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

trojan downloader


  • Please log in to reply

#16
Tmare

Tmare

    Member

  • Topic Starter
  • Member
  • PipPip
  • 63 posts
here is report from Running SmitFraud in safe mode. It did not remove wallpaper on desktop and I still get the pop up.

SmitFraudFix v2.213b

Scan done at 10:40:42.17, Fri 04/11/2008
Run from C:\Documents and Settings\Owner\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in safe mode

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» Killing process


»»»»»»»»»»»»»»»»»»»»»»»» hosts

127.0.0.1 localhost

»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

GenericRenosFix by S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files


»»»»»»»»»»»»»»»»»»»»»»»» DNS

HKLM\SYSTEM\CCS\Services\Tcpip\..\{134315C7-2F93-48B1-AC75-54E14F0095CD}: DhcpNameServer=12.127.17.77 12.127.16.77
HKLM\SYSTEM\CCS\Services\Tcpip\..\{AA6DEABF-E3EB-42B5-9D86-9255BF8B98D9}: DhcpNameServer=0.0.0.0
HKLM\SYSTEM\CS1\Services\Tcpip\..\{134315C7-2F93-48B1-AC75-54E14F0095CD}: DhcpNameServer=12.127.17.77 12.127.16.77
HKLM\SYSTEM\CS1\Services\Tcpip\..\{AA6DEABF-E3EB-42B5-9D86-9255BF8B98D9}: DhcpNameServer=0.0.0.0
HKLM\SYSTEM\CS3\Services\Tcpip\..\{134315C7-2F93-48B1-AC75-54E14F0095CD}: DhcpNameServer=12.127.17.77 12.127.16.77
HKLM\SYSTEM\CS3\Services\Tcpip\..\{AA6DEABF-E3EB-42B5-9D86-9255BF8B98D9}: DhcpNameServer=0.0.0.0
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=12.127.17.77 12.127.16.77
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=12.127.17.77 12.127.16.77
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=12.127.17.77 12.127.16.77


»»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""


»»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

Registry Cleaning done.

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


»»»»»»»»»»»»»»»»»»»»»»»» End
  • 0

Advertisements


#17
Tmare

Tmare

    Member

  • Topic Starter
  • Member
  • PipPip
  • 63 posts
results of boot...

I still have the desktop wallpaper, popups and task manager locked down...nothing's changed:

any further suggestions??

SmitFraudFix v2.213b

Scan done at 10:40:42.17, Fri 04/11/2008
Run from C:\Documents and Settings\Owner\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in safe mode

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» Killing process


»»»»»»»»»»»»»»»»»»»»»»»» hosts

127.0.0.1 localhost

»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

GenericRenosFix by S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files


»»»»»»»»»»»»»»»»»»»»»»»» DNS

HKLM\SYSTEM\CCS\Services\Tcpip\..\{134315C7-2F93-48B1-AC75-54E14F0095CD}: DhcpNameServer=12.127.17.77 12.127.16.77
HKLM\SYSTEM\CCS\Services\Tcpip\..\{AA6DEABF-E3EB-42B5-9D86-9255BF8B98D9}: DhcpNameServer=0.0.0.0
HKLM\SYSTEM\CS1\Services\Tcpip\..\{134315C7-2F93-48B1-AC75-54E14F0095CD}: DhcpNameServer=12.127.17.77 12.127.16.77
HKLM\SYSTEM\CS1\Services\Tcpip\..\{AA6DEABF-E3EB-42B5-9D86-9255BF8B98D9}: DhcpNameServer=0.0.0.0
HKLM\SYSTEM\CS3\Services\Tcpip\..\{134315C7-2F93-48B1-AC75-54E14F0095CD}: DhcpNameServer=12.127.17.77 12.127.16.77
HKLM\SYSTEM\CS3\Services\Tcpip\..\{AA6DEABF-E3EB-42B5-9D86-9255BF8B98D9}: DhcpNameServer=0.0.0.0
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=12.127.17.77 12.127.16.77
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=12.127.17.77 12.127.16.77
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=12.127.17.77 12.127.16.77


»»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""


»»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

Registry Cleaning done.

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


»»»»»»»»»»»»»»»»»»»»»»»» End
  • 0

#18
koko_crunch

koko_crunch

    Trusted Helper

  • Retired Staff
  • 1,751 posts
Next,

Please download ComboFix from Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
  • Please, never rename Combofix unless instructed.
  • Close any open browsers.
  • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

    -----------------------------------------------------------

    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

      -----------------------------------------------------------

    • Close any open browsers.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
    • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

    -----------------------------------------------------------

  • Double click on combofix.exe & follow the prompts.
  • When finished, it will produce a report for you.
  • Please post the "C:\ComboFix.txt" along with a new HijackThis log for further review.
**Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**
  • 0

#19
Tmare

Tmare

    Member

  • Topic Starter
  • Member
  • PipPip
  • 63 posts
I ran combofix and here is the log file...My laptop seems to be running ok now.
ComboFix 08-04-11.8 - Owner 2008-04-12 10:29:32.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.127 [GMT -4:00]
Running from: C:\Documents and Settings\Owner\Desktop\ComboFix.exe
* Created a new restore point

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\Documents and Settings\Owner\Start Menu\Programs\Outerinfo
C:\Documents and Settings\Owner\Start Menu\Programs\Outerinfo\Terms.lnk
C:\Documents and Settings\Owner\Start Menu\Programs\Outerinfo\Uninstall.lnk
C:\Program Files\180search assistant
C:\Program Files\180search assistant\180sa.exe
C:\Program Files\180search assistant\sau.exe
C:\Program Files\180searchassistant
C:\Program Files\180searchassistant\saap.exe
C:\Program Files\180searchassistant\sac.exe
C:\Program Files\180solutions
C:\Program Files\180solutions\sais.exe
C:\Program Files\Common Files\dobe~1
C:\Program Files\Common Files\dobe~1\d?xplore.exe
C:\Program Files\outerinfo
C:\Program Files\outerinfo\FF\chrome.manifest
C:\Program Files\outerinfo\FF\components\FF.dll
C:\Program Files\outerinfo\FF\components\OuterinfoAds.xpt
C:\Program Files\outerinfo\FF\install.rdf
C:\Program Files\outerinfo\OiUninstaller.exe
C:\Program Files\outerinfo\outerinfo.ico
C:\Program Files\outerinfo\Terms.rtf
C:\Program Files\seekmo
C:\Program Files\seekmo\seekmohook.dll
C:\Program Files\stc
C:\Program Files\stc\csv5p070.exe
C:\Program Files\Sysmnt
C:\Program Files\Sysmnt\Ssmgr.exe
C:\Program Files\zango
C:\Program Files\zango\zango.exe
C:\WINDOWS\123messenger.per
C:\WINDOWS\180ax.exe
C:\WINDOWS\2020search.dll
C:\WINDOWS\2020search2.dll
C:\WINDOWS\apphelp32.dll
C:\WINDOWS\asferror32.dll
C:\WINDOWS\asycfilt32.dll
C:\WINDOWS\athprxy32.dll
C:\WINDOWS\ati2dvaa32.dll
C:\WINDOWS\ati2dvag32.dll
C:\WINDOWS\audiosrv32.dll
C:\WINDOWS\autodisc32.dll
C:\WINDOWS\avifile32.dll
C:\WINDOWS\avisynthex32.dll
C:\WINDOWS\aviwrap32.dll
C:\WINDOWS\bjam.dll
C:\WINDOWS\BM8fbbc9a9.xml
C:\WINDOWS\bokja.exe
C:\WINDOWS\browserad.dll
C:\WINDOWS\cdsm32.dll
C:\WINDOWS\changeurl_30.dll
C:\WINDOWS\default.htm
C:\WINDOWS\didduid.ini
C:\WINDOWS\FLEOK
C:\WINDOWS\FLEOK\180ax.exe
C:\WINDOWS\Installer\id53.exe
C:\WINDOWS\licencia.txt
C:\WINDOWS\msa64chk.dll
C:\WINDOWS\msapasrc.dll
C:\WINDOWS\mspphe.dll
C:\WINDOWS\mssvr.exe
C:\WINDOWS\ntnut.exe
C:\WINDOWS\pskt.ini
C:\WINDOWS\saiemod.dll
C:\WINDOWS\salm.exe
C:\WINDOWS\shdocpe.dll
C:\WINDOWS\shdocpl.dll
C:\WINDOWS\stcloader.exe
C:\WINDOWS\swin32.dll
C:\WINDOWS\system32\aymwgtqj.dll
C:\WINDOWS\system32\ghla.dll
C:\WINDOWS\system32\hywbjdjm.ini
C:\WINDOWS\system32\mjdjbwyh.dll
C:\WINDOWS\system32\mlJAQIbY.dll
C:\WINDOWS\system32\msixu.dll
C:\WINDOWS\system32\MSNSA32.dll
C:\WINDOWS\system32\ntnut32.exe
C:\WINDOWS\system32\nynqhqjx.dll
C:\WINDOWS\system32\qvdgcjfl.dll
C:\WINDOWS\system32\shdocpe.dll
C:\WINDOWS\system32\SIPSPI32.dll
C:\WINDOWS\system32\spcxalbu.dll
C:\WINDOWS\system32\vyunvcqb.ini
C:\WINDOWS\system32\wer8274.dll
C:\WINDOWS\system32\wmsdkns.exe
C:\WINDOWS\system32\YbIQAJlm.ini
C:\WINDOWS\system32\YbIQAJlm.ini2
C:\WINDOWS\system32\ystem~1
C:\WINDOWS\system32\ystem~1\javaw.exe
C:\WINDOWS\system32\ystem~1\T?sks\
C:\WINDOWS\system32\yvxbeeqi.dll
C:\WINDOWS\telefonos.txt
C:\WINDOWS\TEMP\salm.exe
C:\WINDOWS\textos.txt
C:\WINDOWS\updatetc.exe
C:\WINDOWS\voiceip.dll
C:\WINDOWS\winsb.dll

.
((((((((((((((((((((((((( Files Created from 2008-03-12 to 2008-04-12 )))))))))))))))))))))))))))))))
.

2008-04-11 11:26 . 2008-04-11 11:26 3,648 --a------ C:\WINDOWS\system32\dkeleimd.dll
2008-04-09 19:41 . 2008-04-09 19:41 3,648 --a------ C:\WINDOWS\system32\ftfkcchr.dll
2008-04-09 14:41 . 2008-04-09 14:41 <DIR> d-------- C:\WINDOWS\ERUNT
2008-04-08 18:52 . 2008-04-09 15:00 <DIR> d-------- C:\SDFix
2008-04-08 14:48 . 2008-04-09 08:36 <DIR> d-------- C:\VundoFix Backups
2008-04-08 11:44 . 2008-04-08 11:44 <DIR> d-------- C:\Program Files\Trend Micro
2008-04-07 20:37 . 2008-04-07 20:37 <DIR> d-------- C:\Program Files\AdwareAlert
2008-04-07 20:37 . 2008-04-07 20:38 <DIR> d-------- C:\Documents and Settings\Owner\Application Data\AdwareAlert
2008-04-07 20:29 . 2008-04-07 20:29 <DIR> d-------- C:\BFU
2008-04-07 19:11 . 2008-04-07 19:11 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\mfklwjgj
2008-04-07 19:11 . 2008-04-07 19:11 94,208 --a------ C:\WINDOWS\system32\ynuhmxej.exe
2008-04-07 19:06 . 2008-04-07 19:06 <DIR> d-------- C:\WINDOWS\KB59834
2008-04-07 19:06 . 2008-04-09 14:50 <DIR> d-------- C:\WINDOWS\jcglsoqd
2008-04-07 19:06 . 2008-04-07 19:06 60,928 --a------ C:\WINDOWS\tsjitcbe.dll
2008-04-07 19:06 . 2008-04-07 19:06 60,928 --a------ C:\Documents and Settings\All Users\Application Data\bqnknyfg.dll
2008-04-07 15:59 . 2008-04-07 15:59 <DIR> d-------- C:\Program Files\Enigma Software Group
2008-04-06 13:57 . 2008-04-06 13:57 396 --a------ C:\WINDOWS\system32\LAF55.tmp
2008-04-06 13:57 . 2008-04-06 13:57 396 --a------ C:\WINDOWS\system32\LADAF.tmp
2008-04-06 13:57 . 2008-04-06 13:57 396 --a------ C:\WINDOWS\system32\LAC86.tmp
2008-04-06 13:57 . 2008-04-06 13:57 396 --a------ C:\WINDOWS\system32\LAB5D.tmp
2008-04-06 13:56 . 2008-04-06 13:56 14,848 --a------ C:\noxr.exe
2008-03-20 08:19 . 2008-03-20 08:19 <DIR> d-------- C:\License tab renewals

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-04-12 14:35 265,928 --sha-w C:\WINDOWS\system32\drivers\fidbox.idx
2008-04-12 14:35 23,380,000 --sha-w C:\WINDOWS\system32\drivers\fidbox.dat
2008-04-12 14:07 --------- d-----w C:\Program Files\Positive Networks
2008-04-10 11:15 --------- d-----w C:\Documents and Settings\Owner\Application Data\WeatherBug
2008-04-08 16:10 --------- d-----w C:\Program Files\Max Registry Cleaner
2008-04-07 22:58 --------- d-----w C:\Program Files\AskSBar
2008-03-03 17:37 39,144 ----a-w C:\QDATAOFXLOG.DAT
2008-03-03 17:37 270,032 ----a-w C:\QDATAOFXOLD.DAT
2008-02-16 19:41 --------- d-----w C:\Documents and Settings\Owner\Application Data\Intuit
2008-02-16 19:31 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-02-16 19:31 --------- d-----w C:\Program Files\Common Files\AnswerWorks 4.0
2008-02-16 19:30 --------- d-----w C:\Program Files\Quicken
2008-02-16 19:19 --------- d-----w C:\Program Files\TurboTax
2008-02-16 17:51 --------- d-----w C:\Program Files\Common Files\Adobe
2008-02-05 13:15 2,980,840 ----a-w C:\Documents and Settings\My Download Files\MaxRegistryCleaner.exe
2008-02-03 18:16 164 ----a-w C:\install.dat
2008-01-04 00:00 1,266 ----a-w C:\Documents and Settings\Owner\Application Data\wklnhst.dat
2007-08-20 16:29 890,054 ----a-w C:\Documents and Settings\My Download Files\SmitfraudFix.exe
2006-07-02 01:30 281,136 ----a-w C:\Documents and Settings\My Download Files\2006_06_25.zip
2006-06-13 23:39 506,211 ----a-w C:\Documents and Settings\My Download Files\2006_06_02.zip
2006-01-20 20:38 1,766 ----a-w C:\Program Files\TurboTax 2005.lnk
2005-02-19 15:38 299,360 ----a-w C:\Documents and Settings\My Download Files\GmailInstaller.exe
2005-01-28 22:20 1,766 ----a-w C:\Program Files\TurboTax Deluxe 2004.lnk
2004-10-12 23:45 5,827,728 ----a-w C:\Documents and Settings\My Download Files\zlsSetup_51_033_000.exe
2004-08-01 15:06 5,815,952 ----a-w C:\Documents and Settings\My Download Files\zlsSetup_51_011.exe
2004-06-19 16:51 4,354,084 ----a-w C:\Documents and Settings\My Download Files\spybotsd13.exe
2004-01-18 16:58 1,770 ----a-w C:\Program Files\TurboTax Deluxe 2003.lnk
2003-05-16 21:58 233,474 ----a-w C:\Documents and Settings\My Download Files\HbUninst.exe
2003-05-14 00:32 1,203,139 ----a-w C:\Documents and Settings\My Download Files\Amortization v1.01.exe
2003-01-09 22:47 876 ----a-w C:\Program Files\TurboTax Deluxe 2002.lnk
2004-08-04 12:00 94,784 --sh--w C:\WINDOWS\twain.dll
2004-08-04 12:00 50,688 --sh--w C:\WINDOWS\twain_32.dll
2004-08-04 12:00 1,028,096 --sh--w C:\WINDOWS\system32\mfc42.dll
2004-08-04 12:00 54,784 --sh--w C:\WINDOWS\system32\msvcirt.dll
2004-08-04 12:00 413,696 --sh--w C:\WINDOWS\system32\msvcp60.dll
2004-08-04 12:00 343,040 --sh--w C:\WINDOWS\system32\msvcrt.dll
2007-12-04 18:38 550,912 --sh--w C:\WINDOWS\system32\oleaut32.dll
2004-08-04 12:00 83,456 --sh--w C:\WINDOWS\system32\olepro32.dll
2004-08-04 12:00 11,776 --sh--w C:\WINDOWS\system32\regsvr32.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{56c8620e-1dd2-11b2-a977-93b891a81286}]
2008-04-07 19:06 60928 --a------ C:\WINDOWS\tsjitcbe.dll

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-04 08:00 15360]
"TOSCDSPD"="C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe" [2004-12-30 04:32 65536]
"Weather"="C:\Program Files\AWS\WeatherBug\Weather.exe" [2005-06-07 14:58 1339392]
"MSMSGS"="C:\Program Files\Messenger\msmsgs.exe" [2004-10-13 12:24 1694208]
"QuickenScheduledUpdates"="C:\Program Files\Quicken\bagent.exe" [2006-10-30 07:39 57344]
"Eprc"="C:\WINDOWS\system32\YSTEM~1\javaw.exe" [ ]
"GoogleN"="C:\WINDOWS\KB59834\hkbcdyta.exe" [2008-04-07 19:06 75264]
"aovkcgjy"="C:\WINDOWS\system32\ynuhmxej.exe" [2008-04-07 19:11 94208]
"AdwareAlert"="C:\Program Files\AdwareAlert\AdwareAlert.exe" [2008-04-02 15:25 7173360]
"Izfpzy"="C:\Program Files\Common Files\?dobe\d?xplore.exe" [ ]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"igfxtray"="C:\WINDOWS\system32\igfxtray.exe" [2005-11-28 01:55 98304]
"igfxhkcmd"="C:\WINDOWS\system32\hkcmd.exe" [2005-11-28 01:52 77824]
"igfxpers"="C:\WINDOWS\system32\igfxpers.exe" [2005-11-28 01:55 118784]
"SynTPEnh"="C:\Program Files\Synaptics\SynTP\SynTPEnh.exe" [2005-12-16 20:32 761945]
"THotkey"="C:\Program Files\Toshiba\Toshiba Applet\thotkey.exe" [2006-01-05 18:02 352256]
"LtMoh"="C:\Program Files\ltmoh\Ltmoh.exe" [2004-08-18 07:37 184320]
"AGRSMMSG"="AGRSMMSG.exe" [2005-10-15 10:29 88203 C:\WINDOWS\agrsmmsg.exe]
"NDSTray.exe"="NDSTray.exe" []
"Tvs"="C:\Program Files\Toshiba\Tvs\TvsTray.exe" [2005-11-30 16:25 73728]
"TFncKy"="TFncKy.exe" []
"TPSMain"="TPSMain.exe" [2005-06-01 01:00 282624 C:\WINDOWS\system32\TPSMain.exe]
"SmoothView"="C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe" [2005-04-26 20:13 122880]
"Pinger"="c:\toshiba\ivp\ism\pinger.exe" [2005-03-17 21:37 151552]
"DLA"="C:\WINDOWS\System32\DLA\DLACTRLW.EXE" [2005-10-06 08:20 122940]
"IntelZeroConfig"="C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe" [2005-12-05 15:37 667718]
"IntelWireless"="C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe" [2005-11-28 14:41 602182]
"vptray"="C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe" [2003-05-21 01:21 90112]
"Share-to-Web Namespace Daemon"="C:\Program Files\Hewlett-Packard\HP Share-to-Web\hpgs2wnd.exe" [2001-07-03 09:11 57344]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2006-09-01 15:57 282624]
"iTunesHelper"="C:\Program Files\iTunes\iTunesHelper.exe" [2006-09-12 01:58 229952]
"HostManager"="C:\Program Files\Common Files\AOL\1137646052\ee\AOLSoftware.exe" [2006-05-09 20:24 50760]
"IPHSend"="C:\Program Files\Common Files\AOL\IPHSend\IPHSend.exe" [2006-02-17 12:59 124520]
"CFSServ.exe"="CFSServ.exe" []
"SSBkgdUpdate"="C:\Program Files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" [2003-09-30 01:14 155648]
"OpwareSE4"="C:\Program Files\ScanSoft\OmniPageSE4.0\OpwareSE4.exe" [2006-03-21 14:19 69632]
"PrintServer Diagnostic"="C:\Program Files\Print Server\PTP\PSDiagnostic.exe" [2004-11-24 18:09 266240]
"FLMOFFICE4DMOUSE"="C:\Program Files\Wireless Optical Mouse\MOffice.exe" [2007-02-06 23:54 958464]
"FLMK08KB"="C:\Program Files\Multimedia keyboard utility\KbdAp32A.exe" [2007-02-06 23:55 401408]
"TkBellExe"="C:\Program Files\Common Files\Real\Update_OB\realsched.exe" [2007-04-16 19:08 185896]
"Ulead Photo Express Calendar Checker"="C:\Program Files\Ulead Systems\Ulead Photo Express 5 SE\calcheck.exe" [2004-01-12 20:40 69632]
"ZoneAlarm Client"="C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe" [2007-09-06 16:14 919016]
"CanonMyPrinter"="C:\Program Files\Canon\MyPrinter\BJMyPrt.exe" [2006-03-21 21:30 1191936]
"RCAutoLiveUpdate"="C:\Program Files\Max Registry Cleaner\MaxLiveUpdateRC.exe" [2008-01-02 13:25 894416]
"RCSystemTray"="C:\Program Files\Max Registry Cleaner\MaxRCSystemTray.exe" [2008-01-02 13:25 951760]
"Adobe Reader Speed Launcher"="C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 23:16 39792]

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Positive Networks.lnk - C:\Program Files\Positive Networks\PosLoader.exe [2006-11-13 10:48:58 763392]
RAMASST.lnk - C:\WINDOWS\system32\RAMASST.exe [2006-01-18 23:59:32 155648]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\hgGvstTJ]
hgGvstTJ.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\PCANotify]
PCANotify.dll 2002-02-15 13:51 24638 C:\WINDOWS\system32\PCANotify.dll

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ZoneLabsFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"C:\\TOSHIBA\\ivp\\NetInt\\Netint.exe"=
"C:\\TOSHIBA\\Ivp\\ISM\\pinger.exe"= C:\\TOSHIBA\\IVP\\ISM\\pinger.exe
"C:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"C:\\Program Files\\Common Files\\AOL\\ACS\\AOLDial.exe"=
"C:\\Program Files\\Common Files\\AOL\\ACS\\AOLacsd.exe"=
"C:\\Program Files\\America Online 9.0\\waol.exe"=
"C:\\Program Files\\Common Files\\AOL\\TopSpeed\\2.0\\aoltsmon.exe"=
"C:\\Program Files\\Common Files\\AOL\\TopSpeed\\2.0\\aoltpspd.exe"=
"C:\\Program Files\\Common Files\\AOL\\1137646052\\EE\\AOLServiceHost.exe"=
"C:\\Program Files\\Common Files\\AOL\\System Information\\sinf.exe"=
"C:\\Program Files\\Common Files\\AOL\\AOL Spyware Protection\\AOLSP Scheduler.exe"=
"C:\\Program Files\\Common Files\\AOL\\AOL Spyware Protection\\asp.exe"=
"C:\\Program Files\\Common Files\\AolCoach\\en_en\\player\\AOLNySEV.exe"=
"C:\\Program Files\\Symantec\\pcAnywhere\\WINAW32.EXE"=
"C:\\Program Files\\Symantec\\pcAnywhere\\AWHOST32.EXE"=
"C:\\Program Files\\Symantec\\pcAnywhere\\awrem32.exe"=
"C:\\WINDOWS\\system32\\ZoneLabs\\vsmon.exe"=
"C:\\Program Files\\iTunes\\iTunes.exe"=
"C:\\Program Files\\Common Files\\AOL\\1137646052\\EE\\aolsoftware.exe"=
"C:\\Program Files\\Common Files\\AOL\\1137646052\\EE\\aim6.exe"=
"C:\\WINDOWS\\KB59834\\hkbcdyta.exe"=

R0 KR10N;KR10N;C:\WINDOWS\system32\drivers\KR10N.sys [2005-01-12 04:05]
R0 SSFS0BB8;Spy Sweeper File System Filer Driver: 0BB8;C:\WINDOWS\system32\Drivers\SSFS0BB8.SYS [2007-07-19 22:42]
R2 pospcserv;Positive Networks VPN Client Manager;C:\Program Files\Positive Networks\Drivers\pospcserv.exe [2007-04-23 10:25]
R2 pospfa;Positive Networks Private File Area;C:\Program Files\Positive Networks\Drivers\pospfa.sys [2007-04-23 10:26]
R3 dsNcAdpt;Juniper Network Connect Adapter;C:\WINDOWS\system32\DRIVERS\dsNcAdpt.sys [2007-08-23 16:21]
R3 moufiltr;Mouse Filter Driver;C:\WINDOWS\system32\DRIVERS\moufiltr.sys [2007-02-06 23:54]
R3 posnat;Positive Networks NAT Miniport;C:\WINDOWS\system32\DRIVERS\posnat.sys [2007-04-23 10:26]
R3 Posvpn;Positive VPN Miniport;C:\WINDOWS\system32\DRIVERS\posvpn.sys [2007-04-23 10:26]
S3 tosrfec;Bluetooth ACPI from TOSHIBA;C:\WINDOWS\system32\DRIVERS\tosrfec.sys [2005-09-09 18:47]

.
Contents of the 'Scheduled Tasks' folder
"2008-04-12 14:40:29 C:\WINDOWS\Tasks\AdwareAlert Scheduled Scan.job"
- C:\Program Files\AdwareAlert\AdwareAlert.ex
- C:\Program Files\AdwareAlert
"2008-02-08 01:41:05 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job"
- C:\Program Files\Apple Software Update\SoftwareUpdate.exe
"2008-04-10 13:00:42 C:\WINDOWS\Tasks\wrSpySweeper_LC15E2A7AF7BE4E939E29330BF7E7247B.job"
- C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exe>/ScheduleSweep=wrSpySweeper_LC15E2A7AF7BE4E939E29330BF7E7247B
- C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.ex
- C:\
.
**************************************************************************

catchme 0.3.1351 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-04-12 10:37:29
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

PROCESS: C:\WINDOWS\system32\winlogon.exe
-> C:\WINDOWS\system32\NavLogon.dll
.
------------------------ Other Running Processes ------------------------
.
C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
C:\Program Files\Common Files\AOL\ACS\AOLacsd.exe
C:\Program Files\Common Files\AOL\TopSpeed\2.0\aoltsmon.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\Program Files\Common Files\AOL\TopSpeed\2.0\aoltpspd.exe
C:\PROGRA~1\SYMANT~1\SYMANT~1\DefWatch.exe
C:\Program Files\Juniper Networks\Common Files\dsNcService.exe
C:\WINDOWS\system32\DVDRAMSV.exe
C:\PROGRA~1\SYMANT~1\SYMANT~1\Rtvscan.exe
C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
C:\TOSHIBA\IVP\swupdate\swupdtmr.exe
C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe
C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSServ.exe
C:\PROGRA~1\HEWLET~1\HPSHAR~1\hpgs2wnf.exe
C:\PROGRA~1\Intel\Wireless\Bin\Dot1XCfg.exe
C:\WINDOWS\system32\TPSBattM.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Wireless Optical Mouse\mouse32a.exe
C:\Program Files\Common Files\AOL\Loader\aolload.exe
.
**************************************************************************
.
Completion time: 2008-04-12 10:42:54 - machine was rebooted
ComboFix-quarantined-files.txt 2008-04-12 14:42:39
Pre-Run: 56,473,653,248 bytes free
Post-Run: 56,368,865,280 bytes free
.
2008-03-16 19:16:31 --- E O F ---
  • 0

#20
koko_crunch

koko_crunch

    Trusted Helper

  • Retired Staff
  • 1,751 posts
Sound great but we're not done yet.

Next,


Please download Malwarebytes' Anti-Malware from Here or Here

Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.
Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

then,

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here.)
  • Under "Configuration and Preferences", click the Preferences button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Please post back with the following logs.

- Malwarebytes log
- Superantispyware log
  • 0

#21
Tmare

Tmare

    Member

  • Topic Starter
  • Member
  • PipPip
  • 63 posts
Malabytes notepad results:
Malwarebytes' Anti-Malware 1.11
Database version: 621

Scan type: Quick Scan
Objects scanned: 31406
Time elapsed: 8 minute(s), 35 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 11
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 3
Files Infected: 15

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\Software\AdwareAlert (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\xflock (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mywebsearchwbbar.settingsplugin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mywebsearchwbbar.settingsplugin.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mywebsearchwbbar.toolbarplugin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mywebsearchwbbar.toolbarplugin.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mywebsearchwbtoolbar.temperaturebarbutton (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mywebsearchwbtoolbar.temperaturebarbutton.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Documents and Settings\Owner\Application Data\AdwareAlert (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\AdwareAlert\Log (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\AdwareAlert\Settings (Rogue.AdwareAlert) -> Quarantined and deleted successfully.

Files Infected:
C:\Documents and Settings\Owner\Application Data\AdwareAlert\rs.dat (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\AdwareAlert\Log\2008 Apr 07 - 08_37_28 PM_031.log (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\AdwareAlert\Log\2008 Apr 08 - 06_46_14 PM_906.log (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\AdwareAlert\Log\2008 Apr 08 - 11_03_44 AM_468.log (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\AdwareAlert\Log\2008 Apr 09 - 03_03_33 PM_515.log (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\AdwareAlert\Log\2008 Apr 09 - 03_41_55 PM_812.log (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\AdwareAlert\Log\2008 Apr 09 - 07_25_53 AM_109.log (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\AdwareAlert\Log\2008 Apr 09 - 08_35_59 AM_296.log (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\AdwareAlert\Log\2008 Apr 10 - 07_15_02 AM_796.log (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\AdwareAlert\Log\2008 Apr 11 - 10_26_52 AM_171.log (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\AdwareAlert\Log\2008 Apr 11 - 10_52_20 AM_906.log (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\AdwareAlert\Log\2008 Apr 12 - 10_07_06 AM_093.log (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\AdwareAlert\Log\2008 Apr 12 - 10_40_25 AM_671.log (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\AdwareAlert\Settings\ScanResults.pie (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system\SYSRegC.dll (Trojan.Agent) -> Quarantined and deleted successfully.
  • 0

#22
Tmare

Tmare

    Member

  • Topic Starter
  • Member
  • PipPip
  • 63 posts
results of supersyware scan.....Note....I found the same things when I ran my Webroot spyware scan and it quarentined these.

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 04/13/2008 at 02:14 PM

Application Version : 4.0.1154

Core Rules Database Version : 3437
Trace Rules Database Version: 1429

Scan type : Complete Scan
Total Scan Time : 01:02:18

Memory items scanned : 619
Memory threats detected : 1
Registry items scanned : 5661
Registry threats detected : 91
File items scanned : 79963
File threats detected : 130

Trojan.Unclassified-Packed/Suspicious
C:\WINDOWS\TSJITCBE.DLL
C:\WINDOWS\TSJITCBE.DLL
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{56c8620e-1dd2-11b2-a977-93b891a81286}
HKCR\CLSID\{56C8620E-1DD2-11B2-A977-93B891A81286}
HKCR\CLSID\{56C8620E-1DD2-11B2-A977-93B891A81286}\InprocServer32
HKCR\CLSID\{56C8620E-1DD2-11B2-A977-93B891A81286}\InprocServer32#ThreadingModel
HKCR\CLSID\{56C8620E-1DD2-11B2-A977-93B891A81286}\InprocServer32#t
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\BQNKNYFG.DLL

Adware.Tracking Cookie
C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\[email protected][2].txt
C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\[email protected][2].txt

Malware.SpyDawn
HKCR\TypeLib\{C7281808-F7C3-4BED-940F-40B9FD5784B6}
HKCR\TypeLib\{C7281808-F7C3-4BED-940F-40B9FD5784B6}\1.0
HKCR\TypeLib\{C7281808-F7C3-4BED-940F-40B9FD5784B6}\1.0\0
HKCR\TypeLib\{C7281808-F7C3-4BED-940F-40B9FD5784B6}\1.0\0\win32
HKCR\TypeLib\{C7281808-F7C3-4BED-940F-40B9FD5784B6}\1.0\FLAGS
HKCR\TypeLib\{C7281808-F7C3-4BED-940F-40B9FD5784B6}\1.0\HELPDIR
HKCR\Interface\{080C3EC1-AB54-40F3-88BE-E6FACE068CF0}
HKCR\Interface\{080C3EC1-AB54-40F3-88BE-E6FACE068CF0}\ProxyStubClsid
HKCR\Interface\{080C3EC1-AB54-40F3-88BE-E6FACE068CF0}\ProxyStubClsid32
HKCR\Interface\{080C3EC1-AB54-40F3-88BE-E6FACE068CF0}\TypeLib
HKCR\Interface\{080C3EC1-AB54-40F3-88BE-E6FACE068CF0}\TypeLib#Version
HKCR\Interface\{101981F9-8BA3-4064-949B-3C5BEB867134}
HKCR\Interface\{101981F9-8BA3-4064-949B-3C5BEB867134}\ProxyStubClsid
HKCR\Interface\{101981F9-8BA3-4064-949B-3C5BEB867134}\ProxyStubClsid32
HKCR\Interface\{101981F9-8BA3-4064-949B-3C5BEB867134}\TypeLib
HKCR\Interface\{101981F9-8BA3-4064-949B-3C5BEB867134}\TypeLib#Version
HKCR\Interface\{16992424-7AC2-47F6-8799-BF4E8EBBECC1}
HKCR\Interface\{16992424-7AC2-47F6-8799-BF4E8EBBECC1}\ProxyStubClsid
HKCR\Interface\{16992424-7AC2-47F6-8799-BF4E8EBBECC1}\ProxyStubClsid32
HKCR\Interface\{16992424-7AC2-47F6-8799-BF4E8EBBECC1}\TypeLib
HKCR\Interface\{16992424-7AC2-47F6-8799-BF4E8EBBECC1}\TypeLib#Version
HKCR\Interface\{28DC003F-7396-4B9D-8D0C-E40D8F4E3F4A}
HKCR\Interface\{28DC003F-7396-4B9D-8D0C-E40D8F4E3F4A}\ProxyStubClsid
HKCR\Interface\{28DC003F-7396-4B9D-8D0C-E40D8F4E3F4A}\ProxyStubClsid32
HKCR\Interface\{28DC003F-7396-4B9D-8D0C-E40D8F4E3F4A}\TypeLib
HKCR\Interface\{28DC003F-7396-4B9D-8D0C-E40D8F4E3F4A}\TypeLib#Version
HKCR\Interface\{3A9CCAF6-08B8-4163-8DD8-3D9200314533}
HKCR\Interface\{3A9CCAF6-08B8-4163-8DD8-3D9200314533}\ProxyStubClsid
HKCR\Interface\{3A9CCAF6-08B8-4163-8DD8-3D9200314533}\ProxyStubClsid32
HKCR\Interface\{3A9CCAF6-08B8-4163-8DD8-3D9200314533}\TypeLib
HKCR\Interface\{3A9CCAF6-08B8-4163-8DD8-3D9200314533}\TypeLib#Version
HKCR\Interface\{3F109E21-D00A-4222-9A42-4A7611122CF1}
HKCR\Interface\{3F109E21-D00A-4222-9A42-4A7611122CF1}\ProxyStubClsid
HKCR\Interface\{3F109E21-D00A-4222-9A42-4A7611122CF1}\ProxyStubClsid32
HKCR\Interface\{3F109E21-D00A-4222-9A42-4A7611122CF1}\TypeLib
HKCR\Interface\{3F109E21-D00A-4222-9A42-4A7611122CF1}\TypeLib#Version
HKCR\Interface\{4DB7B2C0-C3BE-4A1D-915B-9B04981CF4B4}
HKCR\Interface\{4DB7B2C0-C3BE-4A1D-915B-9B04981CF4B4}\ProxyStubClsid
HKCR\Interface\{4DB7B2C0-C3BE-4A1D-915B-9B04981CF4B4}\ProxyStubClsid32
HKCR\Interface\{4DB7B2C0-C3BE-4A1D-915B-9B04981CF4B4}\TypeLib
HKCR\Interface\{4DB7B2C0-C3BE-4A1D-915B-9B04981CF4B4}\TypeLib#Version
HKCR\Interface\{5FC90027-65C3-4E0C-91C7-E3D3296E3763}
HKCR\Interface\{5FC90027-65C3-4E0C-91C7-E3D3296E3763}\ProxyStubClsid
HKCR\Interface\{5FC90027-65C3-4E0C-91C7-E3D3296E3763}\ProxyStubClsid32
HKCR\Interface\{5FC90027-65C3-4E0C-91C7-E3D3296E3763}\TypeLib
HKCR\Interface\{5FC90027-65C3-4E0C-91C7-E3D3296E3763}\TypeLib#Version
HKCR\Interface\{63948A86-9227-4DAB-8AA6-CCD2111264A0}
HKCR\Interface\{63948A86-9227-4DAB-8AA6-CCD2111264A0}\ProxyStubClsid
HKCR\Interface\{63948A86-9227-4DAB-8AA6-CCD2111264A0}\ProxyStubClsid32
HKCR\Interface\{63948A86-9227-4DAB-8AA6-CCD2111264A0}\TypeLib
HKCR\Interface\{63948A86-9227-4DAB-8AA6-CCD2111264A0}\TypeLib#Version
HKCR\Interface\{7A7CA289-6E1E-4A00-AA81-C5D252945645}
HKCR\Interface\{7A7CA289-6E1E-4A00-AA81-C5D252945645}\ProxyStubClsid
HKCR\Interface\{7A7CA289-6E1E-4A00-AA81-C5D252945645}\ProxyStubClsid32
HKCR\Interface\{7A7CA289-6E1E-4A00-AA81-C5D252945645}\TypeLib
HKCR\Interface\{7A7CA289-6E1E-4A00-AA81-C5D252945645}\TypeLib#Version
HKCR\Interface\{7DE844A5-DC96-4CD5-B4EE-1C7AE0B5E62A}
HKCR\Interface\{7DE844A5-DC96-4CD5-B4EE-1C7AE0B5E62A}\ProxyStubClsid
HKCR\Interface\{7DE844A5-DC96-4CD5-B4EE-1C7AE0B5E62A}\ProxyStubClsid32
HKCR\Interface\{7DE844A5-DC96-4CD5-B4EE-1C7AE0B5E62A}\TypeLib
HKCR\Interface\{7DE844A5-DC96-4CD5-B4EE-1C7AE0B5E62A}\TypeLib#Version
HKCR\Interface\{929FC56A-EE5C-436C-BC73-68D583233485}
HKCR\Interface\{929FC56A-EE5C-436C-BC73-68D583233485}\ProxyStubClsid
HKCR\Interface\{929FC56A-EE5C-436C-BC73-68D583233485}\ProxyStubClsid32
HKCR\Interface\{929FC56A-EE5C-436C-BC73-68D583233485}\TypeLib
HKCR\Interface\{929FC56A-EE5C-436C-BC73-68D583233485}\TypeLib#Version
HKCR\Interface\{94596FC9-CBF8-4F61-8A02-AACBB86B51BA}
HKCR\Interface\{94596FC9-CBF8-4F61-8A02-AACBB86B51BA}\ProxyStubClsid
HKCR\Interface\{94596FC9-CBF8-4F61-8A02-AACBB86B51BA}\ProxyStubClsid32
HKCR\Interface\{94596FC9-CBF8-4F61-8A02-AACBB86B51BA}\TypeLib
HKCR\Interface\{94596FC9-CBF8-4F61-8A02-AACBB86B51BA}\TypeLib#Version
HKCR\Interface\{A048440C-9495-4757-8FB3-0383ADE9E89D}
HKCR\Interface\{A048440C-9495-4757-8FB3-0383ADE9E89D}\ProxyStubClsid
HKCR\Interface\{A048440C-9495-4757-8FB3-0383ADE9E89D}\ProxyStubClsid32
HKCR\Interface\{A048440C-9495-4757-8FB3-0383ADE9E89D}\TypeLib
HKCR\Interface\{A048440C-9495-4757-8FB3-0383ADE9E89D}\TypeLib#Version
HKCR\Interface\{CC09AC3E-AA61-4CBD-A351-DF435C8FE5C2}
HKCR\Interface\{CC09AC3E-AA61-4CBD-A351-DF435C8FE5C2}\ProxyStubClsid
HKCR\Interface\{CC09AC3E-AA61-4CBD-A351-DF435C8FE5C2}\ProxyStubClsid32
HKCR\Interface\{CC09AC3E-AA61-4CBD-A351-DF435C8FE5C2}\TypeLib
HKCR\Interface\{CC09AC3E-AA61-4CBD-A351-DF435C8FE5C2}\TypeLib#Version
HKCR\Interface\{CC61280D-617C-4007-9D21-3F6F7BBA81FE}
HKCR\Interface\{CC61280D-617C-4007-9D21-3F6F7BBA81FE}\ProxyStubClsid
HKCR\Interface\{CC61280D-617C-4007-9D21-3F6F7BBA81FE}\ProxyStubClsid32
HKCR\Interface\{CC61280D-617C-4007-9D21-3F6F7BBA81FE}\TypeLib
HKCR\Interface\{CC61280D-617C-4007-9D21-3F6F7BBA81FE}\TypeLib#Version

Trojan.Unclassified/Multi-Dropper (Packed)
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\MFKLWJGJ\YBSFSLGX.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0154588.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP411\A0159789.EXE

Browser Hijacker.Favorites
C:\DOCUMENTS AND SETTINGS\OWNER\DESKTOP\UNUSED DESKTOP SHORTCUTS\ONLINE SECURITY GUIDE.URL
C:\DOCUMENTS AND SETTINGS\OWNER\DESKTOP\UNUSED DESKTOP SHORTCUTS\SECURITY TROUBLESHOOTING.URL

Adware.OuterInfo-Installer
C:\QOOBOX\QUARANTINE\C\PROGRAM FILES\OUTERINFO\OIUNINSTALLER.EXE.VIR
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161210.EXE

Rogue.LiveSecurityCenter-Trace
C:\QOOBOX\QUARANTINE\C\WINDOWS\DEFAULT.HTM.VIR

Adware.180solutions/Seekmo
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP371\A0141953.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP371\A0141954.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP371\A0141955.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP371\A0141956.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP371\A0141957.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP371\A0141958.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP371\A0141959.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP371\A0141962.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP371\A0141964.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP371\A0141965.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP371\A0141966.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP371\A0141967.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP371\A0141968.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP371\A0141969.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP371\A0141970.DLL

Adware.180solutions/ZangoSearch
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP371\A0141960.DLL

Trojan.Net-MSV/VPS-H
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP372\A0142827.DLL

Trojan.Vundo-Variant/F
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0155359.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP411\A0157689.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161266.DLL

Trojan.Fake-Drop/Gen
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0156462.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0156463.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0156464.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0156465.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0156466.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0156467.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0156468.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0156469.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0156470.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0156471.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0157546.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0157547.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0157548.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0157549.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0157550.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0157551.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0157552.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0157553.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0157554.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP410\A0157555.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP411\A0157576.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP411\A0157577.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP411\A0157578.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP411\A0157579.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP411\A0157580.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP411\A0157581.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP411\A0157582.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161200.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161201.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161202.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161203.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161204.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161205.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161206.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161207.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161208.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161214.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161216.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161217.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161218.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161219.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161220.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161221.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161222.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161223.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161224.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161225.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161226.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161227.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161228.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161229.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161230.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161231.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161233.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161234.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161235.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161236.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161237.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161238.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161239.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161240.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161241.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161242.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161243.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161244.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161245.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161248.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161249.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161250.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161251.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161252.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161253.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161254.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161255.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161257.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161258.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161259.EXE

Adware.Vundo-Variant/E
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP411\A0157677.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161261.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161263.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161265.DLL

Rogue.WinXPPerformance-Dropper
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP412\A0159833.DLL

Adware.Vundo-Variant/Small-A
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP413\A0159890.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP415\A0161181.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161262.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP416\A0161264.DLL

Rogue.WinPerformance
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP413\A0160053.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP413\A0160074.EXE

Adware.AdSponsor/ISM
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP413\A0160056.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP413\A0160078.EXE

Trojan.Unclassified/Multi-Dropper
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E5F689B9-8C88-425A-878C-812257CD29D2}\RP418\A0161380.EXE
  • 0

#23
koko_crunch

koko_crunch

    Trusted Helper

  • Retired Staff
  • 1,751 posts
Looks like we still have work to do.

Next,

Please download ComboFix from Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**

-----------------------------------------------------------

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
  • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

    -----------------------------------------------------------

1. Please open Notepad
  • Click Start , then Run
  • Type notepad .exe in the Run Box.

2. Now copy/paste the entire content of the codebox below into the Notepad window:

File::
C:\WINDOWS\TSJITCBE.DLL
C:\WINDOWS\TSJITCBE.DLL
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\BQNKNYFG.DLL
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\MFKLWJGJ\YBSFSLGX.EXE
C:\DOCUMENTS AND SETTINGS\OWNER\DESKTOP\UNUSED DESKTOP SHORTCUTS\ONLINE SECURITY GUIDE.URL
C:\DOCUMENTS AND SETTINGS\OWNER\DESKTOP\UNUSED DESKTOP SHORTCUTS\SECURITY TROUBLESHOOTING.URL

Registry::
[-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{56c8620e-1dd2-11b2-a977-93b891a81286}]
[-HKEY_CLASSES_ROOT\CLSID\{56C8620E-1DD2-11B2-A977-93B891A81286}]
[-HKEY_CLASSES_ROOT\TypeLib\{C7281808-F7C3-4BED-940F-40B9FD5784B6}]
[-HKEY_CLASSES_ROOT\Interface\{080C3EC1-AB54-40F3-88BE-E6FACE068CF0}]
[-HKEY_CLASSES_ROOT\Interface\{101981F9-8BA3-4064-949B-3C5BEB867134}]
[-HKEY_CLASSES_ROOT\Interface\{16992424-7AC2-47F6-8799-BF4E8EBBECC1}]
[-HKEY_CLASSES_ROOT\Interface\{28DC003F-7396-4B9D-8D0C-E40D8F4E3F4A}]
[-HKEY_CLASSES_ROOT\Interface\{3A9CCAF6-08B8-4163-8DD8-3D9200314533}]
[-HKEY_CLASSES_ROOT\Interface\{3F109E21-D00A-4222-9A42-4A7611122CF1}]
[-HKEY_CLASSES_ROOT\Interface\{4DB7B2C0-C3BE-4A1D-915B-9B04981CF4B4}]
[-HKEY_CLASSES_ROOT\Interface\{5FC90027-65C3-4E0C-91C7-E3D3296E3763}]
[-HKEY_CLASSES_ROOT\Interface\{63948A86-9227-4DAB-8AA6-CCD2111264A0}]
[-HKEY_CLASSES_ROOT\Interface\{7A7CA289-6E1E-4A00-AA81-C5D252945645}]
[-HKEY_CLASSES_ROOT\Interface\{7DE844A5-DC96-4CD5-B4EE-1C7AE0B5E62A}]
[-HKEY_CLASSES_ROOT\Interface\{929FC56A-EE5C-436C-BC73-68D583233485}]
[-HKEY_CLASSES_ROOT\Interface\{94596FC9-CBF8-4F61-8A02-AACBB86B51BA}]
[-HKEY_CLASSES_ROOT\Interface\{A048440C-9495-4757-8FB3-0383ADE9E89D}]
[-HKEY_CLASSES_ROOT\Interface\{CC09AC3E-AA61-4CBD-A351-DF435C8FE5C2}]
[-HKEY_CLASSES_ROOT\Interface\{CC61280D-617C-4007-9D21-3F6F7BBA81FE}]



3. Save the above as CFScript.txt

4. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

Posted Image


5. After reboot, (in case it asks to reboot), please post the following reports/logs into your next reply:
  • Combofix.txt
  • A new HijackThis log.

Edited by koko_crunch, 14 April 2008 - 08:42 AM.
bb code

  • 0

#24
Tmare

Tmare

    Member

  • Topic Starter
  • Member
  • PipPip
  • 63 posts
when I copy paste the code box into Combo fix, it starts to run and then a blue screen with nothing.
  • 0

#25
koko_crunch

koko_crunch

    Trusted Helper

  • Retired Staff
  • 1,751 posts
Ok. We'll use a different tool then.

First,

Please download the OTMoveIt2 by OldTimer.
  • Save it to your desktop.
  • Please double-click OTMoveIt2.exe to run it. (Vista users, please right click on OTMoveit2.exe and select "Run as an Administrator")
  • Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):
    C:\WINDOWS\TSJITCBE.DLL
    C:\WINDOWS\TSJITCBE.DLL
    C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\BQNKNYFG.DLL
    C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\MFKLWJGJ\YBSFSLGX.EXE
    C:\DOCUMENTS AND SETTINGS\OWNER\DESKTOP\UNUSED DESKTOP SHORTCUTS\ONLINE SECURITY GUIDE.URL
    C:\DOCUMENTS AND SETTINGS\OWNER\DESKTOP\UNUSED DESKTOP SHORTCUTS\SECURITY TROUBLESHOOTING.URL
    
    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{56c8620e-1dd2-11b2-a977-93b891a81286}
    HKEY_CLASSES_ROOT\CLSID\{56C8620E-1DD2-11B2-A977-93B891A81286}
    HKEY_CLASSES_ROOT\TypeLib\{C7281808-F7C3-4BED-940F-40B9FD5784B6}
    HKEY_CLASSES_ROOT\Interface\{080C3EC1-AB54-40F3-88BE-E6FACE068CF0}
    HKEY_CLASSES_ROOT\Interface\{101981F9-8BA3-4064-949B-3C5BEB867134}
    HKEY_CLASSES_ROOT\Interface\{16992424-7AC2-47F6-8799-BF4E8EBBECC1}
    HKEY_CLASSES_ROOT\Interface\{28DC003F-7396-4B9D-8D0C-E40D8F4E3F4A}
    HKEY_CLASSES_ROOT\Interface\{3A9CCAF6-08B8-4163-8DD8-3D9200314533}
    HKEY_CLASSES_ROOT\Interface\{3F109E21-D00A-4222-9A42-4A7611122CF1}
    HKEY_CLASSES_ROOT\Interface\{4DB7B2C0-C3BE-4A1D-915B-9B04981CF4B4}
    HKEY_CLASSES_ROOT\Interface\{5FC90027-65C3-4E0C-91C7-E3D3296E3763}
    HKEY_CLASSES_ROOT\Interface\{63948A86-9227-4DAB-8AA6-CCD2111264A0}
    HKEY_CLASSES_ROOT\Interface\{7A7CA289-6E1E-4A00-AA81-C5D252945645}
    HKEY_CLASSES_ROOT\Interface\{7DE844A5-DC96-4CD5-B4EE-1C7AE0B5E62A}
    HKEY_CLASSES_ROOT\Interface\{929FC56A-EE5C-436C-BC73-68D583233485}
    HKEY_CLASSES_ROOT\Interface\{94596FC9-CBF8-4F61-8A02-AACBB86B51BA}
    HKEY_CLASSES_ROOT\Interface\{A048440C-9495-4757-8FB3-0383ADE9E89D}
    HKEY_CLASSES_ROOT\Interface\{CC09AC3E-AA61-4CBD-A351-DF435C8FE5C2}
    HKEY_CLASSES_ROOT\Interface\{CC61280D-617C-4007-9D21-3F6F7BBA81FE}

  • Return to OTMoveIt2, right click in the "Paste List of Files/Folders to Move" window (under the light Yellow bar) and choose Paste.
  • Click the red Moveit! button.
  • A log of files and folders moved will be created in the c:\_OTMoveIt\MovedFiles folder in the form of Date and Time (mmddyyyy_hhmmss.log). Please open this log in Notepad and post its contents in your next reply.
  • Close OTMoveIt2
If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.


Then

Please download Deckard's System Scanner (DSS) and save it to your Desktop.
  • Close all other windows before proceeding.
  • Double-click on dss.exe and follow the prompts.
  • When it has finished, dss will open two Notepads main.txt and extra.txt -- please copy (CTRL+A and then CTRL+C) and paste (CTRL+V) the contents of main.txt and extra.txt in your next reply.


Please post back with

- OTmoveit log
- DSS main and extra
  • 0

Advertisements


#26
Tmare

Tmare

    Member

  • Topic Starter
  • Member
  • PipPip
  • 63 posts
ok, did everthing in the post, and when I hit "move it" the following appears in the Results box:

C\windows\tsjitcbe.dll not found
C\windows\tsjitcbe.dll not found

and otmoveIT2 just sits with an hour glass.
  • 0

#27
koko_crunch

koko_crunch

    Trusted Helper

  • Retired Staff
  • 1,751 posts
Could you please re-do previous instructions. OTMoveit may take sometime to complete assigned task. :)
  • 0

#28
Tmare

Tmare

    Member

  • Topic Starter
  • Member
  • PipPip
  • 63 posts
OTMoveIt2 just sat there with an hour glass for over an hour....
  • 0

#29
koko_crunch

koko_crunch

    Trusted Helper

  • Retired Staff
  • 1,751 posts
Please download ComboFix from Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
  • Please, never rename Combofix unless instructed.
  • Close any open browsers.
  • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

    -----------------------------------------------------------

    [list]
  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
  • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

    -----------------------------------------------------------


Then,

1. Please open Notepad
  • Click Start , then Run
  • Type notepad .exe in the Run Box.

2. Now copy/paste the entire content of the codebox below into the Notepad window:

File::
C:\WINDOWS\TSJITCBE.DLL
C:\WINDOWS\TSJITCBE.DLL
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\BQNKNYFG.DLL
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\MFKLWJGJ\YBSFSLGX.EXE
C:\DOCUMENTS AND SETTINGS\OWNER\DESKTOP\UNUSED DESKTOP SHORTCUTS\ONLINE SECURITY GUIDE.URL
C:\DOCUMENTS AND SETTINGS\OWNER\DESKTOP\UNUSED DESKTOP SHORTCUTS\SECURITY TROUBLESHOOTING.URL

Folder::
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\MFKLWJGJ

Registry::
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{56c8620e-1dd2-11b2-a977-93b891a81286}
HKEY_CLASSES_ROOT\CLSID\{56C8620E-1DD2-11B2-A977-93B891A81286}
HKEY_CLASSES_ROOT\TypeLib\{C7281808-F7C3-4BED-940F-40B9FD5784B6}
HKEY_CLASSES_ROOT\Interface\{080C3EC1-AB54-40F3-88BE-E6FACE068CF0}
HKEY_CLASSES_ROOT\Interface\{101981F9-8BA3-4064-949B-3C5BEB867134}
HKEY_CLASSES_ROOT\Interface\{16992424-7AC2-47F6-8799-BF4E8EBBECC1}
HKEY_CLASSES_ROOT\Interface\{28DC003F-7396-4B9D-8D0C-E40D8F4E3F4A}
HKEY_CLASSES_ROOT\Interface\{3A9CCAF6-08B8-4163-8DD8-3D9200314533}
HKEY_CLASSES_ROOT\Interface\{3F109E21-D00A-4222-9A42-4A7611122CF1}
HKEY_CLASSES_ROOT\Interface\{4DB7B2C0-C3BE-4A1D-915B-9B04981CF4B4}
HKEY_CLASSES_ROOT\Interface\{5FC90027-65C3-4E0C-91C7-E3D3296E3763}
HKEY_CLASSES_ROOT\Interface\{63948A86-9227-4DAB-8AA6-CCD2111264A0}
HKEY_CLASSES_ROOT\Interface\{7A7CA289-6E1E-4A00-AA81-C5D252945645}
HKEY_CLASSES_ROOT\Interface\{7DE844A5-DC96-4CD5-B4EE-1C7AE0B5E62A}
HKEY_CLASSES_ROOT\Interface\{929FC56A-EE5C-436C-BC73-68D583233485}
HKEY_CLASSES_ROOT\Interface\{94596FC9-CBF8-4F61-8A02-AACBB86B51BA}
HKEY_CLASSES_ROOT\Interface\{A048440C-9495-4757-8FB3-0383ADE9E89D}
HKEY_CLASSES_ROOT\Interface\{CC09AC3E-AA61-4CBD-A351-DF435C8FE5C2}
HKEY_CLASSES_ROOT\Interface\{CC61280D-617C-4007-9D21-3F6F7BBA81FE}



3. Save the above as CFScript.txt

4. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

Posted Image


5. After reboot, (in case it asks to reboot), please post the following reports/logs into your next reply:
  • Combofix.txt
  • A new HijackThis log.

  • 0

#30
Tmare

Tmare

    Member

  • Topic Starter
  • Member
  • PipPip
  • 63 posts
Sorry, I ran combo fix again as you instructed and I got Blue screen with no action for over an hour. What is it exactly we are trying to do with this last step?
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP